nsa aff - umich 2015 - University of Michigan Debate Camp Wiki

advertisement
1ac – 702
Advantages
1ac – NSA overreach
Contention 1 – NSA overreach
Executive Order 12333 authorizes foreign surveillance, but the NSA is using it to
exploit loopholes to create backdoor access for wholly domestic
communications
Arnbak and Goldberg 14- cybersecurity and information law research at the Institute for
Information Law, LL.M degree from Leiden University, A Competitive Strategy and Game Theory degree
from London School of Economics University of Amsterdam; Associate professor in the Computer
Science Department at Boston University, phD from Princeton University, B.A.S.c from University of
Toronto (Axel and Sharon, “Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance
on Americans by Collecting the Network Traffic Abroad”, Working Paper, June 27, 2014)//TT
Legal Loopholes. In Section 2 we start by describing the current U.S. regulatory framework for
intelligence gathering. From public and until-recently secret primary legal sources, three regimes can be
distinguished, based on where the surveillance is conducted, and who it targets:
1. Surveillance of domestic communications conducted on U.S. soil under s.215 of the “Patriot Act”;
2. Surveillance of foreign communications conducted on U.S. soil under the “Foreign Intelligence
Surveillance Act”; and
3. Surveillance conducted entirely abroad under “Executive Order 12333” (EO 12333) and its
minimization policies, notably U.S. Signals Intelligence Directive 18 (“USSID 18”). USSID 18 was drafted
and approved within the Executive branch with minimal Congressional or Judicial oversight.
The first two regimes are overseen by all three branches of the U.S. government, and currently under
scrutiny by the government, media and the general public. The third regime, however, is solely the
domain of the Executive branch and has largely been ignored by the public and other branches of
Government in recent months, especially since relevant legal documents related to EO 12333 remain
classified or redacted. However, according to the N.S.A., this third regime under EO 12333 is the
‘ primary legal authority ’ for its operations [5, p. 2-3]. Thus, it deserves more attention and careful
scrutiny.
Working with primary legal sources, many of which have only recently been made public and are still
redacted on key issues, we make the following central observation. A surveillance operation falls within
the EO 12333 regime when it presumes two connected criteria: it does not intentionally target a U.S.
person, and is conducted abroad. If an intelligence agency can construct plausible presumptions that
these two criteria have been meet, then the permissive legal regime under EO 12333 can be applied to
the surveillance operation. The surveillance is then considered to affect non-U.S. persons, and 4th
Amendment protections can thus be circumvented even if the operation primarily affects Americans .
Our main hypothesis is therefore that there is loophole for surveillance on Americans from abroad
resulting from the following interdependence: (1) the complete absence of legal protection for non-U.S.
persons under the U.S. regulatory framework [32,33] creates ‘foreignness’-presumptions under EO
12333 and (2) the technical realities of modern Internet communications.
Technical Loopholes. At first blush, one might suppose that a surveillance operation conducted abroad
should have no impact on the privacy of Americans. However, in Section 3 we discuss why the technical
realities of the Internet mean that American’s network traffic can easily be routed or stored abroad,
where it can then be collected under the permissive legal regime of EO 12333. Indeed, we already know
of surveillance programs that have exploited this legal loophole . The revealed MUSCULAR/TURMOIL
program, for example, illustrates how the N.S.A. presumed authority under EO 12333 to acquire traffic
between Google and Yahoo! servers located on foreign territory; this program allegedly collected up to
180 million user records per month abroad, including those of Americans [17].
We also discuss other technical means an intelligence agency can exploit the legal loopholes under EO
12333. Instead of eavesdropping on intradomain traffic (i.e., data sent within a network belonging to a
single organization, as in the MUSCULAR/TURMOIL program), these loopholes can be exploited in the
interdomain setting, where traffic traverses networks belonging to different organizations. We explain
why interdomain routing with BGP can naturally cause traffic originating in a U.S. network to be routed
abroad, even when it is destined for an endpoint located on U.S. soil . We also discuss why core
Internet protocols – BGP and DNS – can be deliberately manipulated to force traffic originating in
American networks to be routed abroad . We discuss why these deliberate manipulations fall within
the permissive EO 12333 regime, and how they can be used to collect, in bulk, all Internet traffic
(including metadata and content) sent between a pair of networks; even if both networks are located
on U.S. soil (e.g., from Harvard University to Boston University).
The perception that the NSA is using the XO 12333 back-door to circumvent
section 702 is causing a global backlash against US tech companies and driving
data localization
Eoyang, 14 - Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left
think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a
subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as
Chief of Staff to Rep. Anna Eshoo (D-Palo Alto) (“A Modest Proposal: FAA Exclusivity for Collection
Involving U.S. Technology Companies” Lawfare, 11/24, http://www.lawfareblog.com/modest-proposalfaa-exclusivity-collection-involving-us-technology-companies
Beyond 215 and FAA, media reports have suggested that there have been collection programs that
occur outside of the companies’ knowledge. American technology companies have been outraged about
media stories of US government intrusions onto their networks overseas, and the spoofing of their web
pages or products, all unbeknownst to the companies. These stories suggest that the government is
creating and sneaking through a back door to take the data . As one tech employee said to me, “the
back door makes a mockery of the front door .”
As a result of these allegations, companies are moving to encrypt their data against their own
government; they are limiting their cooperation with NSA; and they are pushing for reform. Negative
international reactions to media reports of certain kinds of intelligence collection abroad have resulted
in a backlash against American technology companies , spurring data localization requirements ,
rejection or cancellation of American contracts, and raising the specter of major losses in the cloud
computing industry. These allegations could dim one of the few bright spots in the American economic
recovery: tech.
Without commenting on the accuracy of these media reports, the perception is still a problem even if
the media reports of these government collection programs are not true---or are only partly true . The
tech industry believes them to be true , and more importantly, their customers at home and abroad
believe them to be true, and that means they have huge impact on American business and huge impact
as well on the relationship between these businesses and an intelligence community that depends on
their cooperation.
So, how should we think about reforms in response to this series of allegations the Executive Branch
can’t, or won’t, address? How about making the FAA the exclusive means for conducting electronic
surveillance when the information being collected is in the custody of an American company? This could
clarify that the executive branch could not play authority shell-games and claim that Executive Order
12333 allows it to obtain information on overseas non-US person targets that is in the custody of
American companies, unbeknownst to those companies.
As a policy matter, it seems to me that if the information to be acquired is in the custody of an American
company, the intelligence community should ask for it, rather than take it without asking . American
companies should be entitled to a higher degree of forthrightness from their government than foreign
companies, even when they are acting overseas. Under the FAA, we have a statutory regime that
creates judicial oversight and accountability to conduct electronic surveillance outside the US for
specific purposes: foreign intelligence (or traditional espionage), counter-terrorism, and prevention of
WMD proliferation. It addresses protections for both non-US and US persons. It creates a front-door ,
though compelled, relationship under which the intelligence community can receive communications
contents without individual warrants but with programmatic judicial oversight.
FAA exclusivity would say to the rest of the world that when the US conducts bulk electronic
surveillance overseas, we are doing so for a particular, national security purpose. The FAA structure with
FISC review provides an independent check that the statutory purposes are met. Through transparency
agreements with the government, the American companies are able to provide their customers with
some sense of how many requests are made.
The US needs to draw a sharp distinction between domestic and national
security surveillance to make the US Internet Freedom agenda credible –
otherwise global internet fragmentation will result
Fontaine, 14 – President of the Center for a New American Security; was foreign policy advisor to
Senator John McCain for more than five years; Worked at the State Department, the National Security
Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at
the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing
Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New
American Security, September 18, 2014, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf)//TT
The 2013 revelations of mass surveillance by the U.S. government transformed the global debate about
Internet freedom. Where once Washington routinely chided foreign governments and their corporate
collaborators for engaging in online censorship, monitoring and other forms of Internet repression, the
tables have turned. Edward Snowden, a former National Security Agency (NSA) contractor, leaked
thousands of documents revealing America’s most secret electronic surveillance programs, unleashing a
tidal wave of criticism and charges of hypocrisy, many directed at some of the very U.S. officials who
have championed online freedom.
America’s Internet freedom agenda – the effort to preserve and extend the free flow of information
online – hangs in the balance .1 Already a contested space, the Internet after the Snowden revelations
has become even more politically charged, with deep international divisions about its governance and
heated battles over its use as a tool of political change. With 2.8 billion Internet users today, and several
billion more expected over the next decade, the contest over online freedom grows more important by
the day.2 As an ever-greater proportion of human activity is mediated through Internet-based
technologies, the extent of online rights and restrictions takes on an increasingly vital role in political,
economic and social life.3
Despite the many complications arising from the Snowden disclosures, America still needs a
comprehensive Internet freedom strategy, one that tilts the balance in favor of those who would use the
Internet to advance tolerance and free expression, and away from those who would employ it for
repression or violence.4 It will need to pursue this strategy while drawing a sharp distinction between
surveillance for national security purposes (in which all governments engage) and monitoring as a
means of political repression (which democracies oppose). This is not an easy task, but it is an important
one. More than a year after the first Snowden revelations emerged, now is the time to reenergize the
Internet freedom agenda.
Internet Freedom before Snowden The U.S. government’s explicit pursuit of Internet freedom began
during the Bush administration’s second term. Among other steps, the establishment of the State
Department’s Global Internet Freedom Task Force aimed to coordinate efforts to promote Internet
freedom and to respond to online censorship.5 Building on this foundation, Secretary of State Hillary
Rodham Clinton made the expansion of online rights a major focus of U.S. foreign policy in the first
Obama term. Speaking in 2010, she cited Franklin Delano Roosevelt’s Four Freedoms and added a fifth,
the “freedom to connect – the idea that governments should not prevent people from connecting to the
Internet, to websites or to each other.”6 A year later, she pledged America’s “global commitment to
Internet freedom, to protect human rights” – including the rights to expression, assembly and
association – “online as we do offline.”7 And after the Arab Spring, the United States in 2011 established
the Freedom Online Coalition, a collaboration of 23 countries to coordinate efforts to expand global
Internet freedom.8
The U.S. government has backed up its words with resources. Since 2009, the State Department and
other government agencies have spent more than $125 million on Internet freedom programming.9 In
addition to the State Department’s efforts, other government agencies, including the Broadcasting
Board of Governors, the U.S. Agency for International Development, the Defense Advanced Research
Projects Agency and others, fund the development and deployment of tools aimed at expanding
Internet freedom. These programs invest in technologies that allow users to circumvent firewalls so as
to access censored material, communicate outside the watchful eye of autocratic regimes, secure their
websites and data, link computers in decentralized mesh networks, and establish new Internet
connections when existing ones have been cut.10 It supplements the provision of technology with
training programs in dozens of countries.
The Obama administration also took regulatory steps to promote Internet freedom, particularly after
technology demonstrably facilitated the 2009 Green Revolution in Iran and the 2011 Arab Spring. The
Treasury Department relaxed restrictions on the export of Internet-related software and services to Iran,
explicitly to “foster and support the free flow of information to individual Iranian citizens.”11 Two years
later, the White House issued an executive order that imposed sanctions on individuals who engaged in
computer and network disruption, monitoring and tracking on behalf of the governments of Iran or
Syria.12
The United States has aimed to promote the free flow of online information through diplomatic action
as well. State Department diplomats pressure repressive regimes to loosen their Internet restrictions,
free imprisoned bloggers and ensure that citizens can express themselves online without fear of
punishment. U.S. government officials have engaged in significant dialogue with U.S. and multinational
technology companies about their involvement in aiding Internet repression and in establishing
transparency standards. American diplomats have also pressed for Internet freedom in the proliferating
international fora that have taken up the issue. In 2012, for instance, the United States won approval of
a U.N. Human Rights Council resolution affirming that freedom of expression and other rights that
people have offline must also be protected online.13 Trade agreements have provided yet another
vehicle for the U.S. Internet freedom agenda with, for example, hortatory language in the U.S.-Korea
Free Trade Agreement calling for the free flow of online information.14
A key element of U.S. action has been aimed at preventing fundamental changes to the
multistakeholder model of Internet governance, which brings together individuals, governments, civil
society organizations, private firms and others for transparent and consensus-based decisionmaking.15
One such challenge arose at the December 2012 World Conference on International
Telecommunications, when 89 countries – a majority of ITU members in attendance – supported an
attempt by Russia, China, Iran and others to give governments greater control over the Internet.16
Despite opposition from the United States and others, the session ended with 89 countries signing the
revised treaty; 55 other countries did not. As a sign of what may come in future international treaty
negotiations, such numbers did not favor the multistakeholder model, and this was so even before the
Snowden revelations emerged to complicate U.S. efforts.
The Snowden Fallout and the Internet Freedom Agenda
The dramatic revelations about NSA spying that began to emerge in June 2013 provoked a storm of
international reaction.17 Political leaders expressed outrage at American surveillance practices and
threatened a raft of retaliatory measures. President Dilma Rousseff of Brazil cancelled a planned state
visit to the United States and the Brazilian government later organized an international meeting
(NetMundial) to discuss the future of Internet governance.18 German Chancellor Angela Merkel was
deeply affronted by the alleged monitoring of her personal cellphone. Chinese and other officials
charged America with blatant hypocrisy. The fallout affected the private sector as well; where previously
the focus of many observers had been on the aid given by U.S. companies to foreign governments
engaged in Internet repression, the gaze shifted to the role American corporations play – wittingly or
not – in enabling U.S. surveillance. Countries that had been the target of American reproaches rebuked
the U.S. government for what they saw as hypocrisy.
The United Nations and other international venues became platforms for international criticism of the
United States. Germany and Brazil together sponsored a resolution adopted by the U.N. General
Assembly in late 2013 backing a “right to privacy” in the digital age.19 In June 2014, the U.N. High
Commissioner for Human Rights issued a report that endorsed digital privacy as a human right and
criticized mass surveillance as “a dangerous habit rather than an exceptional measure.”20 Some
European officials began to question the existing Internet governance model itself. In a statement, the
European Commission said, “Recent revelations of large-scale surveillance have called into question the
stewardship of the US when it comes to Internet Governance. So given the US-centric model of Internet
Governance currently in place, it is necessary to broker a smooth transition to a more global model.”21
Nongovernmental groups that might otherwise be partners with the U.S. government in promoting
Internet freedom reacted sharply as well. Reporters Without Borders, for instance, listed the NSA as an
“Enemy of the Internet” in its 2014 report on entities engaged in online repression. Drawing no
distinction between surveillance aimed at protecting national security and surveillance intended to
suppress free expression and political dissent, the organization declared the NSA “no better than [its]
Chinese, Russian, Iranian or Bahraini counterparts.”22 Mass surveillance methods used by democracies
like the United States, it added, are “all the more intolerable” as they “are already being used by
authoritarian countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own
violations of freedom of information.”23 Tim Berners-Lee, the inventor of the World Wide Web, said,
“Mass surveillance is the most immediate threat to the open Internet and the most insidious because
we can’t see it.”24 The Electronic Frontier Foundation asserted that “mass surveillance is inherently a
disproportionate measure that violates human rights,”25 and officials with Human Rights Watch
observed that the surveillance scandal would render it more difficult for the U.S. government to press
for better corporate practices and for companies to resist overly broad surveillance mandates. “Now,”
its chief researcher said, “the vision and credibility of the U.S. and its allies on Internet freedom is in
tatters.”26
The reactions to the Snowden disclosures threatened to go beyond verbal denunciations, diplomatic
protests and critical press. The most serious commercial fallout came in the rising support for data
localization requirements . Russia in July 2014 approved legislation that requires data operators to store
the personal data of its citizens within the country’s borders.27 Indonesia, Brazil and Vietnam have also
called for their citizens’ data held by companies such as Facebook to be stored domestically.28 Data
localization has been debated in the European Parliament and elsewhere on the continent as well.29
Apart from the chilling effect on innovation and the loss of business to America companies, Internet
freedom itself could become a casualty of such mandates. If a user’s data must be held within the
borders of a repressive country, its government will have new opportunities to censor, monitor and
disrupt online information flows.
Such moves, combined with increasing questions about the multistakeholder approach to Internet
governance (and possible support for a governmentdriven approach), together give rise to concerns
about the potential “Balkanization” of the Internet, in which a constellation of national-level systems
could take the place of the current global online infrastructure. As former NSA general counsel Stewart
Baker warned, “The Snowden disclosures are being used to renationalize the Internet and roll back
changes that have weakened government control of information.”30
This is evident in other proposed steps as well. Brazil and the European Union have announced plans for
an undersea cable that would route data transmissions directly between Europe and Latin America and
bypass the United States.31 The European Union threatened to suspend the Safe Harbor data-sharing
agreement with the United States and promulgated new rules for it that EU officials said stemmed
directly from worries after the Snowden disclosures.32
Data localization will end internet freedom and cause global democratic
rollbacks
Hill, 14 – Internet Policy at U.S. Department of Commerce (Jonah, “The Growth of Data Localization
Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business Leaders”, The Hague
Institute for Global Justice, Conference on the Future of Cyber Governance, 2014 , May 1, 2014,
SSRN)//TT
Free Expression and Internet Freedoms Are Not Well Served
Most troubling of all the potential harms of data localization is its effect on free expression and Internet
freedom. This is ironic, in that to many of its advocates, data localization is a remedy to the threat posed
by the NSA to free expression and Internet freedom. I suggest that the opposite is actually true, that the
“remedy” only serves to make the danger greater.
The Internet and other online media have become indispensable tools for individuals to communicate
globally, and have furthered individual participation in the political process, increased transparency of
governmental activities, and promoted fundamental rights. Data localization, by centralizing control
over digital infrastructure, can diminish this capacity in a number of ways. As was discussed above, data
localization as a local server or local data storage requirement can limit freedom by permitting countries
more easily to collect information on their citizens (through domestic surveillance). It allows a
government more quickly and effectively to shut down Internet services (usually via legal threats to local
Internet service providers) that the government believes is abetting unwanted political opposition. 115
Data localization mandates also can obstruct Internet freedom in other, indirect ways. Restricted
routing, in particular, is problematic, because it is not technically possible as the existing Internet is
designed or organized. Unlike the telephone network, the Internet operates under a model known as
“best effort delivery,” where data is delivered to its destination in the most efficient manner possible,
without predetermined routes. For instance, data sent from the United States to Botswana will attempt
to travel along the shortest and most direct route possible. However, if there is a bottleneck along the
shortest route, a packet may find a longer but more expeditious route. This is a core feature of the
Internet that makes network congestion easy to navigate around. In order to restrict data routing to
specific geographies as governments are advocating, all Internet routers that are currently programmed
to follow this “best effort” routing model would have to be reconfigured to prohibit data from one
country from moving through the territory of “prohibited” countries. Moreover, since Internet
addresses are not always assigned according to a specific geography, the Internet’s addressing system
currently would have to be dramatically altered as well. Thus, the Border Gateway Protocol (one of the
core Internet networking protocols), the Internet’s routing tables (the address books by which routers
send data), and the process by which IP addresses are allocated, would all have to be modified. Such an
undertaking would require a fundamental overhaul not only of the Internet’s operating structures, but
also of the governance structures by which those structures are implemented and standardized.
These are not just arcane concerns of those involved in Internet governance, although they surely are
matters that greatly trouble those who favor an efficient and interoperable Internet. These alterations in
the way the Internet works will, I believe, materially restrict the power of the Internet to support free
expression. These modifications to these core characteristic of the current Internet – modifications that
localization would require – may result in intelligence agencies acquiring a previously unavailable
capacity to assess where data had originated and where it was heading, because the origin and
destination information would be included in the data packet.116 A centralized governance process,
further, which would be required to change the routing protocols and IP allocation system, would give
authoritarian countries significantly more influence over how information on the Internet is regulated.
In fact, this is one of the main reasons why China, Russia, many Arab states (among others) have pushed
for tracked routing protocols in the past, 117 just as they have lobbied for a handover of the global
Internet governance system to the U.N.’s International Telecommunications Union. 118
In short, localization would require dramatic changes to the current structure of the Internet, changes
that would have adverse consequences for those who see it as a principal – if not the principal – means
of global democratization . For some, those adverse consequences would be unintended; more
chillingly, there are those who intend precisely those consequences. This would be an enormous price
to pay, particularly since the other objectives that are promoted as justifications for localization –
namely, security for communications and economic development – are illusory.
Democracy as spread by the global internet is vital to the emergence of global
publics – that’s the key to solving all existential impacts
Keane, 11 – Professor of Politics at the University of Sydney (John, “Democracy in the Age of Google,
Facebook and WikiLeaks” http://sydney.edu.au/arts/downloads/news/ALR.pdf)
Communicative abundance enables one other trend that is of life-and-death importance to the future
of democracy : the growth of cross-border publics whose footprint is potentially or actually global in
scope.
The Canadian Scholar Harold Innis famously showed that communications media like the wheel and the
printing press and the telegraph had distance-shrinking effects, but genuinely globalised communication
only began (during the nineteenth century) with overland and underwater telegraphy and the early
development of international news agencies like Reuters. The process is currently undergoing an
evolutionary jump, thanks to the development of a combination of forces: wide-footprint geo-stationary
satellites, weblogs and other specialist computer-networked media, the growth of global journalism and
the expanding and merging flows of international news, electronic data exchange, entertainment and
education materials controlled by giant firms like Thorn-EMI, AOL/Time-Warner, News Corporation
International, the BBC, Al Jazeera, Disney, Bertelsmann, Microsoft, Sony and CNN.
Global media linkages certainly have downsides for democracy. Global media integration has
encouraged loose talk of the abolition of barriers to communication (John Perry Barlow). It is said to be
synonymous with the rise of a ‘McWorld’ (Benjamin Barber) dominated by consumers who dance to the
music of logos, advertising slogans, sponsorship, trademarks and jingles. In the most media-saturated
societies, such as the United States, global media integration nurtures pockets of parochialism; citizens
who read local ‘content engine’ newspapers like The Desert Sun in Palm Springs or Cheyenne's Wyoming
Tribune-Eagle are fed a starvation diet of global stories, which typically occupy no more than about 2%
of column space. And not to be overlooked is the way governments distort global information flows.
Protected by what in Washington are called ‘flack packs’ and dissimulation experts, governments
cultivate links with trusted or ‘embedded’ journalists, organise press briefings and advertising
campaigns, so framing - and wilfully distorting and censoring - global events to suit current government
policies.
All these fickle counter-trends are sobering, but they are not the whole story. For in the age of
communicative abundance there are signs that the spell of parochialism upon citizens is not absolute
because global media integration is having an unanticipated political effect: by nurturing a world stage
or theatrum mundi, global journalism and other acts of communication are slowly but surely cultivating
public spheres in which many millions of people scattered across the earth witness mediated
controversies about who gets what, when, and how, on a world scale.
Not all global media events - sporting fixtures, blockbuster movies, media awards, for instance - sustain
global publics, which is to say that audiences are not publics and public spheres are not simply domains
of entertainment or play. Strictly speaking, global publics are scenes of the political. Within global
publics, people at various points on the earth witness the powers of governmental and nongovernmental organisations being publicly named, monitored, praised, challenged, and condemned, in
defiance of the old tyrannies of time and space and publicly unaccountable power. It is true that global
publics are neither strongly institutionalised nor effectively linked to mechanisms of representative
government. This lack is a great challenge for democratic thinking and democratic politics. Global publics
are voices without a coherent body politic; it is as if they try to show the world that it resembles a
chrysalis capable of hatching the butterfly of cross-border democracy - despite the fact that we currently
have no good account of what ‘regional’ or ‘global’ or ‘cross border’ democratic representation might
mean in practice.
Still, in spite of everything, global publics have marked political effects, for instance on the suit-and-tie
worlds of diplomacy, global business, inter-governmental meetings and independent non-governmental
organizations. Every great global issue since 1945 - human rights, the dangers of nuclear war ,
continuing discrimination against women, the greening of politics - every one of these issues first
crystallised within these publics. Global publics sometimes have ‘meta-political’ effects, in the sense that
they help create citizens of a new global order. The speech addressed to ‘global citizens’ by Barack
Obama at the Siegessaule in the Tiergarten in July 2008 is a powerful case in point, a harbinger of a
remarkable trend in which those who are caught up within global publics learn that the boundaries
between native and foreigner are blurred. They consequently become footloose. They live here and
there; they discover the ‘foreigner’ within themselves.
Global publics centred on ground-breaking media events like Live-Aid (in 1985 it attracted an estimated
one billion viewers) can be spaces of fun, in which millions taste something of the joy of acting publicly
with and against others for some defined common purpose. When by contrast they come in the form of
televised world news of the suffering of distant strangers, global publics highlight cruelty; they make
possible what Hannah Arendt once called the ‘politics of pity’. And especially during dramatic media
events - like the nuclear meltdown at Chernobyl, the Tiananmen massacre, the 1989 revolutions in
central-eastern Europe, the overthrow and arrest of Slobodan Milosevic, the 9/11 terrorist attacks and
the recent struggles for dignity in Tunisia and Egypt - public spheres intensify audiences’ shared sense of
living their lives contingently, on a knife edge, in the subjunctive tense.
The witnesses of such events (contrary to McLuhan) do not experience uninterrupted togetherness.
They do not enter a ‘global village’ dressed in the skins of humankind and thinking in the terms of a
primordial ‘village or tribal outlook’. They instead come to feel the pinch of the world’s power relations;
in consequence, they put matters like representation, accountability and legitimacy on the global
political agenda, in effect by asking whether new democratic measures could inch our little blue and
white planet towards greater openness and humility, potentially to the point where power, wherever it
is exercised within and across borders, would come to feel more ‘biodegradable’, a bit more responsive
to those whose lives it currently shapes and reshapes, secures or wrecks.
A free internet is vital to combating every existential threat
Eagleman, 10 - American neuroscientist and writer at Baylor College of Medicine, where he directs the
Laboratory for Perception and Action and the Initiative on Neuroscience and Law (David, “Six ways the
internet will save civilization” Wired, 9/10,
http://www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no
Many great civilisations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually
this results from: natural disasters, resource depletion, economic meltdown, disease, poor information
flow and corruption. But we’re luckier than our predecessors because we command a technology that
no one else possessed: a rapid communication network that finds its highest expression in the internet. I
propose that there are six ways in which the net has vastly reduced the threat of societal collapse.
Epidemics can be deflected by telepresence
One of our more dire prospects for collapse is an infectious-disease epidemic. Viral and bacterial
epidemics precipitated the fall of the Golden Age of Athens, the Roman Empire and most of the empires
of the Native Americans. The internet can be our key to survival because the ability to work
telepresently can inhibit microbial transmission by reducing human-to-human contact. In the face of an
otherwise devastating epidemic, businesses can keep supply chains running with the maximum number
of employees working from home. This can reduce host density below the tipping point required for an
epidemic. If we are well prepared when an epidemic arrives, we can fluidly shift into a self-quarantined
society in which microbes fail due to host scarcity. Whatever the social ills of isolation, they are worse
for the microbes than for us.
The internet will predict natural disasters
We are witnessing the downfall of slow central control in the media: news stories are increasingly
becoming user-generated nets of up-to-the-minute information. During the recent California wildfires,
locals went to the TV stations to learn whether their neighbourhoods were in danger. But the news
stations appeared most concerned with the fate of celebrity mansions, so Californians changed their
tack: they uploaded geotagged mobile-phone pictures, updated Facebook statuses and tweeted. The
balance tipped: the internet carried news about the fire more quickly and accurately than any news
station could. In this grass-roots, decentralised scheme, there were embedded reporters on every block,
and the news shockwave kept ahead of the fire. This head start could provide the extra hours that save
us. If the Pompeiians had had the internet in 79AD, they could have easily marched 10km to safety, well
ahead of the pyroclastic flow from Mount Vesuvius. If the Indian Ocean had the Pacific’s networked
tsunami-warning system, South-East Asia would look quite different today.
Discoveries are retained and shared
Historically, critical information has required constant rediscovery. Collections of learning -- from the
library at Alexandria to the entire Minoan civilisation -- have fallen to the bonfires of invaders or the
wrecking ball of natural disaster. Knowledge is hard won but easily lost. And information that survives
often does not spread. Consider smallpox inoculation: this was under way in India, China and Africa
centuries before it made its way to Europe. By the time the idea reached North America, native
civilisations who needed it had already collapsed. The net solved the problem. New discoveries catch on
immediately; information spreads widely. In this way, societies can optimally ratchet up, using the latest
bricks of knowledge in their fortification against risk.
Tyranny is mitigated
Censorship of ideas was a familiar spectre in the last century, with state-approved news outlets ruling
the press, airwaves and copying machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In
many cases, such as Lysenko’s agricultural despotism in the USSR, it directly contributed to the collapse
of the nation. Historically, a more successful strategy has been to confront free speech with free speech
-- and the internet allows this in a natural way. It democratises the flow of information by offering
access to the newspapers of the world, the photographers of every nation, the bloggers of every
political stripe. Some posts are full of doctoring and dishonesty whereas others strive for independence
and impartiality -- but all are available to us to sift through. Given the attempts by some governments to
build firewalls, it’s clear that this benefit of the net requires constant vigilance.
Human capital is vastly increased
Crowdsourcing brings people together to solve problems. Yet far fewer than one per cent of the world’s
population is involved. We need expand human capital. Most of the world not have access to the
education afforded a small minority. For every Albert Einstein, Yo-Yo Ma or Barack Obama who has
educational opportunities, uncountable others do not. This squandering of talent translates into
reduced economic output and a smaller pool of problem solvers. The net opens the gates education to
anyone with a computer. A motivated teen anywhere on the planet can walk through the world’s
knowledge -- from the webs of Wikipedia to the curriculum of MIT’s OpenCourseWare. The new human
capital will serve us well when we confront existential threats we’ve never imagined before.
Energy expenditure is reduced
Societal collapse can often be understood in terms of an energy budget: when energy spend outweighs
energy return, collapse ensues. This has taken the form of deforestation or soil erosion; currently, the
worry involves fossil-fuel depletion. The internet addresses the energy problem with a natural ease.
Consider the massive energy savings inherent in the shift from paper to electrons -- as seen in the
transition from the post to email. Ecommerce reduces the need to drive long distances to purchase
products. Delivery trucks are more eco-friendly than individuals driving around, not least because of
tight packaging and optimisation algorithms for driving routes. Of course, there are energy costs to the
banks of computers that underpin the internet -- but these costs are less than the wood, coal and oil
that would be expended for the same quantity of information flow.
The tangle of events that triggers societal collapse can be complex, and there are several threats the net
does not address. But vast, networked communication can be an antidote to several of the most deadly
diseases threatening civilisation. The next time your coworker laments internet addiction, the banality of
tweeting or the decline of face-to-face conversation, you may want to suggest that the net may just be
the technology that saves us.
Data localization will destroy global economic growth
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
C. Economic Development
Many governments believe that by forcing companies to localize data within national borders, they will
increase investment at home. Thus, data localization measures are often motivated, whether explicitly
or not, by desires to promote local economic development. In fact, however, data localization raises
costs for local businesses, reduces access to global services for consumers, hampers local start-ups, and
interferes with the use of the latest technological advances.
In an Information Age, the global flow of data has become the lifeblood of economies across the world.
While some in Europe have raised concerns about the transfer of data abroad, the European
Commission has recognized "the critical importance of data flows notably for the transatlantic
economy." n209 The Commission observes that international data transfers "form an integral part of
commercial exchanges across the Atlantic including for new growing digital businesses, such as social
media or cloud computing, with large amounts of data going from the EU to the US." n210 Worried
about the effect of constraints on data flows on both global information sharing and economic
development, the Organisation for Economic Co-operation and Development (OECD) has urged nations
to avoid "barriers to the location, access and use of cross-border [*722] data facilities and functions"
when consistent with other fundamental rights, in order to "ensure cost effectiveness and other
efficiencies." n211
The worry about the impact of data localization is widely shared in the business community as well. The
value of the Internet to national economies has been widely noted. n212 Regarding Brazil's attempt to
require data localization, the Information Technology Industry Council, an industry association
representing more than forty major Internet companies, had argued that "in-country data storage
requirements would detrimentally impact all economic activity that depends on data flows." n213 The
Swedish government agency, the National Board of Trade, recently interviewed fifteen local companies
of various sizes across sectors and concluded succinctly that "trade cannot happen without data being
moved from one location to another." n214
Data localization, like most protectionist measures, leads only to small gains for a few local enterprises
and workers, while causing significant harms spread across the entire economy . The domestic benefits
of data localization go to the few owners and employees of data centers and the few companies
servicing these centers locally. Meanwhile, the harms of data localization are widespread, felt by small,
medium, and large businesses that are denied access to global services that might improve productivity.
In response to Russia's recently passed localization law, the NGO Russian Association for Electronic
Communications stressed the potential economic consequences, pointing to the withdrawal of global
services and substantial economic losses caused by the passing of similar laws in other countries. n215
For example, besides the loss of international social media platforms, localization would make it
impossible for [*723] Russians to order airline tickets or consumer goods through online services.
Localization requirements also seriously affect Russian companies like Aeroflot because the airline
depends on foreign ticket-booking systems. n216
Critics worried, at the time, that the Brazilian data localization requirement would "deny[] Brazilian
users access to great services that are provided by US and other international companies." n217 Marilia
Marciel, a digital policy expert at Fundacao Getulio Vargas in Rio de Janeiro, observes, "Even Brazilian
companies prefer to host their data outside of Brazil." n218 Data localization affects domestic
innovation by denying entrepreneurs the ability to build on top of global services based abroad.
Brasscom, the Brazilian Association of Information Technology and Communication Companies, argues
that such obligations would "hurt[] the country's ability to create, innovate, create jobs and collect taxes
from the proper use of the Internet." n219
Governments implementing in-country data mandates imagine that the various global services used in
their country will now build infrastructure locally. Many services, however, will find it uneconomical and
even too risky to establish local servers in certain territories. n220 Data centers are expensive, all the
more so if they have the highest levels of security. One study finds Brazil to be the most expensive
country in the Western hemisphere in which to build data centers. n221 Building a data center in Brazil
costs $ 60.9 million on average, [*724] while building one in Chile and the United States costs $ 51.2
million and $ 43 million, respectively. n222 Operating such a data center remains expensive because of
enormous energy and other expenses - averaging $ 950,000 in Brazil, $ 710,000 in Chile, and $ 510,000
in the United States each month. n223 This cost discrepancy is mostly due to high electricity costs and
heavy import taxes on the equipment needed for the center. n224 Data centers employ few workers,
with energy making up three-quarters of the costs of operations. n225 According to the 2013 Data
Centre Risk Index - a study of thirty countries on the risks affecting successful data center operations Australia, Russia, China, Indonesia, India, and Brazil are among the riskiest countries for running data
centers. n226
Not only are there significant economic costs to data localization, the potential gains are more limited
than governments imagine. Data server farms are hardly significant generators of employment,
populated instead by thousands of computers and few human beings. The significant initial outlay they
require is largely in capital goods, the bulk of which is often imported into a country. The diesel
generators, cooling systems, servers, and power supply devices tend to be imported from global
suppliers. n227 Ironically, it is often American suppliers of servers and other hardware that stand to be
the beneficiaries of data localization mandates. n228 One study notes, "Brazilian suppliers of
components did not benefit from this [data localization requirement], since the imported products
dominate the market." n229 By increasing capital purchases from abroad, data localization
requirements can in fact increase merchandise trade deficits. Furthermore, large data farms are [*725]
enormous consumers of energy, n230 and thus often further burden overtaxed energy grids . They
thereby harm other industries that must now compete for this energy, paying higher prices while
potentially suffering limitations in supply of already scarce power.
Cost, as well as access to the latest innovations, drives many e-commerce enterprises in Indonesia to use
foreign data centers. Daniel Tumiwa, head of the Indonesian E-Commerce Association (IdEA), states that
"the cost can double easily in Indonesia." n231 Indonesia's Internet start-ups have accordingly often
turned to foreign countries such as Australia, Singapore, or the United States to host their services. One
report suggests that "many of the "tools' that start-up online media have relied on elsewhere are not
fully available yet in Indonesia." n232 The same report also suggests that a weak local hosting
infrastructure in Indonesia means that sites hosted locally experience delayed loading time. n233
Similarly, as the Vietnamese government attempts to foster entrepreneurship and innovation, n234
localization requirements effectively bar start-ups from utilizing cheap and powerful platforms abroad
and potentially handicap Vietnam from "joining in the technology race." n235
Governments worried about transferring data abroad at the same time hope, somewhat contradictorily,
to bring foreign data within their borders. Many countries seek to become leaders in providing data
centers for companies operating across their regions. In 2010, Malaysia announced its Economic
Transformation Program n236 to transform Malaysia into a world-class data [*726] center hub for the
Asia-Pacific region. n237 Brazil hopes to accomplish the same for Latin America, while France seeks to
stimulate its economy via a "Made in France" digital industry. n238 Instead of spurring local investment,
data localization can lead to the loss of investment. First, there's the retaliation effect. Would countries
send data to Brazil if Brazil declares that data is unsafe if sent abroad? Brasscom notes that the Brazilian
Internet industry's growth would be hampered if other countries engage in similar reactive policies,
which "can stimulate the migration of datacenters based here, or at least part of them, to other
countries." n239 Some in the European Union sympathize with this concern. European Commissioner for
the Digital Agenda, Neelie Kroes, has expressed similar doubts, worrying about the results for European
global competitiveness if each country has its own separate Internet. n240 Then there's the avoidance
effect. Rio de Janeiro State University Law Professor Ronaldo Lemos, who helped write the original
Marco Civil and is currently Director of the Rio Institute for Technology and Society, warns that the
localization provision would have caused foreign companies to avoid the country altogether: "It could
end up having the opposite effect to what is intended, and scare away companies that want to do
business in Brazil." n241 Indeed, such burdensome local laws often lead companies to launch overseas,
in order to try to avoid these rules entirely. Foreign companies, too, might well steer clear of the country
in order to avoid entanglement with cumbersome rules. For example, Yahoo!, while very popular in
Vietnam, places its servers for the [*727] country in Singapore. n242 In these ways we see that data
localization mandates can backfire entirely, leading to avoidance instead of investment.
Data localization requirements place burdens on domestic enterprises not faced by those operating in
more liberal jurisdictions. Countries that require data to be cordoned off complicate matters for their
own enterprises, which must turn to domestic services if they are to comply with the law. Such
companies must also develop mechanisms to segregate the data they hold by the nationality of the data
subject. The limitations may impede development of new, global services. Critics argue that South
Korea's ban on the export of mapping data, for example, impedes the development of next-generation
services in Korea: Technology services, such as Google Glass, driverless cars, and information programs
for visually-impaired users, are unlikely to develop and grow in Korea. Laws made in the 1960s are
preventing many venture enterprises from advancing to foreign markets via location/navigation
services. n243
The harms of data localization for local businesses are not restricted to Internet enterprises or to
consumers denied access to global services. As it turns out, most of the economic benefits from Internet
technologies accrue to traditional businesses. A McKinsey study estimates that about seventy-five
percent of the value added created by the Internet and data flow is in traditional industries, in part
through increases in productivity. n244 The potential economic impact across the major sectors healthcare, manufacturing, electricity, urban infra-structure, security, agriculture, retail, etc. - is
estimated at $ 2.7 to $ 6.2 trillion per year. n245 This is particularly important for emerging economies,
in which traditional industries remain predominant. The Internet raises profits as well, due to increased
revenues, lower costs of goods sold, and lower administrative costs. n246 With data localization
mandates, traditional businesses [*728] will lose access to the many global services that would store or
process information offshore.
Data localization requirements also interfere with the most important trends in computing today. They
limit access to the disruptive technologies of the future, such as cloud computing, the "Internet of
Things," and data-driven innovations (especially those relying on "big data"). Data localization sacrifices
the innovations made possible by building on top of global Internet platforms based on cloud
computing. This is particularly important for entrepreneurs operating in emerging economies that might
lack the infrastructure already developed elsewhere. And it places great impediments to the
development of both the Internet of Things and big data analytics, requiring costly separation of data by
political boundaries and often denying the possibility of aggregating data across borders. We discuss the
impacts on these trends below.
That causes World War 3
James, 14 - Professor of history at Princeton University’s Woodrow Wilson School who specializes in
European economic history (Harold, “Debate: Is 2014, like 1914, a prelude to world war?” 7/3,
http://www.theglobeandmail.com/globe-debate/read-and-vote-is-2014-like-1914-a-prelude-to-worldwar/article19325504/)
Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an economically
declining power, Britain, wanted to use finance as a weapon against its larger and faster growing
competitors, Germany and the United States. Now America is in turn obsessed by being overtaken by
China – according to some calculations, set to become the world’s largest economy in 2014.
In the aftermath of the 2008 financial crisis, financial institutions appear both as dangerous weapons of
mass destruction, but also as potential instruments for the application of national power.
In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a major
weakness, and required the provision of large swap lines by the Federal Reserve. The United States
provided that support to some countries, but not others, on the basis of an explicitly political logic, as
Eswar Prasad demonstrates in his new book on the “Dollar Trap.”
Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were
trying to acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much
reduced role in Asian trade finance. Chinese banks are being pushed to expand their role in global
commerce. After the financial crisis, China started to build up the renminbi as a major international
currency. Russia and China have just proposed to create a new credit rating agency to avoid what they
regard as the political bias of the existing (American-based) agencies.
The next stage in this logic is to think about how financial power can be directed to national advantage
in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the
pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more
powerfully applied to countries that are deeply embedded in the world economy.
The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President
Vladimir Putin’s calculation in response is that the European Union and the United States cannot
possibly be serious about the financial war. It would turn into a boomerang: Russia would be less
affected than the more developed and complex financial markets of Europe and America.
The threat of systemic disruption generates a new sort of uncertainty, one that mirrors the decisive
feature of the crisis of the summer of 1914. At that time, no one could really know whether clashes
would escalate or not. That feature contrasts remarkably with almost the entirety of the Cold War,
especially since the 1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt
that any superpower conflict would inevitably escalate.
The idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or
low cost. But it is inevitably a gamble, and raises prospect that others might, but also might not be able
to, mount the same sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice,
even though the game may be fatal.
1ac – technological leadership
Contention 2 – technological leadership
NSA surveillance is crushing U.S. cloud-computing – decks competitiveness and
spills over to the entire tech sector
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the
Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL
SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.15-18, 2015, Hein Online)//JJ
I. ECONOMIC IMPACT OF NSA PROGRAMS
The NSA programs, and public awareness of them, have had an immediate and detrimental impact on
the U.S. economy . They have cost U.S. companies billions of dollars in lost sales, even as companies
have seen their market shares decline . American multinational corporations have had to develop new
products and programs to offset the revelations and to build consumer confidence. At the same time,
foreign entities have seen revenues increase. Beyond the immediate impact, the revelation of the
programs, and the extent to which the NSA has penetrated foreign data flows, has undermined U.S.
trade agreement negotiations. It has spurred data localization efforts around the world, and it has raised
the spectre of the future role of the United States in Internet governance. Even if opportunistic, these
shifts signal an immediate and long-term impact of the NSA programs , and public knowledge about
them, on the U.S. economy .
A. Lost Revenues and Declining Market Share
Billions of dollars are on the line because of worldwide concern that the services provided by U.S.
information technology companies are neither secure nor private. Perhaps nowhere is this more
apparent than in cloud computing .
Previously, approximately 50% of the worldwide cloud computing revenues derived from the United
States. The domestic market thrived: between 2008 and 2014, it more than tripled in value. But within
weeks of the Snowden leaks, reports had emerged that U.S. companies such as Dropbox, Amazon Web
Services, and Microsoft's Azure were losing business. By December 2013, ten percent of the Cloud
Security Alliance had cancelled U.S. cloud services projects as a result of the Snowden information. In
January 2014 a survey of Canadian and British businesses found that one quarter of the respondents
were moving their data outside the United States .
The Information Technology and Innovation Foundation estimates that declining revenues of
corporations that focus on cloud computing and data storage alone could reach $35 billion over the next
three years. Other commentators, such as Forrester Research analyst James Staten, have put actual
losses as high as $180 billion by 2016, unless something is done to restore confidence in data held by
U.S. companies. The monetary impact of the NSA programs extends beyond cloud computing to the
high technology industry . Cisco, Qualcomm, IBM, Microsoft, and Hewlett-Packard have all reported
declining sales as a direct result of the NSA programs. Servint, a webhosting company based in Virginia,
reported in June 2014 that its international clients had dropped by 50 % since the leaks began. Also in
June, the German government announced that because of Verizon's complicity in the NSA program, it
would end its contract with the company, which had previously provided services to a number of
government departments. As a senior analyst at the Information Technology and Innovation Foundation
explained, "It's clear to every single tech company that this is affecting their bottom line. The European
commissioner for digital affairs, Neelie Kroes, predicts that the fallout for U.S. businesses in the EU alone
will amount to billions of Euros.
Not only are U.S. companies losing customers, but they have been forced to spend billions to add
encryption features to their services. IBM has invested more than a billion dollars to build data centers
in London, Hong Kong, Sydney, and elsewhere, in an effort to reassure consumers outside the United
States that their information is protected from U.S. government surveillance.26 Salesforce.com made a
similar announcement in March 2014.27 Google moved to encrypt terms entered into its browser.28 In
June 2014 it took the additional step of releasing the source code for End-to-End, its newly-developed
browser plugin that allows users to encrypt email prior to it being sent across the Internet.29 The
following month Microsoft announced Transport Layer Security for inbound and outbound email, and
Perfect Forward Secrecy encryption for access to OneDrive.30 Together with the establishment of a
Transparency Center, where foreign governments could review source code to assure themselves of the
integrity of Microsoft software, the company sought to put an end to both NSA back door surveillance
and doubt about the integrity of Microsoft products.3'
Foreign technology companies, in turn, are seeing revenues increase . Runbox, for instance, an email
service based in Norway and a direct competitor to Gmail and Yahoo, almost immediately made it
publicly clear that it does not comply with foreign court requests for its customers' personal
information. Its customer base increased 34% in the aftermath of the Snowden leaks. Mateo Meier, CEO
of Artmotion, Switzerland's biggest offshore data hosting company, reported that within the first month
of the leaks, the company saw a 45% rise in revenue. Because Switzerland is not a member of the EU,
the only way to access data in a Swiss data center is through an official court order demonstrating guilt
or liability; there are no exceptions for the United States. In April 2014, Brazil and the EU, which
previously used U.S. firms to supply undersea cables for transoceanic communications, decided to build
their own cables between Brazil and Portugal, using Spanish and Brazilian companies in the process.36
OpenText, Canada's largest software company, now guarantees customers that their data remains
outside the United States. Deutsche Telekom, a cloud computing provider, is similarly gaining more
customers. Numerous foreign companies are marketing their products as "NSA proof' or "safer
alternatives" to those offered by U.S. firms, gaining market share in the process.
The best and newest research confirms the link
Marthews and Tucker, 15 – * National Chair at Restore the Fourth AND **PhD in economics and
professor of Marketing at MIT (Alex and Catherine, “Government Surveillance and Internet Search
Behavior”, 29 April 2015, file:///C:/Users/17GGonzalez/Downloads/SSRN-id2412564%20(2).pdf)//gg
This study is the first to provide substantial empirical documentation of a chilling effect, both
domestically in the shorter term and internationally in the longer term, that appears to be related to
increased awareness of government surveillance online. Furthermore, this chilling effect appears in
countries other than the US to apply to search behavior that is not strictly related to the government but
instead forms part of the private domain.
Our findings have the following policy implications. From an economic perspective, our finding that
there was an effect on international Google users’ browsing behavior has potential policy implications
for the effects of government surveillance on international commerce. From a US competitive
standpoint, the longer-run effect observed on international Google users’ search behavior indicates
that knowledge of US government surveillance of Google could indeed affect their behavior . At the
most limited end of the spectrum, it could steer them away from conducting certain searches on US
search engines; at the most severe end of the spectrum, they might choose to use non-US search
engines. Such effects may not be limited simply to search engines. For example, as Google’s services are
embedded in a large array of products, it could potentially hinder sales of Android-enabled mobile
phones. Though preliminary attempts are being made to work towards initial measures of the economic
impact of surveillance revelations (Dinev et al., 2008), no systematic study yet exists. All we can do,
within the context of our data, is to indicate that on the basis of the effects we find, the strong
possibility of substantial economic effects exists, and to suggest that such potential adverse economic
impacts should be incorporated into the thinking of policy makers regarding the appropriateness of
mass surveillance programs.
There are limitations to the generalizability of our findings. First, we are not sure how the results
generalize outside of the search domain towards important tech industries such as the rapidly growing
US cloud computing industry. Second, we are not sure how the revelations affected search on Google’s
major competitors, such as Bing and Yahoo! Search. It may be that the effect on their services was
lessened by reduced media focus on them relative to Google in the light of the PRISM revelations and
potentially the extent to which users anticipated that their servers may be located outside of the US.
Third, our results are focused on the effects of revelations about government surveillance as opposed to
the direct effects of government surveillance per se. Notwithstanding these limitations, we believe that
our study provides an important first step in understanding the potential for effects of government
surveillance practices on commercial outcomes and international competitiveness.
That undermines US global technological leadership
Castro and McQuinn 15, Daniel Castro works at the Center for Data Innovation, Government
Technology, The Information Technology & Innovation Foundation, worked at the U.S. Government
Accountability Office, went to Carnegie Mellon. Alan McQuinn works at the Federal Communications
Commission, previously had the Bill Archer Fellowship at the University of Texas, (June 2015, “Beyond
the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness”,
file:///C:/Users/Mark/Downloads/2015-beyond-usa-freedom-act.pdf)//AK
CONCLUSION
When historians write about this period in U.S. history it could very well be that one of the themes will
be how the United States lost its global technology leadership to other nations. And clearly one of the
factors they would point to is the long-standing privileging of U.S. national security interests over U.S.
industrial and commercial interests when it comes to U.S. foreign policy.
This has occurred over the last few years as the U.S. government has done relatively little to address the
rising commercial challenge to U.S. technology companies, all the while putting intelligence gathering
first and foremost. Indeed, policy decisions by the U.S. intelligence community have reverberated
throughout the global economy . If the U.S. tech industry is to remain the leader in the global
marketplace, then the U.S. government will need to set a new course that balances economic interests
with national security interests. The cost of inaction is not only short-term economic losses for U.S.
companies, but a wave of protectionist policies that will systematically weaken U.S. technology
competiveness in years to come, with impacts on economic growth, jobs, trade balance, and national
security through a weakened industrial base. Only by taking decisive steps to reform its digital
surveillance activities will the U.S. government enable its tech industry to effectively compete in the
global market.
Tech leadership is the primary driver of hegemony –
Weiss 14 – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government
and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus
University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell
University Press, 4/1/14, p. 1-3)//JJ
*NSS=National Security State
So what accounts for America’s transformative capacity? Where do its breakthrough innovations come
from? My answer traces the relationship between high technology, national security, and political
culture. It advances three interlinked propositions regarding the role of the NSS as technology enterprise
and commercialization engine; its geopolitical drivers ; and the institutional consequences of an
antistatist constraint. The national security state as technology enterprise. First, America's capacity for
transformative innovation derives not merely from the entrepreneurship of its private sector, or simply
from the state as such, but from the national security state—a particular cluster of federal agencies that
collaborate closely with private actors in pursuit of security-related objectives. The NSS is a wholly new
postwar creation that is geared to the permanent mobilization of the nation's science and technology
resources for military primacy , and here I document and explain why it has had to become increasingly
involved in commercial undertakings. Although centered on defense preparedness, the NSS is a good
deal broader than the military, yet narrower than the state as a whole. In addition to its defense core in
the Department of Defense, the NSS comprises several other components created at the height of the
Cold War to pursue, deliver, or underwrite innovation in the service of securing technological
supremacy. Although some are designated as "civilian" in their ori- gins, evolution, and current mix of
activities, these NSS components remain deeply enmeshed in national security or dual-use functions (as
we shall see in chapter 2).4 Acting as commander in chief, the president sits at the peak of this complex,
supported by the Oval Office and, in particular, the Office of Science and Technology Policy. In sum, I
discuss NSS activities not in the more popular sense of a surveillance state, but as a national "technology
enterprise" in which the military is the central, but far from exclusive, actor. In telling this Story, I
demonstrate and account for a major shift in NS.S innovation programs and policies that involved the
national security agencies cultivating and undertaking commercialization ventures. (c. 1945 up to the
1970s), this process of fostering commercially relevant (general-purpose or dual-use) technologies took
both direct and indirect forms. Then (especially from the 1980s onward) it also took a more proactive
form, via patenting and licensing reforms and cooperative agreements to transfer technology from the
federal labs to the private sector, via the launching of new procurement and joint innovation initiatives,
and via the creation of new venture capital (VC) schemes. By placing greater emphasis on
commercialization opportunities, some of these incentives sought to sweeten collaboration with the
DOD and other security-related agencies, and thus to increase NISS influence over the direction of
technology. A significant problem for the NSS has been that since the late 1970s, it has become
progressively more challenging to enlist innovative companies in the private sector to work on securityrelated projects. While traditional defense suppliers grew increasingly large and specialized in systems
integration, by the 1970s the more innovative producer companies—above all, critical suppliers Of
integrated circuits—had begun to pull away from the federal market. Attracting nondefense firms to do
defense work was at one time easy because the government market (in semiconductors and computers,
for instance) was so much larger than the private market, and healthy profits could be made. But by the
mid- 1970s commercial markets had come into their own, leading firms to reorient production to suit
the more standardized demand. One consequence of lacking the earlier pull power Of massive demand
is that NISS agencies have had to create new incentives to foster private-sector collaboration. One of the
major incentives intended to reattract the private sector is the inclusion of commercial goals in NSS
technology policies. Commercial viability therefore has to stand alongside security and technological
supremacy in NSS policy. For instance, if a firm works with an agency to create a technology, service, or
prototype for use by the U.S. Army, it will also be encouraged from the outset of the project to create a
similar product for the commercial market. In this way, and many more, the NSS has progressively been
drawn into promoting commercial innovation for security reasons. One implication, demonstrated in
some detail, is that the NISS has achieved a much broader reach than commonly implied by the notion
Of a military-industrial complex. Geopolitical drivers. What are the drivers of the NSS technology
enterprise? Geopolitics and related threat perceptions have been the original catalyst for NSS
formation and its evolution as an innovation engine . This state- (and technology-) building dynamic has
occurred in three broad phases: the Cold War, the rise of Japan as techno-security challenge, and the
post-9/11 era of asymmetric threats. The NSS emerged and expanded in fits and starts after World War
II in response to a perceived international threat, emanating from the Soviet Union, that proved both
enduring and persistent. It is instructive to note that in this phase the NSS bears at least some
comparison with the erstwhile "developmental states" of Northeast Asia. They too emerged in response
to an intensely perceived security threat, from neighboring China and North Korea, but instead sought
national security more broadly via economic improvement, or industrial catch-up. Living on the fault
lines of the Cold War in the presence of a credible and unyielding security threat exerted an unusual
pressure on the East Asian states to pursue security by building economic strength. More distinctively in
the case of Japan, Peter Katzenstein has developed the argument that, against the backdrop of terrible
defeat, domestic power struggles succeeded in reorienting Japan's conception of security in favor Of
economic rather than military strength. Thus the Japanese state practices a form of "technological
national security" in order to ensure against its resource dependence and reduce its exposure to
international supply disruptions (Katzenstein 1996, 2005; also Samuels 1994). Fundamental motivations
drawn from different historical experiences thus serve to underline a unique feature of the NSS. In
contrast to Japan (and the East Asian developmental states more generally), America's national security
State has been geared to the pursuit of technological superior, not for reasons of national
independence, economic competitiveness, or resource dependency, but in order to maintain American
primacy . For the United States, the experience of World War Il drove home the point that science and
technology (S&T) was a game changer—the key to winning the war—and that future preparedness
would depend on achieving and sustaining technological superiority. Geopolitics is thus the driver, not
economics. I emphasize this point because many analysts have viewed the Pentagon as the source of an
industrial policy that is pursued beneath the radar6—a claim that this book disputes since it mistakes
the nature of the primary driver. From its inception, the NSS was tasked with ensuring the technology
leadership of the United States for the purpose of national defense. Even as the Soviet menace
retreated, security proved paramount as the U.S. confronted a newly resurgent Japan that threatened to
dethrone it as the regnant technology power. Appreciating the strength and intensity of the U.S. security
focus means never underestimating the significance of this point: as long as U.S. military strategy
continues to rely on a significant technology lead over its adversaries (real or potential), threats to that
lead can never be simply (or even primarily) a commercial matter—even when the NSS "goes
commercial.
Hegemonic decline causes great power wars
Zhang et al., Carnegie Endowment researcher, 2011
(Yuhan, “America’s decline: A harbinger of conflict and rivalry”, 1-22,
http://www.eastasiaforum.org/2011/01/22/americas-decline-a-harbinger-of-conflict-and-rivalry/, ldg)
This does not necessarily mean that the US is in systemic decline, but it encompasses a trend that appears to be negative and perhaps alarming. Although the US
still possesses incomparable military prowess and its economy remains the world’s largest, the once seemingly indomitable chasm that separated America from
anyone else is narrowing. Thus, the
global distribution of power is shifting, and the inevitable result will be a world
that is less peaceful, liberal and prosperous, burdened by a dearth of effective conflict regulation. Over
the past two decades, no other state has had the ability to seriously challenge the US military. Under
these circumstances, motivated by both opportunity and fear, many actors have bandwagoned with US
hegemony and accepted a subordinate role. Canada, most of Western Europe, India, Japan, South Korea, Australia, Singapore and the
Philippines have all joined the US, creating a status quo that has tended to mute great power conflicts. However, as the hegemony that drew
these powers together withers, so will the pulling power behind the US alliance. The result will be an
international order where power is more diffuse, American interests and influence can be more readily challenged, and conflicts
or wars may be harder to avoid. As history attests, power decline and redistribution result in military
confrontation. For example, in the late 19th century America’s emergence as a regional power saw it launch its first overseas war of conquest towards
Spain. By the turn of the 20th century, accompanying the increase in US power and waning of British power, the American Navy had begun to challenge the notion
that Britain ‘rules the waves.’ Such a notion would eventually see the US attain the status of sole guardians of the Western Hemisphere’s security to become the
order-creating Leviathan shaping the international system with democracy and rule of law. Defining this US-centred system are three key characteristics:
enforcement of property rights, constraints on the actions of powerful individuals and groups and some degree of equal opportunities for broad segments of
society. As
a result of such political stability, free markets, liberal trade and flexible financial mechanisms
have appeared. And, with this, many countries have sought opportunities to enter this system,
proliferating stable and cooperative relations. However, what will happen to these advances as America’s influence declines? Given that
America’s authority, although sullied at times, has benefited people across much of Latin America, Central and Eastern Europe, the Balkans, as well as parts of Africa
and, quite extensively, Asia, the answer to this question could affect global society in a profoundly detrimental way. Public
imagination and
academia have anticipated that a post-hegemonic world would return to the problems of the 1930s:
regional blocs, trade conflicts and strategic rivalry. Furthermore, multilateral institutions such as the
IMF, the World Bank or the WTO might give way to regional organisations. For example, Europe and East
Asia would each step forward to fill the vacuum left by Washington’s withering leadership to pursue their own visions of regional political
and economic orders. Free markets would become more politicised — and, well, less free — and major powers
would compete for supremacy. Additionally, such power plays have historically possessed a zero-sum
element. In the late 1960s and 1970s, US economic power declined relative to the rise of the Japanese and Western European economies, with the US dollar
also becoming less attractive. And, as American power eroded, so did international regimes (such as the Bretton Woods System in 1973). A world without
American hegemony is one where great power wars re-emerge, the liberal international system is
supplanted by an authoritarian one, and trade protectionism devolves into restrictive, anti-globalisation
barriers. This, at least, is one possibility we can forecast in a future that will inevitably be devoid of unrivalled US primacy.
Cloud computing is key to effective space situational awareness – prevents
space debris collisions with satellites
Johnston et al 13 – Ph.D. with the Computational Engineering and Design Group (CED) at the University
of Southampton, MEng degree in Software Engineering from the School of Electronics and Computer
Science, Senior Research Fellow for the Faculty of Engineering and the Environment at University of
Southampton (Steven, Neil O’Brien – Senior Technical Recruiter at Colloco Search, Hugh Lewis –
Astronautics Research Group at the University of Southampton, PhD, Elizabeth Hart – School of
Engineering Science at Southampton University, Adam White – School of Engineering Science at
Southampton University, Simon Cox – professor of Computational Methods and Director of the
Microsoft Institute for High Performance Computing, PhD, Clouds in Space: Scientific Computing using
Windows Azure, Journal of Cloud Computing, 2013,
http://www.journalofcloudcomputing.com/content/pdf/2192-113X-2-2.pdf)//JJ
Space situational awareness
Within the last two decades, the downstream services pro- vided by space-based assets have become a
ubiquitous component of everyday life within the European Union and internationally, from satellite
television and navigation to environmental monitoring. The European Space Agency (ESA) and European
national space agencies currently rely on information from outside sources to form an awareness of
these assets and the environment in which they operate. In the near future, this awareness will be
provided by a European space situational awareness (SSA ) system, which will provide “ a
comprehensive knowledge, understanding and maintained awareness of the population of space
objects, the space environment, and the existing threats and risks ”(User Expert Group of ESA SSA
requirement study, 2007).
Through its SSA Programme (and its Preparatory Programme), ESA aims to provide key services and
information regarding the space environment. The SSA system will comprise three main segments: 1.
Space surveillance and tracking (SST) of man-made space objects, 2. Space weather (SWE) monitoring
and forecasting, 3. Near-Earth object (NEO) surveillance and tracking .
The provision of timely, high quality data via the space surveillance and tracking segment is required to
maintain an awareness of operational space assets as well as the population of debris objects in Earth
orbit . This awareness provides key knowledge that supports space missions and includes the detection
of conjunction events, the detection and characterization of in-orbit fragmentations and the re-entry of
risk objects. In addition, knowledge of overall space traffic is required to understand the evolution of the
space (debris) environment and to support space debris mitigation and remediation activities.
Space debris represents a significant risk to satellite operations , particularly in the low Earth orbit
(LEO) region. Approximately 19,000 objects larger than 10 cm are known to exist, with around 500,000
larger than 1 cm. The number of smaller particles likely exceeds tens of millions [1]. Conjunctions
between satellite pay- loads and other catalogued objects occur at an average rate of 2,400 per day,
with operators having to perform collision avoidance maneuvers in cases where the risk cannot be
reduced to an acceptable level by dedicated tracking campaigns [2]. Whilst mitigation guidelines have
been adopted and measures implemented by space-faring nations, predictions made by computer
models of the space debris environment indicate that the population of orbiting objects will continue to
grow even in the absence of future space launches [3]. The remediation of the near- Earth space
environment is now widely accepted as a requirement for the long-term, sustainable use of this vital
resource. A reliable and robust SSA infrastructure will be essential for the development and operation
of any remediation technology.
The computational and data-intensive challenges presented by the requirements of a SSA system can be
met using a cloud-based computational approach . In this work, we establish the applicability of a
cloud-based architecture for space surveillance and tracking, algorithm development and comparison.
Debris collisions decks satellites – extinction
Moore 9 – Professor of Economics and International Affairs, M.S. and Ph.D. in economics from the
University of Wisconsin-Madison (Mike, Space Debris: From Nuisance to Nightmare, Foreign Policy,
2/12/9, http://foreignpolicy.com/2009/02/12/space-debris-from-nuisance-to-nightmare/)//JJ
When satellites collide in space, should ordinary people be worried? Here's a scenario for global doom
that should have your hair standing on end. News reports on Feb. 12 that two satellites had collided
some 491 miles above the Earth were compelling. There was a whiff of Cold War intrigue about them. A
defunct Russian communications relay satellite and an American commercial satellite had met abruptly
in space with a closing speed of more than 22,000 miles per hour. They were shattered into many
hundreds of pieces, creating an ever expanding debris cloud. In turn, that cloud threatened the satellites
of other countries in similar orbits. And yet, no one was harmed. Space is a big place, isn’t it? The
reports noted that there were already thousands of pieces of space junk large enough to be tracked and
catalogued. Nonetheless, no one has ever been harmed by a bit of space garbage. At the moment, the
amount of debris in low-earth orbit — the region of space that extends a few hundred miles above the
atmosphere — is merely a nuisance. The United States tracks objects in space and shares the data with
the world. Satellite handlers based in many countries use the data to slightly alter the course of their
birds if a collision seems possible. End of story? Not quite. Orbital space is a natural resource, as surely
as land, air, and water. It must be protected because it is home to nearly a thousand satellites put up by
many countries — communications, geo-observation, geopositioning, weather, and other kinds of
satellites. Globalization would not be possible without commercial satellites. Further, the United States’
military-related birds permit the country to conduct precision war . For the first time in history,
satellites provide the data and the guidance necessary to enable bombs and missiles to actually hit the
targets they are fired at. That’s a moral plus. If a war must be fought, it should be prosecuted in such a
way that military targets are hit and civilians spared to the greatest extent possible. No other country
can fight a conventional war as cleanly and humanely as the United States. Satellites make the
difference. Because of the importance of satellites to the American way of war, the United States insists
that it must achieve the capability to militarily dominate space in a time of conflict. It is the only country
that claims that right. Space, says international law on the other hand, is the common heritage of
humankind and must be devoted to peaceful purposes. America’s truculent space-dominance language
annoys many of its friends and allies. Meanwhile, some major powers — particularly China and Russia —
think it smells of imperialism. A country that could control space in a time of conflict might also exercise
that control in a time of peace. Since 1981, virtually every country save the United States and Israel has
gone on record in the U.N. General Assembly as favoring a treaty that would prevent an arms race in
space. Every year, the United States — under presidents Ronald Reagan, George H.W. Bush, Bill Clinton,
and George W. Bush — has used its veto power at the Conference on Disarmament in Geneva to
prevent serious talks. No one, including the United States, is likely to have actual weapons in space in
the foreseeable future. Space control does not require such weapons. Ground-based, sea-based, and
even air-based antisatellite weapons (ASATs) can do the trick. The United States has long been working
on a variety of highly sophisticated ASAT programs — indeed, the infrastructure for missile defense is
the sort of infrastructure needed for ASAT systems. When a country builds ever greater military
capabilities, potential rivals react. China, in particular, is wary of the coercive possibilities of U.S. military
power. The Middle Kingdom says it wants a space treaty, but in January 2007, it tested its own
somewhat primitive ASAT — a kinetic-kill device that roughly replicated a test the United States carried
out in 1985. Is a space-related arms race under way? Yes. But there is still time to ratchet it down, and
the Obama administration has signaled that it might do so. That will be difficult, though. Exceptionalism
is a major driver of foreign policy, and influential people and hard-line think tanks are comfortable with
the idea that full-spectrum dominance in all things military is America’s right. A nightmare scenario: The
United States continues to work on its defensive ASAT systems. China and Russia do the same to counter
U.S. capabilities. India and Japan put together their own individual systems. Ditto for Pakistan, if it
survives as a coherent country. Israel follows suit, as does Iran. In a time of high tension, someone
preemptively smashes spy satellites in low-earth orbits, creating tens of thousands of metal chunks and
shards. Debris-tracking systems are overwhelmed, and low-earth orbits become so cluttered with metal
that new satellites cannot be safely launched. Satellites already in orbit die of old age or are killed by
debris strikes . The global economy , which is greatly dependent on a variety of assets in space,
collapses . The countries of the world head back to a 1950s-style way of life, but there are billions more
people on the planet than in the 50s. That’s a recipe for malnutrition , starvation , and wars for
resources . The United States, by far the world’s most-advanced space power, must take the lead in
Geneva and engage in good-faith talks. If not, the space-is-ruined scenario could become reality.
702 mechanism
1ac – plan – 702
Version 1 The United States federal government should limit domestic surveillance for foreign intelligence
purposes of American corporations exclusively to authority under section 702 of the FISA Amendments
Act.
Version 2 The United States federal government should substantially curtail its surveillance of information in the
custody of American corporations by exclusively limiting surveillance to investigations carried out under
section 702 of the FISA Amendments Act.
1ac – solvency
Contention 3 – Solvency
The plan’s curtailment of surveillance of U.S. companies to exclusive section 702
authority is vital to restoring domestic and international trust in surveillance
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a
center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy,
and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as
as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring
Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues
Fixing the Problem Means Changing the Existing Legal Framework
Currently, the U.S. collects electronic communications under four main authorities.
For collection occurring under both 215 and 702, the companies would have been served with an order
compelling production of their data. But outside the U.S., Executive Order 12333,15 the long-standing
guidance for foreign intelligence activities, would govern the kind of collection that has caused
international outrage.
E.O. 12333, signed by President Reagan, set the ground rules and authorization for foreign intelligence
collection when the nation’s primary security threat was the Soviet Union. At that time, traditional
intelligence activities would have been focused on other nation-states—identifying their spies, trying to
recruit spies for the U.S., and trying to steal other countries’ secrets while protecting our own. But the
growth of terrorist groups’ capabilities, and particularly the 9/11 attacks, helped dissolve the separation
between traditional overseas espionage and counter-terrorism.
As the nation was grappling with new threats posed by terrorism, people around the world were sharing
more and more of their information online and using mostly American companies to do so. Yet the legal
framework that had once recognized privacy rights was ill-suited to the Internet Age. The Intelligence
Community’s traditional position that constitutional rights like the Fourth Amendment’s privacy
protections didn’t apply to non-Americans outside the U.S. might have been clear when travelling and
communicating internationally were more difficult. But today’s free-flowing movement of people and
data means that the “nationality” of an individual’s communications is far less obvious.16
While extending constitutional or privacy protections to foreigners abroad is a tricky legal proposition,
for many their data is being held by entities that are entitled to the due process and privacy protections
of the U.S. Constitution: American companies. Our tech firms often act as custodians of other people’s
data, and as such don’t have the same heightened privacy interests as the targets of that data. But
accessing the companies’ data without even giving notice to the owner of the servers raises serious
constitutional questions.
As a politician once famously noted, “corporations are people too.”17 As a legal (if not political) matter,
he was right— these American tech companies are “U.S. Persons ,” and they therefore should know
when the government seeks to access the data they possess. The companies should be entitled to
notice, especially since they can be compelled to cooperate with law enforcement requests to hand over
user data. Those protections should hold true regardless of whether the user data sought by the U.S.
government is that of Americans or non-Americans.
In addition to those privacy protections that all U.S. persons enjoy under the Constitution, both at home
and abroad, surveillance reform should meet the following principles when dealing with information
about or from Americans:
 The U.S. government should have a process, consistent with the Constitution, to acquire from
companies the information that it needs to secure the country.
 The U.S. government should have a national security reason to collect the information that it
requests.
 U.S. companies should not have to fear unauthorized access to their data or products from their
own government.
 Any process to acquire information from U.S. companies should have safeguards to prevent
misuse or intentional over-collection.
The Solution
Include Overseas Collection from American Companies in Existing Statutory Frameworks
In order to meet the principles above, we propose that FAA’s 702 framework be the exclusive means
for conducting electronic surveillance when the information is in the custody of an American company
(“FAA Exclusivity”). Section 702 of FAA provides procedures to authorize data collection of foreign
targets reasonably believed to be outside the U.S. It empowers the Attorney General (AG) and Director
of National Intelligence (DNI) to jointly certify a high volume of targeting and does not require the
requesters to identify specific non-U.S. persons who will be targeted. Under this 702 framework,
information on foreigners that’s in the custody of a U.S. company should be subject to the following
rules:
1. The data must relate to targets “reasonably believed” to be outside the U.S. (can include foreign
persons, governments or their factions and similar entities).
2. The AG and DNI must jointly submit annual “certifications” to the Foreign Intelligence Surveillance
Court (FISC).
3. Certifications must identify categories of foreign intelligence targets that the Government wants to
surveil electronically; they do not need to identify specific persons to be targeted.
4. Certifications may include information or representations from other federal agencies authorized to
cooperate with the AG, DNI, or Director of the NSA.
5. Certifications must be reviewed by the FISC, which can authorize the targeting if they deem that the
statutory requirements have been met.
6. After the certifications are approved, the AG and DNI issue (written) “directives” to the providers,
ordering them to assist the government.
7. Collection should be executed with the appropriate “minimization procedures” in place to limit the
acquisition, retention, and dissemination of any non–publicly available U.S. person information
acquired through the Section 702 program.
8. The AG, in consultation with the DNI, must adopt FISC-approved targeting and minimization
procedures that are “reasonably designed” to ensure that the Government does not collect wholly
domestic communications , and that only persons outside the U.S. are surveilled .
9. The AG and DNI must also create acquisition guidelines (which are not subject to FISC approval).
Advantages of an FAA Framework
Shifting the legal authority for collection of data in the custody of an American company from E.O.
12333 to an FAA framework would have a number of advantages. Most importantly, it would create a
way for the government to get the data it needs from American companies while giving those firms
assurances that their data would not be accessed in other unauthorized ways. In particular, the FAA
framework would create specific purposes for which the information could be sought, rather than allow
the indiscriminate scooping up of every aspect of a person’s communications. FAA’s stated purpose is to
acquire foreign intelligence information, which it defines as "information that relates to the ability of the
U.S. to protect against an actual or potential attack by a foreign power; sabotage, international
terrorism, or the proliferation of weapons of mass destruction by a foreign power; or clandestine
intelligence activities by a foreign power."
The FAA framework would also create a requirement that the Executive Branch explain how the
information sought meets the statutory purposes. And there would be the additional check of an
independent judge who would review the certifications and issue directives. Though this process is ex
parte, and therefore a potential rubber stamp for the government, there have been no documented
instances of intentional abuses of the system in seeking information beyond the statutory purposes.
Finally, the FAA framework would subject information sought from U.S. companies to the statutory
oversight requirements of the law. These are extensive and explicit.18
In addition to FAA’s inherent protections, FAA Exclusivity would send a powerful message to the rest of
the world : when the U.S. conducts electronic surveillance overseas from American companies, it is
doing so for a particular national security purpose. The FAA structure with FISC review provides an
independent check that the statutory purposes are met. Through transparency agreements with the
government, the American companies would be able to provide their customers with some sense of
how many requests are made.
FAA Exclusivity would not change the E.O. 12333 authorities with respect to non-U.S. companies. It
would not change E.O. 12333 authorities when the Executive Branch seeks to obtain the information in
some way other than through a U.S. company that holds the data (i.e. traditional espionage, like
breaking into a target’s laptop, parking a surveillance van outside their house, or sending a spy, would
still be permissible).
Of course, FAA Exclusivity wouldn’t solve every problem. It would not prevent foreign governments from
collecting information themselves and then providing it to U.S. intelligence agencies, as U.S. law cannot
bind a foreign government. And some may argue that FAA provides inadequate civil liberties protections
for Americans. This proposal says nothing about the adequacy of that statute in this respect. What it
says is that for data held by an American company about a target that is not a U.S. person, the checks
within FAA are stronger than those solely under E.O. 12333.
Others have argued that the FAA shifts the burden of cooperation solely onto the company, which will
suffer greater reputational harm as a more witting participant in affirmatively granting the government’s
requests. However, companies have suffered reputational harm as a result of allegations of unwitting
cooperation. Making the cooperation known, even if it’s secret, gives the companies the opportunity to
account for it in their own planning.
The move by certain U.S. companies to place subsidiaries in foreign ownership to resist requests by the
U.S. government presents an interesting twist on this idea. In shifting the balance back to increased
protections for U.S. companies, this legislation would change the incentives so that claiming U.S. law
would have operational advantages in giving companies uniformity of law for all their data. This would
also encourage the use of a single choice of law for all data governed by a company—that of the
nationality of incorporation—rather than encouraging a choice of law patchwork to govern the data as it
flows around the world.
Finally, some foreign multinational companies operating in the U.S. and abroad may argue that this is
inconsistent with principles that we treat all companies operating in the U.S. the same way for purposes
of law. While that would remain true under this proposal, it would create a difference in how the U.S.
treats U.S. companies operating abroad compared to how it treats foreign companies abroad. But
stretching the U.S. Constitution to foreign companies abroad is to stretch the document too far. If, on
the other hand, those companies see advantage in changing their nationality to U.S. in order to claim
protections of those laws, then that is the corporate version of the kind of immigration patterns that
America has seen since its founding.
Conclusion
Using FAA’s framework as the exclusive means to access data that U.S. companies are holding will give
the Intelligence Community a statutory framework to be able to get the intelligence information that it
needs to protect the nation while restoring the trust relationship between the companies and our
government. In addition, it will help restore the faith of foreign governments and customers that when
American companies are acting overseas, they bring with them American values, including those of
privacy protections.
Limiting the use of surveillance on US-based servers to national security
interests and increasing transparency regarding surveillance is vital to restoring
trust and US credibility
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
The NSA mass surveillance programs described in the introduction, conducted domestically pursuant to
USA PATRIOT Act Section 215 and FISA Amendments Act Section 702 and conducted outside the U.S.
under Executive Order 12333, have arguably had the greatest and most immediate impact on America’s
tech industry and global standing. Strictly limiting the scope and purpose of surveillance under these
authorities—not just in regard to surveillance of Americans but of non-Americans as well —will be
critical to regaining the trust of individuals, companies and countries around the world, as well as
stemming the economic and political costs of the NSA programs.
The President’s NSA Review Group acknowledged the need for such reform in its report on surveillance
programs, affirming that “the right of privacy has been recognized as a basic human right that all nations
should respect,” and cautioned that “unrestrained American surveillance of non-United States persons
might alienate other nations, fracture the unity of the Internet, and undermine the free flow of
information across national boundaries.”324 In addition to recommending a variety new protections for
U.S. persons, the Review Group urged in its Recommendation 13 that surveillance of non-U.S. persons
under Section 702 or “any other authority”—a reference intended to include Executive Order 12333325
— should be strictly limited to the purpose of protecting national security, should not be used for
economic espionage, should not be targeted based solely on a person’s political or religious views, and
should be subject to careful oversight and the highest degree of transparency possible.326 Fully
implementing this recommendation—and particularly restricting Section 702 and Executive Order 12333
surveillance to specific national security purposes rather than foreign intelligence collection generally—
would indicate significant progress toward addressing the concerns raised in the recent Report of the
Office of the United Nations High Commissioner for Human Rights on “The Right to Privacy in the Digital
Age.” The UN report highlights how, despite the universality of human rights, the common distinction
between “‘foreigners’ and ‘citizens’…within national security surveillance oversight regimes” has
resulted in “significantly weaker – or even non-existent – privacy protection for foreigners and noncitizens, as compared with those of citizens.”327
The leading legislative reform proposal in the U.S. Congress, the USA FREEDOM Act, would go a long way
to protecting both U.S. and non-U.S. persons against the bulk collection under Section 215 of records
held by American telephone and Internet companies.328 On that basis, passage of the law would very
much help address the trust gap that the NSA programs have created. However, with regard to Section
702, the bill as originally introduced only added new protections for U.S. persons or for wholly domestic
communications,329 and even those protections were stripped out or weakened in the version of the
bill that was passed by the House of Representatives in May 2014.330 Meanwhile, neither the bill as
introduced nor as passed by the House addresses surveillance conducted extraterritorially under
Executive or 12333. Therefore, even if USA FREEDOM is eventually approved by both the House and the
Senate and signed into law by the President, much more will ultimately need to be done to reassure
foreign users of U.S.-based communications networks, services, and products that their rights are being
respected.
Provide for increased transparency around government surveillance, both from the government and
companies.
Increased transparency about how the NSA is using its authorities, and how U.S. companies do—or do
not—respond when the NSA demands their data is critical to rebuilding the trust that has been lost in
the wake of the Snowden disclosures. In July 2013, a coalition of large Internet companies and advocacy
groups provided a blueprint for the necessary transparency reforms, in a letter to the Obama
Administration and Congress calling for “greater transparency around national security-related requests
by the US government to Internet, telephone, and web-based service providers for information about
their users and subscribers.”331 Major companies including Facebook, Google, and Microsoft—joined
by organizations such as the Center for Democracy and Technology, New America’s Open Technology
Institute, and the American Civil Liberties Union—demanded that the companies be allowed to publish
aggregate numbers about the specific types of government requests they receive, the types of data
requested, and the number of people affected. They also also urged the government to issue its own
transparency reports to provide greater clarity about the scope of the NSA’s surveillance programs.332
“This information about how and how often the government is using these legal authorities is important
to the American people, who are entitled to have an informed public debate about the appropriateness
of those authorities and their use, and to international users of US-based service providers who are
concerned about the privacy and security of their communications,” the letter stated.333
Two months later, many of the same companies and organizations issued another letter supporting
surveillance transparency legislation proposed by Senator Al Franken (D-MN) and Representative Zoe
Lofgren (D-CA) that would have implemented many of the original letter’s recommendations.334
Elements of both bills, consistent with the coalition’s recommendations, were included in the original
version of the USA FREEDOM Act introduced in the House and the Senate—as were new strong
transparency provisions requiring the FISA court to declassify key legal opinions to better educate the
public and policymakers about how it is interpreting and implementing the law. Such strong new
transparency requirements are consistent with several recommendations of the President’s Review
Group335 and would help address concerns about lack of transparency raised by the UN High
Commissioner for Human Rights.336
Unfortunately, all of these transparency provisions from the original USA FREEDOM Act were
substantially weakened in the version of the bill that was passed by the House of Representatives in May
2014.337 Congress will need to include stronger transparency provisions in any final version of the USA
FREEDOM Act if it intends to meaningfully restore trust in the U.S. Internet and telecommunications
industries and stem the loss of business that has begun as a result of the NSA programs. As
commentator Mieke Eoyang put it, “If reforms do not deliver sufficient protections and transparency for
[tech companies’] customers, especially those abroad who have the least constitutional protections,
they will vote with their feet.”338
Recommit to the Internet Freedom agenda in a way that directly addresses issues raised by NSA
surveillance, including moving toward international human-rights based standards on surveillance.
The United States must act immediately to restore the credibility of the Internet Freedom agenda, lest it
become another casualty of the NSA’s surveillance programs. As described in Part IV, various agencies
within the U.S. government have taken initial steps to demonstrate goodwill in this area, particularly
through the NTIA’s announcement that it intends to transition stewardship of the IANA functions to a
global multistakeholder organization and the State Department’s speech outlining six principles to guide
signals intelligence collection grounded in international human rights norms. However, it will take a
broader effort from across the government to demonstrate that the United States is fully committed to
Internet Freedom, including firmly establishing the nature of its support for the evolving
multistakeholder system of Internet governance and directly engaging with issues raised by the NSA
surveillance programs in international conversations.
Supporting international norms that increase confidence in the security of online communications and
respect for the rights of Internet users all around the world is integral to restoring U.S. credibility in this
area. “We have surveillance programmes that abuse human rights and lack in transparency and
accountability precisely because we do not have sufficiently robust, open, and inclusive debates around
surveillance and national security policy,” writes Matthew Shears of the Center for Democracy &
Technology.339 It is time to begin having those conversations on both a national and an international
level, particularly at key upcoming Internet governance convenings including the 2014 Internet
Governance Forum, the International Telecommunications Union’s plenipotentiary meeting, and the
upcoming WSIS+10 review process.340 Certainly, the United States will not be able to continue
promoting the Internet Freedom agenda at these meetings without addressing its national security
apparatus and the impact of NSA surveillance on individuals around the world. Rather than being a
problem, this presents an opportunity for the U.S. to assume a leadership role in the promotion of
better international standards around surveillance practices.
2ac - AT: Companies suffer reputational costs
FAA exclusivity on balance protects companies from reputational consequences
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a
center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy,
and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as
as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring
Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues
Others have argued that the FAA shifts the burden of cooperation solely onto the company, which will
suffer greater reputational harm as a more witting participant in affirmatively granting the government’s
requests. However, companies have suffered reputational harm as a result of allegations of unwitting
cooperation. Making the cooperation known, even if it’s secret, gives the companies the opportunity to
account for it in their own planning.
2ac - AT: Foreign servers
Plan reverses incentives for companies to shift to foreign subsidiaries
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a
center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy,
and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as
as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring
Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues
The move by certain U.S. companies to place subsidiaries in foreign ownership to resist requests by the
U.S. government presents an interesting twist on this idea. In shifting the balance back to increased
protections for U.S. companies, this legislation would change the incentives so that claiming U.S. law
would have operational advantages in giving companies uniformity of law for all their data. This would
also encourage the use of a single choice of law for all data governed by a company—that of the
nationality of incorporation—rather than encouraging a choice of law patchwork to govern the data as it
flows around the world.
2ac - AT: Circumvention
NSA will comply
De 14 - General Counsel, National Security Agency (Rajesh, “The NSA and Accountability in an Era of Big
Data”, JOURNAL OF NATIONAL SECURITY LAW & POLICY, 2014, p.8-10//DM)
Finally, NSA traditionally has maintained a strong culture of compliance among its workforce. Employees
receive basic mandatory training on NSA’s legal authorities and the procedures that ensure the
protection of privacy rights. Personnel also must receive refresher training throughout their career at
NSA. Follow-on training can include highly specialized legal and compliance training focused on the
specific requirements of the employee’s assigned mission. NSA has also proactively established a
corporate Director of Compliance to help ensure that legal, technical, and operational requirements of
the mission remain aligned. NSA’s compliance efforts draw from best practices across industry (such as
IT security and other heavily regulated industries like healthcare). NSA is actively engaging with the
broader compliance community to partner, to share best practices, and to understand emerging trends.
NSA is invested in the perception of compliance
Schlanger 15 [Margo, Professor of Law at the University of Michigan Law School, and the founder and
director of the Civil Rights Litigation Clearinghouse., Intelligence Legalism and the National Security
Agency’s Civil Liberties Gap,
file:///C:/Users/Jonah/Downloads/Intelligence%20Legalism%20and%20the%20National%20Security%20
Agency-s%20Civil%20Li%20(2).pdf] Schloss3
In total, more than a few hundred people spend all or a substantial part of their work weeks on NSA
compliance and oversight. This enormous staffing commitment itself demonstrates real commitment to
abiding by the FISA and 12,333 rules. (In other topic areas, one might suspect that the commitment is to
being seen to abide by the rules—but the IC’s secrecy undercuts that cynical interpretation.)
Nonetheless, inevitably, the agency is far from perfectly compliant. On occasion, compliance errors have
been extremely widespread: In 2009, the government disclosed a series of significant compliance
failures to the FISA Court affecting both the internet and telephony metadata programs. These included
systemic failures to comply with the reasonable articulable suspicion standard, by use of less strictly
vetted alert lists and seed accounts; unauthorized sharing of unminimized query results with other
agency personnel; and collection of fields of metadata beyond what was allowed by court order on
nearly all the internet metadata records.91 In addition, in 2011, the government reported that the
“upstream” methods it was using to surveil American internet communications abroad were incapable
of confining NSA access to only communications that met the standard for collection.92 These were
extremely significant failures, and they prompted some moderately robust responses— creation of the
current NSA compliance office,93 augmentation of the Justice Department oversight role, 94 and some
stern (though for years secret) lectures by the FISA Court judges.
It is surely reasonable to expect better than these low points. But it would be unrealistic to demand
either perfect compliance or perfect detection of noncompliance. Both are unattainable for an
organization as complex as the NSA, governed by rulesets as complex as the Foreign Intelligence
Surveillance Act, Executive Order 12,333, and their related procedural documents. Error, after all, has
many causes. Sometimes the rules are misunderstood or miscommunicated. 96 Sometimes someone
who understands the rules makes a mistake—enters a typo, for example, 97 or seeks approval later than
the rules require.98 Sometimes, one can imagine, systems fail—a computer algorithm that is supposed
to distinguish among people with different statuses might miscategorize a new status, for example. And
sometimes people try to defeat the rules.99 In a system as massive and complicated as the NSA’s signals
intelligence program, even an extremely low rate of error can add up.100 (Although because most of the
information collected does not involve persons in the U.S. or Americans abroad, these errors frequently
do not violate anyone’s constitutional rights, under current doctrine.) Of course, each type of error can
be reduced. But compliance errors are often hydraulic—pushing out errors in one place is likely to
introduce at least some errors in another place.101 The goal, then, is not zero errors, but rather, as the
NSA’s Director of Compliance puts it, to “assure compliance at a reasonable level.” 102 NSA has not
always achieved that goal—but it musters substantial effort to do so .
2ac - AT: Section 702 weak
702 is a stronger limit on domestic surveillance than 12333
Bedoya 14 - Executive Director of the Center on Privacy and Technology at Georgetown Law (Alvaro
Bedoya, “Executive Order 12333 and the Golden Number”, Just Security, 10/9/2014,
http://justsecurity.org/16157/executive-order-12333-golden-number/)//MBB
More importantly, Litt’s explanation overlooks the fact that 12333 is a bulk collection authority – while
section 702 is not. Yes, 702 data pass through the United States. But at the end of the day, while section
702 collection may seem “bulky,” it is nonetheless an exclusively targeted collection authority. Section
702 can be used only to collect on communications to, from or (controversially) about a specific target.
There aren’t an infinite number of targets. In 2013, there were 89,138 of them.
Executive Order 12333, by contrast, allows for pure bulk collection of overseas electronic
communications. There is no requirement that electronic surveillance under 12333 be targeted at a
particular individual, organization or facility. A recent directive from the President (PPD-28) explains:
References to signals intelligence collected in “bulk” mean the authorized collection of large quantities
of signals intelligence data which, due to technical or operational considerations, is acquired without the
use of discriminants (e.g., specific identifiers, selection terms, etc.).
(Emphasis mine.) Indeed, 12333 lets the government conduct any electronic surveillance, so long as it
does so from a location abroad, so long as it does not affirmatively target a U.S. person, and so long as it
is done for a “foreign intelligence or counterintelligence purpose.”
The resultant difference in scale of collection is significant. In his 2011 opinion, Judge Bates stated that
NSA acquired over 250 million Internet communications annually under section 702; the Washington
Post revealed that a single program under 12333 collected nearly 5 billion cellphone location records
every day. This may be a bit of an apples-to-oranges comparison, but it’s an instructive one nonetheless.
The untargeted nature and massive scope of 12333 collection strongly suggest that it may be used to
collect far more U.S. person communications than are collected under section 702.
Moreover, because 12333 allows for bulk collection, it would seem to stand a high chance of capturing
Americans’ communications that are, in fact, entirely unrelated to foreign intelligence – precisely the
category of protected communications that Judge Bates found so problematic. Curiously, the new report
on 12333 from the NSA’s Civil Liberties and Privacy Office explicitly excludes bulk collection from its
analysis.
It would be great if Judge Bates could ask these questions. But he can’t. The FISC lacks jurisdiction over
12333 collection. And so it is on Congress – and on us – to fill in the gap. For section 702, the sponsors of
the USA FREEDOM Act succeeded in adding a modest but nonetheless incrementally positive provision
that would require the Director of National Intelligence to either annually disclose an estimate of the
number of Americans affected by section 702 programs, or to provide a detailed, public explanation of
why he or she cannot provide that figure (see subsection “(e)(4)” of section 603 of the bill).
FISA isn’t a rubber stamp – its approval rate is due to executive internal
compliance
Sievert 14 * Professor, Bush School of Government and U.T. Law School, author of three editions of
Cases and Materials on US Law and National Security (Ronald, “Time to Rewrite the Ill-Conceived and
Dangerous Foreign Intelligence Surveillance Act of 1978”, National Security Law Journal Vol. 3, Issue 1 –
Fall 2014)//GK
The public claim that the FISA Court is somehow a rubber stamp because most applications are eventually
approved, is completely ludicrous. This view does not reflect the real difficulty of obtaining a FISA
order.152 When the defense made a “rubber stamp” objection before the Ninth Circuit in United States v. Cavanaugh, the court noted that
the lack of rejections was “consistent with a practice of careful compliance with statutory requirements
on the part of the government.”153 Royce Lamberth, a former Chief Judge of the FISA Court, attributed the
government’s perfect record to the “superb internal review process created within DOJ,” 154 which requires
personal approval of both the Attorney General and the head of the requesting agency for each FISA application. This often results in the
submission of forty to fifty page affidavits at a minimum to FISA judges. 155 Judge Lamberth also stated that far
from granting
automatic approval of FISA requests, the Court often comes back to the government with questions and
comments about their requests and often requires intelligence agencies to modify them to meet the
Court’s standards.156 In 2013, Reggie Walton, current FISA Court presiding judge, said that “the court alters numerous government
requests for data collection or even refuses some of them, even though that may not be reflected in the final statistics that the court sends to
Congress.”157 In the opinion of Judge Richard Posner, the
positive statistics are a reflection of the fact that the
government is actually far too conservative in seeking surveillance orders . He believes that in our legalistic
culture the FBI tries to avoid violating the law and does not want to sail anywhere close to the wind. “The
analogy is to a person who has never missed a plane in his life because he contrives always to arrive at the airport eight hours before the
scheduled departure time.”158
702 has multiple layers of oversight – only .1% of cases are errors
PCLOB 14 - independent, bipartisan agency within the executive branch established by the
Implementing Recommendations of the 9/11 Commission Act (“Report on the Surveillance Program
Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act”, 07/02/14,
https://www.pclob.gov/library/702-Report.pdf)//GK p. 71
In enacting Section 702, Congress mandated additional external layers of oversight, each resulting in
reports made to Congress and the FISC. This Section describes the targeting and minimization reviews conducted by the DOJ’s
National Security Division (“NSD”) and the ODNI, the reports issued by the inspectors general, and additional oversight activities conducted by
the FISC and the Congressional Committees. A. NSD/ODNI Targeting Reviews As is discussed above, the
NSA is required under its
targeting procedures to document every targeting decision made under its targeting procedures. The record of
each targeting decision, known as a tasking sheet, includes (1) the specific selector to be tasked,312 (2) citations to
the specific documents and communications that led the NSA to determine that the target is reasonably believed to be located
outside the United States,313 (3) a narrative describing the contents of these specific documents and communications,
(4) a statement regarding the assessed U.S. person status of the target, and (5) a statement identifying the
foreign power or foreign territory regarding which the foreign intelligence information is to be acquired.314 The NSD
conducts a post-tasking review of every tasking sheet provided by the NSA;315 the ODNI reviews a
sample of these sheets. In addition to evaluating whether the tasking complied with the targeting procedures, the NSD and
ODNI review the targeting for overall compliance with the statutory limitations, such as the prohibition against
reverse targeting. If the NSD or ODNI is unable to determine whether the tasking sheet is sufficient, the NSD and ODNI will require the NSA to
provide the cited documents and communications that underlie the NSA’s foreignness determination at a bimonthly onsite review.316 The
NSD and ODNI also engage with the NSA compliance and legal personnel to ask follow-up questions
regarding the foreignness and foreign intelligence purpose determinations.317 As needed, the NSD and ODNI also seek additional information
from the CIA and FBI regarding selectors that they have nominated.318 The NSD and ODNI’s review of foreign intelligence purpose
determinations is more limited than its review of foreignness determinations insofar as the NSA analysts are required to document the basis for
their foreignness determination (i.e., they must show their work), whereas the analyst need only identify a foreign intelligence purpose. The
results of each NSD/ODNI bimonthly review are required by statute to be provided to the Congressional
Committees.319 Historically, the NSD and ODNI’s bimonthly reviews have determined that approximately
0.1% of all the NSA taskings did not meet the requirements of the NSA targeting procedures.320
Additionally but separately, the NSD and ODNI also conduct approximately monthly reviews of the FBI’s application
of its own targeting procedures.321 The NSD currently reviews every instance in which the FBI’s evaluation of
foreignness revealed any information regarding the target, regardless of whether the information confirms or rebuts the
NSA's foreignness determination. Follow-up questions regarding the FBI’s evaluation of this information are discussed with FBI analysts and
supervisory personnel.322 Like the NSA reviews, the
results of the NSD/ODNI monthly reviews regarding FBI targeting
are documented in a report that must be sent to the Congressional Committees.323 The NSD and ODNI have not
reported the historical percentage of tasking incidents that have been discovered as a result of these reviews. For the period of June through
November 2012, the overall FBI tasking
incident error rate, which would include incidents discovered by the NSD/ODNI reviews,
was 0.04%.
Not a rubber stamp - FISC approval rate isn’t lower than an Article III court
Dickerson, 15 - Julie Dickerson is currently a 3L at Harvard Law School, and previously served as Senior
Editor for the Harvard National Security Journal (“Meaningful Transparency: The Missing Numbers the
NSA and FISC Should Reveal” Harvard National Security Journal,
http://harvardnsj.org/2015/02/meaningful-transparency-the-missing-numbers-the-nsa-and-fisc-shouldreveal/
Critics of FISC argue that the 99% approval rating indicates lax overview, but the statistic does “not
reflect the fact that many applications are altered prior to final submission or even withheld from final
submission entirely, often after an indication that a judge would not approve them.” To more accurately
represent the nuance of FISC approval process, future tables should include columns for modified and
withheld applications. FISC could also present the information in a graph form, showing how many
applications were withheld, granted, and of those granted, how many were modified. A sample chart
below shows how this might be done using the following hypothetical numbers: 100 applications
withheld, 500 modified, and 1,727 granted total.
Moreover, FISC’s surveillance order approval percentages should be compared to an objective standard,
such as search warrant approval percentages by traditional criminal courts. The 2012 Federal Wiretap
Report contains a comprehensive set of publically available data regarding the number of warrants
granted and denied under the Federal Wiretap Act. The report states, “3,395 wiretaps were reported as
authorized in 2012 – 1,354 authorized by federal judges and 2,041 by state judges.” Of those authorized,
only “two state wiretap applications were denied.” This amounts to a 99.9% approval rating within the
state context and a 99.94% approval rating overall.
Section 702 means only non-US persons can be targeted – incidental collection
about US persons requires court approval and minimization
Cordero, 15 - Director of National Security Studies, Georgetown University Law Center, Adjunct
Professor of Law (Carrie, “Focusing on 702: A Brief Reply to the Brennan Center’s Liza Goitein and Faiza
Patel” Lawfare, 4/10, http://www.lawfareblog.com/focusing-702-brief-reply-brennan-centers-lizagoitein-and-faiza-patel
On the intended purpose of the 2008 amendment, I don’t think that a review of the legislative record
would show that the “primary purpose” of Section 702 - that is, the reason the legislative amendment
was sought - was to collect on U.S. persons (and/or persons in the United States, which includes both
U.S. and non-U.S. persons.) A review of the statements for the record from DOJ and DNI officials in 2007
and 2008 would reveal that the purpose was to facilitate acquisition directed at non-U.S. persons
reasonably believed to be outside the United States, for foreign intelligence purposes. Perhaps some
think that those arguments were simply subterfuge for a behind-the-scenes goal of collecting on U.S.
persons, but that impression is not supported by the record. Nor does it square with my own experience
working on these issues in government during that time period. Moreover, to the extent that those type
of concerns were held by some members of Congress at the time, the final, enacted version of the FISA
Amendments Act of 2008 included a specific prohibition on reverse targeting (targeting a non-U.S.
person for collection with the actual goal of collecting the communications of a U.S. person), as well as
court approval of the targeting and minimization procedures.
Incidental collection of U.S. persons was foreseen and expected; that’s why there are minimization
procedures that provide rules for how those communications must be handled. But when the
government sought 702 authority, it did so for the purpose of facilitating the targeting of non-U.S.
persons outside the United States for foreign intelligence purposes.
As to effect, Section 702 does not “remove the requirement for an individualized order for the
acquisition of communications between foreign targets and U.S. persons,” as Liza and Faiza describe it,
in circumstances when the target of the collection is a U.S. person, or, any person in the U.S. Instead, if
the U.S. government seeks to target for collection a U.S. person anywhere in the world (including the
U.S., of course), or a non-U.S. person inside the United States, the government must obtain a probable
cause based order from the Foreign Intelligence Surveillance Court.
Current 702 regulations provide the public with transparency and reasonably fit
under the Fourth Amendment
PCLOB 14 - independent, bipartisan agency within the executive branch established by the
Implementing Recommendations of the 9/11 Commission Act (“Report on the Surveillance Program
Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act”, 07/02/14,
https://www.pclob.gov/library/702-Report.pdf)//GK
The Board’s legal analysis of the Section 702 program includes an evaluation of whether it comports
with the terms of the statute, an evaluation of the Fourth Amendment issues raised by the program, and
a discussion of the treatment of non-U.S. persons under the program. In reviewing the program’s
compliance with the text of Section 702, the Board has assessed the operation of the program overall
and has separately evaluated PRISM and upstream collection. On the whole, the text of Section 702
provides the public with transparency into the legal framework for collection, and it publicly outlines the
basic structure of the program. The Board concludes that PRISM collection is clearly authorized by the
statute and that, with respect to the “about” collection, which occurs in the upstream component of the
program, the statute can permissibly be interpreted as allowing such collection as it is currently
implemented. The Board also concludes that the core of the Section 702 program — acquiring the
communications of specifically targeted foreign persons who are located outside the United States,
upon a belief that those persons are likely to communicate foreign intelligence, using specific
communications identifiers, subject to FISA court–approved targeting rules and multiple layers of
oversight — fits within the “totality of the circumstances” standard for reasonableness under the Fourth
Amendment, as that standard has been defined by the courts to date. Outside of this fundamental core,
certain aspects of the Section 702 program push the program close to the line of constitutional
reasonableness. Such aspects include the unknown and potentially large scope of the incidental
collection of U.S. persons’ communications, the use of “about” collection to acquire Internet
communications that are neither to nor from the target of surveillance, and the use of queries to search
for the communications of specific U.S. persons within the information that has been collected. With
these concerns in mind, this Report offers a set of policy proposals designed to push the program more
comfortably into the sphere of reasonableness, ensuring that the program remains tied to its
constitutionally legitimate core.
Status Quo 702 protections of non – U.S. persons solve
PCLOB 14 - independent, bipartisan agency within the executive branch established by the
Implementing Recommendations of the 9/11 Commission Act (“Report on the Surveillance Program
Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act”, 07/02/14,
https://www.pclob.gov/library/702-Report.pdf)//GK p. 99
A number of provisions of Section 702, as well as provisions in other U.S. surveillance laws, protect the privacy of U.S. and
non-U.S. persons alike. These protections can be found, for example, in (1) limitations on the scope of authorized
surveillance under Section 702; (2) damages and other civil remedies that are available to subjects of
unauthorized surveillance as well as sanctions that can be imposed on government employees who engage in
such conduct; and (3) prohibitions on unauthorized secondary use and disclosure of information acquired
pursuant to the Section 702 program. These sources of statutory privacy protections are discussed briefly. The first important privacy
protection provided to non-U.S. persons is the
statutory limitation on the scope of Section 702 surveillance, which requires that
targeting be conducted only for purposes of collecting foreign intelligence information.440 The definition
of foreign intelligence information purposes is limited to protecting against actual or potential attacks; protecting
against international terrorism, and proliferation of weapons of mass destruction; conducting counterintelligence; and collecting information with respect to a foreign power or foreign territory that concerns U.S.
national defense or foreign affairs.441 Further limitations are imposed by the required certifications identifying the specific categories of
foreign intelligence information, which are reviewed and approved by the FISC.442 These limitations do not permit unrestricted collection of
information about foreigners. The second group of statutory privacy protections for non-U.S. persons are the penalties that apply
to
government employees who engage in improper information collection practices — penalties that apply whether
the victim is a U.S. person or a non-U.S. person. Thus, if an intelligence analyst were to use the Section 702 program
improperly to acquire information about a non-U.S. person (for example, someone with whom he or she may have had a personal
relationship), he or she could be subject not only to the loss of his or her employment, but to criminal prosecution.443
Finally, a non-U.S. person who was a victim of a criminal violation of either FISA or the Wiretap Act could be entitled
to civil damages and other remedies.444 In sum, if a U.S. intelligence analyst were to use the Section 702 program to collect
information about a non-U.S. person where it did not both meet the definition of foreign intelligence and relate to one of the certifications
approved by the FISA court, he or she could face not only the loss of a job, but the prospect of a term of imprisonment and civil damage suits.
The third privacy protection covering non-U.S. persons is the statutory restriction on
improper secondary use found at 50
U.S.C. § 1806, under which information acquired from FISA-related electronic surveillance may not “be used or
disclosed by Federal officers or employees except for lawful purposes.”445 Congress included this language “to insure
that information concerning foreign visitors and other non-U.S. persons . . . is not used for illegal purposes.”446 Thus, use of Section 702
collection for the purpose of suppressing or burdening criticism or dissent, or for disadvantaging persons based on their ethnicity, race, gender,
sexual orientation, or religion, would violate Section 1806.
Section 702 is strictly regulated and rarely and has multiple agency oversight
PCLOB, 14 - Privacy and Civil Liberties Oversight Board [Report on the Surveillance Program Operated
Pursuant to Section 702 of the Foreign Intelligence Surveillance Act, https://www.pclob.gov/library/702Report.pdf] Schloss
In PRISM collection, the government sends a selector, such as an email address, to a United Statesbased electronic communications service provider, such as an Internet service provider (“ISP”), and the
provider is compelled to give the communications sent to or from that selector to the government.
PRISM collection does not include the acquisition of telephone calls. The National Security Agency
(“NSA”) receives all data collected through PRISM. In addition, the Central Intelligence Agency (“CIA”)
and the Federal Bureau of Investigation (“FBI”) each receive a select portion of PRISM collection.
Upstream collection differs from PRISM collection in several respects. First, the acquisition occurs with
the compelled assistance of providers that control the telecommunications “backbone” over which
telephone and Internet communications transit, rather than with the compelled assistance of ISPs or
similar companies. Upstream collection also includes telephone calls in addition to Internet
communications. Data from upstream collection is received only by the NSA: neither the CIA nor the FBI
has access to unminimized upstream data. Finally, the upstream collection of Internet communications
includes two features that are not present in PRISM collection: the acquisition of so-called “about”
communications and the acquisition of so-called “multiple communications transactions” (“MCTs”). An
“about” communication is one in which the selector of a targeted person (such as that person’s email
address) is contained within the communication but the targeted person is not necessarily a participant
in the communication. Rather than being “to” or “from” the selector that has been tasked, the
communication may contain the selector in the body of the communication, and thus be “about” the
selector. An MCT is an Internet “transaction” that contains more than one discrete communication
within it. If one of the communications within an MCT is to, from, or “about” a tasked selector, and if
one end of the transaction is foreign, the NSA will acquire the entire MCT through upstream collection,
including other discrete communications within the MCT that do not contain the selector.
Each agency that receives communications under Section 702 has its own minimization procedures,
approved by the FISA court, that govern the agency’s use, retention, and dissemination of Section 702
data.11 Among other things, these procedures include rules on how the agencies may “query” the
collected data. The NSA, CIA, and FBI minimization procedures all include provisions permitting these
agencies to query data acquired through Section 702, using terms intended to discover or retrieve
communications content or metadata that meets the criteria specified in the query. These queries may
include terms that identify specific U.S. persons and can be used to retrieve the already acquired
communications of specific U.S. persons. Minimization procedures set forth the standards for
conducting queries. For example, the NSA’s minimization procedures require that queries of Section
702–acquired information be designed so that they are “reasonably likely to return foreign intelligence
information.”
The minimization procedures also include data retention limits and rules outlining circumstances under
which information must be purged. Apart from communications acquired by mistake, U.S. persons’
communications are not typically purged or eliminated from agency databases, even when they do not
contain foreign intelligence information, until the data is aged off in accordance with retention limits.
Each agency’s adherence to its targeting and minimization procedures is subject to extensive oversight
within the executive branch, including internal oversight within individual agencies as well as regular
reviews conducted by the Department of Justice (“DOJ”) and the Office of the Director of National
Intelligence (“ODNI”). The Section 702 program is also subject to oversight by the FISA court, including
during the annual certification process and when compliance incidents are reported to the court.
Information about the operation of the program also is reported to congressional committees. Although
there have been various compliance incidents over the years, many of these incidents have involved
technical issues resulting from the complexity of the program, and the Board has not seen any evidence
of bad faith or misconduct
Section 702 promotes regulations to make sure that U.S. citizens are not under
surveillance
Mann, research associate, 14 [Scott F., research associate with the Strategic Technologies Program
at the Center for Strategic and International Studies (CSIS) in Washington, D.C. research associate with
the Strategic Technologies Program at the Center for Strategic and International Studies (CSIS) in
Washington, D.C. , Fact Sheet: FISA Section 702, http://csis.org/publication/fact-sheet-fisa-section-702]
Schloss
Issue: Does Section 702 of the Foreign Intelligence Surveillance Act (FISA), which regulates the collection
of information from non-U.S. persons located abroad, result in the indirect, warrantless collection of
U.S. persons’ data?
Background: Section 702 of FISA, added under the FISA Amendments Act of 2008 (FAA), and
subsequently extended until 2017 via the FISA Amendments Act Reauthorization Act of 2012, provides
the authorities for the collection of foreign communications, including phone and email data, by the NSA
and establishes procedures for targeting non-U.S. persons believed to be outside the U.S. for foreign
intelligence collection purposes. The Attorney General and the Director of National Intelligence are
granted the authority to determine surveillance targets for periods up to one year as long as the
collection has a “significant” foreign intelligence purpose, is not aimed at U.S. persons or persons within
the U.S., and that they have undertaken minimization procedures to protect the collected data. Section
702 collection focuses on foreign individuals located outside of the U.S.
Controversy: The use of surveillance authorities under Section 702 has sparked concern about the
potential for warrantless surveillance of U.S. persons. While Section 702 explicitly prohibits both the
direct and indirect intentional targeting of U.S. persons or of any person known to be in the U.S., the
communications of some U.S. persons are occasionally collected in the course of legitimate surveillance
operations. The Washington Post reported that a leaked NSA program audit from May 2012 “counted
2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution
of legally protected communications.”
Assessment: Compliance issues are not willful violations. Rather, they are often the result of changes or
weaknesses in software technology, computer errors, or operator mistakes, each of which is reported as
an incident. The recently declassified 2013 “Semiannual Assessment of Compliance with Procedures and
Guidelines Issued Pursuant to Section 702 of the Foreign Intelligence Surveillance Act,” found a less than
half-percent incident compliance rate. Of the compliance incidents the joint oversight team assessed in
the semi-annual report, it did not identify any evidence of deliberate or intentional attempts to violate
or circumvent the requirements of FISA.
Section 702 actually expands the FISC’s oversight of foreign intelligence collection to an area it
previously didn’t oversee: “the surveillance, for foreign intelligence purposes, of foreigners overseas.”
FISA includes oversight mechanisms to prevent misuse for 702 collections. These include oversight by
the FISC of all 702 collection activities, the review and approval by the FISC of all targeting and
minimization procedures, regular reporting to Congress on Section 702 collection, and regular reviews
by independent Executive Branch Inspectors General.
New reforms to Section 702 protect against incidental collection and abuse
Litt, Counsel Office of the Director of National Surveillance, 15 [Robert S., second General
Counsel of the Office of the Director of National Intelligence, U.S. Intelligence Community Surveillance
One Year After President Obama’s Address, file:///C:/Users/Jonah/Downloads/3_NatlSecLJ_210231_Litt.pdf] Schloss1
But to address these concerns further, the President in his speech directed the Attorney General and the
DNI to “institute reforms that place additional restrictions on government’s ability to retain, search, and
use in criminal cases, communications between Americans and foreign citizens incidentally collected
under Section 702.”12 We are doing so.
First, as the PCLOB recommended, agencies have new restrictions on their ability to look through 702 collection
for information about U.S. persons. The agencies’ various rules are described in the report we issued yesterday.13 It’s important
to note that different agencies in the Intelligence Community have been charged by Congress and the President with focusing on different
intelligence activities. For example, NSA focuses on signals intelligence; CIA collects primarily human intelligence; and FBI has a domestic law
enforcement focus. Because these agencies’ missions are different, their internal governance and their IT systems have developed differently
from one another, and so the specifics of their procedures differ somewhat. But they will all ensure that information about U.S. persons
incidentally collected pursuant to Section 702 is only made available to analysts and agents when appropriate.
Second, we have reaffirmed that intelligence
agencies must delete communications acquired pursuant to Section
702 that are to, from, or about U.S. persons if the communications are determined to be of no foreign
intelligence value, and we have strengthened oversight of this requirement.
Third, the Government will use information acquired under Section 702 as evidence against a person in a criminal case only incases related to
national security or for certain other enumerated serious crimes,14 and only when the Attorney General approves. In his remarks as delivered,
Mr. Litt went on to describe the “enumerated serious crimes" for which the U.S.
Government will use information acquired
under Section702 as evidence against a person. Under the new policy, in addition to any other
limitations imposed by applicable law, including FISA, any communication to or from, or information
about, a U.S. person acquired under Section 702 of FISA shall not be introduced as evidence against that
U.S. person in any criminal proceeding except (1) with the prior approval of the Attorney General and (2) in (A)
criminal proceedings related to national security (such as terrorism, proliferation, espionage, or cybersecurity) or (B) other prosecutions of
crimes involving (i) death; (ii) short, we have taken concrete steps to ensure that there are limits on our ability
to identify and use information about U.S. persons that we incidentally collect under Section 702.
PPD-28 mechanism
1ac - plan – PPD-28
Version 1:
The United States federal government should limit domestic surveillance for foreign intelligence
purposes of American corporations exclusively to authority under section 702 of the FISA Amendments
Act, subject to additional use restrictions in Presidential Policy Directive 28.
Version 2:
The United States federal government should substantially curtail its surveillance of information in the
custody of American corporations by exclusively limiting surveillance to investigations carried out under
section 702 of the FISA Amendments Act, subject to additional use restrictions in Presidential Policy
Directive 28.
1ac – PPD-28 solvency addition
Applying the restrictions of PPD-28 to section 702 eliminates all negative
perceptions of overbreadth
Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for Democracy &
Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING
REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)
To address the problem of overbreadth in Section 702 collection, PCLOB should recommend that Section
702 surveillance be conducted only for carefully defined national security purposes. While there are
different ways to do this, the best way would be to turn the “use restrictions” in PPD-28 that govern
bulk collection into the permissible purposes for Section 702 surveillance.
This would require that collection pursuant to Section 702 only occur for purposes of detecting and
countering: (1) espionage and other threats and activities directed by foreign powers or their
intelligence services against the United States and its interests, (2) threats to the United States and its
interests from terrorism, (3) threats to the United States and its interests from the development,
possession, proliferation, or use of weapons of mass destruction, (4) cybersecurity threats, (5) threats to
U.S. or allied Armed Forces or other U.S or allied personnel, and (6) transnational criminal threats,
including illicit finance and sanctions evasion related to the other purposes named above. This change
would provide significant comfort to non-U.S. persons abroad who are concerned about the impact on
their human rights that Section 702 surveillance would otherwise have. Indeed, it would increase the
likelihood that Section 702 surveillance would meet human rights standards.
It would also focus Section 702 surveillance on true national security threats and still provide significant
leeway to intelligence officials. We note that each time intelligence officials at the March 19 PCLOB
hearings on Section 702 described the DNI certifications that identify the categories of foreign
intelligence information that may be collected pursuant to Section 702, they mentioned one of these six
categories of information.
Another way to limit to national security the purposes for collection pursuant to Section 702 would be
to remove “the conduct of foreign affairs” as a basis for collection. If adopted, this reform would permit
collection under Section 702 for the purpose of obtaining (1) information that relates to the ability of
the U.S. to protect against a hostile attack, espionage, sabotage or international terrorism or
proliferation of weapons of mass destruction, or (2) information with respect to a foreign territory or
foreign power (a foreign government, political party, or entity controlled by a foreign government, or a
foreign terrorist organization) that relates to the security of the U.S. Such a change would be consistent
with the stated counterterrorism purpose of Section 702. Refining the purpose for which surveillance
under Section 702 may be conducted would not prevent the Intelligence Community from gathering
information related to the conduct of foreign affairs, but rather would merely remove the highly
invasive practice of compelled company disclosure of communications content absent judicial review as
a means of doing so.
2ac – PPD-28 key to global modeling
Solvency – global modeling
The plan restores US cred as a global leader on privacy by limiting the FAA
Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the Georgetown
University Law Center (Timothy, “The Good News About Spying”
https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-about-spying
NEXT STEPS
Has surveillance reform gone far enough? Hardly. Obama has taken the first steps, but the government
should take six more to enhance public confidence in surveillance programs.
First, the intelligence community should do even more to increase transparency. IC on the Record is a
good start, but it is mostly reactive, providing context to programs that Snowden had already leaked.
The intelligence community should continue to release as much as it possibly can about surveillance
programs without compromising sources and methods—even if they have not been leaked. Given
Snowden’s widespread public acclaim, coming clean about such controversial intelligence programs is
not just good government, but also provides the surest way to preserve vital intelligence capabilities.
With greater transparency, intelligence agencies can stay one step ahead of future leakers and earn
back the trust of a skeptical public.
The United States should also pivot from its defensive position and take the lead on global privacy. The
United States has an impressive array of privacy safeguards, and it has even imposed new ones that
protect citizens of every country. Despite their weaknesses, these safeguards are still the strongest in
the world. The U.S. government should not be shy about trumpeting them, and should urge other
countries to follow its lead. It could begin by engaging with close allies, like the United Kingdom,
Germany, and other European countries, urging them to increase transparency and judicial supervision
of their own communications surveillance activities.
The government also needs to finish the job on telephone records. The law that allows for bulk
collection of telephone records is set to expire on June 1, 2015. Congress should act now to pass
sensible reforms that would replace bulk collection with a privacy-preserving alternative. The only truly
viable option remains the bill that died in November last year.
Washington also needs to work with U.S. technology companies to reform PRISM and other surveillance
programs that have been an embarrassment for U.S. companies. Congress should narrow the FISA
Amendments Act of 2008 that authorizes PRISM . That law allows the government to obtain secret
court orders targeting communications that include foreign participants of interest to the NSA with the
compelled assistance of U.S. companies. Congress could start by limiting such orders to the same six
specific serious security threats that are included in Obama’s policy directive for bulk signals
intelligence collection.
PPD-28 not applied to 702
Obama PPD doesn’t solve section 702 perception problems – it’s not applied to
it
Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for Democracy &
Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING
REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11)
The Presidential Policy Directive that President Obama issued on January 17, 2014 (PPD-28),7 while
remarkable in many ways, does not sufficiently address this problem. It prohibits the government from
collecting signals intelligence for the purpose of suppressing or burdening criticism or dissent, but that
prohibition permits the continued collection of information about such expressive activities merely
because they are relevant to U.S. foreign affairs.
On the other hand, PPD-28 does include very important restrictions on the use of information collected
in bulk for foreign intelligence purposes. They seem carefully thought out, and each permitted use of
information collected in bulk would directly advance U.S. national security interests. These are among
the most significant provisions of PPD-28, but they do not apply to Section 702 because it is not
considered a bulk collection program.8
Internationality requirement mechanism
1ac – plan – intentionality requirement
The United States federal government should curtail its surveillance of information in the custody of
American corporations by exclusively limiting its surveillance to investigations carried out under section
702 of the FISA Amendments Act. The United States federal government should amend section 702 to
require that the target of surveillance must be a foreign power or its agent, require executive branch
certification that the collection of foreign intelligence must be the primary purpose of and likely
outcome of programmatic surveillance, and require FISA Court review of executive certification. Any
executive surveillance that cannot satisfy this internationality requirement should be subject to Title III
warrant requirements.
1ac – internationality requirement solvency
The plan’s amendment to 702 solves the risk of abuse without ending
programmatic surveillance
Goitein and Patel 15 - Elizabeth (Liza) Goitein co-directs the Brennan Center for Justice’s Liberty and National Security Program. Served
as counsel to Sen. Russell Feingold with a particular focus on government secrecy and privacy rights. Was a trial attorney in the Federal
Programs Branch of the Civil Division of the Department of Justice. Graduated from the Yale Law School and clerked for the Honorable Michael
Daly Hawkins on the U.S. Court of Appeals for the Ninth Circuit. Faiza Patel serves as co-director of the Brennan Center for Justice’s Liberty and
National Security Program. Clerked for Judge Sidhwa at the International Criminal Tribunal for the former Yugoslavia. Ms. Patel is a graduate of
Harvard College and the NYU School of Law. (Elizabeth and Faiza, “What went wrong with the FISA court”, Brennan Center for Justice at New
York University School of Law, 2015 //DM)
As the above discussion makes clear, the key to reforming the FISA Court is ending programmatic
surveillance. If such surveillance continues, serious Article III and Fourth Amendment problems will be
unavoidable. It is nonetheless worth noting that, as a policy matter, incorporating the reforms set forth
in Parts V.B and V.C, above, into programmatic surveillance would enhance privacy and strengthen the
judiciary’s role.
Specifically, if programmatic surveillance continues, Congress should amend Section 702 to require that
the target of surveillance must be a foreign power or its agent. It should narrow the definition of foreign
intelligence as discussed above. It should require the executive branch to certify that the collection of
foreign intelligence is both the primary purpose and the likely outcome of the programmatic activities,
and empower the FISA Court to review that certification on its substance. All of these changes would
nudge programmatic surveillance in the right direction on the Fourth Amendment reasonableness
spectrum — even if, in our view, they would not go far enough.288
Moreover, additional steps should be taken that would make the court’s limited role more meaningful.
More specific statutory requirements for targeting and minimization procedures would enhance the
FISA Court’s ability to ensure that the agencies conducting surveillance are complying with the law.
Currently, the criteria for these procedures are so subjective and open-ended, they provide no useful
benchmark for the court to apply. They also permit a level of vagueness in the agency’s own procedures
that renders the court’s facial review a hollow exercise.289
Finally, Congress should require the government, on a periodic basis, to submit to the FISA Court for its
review a list of the selection terms used to acquire electronic communications under Section 702. For
each selection term, the government should summarize succinctly the facts supporting its use. This
would provide the FISA Court with a concrete factual basis on which to evaluate the constitutionality of
foreign intelligence surveillance activities. The government’s determinations should be reviewed by the
court for clear error, with the government required to cease collection (and purge any already collected
information) in cases that fall below that low bar.290
Strengthening FISA’s internationality requirement means wholly domestic cases
will be limited by a Title III warrant – that curtails FISA overreach
Harper 14, University of Chicago Law School, U.S. Department of Justice, Civil Division, (Nick, “FISA’s
Fuzzy Line between Domestic and International Terrorism”, University of Chicago Law Review;
Summer2014, Vol. 81 Issue 3)//AK
Due to the strong possibility that certain interpretations of FISA’s nebulous internationality requirement
pose serious constitutional questions, a more tailored interpretation of the language is needed in order
to precisely identify the foreign policy interests that distinguish international terrorism.197 To that end,
this Comment proposes that FISA’s international terrorism provision should be satisfied only if an
individual engages in terrorist activities198 and there is probable cause to believe that either of the
following internationality conditions are met: (1) the terrorist activities are intended to impair significant
interests of a foreign power in the United States or abroad, or (2) the terrorist activities are achieved
through a knowing provision or receipt of material support to or from a foreign organization or a foreign
power. If this test is not satisfied, the government must meet the more rigorous warrant requirements
of Title III in order to perform electronic surveillance on the individual or group in question (assuming
that the individual or group does not qualify as any other “foreign power” or “agent of a foreign power”
under FISA).
This interpretation of FISA’s internationality requirement has several advantages. First, it provides a
refined method of sorting between international and domestic terrorism that is more aligned with FISA’s
legislative history and better attuned to the foreign policy interests that underlie the constitutional
distinction between the groups. The proposed test covers the typical case of international terrorism: an
al-Qaeda agent operating in the United States would always be considered an international terrorist
because he is knowingly providing material support to a foreign organization. The material-support
requirement would embody the definition of “material support or resources” in 18 USC § 2339A(b)(1),
which defines the minimum level of involvement in terrorist activities necessary to warrant criminal
prosecution. The statute defines “material support or resources” as:
[A]ny property, tangible or intangible, or service, including currency or monetary instruments or
financial securities, financial services, lodging, training, expert advice or assistance, safehouses, false
documentation or identification, communications equipment, facilities, weapons, lethal substances,
explosives, personnel (1 or more individuals who may be or include oneself), and transportation, except
medicine or religious materials.199
This standard better ensures that international terrorists have the “substantial international character”
that FISA’s enacting legislature desired.200 Indeed, Congress intended that the support necessary to
satisfy FISA’s internationality requirement be “material, technical, training, or other substantive
support,” rather than “moral or vocal support,” closely approximating the spirit of the current materialsupport statute.201
On the other hand, purely domestic groups would never be engaged in international terrorism under
this test unless they intend to impair significant foreign interests or knowingly provide or receive
material support to or from a foreign organization or a foreign power. Defining what constitutes a
“significant interest” of a foreign power will be one of the greatest challenges in implementing this test.
However, as the test’s purpose is to identify situations in which the government’s foreign policy
interests are triggered, “significant interests of a foreign power” should cover targets of terrorism that
would cause diplomatic crises, such as attacks by domestic groups on foreign soil or attacks within the
United States that are tantamount to acts of war (embassy attacks, assassinations of foreign dignitaries,
and so forth).202 It likely should not cover acts of terror by domestic groups within the United States
that happen to victimize a disproportionate number of foreigners (such as an attack on a popular
domestic tourist attraction).203 Although there will clearly be a line-drawing problem,204 a high
threshold should be set in order to prevent the sort of expansionary interpretation that is possible under
the current FISA regime.
A strengthened internationality requirement provides clear standards for
oversight and preventing abuse
Harper 14, University of Chicago Law School, U.S. Department of Justice, Civil Division, (Nick, “FISA’s
Fuzzy Line between Domestic and International Terrorism”, University of Chicago Law Review;
Summer2014, Vol. 81 Issue 3)//AK
Most importantly, this test more accurately categorizes groups that straddle the line between domestic
and international terrorism, such as groups that act parallel to, but without direction from, an
international terrorist group. It does so by greatly reducing the chance that tangential international
connections will transform otherwise-domestic activity into international terrorism. For example, under
the proposed test, Abdul-Latif would not be considered an international terrorist and his surveillance
would have been subject to the more rigorous Title III procedures. The military entrance processing
station that he planned to attack in Seattle would not constitute a significant foreign interest. Moreover,
his international connections on YouTube would not satisfy the material-support standard because he
neither provided nor was provided with anything approaching material support as defined in 18 USC §
2339A(b)(1), such as training or expert advice.205 This is a sensible result because, as discussed
above,206 it is difficult to see how Abdul- Latif’s conspiracy triggered any of the government’s foreign
affairs interests.
These borderline groups are further protected by the foreign organization requirement. To take the
example mentioned above, purchasing weapons from a friend in Mexico likely does not implicate
foreign policy interests, unless that friend is part of a foreign organization, because such a purchase
does not directly strengthen international terrorist networks. Moreover, there is no need for greater
secrecy in such a case because the seller is unlikely to be intimately connected to the politics of a foreign
nation. Rather, to trigger these interests, there should be a significant link to a foreign organization that
at least resembles the types of foreign terrorist organizations designated by the secretary of state.207
Additionally, to show that a group is a foreign organization, it would be necessary not to point to a base
in a specific country, but rather to show that the group does not operate solely in the United States.
The foreign-organization requirement would also have prevented the actions of the group in Duka from
falling into the category of international terrorism. The most serious potential international link in that
case was the admission of one group member that the group would need to receive a fatwa before it
could attack.208 Arguably, this conversation evidences sufficient agency such that the Duka group was
providing “personnel” under the material-support statute.209 However, there is no evidence that the
fatwa referenced in the conversation would have been issued by an individual affiliated with a foreign
organization. Thus, even if the conversation constitutes material support, it does not meet the
requirement that such support be provided to, or received from, a foreign organization or foreign
power.
Another advantage of the proposed test is that it achieves greater precision in the sorting of terrorist
groups while remaining consistent with FISA’s language, limiting it only to the extent necessary to
prevent the targeting of groups that do not implicate foreign affairs interests. For instance, both FISA’s
text and the proposed standard agree that members of purely domestic groups who seek asylum in a
foreign nation are international terrorists. FISA explicitly recognizes this situation,210 and under the
proposed test, such a group would qualify as international because asylum qualifies as material support
from a foreign power.211 This makes sense because a domestic terrorist who seeks asylum in a foreign
nation certainly risks causing a foreign-relations crisis.212 Additionally, the material-support and
“significant foreign- interest” requirements mirror FISA’s language that international terrorist activities
must “transcend national boundaries” either through the “means by which they are accomplished” or
with respect to the “persons they appear intended to coerce or intimidate.”213 While the test does limit
the viable interpretations of FISA’s internationality provision, the foregoing discussion has demonstrated
that it does so only in order to avoid potential constitutional violations by more precisely identifying
cases in which the government’s foreign policy interests are at stake.
Finally, this test would potentially increase the efficacy of ex post judicial oversight of surveillance
targeting by allowing for easy analogy to the existing definition of “material support or resources” and
its accompanying case law. Instead of analyzing whether the target’s activities transcended national
boundaries— a hopelessly nebulous standard with no helpful analogue elsewhere in the law—judges
could look to existing material support case law to make more-informed decisions about whether the
government satisfied probable cause.214 Moreover, the ability of defendants to access these
comparative materials would provide some much-needed balancing to the skewed FISA adversarial
process.
2ac – internationality requirement solves
FISA’s internationality requirement is blurring – allowing surveillance of purely
domestic groups
Harper 14, University of Chicago Law School, U.S. Department of Justice, Civil Division, (Nick, “FISA’s
Fuzzy Line between Domestic and International Terrorism”, University of Chicago Law Review;
Summer2014, Vol. 81 Issue 3)//AK
The Foreign Intelligence Surveillance Act of 1978 (FISA) regulates, among other things, the government’s
acquisition of electronic surveillance within the United States for foreign intelligence purposes. FISA
allows a federal officer to seek an order from a judge at a specially designated court “approving
electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining
foreign intelligence information.” As long as the requisite foreign nexus can be shown, FISA warrants are
preferable to their possible substitutes because they are easier to obtain and allow for more secretive
and penetrating investigations.
Consistent with FISA’s foreign focus, the government may use the statute to investigate members of
international terrorist groups within the United States. However, the activities of purely domestic
terrorist groups do not fall under FISA and must therefore be investigated using standard criminal
investigative tools. Often, terrorists will easily be identified as international; members of designated
“foreign terrorist organizations” operating within the United States are clearly international terrorists.
But the proliferation of modern communication technologies has caused increasing slippage between
the definitions of domestic and international terrorism . For example, many homegrown terrorists are
inspired by international groups to commit attacks in the United States. In many cases, the government
seems to classify these actors as international terrorists based on Internet activity that ranges from
viewing and posting jihadist YouTube videos to planning attacks with suspected foreign terrorists in chat
rooms, thus using FISA’s formidable investigatory weapons against them. The government is aided in
this task by FISA’s definition of international terrorism, which has an extremely vague and potentially
loose internationality requirement. An expansive interpretation of this requirement could be used to
subject what might properly be considered domestic terrorist groups to FISA surveillance.
One should be concerned about both the existence and the effects of an expansive interpretation of
FISA’s internationality requirement. Not only would subjecting domestic terrorist groups to FISA
surveillance violate FISA itself, but such an application might also be unreasonable under the Fourth
Amendment. Moreover, the FISA application and surveillance process is very secretive, lacks a true
adversarial process, and is devoid of meaningful oversight. This setting offers an ideal environment for
the government to push statutory and constitutional boundaries. Indeed, recent revelations from
Edward Snowden offer confirmation that the government is more likely to cross constitutional lines in
the name of national security when these institutional factors are present.
Strengthening the internationality requirement creates Fourth Amendment
protection against domestic surveillance
Harper 14, University of Chicago Law School, U.S. Department of Justice, Civil Division, (Nick, “FISA’s
Fuzzy Line between Domestic and International Terrorism”, University of Chicago Law Review;
Summer2014, Vol. 81 Issue 3)//AK
Part II demonstrated that FISA has drawn an imprecise line between international and domestic
terrorism. The requirement that a group’s activities transcend national boundaries, when combined
with FISA’s procedural secrecy and the proliferation of modern communication technologies, gives the
government the ability and the incentive to push the definition of international terrorism beyond its
intended boundaries. Additionally, two cases demonstrate that the government may have already
crossed that line. Arguably, though, this boundary pushing is not problematic. It may seem anachronistic
to contend that FISA is operating outside its intended boundaries when the world today is much more
technologically advanced and globally integrated than the 1978 Congress could have envisioned. Such a
broad interpretation of the internationality requirement still fits within the language’s plain meaning
and might be better seen as necessary statutory evolution than as a statutory violation. However, even
if the targeting of quasi-domestic groups using an evolving interpretation of FISA’s language is not a
statutory violation, it is still possible that using FISA to investigate these groups violates the Fourth
Amendment.
To answer whether such targeting violates the Fourth Amendment, Section A first explores why the
Fourth Amendment demands different treatment of domestic and international terrorist groups. It
argues that the government’s foreign policy interests in the international terrorism context result in less
Fourth Amendment protection for those groups. Section B demonstrates how FISA could be interpreted
to cover groups that should properly be considered domestic under the Fourth Amendment. It then
argues that two FISA procedures likely violate the Fourth Amendment when applied to domestic
terrorist groups. Finally, Section C proposes a more limited interpretation of FISA’s internationality
requirement—one that is in line with the text and legislative history of the statute and that sorts
terrorists based on the presence of the government’s foreign policy interests.
2ac – primary purpose test solves
The significant purpose test means provides cover for illegal domestic
surveillance – the primary purpose test prevents abuse
Goitein and Patel 15 - Elizabeth (Liza) Goitein co-directs the Brennan Center for Justice’s Liberty and National Security Program. Served
as counsel to Sen. Russell Feingold with a particular focus on government secrecy and privacy rights. Was a trial attorney in the Federal
Programs Branch of the Civil Division of the Department of Justice. Graduated from the Yale Law School and clerked for the Honorable Michael
Daly Hawkins on the U.S. Court of Appeals for the Ninth Circuit. Faiza Patel serves as co-director of the Brennan Center for Justice’s Liberty and
National Security Program. Clerked for Judge Sidhwa at the International Criminal Tribunal for the former Yugoslavia. Ms. Patel is a graduate of
Harvard College and the NYU School of Law. (Elizabeth and Faiza, “What went wrong with the FISA court”, Brennan Center for Justice at New
York University School of Law, 2015//DM)
Contrary to the requirements articulated by several federal courts, Congress, backed by the FISA
Appeals Court, has allowed the government to conduct warrantless surveillance even when collecting
foreign intelligence is not its primary purpose.
As discussed, the most influential court of appeals decision permitting warrantless collection of foreign
intelligence (Truong) held that obtaining foreign intelligence must be the “primary purpose” of
collection. Other courts took a similar position.249 While these cases involved surveillance that targeted
U.S. persons, rather than surveillance of communications between foreign targets and U.S. persons, the
rationale for the requirement — to avoid an end-run around warrants in domestic criminal cases —
applies in both settings.
The Patriot Act, by contrast, adopted a “significant purpose” test, under which collection may take place
even if the government’s primary purpose is to gather evidence for a criminal prosecution. (The link to a
foreign intelligence purpose was further attenuated by Section 702 of the FISA Amendments Act, which
allows the government to certify that the acquisition of foreign intelligence is a significant purpose of
the program as a whole, rather than requiring such a certification for each target.) In a 2002 decision,
the FISA Court held that blurring the line between foreign intelligence and criminal investigations could
allow criminal prosecutors to bypass the warrant requirement by appropriating more flexible FISA tools
in cases where “the government is unable to meet the substantive requirements” of a regular warrant,
or where the administrative burdens of obtaining one are deemed “too onerous.”250
The FISA Appeals Court, however, disagreed and reversed, reasoning that criminal prosecutions “can be,
and usually are, interrelated with other techniques used to frustrate a foreign power’s efforts.”251 Even
where foreign intelligence is gathered for use in a criminal prosecution, the ultimate aim is still “to
counter the malign efforts of a foreign power. Punishment of the terrorist or espionage agent is really a
secondary objective.”252 By contrast, the court opined, the purpose of criminal law is to punish
individual wrongdoers and deter others from following in their footsteps. Accordingly, the FISA Appeals
Court concluded that acquiring foreign intelligence information for the purpose of bringing a criminal
prosecution is consistent with Supreme Court case law holding that “special needs” can justify
warrantless searches only outside the law enforcement context.
This reasoning was a stretch at best. Without citing any authority, the court assumed that “ordinary”
criminal prosecutions differ from terrorism investigations because they are intended primarily to punish
or deter crime. It ignored the fact that almost all prosecutions may be framed as serving broader
societal purposes. Quite aside from punishment or deterrence, prosecutions of gang violence are
intended to protect community safety and vitality; prosecutions of drug offenses are intended to
promote public health; prosecutions of insider trading are intended to ensure the stability and integrity
of financial markets; etc. The Supreme Court has clearly held that such broader motives cease to justify
warrantless searches at the moment the “immediate objective” shifts to criminal investigation or
prosecution.253 Thus, for instance, a hospital’s program to test obstetrics patients for drug use in order
to improve fetal health was struck down because it involved referring those who tested positive to
criminal authorities for prosecution.254
At bottom, the FISA Appeals Court’s analysis tries to have it both ways. On the one hand, the court
characterized foreign intelligence investigations as fundamentally different from ordinary criminal
investigations, to the point that the former may be labeled a “special need” and placed in an entirely
separate category for Fourth Amendment purposes. On the other hand, the court found criminal
proceedings to be such a fundamental and inextricable element of foreign intelligence investigations as
to render the “primary purpose” test arbitrary and unworkable. These premises are, at a minimum, in
tension.
Finally, courts have emphasized the need for close judicial scrutiny of the particular facts of each case to
ensure that foreign intelligence collection is not used as a cover for domestic surveillance . The routine
use of “back-door searches” by the FBI when opening any investigation or assessment strongly suggests
that Section 702 has become , in substantial part , a domestic law enforcement tool . Leaving aside
whether this practice undermines the constitutional reasonableness of the program as a whole, it
certainly would undermine the legitimacy of any given instance of surveillance that was undertaken with
the goal of obtaining information about a U.S. person through a “back-door search.” Only close judicial
review can discern whether that is the case.
Yet no such scrutiny takes place under the current system. As discussed, there is rarely an opportunity
for after-the-fact review of the sort conducted by the courts of appeal in Truong and other foreign
intelligence cases. Even when a traditional, individualized FISA order is used to target a U.S. citizen and
the government discloses this fact in a criminal proceeding, the defendant is prohibited from seeing the
materials comprising the government’s application, which not only limits the defendant’s ability to
challenge the order but also significantly handicaps the court’s ability to adjudicate its validity.255
Nor does any court review particular cases or targets prior to collection under either Section 702 or the
Section 215 bulk collection program. Indeed, under Section 702, the FISA Court conducts no
individualized inquiry whatsoever and is barred from performing any substantive review of the
government’s certification of a “foreign intelligence” purpose. This forced judicial passivity is a far cry
from the microscopic examination courts have deemed necessary256 to ensure that foreign intelligence
surveillance does not become an end run around the Fourth Amendment’s warrant requirement.
FISA courts allow targeting of domestic individuals – they don’t provide a check
on domestic surveillance
Goitein and Patel 15 - Elizabeth (Liza) Goitein co-directs the Brennan Center for Justice’s Liberty and National Security Program. Served
as counsel to Sen. Russell Feingold with a particular focus on government secrecy and privacy rights. Was a trial attorney in the Federal
Programs Branch of the Civil Division of the Department of Justice. Graduated from the Yale Law School and clerked for the Honorable Michael
Daly Hawkins on the U.S. Court of Appeals for the Ninth Circuit. Faiza Patel serves as co-director of the Brennan Center for Justice’s Liberty and
National Security Program. Clerked for Judge Sidhwa at the International Criminal Tribunal for the former Yugoslavia. Ms. Patel is a graduate of
Harvard College and the NYU School of Law. (Elizabeth and Faiza, “What went wrong with the FISA court”, Brennan Center for Justice at New
York University School of Law, 2015, p.3-5//DM)
In the years since then, however, changes in technology and the law have altered the constitutional
calculus. Technological advances have revolutionized communications. People are communicating at a
scale unimaginable just a few years ago. International phone calls, once difficult and expensive, are now
as simple as flipping a light switch, and the Internet provides countless additional means of international
communication. Globalization makes such exchanges as necessary as they are easy. As a result of these
changes, the amount of information about Americans that the NSA intercepts, even when targeting
foreigners overseas, has exploded.
Instead of increasing safeguards for Americans’ privacy as technology advances, the law has evolved in
the opposite direction since 9/11. It increasingly leaves Americans’ information outside its protective
shield. While surveillance involving Americans previously required individualized court orders, it now
happens through massive collection programs (known as “programmatic surveillance”) involving no
case-by-case judicial review. The pool of permissible targets is no longer limited to foreign powers —
such as foreign governments or terrorist groups — and their agents. Furthermore, the government may
invoke the FISA Court process even if its primary purpose is to gather evidence for a domestic criminal
prosecution rather than to thwart foreign threats.
Much has been written about the effect of these developments on Americans’ privacy, not to mention
the lawfulness of the NSA’s actions. But these developments also have had a profound effect on the role
exercised by the FISA Court. They have caused the court to veer off course, departing from its traditional
role of ensuring that the government has sufficient cause to intercept communications or obtain records
in particular cases and instead authorizing broad surveillance programs. It is questionable whether the
court’s new role comports with Article III of the Constitution, which mandates that courts must
adjudicate concrete disputes rather than issuing advisory opinions on abstract questions. The
constitutional infirmity is compounded by the fact that the court generally hears only from the
government, while the people whose communications are intercepted have no meaningful opportunity
to challenge the surveillance, even after the fact.
Moreover, under current law, the FISA Court does not provide the check on executive action that the
Fourth Amendment demands. Interception of Americans’ communications generally requires the
government to obtain a warrant based on probable cause of criminal activity. Although some courts
have held that a traditional warrant is not needed to collect foreign intelligence, they have imposed
strict limits on the scope of such surveillance and have emphasized the importance of close judicial
scrutiny in policing these limits. The FISA Court’s minimal involvement in overseeing programmatic
surveillance does not meet these constitutional standards.
Fundamental changes are needed to fix these flaws. Following Snowden’s disclosures, several bills were
introduced to try to ensure that the court would hear the other side of the argument, generally from
some type of public advocate. Other bills addressed the court’s secrecy by requiring the executive
branch to declassify significant opinions or release summaries. These proposals would make important
improvements, but they do not address the full range of constitutional deficiencies resulting from the
changes in law and technology detailed in this report. The problem with the FISA Court is far broader
than a particular procedure or rule. The problem with the FISA Court is FISA.
The report proposes a set of key changes to FISA to help restore the court’s legitimacy.
 Congress should end programmatic surveillance and require the government to obtain judicial
approval whenever it seeks to obtain communications or information involving Americans. This
would resolve many constitutional concerns.
 Congress should shore up the Article III soundness of the FISA Court by ensuring that the
interests of those affected by surveillance are represented in court proceedings, increasing
transparency, and facilitating the ability of affected individuals to challenge surveillance
programs in regular federal courts.

Finally, Congress should address additional Fourth Amendment concerns by ensuring that the
collection of information under the rubric of “foreign intelligence” actually relates to our
national security and does not constitute an end-run around the constitutional standards for
criminal investigations.
Under today’s foreign intelligence surveillance system, the government’s ability to collect information
about ordinary Americans’ lives has increased exponentially while judicial oversight has been reduced to
near-nothingness. Nothing less than a fundamental overhaul of the type proposed here is needed to
restore the system to its constitutional moorings.
The significant purpose test allows domestic surveillance as long as there is
some foreign intelligence purpose
Goitein and Patel 15 - Elizabeth (Liza) Goitein co-directs the Brennan Center for Justice’s Liberty and National Security Program. Served
as counsel to Sen. Russell Feingold with a particular focus on government secrecy and privacy rights. Was a trial attorney in the Federal
Programs Branch of the Civil Division of the Department of Justice. Graduated from the Yale Law School and clerked for the Honorable Michael
Daly Hawkins on the U.S. Court of Appeals for the Ninth Circuit. Faiza Patel serves as co-director of the Brennan Center for Justice’s Liberty and
National Security Program. Clerked for Judge Sidhwa at the International Criminal Tribunal for the former Yugoslavia. Ms. Patel is a graduate of
Harvard College and the NYU School of Law. (Elizabeth and Faiza, “What went wrong with the FISA court”, Brennan Center for Justice at New
York University School of Law, 2015, //DM)
Another critical change made by the Patriot Act was accomplished by revising two words. Previously,
FISA allowed the government to obtain surveillance orders if it certified that “the purpose” of
surveillance was the acquisition of foreign intelligence. Under the Patriot Act, however, the government
need only certify that acquiring foreign intelligence is “a significant purpose” of the surveillance.133 In
addition, the Patriot Act provided that federal officers who conduct electronic surveillance to acquire
foreign intelligence information “may consult with” law enforcement officials to protect against attack
or other hostile acts by foreign powers or their agents.134
A complex history underlies these deceptively simple changes. As discussed in Part II.A.3, the courts that
recognized a foreign intelligence exception to the warrant requirement generally held that collecting
foreign intelligence must be the “primary purpose” of surveillance. This condition served to ensure that
foreign intelligence wasn’t used as a pretext for warrantless searches in domestic criminal cases.
Discerning which motive predominates in any mixed-motive case, however, is a difficult endeavor. If the
NSA or FBI wiretaps someone to obtain foreign intelligence, and the Justice Department simultaneously
wishes to preserve the option of a criminal prosecution against that person, which is the “primary”
purpose? In United States v. Truong, the Fourth Circuit looked to the role that criminal prosecutors
played in the foreign intelligence investigation. If it appeared that the prosecutors were excessively
involved in the foreign intelligence surveillance, the court reasoned, one could conclude that the
primary purpose of the surveillance was law enforcement.135
Following this decision, the Justice Department voluntarily adopted a set of practices designed to
facilitate the sharing of information between intelligence and law enforcement components, while
avoiding any appearance that prosecutors were directing the intelligence investigations. A version of
these practices ultimately was formalized in a series of memoranda and procedures issued between
1995 and 2001.136
The procedures, taken together, encouraged consultation between prosecutors and intelligence officials
in a variety of ways — for example, by requiring intelligence investigators to report indications of
significant federal crimes to the Justice Department, and by requiring senior intelligence officials to
provide monthly briefings to officials overseeing criminal matters.137 At the same time, the procedures
included provisions to ensure that the Criminal Division of the Justice Department would not deploy
FISA surveillance as a tool to gather evidence for criminal prosecutions, thus making an end run around
the traditional Fourth Amendment warrant requirement. While the Criminal Division could provide
advice on intelligence investigations, it could not “direct[] or control[]” them, and it could not “instruct
the FBI on the operation, continuation, or expansion of FISA electronic surveillance or physical
searches.”138 Moreover, intelligence investigators needed approval from FBI headquarters and another
Justice Department component to share certain portions of their investigative memoranda with law
enforcement.139
In its first published opinion, the FISA Court in 2002 described these procedures as permitting “broad
information sharing,” as well as “substantial consultation and coordination.”140 Nonetheless, there was
a strong perception within the government that the procedures erected a “wall” between intelligence
and law enforcement that inhibited robust cooperation. This impression was echoed in the findings of a
May 2000 report by the Attorney General’s Review Team141 and a July 2001 report by the General
Accounting Office.142 After 9/11, the “wall” was blamed for impeding cooperation that conceivably
could have averted the attacks, and it was dismantled.143
To discourage any limits on coordination, Congress amended FISA to expressly permit consultation
between intelligence and law enforcement officials, and to provide that foreign intelligence acquisition
need only be a “significant” purpose of surveillance.144 As a result, when obtaining a traditional FISA
order, even if the primary purpose of surveillance is to build a prosecution against an American citizen,
the government is empowered to collect that person’s communications without making the probable
cause showing required in criminal cases as long as collection of foreign intelligence is a secondary aim.
2ac – warrant requirement solves
Fourth Amendment warrant requirement essential to addresses public trust
Heymann, 15 [Philip B, former Deputy Attorney General in the Clinton administration and currently a
law professor at Harvard Law School, AN ESSAY ON DOMESTIC SURVEILLANCE,
file:///C:/Users/Jonah/Downloads/Lawfare-Philip-Heymann-SURVEILLANCE-for-publ-10-May-2015.pdf]
Schloss4
The way the 4th Amendment works is straightforward; comprehensible to Americans who would
distrust a secret reliance merely on search terms; and surprisingly useful. To search any place, record, or
communication which is not freed, by Supreme Court doctrine, of the 4th Amendment obligations of
probable cause and a warrant to search any place, record, or communication which is not excepted by
Supreme Court doctrine from 4th Amendment obligations of a probable cause and a warrant (with some
exceptions) requires a factual basis for thinking it probable (or, in some cases, by reasonably suspecting)
that evidence of either a crime or a specified national danger will be found in a particular place (or in a
particular communication). A court, having satisfied itself of such a “predicate,” must certify that fact
and authorize a search or electronic surveillance and specify the conditions under which it may take
place.
The attributes and advantages of this system are immense. Consider six wonders of the 4th
Amendment:
(1) The system is entirely comprehensible and makes perfect sense to a very high percentage of
Americans who would never understand or trust the neutrality of government officials furnishing secret
search terms to technicians at the NSA.
(2) The way it works makes unnecessary any substantial effort to establish that the costs in terms of
privacy of a particular search are less than benefits to law enforcement or national security. It does not
require an extraordinarily complicated balancing of the amount of damage a search does to privacy
versus the amount of value it adds in terms of reduced crime or reduced danger to national security.
While we would like to allow only those searches whose cost in terms of citizen insecurity are
outweighed by the benefits in terms of solving or preventing a crime, the cost of making that judgment
in the case of each individual search would be immense.
Consider how difficult it would be to weigh each of the categories – costs and benefits – to determine
where the balance falls. The cost to citizens’ sense of privacy depends on, among other things, the fears
of government misuse of the power to search and that itself depends on whether the subject of the
search was known or anonymous when the search took place, how sensitive the information to be
acquired was, how private was the location where the information was found, how much was learned
about a single individual, and how carefully the information was retained and not disseminated. On the
other side of the balance, the benefits of surveillance are equally fact-dependent. They depend in each
case on how dangerous is the activity that is subject to surveillance, what alternative ways there are to
learn about it, how useful (or alternatively unnecessary) the information likely to be found is in ending
that danger, the inability of targets to find out about the manner of surveillance and thereby avoid it,
and the likely promptness of discovery of evidence.
Any such costly analysis of the trade-off between cost and benefits of a particular case is replaced under
the 4th Amendment by simply requiring a showing that evidence of a crime or of a grave future threat
would be found in the place or communication and at the time of the search or electronic surveillance.
The police can quickly know what they are allowed and forbidden to do. The cost of this radically
simplified balance is merely that a search is allowed even when the benefits of solving the crime may be
relatively unimportant. Yet this does not detract greatly from the security individuals can feel under the
4th Amendment.
(3) Use of 4th Amendment standards provides assurance of privacy to the vast majority of citizens who
are likely to know whether there is probable cause to search their places or surveil their
communications.
(4) At the same time, it prevents foolish or abusive government searches, an important check on the
efficiency and excesses of law enforcement.
(5) The system of the 4th Amendment, unlike a grand jury subpoena for documents, does not tip off the
suspect that he is about to be searched (and thus should hide or destroy any evidence). The suspect
takes no part in the decision of the court to issue a warrant.
(6) The 4th Amendment manages to do these things without making known to the suspect, even after a
search or an arrest, the identity of any informant who has decided to subject a dangerous suspect to the
risk of a search or electronic surveillance of his communications. The informant’s identity may and will
be kept secret.
2ac – FISA curtailment key
Curtailing NSA authority under FISA is the most effective action the US can take
Donohue, 14 - Professor of Law, Georgetown University Law Center (Laura, “HIGH TECHNOLOGY,
CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY”, Georgetown University Law Center, 17
September 2014,
http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1119&context=cong)//gg
Numerous steps could be taken by Congress to address the situation in which U.S. industry currently
finds itself. The most effective and influential decision that legislators could take would be to curb the
NSA’s authorities under the Foreign Intelligence Surveillance Act . This action has two components:
first, ending the telephony metadata collection program and, second, restricting the use of to/from, or
about collection under upstream interceptions. Both programs would further benefit from greater
transparency, to make it clear that their aim is to prevent foreign aggression and to prevent threats to
U.S. national security—not to engage in the interception of trade secrets or to build dossiers on other
countries’ populations.
The second most effective change that could be undertaken would be to introduce stricter privacy
controls on U.S. companies, in the process bringing the United States into closer line with the principles
that dominate in the European Union. The two entities are not as far apart as the dialogue might have
one assume, and so changes required in this sphere would be minimal. Together, these two
alterations—curbing the NSA surveillance programs and providing increased consumer protections for
privacy—would allow U.S. industry to argue changed circumstance to allow companies to again become
competitive for contracts and markets to which they seek access.
A third alteration that would make a substantial difference over the longer term relates to the national
security infrastructure. The current failure of the United States to integrate economic concerns creates a
vulnerability for the country in terms of the breadth and depth of programs subsequently adopted. New
thought needs to be given to how to take on board—and mitigate—potentially devastating economic
consequences of government surveillance efforts.
FISA reforms that change PRISM and upstream are key to restoring US
credibility
Donohue, 14 - Professor of Law, Georgetown University Law Center (Laura, “HIGH TECHNOLOGY,
CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY”, Georgetown University Law Center, 17
September 2014,
http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1119&context=cong)//gg
In addition to the economic impact of NSA telephony metadata collection (discussed, infra), the program
runs contrary to Congressional intent in introducing the Foreign Intelligence Surveillance Act, contradicts
the statutory language, and violates the Fourth Amendment.94 In 2014 the Privacy and Civil Liberties
Oversight Board came to a similar conclusion,95 as did the President’s own appointed Review Group,
charged with considering the telephony metadata collection program, in 2013.96
Accordingly, the President announced on January 17, 2014 that he was “ordering a transition that will
end the Section 215 bulk metadata program as it currently exists, and establish a mechanism that
preserves the capabilities we need without the government holding this bulk metadata.”97 The
alternative approach was to be developed by March 28, 2014. Nine months later, on September 13,
2014, the Foreign Intelligence Surveillance Court approved DOJ’s request to extend the program for
another 90 days—without any transition program in place.
Although the President issued a new presidential directive in January 2014 for U.S. signals intelligence
activities both at home and abroad, the classified nature of parts of the document, international
skepticism about the Administration’s commitment to privacy, and the failure of the Administration to
make good on its promise of transition to a new program meant that the global community, with good
reason, has questioned whether anything has really changed. No new legislation is in place that would
provide limits on the Executive Branch beyond those that operated for the duration of the bulk
collection program.
As a matter of Section 702 and the interception of international content, both PRISM and upstream
collection present global concerns—neither of which have been addressed through any legislative
change. The existence of these programs, while perhaps statutorily consistent with the FISA
Amendments Act, as well as constitutionally sufficient with regard to the interception of non-U.S.
persons communications, where the individual is reasonably believed to be located outside the United
States, as a policy matter, goes some way towards undermining international confidence in U.S.
companies.
The Fourth Amendment does not reach non-U.S. persons based overseas who lack a substantial
connection to the United States.98 Writing for the Court in United States v. Verdugo-Urquidez, Chief
Justice Rehnquist concluded that “the people” referred to in the Fourth Amendment indicate a
particular group—not merely people qua people.99 His reading stems from a deeply Aristotelian
approach: i.e., one that emphasizes membership in the polis ( ), or political community, as a
concomitant of forming a structure of government.100 As members of the polis, U.S. persons, both
distributively and collectively, obtain the protections of the constitution.
Looked at in this regard, the Constitution itself embodies the collective organization of “the people” into
one entity. “U.S. persons” and “the people” are therefore one and the same. The “right of the people”
thus refers to a collective group of individuals “who are part of a national community or who have
otherwise developed sufficient connection with this country to be considered part of that
community.”101
Very few cases address precisely what constitutes sufficient contact with the United States to satisfy the
“substantial connections” aspect of the majority’s decision. Those that do point in seemingly different
directions.102 At a minimum, however, it would be extraordinary to assume that simply because an
individual uses a U.S. company, he or she thereby gains the protections of the Fourth Amendment. This
was the basic argument underlying the “modernization” of FISA in the first place, to take account of bad
actors, communicating overseas, who would suddenly fall within the more protective FISA regime
merely because their communications happened to come within U.S. territory by nature of the carrier in
question.
Even recognizing, however, that few constitutional barriers may apply to the programmatic use of
Section 702 insofar as it is applied to non-U.S. persons (leaving aside the questions that accompany the
incidental collection of U.S. persons’ information, as well as entirely domestic conversations), as a
matter of policy, certainly both PRISM and the use of to/from or about collection in upstream gathering
has dramatically undermined U.S. industry. As a matter of policy, therefore, greater restrictions, more
transparency, and more effective oversight of the international collection of content may help to alter
the situation with regard to the skepticism expressed towards U.S. companies.
AT: Warrant links to terrorism
The plan is middle ground ---a warrant requirement still allows surveillance
necessary to stop terrorism
Heymann, law professor, 15 [Philip B, former Deputy Attorney General in the Clinton
administration and currently a law professor at Harvard Law School, AN ESSAY ON DOMESTIC
SURVEILLANCE, file:///C:/Users/Jonah/Downloads/Lawfare-Philip-Heymann-SURVEILLANCE-for-publ-10May-2015.pdf] Schloss4
“Big
data” technology has greatly increased our capacity to draw conclusions from collections of nearpublic data such as these – to discover what characteristics of several collections, if combined
appropriately, are predictive of the future or revealing of a role in a past event. The techniques of big data analysis
may well reveal very personal and sensitive information about the prior or future activities of a readily identifiable individual.
We need a check on this – but not a prohibition . Allowing the government to collect and process such
information may turn out to be extremely useful in protecting our security and moreover not invasive of
the privacy of most members of the group that the data describes. So we need a middle ground
between an unchecked power to search, to be followed by analysis with other data, on the one hand,
and a flat denial of access to such data held by third parties, on the other. We need a different type of
predicate that would provide 18 some of the privacy protections of a warrant in these situations of
reduced privacy, while still allowing the use of Big Data processing to develop information and
conclusions useful to our security.
We thus need a middle ground. If our privacy is to be protected against searches and analyzing processing of
third-party records, it must be by rules that don’t require a warrant particularly describing the things to
be seized. At the time a data file is obtained, we often won’t know what about it is likely to be revealing. If the government’s use
of big data is to contribute to our safety, the predicate for the legal authorization granted by a warrant
should be a showing of a serious need for using techniques of big data analysis to draw conclusions
about individuals and private matters from previously collected fields of data – not what information
about the activities of a particular suspect we expect to find.
B. MODEL STATUTORY LANGUAGE
The plausible middle ground is that the government must, and should be able to, seek a warrant to
obtain non-private information that can be used to predict or identify private information about
individuals. As an example, consider a possible statute with the following provisions:
(i) To obtain a warrant [under this section] the government must provide specific and articulable facts
showing reason to believe that any data sought under this provision will, if analyzed in specified ways
and in connection with other specified data files, be likely to provide significant assistance in an ongoing
investigation either of a felony committed under federal or state laws or of a particular, identified
foreign threat. The court may grant access to sharply limited data without such a showing only if the
government satisfies the court that only with such access to information to be used for discovering and
testing correlations can it satisfy the standard set forth above.
(ii) The court shall not grant access to more data than is shown to be necessary for these purposes. If in
the course of this or another investigation the data made available to the government under this section
is to be used with other techniques and/or other data files or in a different ongoing investigation, a new
warrant must be obtained for such new uses of the previously acquired data.
(iii) Any warrant obtained under this provision shall provide for the prompt destruction of any
information obtained under the warrant if it is not relevant to the investigative purposes for which the
warrant was issued – other than information concerning a different felony or a different foreign threat.
Any data files obtained under the warrant and any copies thereof will be destroyed within three years of
acquisition unless a new warrant is obtained.
FCC version
FCC 1ac
FCC 1ac – NSA overreach
Contention 1 – NSA overreach
Legal prohibitions bar NSA domestic surveillance – but the lack of a credible
oversight mechanism means the NSA actively captures US person data through
section 702 and XO 12333
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
The NSA, originally formed to monitor outside threats to the security of the United States, has
increasingly turned its surveillance towards the American public.7 The NSA was originally formed in
1952 growing out of intelligence and cryptology analytics developed during WWII, which naturally
developed the agency’s mission to monitor threats coming from outside the United States.8 Today, the
NSA is “authorized to collect, process, analyze, produce, and disseminate signals intelligence
information and data for foreign intelligence and counterintelligence purposes to support national and
departmental missions, and to provide signals intelligence support for the conduct of military
operations.”9
Under the letter of the law , this power is significantly limited in the domestic arena. The Foreign
Intelligence Surveillance Act of 1978 (“FISA”)10 bars the NSA from intercepting any domestic, electronic
communications of persons inside the United States unless a judge on the Foreign Intelligence
Surveillance Court (“FISA Court”) issues a warrant upon finding that “the purpose of the surveillance is
to obtain foreign intelligence information . . . and there is probable cause to believe that the target of
the surveillance is an agent of a foreign power.”11 FISA also places various restrictions on other forms of
domestic surveillance activities that do not intercept the contents of communications, such as the
“installation and use” of pen registers or trap and trace devices, which capture the origin and
destination of phone calls or other communications to and from a particular telephone number or other
device.12 In 2001, Congress substantially expanded FISA with the USA PATRIOT Act,13 adding, among
other provisions, a section that authorizes the Director of the Federal Bureau of Investigation (“FBI”)—or
FBI agents designated by the Director—to petition the FISA Court for “an order requiring the production
of any tangible things . . . for an investigation to obtain foreign intelligence information not concerning a
United States person or to protect against international terrorism or clandestine intelligence
activities.”14 Moreover, under Executive Order 12,333, when the NSA conducts intelligence-gathering
activities abroad—which are not regulated by FISA15—it may collect, retain, or disseminate information
about United States persons “only in accordance with procedures established by the head of the agency
and approved by the Attorney General.”16
Despite its foreign-centric mission and the express limits on its domestic authority , the NSA has
increasingly turned its attention to activities of persons within the United States in the wake of 9/11. For
instance, in 2006, it was discovered that the NSA had created a call database in 2001 that collected tens
of millions of citizens’ phone records from data provided by AT&T, Verizon, and BellSouth.17 “[T]he
largest database ever assembled in the world” at the time, its goal was to log “every call ever made
within the nation’s borders.”18 The NSA itself has acknowledged its serious obligation to operate
effectively in an increasingly interconnected and globalized world without stepping on the toes of civil
liberties for the sake of national security.19
Additionally, the NSA’s intrusions into domestic communications extend beyond call data to reach
citizens’ activity on the Internet.20 For years, the NSA “unlawfully gathered tens of thousands of emails
and other electronic communications between Americans” as part of the agency’s broader collection of
communications as they “flow across Internet hubs” under Section 702 of FISA.21 Pursuant to these
practices, the NSA may have intercepted as many as 56,000 domestic electronic communications
through various methods, 22 some of which the FISA Court has found unconstitutional.23
The disclosure of these NSA practices triggered a substantial backlash . Many Americans reacted by
taking steps to insulate themselves from what they considered unwarranted government intrusion on
their private lives and activities.24 Even though several crucial FISA Court rulings have been partially
declassified and released to the public25 in an effort to demonstrate that the NSA’s powers are not
unrestrained, public trust and confidence in the agency has clearly diminished.26 In the wake of these
disclosures, forty-five percent of Americans felt that the government went too far in its surveillance
programs pursuant to anti-terrorism efforts.27 This “massive swing” in public opinion about government
policies embodies “the public reaction and apparent shock at the extent to which the government has
gone in trying to prevent future terrorist incidents.”28 Coupled with the steps that many Internet users
are taking to prevent government intrusion on their online activities and communication, this shift in
public opinion shows that Americans are dissatisfied with the reach of government surveillance.29
Existing oversight mechanisms guarantee NSA circumvention of prohibitions on
domestic surveillance – that creates a confidence crisis in the future of the
internet
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
III. OVERSIGHT IS NEEDED, AND THE FCC SHOULD PROVIDE IT
A. Existing executive and legislative oversight mechanisms are inadequate in promoting efficiency and
public confidence in the NSA.
The executive and legislative mechanisms currently in place to provide oversight of the NSA are
inadequate in promoting public confidence and effective national security. Ostensibly, the activities of
the NSA are generally governed by the Constitution, federal law, executive orders, and regulations of
the Executive Branch.41 On the legislative side, there are two congressional bodies—the House
Permanent Select Committee on Intelligence (“HPSCI”) and the Senate Select Committee on Intelligence
(“SSCI”) —that are responsible for ensuring that the NSA follows the applicable laws and regulations.42
In the executive branch, NSA oversight is vested in the President’s Intelligence Advisory Board, the
Office of the Director of National Intelligence, and the Department of Justice.43 Ostensibly, in addition
to these legislative and executive oversight mechanisms, the NSA has also implemented internal
controls: the Office of the Inspector General performs audits and investigations while the Office of
Compliance operates to ensure that the NSA follows relevant standards.44 However, despite the
appearance of effective controls, these oversight mechanisms have failed to prevent the current public
crisis in confidence that the NSA is fulfilling its mission with the least possible adverse impact on the
privacy of U.S. citizens.
The authority of the NSA, subject to the above controls, is very limited on paper . Every intelligence
activity that the NSA undertakes is purportedly constrained to the purposes of foreign intelligence and
counterintelligence.45 For instance, Executive Order 12,333 provides the authority for the NSA to
engage in the “collection of communications by foreign persons that occur wholly outside the United
States.”46 Additionally, FISA authorizes the NSA to compel U.S. telecommunications companies to assist
the agency in targeting persons who are not U.S. citizens and are reasonably believed to be located
outside the United States.47
However, despite the appearances of controls , both external and internal, the “communications of U.S.
persons are sometimes incidentally acquired in targeting the foreign entities.”48 The varying types of
data gathered can produce a “detailed map” of a given person’s life based on those persons with whom
they are in contact.49 For instance, metadata can be used to piece together substantial information
about relationships; this information includes who introduced two people, when they met, and their
general communication patterns, as well as the nature and the extent of their relationships.50 The
recently disclosed collection of contact lists by the NSA has not been authorized by Congress or FISA.51
Additionally, while other collection policies that touch upon domestic communications, such as those
under Section 702, have authorization, often neither lawmakers nor the public have even a rough
estimate of how many communications of U.S. citizens are being acquired.52
The NSA is easily able to operate around its apparent lack of authority. One anonymous official has been
quoted as saying that the NSA consciously avoids the restrictions placed on it by FISA by collecting this
information from access points all over the world.53 This method means that the NSA is not required to
restrict itself to collecting contact lists belonging to specified intelligence targets.54 The collection
mechanism ostensibly operates under the assumption that the bulk of the data collected through the
overseas access points is not data from American citizens.55 However, this is not necessarily true due to
the globalized nature of the Internet as a communications infrastructure, as “data crosses boundaries
even when its American owners stay at home.”56
The oversight mechanisms currently applied to this collection program require the NSA only to satisfy its
own internal oversight mechanisms or to answer possible inquiries from executive branch that there is a
“valid foreign intelligence target” in the data collected.57 Moreover, congressional oversight is not
effective because members of Congress have candidly said they do not know precisely the right
questions to ask NSA officials.58 Often, in congressional hearings, NSA officials and other senior
members of the intelligence community are evasive unless directly pressed, and the congressional
committees are stymied by their lack of knowledge regarding just which questions need asking.59
Given the realities of the NSA overstepping its authority, there is no indication to the public that the
agency, even as it has been collecting data from American citizens, has been required to answer to its
various oversight mechanisms in an effective manner. In response, President Obama directed the
Privacy and Civil Liberties Oversight Board (“PCLOB”) to conduct two reports about NSA intelligence
gathering methods.60 The PCLOB is an independent, bipartisan agency within the executive branch
tasked with reviewing and analyzing executive branch actions taken in the name of national security to
determine whether appropriate consideration has been afforded to civil liberties in the development
and implementation of national anti-terrorism policy.61 The recent PCLOB Report emphasizes that there
is a:
compelling danger . . . that the personal information collected by the government will be misused to
harass, blackmail, or intimidate, or to single out for scrutiny particular individuals or groups . . . . while
the danger of abuse may seem remote, given historical abuse of personal information by the
government during the twentieth century, the risk is more than merely theoretical.62
The second report addressed more specifically Internet surveillance activities of the NSA—specifically
those undertaken pursuant to Section 702.63 These reports demonstrate that there is a serious risk of
abuse of the data collected by the NSA, as well illustrating the failings of current governmental oversight
of NSA data collection policies.
Moreover, according to some classified intelligence documents released by The Washington Post and
other outlets, the NSA appears to be overwhelmed by the sheer amount of data it is has collected,
which indicates that the mechanisms in place do not adequately help the NSA to focus its search. For
instance, the NSA has begun to implement a program (SCISSORS) in order to focus on the portion of the
data that is relevant amongst the mass of data collected.64 This is because the NSA was collecting broad
swaths of data with “little or no [foreign intelligence] information.”65 The first PCLOB report indicates
that the NSA metadata collection program does not pass any semblance of relevancy standards to target
the data to a specific question of national security; this is because the NSA does not have reason to
suspect the owners of the metadata, unlike in other cases where the collection was lawful.66
Thus, the current oversight system suffers from some serious failings. First, it does not allow for a
focused inquiry by the congressional committees. Additionally, the NSA can get around requirements
imposed on it by FISA by conducting Internet surveillance abroad that nonetheless captures U.S. data
flows , many of which traverse foreign networks. Moreover, the NSA has over-collected data with little
value to the agency’s national security mission, and therefore must sift through masses of data involving
regular American citizens while fighting a public battle about how much information the agency
collects.67 This all suggests deficiencies in the NSA’s oversight structure, as all preventive executive,
legislative, and internal controls have not been effective.
The perception of surveillance overreach wrecks the US internet freedom
agenda
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
The effects of the NSA disclosures on the Internet Freedom agenda go beyond the realm of Internet
governance . The loss of the United States as a model on Internet Freedom issues has made it harder
for local civil society groups around the world—including the groups that the State Department’s
Internet Freedom programs typically support203—to advocate for Internet Freedom within their own
governments.204 The Committee to Protect Journalists, for example, reports that in Pakistan, “where
freedom of expression is largely perceived as a Western notion, the Snowden revelations have had a
damaging effect. The deeply polarized narrative has become starker as the corridors of power push back
on attempts to curb government surveillance.”205 For some of these groups, in fact, even the
appearance of collaboration with or support from the U.S. government can diminish credibility, making
it harder for them to achieve local goals that align with U.S. foreign policy interests.206 The gap in trust
is particularly significant for individuals and organizations that receive funding from the U.S. government
for free expression activities or circumvention tools. Technology supported by or exported from the
United States is, in some cases, inherently suspect due to the revelations about the NSA’s surveillance
dragnet and the agency’s attempts to covertly influence product development.
Moreover, revelations of what the NSA has been doing in the past decade are eroding the moral high
ground that the United States has often relied upon when putting public pressure on authoritarian
countries like China, Russia, and Iran to change their behavior. In 2014, Reporters Without Borders
added the United States to its “Enemies of the Internet” list for the first time, explicitly linking the
inclusion to NSA surveillance. “The main player in [the United States’] vast surveillance operation is the
highly secretive National Security Agency (NSA) which, in the light of Snowden’s revelations, has come to
symbolize the abuses by the world’s intelligence agencies,” noted the 2014 report.207 The damaged
perception of the United States208 as a leader on Internet Freedom and its diminished ability to
legitimately criticize other countries for censorship and surveillance opens the door
for foreign leaders to justify—and even expand—their own efforts.209 For example, the Egyptian
government recently announced plans to monitor social media for potential terrorist activity, prompting
backlash from a number of advocates for free expression and privacy.210 When a spokesman for the
Egyptian Interior Ministry, Abdel Fatah Uthman, appeared on television to explain the policy, one
justification that he offered in response to privacy concerns was that “the US listens in to phone calls,
and supervises anyone who could threaten its national security.”211 This type of rhetoric makes it
difficult for the U.S. to effectively criticize such a policy. Similarly, India’s comparatively mild response to
allegations of NSA surveillance have been seen by some critics “as a reflection of India’s own aspirations
in the world of surveillance,” a further indication that U.S. spying may now make it easier for foreign
governments to quietly defend their own behavior.212 It is even more difficult for the United States to
credibly indict Chinese hackers for breaking into U.S. government and commercial targets without fear
of retribution in light of the NSA revelations.213 These challenges reflect an overall decline in U.S. soft
power on free expression issues.
The US needs to draw a sharp distinction between domestic and national
security surveillance to make the US Internet Freedom agenda credible –
otherwise global internet fragmentation will result
Fontaine, 14 – President of the Center for a New American Security; was foreign policy advisor to
Senator John McCain for more than five years; Worked at the State Department, the National Security
Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at
the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing
Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New
American Security, September 18, 2014, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf)//TT
The 2013 revelations of mass surveillance by the U.S. government transformed the global debate about
Internet freedom. Where once Washington routinely chided foreign governments and their corporate
collaborators for engaging in online censorship, monitoring and other forms of Internet repression, the
tables have turned. Edward Snowden, a former National Security Agency (NSA) contractor, leaked
thousands of documents revealing America’s most secret electronic surveillance programs, unleashing a
tidal wave of criticism and charges of hypocrisy, many directed at some of the very U.S. officials who
have championed online freedom.
America’s Internet freedom agenda – the effort to preserve and extend the free flow of information
online – hangs in the balance .1 Already a contested space, the Internet after the Snowden revelations
has become even more politically charged, with deep international divisions about its governance and
heated battles over its use as a tool of political change. With 2.8 billion Internet users today, and several
billion more expected over the next decade, the contest over online freedom grows more important by
the day.2 As an ever-greater proportion of human activity is mediated through Internet-based
technologies, the extent of online rights and restrictions takes on an increasingly vital role in political,
economic and social life.3
Despite the many complications arising from the Snowden disclosures, America still needs a
comprehensive Internet freedom strategy, one that tilts the balance in favor of those who would use the
Internet to advance tolerance and free expression, and away from those who would employ it for
repression or violence.4 It will need to pursue this strategy while drawing a sharp distinction between
surveillance for national security purposes (in which all governments engage) and monitoring as a
means of political repression (which democracies oppose). This is not an easy task, but it is an important
one. More than a year after the first Snowden revelations emerged, now is the time to reenergize the
Internet freedom agenda.
Internet Freedom before Snowden The U.S. government’s explicit pursuit of Internet freedom began
during the Bush administration’s second term. Among other steps, the establishment of the State
Department’s Global Internet Freedom Task Force aimed to coordinate efforts to promote Internet
freedom and to respond to online censorship.5 Building on this foundation, Secretary of State Hillary
Rodham Clinton made the expansion of online rights a major focus of U.S. foreign policy in the first
Obama term. Speaking in 2010, she cited Franklin Delano Roosevelt’s Four Freedoms and added a fifth,
the “freedom to connect – the idea that governments should not prevent people from connecting to the
Internet, to websites or to each other.”6 A year later, she pledged America’s “global commitment to
Internet freedom, to protect human rights” – including the rights to expression, assembly and
association – “online as we do offline.”7 And after the Arab Spring, the United States in 2011 established
the Freedom Online Coalition, a collaboration of 23 countries to coordinate efforts to expand global
Internet freedom.8
The U.S. government has backed up its words with resources. Since 2009, the State Department and
other government agencies have spent more than $125 million on Internet freedom programming.9 In
addition to the State Department’s efforts, other government agencies, including the Broadcasting
Board of Governors, the U.S. Agency for International Development, the Defense Advanced Research
Projects Agency and others, fund the development and deployment of tools aimed at expanding
Internet freedom. These programs invest in technologies that allow users to circumvent firewalls so as
to access censored material, communicate outside the watchful eye of autocratic regimes, secure their
websites and data, link computers in decentralized mesh networks, and establish new Internet
connections when existing ones have been cut.10 It supplements the provision of technology with
training programs in dozens of countries.
The Obama administration also took regulatory steps to promote Internet freedom, particularly after
technology demonstrably facilitated the 2009 Green Revolution in Iran and the 2011 Arab Spring. The
Treasury Department relaxed restrictions on the export of Internet-related software and services to Iran,
explicitly to “foster and support the free flow of information to individual Iranian citizens.”11 Two years
later, the White House issued an executive order that imposed sanctions on individuals who engaged in
computer and network disruption, monitoring and tracking on behalf of the governments of Iran or
Syria.12
The United States has aimed to promote the free flow of online information through diplomatic action
as well. State Department diplomats pressure repressive regimes to loosen their Internet restrictions,
free imprisoned bloggers and ensure that citizens can express themselves online without fear of
punishment. U.S. government officials have engaged in significant dialogue with U.S. and multinational
technology companies about their involvement in aiding Internet repression and in establishing
transparency standards. American diplomats have also pressed for Internet freedom in the proliferating
international fora that have taken up the issue. In 2012, for instance, the United States won approval of
a U.N. Human Rights Council resolution affirming that freedom of expression and other rights that
people have offline must also be protected online.13 Trade agreements have provided yet another
vehicle for the U.S. Internet freedom agenda with, for example, hortatory language in the U.S.-Korea
Free Trade Agreement calling for the free flow of online information.14
A key element of U.S. action has been aimed at preventing fundamental changes to the
multistakeholder model of Internet governance, which brings together individuals, governments, civil
society organizations, private firms and others for transparent and consensus-based decisionmaking.15
One such challenge arose at the December 2012 World Conference on International
Telecommunications, when 89 countries – a majority of ITU members in attendance – supported an
attempt by Russia, China, Iran and others to give governments greater control over the Internet.16
Despite opposition from the United States and others, the session ended with 89 countries signing the
revised treaty; 55 other countries did not. As a sign of what may come in future international treaty
negotiations, such numbers did not favor the multistakeholder model, and this was so even before the
Snowden revelations emerged to complicate U.S. efforts.
The Snowden Fallout and the Internet Freedom Agenda
The dramatic revelations about NSA spying that began to emerge in June 2013 provoked a storm of
international reaction.17 Political leaders expressed outrage at American surveillance practices and
threatened a raft of retaliatory measures. President Dilma Rousseff of Brazil cancelled a planned state
visit to the United States and the Brazilian government later organized an international meeting
(NetMundial) to discuss the future of Internet governance.18 German Chancellor Angela Merkel was
deeply affronted by the alleged monitoring of her personal cellphone. Chinese and other officials
charged America with blatant hypocrisy. The fallout affected the private sector as well; where previously
the focus of many observers had been on the aid given by U.S. companies to foreign governments
engaged in Internet repression, the gaze shifted to the role American corporations play – wittingly or
not – in enabling U.S. surveillance. Countries that had been the target of American reproaches rebuked
the U.S. government for what they saw as hypocrisy.
The United Nations and other international venues became platforms for international criticism of the
United States. Germany and Brazil together sponsored a resolution adopted by the U.N. General
Assembly in late 2013 backing a “right to privacy” in the digital age.19 In June 2014, the U.N. High
Commissioner for Human Rights issued a report that endorsed digital privacy as a human right and
criticized mass surveillance as “a dangerous habit rather than an exceptional measure.”20 Some
European officials began to question the existing Internet governance model itself. In a statement, the
European Commission said, “Recent revelations of large-scale surveillance have called into question the
stewardship of the US when it comes to Internet Governance. So given the US-centric model of Internet
Governance currently in place, it is necessary to broker a smooth transition to a more global model.”21
Nongovernmental groups that might otherwise be partners with the U.S. government in promoting
Internet freedom reacted sharply as well. Reporters Without Borders, for instance, listed the NSA as an
“Enemy of the Internet” in its 2014 report on entities engaged in online repression. Drawing no
distinction between surveillance aimed at protecting national security and surveillance intended to
suppress free expression and political dissent, the organization declared the NSA “no better than [its]
Chinese, Russian, Iranian or Bahraini counterparts.”22 Mass surveillance methods used by democracies
like the United States, it added, are “all the more intolerable” as they “are already being used by
authoritarian countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own
violations of freedom of information.”23 Tim Berners-Lee, the inventor of the World Wide Web, said,
“Mass surveillance is the most immediate threat to the open Internet and the most insidious because
we can’t see it.”24 The Electronic Frontier Foundation asserted that “mass surveillance is inherently a
disproportionate measure that violates human rights,”25 and officials with Human Rights Watch
observed that the surveillance scandal would render it more difficult for the U.S. government to press
for better corporate practices and for companies to resist overly broad surveillance mandates. “Now,”
its chief researcher said, “the vision and credibility of the U.S. and its allies on Internet freedom is in
tatters.”26
The reactions to the Snowden disclosures threatened to go beyond verbal denunciations, diplomatic
protests and critical press. The most serious commercial fallout came in the rising support for data
localization requirements . Russia in July 2014 approved legislation that requires data operators to store
the personal data of its citizens within the country’s borders.27 Indonesia, Brazil and Vietnam have also
called for their citizens’ data held by companies such as Facebook to be stored domestically.28 Data
localization has been debated in the European Parliament and elsewhere on the continent as well.29
Apart from the chilling effect on innovation and the loss of business to America companies, Internet
freedom itself could become a casualty of such mandates. If a user’s data must be held within the
borders of a repressive country, its government will have new opportunities to censor, monitor and
disrupt online information flows.
Such moves, combined with increasing questions about the multistakeholder approach to Internet
governance (and possible support for a governmentdriven approach), together give rise to concerns
about the potential “Balkanization” of the Internet, in which a constellation of national-level systems
could take the place of the current global online infrastructure. As former NSA general counsel Stewart
Baker warned, “The Snowden disclosures are being used to renationalize the Internet and roll back
changes that have weakened government control of information.”30
This is evident in other proposed steps as well. Brazil and the European Union have announced plans for
an undersea cable that would route data transmissions directly between Europe and Latin America and
bypass the United States.31 The European Union threatened to suspend the Safe Harbor data-sharing
agreement with the United States and promulgated new rules for it that EU officials said stemmed
directly from worries after the Snowden disclosures.32
Data localization will end internet freedom and cause global democratic
rollbacks
Hill, 14 – Internet Policy at U.S. Department of Commerce (Jonah, “The Growth of Data Localization
Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business Leaders”, The Hague
Institute for Global Justice, Conference on the Future of Cyber Governance, 2014 , May 1, 2014,
SSRN)//TT
Free Expression and Internet Freedoms Are Not Well Served
Most troubling of all the potential harms of data localization is its effect on free expression and Internet
freedom. This is ironic, in that to many of its advocates, data localization is a remedy to the threat posed
by the NSA to free expression and Internet freedom. I suggest that the opposite is actually true, that the
“remedy” only serves to make the danger greater.
The Internet and other online media have become indispensable tools for individuals to communicate
globally, and have furthered individual participation in the political process, increased transparency of
governmental activities, and promoted fundamental rights. Data localization, by centralizing control
over digital infrastructure, can diminish this capacity in a number of ways. As was discussed above, data
localization as a local server or local data storage requirement can limit freedom by permitting countries
more easily to collect information on their citizens (through domestic surveillance). It allows a
government more quickly and effectively to shut down Internet services (usually via legal threats to local
Internet service providers) that the government believes is abetting unwanted political opposition. 115
Data localization mandates also can obstruct Internet freedom in other, indirect ways. Restricted
routing, in particular, is problematic, because it is not technically possible as the existing Internet is
designed or organized. Unlike the telephone network, the Internet operates under a model known as
“best effort delivery,” where data is delivered to its destination in the most efficient manner possible,
without predetermined routes. For instance, data sent from the United States to Botswana will attempt
to travel along the shortest and most direct route possible. However, if there is a bottleneck along the
shortest route, a packet may find a longer but more expeditious route. This is a core feature of the
Internet that makes network congestion easy to navigate around. In order to restrict data routing to
specific geographies as governments are advocating, all Internet routers that are currently programmed
to follow this “best effort” routing model would have to be reconfigured to prohibit data from one
country from moving through the territory of “prohibited” countries. Moreover, since Internet
addresses are not always assigned according to a specific geography, the Internet’s addressing system
currently would have to be dramatically altered as well. Thus, the Border Gateway Protocol (one of the
core Internet networking protocols), the Internet’s routing tables (the address books by which routers
send data), and the process by which IP addresses are allocated, would all have to be modified. Such an
undertaking would require a fundamental overhaul not only of the Internet’s operating structures, but
also of the governance structures by which those structures are implemented and standardized.
These are not just arcane concerns of those involved in Internet governance, although they surely are
matters that greatly trouble those who favor an efficient and interoperable Internet. These alterations in
the way the Internet works will, I believe, materially restrict the power of the Internet to support free
expression. These modifications to these core characteristic of the current Internet – modifications that
localization would require – may result in intelligence agencies acquiring a previously unavailable
capacity to assess where data had originated and where it was heading, because the origin and
destination information would be included in the data packet.116 A centralized governance process,
further, which would be required to change the routing protocols and IP allocation system, would give
authoritarian countries significantly more influence over how information on the Internet is regulated.
In fact, this is one of the main reasons why China, Russia, many Arab states (among others) have pushed
for tracked routing protocols in the past, 117 just as they have lobbied for a handover of the global
Internet governance system to the U.N.’s International Telecommunications Union. 118
In short, localization would require dramatic changes to the current structure of the Internet, changes
that would have adverse consequences for those who see it as a principal – if not the principal – means
of global democratization . For some, those adverse consequences would be unintended; more
chillingly, there are those who intend precisely those consequences. This would be an enormous price
to pay, particularly since the other objectives that are promoted as justifications for localization –
namely, security for communications and economic development – are illusory.
Democracy as spread by the global internet is vital to the emergence of global
publics – that’s the key to solving all existential impacts
Keane, 11 – Professor of Politics at the University of Sydney (John, “Democracy in the Age of Google,
Facebook and WikiLeaks” http://sydney.edu.au/arts/downloads/news/ALR.pdf)
Communicative abundance enables one other trend that is of life-and-death importance to the future
of democracy : the growth of cross-border publics whose footprint is potentially or actually global in
scope.
The Canadian Scholar Harold Innis famously showed that communications media like the wheel and the
printing press and the telegraph had distance-shrinking effects, but genuinely globalised communication
only began (during the nineteenth century) with overland and underwater telegraphy and the early
development of international news agencies like Reuters. The process is currently undergoing an
evolutionary jump, thanks to the development of a combination of forces: wide-footprint geo-stationary
satellites, weblogs and other specialist computer-networked media, the growth of global journalism and
the expanding and merging flows of international news, electronic data exchange, entertainment and
education materials controlled by giant firms like Thorn-EMI, AOL/Time-Warner, News Corporation
International, the BBC, Al Jazeera, Disney, Bertelsmann, Microsoft, Sony and CNN.
Global media linkages certainly have downsides for democracy. Global media integration has
encouraged loose talk of the abolition of barriers to communication (John Perry Barlow). It is said to be
synonymous with the rise of a ‘McWorld’ (Benjamin Barber) dominated by consumers who dance to the
music of logos, advertising slogans, sponsorship, trademarks and jingles. In the most media-saturated
societies, such as the United States, global media integration nurtures pockets of parochialism; citizens
who read local ‘content engine’ newspapers like The Desert Sun in Palm Springs or Cheyenne's Wyoming
Tribune-Eagle are fed a starvation diet of global stories, which typically occupy no more than about 2%
of column space. And not to be overlooked is the way governments distort global information flows.
Protected by what in Washington are called ‘flack packs’ and dissimulation experts, governments
cultivate links with trusted or ‘embedded’ journalists, organise press briefings and advertising
campaigns, so framing - and wilfully distorting and censoring - global events to suit current government
policies.
All these fickle counter-trends are sobering, but they are not the whole story. For in the age of
communicative abundance there are signs that the spell of parochialism upon citizens is not absolute
because global media integration is having an unanticipated political effect: by nurturing a world stage
or theatrum mundi, global journalism and other acts of communication are slowly but surely cultivating
public spheres in which many millions of people scattered across the earth witness mediated
controversies about who gets what, when, and how, on a world scale.
Not all global media events - sporting fixtures, blockbuster movies, media awards, for instance - sustain
global publics, which is to say that audiences are not publics and public spheres are not simply domains
of entertainment or play. Strictly speaking, global publics are scenes of the political. Within global
publics, people at various points on the earth witness the powers of governmental and nongovernmental organisations being publicly named, monitored, praised, challenged, and condemned, in
defiance of the old tyrannies of time and space and publicly unaccountable power. It is true that global
publics are neither strongly institutionalised nor effectively linked to mechanisms of representative
government. This lack is a great challenge for democratic thinking and democratic politics. Global publics
are voices without a coherent body politic; it is as if they try to show the world that it resembles a
chrysalis capable of hatching the butterfly of cross-border democracy - despite the fact that we currently
have no good account of what ‘regional’ or ‘global’ or ‘cross border’ democratic representation might
mean in practice.
Still, in spite of everything, global publics have marked political effects, for instance on the suit-and-tie
worlds of diplomacy, global business, inter-governmental meetings and independent non-governmental
organizations. Every great global issue since 1945 - human rights, the dangers of nuclear war ,
continuing discrimination against women, the greening of politics - every one of these issues first
crystallised within these publics. Global publics sometimes have ‘meta-political’ effects, in the sense that
they help create citizens of a new global order. The speech addressed to ‘global citizens’ by Barack
Obama at the Siegessaule in the Tiergarten in July 2008 is a powerful case in point, a harbinger of a
remarkable trend in which those who are caught up within global publics learn that the boundaries
between native and foreigner are blurred. They consequently become footloose. They live here and
there; they discover the ‘foreigner’ within themselves.
Global publics centred on ground-breaking media events like Live-Aid (in 1985 it attracted an estimated
one billion viewers) can be spaces of fun, in which millions taste something of the joy of acting publicly
with and against others for some defined common purpose. When by contrast they come in the form of
televised world news of the suffering of distant strangers, global publics highlight cruelty; they make
possible what Hannah Arendt once called the ‘politics of pity’. And especially during dramatic media
events - like the nuclear meltdown at Chernobyl, the Tiananmen massacre, the 1989 revolutions in
central-eastern Europe, the overthrow and arrest of Slobodan Milosevic, the 9/11 terrorist attacks and
the recent struggles for dignity in Tunisia and Egypt - public spheres intensify audiences’ shared sense of
living their lives contingently, on a knife edge, in the subjunctive tense.
The witnesses of such events (contrary to McLuhan) do not experience uninterrupted togetherness.
They do not enter a ‘global village’ dressed in the skins of humankind and thinking in the terms of a
primordial ‘village or tribal outlook’. They instead come to feel the pinch of the world’s power relations;
in consequence, they put matters like representation, accountability and legitimacy on the global
political agenda, in effect by asking whether new democratic measures could inch our little blue and
white planet towards greater openness and humility, potentially to the point where power, wherever it
is exercised within and across borders, would come to feel more ‘biodegradable’, a bit more responsive
to those whose lives it currently shapes and reshapes, secures or wrecks.
A free internet is vital to combating every existential threat
Eagleman, 10 - American neuroscientist and writer at Baylor College of Medicine, where he directs the
Laboratory for Perception and Action and the Initiative on Neuroscience and Law (David, “Six ways the
internet will save civilization” Wired, 9/10,
http://www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no
Many great civilisations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually
this results from: natural disasters, resource depletion, economic meltdown, disease, poor information
flow and corruption. But we’re luckier than our predecessors because we command a technology that
no one else possessed: a rapid communication network that finds its highest expression in the internet. I
propose that there are six ways in which the net has vastly reduced the threat of societal collapse.
Epidemics can be deflected by telepresence
One of our more dire prospects for collapse is an infectious-disease epidemic. Viral and bacterial
epidemics precipitated the fall of the Golden Age of Athens, the Roman Empire and most of the empires
of the Native Americans. The internet can be our key to survival because the ability to work
telepresently can inhibit microbial transmission by reducing human-to-human contact. In the face of an
otherwise devastating epidemic, businesses can keep supply chains running with the maximum number
of employees working from home. This can reduce host density below the tipping point required for an
epidemic. If we are well prepared when an epidemic arrives, we can fluidly shift into a self-quarantined
society in which microbes fail due to host scarcity. Whatever the social ills of isolation, they are worse
for the microbes than for us.
The internet will predict natural disasters
We are witnessing the downfall of slow central control in the media: news stories are increasingly
becoming user-generated nets of up-to-the-minute information. During the recent California wildfires,
locals went to the TV stations to learn whether their neighbourhoods were in danger. But the news
stations appeared most concerned with the fate of celebrity mansions, so Californians changed their
tack: they uploaded geotagged mobile-phone pictures, updated Facebook statuses and tweeted. The
balance tipped: the internet carried news about the fire more quickly and accurately than any news
station could. In this grass-roots, decentralised scheme, there were embedded reporters on every block,
and the news shockwave kept ahead of the fire. This head start could provide the extra hours that save
us. If the Pompeiians had had the internet in 79AD, they could have easily marched 10km to safety, well
ahead of the pyroclastic flow from Mount Vesuvius. If the Indian Ocean had the Pacific’s networked
tsunami-warning system, South-East Asia would look quite different today.
Discoveries are retained and shared
Historically, critical information has required constant rediscovery. Collections of learning -- from the
library at Alexandria to the entire Minoan civilisation -- have fallen to the bonfires of invaders or the
wrecking ball of natural disaster. Knowledge is hard won but easily lost. And information that survives
often does not spread. Consider smallpox inoculation: this was under way in India, China and Africa
centuries before it made its way to Europe. By the time the idea reached North America, native
civilisations who needed it had already collapsed. The net solved the problem. New discoveries catch on
immediately; information spreads widely. In this way, societies can optimally ratchet up, using the latest
bricks of knowledge in their fortification against risk.
Tyranny is mitigated
Censorship of ideas was a familiar spectre in the last century, with state-approved news outlets ruling
the press, airwaves and copying machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In
many cases, such as Lysenko’s agricultural despotism in the USSR, it directly contributed to the collapse
of the nation. Historically, a more successful strategy has been to confront free speech with free speech
-- and the internet allows this in a natural way. It democratises the flow of information by offering
access to the newspapers of the world, the photographers of every nation, the bloggers of every
political stripe. Some posts are full of doctoring and dishonesty whereas others strive for independence
and impartiality -- but all are available to us to sift through. Given the attempts by some governments to
build firewalls, it’s clear that this benefit of the net requires constant vigilance.
Human capital is vastly increased
Crowdsourcing brings people together to solve problems. Yet far fewer than one per cent of the world’s
population is involved. We need expand human capital. Most of the world not have access to the
education afforded a small minority. For every Albert Einstein, Yo-Yo Ma or Barack Obama who has
educational opportunities, uncountable others do not. This squandering of talent translates into
reduced economic output and a smaller pool of problem solvers. The net opens the gates education to
anyone with a computer. A motivated teen anywhere on the planet can walk through the world’s
knowledge -- from the webs of Wikipedia to the curriculum of MIT’s OpenCourseWare. The new human
capital will serve us well when we confront existential threats we’ve never imagined before.
Energy expenditure is reduced
Societal collapse can often be understood in terms of an energy budget: when energy spend outweighs
energy return, collapse ensues. This has taken the form of deforestation or soil erosion; currently, the
worry involves fossil-fuel depletion. The internet addresses the energy problem with a natural ease.
Consider the massive energy savings inherent in the shift from paper to electrons -- as seen in the
transition from the post to email. Ecommerce reduces the need to drive long distances to purchase
products. Delivery trucks are more eco-friendly than individuals driving around, not least because of
tight packaging and optimisation algorithms for driving routes. Of course, there are energy costs to the
banks of computers that underpin the internet -- but these costs are less than the wood, coal and oil
that would be expended for the same quantity of information flow.
The tangle of events that triggers societal collapse can be complex, and there are several threats the net
does not address. But vast, networked communication can be an antidote to several of the most deadly
diseases threatening civilisation. The next time your coworker laments internet addiction, the banality of
tweeting or the decline of face-to-face conversation, you may want to suggest that the net may just be
the technology that saves us.
Data localization will destroy global economic growth
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
C. Economic Development
Many governments believe that by forcing companies to localize data within national borders, they will
increase investment at home. Thus, data localization measures are often motivated, whether explicitly
or not, by desires to promote local economic development. In fact, however, data localization raises
costs for local businesses, reduces access to global services for consumers, hampers local start-ups, and
interferes with the use of the latest technological advances.
In an Information Age, the global flow of data has become the lifeblood of economies across the world.
While some in Europe have raised concerns about the transfer of data abroad, the European
Commission has recognized "the critical importance of data flows notably for the transatlantic
economy." n209 The Commission observes that international data transfers "form an integral part of
commercial exchanges across the Atlantic including for new growing digital businesses, such as social
media or cloud computing, with large amounts of data going from the EU to the US." n210 Worried
about the effect of constraints on data flows on both global information sharing and economic
development, the Organisation for Economic Co-operation and Development (OECD) has urged nations
to avoid "barriers to the location, access and use of cross-border [*722] data facilities and functions"
when consistent with other fundamental rights, in order to "ensure cost effectiveness and other
efficiencies." n211
The worry about the impact of data localization is widely shared in the business community as well. The
value of the Internet to national economies has been widely noted. n212 Regarding Brazil's attempt to
require data localization, the Information Technology Industry Council, an industry association
representing more than forty major Internet companies, had argued that "in-country data storage
requirements would detrimentally impact all economic activity that depends on data flows." n213 The
Swedish government agency, the National Board of Trade, recently interviewed fifteen local companies
of various sizes across sectors and concluded succinctly that "trade cannot happen without data being
moved from one location to another." n214
Data localization, like most protectionist measures, leads only to small gains for a few local enterprises
and workers, while causing significant harms spread across the entire economy . The domestic benefits
of data localization go to the few owners and employees of data centers and the few companies
servicing these centers locally. Meanwhile, the harms of data localization are widespread, felt by small,
medium, and large businesses that are denied access to global services that might improve productivity.
In response to Russia's recently passed localization law, the NGO Russian Association for Electronic
Communications stressed the potential economic consequences, pointing to the withdrawal of global
services and substantial economic losses caused by the passing of similar laws in other countries. n215
For example, besides the loss of international social media platforms, localization would make it
impossible for [*723] Russians to order airline tickets or consumer goods through online services.
Localization requirements also seriously affect Russian companies like Aeroflot because the airline
depends on foreign ticket-booking systems. n216
Critics worried, at the time, that the Brazilian data localization requirement would "deny[] Brazilian
users access to great services that are provided by US and other international companies." n217 Marilia
Marciel, a digital policy expert at Fundacao Getulio Vargas in Rio de Janeiro, observes, "Even Brazilian
companies prefer to host their data outside of Brazil." n218 Data localization affects domestic
innovation by denying entrepreneurs the ability to build on top of global services based abroad.
Brasscom, the Brazilian Association of Information Technology and Communication Companies, argues
that such obligations would "hurt[] the country's ability to create, innovate, create jobs and collect taxes
from the proper use of the Internet." n219
Governments implementing in-country data mandates imagine that the various global services used in
their country will now build infrastructure locally. Many services, however, will find it uneconomical and
even too risky to establish local servers in certain territories. n220 Data centers are expensive, all the
more so if they have the highest levels of security. One study finds Brazil to be the most expensive
country in the Western hemisphere in which to build data centers. n221 Building a data center in Brazil
costs $ 60.9 million on average, [*724] while building one in Chile and the United States costs $ 51.2
million and $ 43 million, respectively. n222 Operating such a data center remains expensive because of
enormous energy and other expenses - averaging $ 950,000 in Brazil, $ 710,000 in Chile, and $ 510,000
in the United States each month. n223 This cost discrepancy is mostly due to high electricity costs and
heavy import taxes on the equipment needed for the center. n224 Data centers employ few workers,
with energy making up three-quarters of the costs of operations. n225 According to the 2013 Data
Centre Risk Index - a study of thirty countries on the risks affecting successful data center operations Australia, Russia, China, Indonesia, India, and Brazil are among the riskiest countries for running data
centers. n226
Not only are there significant economic costs to data localization, the potential gains are more limited
than governments imagine. Data server farms are hardly significant generators of employment,
populated instead by thousands of computers and few human beings. The significant initial outlay they
require is largely in capital goods, the bulk of which is often imported into a country. The diesel
generators, cooling systems, servers, and power supply devices tend to be imported from global
suppliers. n227 Ironically, it is often American suppliers of servers and other hardware that stand to be
the beneficiaries of data localization mandates. n228 One study notes, "Brazilian suppliers of
components did not benefit from this [data localization requirement], since the imported products
dominate the market." n229 By increasing capital purchases from abroad, data localization
requirements can in fact increase merchandise trade deficits. Furthermore, large data farms are [*725]
enormous consumers of energy, n230 and thus often further burden overtaxed energy grids . They
thereby harm other industries that must now compete for this energy, paying higher prices while
potentially suffering limitations in supply of already scarce power.
Cost, as well as access to the latest innovations, drives many e-commerce enterprises in Indonesia to use
foreign data centers. Daniel Tumiwa, head of the Indonesian E-Commerce Association (IdEA), states that
"the cost can double easily in Indonesia." n231 Indonesia's Internet start-ups have accordingly often
turned to foreign countries such as Australia, Singapore, or the United States to host their services. One
report suggests that "many of the "tools' that start-up online media have relied on elsewhere are not
fully available yet in Indonesia." n232 The same report also suggests that a weak local hosting
infrastructure in Indonesia means that sites hosted locally experience delayed loading time. n233
Similarly, as the Vietnamese government attempts to foster entrepreneurship and innovation, n234
localization requirements effectively bar start-ups from utilizing cheap and powerful platforms abroad
and potentially handicap Vietnam from "joining in the technology race." n235
Governments worried about transferring data abroad at the same time hope, somewhat contradictorily,
to bring foreign data within their borders. Many countries seek to become leaders in providing data
centers for companies operating across their regions. In 2010, Malaysia announced its Economic
Transformation Program n236 to transform Malaysia into a world-class data [*726] center hub for the
Asia-Pacific region. n237 Brazil hopes to accomplish the same for Latin America, while France seeks to
stimulate its economy via a "Made in France" digital industry. n238 Instead of spurring local investment,
data localization can lead to the loss of investment. First, there's the retaliation effect. Would countries
send data to Brazil if Brazil declares that data is unsafe if sent abroad? Brasscom notes that the Brazilian
Internet industry's growth would be hampered if other countries engage in similar reactive policies,
which "can stimulate the migration of datacenters based here, or at least part of them, to other
countries." n239 Some in the European Union sympathize with this concern. European Commissioner for
the Digital Agenda, Neelie Kroes, has expressed similar doubts, worrying about the results for European
global competitiveness if each country has its own separate Internet. n240 Then there's the avoidance
effect. Rio de Janeiro State University Law Professor Ronaldo Lemos, who helped write the original
Marco Civil and is currently Director of the Rio Institute for Technology and Society, warns that the
localization provision would have caused foreign companies to avoid the country altogether: "It could
end up having the opposite effect to what is intended, and scare away companies that want to do
business in Brazil." n241 Indeed, such burdensome local laws often lead companies to launch overseas,
in order to try to avoid these rules entirely. Foreign companies, too, might well steer clear of the country
in order to avoid entanglement with cumbersome rules. For example, Yahoo!, while very popular in
Vietnam, places its servers for the [*727] country in Singapore. n242 In these ways we see that data
localization mandates can backfire entirely, leading to avoidance instead of investment.
Data localization requirements place burdens on domestic enterprises not faced by those operating in
more liberal jurisdictions. Countries that require data to be cordoned off complicate matters for their
own enterprises, which must turn to domestic services if they are to comply with the law. Such
companies must also develop mechanisms to segregate the data they hold by the nationality of the data
subject. The limitations may impede development of new, global services. Critics argue that South
Korea's ban on the export of mapping data, for example, impedes the development of next-generation
services in Korea: Technology services, such as Google Glass, driverless cars, and information programs
for visually-impaired users, are unlikely to develop and grow in Korea. Laws made in the 1960s are
preventing many venture enterprises from advancing to foreign markets via location/navigation
services. n243
The harms of data localization for local businesses are not restricted to Internet enterprises or to
consumers denied access to global services. As it turns out, most of the economic benefits from Internet
technologies accrue to traditional businesses. A McKinsey study estimates that about seventy-five
percent of the value added created by the Internet and data flow is in traditional industries, in part
through increases in productivity. n244 The potential economic impact across the major sectors healthcare, manufacturing, electricity, urban infra-structure, security, agriculture, retail, etc. - is
estimated at $ 2.7 to $ 6.2 trillion per year. n245 This is particularly important for emerging economies,
in which traditional industries remain predominant. The Internet raises profits as well, due to increased
revenues, lower costs of goods sold, and lower administrative costs. n246 With data localization
mandates, traditional businesses [*728] will lose access to the many global services that would store or
process information offshore.
Data localization requirements also interfere with the most important trends in computing today. They
limit access to the disruptive technologies of the future, such as cloud computing, the "Internet of
Things," and data-driven innovations (especially those relying on "big data"). Data localization sacrifices
the innovations made possible by building on top of global Internet platforms based on cloud
computing. This is particularly important for entrepreneurs operating in emerging economies that might
lack the infrastructure already developed elsewhere. And it places great impediments to the
development of both the Internet of Things and big data analytics, requiring costly separation of data by
political boundaries and often denying the possibility of aggregating data across borders. We discuss the
impacts on these trends below.
That causes World War 3
James, 14 - Professor of history at Princeton University’s Woodrow Wilson School who specializes in
European economic history (Harold, “Debate: Is 2014, like 1914, a prelude to world war?” 7/3,
http://www.theglobeandmail.com/globe-debate/read-and-vote-is-2014-like-1914-a-prelude-to-worldwar/article19325504/)
Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an economically
declining power, Britain, wanted to use finance as a weapon against its larger and faster growing
competitors, Germany and the United States. Now America is in turn obsessed by being overtaken by
China – according to some calculations, set to become the world’s largest economy in 2014.
In the aftermath of the 2008 financial crisis, financial institutions appear both as dangerous weapons of
mass destruction, but also as potential instruments for the application of national power.
In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a major
weakness, and required the provision of large swap lines by the Federal Reserve. The United States
provided that support to some countries, but not others, on the basis of an explicitly political logic, as
Eswar Prasad demonstrates in his new book on the “Dollar Trap.”
Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were
trying to acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much
reduced role in Asian trade finance. Chinese banks are being pushed to expand their role in global
commerce. After the financial crisis, China started to build up the renminbi as a major international
currency. Russia and China have just proposed to create a new credit rating agency to avoid what they
regard as the political bias of the existing (American-based) agencies.
The next stage in this logic is to think about how financial power can be directed to national advantage
in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the
pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more
powerfully applied to countries that are deeply embedded in the world economy.
The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President
Vladimir Putin’s calculation in response is that the European Union and the United States cannot
possibly be serious about the financial war. It would turn into a boomerang: Russia would be less
affected than the more developed and complex financial markets of Europe and America.
The threat of systemic disruption generates a new sort of uncertainty, one that mirrors the decisive
feature of the crisis of the summer of 1914. At that time, no one could really know whether clashes
would escalate or not. That feature contrasts remarkably with almost the entirety of the Cold War,
especially since the 1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt
that any superpower conflict would inevitably escalate.
The idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or
low cost. But it is inevitably a gamble, and raises prospect that others might, but also might not be able
to, mount the same sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice,
even though the game may be fatal.
FCC 1ac – technological leadership
Contention 2 – technological leadership
NSA surveillance is crushing U.S. cloud-computing – decks competitiveness and
spills over to the entire tech sector
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the
Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL
SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.15-18, 2015, Hein Online)//JJ
I. ECONOMIC IMPACT OF NSA PROGRAMS
The NSA programs, and public awareness of them, have had an immediate and detrimental impact on
the U.S. economy . They have cost U.S. companies billions of dollars in lost sales, even as companies
have seen their market shares decline . American multinational corporations have had to develop new
products and programs to offset the revelations and to build consumer confidence. At the same time,
foreign entities have seen revenues increase. Beyond the immediate impact, the revelation of the
programs, and the extent to which the NSA has penetrated foreign data flows, has undermined U.S.
trade agreement negotiations. It has spurred data localization efforts around the world, and it has raised
the spectre of the future role of the United States in Internet governance. Even if opportunistic, these
shifts signal an immediate and long-term impact of the NSA programs , and public knowledge about
them, on the U.S. economy .
A. Lost Revenues and Declining Market Share
Billions of dollars are on the line because of worldwide concern that the services provided by U.S.
information technology companies are neither secure nor private. Perhaps nowhere is this more
apparent than in cloud computing .
Previously, approximately 50% of the worldwide cloud computing revenues derived from the United
States. The domestic market thrived: between 2008 and 2014, it more than tripled in value. But within
weeks of the Snowden leaks, reports had emerged that U.S. companies such as Dropbox, Amazon Web
Services, and Microsoft's Azure were losing business. By December 2013, ten percent of the Cloud
Security Alliance had cancelled U.S. cloud services projects as a result of the Snowden information. In
January 2014 a survey of Canadian and British businesses found that one quarter of the respondents
were moving their data outside the United States .
The Information Technology and Innovation Foundation estimates that declining revenues of
corporations that focus on cloud computing and data storage alone could reach $35 billion over the next
three years. Other commentators, such as Forrester Research analyst James Staten, have put actual
losses as high as $180 billion by 2016, unless something is done to restore confidence in data held by
U.S. companies. The monetary impact of the NSA programs extends beyond cloud computing to the
high technology industry . Cisco, Qualcomm, IBM, Microsoft, and Hewlett-Packard have all reported
declining sales as a direct result of the NSA programs. Servint, a webhosting company based in Virginia,
reported in June 2014 that its international clients had dropped by 50 % since the leaks began. Also in
June, the German government announced that because of Verizon's complicity in the NSA program, it
would end its contract with the company, which had previously provided services to a number of
government departments. As a senior analyst at the Information Technology and Innovation Foundation
explained, "It's clear to every single tech company that this is affecting their bottom line. The European
commissioner for digital affairs, Neelie Kroes, predicts that the fallout for U.S. businesses in the EU alone
will amount to billions of Euros.
Not only are U.S. companies losing customers, but they have been forced to spend billions to add
encryption features to their services. IBM has invested more than a billion dollars to build data centers
in London, Hong Kong, Sydney, and elsewhere, in an effort to reassure consumers outside the United
States that their information is protected from U.S. government surveillance.26 Salesforce.com made a
similar announcement in March 2014.27 Google moved to encrypt terms entered into its browser.28 In
June 2014 it took the additional step of releasing the source code for End-to-End, its newly-developed
browser plugin that allows users to encrypt email prior to it being sent across the Internet.29 The
following month Microsoft announced Transport Layer Security for inbound and outbound email, and
Perfect Forward Secrecy encryption for access to OneDrive.30 Together with the establishment of a
Transparency Center, where foreign governments could review source code to assure themselves of the
integrity of Microsoft software, the company sought to put an end to both NSA back door surveillance
and doubt about the integrity of Microsoft products.3'
Foreign technology companies, in turn, are seeing revenues increase . Runbox, for instance, an email
service based in Norway and a direct competitor to Gmail and Yahoo, almost immediately made it
publicly clear that it does not comply with foreign court requests for its customers' personal
information. Its customer base increased 34% in the aftermath of the Snowden leaks. Mateo Meier, CEO
of Artmotion, Switzerland's biggest offshore data hosting company, reported that within the first month
of the leaks, the company saw a 45% rise in revenue. Because Switzerland is not a member of the EU,
the only way to access data in a Swiss data center is through an official court order demonstrating guilt
or liability; there are no exceptions for the United States. In April 2014, Brazil and the EU, which
previously used U.S. firms to supply undersea cables for transoceanic communications, decided to build
their own cables between Brazil and Portugal, using Spanish and Brazilian companies in the process.36
OpenText, Canada's largest software company, now guarantees customers that their data remains
outside the United States. Deutsche Telekom, a cloud computing provider, is similarly gaining more
customers. Numerous foreign companies are marketing their products as "NSA proof' or "safer
alternatives" to those offered by U.S. firms, gaining market share in the process.
The best and newest research confirms the link
Marthews and Tucker, 15 – * National Chair at Restore the Fourth AND **PhD in economics and
professor of Marketing at MIT (Alex and Catherine, “Government Surveillance and Internet Search
Behavior”, 29 April 2015, file:///C:/Users/17GGonzalez/Downloads/SSRN-id2412564%20(2).pdf)//gg
This study is the first to provide substantial empirical documentation of a chilling effect, both
domestically in the shorter term and internationally in the longer term, that appears to be related to
increased awareness of government surveillance online. Furthermore, this chilling effect appears in
countries other than the US to apply to search behavior that is not strictly related to the government but
instead forms part of the private domain.
Our findings have the following policy implications. From an economic perspective, our finding that
there was an effect on international Google users’ browsing behavior has potential policy implications
for the effects of government surveillance on international commerce. From a US competitive
standpoint, the longer-run effect observed on international Google users’ search behavior indicates
that knowledge of US government surveillance of Google could indeed affect their behavior . At the
most limited end of the spectrum, it could steer them away from conducting certain searches on US
search engines; at the most severe end of the spectrum, they might choose to use non-US search
engines. Such effects may not be limited simply to search engines. For example, as Google’s services are
embedded in a large array of products, it could potentially hinder sales of Android-enabled mobile
phones. Though preliminary attempts are being made to work towards initial measures of the economic
impact of surveillance revelations (Dinev et al., 2008), no systematic study yet exists. All we can do,
within the context of our data, is to indicate that on the basis of the effects we find, the strong
possibility of substantial economic effects exists, and to suggest that such potential adverse economic
impacts should be incorporated into the thinking of policy makers regarding the appropriateness of
mass surveillance programs.
There are limitations to the generalizability of our findings. First, we are not sure how the results
generalize outside of the search domain towards important tech industries such as the rapidly growing
US cloud computing industry. Second, we are not sure how the revelations affected search on Google’s
major competitors, such as Bing and Yahoo! Search. It may be that the effect on their services was
lessened by reduced media focus on them relative to Google in the light of the PRISM revelations and
potentially the extent to which users anticipated that their servers may be located outside of the US.
Third, our results are focused on the effects of revelations about government surveillance as opposed to
the direct effects of government surveillance per se. Notwithstanding these limitations, we believe that
our study provides an important first step in understanding the potential for effects of government
surveillance practices on commercial outcomes and international competitiveness.
That undermines US global technological leadership
Castro and McQuinn 15, Daniel Castro works at the Center for Data Innovation, Government
Technology, The Information Technology & Innovation Foundation, worked at the U.S. Government
Accountability Office, went to Carnegie Mellon. Alan McQuinn works at the Federal Communications
Commission, previously had the Bill Archer Fellowship at the University of Texas, (June 2015, “Beyond
the USA Freedom Act: How U.S. Surveillance Still Subverts U.S. Competitiveness”,
file:///C:/Users/Mark/Downloads/2015-beyond-usa-freedom-act.pdf)//AK
CONCLUSION
When historians write about this period in U.S. history it could very well be that one of the themes will
be how the United States lost its global technology leadership to other nations. And clearly one of the
factors they would point to is the long-standing privileging of U.S. national security interests over U.S.
industrial and commercial interests when it comes to U.S. foreign policy.
This has occurred over the last few years as the U.S. government has done relatively little to address the
rising commercial challenge to U.S. technology companies, all the while putting intelligence gathering
first and foremost. Indeed, policy decisions by the U.S. intelligence community have reverberated
throughout the global economy . If the U.S. tech industry is to remain the leader in the global
marketplace, then the U.S. government will need to set a new course that balances economic interests
with national security interests. The cost of inaction is not only short-term economic losses for U.S.
companies, but a wave of protectionist policies that will systematically weaken U.S. technology
competiveness in years to come, with impacts on economic growth, jobs, trade balance, and national
security through a weakened industrial base. Only by taking decisive steps to reform its digital
surveillance activities will the U.S. government enable its tech industry to effectively compete in the
global market.
Tech leadership is the primary driver of hegemony –
Weiss 14 – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government
and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus
University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell
University Press, 4/1/14, p. 1-3)//JJ
*NSS=National Security State
So what accounts for America’s transformative capacity? Where do its breakthrough innovations come
from? My answer traces the relationship between high technology, national security, and political
culture. It advances three interlinked propositions regarding the role of the NSS as technology enterprise
and commercialization engine; its geopolitical drivers ; and the institutional consequences of an
antistatist constraint. The national security state as technology enterprise. First, America's capacity for
transformative innovation derives not merely from the entrepreneurship of its private sector, or simply
from the state as such, but from the national security state—a particular cluster of federal agencies that
collaborate closely with private actors in pursuit of security-related objectives. The NSS is a wholly new
postwar creation that is geared to the permanent mobilization of the nation's science and technology
resources for military primacy , and here I document and explain why it has had to become increasingly
involved in commercial undertakings. Although centered on defense preparedness, the NSS is a good
deal broader than the military, yet narrower than the state as a whole. In addition to its defense core in
the Department of Defense, the NSS comprises several other components created at the height of the
Cold War to pursue, deliver, or underwrite innovation in the service of securing technological
supremacy. Although some are designated as "civilian" in their ori- gins, evolution, and current mix of
activities, these NSS components remain deeply enmeshed in national security or dual-use functions (as
we shall see in chapter 2).4 Acting as commander in chief, the president sits at the peak of this complex,
supported by the Oval Office and, in particular, the Office of Science and Technology Policy. In sum, I
discuss NSS activities not in the more popular sense of a surveillance state, but as a national "technology
enterprise" in which the military is the central, but far from exclusive, actor. In telling this Story, I
demonstrate and account for a major shift in NS.S innovation programs and policies that involved the
national security agencies cultivating and undertaking commercialization ventures. (c. 1945 up to the
1970s), this process of fostering commercially relevant (general-purpose or dual-use) technologies took
both direct and indirect forms. Then (especially from the 1980s onward) it also took a more proactive
form, via patenting and licensing reforms and cooperative agreements to transfer technology from the
federal labs to the private sector, via the launching of new procurement and joint innovation initiatives,
and via the creation of new venture capital (VC) schemes. By placing greater emphasis on
commercialization opportunities, some of these incentives sought to sweeten collaboration with the
DOD and other security-related agencies, and thus to increase NISS influence over the direction of
technology. A significant problem for the NSS has been that since the late 1970s, it has become
progressively more challenging to enlist innovative companies in the private sector to work on securityrelated projects. While traditional defense suppliers grew increasingly large and specialized in systems
integration, by the 1970s the more innovative producer companies—above all, critical suppliers Of
integrated circuits—had begun to pull away from the federal market. Attracting nondefense firms to do
defense work was at one time easy because the government market (in semiconductors and computers,
for instance) was so much larger than the private market, and healthy profits could be made. But by the
mid- 1970s commercial markets had come into their own, leading firms to reorient production to suit
the more standardized demand. One consequence of lacking the earlier pull power Of massive demand
is that NISS agencies have had to create new incentives to foster private-sector collaboration. One of the
major incentives intended to reattract the private sector is the inclusion of commercial goals in NSS
technology policies. Commercial viability therefore has to stand alongside security and technological
supremacy in NSS policy. For instance, if a firm works with an agency to create a technology, service, or
prototype for use by the U.S. Army, it will also be encouraged from the outset of the project to create a
similar product for the commercial market. In this way, and many more, the NSS has progressively been
drawn into promoting commercial innovation for security reasons. One implication, demonstrated in
some detail, is that the NISS has achieved a much broader reach than commonly implied by the notion
Of a military-industrial complex. Geopolitical drivers. What are the drivers of the NSS technology
enterprise? Geopolitics and related threat perceptions have been the original catalyst for NSS
formation and its evolution as an innovation engine . This state- (and technology-) building dynamic has
occurred in three broad phases: the Cold War, the rise of Japan as techno-security challenge, and the
post-9/11 era of asymmetric threats. The NSS emerged and expanded in fits and starts after World War
II in response to a perceived international threat, emanating from the Soviet Union, that proved both
enduring and persistent. It is instructive to note that in this phase the NSS bears at least some
comparison with the erstwhile "developmental states" of Northeast Asia. They too emerged in response
to an intensely perceived security threat, from neighboring China and North Korea, but instead sought
national security more broadly via economic improvement, or industrial catch-up. Living on the fault
lines of the Cold War in the presence of a credible and unyielding security threat exerted an unusual
pressure on the East Asian states to pursue security by building economic strength. More distinctively in
the case of Japan, Peter Katzenstein has developed the argument that, against the backdrop of terrible
defeat, domestic power struggles succeeded in reorienting Japan's conception of security in favor Of
economic rather than military strength. Thus the Japanese state practices a form of "technological
national security" in order to ensure against its resource dependence and reduce its exposure to
international supply disruptions (Katzenstein 1996, 2005; also Samuels 1994). Fundamental motivations
drawn from different historical experiences thus serve to underline a unique feature of the NSS. In
contrast to Japan (and the East Asian developmental states more generally), America's national security
State has been geared to the pursuit of technological superior, not for reasons of national
independence, economic competitiveness, or resource dependency, but in order to maintain American
primacy . For the United States, the experience of World War Il drove home the point that science and
technology (S&T) was a game changer—the key to winning the war—and that future preparedness
would depend on achieving and sustaining technological superiority. Geopolitics is thus the driver, not
economics. I emphasize this point because many analysts have viewed the Pentagon as the source of an
industrial policy that is pursued beneath the radar6—a claim that this book disputes since it mistakes
the nature of the primary driver. From its inception, the NSS was tasked with ensuring the technology
leadership of the United States for the purpose of national defense. Even as the Soviet menace
retreated, security proved paramount as the U.S. confronted a newly resurgent Japan that threatened to
dethrone it as the regnant technology power. Appreciating the strength and intensity of the U.S. security
focus means never underestimating the significance of this point: as long as U.S. military strategy
continues to rely on a significant technology lead over its adversaries (real or potential), threats to that
lead can never be simply (or even primarily) a commercial matter—even when the NSS "goes
commercial.
Hegemonic decline causes great power wars
Zhang et al., Carnegie Endowment researcher, 2011
(Yuhan, “America’s decline: A harbinger of conflict and rivalry”, 1-22,
http://www.eastasiaforum.org/2011/01/22/americas-decline-a-harbinger-of-conflict-and-rivalry/, ldg)
This does not necessarily mean that the US is in systemic decline, but it encompasses a trend that appears to be negative and perhaps alarming. Although the US
still possesses incomparable military prowess and its economy remains the world’s largest, the once seemingly indomitable chasm that separated America from
anyone else is narrowing. Thus, the
global distribution of power is shifting, and the inevitable result will be a world
that is less peaceful, liberal and prosperous, burdened by a dearth of effective conflict regulation. Over
the past two decades, no other state has had the ability to seriously challenge the US military. Under
these circumstances, motivated by both opportunity and fear, many actors have bandwagoned with US
hegemony and accepted a subordinate role. Canada, most of Western Europe, India, Japan, South Korea, Australia, Singapore and the
Philippines have all joined the US, creating a status quo that has tended to mute great power conflicts. However, as the hegemony that drew
these powers together withers, so will the pulling power behind the US alliance. The result will be an
international order where power is more diffuse, American interests and influence can be more readily challenged, and conflicts
or wars may be harder to avoid. As history attests, power decline and redistribution result in military
confrontation. For example, in the late 19th century America’s emergence as a regional power saw it launch its first overseas war of conquest towards
Spain. By the turn of the 20th century, accompanying the increase in US power and waning of British power, the American Navy had begun to challenge the notion
that Britain ‘rules the waves.’ Such a notion would eventually see the US attain the status of sole guardians of the Western Hemisphere’s security to become the
order-creating Leviathan shaping the international system with democracy and rule of law. Defining this US-centred system are three key characteristics:
enforcement of property rights, constraints on the actions of powerful individuals and groups and some degree of equal opportunities for broad segments of
society. As
a result of such political stability, free markets, liberal trade and flexible financial mechanisms
have appeared. And, with this, many countries have sought opportunities to enter this system,
proliferating stable and cooperative relations. However, what will happen to these advances as America’s influence declines? Given that
America’s authority, although sullied at times, has benefited people across much of Latin America, Central and Eastern Europe, the Balkans, as well as parts of Africa
and, quite extensively, Asia, the answer to this question could affect global society in a profoundly detrimental way. Public
imagination and
academia have anticipated that a post-hegemonic world would return to the problems of the 1930s:
regional blocs, trade conflicts and strategic rivalry. Furthermore, multilateral institutions such as the
IMF, the World Bank or the WTO might give way to regional organisations. For example, Europe and East
Asia would each step forward to fill the vacuum left by Washington’s withering leadership to pursue their own visions of regional political
and economic orders. Free markets would become more politicised — and, well, less free — and major powers
would compete for supremacy. Additionally, such power plays have historically possessed a zero-sum
element. In the late 1960s and 1970s, US economic power declined relative to the rise of the Japanese and Western European economies, with the US dollar
also becoming less attractive. And, as American power eroded, so did international regimes (such as the Bretton Woods System in 1973). A world without
American hegemony is one where great power wars re-emerge, the liberal international system is
supplanted by an authoritarian one, and trade protectionism devolves into restrictive, anti-globalisation
barriers. This, at least, is one possibility we can forecast in a future that will inevitably be devoid of unrivalled US primacy.
Cloud computing is key to effective space situational awareness – prevents
space debris collisions with satellites
Johnston et al 13 – Ph.D. with the Computational Engineering and Design Group (CED) at the University
of Southampton, MEng degree in Software Engineering from the School of Electronics and Computer
Science, Senior Research Fellow for the Faculty of Engineering and the Environment at University of
Southampton (Steven, Neil O’Brien – Senior Technical Recruiter at Colloco Search, Hugh Lewis –
Astronautics Research Group at the University of Southampton, PhD, Elizabeth Hart – School of
Engineering Science at Southampton University, Adam White – School of Engineering Science at
Southampton University, Simon Cox – professor of Computational Methods and Director of the
Microsoft Institute for High Performance Computing, PhD, Clouds in Space: Scientific Computing using
Windows Azure, Journal of Cloud Computing, 2013,
http://www.journalofcloudcomputing.com/content/pdf/2192-113X-2-2.pdf)//JJ
Space situational awareness
Within the last two decades, the downstream services pro- vided by space-based assets have become a
ubiquitous component of everyday life within the European Union and internationally, from satellite
television and navigation to environmental monitoring. The European Space Agency (ESA) and European
national space agencies currently rely on information from outside sources to form an awareness of
these assets and the environment in which they operate. In the near future, this awareness will be
provided by a European space situational awareness (SSA ) system, which will provide “ a
comprehensive knowledge, understanding and maintained awareness of the population of space
objects, the space environment, and the existing threats and risks ”(User Expert Group of ESA SSA
requirement study, 2007).
Through its SSA Programme (and its Preparatory Programme), ESA aims to provide key services and
information regarding the space environment. The SSA system will comprise three main segments: 1.
Space surveillance and tracking (SST) of man-made space objects, 2. Space weather (SWE) monitoring
and forecasting, 3. Near-Earth object (NEO) surveillance and tracking .
The provision of timely, high quality data via the space surveillance and tracking segment is required to
maintain an awareness of operational space assets as well as the population of debris objects in Earth
orbit . This awareness provides key knowledge that supports space missions and includes the detection
of conjunction events, the detection and characterization of in-orbit fragmentations and the re-entry of
risk objects. In addition, knowledge of overall space traffic is required to understand the evolution of the
space (debris) environment and to support space debris mitigation and remediation activities.
Space debris represents a significant risk to satellite operations , particularly in the low Earth orbit
(LEO) region. Approximately 19,000 objects larger than 10 cm are known to exist, with around 500,000
larger than 1 cm. The number of smaller particles likely exceeds tens of millions [1]. Conjunctions
between satellite pay- loads and other catalogued objects occur at an average rate of 2,400 per day,
with operators having to perform collision avoidance maneuvers in cases where the risk cannot be
reduced to an acceptable level by dedicated tracking campaigns [2]. Whilst mitigation guidelines have
been adopted and measures implemented by space-faring nations, predictions made by computer
models of the space debris environment indicate that the population of orbiting objects will continue to
grow even in the absence of future space launches [3]. The remediation of the near- Earth space
environment is now widely accepted as a requirement for the long-term, sustainable use of this vital
resource. A reliable and robust SSA infrastructure will be essential for the development and operation
of any remediation technology.
The computational and data-intensive challenges presented by the requirements of a SSA system can be
met using a cloud-based computational approach . In this work, we establish the applicability of a
cloud-based architecture for space surveillance and tracking, algorithm development and comparison.
Debris collisions decks satellites – extinction
Moore 9 – Professor of Economics and International Affairs, M.S. and Ph.D. in economics from the
University of Wisconsin-Madison (Mike, Space Debris: From Nuisance to Nightmare, Foreign Policy,
2/12/9, http://foreignpolicy.com/2009/02/12/space-debris-from-nuisance-to-nightmare/)//JJ
When satellites collide in space, should ordinary people be worried? Here's a scenario for global doom
that should have your hair standing on end. News reports on Feb. 12 that two satellites had collided
some 491 miles above the Earth were compelling. There was a whiff of Cold War intrigue about them. A
defunct Russian communications relay satellite and an American commercial satellite had met abruptly
in space with a closing speed of more than 22,000 miles per hour. They were shattered into many
hundreds of pieces, creating an ever expanding debris cloud. In turn, that cloud threatened the satellites
of other countries in similar orbits. And yet, no one was harmed. Space is a big place, isn’t it? The
reports noted that there were already thousands of pieces of space junk large enough to be tracked and
catalogued. Nonetheless, no one has ever been harmed by a bit of space garbage. At the moment, the
amount of debris in low-earth orbit — the region of space that extends a few hundred miles above the
atmosphere — is merely a nuisance. The United States tracks objects in space and shares the data with
the world. Satellite handlers based in many countries use the data to slightly alter the course of their
birds if a collision seems possible. End of story? Not quite. Orbital space is a natural resource, as surely
as land, air, and water. It must be protected because it is home to nearly a thousand satellites put up by
many countries — communications, geo-observation, geopositioning, weather, and other kinds of
satellites. Globalization would not be possible without commercial satellites. Further, the United States’
military-related birds permit the country to conduct precision war . For the first time in history,
satellites provide the data and the guidance necessary to enable bombs and missiles to actually hit the
targets they are fired at. That’s a moral plus. If a war must be fought, it should be prosecuted in such a
way that military targets are hit and civilians spared to the greatest extent possible. No other country
can fight a conventional war as cleanly and humanely as the United States. Satellites make the
difference. Because of the importance of satellites to the American way of war, the United States insists
that it must achieve the capability to militarily dominate space in a time of conflict. It is the only country
that claims that right. Space, says international law on the other hand, is the common heritage of
humankind and must be devoted to peaceful purposes. America’s truculent space-dominance language
annoys many of its friends and allies. Meanwhile, some major powers — particularly China and Russia —
think it smells of imperialism. A country that could control space in a time of conflict might also exercise
that control in a time of peace. Since 1981, virtually every country save the United States and Israel has
gone on record in the U.N. General Assembly as favoring a treaty that would prevent an arms race in
space. Every year, the United States — under presidents Ronald Reagan, George H.W. Bush, Bill Clinton,
and George W. Bush — has used its veto power at the Conference on Disarmament in Geneva to
prevent serious talks. No one, including the United States, is likely to have actual weapons in space in
the foreseeable future. Space control does not require such weapons. Ground-based, sea-based, and
even air-based antisatellite weapons (ASATs) can do the trick. The United States has long been working
on a variety of highly sophisticated ASAT programs — indeed, the infrastructure for missile defense is
the sort of infrastructure needed for ASAT systems. When a country builds ever greater military
capabilities, potential rivals react. China, in particular, is wary of the coercive possibilities of U.S. military
power. The Middle Kingdom says it wants a space treaty, but in January 2007, it tested its own
somewhat primitive ASAT — a kinetic-kill device that roughly replicated a test the United States carried
out in 1985. Is a space-related arms race under way? Yes. But there is still time to ratchet it down, and
the Obama administration has signaled that it might do so. That will be difficult, though. Exceptionalism
is a major driver of foreign policy, and influential people and hard-line think tanks are comfortable with
the idea that full-spectrum dominance in all things military is America’s right. A nightmare scenario: The
United States continues to work on its defensive ASAT systems. China and Russia do the same to counter
U.S. capabilities. India and Japan put together their own individual systems. Ditto for Pakistan, if it
survives as a coherent country. Israel follows suit, as does Iran. In a time of high tension, someone
preemptively smashes spy satellites in low-earth orbits, creating tens of thousands of metal chunks and
shards. Debris-tracking systems are overwhelmed, and low-earth orbits become so cluttered with metal
that new satellites cannot be safely launched. Satellites already in orbit die of old age or are killed by
debris strikes . The global economy , which is greatly dependent on a variety of assets in space,
collapses . The countries of the world head back to a 1950s-style way of life, but there are billions more
people on the planet than in the 50s. That’s a recipe for malnutrition , starvation , and wars for
resources . The United States, by far the world’s most-advanced space power, must take the lead in
Geneva and engage in good-faith talks. If not, the space-is-ruined scenario could become reality.
FCC 1ac - plan
Plan:
The United States federal government should establish Federal Communications Commission oversight
of the National Security Agency to curtail its surveillance of the United States communications
infrastructure.
FCC 1ac – solvency
Contention 3 - solvency
FCC oversight of the NSA curtails bulk internet surveillance and enforces
targeted surveillance that excludes domestic users. FCC technical expertise and
transparency prevent circumvention
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
IV. HOW THE FCC SHOULD ADDRESS THE NSA SURVEILLANCE: IMPLEMENTING THE SOLUTION
Congress is equipped to enact legislation codifying FCC oversight of the NSA by virtue of both current
law and the PCLOB’s recommendations. First, the Telecommunications Act can serve as the basis for the
FCC to take action to further develop its protection of consumers on the Internet, Moreover, there has
been some movement in Congress calling on the FCC to take action regarding the NSA phone database,
indicating the possibility of the FCC taking up an oversight role.116 Further, Congress gave the FCC
broad investigation, regulatory, and enforcement powers, as well as the privacy-focused directive of
implementing Consumer Propriety Network Information protection.117 Additionally, the first PCLOB
Report calls for extensive changes in the NSA and FISA Court regime while the second report calls
expressly for industry input and expertise: the FCC could facilitate some of the suggested changes
through its subject matter expertise. Even as the FCC is set up to facilitate the PCLOB recommendations,
Congress needs to codify the legal authority for the FCC to do this specifically. Granting express legal
authority is key , as organic statutes of agencies determine what a given agency can and cannot do.
Congressional authorization would be a logical outgrowth of both the FCC’s regulatory interests and
current legal recommendations regarding NSA oversight.
A. Congress should amend the organic statutes of the FCC and NSA and encourage participation in the
FISA Court.
The lack of oversight of NSA data collection practices will continue to be problematic moving forward, as
national security is an ongoing concern and technology is a large part of life in a modern society. There is
need for effective and transparent oversight of the NSA’s data collection. As such, Congress should act
by amending the organic statutes of both the NSA and the FCC to provide the FCC with oversight
authority over the NSA, and by allowing the FCC to participate as amicus curiae with the FISA Court.
1. Congress should amend the NSA organic statute to provide for collection of data by the FCC.
The NSA needs transparent and easily understood oversight. While it should not have to disclose
national security information, the agency should be required to disclose basic statistics, such as how
much information it is gathering, similar to Recommendation 9 in the second PCLOB Report.118 This
would at least illustrate to the public, via the FCC, that the NSA is targeting its surveillance at legitimate
threats to national security— rather than performing blanket surveillance of all Internet users . Further,
these reforms would comport with the PCLOB’s enumerated Recommendations.119 As of now,
“lawmakers and the public do not have even a rough estimate of how many communications of U.S.
persons are acquired under section 702.”120 Because the NSA is required to target foreign
communications in order for its surveillance to be lawful,121 an annual snapshot showing the volume of
its surveillance will help foster some degree of transparency,122 helping assure citizens that their
privacy is not being intruded upon, without hampering legitimate national security efforts.123
This expanded role for the FCC in relation to the NSA should be codified by Congress. First, Congress
should amend the NSA’s organic statute to require the agency to comply with FCC requests for data.
Additionally, while the FCC does not have the security clearance to review the substance of the
surveillance, such clearance is not necessary on an agency-wide basis. Instead, Congress should require
the NSA to provide targeting statistics that could be reasonably disclosed, or at least preliminary
statistics that could focus the FCC’s inquiry. This new legislation is all that is necessary to facilitate
oversight on the NSA side, as the FCC will require most of the congressional authorization.
2. The FCC’s organic statute should be amended to allow the FCC authority over NSA data collection and
participation in the FISA Court.
To enact a solution based on FCC oversight of NSA data collection, Congress should pass legislation
allowing the FCC to collect information from the NSA, and to allow the FCC to submit its findings about
this data to congressional oversight committees as well as the FISA Court. While novel, this solution is in
keeping with the PCLOB recommendations, particularly the recommendation emphasizing the need for
the NSA to publicly disclose the scope of its surveillance.124 Moreover, it is not uncommon for agencies
to have oversight authority over other agencies.125 Thus, this type of inter-agency accountability could
be codified to provide the FCC with oversight authority over NSA data collection.
Congress should first authorize the FCC to request certain types of data from the NSA. Similar to the
PCLOB’s recommendation,126 this data, rather than being substantive, would be statistical; for instance,
it might include data and the basic context surrounding how many communications providers from
which the NSA is collecting metadata, or how many email contact lists the NSA is gathering.127 This
would thereby provide oversight over the relevancy problem, wherein the NSA collects information in
such wide swaths so as not to be tied to any particularized inquiry.128 The FCC would therefore be in a
position to review the volume of information, while keeping it confidential.
The legislation should also include authorization for the FCC to interact with the other oversight bodies.
Congress should give the FCC the authority to send any of the statistics that the agency finds
problematic to the FISA Court and the relevant congressional committees, and should provide for the
FCC to be informed of proceedings implicating data collection over which the FCC would be granted
authority. Additionally, Congress should provide a mechanism for the FCC to liaise with Congress on a
regular basis specifically about the NSA data collection since it involves sensitive information: for
instance, setting out regular reports or allowing Congress to send inquiries to the FCC as needed on the
technical aspects of the NSA’s methods of data collection. The language could also allow for public
comment on NSA collection to some extent, modeled on the current FCC notice and comment
procedures. The FCC could thereby ask for generalized comments without disclosing the exact nature of
its inquiry. Thus, the FCC could solicit public comment on the underlying idea of NSA surveillance as it
relates to the communications infrastructure and incorporate valid comments in its representations to
the relevant oversight mechanisms. This would enable the FCC to incorporate comments by carriers and
consumer interest groups into the oversight process and allow some degree of public participation
without sacrificing national security.
Moreover, the legislation must include a mechanism for protecting national security information. The
FCC has knowledge about the underlying infrastructure where the data is coming from as well as
experience dealing with sensitive information.129 However, there are valid concerns in disclosing any
sort of information implicating national security. To that end, Congress may wish to consider adding a
position in the FCC for an intelligence officer with clearance who can look into relevance when the
amounts of data raise a red flag in the FCC’s internal process for reviewing the data. Moreover,
placement of a member of an NSA staffer in the FCC would facilitate inter-agency cooperation and
dialogue about data collection.
For enforcement, in order to preserve national security, Congress should avoid providing the FCC any
mechanism to call the NSA before it via hearing. However, the FCC would be able to report specially to
the House and Senate committees, as well as petition the FISA Court as amicus curae. Additionally, if the
PCLOB wants to stay involved and keep developing oversight, Congress should provide an avenue for the
FCC to call forth another PCLOB investigation should the need arise.
3. Congress should allow outside parties to petition the FISA Court.
Congress should follow the PCLOB Recommendation to allow outside parties, to petition the FISA Court
to put forth independent views. The PCLOB recommendation about FISA Court operations would allow
for public comment.130 While there are logistical problems with allowing other parties before the court,
the PCLOB suggests that a Special Advocate could advise the FISA Court whether amicus participation
would be helpful in a given case.131 Input from outside sources132—and, in particular, the FCC—would
be useful in terms of providing technical insights into the impact of NSA surveillance on
telecommunications. In particular, the FCC could be among the independent viewpoints incorporated in
the continuing process of evaluating upstream and “about” collection. 133 Moreover, even if Congress
decides to provide limited amicus participation, the FCC, providing volumetric data or technical
expertise, could help act as a bridge between the public, parties in the communications field, and the
court.
The FISA Court itself considers each and every surveillance application fastidiously, but the public needs
to have the same confidence in the court’s impartiality and rigor as those government actors who
interact with or serve on the court.134 While there is need for secrecy due to national security concerns,
there is also the need for the court to take into account a greater range of views and legal arguments, as
well as receive technical assistance and legal input from outside parties.135 The PCLOB report indicates
that, while there are difficulties in inviting amicus participation by parties lacking national security
clearance, such as the FCC, the fact that it has been done in one instance indicates that it is possible to
invite participation from outside parties without infringing upon national security.136
Moreover, as mentioned above, it may be useful for Congress to create a position at the FCC in which
national security clearance is granted. Not only would this create a safeguard for the integrity of
national security information, but this would provide for a person who can be called before the FISA
Court who could be exposed to the facts of a given case, and using the data that has been collected
and/or analyzed by the FCC, could provide insight into a particular instance.
Therefore, Congress should encourage the FISA Court to use its ability to appoint technical experts as
well as passing legislation to allow for more amicus participation by outside parties.137 Congress should
enact legislation following the PCLOB recommendations with an eye towards focusing on the FCC as an
expert by enacting legislation for the FCC to participate as amicus curiae before the FISA Court.
V. CONCLUSION
The FCC is in a position to provide oversight and transparency to the NSA Internet monitoring scandal.
As an agency tasked with regulating the technology and communications sectors, the FCC has been
keeping up with the infrastructure and development of technology vis-à-vis the Internet as it pertains to
its congressional mandate and its own regulations. Moreover, there would not be an intrusion onto
national security efforts because only the volume of information collected would be disclosed. The
current crisis in public confidence shows that there is a place for the FCC to be an integral part of the
oversight process. The FCC would focus the inquiry of the congressional oversight committees and
provide the FISA Court with much-needed outside perspective and technical assistance , while
simultaneously giving the public some comfort and adding transparency to the process. This interagency monitoring could increase accountability and public confidence in a way that traditional
oversight mechanisms cannot : thus, the FCC is in a unique position to add value to the oversight of the
NSA and Congress should pursue codifying this solution.
FCC public visibility, expertise in communication tech, and data analysis curb
overreaching and boost public and industry confidence in privacy protection
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
C. The FCC mission can be naturally expanded to protect privacy in relation to surveillance.
The FCC has a strong privacy background as well as a strong history of promoting openness and
transparency on the Internet. First, this section shows the FCC has been extending many of its
regulations to the Internet and adapting to changes in technology as it does so. Second, the FCC has a
strong history of protecting the nation’s communications infrastructure. The FCC has experience with
accounting for the globalized nature of communications.91 This section next argues that the FCC’s
background in these areas prepares the agency to step into a new role overseeing the NSA collection of
data. Finally, this section discusses the benefits of tasking the FCC with this important oversight role.
1. The FCC has strong a background and significant expertise that will allow the agency to provide
oversight of the NSA.
Since the “advent of the Internet,” the FCC has been involved in regulating this facet of the nation’s
communications infrastructure.92 For instance, as early as 1980, the FCC considered the extent to which
information processing (as involved in Internet services) required further or different regulation from
other communications networks.93 In 1980, the FCC began to recognize a distinction between basic and
enhanced services, and applied this distinction until its codification in the Telecommunications Act of
1996.94 Following codification, the FCC continued its use of this framework, but expanded its scope to
include elements of Internet infrastructure, such as broadband connectivity.95 However, the FCC
remained willing to consider applying its regulatory framework to new technologies.96 This flexibility
has helped the agency adapt to new and changing technology as it influences the nation’s
communications infrastructure.
Additionally, the FCC acknowledges the impact of privacy on the Internet. The recognition that
“[c]onsumers’ privacy needs are no less important when consumers communicate over and use
broadband Internet access than when they rely on [telephone] services,” has played a large part in FCC
policy, as the agency has long supported protecting the privacy of broadband users.97 The FCC further
ensures that consumers have control over how their information is used, and that they are protected
from “malicious third parties.”98 Moreover, there is a direct link between consumer confidence and the
adoption of new technology, which the agency has taken into account as it formulates new policies. As
former Chairman Genachowski explained, in the FCC’s view, “[i]f consumers lose trust in the Internet,
this will suppress broadband adoption and online commerce and communication, and all the benefits
that come with it.”99 Moreover, the FCC has recognized that it can, and should, play a major role in
protecting privacy and consumer confidence in the Internet, including working with industry members
to provide best practices for security100 and encouraging broadband adoption.101 The next logical step
is for Congress to authorize the FCC to further develop Internet privacy principles in the context of
protecting consumers from NSA monitoring of their Internet communications and access of the
Internet providers’ infrastructure to do so.
2. FCC oversight of the NSA could confer significant benefits.
The lack of oversight indicates the need for a solution that is publically visible but would not undermine
national security: due to its relevant expertise, the FCC is that solution. First, there are benefits specific
to the FCC’s area of expertise which make it well-suited to provide insight into the data collection
regarding the public good and communications infrastructure. Second, the FCC’s unique insights into the
technological aspects of the Internet put the agency in a position to be uniquely helpful to congressional
oversight committees. Moreover, the FCC is also particularly well-suited to
provide oversight consistent with plans advocated by the PCLOB: for instance, specially providing the
FISA Court with useful and insightful amicus curiae briefs.102
There are significant benefits to the FCC being the agency to provide insight into the NSA’s monitoring
activities. The NSA gets the information it collects from “major Internet switches” and depending on the
type of surveillance, does not have to notify the companies from which it collects data.103 However, the
FCC could, with additional congressional authority, provide insight into basic statistics about the
information collected by the NSA: for instance, volume, requiring the NSA to at least show patterns (i.e.,
the “relationship mapping” aspects).104 This could be beneficial to the national security mission: by
providing a volumetric, technical analysis, based on practices that can be described, the FCC could help
focus the NSA’s data collection, and thereby contribute to the effort to reduce overcollection , as well
as provide a grounds for congressional monitoring and more effective court cases.105 Moreover, the
FCC routinely deals with sensitive information and collecting public comments.106 For instance, the FCC
often makes certain pieces of information confidential in its proceedings. Recently, the agency issued
protective orders in its comment-seeking proceeding regarding the Technological Transition of the
Nations Communications Infrastructure.107 This experience would facilitate the FCC acting as a bridge
between the NSA and its oversight mechanisms.
Additionally the PCLOB report calls for a similar oversight scheme.108 The PCLOB, in its first report, calls
for the government to work with Internet service providers and other companies that regularly receive
FISA production orders to develop rules permitting the companies to voluntarily disclose certain
statistical information.109 Additionally, the PCLOB recommends that the government publicly disclose
detailed statistics to provide a more complete picture of government surveillance operations.110 The
PCLOB also recommends that independent experts as well as telecommunications service providers help
assess at least one data collection technique.111 The FCC regularly interacts with these companies in its
own rulemaking proceedings, and would therefore be in a position to facilitate independent expertise
being utilized in assessing the efficacy of the collection.112 This is not only because the agency works
with the companies and the infrastructure involved already, 113 but also because the FCC’s general
technical expertise places the agency in a position to consider what types of statistics would be helpful
to the public. The need for expertise in determining the technical aspects of whether the data being
collected is authorized is not limited to DOJ and NSA efforts, but extends to the FISA Court.
In its first report, the PCLOB calls for Congress to enact legislation enabling the FISA Court to hear
independent views.114 While a federal agency rather than an “independent” entity, the FCC would be
particularly well-suited to bolster the outside input and provide the FISA Court with information
regarding the impact on telecommunications, particularly the Internet, of NSA surveillance of the
American public. The FCC would be a particularly helpful independent view to involve in the FISA Court
proceedings because of its technical expertise. Furthermore, the FCC has significant experience dealing
with sensitive information, such as trade secrets.115 Both these traits make the agency particularly wellsuited to provide helpful insights to the FISA Court.
FCC specific 2ac blocks
Solvency – FCC
FCC has the technical expertise to effectively curtail NSA internet surveillance
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
The NSA’s extensive surveillance of U.S. citizens was brought into the spotlight by the recent disclosures
of former NSA contractor Edward Snowden.5 The first of Snowden’s disclosures, released by The
Guardian on Wednesday, June 5, 2013, revealed that the NSA was collecting phone call detail records
from millions of U.S. consumers on a daily basis.6 This has prompted widespread public concern about
the extensive information collection policy of the NSA. As technology continues to develop and the
Internet continues to play a major role in modern life, governmental monitoring of Internet activity will
likely become an area of increasing concern. The best way to ensure proper oversight of this monitoring
is by empowering an administrative agency: namely, the Federal Communications Commission (the
“FCC”).
This Note will address what role the FCC could and should play in overseeing intelligence activities that
implicate individual privacy on the Internet and telecommunications networks. This Note argues that the
FCC, as the expert independent agency that routinely deals with the Internet and telecommunications
networks, has both the tools and capacity to provide some oversight and protection for Internet users.
Part II discusses the background of each agency, beginning with the NSA, then delves into the FCC and
its efforts to keep pace with the ever-changing Internet. Part III argues that, because the existing
mechanisms for overseeing governmental, domestic surveillance programs are inadequate, and given
the FCC’s long history of scrutinizing the interplay of national security and privacy involving
telecommunications, Congress should empower the FCC to address privacy concerns raised by the NSA’s
surveillance of U.S. citizens. Part IV discusses how the FCC could address NSA surveillance activities,
laying out possible, practical solutions that Congress should provide.
FCC key to broadband
Restoring consumer trust is vital to widespread broadband adoption –
perception of credible FCC oversight is key
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
B. The Federal Communications Commission is a dynamic agency, adapting to new communications
technology as it emerges.
The FCC makes a conscious effort to adapt to new technology. Established by the Communications Act
of 1934,30 the FCC regulates interstate and international communications by radio, television, wire,
satellite, and cable in all 50 states, the District of Columbia, and U.S. territories.31 As the agency’s thenChairman acknowledged in 2012, the FCC necessarily plays a role in facilitating the continuing
development of the Internet.32 Moreover, the FCC’s governing statutes empower the agency to
investigate and regulate actual and potential breaches in communications privacy that threaten
customer proprietary network information (“CPNI”), among other types of customer information.33 This
authority encompasses not only traditional mediums of telecommunications,34 such as the Public
Switched Telephone Network,35 but also newer mediums, such as the Internet, to the extent that the
FCC considers providers of Internet traffic to be “telecommunications carriers.”36
Communications privacy plays an important role in the FCC’s formulation of policies and procedures to
promote the use and development of the Internet, and the FCC may even have substantial authority to
act in this area.37 The agency recognizes that the adoption of broadband is affected by consumer’s
perception of their online privacy and security .38 Indeed, the FCC has made a point of adapting to and
fostering privacy and security on the Internet by developing industry standards to regulate
communications providers as new technology has developed.39 To that end, the agency puts a strong
emphasis on working with industry leaders, academics, engineers, federal partners, as well as
companies that work to build and expand Internet infrastructure and services, representatives from
state and local entities, and Internet entrepreneurs and pioneers.40 The FCC has thus made a point to
stay abreast of new technological developments in Internet and broadband technology, while working
to facilitate consumer use of and confidence in this technology.
AT: PCLOB CP
Perm do both – PCLOB already recommended the plan; the CP is the squo
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
Additionally the PCLOB report calls for a similar oversight scheme .108 The PCLOB, in its first report,
calls for the government to work with Internet service providers and other companies that regularly
receive FISA production orders to develop rules permitting the companies to voluntarily disclose certain
statistical information.109 Additionally, the PCLOB recommends that the government publicly disclose
detailed statistics to provide a more complete picture of government surveillance operations.110 The
PCLOB also recommends that independent experts as well as telecommunications service providers help
assess at least one data collection technique.111 The FCC regularly interacts with these companies in its
own rulemaking proceedings, and would therefore be in a position to facilitate independent expertise
being utilized in assessing the efficacy of the collection.112 This is not only because the agency works
with the companies and the infrastructure involved already, 113 but also because the FCC’s general
technical expertise places the agency in a position to consider what types of statistics would be helpful
to the public. The need for expertise in determining the technical aspects of whether the data being
collected is authorized is not limited to DOJ and NSA efforts, but extends to the FISA Court.
PCLOB already recommended the plan – Congressional action is necessary to
legally follow up
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
IV. HOW THE FCC SHOULD ADDRESS THE NSA SURVEILLANCE: IMPLEMENTING THE SOLUTION
Congress is equipped to enact legislation codifying FCC oversight of the NSA by virtue of both current
law and the PCLOB’s recommendations . First, the Telecommunications Act can serve as the basis for
the FCC to take action to further develop its protection of consumers on the Internet, Moreover, there
has been some movement in Congress calling on the FCC to take action regarding the NSA phone
database, indicating the possibility of the FCC taking up an oversight role.116 Further, Congress gave the
FCC broad investigation, regulatory, and enforcement powers, as well as the privacy-focused directive of
implementing Consumer Propriety Network Information protection.117 Additionally, the first PCLOB
Report calls for extensive changes in the NSA and FISA Court regime while the second report calls
expressly for industry input and expertise: the FCC could facilitate some of the suggested changes
through its subject matter expertise. Even as the FCC is set up to facilitate the PCLOB recommendations,
Congress needs to codify the legal authority for the FCC to do this specifically. Granting express legal
authority is key , as organic statutes of agencies determine what a given agency can and cannot do.
Congressional authorization would be a logical outgrowth of both the FCC’s regulatory interests and
current legal recommendations regarding NSA oversight.
AT: FISA reform CP
The FISA Court is incapable of restoring public confidence that the government
can protect privacy
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
2. The FISA Court is not providing an adequate level of publicly available oversight.
Moreover, the FISA Court, a specialized judicial entity which is intended to provide direct oversight over
data collection, is not providing an adequate level of publicly accountable oversight. Unlike regular
courts, the FISA Court does not provide a mechanism for non-governmental parties to provide insight
into the particulars of any given case via amicus briefs.79 This characteristic of FISA Court proceedings
means that the Court does not take adequate account of positions other than the government’s, which
in turn undermines the credibility and usefulness of the Court in cases involving metadata, as the court
must rely solely on the assertions of the NSA .80 The PCLOB noted that “[i]t is central to the integrity of
the process that public has confidence in its impartiality and rigor,” and the FISA Court proceedings lack
this element by not allowing for outside comment.81 Indeed, the FISA Court must rely on the assertions
of the regulated parties, such as the NSA, and is unable to benefit from expertise of relevant parties,
unlike regular courts, where outside parties are able to submit amicus briefs.82 The public has a
significant interest in privacy; this constitutional right is of central importance to the American people,
and lack of public input is a serious failing of the process.83
Therefore, as the FISA Court must rely solely on the representations of the government, it is susceptible
to misrepresentations. The recent declassified decision of the FISA Court revealed that “[c]ontrary to the
government’s repeated assurances, NSA had been routinely running queries of the metadata using
methods and terms that did not meet the standard for querying.”84 This confidential nature of FISA
Court proceedings does not foster public confidence, as there has been public backlash to the fact that
the primary opinion authorizing bulk metadata collection of U.S. citizens’ records has taken this long to
produce, even in redacted form.85 This ruling shows that the FISA Court is not well-equipped to provide
effective oversight of NSA operations because of the lack of public input in its proceedings, the
possibility of misrepresentation, and the delays involved with providing decisions to the public.86
Moreover, while redaction is required to protect national security information, it does not inspire public
confidence. The recent decision is necessarily heavily redacted due to the sensitive nature of the
national security information involved.87 There is, however, a need for more transparent information
proving that the NSA is not intruding too far into the privacy of American citizens with its world-wide
programs88 Moreover, recent judicial inquiries have focused on violations of the privacy of individuals
one at a time, rather than large-scale violations, which are unlikely to stem the larger problem of
continuing NSA surveillance.89 Additionally, these judicial decisions, while setting conflicting
precedents, are backward-looking, rather than forward-looking; courts cannot enjoin surveillance
programs unless injured parties know they exist .90 Moreover, as the discussion above has shown, the
way the FISA Court oversight is structured works against promoting public confidence due to the
necessary lack of disclosure and comment opportunities for the public. This illustrates the gap in
oversight, as neither the appellate courts nor the FISA Court are able to foster public confidence in the
government’s ability to react to NSA privacy infringement, just as congressional and executive oversight
cannot foster public confidence that the government can prevent privacy violations by intelligence
agencies.
AT: Court CP
Courts can’t solve the confidence internal link
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
Moreover, while redaction is required to protect national security information, it does not inspire public
confidence. The recent decision is necessarily heavily redacted due to the sensitive nature of the
national security information involved.87 There is, however, a need for more transparent information
proving that the NSA is not intruding too far into the privacy of American citizens with its world-wide
programs88 Moreover, recent judicial inquiries have focused on violations of the privacy of individuals
one at a time, rather than large-scale violations, which are unlikely to stem the larger problem of
continuing NSA surveillance.89 Additionally, these judicial decisions, while setting conflicting
precedents, are backward-looking, rather than forward-looking; courts cannot enjoin surveillance
programs unless injured parties know they exist .90 Moreover, as the discussion above has shown, the
way the FISA Court oversight is structured works against promoting public confidence due to the
necessary lack of disclosure and comment opportunities for the public. This illustrates the gap in
oversight, as neither the appellate courts nor the FISA Court are able to foster public confidence in the
government’s ability to react to NSA privacy infringement, just as congressional and executive oversight
cannot foster public confidence that the government can prevent privacy violations by intelligence
agencies.
Court oversight fails – low expertise, lack of uniformity, deference
Healey, 14 - J.D. Candidate, The George Washington University Law School (Audra, “A Tale of Two
Agencies: Exploring Oversight of the National Security Administration by the Federal Communications
Commission”, FEDERAL COMMUNICATIONS LAW JOURNAL Vol. 67, December)
B. Stronger oversight is also needed because the courts are ill-equipped to adequately review and
oversee the NSA.
Further demonstrating that change in oversight is needed, federal courts, including the FISA Court, have
shown themselves inadequately suited to oversee the NSA’s activities. As discussed in the previous
subsection, existing oversight mechanisms have not stopped the NSA from pursuing these aggressive
and intrusive data collection policies. Additionally, the courts too have a similar gap in reactive
oversight. As such, some form of oversight is needed to bridge the gap between preventative oversight
by congressional committees and reactive oversight by the FISA Court. This section first shows that the
NSA defies judicial control, then discusses how the traditional appellate process is ineffective, before
arguing that the FISA Court is ineffective at controlling the NSA’s data collection policies.
The NSA is not effectively controlled by judicial mechanisms: the agency violated the orders of the FISA
Court that set out the parameters of permissible surveillance. In 2009, the Department of Justice (“DOJ”)
discovered that the NSA had been operating an automated searching system contrary to FISA Court
orders.68 The NSA acknowledged that the Court’s orders did not provide the agency with authority to
employ the list of phone records in the manner in which it did.69 Separately, it was also disclosed to the
FISA Court that the NSA had violated the court’s orders when thirty-one NSA analysts queried the
telephone records database.70 Moreover, traditional courts without security clearance have limited
authority over the NSA.71
1. Traditional courts do not provide an adequate avenue of appeal.
The regular avenue of redress through trial and appellate courts does not provide an adequate avenue
of appeal for citizens challenging NSA data collection. One primary drawback of the ordinary appellate
process is its lack of uniformity. For instance, the U.S. District Court for the District of Columbia and the
U.S. District Court for the Southern District of New York have reached wildly different conclusions while
dealing with the same basic issue.72 In particular, the United States District Court for the District of
Columbia granted injunctive relief for citizens challenging NSA data collection policies, holding that the
public interest weighed in favor of relief on constitutional grounds.73 However, the District Court for the
Southern District of New York found that, while the right to be free from searches and seizures is
fundamental, it is not absolute, and thus held that NSA data collection practices were lawful.74
Moreover, while courts recently have not shied away from analyzing the constitutional issues
involved,75 these same opinions have indicated a healthy reluctance to overstep into issues where
jurisdiction is more questionable due to national security concerns.76 The regular appeals process
generally cannot, or at least is often unable to, consider national security information.77 Both this
limitation and the lack of uniformity show that the courts are not a guaranteed avenue for citizens to
seek redress from NSA data collection practices, nor do they provide one national voice to speak on
such important topics that necessitate uniform and effective review.78
NSA overreach
Overreach internals
NSA backdoor access increasing
MUSCULAR allows domestic communications to be re-routed abroad – XO12333
incentivizes it
Arnbak and Goldberg 14- cybersecurity and information law research at the Institute for
Information Law, LL.M degree from Leiden University, A Competitive Strategy and Game Theory degree
from London School of Economics University of Amsterdam; Associate professor in the Computer
Science Department at Boston University, phD from Princeton University, B.A.S.c from University of
Toronto (Axel and Sharon, “Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance
on Americans by Collecting the Network Traffic Abroad”, Working Paper, June 27, 2014)//TT
We have just argued the that collection of US person’s network traffic from abroad presents a major
loophole that can be exploited to circumvent legal safeguards protecting Americans and oversight
mechanisms in other branches of Government. Put differently, the current regulatory framework for
network surveillance by intelligence agencies creates incentives for conducting surveillance on foreign
soil, regardless of whether it actually affects American communications or not. We now discuss how the
technical details of Internet’s core protocols can cause traffic sent by Americans to be routed abroad,
where it can be collected under the most permissive third legal regime for network surveillance. We
distinguish two settings: (1) situations where the vagaries of Internet protocols cause Americans’ traffic
to naturally be routed abroad, and (2) situations where Internet protocols can be deliberately
manipulated to cause Americans’ traffic to be routed abroad.
3.1 Why US Traffic can Naturally be Routed Abroad.
The Internet was not designed around geopolitical borders; instead, its design reflects a focus on
providing robust and reliable communications while, at the same time, minimizing cost. For this reason,
network traffic between two endpoints located on US soil can sometimes be routed outside the US.
3.1.1 Interception in the Intradomain.
A network owned by a single organization (even an organization that is nominally “based” in the U.S.
such as Yahoo! or Google) can be physically located in multiple jurisdictions. The revealed
MUSCULAR/TURMOIL program illustrates how the N.S.A. exploited this by presuming authority under
EO 12333 to acquire traffic between Google and Yahoo! servers located on foreign territory, collecting
up to 180 million user records per month, regardless of nationality [17].5 Yahoo! and Google replicate
data across multiple servers that periodically send data to each other, likely for the purpose of backup
and synchronization. These servers are located in geographically diverse locations, likely to prevent
valuable data from being lost in case of failures or errors in one location. The MUSCULAR/TURMOIL
program collects the traffic sent between these servers: while this traffic can traverse multiple
jurisdictions, it remains with the logical boundaries of the internal networks of Yahoo! and Google. Thus,
we already have one example where loopholes under the legal regime of EO 12333 were exploited in
the intradomain, i.e., within the logical boundaries of a network owned by a single organization.
3.1.2 Interception in the Interdomain.
Another possibility is the interdomain setting, where traffic traverses networks belonging to different
organizations. Specifically, interdomain routing with BGP can naturally cause traffic originating in a U.S.
network to be routed abroad, even when it is destined for a network that is located on U.S. soil. BGP
(i.e., the Border Gateway Protocol) is the routing protocol that enables communication between
networks owned by different organizations (Autonomous Systems or ASes, e.g., Google’s network, China
Telecom’s network, or Boston University’s network). As shown in Fig. 1, ASes are interconnected,
creating a graph where nodes are ASes and edges are the links between them. ASes use BGP to learn
paths through the AS-level graph; an AS discovers a path to a destination AS via BGP messages that it
receives from each of its neighboring ASes. An AS then uses its local routing policies to choose a single
most-preferred path to the destination AS from the set of paths it learned from its neighbors, and then
forwards all traffic for the destination AS to the neighboring AS that announced the most-preferred
path.
Importantly, the local policies used to determine route selection in BGP are typically agnostic to
geopolitical considerations; path selection is often based on the price of forwarding traffic to the
neighboring AS that announced the path, as well as on the number of ASes on the path announced by
that neighbor. This means that it can sometimes be cheaper to forward traffic through a neighboring AS
that is physically located in a different country, rather than one located in the same country; this
situation is common, for example, in South America (where network paths between two South
American endpoint ASes often cross undersea cables to Miami [24]) and Canada (where network paths
between two Canadian endpoint ASes regularly traverse American ASes [10]). Ongoing work by one of
the authors seeks to measure how often this occurs when both endpoints are located in the US.
3.2 How Deliberate Manipulations can Divert US traffic Abroad.
In addition to situations where Americans’ traffic is naturally routed abroad, the Internet’s core
protocols – BGP and DNS – can be deliberately manipulated to force traffic originating and terminating
in an American network to be routed abroad . As we discussed earlier, deliberately manipulating
Internet protocols for subsequent data collection from abroad, even when the manipulation was
performed from within the U.S., does not fall under the legal definition for ‘electronic surveillance’ in
FISA; instead, these manipulations are regulated under the most permissive third legal regime for
network surveillance, EO 12333 (and perhaps further specified in non-public guidelines).
3.2.1 Deliberate BGP Manipulations.
We know of numerous real-world incidents where manipulations of the BGP protocol have caused
network traffic to take unusual paths, including situations where traffic from two American endpoint
ASes was rerouted through ASes physically located abroad. While there is no evidence that these
incidents were part of a surveillance operation, or even a clear understanding of why they occurred, it is
instructive to consider them as examples of how an authority could circumvent the legal safeguards
protecting U.S. persons by forcing their network traffic to be diverted abroad.
In 2013, Renesys observed a number of highly-targeted manipulations of BGP that caused traffic sent
between two American endpoint ASes to be routed through Iceland [26]. One manipulation that
occurred on June 31, 2013, is shown in Fig. 1. Traffic originating at an endpoint physically located in
Denver and logically located inside Atrato’s AS, then travels to an Icelandic AS (Siminn) and then back to
its destination, which is physically located in Denver and logically located in Qwest/Centurylink’s AS.
Renesys also observed nine other Icelandic ASes, as well as a few ASes based in Belarus, performing
similar BGP manipulations.
Similar incidents have been known to occur periodically in the Internet [9]. In 2010, for example, a
routing incident caused traffic sent between multiple American endpoint ASes to be diverted through
China Telecom during a single 18-minute time period [11]. In 2008, a presentation at DEFCON [27]
demon- strated how these manipulations could be performed in a covert manner that could be used to
confound the network measurement mechanisms (e.g., tracer- oute, BGP looking glasses) that
researchers used to detect the 2010 and 2013 incidents mentioned above.
Target and Location of the BGP Manipulation. To understand how the legal framework applies to
manipulations of the BGP protocol for the purpose of surveillance, we need to understand who is
targeted, and where the manipulation is executed.
The incidents mentioned above are executed as follows. Per Fig. 1, the manip- ulating AS (e.g., Icelandic
AS Siminn) manages to divert traffic to itself by send- ing, to some carefully selected neighboring ASes,
BGP messages that “imper- sonate” those sent by the legitimate destination AS (Qwest/Centurylink’s
AS). Because BGP lacks authentication mechanisms, these neighbors (Atrato’s AS) accept the BGP
message for the impersonated route,and select the impersonated route. They then forwards their traffic
along the impersonated route to the ma- nipulator’s AS (Icelandic AS Siminn). The manipulator receives
the traffic, and forwards it back to the legitimate destination AS (Qwest/Centurylink) via a le- gitimate
route. The manipulator AS therefore becomes a man-in-the-middle be- tween targeted source AS
(Atrato) and the destination AS (Qwest/Centurylink). While Fig. 1 shows traffic between two individual
endpoints within Atrato and Qwest/Centurylink being intercepted by the BGP manipulation, typically all
traffic originating inside Atrato and destined to the Qwest/Centurylink AS would be intercepted by the
manipulator.
To further understand the targets of this manipulation, we consider what it means to send BGP
messages that “impersonate” a legitimate destination AS. First, we provide more detail on BGP
messages. A BGP message is used to ad- vertise the path to a specific IP address block hosted by a
particular destination AS.6 Each AS in the Internet is allocated one of more IP address blocks, used to
identify devices operated by that AS. Multiple devices can use a single IP address; thus, referring back to
our legal analysis, a single IP address can be used by multiple devices or even ‘persons’. A separate BGP
message is used to advertise each IP address block allocated to a particular destination AS.
Thus, sending a BGP message that “impersonates” a legitimate destination AS means that the
manipulator AS (Icelandic AS Siminn) sends a BGP message that claims a false route to the IP address
block (206.51.69.0/24). As shown in Fig. 1, the manipulator AS (Siminn) falsely claims that the IP address
block 206.51.69.0/24 is allocated to Siminn’s own customer AS, the Icelandic Opin Kerfi AS 48685; in
reality that IP address block is allocated to the legitimate destination AS (Qwest/Centurylink). Because
BGP lacks mechanisms that can authenticate allocations of IP address blocks, the manipulator’s
neighbors will accept this impersonated route, and forward all traffic destined to the IP ad- dresses in
the disputed block to manipulator’s AS (Siminn), instead of the legiti- mate destination
(Qwest/Centurylink). This “impersonated” route will continue to propagate through the network, as the
ASes that select the “impersonated” route pass it on to their own neighbors.
Thus, we can see that the “target” of this BGP manipulation is (1) all traffic sent by each source AS that
selected the impersonated route (e.g., all traffic from Atrato) that (2) is sent to IP addresses in the block
that the manipulator falsely claims is allocated to him (e.g., the 256 IP addresses contained in the block
206.51.69.0/24). That has important legal implications: the permissive legal regime under EO 12333
applies to such surveillance operations, as it does not necessarily ‘intentionally’ target a ‘known,
particular U.S. person’. It is also important to note that this BGP manipulation (which involves sending
just a single “impersonated” BGP message from the Icelandic AS Siminn, shown in red in Figure 1) is
executed entirely outside of the targeted endpoint ASes (Atrato and Qwest/Centurylink). Thus, this BGP
manipulation can be executed entirely abroad .
3.2.2 Deliberate DNS Manipulations.
An alternate network protocol manipulation that can divert traffic to servers located abroad involves
manipulating the DNS (i.e., Domain Name System). The DNS is a core Internet protocol that maps
human-readable domain names (e.g., www.facebook.com) to the IP addresses that identify the servers
hosting the domain (e.g., 69.63.176.13); applications that wish to communicate with the domain
(www.facebook.com) first perform a DNS lookup to learn the IP address of the server that hosts the
domain, and then direct their network traffic to that IP address. DNS lookups for end users and
applications within a single AS are typically performed by a device called a recursive resolver, typically
located within the AS; see Fig. 2. Recursive resolvers engage in the DNS protocol with devices located
outside their AS, and return responses to DNS lookups to users and applications within their AS.
The DNS is well known to be vulnerable to manipulations the subvert the mapping from a domain name
to IP address [8, 20, 22].7 These manipulations, which have often been observed in the wild as
mechanisms for performing net- work censorship [1, 35], can also be used to redirect network traffic
through servers located abroad. Fig. 2 presents an example. Suppose that a manipulator wants network
traffic destined to www.facebook.com from a given source AS (e.g., Boston University) to be routed
though a foreign server located abroad. Suppose the foreign server has IP address 6.6.6.6. The
manipulator can execute a DNS manipulation that causes the recursive resolver in the source AS (Boston
University) to map www.facebook.com to IP address 6.6.6.6. All network traffic for www.facebook.com
from the source AS (Boston University) will then flow to the foreign server at IP address 6.6.6.6. Finally,
the foreign server will silently for- ward the traffic it receives to the real facebook server at IP address
69.63.176.13. Thus, the foreign server becomes a man-in-the-middle for traffic sent between two US
endpoints (Boston University and www.facebook.com).
Target and Location of the DNS Manipulation. This manipulation is more fined-grained than the BGP
manipulation we discussed earlier: it targets all traffic sent to a particular domain (www.facebook.com)
that is sent by all users and applications served by the targeted recursive resolver (i.e., within a Boston
University’s AS). Again, the permissive legal regime under EO 12333 applies to such surveillance
operations, as the traffic does not necessarily ‘intentionally target a U.S. person’.
Moreover, like the BGP manipulations we described earlier, these DNS manipulations can be
conducted entirely abroad ; Hertzberg and Shulman [20] describe a technique that allows this
manipulation to be executed by a device located entirely outside the targeted source AS. For those
interested in the de- tails, we sketch out the technique below and in Fig. 3:
Figure 3: We show how the manipulator located abroad can subvert the DNS mapping for
www.facebook.com at the target source AS 111 (Boston University). First, it is important to observe that
recursive resolvers usually do not accept messages from senders outside their AS; however, mailservers
do. (Mailservers are devices that provide email services for an AS. They therefore need to accept emails
from outside the AS.) Thus, a manipulator located outside the target AS can use the mailserver to attack
the recursive resolver. Specifically, the manipulator sends some carefully-crafted messages to a
mailserver located inside the target AS. These messages act as a trigger for the mailserver to send DNS
queries to the DNS resolver inside the AS; the DNS resolver accepts messages from the mailserver,
because the mailserver is inside the AS. The recursive resolver then proceeds to resolve the mailserver’s
DNS queries. To do this, the recursive re- solver sends DNS messages to other DNS servers outside the
target AS. Finally, the manipulator responds to these DNS messages with carefully-crafted bogus DNS
messages of its own; this allows the manipulator to subvert the recursive resolver’s mapping from a
domain name to an IP address. Observe that this manipulation just involves sending messages from
outside the AS; no internal devices in the AS need to be compromised.
NSA uses MUSCULAR for backdoor access to US company data
Gellman, 13 – staff writer for Washington Post, won 3 Pulitzers (Barton, “NSA infiltrates links to Yahoo,
Google data centers worldwide, Snowden documents say” Washington Post, 10/30,
http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-datacenters-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74d89d714ca4dd_story.html
The National Security Agency has secretly broken into the main communications links that connect
Yahoo and Google data centers around the world, according to documents obtained from former NSA
contractor Edward Snowden and interviews with knowledgeable officials.
By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of
user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but
it keeps a lot.
According to a top-secret accounting dated Jan. 9, 2013, the NSA’s acquisitions directorate sends
millions of records every day from internal Yahoo and Google networks to data warehouses at the
agency’s headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had
processed and sent back 181,280,466 new records — including “metadata,” which would indicate who
sent or received e-mails and when, as well as content such as text, audio and video.
The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the
agency’s British counterpart, the Government Communications Headquarters . From undisclosed
interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that
carry information among the data centers of the Silicon Valley giants.
The infiltration is especially striking because the NSA, under a separate program known as PRISM, has
front-door access to Google and Yahoo user accounts through a court-approved process.
The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship
American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it
has not been known to use them routinely against U.S. companies.
In a statement, the NSA said it is “focused on discovering and developing intelligence about valid foreign
intelligence targets only.”
“NSA applies Attorney General-approved processes to protect the privacy of U.S. persons — minimizing
the likelihood of their information in our targeting, collection, processing, exploitation, retention, and
dissemination,” it said.
In a statement, Google’s chief legal officer, David Drummond, said the company has “long been
concerned about the possibility of this kind of snooping” and has not provided the government with
access to its systems.
“We are outraged at the lengths to which the government seems to have gone to intercept data from
our private fiber networks, and it underscores the need for urgent reform,” he said.
A Yahoo spokeswoman said, “We have strict controls in place to protect the security of our data centers,
and we have not given access to our data centers to the NSA or to any other government agency.”
Under PRISM, the NSA gathers huge volumes of online communications records by legally compelling
U.S. technology companies, including Yahoo and Google, to turn over any data that match courtapproved search terms. That program, which was first disclosed by The Washington Post and the
Guardian newspaper in Britain, is authorized under Section 702 of the FISA Amendments Act and
overseen by the Foreign -Intelligence Surveillance Court (FISC).
Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and
less oversight. NSA documents about the effort refer directly to “full take,” “bulk access” and “high
volume” operations on Yahoo and Google networks. Such large-scale collection of Internet content
would be illegal in the United States, but the operations take place overseas, where the NSA is allowed
to presume that anyone using a foreign data link is a foreigner.
Outside U.S. territory, statutory restrictions on surveillance seldom apply and the FISC has no
jurisdiction. Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) has acknowledged that
Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive
Order 12333 , which defines the basic powers and responsibilities of the intelligence agencies.
John Schindler, a former NSA chief analyst and frequent defender who teaches at the Naval War College,
said it is obvious why the agency would prefer to avoid restrictions where it can.
“Look, NSA has platoons of lawyers, and their entire job is figuring out how to stay within the law and
maximize collection by exploiting every loophole,” he said. “It’s fair to say the rules are less restrictive
under Executive Order 12333 than they are under FISA,” the Foreign Intelligence Surveillance Act.
XO 12333 collects US person data
XO 12333 is used to collect large quantities of metadata and find personal
information on U.S. citizens
Rotenberg, EPIC President and Executive Director, 6-16-15 [Electronic privacy information
center, non-profit research and educational organization established in 1994 to focus
public attention on emerging privacy and civil liberties issues.12 We work with a distinguished panel of
advisors in the fields of law, technology and public policy., COMMENTS OF THE ELECTRONIC PRIVACY
INFORMATION CENTER, file:///C:/Users/Jonah/Downloads/EPIC-12333-PCLOB-Comments-FINAL.pdf]
Schloss2
Despite the restrictions placed on the Intelligence Community by Executive Order 12333 and the foreign
intelligence surveillance laws, the NSA and CIA continue to engage in bulk collection and interception of
communications and sensitive information about United States Persons.33 As Senate Intelligence
Committee member Senator Ron Wyden recently noted, “Today there’s a global communications
infrastructure, so there’s a greater risk of collecting on Americans when the NSA collects overseas.”34
EPIC also raised this issue during a PCLOB’s public meeting last year, pointing out that, “Although 12333
requires a court order to target a United States Person, this is of little comfort. Given the global nature
of communications, the indiscriminate mass surveillance the NSA conducts overseas captures the
information of United States Persons.”35 Now that communications are transmitted via a global
telecommunications network, the territorial restrictions of EO 12333 do not meaningfully limit the bulk
collection of U.S. person information and private communications transmitted via U.S. companies.
These programs significantly infringe citizens’ rights under both the Privacy Act and the Fourth
Amendment. Yet there is very little independent oversight of these programs; collection activities of the
IC are difficult to monitor. As EPIC previously stated in a letter to PCLOB, “[t]he Privacy Act defines the
right to privacy with regard to the collection and use of personal information by federal agencies . . . .
Much has happened since 9-11 that is clearly contrary to the purposes of Privacy Act and the
expectation of many Americans who rightly believe that the U.S. government would not develop
massive databases to secretly profile Americans.”36 The Supreme Court recently issued a landmark
ruling on digital privacy rights, finding that the Fourth Amendment requires officers to obtain a warrant
prior to searching an individuals’ cell phone incident to arrest. 37 The Court emphasized that “the
Fourth Amendment was the founding generation’s response to the reviled ‘general warrants’ and ‘writs
of assistance’ of the colonial era, which allowed British officers to rummage through homes in an
unrestrained search of evidence of criminal activity.”38 The Court also held that the Fourth Amendment
requires heightened protections for digital content and communications, finding digital files are
fundamentally different than analog records.39
Government programs of mass surveillance that indiscriminately collect data about U.S. Persons are similar to the reviled “general warrants”
that the Founders sought to abolish.40However, in the context of foreign intelligence collection, it
is difficult to ensure that
collection is properly targeted and limited. As EPIC has emphasized, “the only check on surveillance under EO
12333 comes from Executive oversight. This type of self-regulation has proven to be ineffective at best
in limiting surveillance overreach. The minimal oversight in place does not even give the appearance of
the checks and balances provided by judicial or congressionaloversight.”41
It is urgent that PCLOB examine the scope of collection currently conducted under EO12333, given that courts have already ruled that other
NSA bulk collection programs wereillegal.42 EPIC previously reported on one of these other agency programs: “On October 3, 2011,the FISC
ruled that the NSA ‘upstream collection’ of Internet communications violated the Fourth Amendment and the FISA. Specifically, the targeting
and minimization procedures adopted by the NSA were not sufficient to protect the significant number (more than 50,000 per year) of wholly
domestic communications obtained via ‘upstream collection.’”43 Courts have already imposed new restrictions on these narrower surveillance
programs conducted under Congressional
and Judicial oversight, and the much broader EO 12333 bulk
collection programs present an even more pressing need for new oversight and limitations.
The privacy impact of these surveillance programs is not limited to the collection of the contents of U.S.
persons’ communications; the collection of metadata can be even more intrusive. In an amicus curiae brief in the
U.S. Court of Appeals for the Ninth Circuit, EPIC emphasized that “Analysis of large metadata sets equivalent to those
created by the NSA can reveal even more personal information including the identities of our friends
and associates, the identities of our loved ones, and even our political, religious, or social affiliations.”44
EPIC stressed that “[a]ll metadata can be used to make inferences about our daily activities, but location data is particularly sensitive since it
can uniquely identify individuals, reconstruct a person’s movements across space and time, predict future movements, and determine social
interactions and private associations.”45 Collection
of metadata can be a massive invasion of privacy, especially if
the procedures for collection are too expansive.
XO 12333 surveillance is unchecked and unregulated—low legal protections
Arnbak and Goldberg 14- cybersecurity and information law research at the Institute for
Information Law, LL.M degree from Leiden University, A Competitive Strategy and Game Theory degree
from London School of Economics University of Amsterdam; Associate professor in the Computer
Science Department at Boston University, phD from Princeton University, B.A.S.c from University of
Toronto (Axel and Sharon, “Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance
on Americans by Collecting the Network Traffic Abroad”, Working Paper, June 27, 2014)//TT
Until recently only a 1993 version of USSID 18 was de-classified. Most probably in response to the
MUSCULAR revelations on 30 October 2013 [17], the authorities released a 2011 version of USSID 18 on
18 November 2013 [7] that remains redacted on critical parts, as we will see. Noting that the 1982 DoD
Directive, until this day, contains a completely classified Annex A particularized for N.S.A. conduct that
may affect U.S. persons, we focus our analysis on this recently declassified 2011 version of USSID 18.
With regard to actual operations, the public has learned how the N.S.A. assumed authority under EO
12333 to acquire communications within Google and Yahoo! networks because the operation was
conducted on foreign territory [17], collecting up to 180 million user records per month, regardless of
nationality (we discuss this program is Section 3.1.)
Nevertheless, unlike under FISA, critical parts of the underlying policies are still classified, or heavily
redacted. In this section, we will analyze what is publicly known about this third regime and indicate the
remaining knowledge gaps. We first discuss the scope of EO 12333, and when it applies to advanced
network surveillance methods. We then describe how U.S. intelligence authorities enjoy broad and
largely unchecked legal authority when conducting surveillance abroad, and how legal protection
offered to Americans under EO12333 are substantially lower than under the other regimes. Finally, we
point at fundamental institutional barriers in the U.S. Constitution to long term reform of EO12333
policies, regardless of their serious impact on Americans’ privacy.
XO 12333 must be curtailed to protect privacy—massive deregulation under the
Executive Branch
Arnbak and Goldberg 14- cybersecurity and information law research at the Institute for
Information Law, LL.M degree from Leiden University, A Competitive Strategy and Game Theory degree
from London School of Economics University of Amsterdam; Associate professor in the Computer
Science Department at Boston University, phD from Princeton University, B.A.S.c from University of
Toronto (Axel and Sharon, “Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance
on Americans by Collecting the Network Traffic Abroad”, Working Paper, June 27, 2014)//TT
2.3.1 Scope of the Third Regulatory Regime under EO 12333: Electronic Surveillance Conducted Abroad.
As discussed in the Section 2.2, electronic surveillance falls within the EO 12333 regime when it is
conducted on foreign soil, and when it does not fall within the 1978 FISA definition of ‘electronic
surveillance’. Or as the N.S.A. recently put it, when surveillance is “conducted through various means
around the globe, largely from outside the United States, which is not otherwise regulated by FISA.” [5,
p. 2-3]. 4
While FISA surveillance is conducted from U.S. soil, EO 12333 surveillance is mostly conducted abroad.
EO 12333 presumes that network traffic intercepted on foreign soil belongs to non-U.S. persons (cf. s.
9.8 & 9.18.e.2 of USSID 18 defining ‘foreign communications’ and ‘U.S. person’). Companies and
associations are also considered in the EO 12333 definition of U.S. persons. These entities may be
assumed to be non-U.S. persons if they have their headquarters outside the U.S. Even when it is known
to the N.S.A. that a company is legally controlled by a U.S. company, it may be assumed a non-U.S.
person. Taken together, the rules for presuming a non-U.S. person under this regime are permissive on
the individual-, group- and organizational levels.
Installing a Device. We return to the question of ‘installing a device’, to understand how EO 12333
regulates the network protocol manipulations we describe in Section 3.2. These manipulations fall under
EO 12333. However, on top of the 1978 FISA definition of ‘electronic surveillance’, neither EO 12333 nor
the 2011 update of USSID 18 further specify what ‘installing a device’ means to- day. It is not covered in
the definitions of ‘collection’ (section 9.2 USSID 18), ‘interception’ (section 9.11 USSID 18) nor in the
definition of ‘electronic surveillance’ (section 9.7 USSID 18). The definition of ‘installing a device’ to
enable surveillance could possibly be redacted in USSID 18 or further specified in a still-classified
guideline. A post-Snowden N.S.A. memorandum does not provide any clarity [5, p. 2-3]. To the contrary:
NSA uses EO 12333 authority to collect foreign intelligence from communications systems around the
world. Due to the fragility of these sources, providing any significant detail outside of classified channels
is damaging to national security.
The only sensible observation we can make at this point is that a leaked document on the use of
malware by the N.S.A. seems to suggest that the EO 12333 governs untargeted malware, and that USSID
18 only restricts it once the N.S.A. specifically knows who it is targeting [4]. This would be consistent
with our ear- lier argument that the 1978 FISA definition of ‘installing a device’ (cf. 1801(f)(4) FISA) does
not cover the advanced network manipulations we present in Sec- tion 3.2.
2.3.2 Weak Legal Protections for Americans under EO 12333.
Section 1.1 of EO 12333 provides that electronic surveillance should consider U.S. persons rights. The
details are further specified in the underlying documentation, in particular in the heavily redacted USSID
18. In the Washington Post, a former N.S.A. chief analyst provided some background on the interplay
between FISA and EO 12333 [17]:
“Look, NSA has platoons of lawyers, and their entire job is figuring out how to stay within the law and
maximize collection by exploiting every loophole,” he said. “It’s fair to say the rules are less restrictive
under Executive Order 12333 than they are under FISA,” the Foreign Intelligence Surveillance Act.
In spite of the redactions in USSID 18, we can make several new contributions to our collective
understanding how legal protection for U.S. persons indeed are less restrictive under EO 12333.
Intentionally targeting U.S. persons. Essentially, section 2.4 of EO 12333 establishes that electronic
surveillance operations that fall under the EO 12333 regime and do not fall under the FISA regime may
intentionally target U.S. persons , as long as they meet the conditions summed up in s. 4.1. USSID 18.
Before looking at those specific conditions, we mention that it is striking that a central passage of the
opening paragraph of section 4.1. is redacted. It reads:
4.1. Communications which are known to be to, from or about a U.S. PERSON [one entire line redacted]
not be intentionally intercepted, or selected through the use of A SELECTION TERM, except in the following instances:
Here we can only call attention to the redaction, but we have no possibility of knowing what it exactly
states. (This would be one of many specific points that could be clarified through e.g., political oversight
or a FOIA request.) The more specific ‘instances’, where ‘communications which are known to be to,
from, or about U.S. persons’ may be ‘intentionally intercepted’ are outlined in sections of 4.1.(a-d)
USSID 18 and span 4 full pages.
Even with the many redactions, we can see that the restrictions provide less protection on critical points
than the already permissive ‘minimization procedures’ under FISA. Often, instead of FISA Court
approval, operations merely need Attorney-General or in some cases even only Director N.S.A. approval
to be ‘legal’. To name just one relevant example, s. 4.1.(c).(1) of USSID 18 holds that when U.S. persons
(including U.S. corporations) consent to a surveillance operation, the approval of the Director of the
N.S.A. may suffice to go ahead with a program. Indeed, May 2014 saw revelations on N.S.A.’s ‘strategic
partnerships’ with several leading corporations in several routing sectors, which may point at obtained
‘consent’. Given aforementioned legal loopholes, it seems likely that the advanced network protocol
manipulations we discuss in Section 3.2 fall within this category, as well as subsequently collected
internet traffic. But several of the relevant criteria are, again, redacted (notably an entirely redacted s.
4.1.(b).(a). on ‘international communications’), which prohibits us from establishing this with complete
certainty [19]. Political pressure or perhaps FOIA request specifically targeted at transparency on s. 4.1.
USSID 18 would be particularly useful to further analyze the scope of unilateral approval by the Director
of the N.S.A. for broad surveillance programs.
Wide Exemptions to Process U.S. Person data Already Collected. Under USSID 18, further processing of
foreign communications is unrestrained (cf. s. 5.3 USSID 18), while the exemptions to further process
communication between U.S. persons intercepted during the collection of foreign communications are
generous (cf. s. 5.4.(d) USSID 18): when communications are encrypted; when ‘significant’ for a ‘foreign
intelligence’ purpose; when useful as evidence in criminal proceedings, or helpful to reveal
communications security vulnerabilities (cf. section 5.4.d). In all these instances, the Director of the
N.S.A. can determine to hold onto the communications between U.S. persons; under FISA, the AttorneyGeneral must make such determinations.
Many More Classified Guidelines. Adding to the host of relevant but classified sentences, section 2 of
USSID 18 references several classified legal documents that further govern specific intelligence activities,
among them the DoD Direc- tives mentioned at the start of this section and NSA/CSS Policy No. 1 to 23,
titled “procedures governing NSA/CSS Activities that affect U.S. persons”, as revised 29 May 2009. The
public has no ability to analyse (the recent versions of) these mostly classified documents in detail. It is
hard to tell whether such guidelines provide more legal loopholes. More generally, there are several
differ- ences in legal protection between FISA and EO 12333 that we haven’t discussed here. In future
work, we hope to further research these issues, in particular the DoD Directives, NSA/CSS policies and
possible new disclosures.
2.3.3 Reforming the Third Legal Regime under EO 12333: Just One Branch of Government.
A more fundamental difference can be signalled at this point: over the next years, three branches of
Government are involved with Patriot Act and FISA reform. In the sphere of EO 12333, this is not the
case. Electronic surveillance regulated under EO 12333 is solely overseen by the Executive branch,
regardless of its actual impact on the privacy of Americans. This simple observation has a long tradition
in U.S. Constitutional law, that gives broad so-called Article II authorities to the U.S. President when it
comes to national security. As we have seen, EO 12333 and its underlying guidelines have been adopted
within the Executive Branch. Much of the lowered legal protection we have signaled demonstrates how
oversight between branches of Government can be circumvented by conducting surveillance under EO
12333.
In response to media inquiries, Senator Dianne Feinstein (D-Cal), Chair of the U.S. Senate Intelligence
Committee tasked to oversee U.S. intelligence agencies, provides some insight into what seems a
complete lack of congressional oversight over EO 12333 operations [34]:
“Twelve-triple-three [EO 12333] programs are under the executive branch entirely.” Feinstein has also
said the order has few, if any, privacy protections. “I don’t think privacy protections are built into it,” she
said.”
One very real outcome of this lack of oversight (or checks and balances between separate branches of
Government) is the wide range of redactions still in place under the EO 12333 regime, which limits
independent analysis. We mention, that by contrast, a central criterion under the European Convention
of Human Rights (‘ECHR’) is that any government policy that impacts rights guaranteed under that
Convention, including privacy, must be publicly available and contain specific safeguards against
overreach. Under the ECHR, such transparency is seen to be a critical guarantee against overreach and
abuse of power. In a range of cases, such as the 2008 Liberty v. UK case, surveillance programs have
been ruled in violation of the fundamental right to privacy precisely because transparency and
safeguards against abuse had been absent. [32].
To summarize, programs under EO 12333 may collect startling amounts of sensitive data on both
foreigners and Americans. EO 12333 and USSID 18 presume communications are non-American,
precisely because their operations are conducted abroad. Such operations are regulated by guidelines
adopted almost entirely within the Executive branch, without any meaningful congressional of judiciary
involvement. Generous exemptions exist that enable use of information ‘incidentally’ collected on U.S.
persons, and critical details remain classified. Overcoming these concerns remains an issue that will be
addressed entirely by the Executive branch. So far, it has not sufficiently been addressed at all, most
probably because the lack of checks and balances between three branches of Government.
Absent a reform of XO 12333 unrestrained surveillance on US persons continue
Arnbak and Goldberg 14- cybersecurity and information law research at the Institute for
Information Law, LL.M degree from Leiden University, A Competitive Strategy and Game Theory degree
from London School of Economics University of Amsterdam; Associate professor in the Computer
Science Department at Boston University, phD from Princeton University, B.A.S.c from University of
Toronto (Axel and Sharon, “Loopholes for Circumventing the Constitution: Warrantless Bulk Surveillance
on Americans by Collecting the Network Traffic Abroad”, Working Paper, June 27, 2014)//TT
Therefore, we emphasize that while the Patriot Act and FISA are overseen by all three branches of
Government, EO 12333 remains solely under the executive branch because the U.S. Constitution grants
it wide national security authorities to protect the nation against threats overseas. The implications for
long term reform are real: even if the legislative of judiciary branches of Government address the
loopholes in the Patriot Act and FISA, the U.S. Constitution emerges as a significant obstacle to the long
term reform of EO 12333. We have argued that consolidation of the loopholes in EO 12333 within the
Executive branch could leave Americans’ Internet traffic as vulnerable to surveillance, and as
unprotected by U.S. law, as the traffic of foreigners. Going forward, without a fundamental
reconsideration of the lack of privacy and due process safeguards for non-U.S. persons, U.S. surveillance
legislation leaves the door wide open for unrestrained surveillance on U.S. persons from abroad.
XO 12333 allows the NSA to go way beyond it’s legal limits---multiple program
examples
Rotenberg, EPIC President and Executive Director, 6-16-15 [Electronic privacy information
center, non-profit research and educational organization established in 1994 to focus
public attention on emerging privacy and civil liberties issues.12 We work with a distinguished panel of
advisors in the fields of law, technology and public policy., COMMENTS OF THE ELECTRONIC PRIVACY
INFORMATION CENTER, file:///C:/Users/Jonah/Downloads/EPIC-12333-PCLOB-Comments-FINAL.pdf]
Schloss2
Former NSA Director General Keith Alexander declared in a prepared statement before the Senate Judiciary Committee that the “NSA
conducts the majority of its SIGINT46 activities solely pursuant to the authority provided by EO 12333.”47
While the agency does not discuss most of the sources and methods of SIGINT collection publicly, disclosures in recent years have. June 16,
2015 Under Executive
Order 12333exposed some details of the broad surveillance conducted under EO
12333. Under these programs, the NSA collects a broad range of U.S. Person (“USP”) information.. These
bulk collection programs also result in collection of a massive amount of communications and
information unrelated to surveillance targets. For example, NSA’s MYSTIC program is capable of recording
and storing all calls transmitted to or from a given country.48 The MYSTIC program has been used to collect and store all
of the audio from phone calls made in the Bahamas as well as an unnamed country for thirty days.49 Under MYSTIC, the NSA also collected the
associated metadata for all phone calls made in above countries as well as the metadata from Mexico, Kenya, and the Philippines.50
Using SOMALGET, a tool utilized by the MYSTIC program to help collect and store the audio content of conversations, the NSA is able to
processes over 100 million call events perday.51 SOMALGET can store and manage approximately five billion call events.52
Using its retrospective retrieval (“RETRO”) tool analysts in the NSA, as well as other undisclosed agencies, can listen to audio from phone calls
that were not flagged as of interest at the time of the original conversation.53
The MYSTIC bulk
collection program captures under EO 12333 information on every telephone call of an
estimated 250 million residents in the four named countries.54 An estimated five million U.S. citizens visit the Bahamas alone
every year.55Because this bulk collection indiscriminately sweeps up all telephone calls in the Bahamas, USPs’ phone calls’
associated audio and metadata would necessarily be collected and stored under the MYSTIC program.
Also some, if not the majority, of the foreign communications swept up are unrelated to any valid foreign intelligence target.
The NSA’s programs
under EO 12333 also include massive data collection from the links between Yahoo’s
and Google’s internal data centers.56 Under project MUSCULAR, a joint operation with the British Government Communications
Headquarters (“GCHQ”), the NSA has specifically targeted U.S companies data center links for collection.
MUSCULAR intercepts data, including e-mails and other private communications of users, that pass through the companies’ internal networks
en route to their overseas data centers.57
These data centers are connected via fiber-optic cables, enabling synchronous storage of large amounts
of corporate and user data all across the world. For instance, Yahoo is able to synchronize a Yahoo accountholder’s entire
email archive from the U.S. to another data center across the world, and the NSAMUSCULAR program could capture those e-mail contents en
route.
As of January 2013, the NSA
sent millions of records a day to its Fort Meade headquarters that it collected
from Yahoo’s and Google’s internal networks.58
2012, over 181 million new records, including metadata, were processed and sent to FortMeade.59The full extent of USP information collected
under MUSCULAR is unknown. However, the
bulk collection program would necessarily sweep up irrelevant and
personal information from USP and non-targeted foreign person.
AT: Freedom Act solves
The Freedom Act didn’t actually curtail surveillance
Brenner, 15 - Senior Fellow, the Center for Transatlantic Relations; Professor of International Affairs,
University of Pittsburgh (Michael, Huffington Post, “The NSA's Second Coming” 6/8,
http://www.huffingtonpost.com/michael-brenner/the-nsas-second-coming_b_7535058.html
That all makes for one awesome production. Doubtless there will be a film adaptation immortalized in a
script by Bob Woodward. Something like that will happen -- even though it is a concocted yarn whose
meaning has been twisted and whose significance has been vastly inflated. For the truth is that what
Congress did, and what it did not do earlier, changes very little -- and nothing of cardinal importance.
The main effect is to give the impression of change so as to release pressure for reform that might really
be meaningful. The base truth is that everything that counts remains the same. To entrench and to
legitimate a system of massive surveillance that undercuts our privacy while doing nothing to secure our
well-being.
Let's look at the false notes struck by this narrative.
Matters of Fact
1.
The so-called restrictions on bulk data collection apply only to telephone calls. All else is
exempted: emails, Internet searches, social media, and info regarding each that is retained in our
communicating devices.
2.
The restrictions on real-time surveillance of telephone calls can be overcome by the granting of
a warrant by the FISA upon request by NSA, FBI, Justice Department, CIA -- not to speak of local
authorities. That Court, over the past eight years, has refused only 11 of 33,900 requests. The judges, by
the way, are handpicked by Supreme Court Chief Justice John Roberts who has jumped into the policy
arena by declaring himself strongly opposed to any tightening of restrictions on how the court operates
or on the NSA's methods. The FISA court's attitude toward government spying on Americans has been
generous to the extreme. Former lead judge of the FISA Court, John D. Bates, has campaigned vigorously
on behalf of the status quo. He even objected to the extra workload of requiring that courts approve all
national security letters, which are administrative subpoenas allowing the F.B.I. to obtain records about
communications and financial transactions without court approval.
3.
The specified targets may be organizations, groups and networks as well as an individual. In
practice, that means each grant of surveillance power may authorize comprehensive electronic spying
on hundreds or thousands of citizens.
Currently the NSA is overwhelmed by the billions of communications they register and try to catalogue
each week. Long-term data retention only makes sense if there is a project afoot to exploit it
systematically in order to control, to suppress, to penalize. There is no such Big Brother plan in place or
on the horizon. NSA operations fortunately have instead been conceived and managed by fantasists and
bureaucratic empire builders -- as is demonstrated by Edward Snowden's leaks of their immense target
list and their major intelligence failures.
4.
The terms of the warrants allow for a two-step "hop" from the identified target to others whose
suspect communications emerge from the initial combing.
Here is one hypothetical scenario. The NSA requests approval from the FISA court to collect the
communications of the Arab-American Civil Rights League on the grounds that it suspects some dubious
characters have been using its facilities. Over a period of months (if there a restriction on the duration of
electronic surveillance under FISA rules), they register 1,000 communications. Using 'first hop' privileges
they identify 250 persons whose own communications they wish to tap. Using "second hop" privileges
they next identify a total of 1,500 more people whose communications they wish to tap. That makes a
total of 2,700 persons whose telephone calls they are monitoring and storing. Each year, the NSC
requests warrants from the FISA courts about 500 times. Hence, we can project more than 1 million
telephone numbers now under surveillance for an indefinite period of time. For we should further note
that once an official investigation is begun the records acquire the status of legal documents in a judicial
or quasi-judicial proceeding.
5. There is an exemption for on-going investigations. The Patriot Act's Section 224, its "grandfather
clause", allows active investigations that began prior to midnight on Monday to continue using the
expired programs.They number in the thousands given the hyper-activism of our security agencies in
identifying subjects for their attentions in order to justify vast capabilities and vast budgets. Those
broadly cast investigations can go on for years. And all of this is secret.
FREEDOM Act reforms for the FISA court are hollow – no substantive
protections
Brenner, 15 - Senior Fellow, the Center for Transatlantic Relations; Professor of International Affairs,
University of Pittsburgh (Michael, Huffington Post, “The NSA's Second Coming” 6/8,
http://www.huffingtonpost.com/michael-brenner/the-nsas-second-coming_b_7535058.html
8.
Sponsors of the Freedom Act trumpet a supposed breakthrough insofar as it mandates some
small transparency from the secret Foreign Intelligence Surveillance Court. It vaguely affirms that the
Court will be required to declassify a few of its tightly held opinions. Those are opinions explaining why a
warrant request is approved -- as they automatically are. There is no reason to expect any great
revelations. After all, the essence of the FISA Court's reasoning is well known. We live in dangerous
times -- as witness 9/11; the government assures us that there is compelling evidence of dangerous
persons on the prowl and plots afoot; the classified information upon which that assessment is made is
persuasive -- even though we have been granted only a glimpse of a brief summary; this Court cannot
take on itself the responsibility of overriding the professional judgment of our public servants and
thereby put at risk the security and well-being of the American people; blah-blah, blah. Judge Bates
reflects the reigning philosophy of the FISA court in warning that greater public disclosure of unclassified
summaries of court rulings would "likely to promote confusion and misunderstanding" among the likes
of you and me.
9.
The new legislation also allows the judges to appoint a "friend of court" to argue on behalf of
privacy concerns. This does not mean that there will be adversary proceedings or a systematic
examination of the case for a warrant. It simply means that there may be designated persons available
to remind the FISA judges that privacy considerations should be taken into account in their
deliberations. For all that is worth, they might as well prepare a form letter that is emailed to the Court
every time that a request arrives on their computers.
FREEDOM Act creates no actual constraints against intelligence
Brenner, 15 - Senior Fellow, the Center for Transatlantic Relations; Professor of International Affairs,
University of Pittsburgh (Michael, Huffington Post, “The NSA's Second Coming” 6/8,
http://www.huffingtonpost.com/michael-brenner/the-nsas-second-coming_b_7535058.html
The United States Freedom Act does not trouble Intelligence agency leaders. They have widely assumed,
as admitted in private statements, that the compromise provisions merely create a few procedural
inconveniences that could be circumvented or neutralized by exploiting loopholes - no more than speed
bumps. None of the Agency's core activities would be significantly affected. So there is no reason for
anyone in the intelligence agencies to sweat the small stuff: a shift in the number of days the NSA can
retain the sweepings of Metadata collection; or whether the data should be held at their storage lock-up
or the one across the street protected by a bicycle lock and owned by a very accommodating neighbor?
And who's checking, anyway -- the FBI? the FCC?
The Freedom Act is largely symbolic – hardly restricts surveillance
Timm 6/2 - co-founder and the executive director of the Freedom of the Press Foundation (Trevor
Timm, Boing Boing, 6/2/2015, http://boingboing.net/2015/06/02/congress-passes-usa-freedomac.html)//MBB
Today the Senate passed a version of the USA Freedom Act, a bill touted by its authors as surveillance
reform that will end the NSA’s mass, suspicionless collection of Americans’ personal data. Given that
parts of the Patriot Act expired on June 1st, and that the government is pretending the expiration is a
“crisis” rather than an opportunity, President Obama is expected to sign the bill as soon as possible.
While the bill has many significant flaws, the USA Freedom Act vote is also historic: it’s the first time
since the 1970s that Congress has indicated its intention to restrict the vast powers of intelligence
agencies like the NSA, rather than exponentially expand them. It also shows the power that investigative
journalism and brave whistleblowing can have on even the most entrenched government interests. Two
years ago, debating these modest changes would’ve been unthinkable, and it is absolutely a vindication
for Edward Snowden.
Unfortunately, the bill is also woefully inadequate and largely symbolic, and Congress would’ve been
better off letting Section 215 of the Patriot Act expire permanently. The USA Freedom Act supposedly
bans bulk collection of phone records or any other private records, and we certainly hope it actually
does. But its provisions are vague and confusing, leading many legal experts to believe they could be reinterpreted in secret—by NSA lawyers with a history of warping the common definitions of ordinary
words beyond recognition—and could lead the FISA court to continue to allow the NSA to collect large
quantities of Americans’ data in secret. (The administration will shamefully now re-start the phone
program that expired on Monday for six months, as allowed under the new law's "transition" period.)
The ultra-secret FISA court, a Kafkaesque nightmare for civil liberties, also gets to keep many of its worst
features, with just minor changes around the edges. Such an anathema to democracy should be
dismantled entirely.
The USA Freedom Act also does not touch on two of the NSA’s most powerful and controversial tools:
the FISA Amendments Act and Executive Order 12333, which have been used to scan untold billions of
emails coming in and out of the United States, and give the agency free rein to spy on 95% of the world’s
population with virtually no restrictions.
And perhaps most shamefully, given that Congress never would’ve even had this debate without Edward
Snowden, the bill does nothing for whistleblowers who can be prosecuted as spies under the Espionage
Act for speaking to journalists and telling the American public the truth.
As Snowden himself said two weeks ago, we hope the USA Freedom Act is just the beginning of
Congress’ reform of the NSA, and not the end. And we are reminded that it took more than five years
for the Church Committee’s intelligence reforms to make their way through Congress in the 1970s.
Freedom Act does not actually limit bulk collection – new works in the mix
Toomey 6/25 - graduate of Harvard College and Yale Law School, Staff Attorney in the ACLU’s
National Security Project (Patrick C. Toomey, “Has the CIA Asked the FISC to Restart Its Bulk Collection
Program?”, Just Security, 6/25/2015, http://justsecurity.org/24216/cia-asked-fisc-restart-bulkcollection-program/)//MBB
There’s a curious gap in the documents currently posted on the FISC’s public docket — one that suggests
the NSA call records program isn’t the only type of bulk collection the government has asked the FISC to
reauthorize following the USA Freedom Act’s passage on June 2. It’s an exercise in reading tea leaves at
this point, but the gap raises important and unanswered questions about bulk collection programs we
still know little about.
In the weeks since the USA Freedom Act became law, the FISC has published a series of filings and
orders on its website. Those documents indicate that the government has submitted at least four
applications for orders under the post-USA Freedom version of Section 215. One of them, docketed as
BR 15-75, is the government’s application to restart the NSA’s bulk call records program. (The “BR”
stands for FISA’s “business records” provision, while “15” stands for the year.) Two others, numbered BR
15-77 and BR 15-78, are addressed by Judge Saylor’s opinion concerning the appointment of an amicus
curiae and the question of whether Section 215’s brief expiration made gibberish of Congress’ effort to
renew the law in the USA Freedom Act. Based on the description in the opinion and the scope of the
issues addressed, one can fairly surmise that these are targeted applications for records under Section
215.
But what about the missing BR 15-76?
It’s hard to be certain, but it’s likely that BR 15-76 is an application to restart the phantom CIA bulk
financial records program or another undisclosed bulk collection program. Beginning in late 2013,
multiple outlets reported on the CIA’s bulk collection of Americans’ international money transfer
records from companies like Western Union and Moneygram. Other outlets stated at the time that the
CIA program overlapped significantly with efforts to collect “financial transaction data” by both the NSA
and the Treasury Department. And according to the New York Times, beyond the CIA program, several
officials “said more than one other bulk collection program has yet to come to light.” (There is other
evidence of these programs in the ACLU’s FOIA litigation, in which the government identified a set of
bulk collection orders dated October 31, 2006, but refused to say more.) Troublingly, none of these
programs have ever been publicly acknowledged — not even in the course of a months-long public and
congressional debate about how to reform Section 215.
And now it appears, the government may be seeking to restart another one of the very bulk collection
programs that many people understood the USA Freedom Act was meant to prohibit.
There are a few reasons to think the missing application relates to one of these still-secret bulk
collection programs and is not just another targeted request. First, in issuing the opinion related to BR
15-77 and BR 15-78, the FISC made a deliberate decision to split off the questions it considered nobrainers from the more difficult statutory and constitutional questions raised by the government’s
application to renew its bulk call records program in BR 15-75. The legal authority for that program has
been deeply undermined by the Second Circuit’s decision in ACLU v. Clapper, and at least based on the
public record today, the FISC still has not resolved those questions. But in the meantime, as Judge
Saylor’s opinion makes clear, the FISC chose to skip ahead to several subsequent applications that
presented only “relatively simple” questions. The FISC’s decision to leave BR 15-76 out of Judge Saylor’s
opinion suggests that it involves more complicated questions on par with the bulk call records
application — i.e., that it involves a different bulk collection program, one the government wants to
restart but the FISC must now analyze more closely.
Second, it’s very unlikely that BR 15-76 is a targeted application that the FISC simply went ahead and
silently granted. That’s because the FISC would have had to address the same questions raised by BR 1577 and BR 15-78 in order to grant virtually any application under Section 215 — namely, which version
of Section 215 is currently in effect. The temporary expiration of Section 215 on June 1 left it unclear, at
least as a technical matter, what remained of the law when Congress decided to amend it. If the missing
application were also a targeted one, why didn’t the FISC resolve this question and announce its
decision in the context of that earlier application? The better conclusion is that BR 15-76 isn’t a targeted
application at all, but concerns a bulk collection program the government continues to hide from the
public.
Now, it’s possible that BR 15-76 is a targeted request that simply got delayed, or was rejected outright,
based on some other defect in the government’s application. But, as we know, that doesn’t happen very
often in the FISC. Alternatively, it’s possible that the government sought a type of record — such as
hotel or car rental records — that was available under even the pre-2001 version of FISA’s business
records provision. But, even so, the FISC would have had to determine which version of the law is
currently in effect in order to know what type of showing the government was required to make.
The more likely scenario is that the government has asked the FISC to reinstate the CIA’s bulk collection
program or one of its still-secret brethren. If that’s right, the public should know about this program.
The government’s application goes directly to one of the key questions in the USA Freedom Act debate:
whether the legislation would prove effective in halting the bulk collection of Americans’ sensitive
information. Perhaps the government is simply seeking to “transition” this program over the coming 180
days, as it has said of its effort to restart the NSA call records program — but of course we don’t know.
So long as the government continues to keep the public in the dark about its efforts to collect their data
en masse, we can’t judge whether the USA Freedom Act really put an end to bulk collection under
Section 215.
Freedom Act didn’t change anything
Bond and Malitz 6/3 – (Becky Bond and Zack Malitz, “Why USA Freedom Act is not a win for civil
liberties, but how what you accomplished can help change the game”, Defending Dissent Foundation Bill
of Rights Defense Committee, 6/3/2015, http://www.bordc.org/blog/why-usa-freedom-act-not-wincivil-liberties-how-what-you-accomplished-can-help-change-game)
In reality, this latest version of the USA FREEDOM Act does not enact deep, meaningful reform to the
surveillance state.4 The White House supported the bill, as did the surveillance agencies, because they
were desperate to be able to say that something, anything, has been done to address Edward
Snowden’s revelations of unconstitutional spying.
At best, the current version of the bill will place some restrictions on the bulk collection of telephone
records, curtailing somewhat the use of a handful of the government’s many surveillance authorities. It
by no means will end mass, suspicionless spying on Americans, though it could reduce somewhat the
number of Americans impacted by certain surveillance programs at any given time. The NSA may have
to collect merely huge numbers of records about large numbers of Americans – instead of nearly all
domestic telephone records. The bill also makes some reforms to the secretive Foreign Intelligence
Surveillance Court – which may be a little more transparent under this bill.
At CREDO, we don’t believe that these relatively superficial changes, some of which may hamper the
NSA’s suspicionless spying somewhat but won’t end mass surveillance, are worth reauthorizing the
PATRIOT Act, nor are we confident that the government will interpret the law in the same way as
reformers – after all, agencies like the NSA and FBI have an egregious track record of ignoring or
distorting laws they find inconvenient. The USA FREEDOM Act is far worse than simply allowing section
215 of the PATRIOT Act to expire.
It’s not clear that the USA FREEDOM Act will reform anything. Even if it forces the NSA to change some
practices under particular authorities, we know that they’ll try to shift those same behaviors
elsewhere , will stretch the law beyond anything reasonable, and based on past experience they’ll then
lie to their overseers in Congress about it. But what is clear is that it re-creates the PATRIOT Act’s
expired authorities and explicitly authorizes sweeping and invasive programs to collect highly-sensitive
medical, educational, financial, email and telephone records without a warrant.5 It never touched on
most of the authorities the government exploits to justify its many mass surveillance programs,
including section 702 of the FISA Amendments Act and Executive Order 12333. It gives corporations –
including many of the tech companies that supported the bill – legal immunity from prosecution for
participating in spying on Americans.
AT: Amicus curiae briefs solve adversariality
Relying on amicus curiae briefs won’t resolve Article III problems of FISA
Goitein and Patel 15 - Elizabeth (Liza) Goitein co-directs the Brennan Center for Justice’s Liberty and National Security Program. Served
as counsel to Sen. Russell Feingold with a particular focus on government secrecy and privacy rights. Was a trial attorney in the Federal
Programs Branch of the Civil Division of the Department of Justice. Graduated from the Yale Law School and clerked for the Honorable Michael
Daly Hawkins on the U.S. Court of Appeals for the Ninth Circuit. Faiza Patel serves as co-director of the Brennan Center for Justice’s Liberty and
National Security Program. Clerked for Judge Sidhwa at the International Criminal Tribunal for the former Yugoslavia. Ms. Patel is a graduate of
Harvard College and the NYU School of Law. (Elizabeth and Faiza, “What went wrong with the FISA court”, Brennan Center for Justice at New
York University School of Law, 2015 //DM)
Several existing reform proposals would address the lack of a party opposing the government in FISA
Court proceedings by establishing a permanent public interest advocate (or slate of advocates) to
represent the interests of people affected by government surveillance.272 President Obama and two
former judges of the court publicly support the appointment of such an attorney, commonly referred to
as the “Special Advocate.”273 An alternative approach would allow the FISA Court to hear from certain
individuals or interest groups as amici curiae.274 The court could call upon these outside
representatives to weigh in on potential privacy and civil liberties concerns raised by a government
application.275
The latter approach would not resolve the Article III problem, particularly if participation were left to the
court to decide. The FISA Court already has discretion to solicit or permit amicus participation, and with
few exceptions, has preferred to rely on the government’s submissions alone .276 Article III would be
best served by strengthening the special advocate concept to the greatest extent possible, including by
ensuring that special advocates are notified of cases pending before the court, have the right to
intervene in cases of their choosing, and are given access to all materials relevant to the controversy in
which they are intervening.
AT: No metadata abuse
We kill people based on metadata – it generates more info than actual content
Schneier, 15 - fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Introduction)//AK
There are other sources of intimate data and metadata. Records of your purchasing habits reveal a lot
about who you are. Your tweets tell the world what time you wake up in the morning, and what time
you go to bed each night. Your buddy lists and address books reveal your political affiliation and sexual
orientation. Your e-mail headers reveal who is central to your professional, social, and romantic life.
One way to think about it is that data is content, and metadata is context. Metadata can be much more
revealing than data, especially when collected in the aggregate. When you have one person under
surveillance, the contents of conversations, text messages, and emails can be more important than the
metadata. But when you have an entire population under surveillance, the metadata is far more
meaningful, important, and useful.
As former NSA general counsel Stewart Baker said, “Metadata absolutely tells you everything about
somebody’s life. If you have enough metadata you don’t really need content.” In 2014, former NSA and
CIA director Michael Hayden remarked, “We kill people based on metadata.”
Internet freedom
Uniqueness – US pushing IF agenda
The US government continues to push for IF reforms
Fontaine, 14 – President of the Center for a New American Security; was foreign policy advisor to
Senator John McCain for more than five years; Worked at the State Department, the National Security
Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at
the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing
Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New
American Security, September 18, 2014, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf)//TT
Despite the international outrage, and both public and private criticism of U.S. surveillance policies, the
U.S. government has continued its Internet freedom–related activities, albeit at a lower public volume.
In early 2014, Secretary of State John Kerry, addressing the Freedom Online Coalition conference in
Estonia, called for an “open, secure, and inclusive Internet.”33 U.S. Internet freedom programming
continues: the State Department’s Bureau of Democracy, Human Rights and Labor alone planned to
expend roughly $18 million in 2014 on anti-censorship technology, secure communications, technology
training and rapid response to bloggers under threat.34 In June, the United States sponsored a
successful U.N. Human Rights Council resolution reaffirming that the same rights that people have
offline, including freedom of expression, must be protected online, regardless of frontiers.35
While continuing to execute the Internet freedom agenda, U.S. officials have attempted to reconcile
their government’s surveillance practices with its expressed desire for greater online freedom. This is
challenging, to say the least. U.S. officials draw a critical distinction between monitoring
communications for purposes of protecting national security and surveillance aimed at repressing
political speech and activity. While this distinction is intuitive to many Americans, it is likely to be lost on
many others, particularly where autocratic regimes consider domestic political dissent to be a national
security threat. At its bluntest, the American position is that it is legitimate, for example, for the U.S.
government, but not for the Chinese government, to surveil Chinese citizens. This is and will remain a
tough sell.
Secretary Kerry has defended the Obama administration’s reforms to signals intelligence collection,
saying that they are based on the rule of law, conducted pursuant to a legitimate purpose, guided by
proper oversight, characterized by greater transparency than before and fully consistent with the
American vision of a free and open Internet.36 In March 2014, Deputy Assistant Secretary of State Scott
Busby addressed the linkage between surveillance and Internet freedom and added two principles to
Kerry’s – that surveillance should not be arbitrary but rather as tailored as possible, and that decisions
about intelligence collection priorities should be informed by guidance from an authority outside the
collection agency.37 In addition, the U.S. government has taken other steps to temper the international
reaction. For example, the Department of Commerce opted to relinquish its oversight of ICANN – the
organization that manages domain name registries – to the “global Internet community.”38
Overreach kills internet freedom
NSA surveillance wrecks US cred in promoting Internet Freedom and spills over
to larger foreign policy cred
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
Mandatory data localization proposals are just one of a number of ways that foreign governments have
reacted to NSA surveillance in a manner that threatens U.S. foreign policy interests, particularly with
regard to Internet Freedom. There has been a quiet tension between how the U.S. approaches freedom
of expression online in its foreign policy and its domestic laws ever since Secretary of State Hillary
Clinton effectively launched the Internet Freedom agenda in January 2010.170 But the NSA disclosures
shined a bright spotlight on the contradiction: the U.S. government promotes free expression abroad
and aims to prevent repressive governments from monitoring and censoring their citizens while
simultaneously supporting domestic laws that authorize surveillance and bulk data collection. As
cybersecurity expert and Internet governance scholar Ron Deibert wrote a few days after the first
revelations: “There are unintended consequences of the NSA scandal that will undermine U.S. foreign
policy interests – in particular, the ‘Internet Freedom’ agenda espoused by the U.S. State Department
and its allies.”171 Deibert accurately predicted that the news would trigger reactions from both
policymakers and ordinary citizens abroad, who would begin to question their dependence on American
technologies and the hidden motivations behind the United States’ promotion of Internet Freedom. In
some countries, the scandal would be used as an excuse to revive dormant debates about dropping
American companies from official contracts, score political points at the expense of the United States,
and even justify local monitoring and surveillance. Deibert’s speculation has so far proven quite
prescient. As we will describe in this section, the ongoing revelations have done significant damage to
the credibility of the U.S. Internet Freedom agenda and further jeopardized the United States’ position
in the global Internet governance debates. Moreover, the repercussions from NSA spying have bled over
from the Internet policy realm to impact broader U.S. foreign policy goals and relationships with
government officials and a range of other important stakeholders abroad. In an essay entitled, “The End
of Hypocrisy: American Foreign Policy in the Age of Leaks,” international relations scholars Henry Farrell
and Martha Finnemore argue that a critical, lasting impact of information provided by leakers like
Edward Snowden is “the documented confirmation they provide of what the United States is actually
doing and why. When these deeds turn out to clash with the government’s public rhetoric, as they so
often do, it becomes harder for U.S. allies to overlook Washington’s covert behavior and easier for U.S.
adversaries to justify their own.”172 Toward the end of the essay, Farrell and Finnemore suggest, “The
U.S. government, its friends, and its foes can no longer plausibly deny the dark side of U.S. foreign policy
and will have to address it head-on.” Indeed, the U.S. is currently working to repair damaged bilateral
and multilateral relations with countries from Germany and France to Russia and Israel,173 and it is
likely that the effects of the NSA disclosures will be felt for years in fields far beyond Internet
policy .174
This overreach will end US internet leadership and cause global fragmentation
Eoyang, 13 - Director of the National Security Program (Mieke, “NSA Snooping's Negative Impact On
Business Would Have The Founding Fathers 'Aghast'” Forbes,
http://www.forbes.com/sites/realspin/2013/12/20/nsa-snoopings-negative-impact-on-business-wouldhave-the-founding-fathers-aghast/
Second, what will this mean for the future of Internet governance? Since its earliest days, the U.S.-based
Internet Corporation for Assigned Names and Numbers (ICANN) has governed the web. As the Internet
has expanded, several nations, especially China, have been pressing to end American dominance and
transfer control of Internet governance to the International Telecommunication Union (ITU), a
specialized agency within the United Nations.
Worse still for prospects of continued American dominance, the NSA revelations have prompted calls for
extensive regional control of the Internet. For example, Brazil, which has long called for such regional
control, will host an important Internet governance conference in April that could challenge America’s
role. Unless the U.S. government takes steps to restore some degree of trust, the groundswell of
international interest in a new approach to Internet governance could undermine or end U.S. Internet
leadership . This could leave management of the Internet to nations like China or Russia that do not
share America’s commitment to safety, openness, competition, and growth.
Recommendations for change are coming from many corners. President Obama’s advisory group on NSA
reform is calling for an end to bulk collection of Americans’ metadata and other steps to restore
protections abroad. Major Internet companies have called for greater restrictions on surveillance
activities, saying the balance has tipped too far from the individual. The government should heed these
calls for reflection and reform. Without understanding the economic implications of our security policies
and taking reasonable steps to restore trust in America’s surveillance efforts, our Internet dominance
and our economy could pay the price.
US hypocrisy in surveillance policies kills Internet freedom agenda
Gross, 13 – Covers technology and telecom policy in the US government for the IDG News Service, was
an editor and reporter at daily newspapers for 10 years (Grant, “The NSA scandal has damaged U.S.
credibility online”, Computer World, December 5, 2013,
http://www.computerworld.com/article/2486546/internet/the-nsa-scandal-has-damaged-u-s-credibility-online.html)//TT
The U.S. government has a huge image problem worldwide as it promotes Internet freedom on one
hand and conducts mass surveillance on the other, potentially creating major problems for U.S.
technology companies, a former official with President Barack Obama's administration said Thursday.
Many U.S. policy makers don't recognize the level of distrust created by recent revelations about U.S.
National Security Agency surveillance, and that lack of trust will drive other countries away from U.S.
technology firms, said Andrew McLaughlin, former White House deputy CTO.
"We, as an advocate for freedom of speech and privacy worldwide, are much, much, much more
screwed than we generally think in Washington, and ... American industry and our Internet sector is
more much, much, much more screwed than we think internationally," McLaughlin said during a speech
at a Human Rights First summit in Washington, D.C.
Many overseas critics of the U.S. see the Obama administration's push for Internet freedom as
"profoundly hypocritical" in the face of the NSA surveillance revelations and a continued push by U.S.
trade officials to have U.S. trading partners filter the Internet to protect against copyright violations, said
McLaughlin, now president of Digg, the online news aggregation service.
The NSA surveillance has led to an intense "level of anger and the degree of betrayal" in many countries
that U.S. policy makers don't seem to fully appreciate, he said. And many countries have begun to
explore other options beyond U.S. technology companies because of the surveillance revelations, he
added.
There's now a perception outside the U.S. that the country's technology companies "are willing
instruments of violation of civil rights and civil liberties," McLaughlin said. "We have essentially
nationalized what were previously seen as stateless Internet entities."
Many countries will move to use domestic technology companies and require citizen data to stay within
their borders, he said. "If you're an American company that sells cloud services, I think you've probably
sold your last contract to a foreign government," he said.
NSA surveillance undermines US leadership and credibility globally
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 11)//AK
Political scientist Ian Bremmer has argued that public revelations of the NSA’s activities “have badly
undermined US credibility with many of its allies.” US interests have been significantly harmed on the
world stage, as one country after another has learned about our snooping on its citizens or leaders:
friendly countries in Europe, Latin America, and Asia. Relations between the US and Germany have been
particularly strained since it became public that the NSA was tapping the cell phone of German
chancellor Angela Merkel. And Brazil’s president Dilma Rousseff turned down an invitation to a US state
dinner—the first time any world leader did that—because she and the rest of her country were incensed
at NSA surveillance.
Much more is happening behind the scenes, over more private diplomatic channels. There’s no softpedaling it; the US is undermining its global stature and leadership with its aggressive surveillance
program.
Overreach kills IHRL
Unrestricted surveillance violates international human rights law—reforms key
Brown et al, 15 – Professor of Information Security and Privacy at the Oxford Internet Institute (Ian,
“Towards Multilateral Standards for Surveillance Reform”, Oxford Institute Discussion Paper, January 5,
2015, https://cihr.eu/wp-content/uploads/2015/01/Brown_et_al_Towards_Multilateral_2015.pdf)//TT
But the lack of clarity around the authorisation and scope of foreign intelligence practices stands in stark
contrast to the array of international human rights standards that should apply to laws and policies in
this area. The surveillance of Internet activities and the electronic communications of individuals (and of
the patterns of their interactions), affects a range of human rights protected by international (global and
regional) human rights treaties. This directly impacts on the right to privacy (or "private life") and
correspondence, but also clearly affects other rights, including freedom of expression, freedom of
information, and freedom of association.
The main global and regional human rights treaties13 all stipulate that rights can only be restricted or
interfered with on the basis of "law"; and that such restrictions or interferences must serve a "legitimate
aim" and must be "necessary" to achieve that aim. Secret rules - or secret guidelines on or
interpretations of the rules - that an affected person cannot know, are not "law".14 Neither are rules
that give the authorities excessive discretion or that fail to protect against arbitrary exercise of the
powers in question. The scope and manner of exercise of any discretion granted must therefore be
indicated (in the law itself, or in binding, published guidelines) with "reasonable clarity" so that, again,
individuals can reasonably foresee how the law will be applied in practice.15
It is one of the hallmarks, and one of the greatest achievements, of modern, post-WWII international
human rights law that human rights must be accorded to "everyone". This approach was confirmed by,
and under, the binding international human rights treaties adopted to implement the Universal
Declaration of Human Rights, including both the UN ICCPR and the European Convention on Human
Rights (ECHR).16 While positive human rights obligations on states (to ensure, to protect, or to legislate)
may not apply outside a country's own territory, the negative obligation not to violate (i.e. the more
modest obligation to respect) human rights applies everywhere and with respect to everyone. As former
UN Human Rights Committee member and Special Rapporteur Martin Scheinin has observed:
The question about surveillance abroad is not whether it per se is prohibited under the ICCPR.
Obviously, it is not. The pertinent question is whether such specific forms of surveillance that
would constitute a human rights violation ifperformed at home will be immune from review
under the ICCPR if performed by the same state in relation to the same individuals but outside
the national territory.17
3.1 The basic principles applied to surveillance
A joint declaration on surveillance programmes by the UN and the InterAmerican special rapporteurs on
freedom of expression, which draws on the case law of the UN's Human Rights Committee and the InterAmerican Commission and Court of Human Rights, says: 18
[...] states must guarantee that the interception, collection and use of personal information,
including all limitations on the right of the affected person to access this information, be clearly
authorized by law in order to protect them from arbitrary or abusive interference with their
private interests. The law must establish limits with regard to the nature, scope and duration of
these types of measures; the reasons for ordering them; the authorities with power to
authorize, execute and monitor them; and the legal mechanisms by which they may be
challenged.
Given the importance of the exercise of these rights for a democratic system, the law must
authorize access to communications and personal information only under the most exceptional
circumstances defined by legislation. When national security is invoked as a reason for the
surveillance of correspondence and personal information, the law must clearly specify the
criteria to be used for determining the cases in which such surveillance is legitimate. Its
application shall be authorized only in the event of a clear risk to protected interests and when
the damage that may result would be greater than society's general interest in maintaining the
right to privacy and the free circulation of ideas and information. The collection of this
information shall be monitored by an independent oversight body and governed by sufficient
due process guarantees and judicial oversight, within the limitations permissible in a democratic
society.
As the UN and Inter-American rapporteurs make clear (as did the European Court of Human Rights on
numerous occasions), there is an interference with fundamental rights as soon as communication data is
intercepted and collected, not just at the moment data is extracted from a bulk interception database
and used in respect of the relevant person (as some governments have suggested). As such, individuals
must be protected against their data being "hoovered" up for the purpose of analysis and data mining.
This was explicitly stressed in terms of the ECHR by Judge Zupancic of the European Court of Human
Rights at the hearing into mass surveillance of the European Parliament's civil liberties committee
(LIBE).19 It has also been stressed in recent reports from the High Commissioner for Human Rights,20
and the Special Rapporteuron Counter-Terrorism and Human Rights, who noted:21
By permitting bulk access to all digital communications traffic, this technology eradicates the possibility
of any individualized proportionality analysis. It permits intrusion on private communications without
independent (or any) prior authorization based on suspicion directed at a particular individual or
organization. Ex ante scrutiny is therefore possible only at the highest level of generality.
3.2 The applicability of international human rights treaty obligations to extra-territorial acts of states
that are parties to these treaties22
States must ensure (or secure) the rights guaranteed by international human rights treaties without
distinction or discrimination to "everyone within their territory or jurisdiction" or simply "within their
jurisdiction" or "subject to their jurisdiction" (ICCPR, Art. 2(1); ECHR, Art. 1; IACHR, Art. 1(1)).23 This has
consistently been the position ofthe Human Rights Committee, as expressed in its views in the cases of
Lopez Burgos v. Uruguay and Celiberti de Casariego v. Uruguay,24 and as summed up in its General
Comment on "the Nature of the General Legal Obligation Imposed on States Parties to the Covenant".25
If a state intercepts, extracts copies of, and analyses communications made by individuals and
organisations outside its borders, that "produces effects" on those concerned, even if they are
"foreigners" and not physically on the territory of the state concerned. It is therefore difficult to
maintain that if a state explicitly legislates to authorise such surveillance, it is not exercising its
"jurisdiction" in that respect: bringing something within its law is perhaps the most conspicuous way to
exercise a country's jurisdiction. It can be argued that in international legal terms, the country would be
exercising both "legislative" and "enforcement jurisdiction" (executive powers to enforce the law,
including by investigating a crime) over the data.
This would be the case even if the exercise of that jurisdiction violated the sovereignty of another state,
for example by concerning data physically located in another country. The fact that the act was contrary
to international law does not mean that the state perpetrating the act was not bound by its human
rights obligations. However, certain states, most notably the US and Israel, do not accept any
extraterritorial effect of their international human rights treaty obligations, in particular in relation to
the ICCPR. In its 2006 Concluding Observations on the US report under the ICCPR, the Human Rights
Committee26 urged the US to review this approach. The Special Rapporteur on counter-terrorism and
human rights concluded: "States are legally bound to afford the same protection to nationals and nonnationals, and to those within and outside theirjurisdiction."27
Bulk collection violates IHRL
Brown et al, 15 – Professor of Information Security and Privacy at the Oxford Internet Institute (Ian,
“Towards Multilateral Standards for Surveillance Reform”, Oxford Institute Discussion Paper, January 5,
2015, https://cihr.eu/wp-content/uploads/2015/01/Brown_et_al_Towards_Multilateral_2015.pdf)//TT
The third issue is the amount of surveillance that is allowed. In the absence of meaningful standards, the
authorisation for SIGINT operations in many nations appears to be almost automatic, allowing the
interception, storage and subsequent analysis of that data as long as it is "relevant" to the national
interest. This is where the largest disjunct between international human rights norms and the existing
regulation of surveillance powers is located: SIGINT agencies have essentially been allowed to decide for
themselves how much data they need in order to fulfil their mandates, and they have become
accustomed to collecting this data.
This practice, and the discourse around it, is typically framed in terms of looking for "needles" in data
"haystacks"; a narrative which views bulk interception and data storage as an a priori legitimate tool in
effective intelligence operations and not an infringement of individuals rights per se. It is further
assumed by the intelligence community that the infringement of the data subject's rights takes place
only at the point at which their data is retrieved from the "haystack" on the basis of a search term,
keyword or other selector. At this point the justification for privacy violations is reduced to a matter of
SIGINT operating procedures.
As shown above, this position cannot be reconciled with international human rights law, and most
stakeholders agree that the bulk collection programmes revealed by Snowden are unacceptable. The UN
Special Rapporteur on Counter-Terrorism and Human Rights went as far as to call them "indiscriminately
corrosive of online privacy and imping[ing] on the very essence of the right guaranteed by article 17. In
the absence of a formal derogation from States' obligations under the Covenant, these programmes
pose a direct and ongoing challenge to an established norm of international law."85
Surveillance of specific persons without consent is a violation of international
human rights
Bauman et al, 14 - Professor Emeritus of Sociology at the University of Leeds (Zygmunt, “After
Snowden: Rethinking the Impact of Surveillance”, 29 May 2014, International Political Sociology Journal,
Volume 8 Issue 2, pages 121-144)//gg
Before engaging directly with the arguments and examining how political actors dissatisfied with them
have responded, we would like very briefly to clarify the relationship of the right to respect for privacy
with that of data protection. The right to respect for a person’s privacy is the overarching international
human right. It is found in the UN Universal Declaration of Human Rights, 1948, 7andits legal form is
found in the UN International Covenant on Civil and Political Rights, 1966. 8Any interference with the
privacy of a person must first and foremost be subject to the consent of that person. The right to
consent or refuse use of personal data belongs to the individual, not the state. Further consent is only
valid if the individual knows exactly what he or she is consenting to. This aspect of the right requires
there to be purpose limitation regarding the collection and use of personal data and prohibits function
creep. Where the state seeks to interfere with the right to collect and use personal data which
constitutes an intrusion into the privacy of the person concerned, such interference must be justified by
the state authorities. First it must be permitted by law, and that law must be sufficiently clear and public
that everyone can know what it is and how to adjust their behavior accordingly. Any exception
permitted by law to a human right must be interpreted narrowly. It must have a legitimate objective and
be necessary to achieve that objective only. There must be no alternative which would be less intrusive
into the life of the person. There must be judicial oversight of any state interference and a person
affected by interference must have access to justice to challenge it. Mass surveillance by its very nature
is not targeted at any person specifically; thus the possibility to justify the interference with the privacy
of any person individually is an exceedingly difficult task. Where such mass, weakly targeted surveillance
techniques have been used in Europe, the Human Rights Court has found them inconsistent with the
right to respect for privacy. Mass surveillance is, by definition, arbitrary.
States’ duty to protect data arises from the person’s right to respect for his or her privacy. Where states
interfere with people’s privacy, they must fulfill strict rules to justify that interference. Further, states
are under a duty to ensure that private sector actors do not breach a person’s privacy. Thus, states are
under an obligation to regulate the collection and use of personal data by the private sec-tor. This gives
rise to the obligation of data protection. The duty to protect personal data arises when personal data
are being used by state or private actor sand are designed to ensure that the use is consistent with the
individual’s right to respect for his or her privacy. It is for this reason that there are many different types
of regimes of data protection depending on the country under consideration. How states go about
protecting data is for them to determine; the key is that personal data must be protected because the
individual has a right to respect for his or her privacy. The content of the human right to respect for
privacy of the person is not variable.
NSA surveillance violates international human rights law
Greene and Rodriguez 14 – David Greene is an EFF Senior Staff Attorney, and Katitza Rodriguez is an EEF International Rights Director
(David and Katitza, “NSA Mass Surveillance Programs - Unnecessary and Disproportionate”, Electronic Frontier Foundation, May 29, 2014//DM)
EFF believes that, in order to restore the strong protections provided for by international human rights
law, we do not need a new human rights framework. Instead, we need to interpret and apply existing
human rights protections appropriately in light of new technological developments and changing
patterns of communications, and do so with an intention to protect human rights. As with all human
rights protections, we need to implement these steps in domestic laws to ensure everyone’s right of
privacy remains legally protected in the digital age.
Executive Summary
As set forth below, the US mass communications surveillance programs, as conducted by the NSA and
exposed by Edward Snowden and other whistleblowers, violate several of the Necessary and
Proportionate Principles:
• The NSA surveillance lacks “legality” in that NSA surveillance laws are largely governed by a body of
secret law developed by a secret court, the Foreign Intelligence Surveillance Court (FISC), which
selectively publishes its legal interpretations of the law;
• The NSA surveillance programs are neither “necessary,” nor “proportionate,” in that the various
programs in which communications data are obtained in bulk violate the privacy rights of millions of
persons who are not suspected of having any connection to international terrorism;
• The NSA surveillance programs are not supported by competent judicial authority because the only
judicial approval, if any, comes from the secret Foreign Intelligence Surveillance Court, and access to
courts is largely denied to the individuals whose data are collected;
• The NSA surveillance programs lack due process because there is frequently no opportunity for a
public hearing;
• The NSA surveillance programs lack user notification; those whose data is obtained do not know that
their communications have been monitored and therefore cannot appeal the decision nor acquire legal
representation to defend themselves;
• The NSA surveillance programs operate in secret and thus rely on gag orders against the entities from
whom the data is obtained. The secret court proceedings, if there are any, lack necessary transparency
and public oversight;
• The NSA surveillance programs damage the integrity of communication systems by undermining
security systems (such as encryption), requiring the insertion of surveillance back doors in
communications technologies, including the installation of fiber optic splitters in transmission hubs; and
• The US surveillance framework is illegitimate because it applies less favorable standards to non-US
persons than its own citizens; this discrimination places it in violation of the International Covenant on
Civil and Political Rights (ICCPR) as well.
Moreover, the United States justifies the lawfulness of its communications surveillance by reference to
distinctions that, considering modern communications technology, are solely semantic rather than
substantive. The US relies on the outmoded distinction between “content” and “metadata,” falsely
contending that the latter does not reveal private facts about an individual. The US also contends that
the collection of data is not surveillance—it argues, contrary to both international law and the Necessary
and Proportionate Principles, that an individual’s privacy rights are not infringed as long as her
communications data are not analyzed by a human being.
Internet freedom key to democracy
Internet freedom facilitates democratic transitions—extensive scholarship
proves
Nisbet et al 12 – PhD in communication, assistant professor at the School of Communication at The Ohio
State University, research on public diplomacy, foreign policy, comparative democratization, and
communication (Erik, “Internet Use and Democratic Demands: A Multinational, Multilevel Model of
Internet Use and Citizen Attitudes About Democracy”, Journal of Communication, April 2012,
http://onlinelibrary.wiley.com/doi/10.1111/j.1460-2466.2012.01627.x/epdf)//DBI
Moving from institutions to citizens, an open question is whether greater Internet penetration and use
influence individual attitudes about democracy? Though not empirically tested, Howard (2009) answers
this question in the affirmative, theorizing that Internet use plays an important role in shaping and
mobilizing citizen attitudes about democracy in transitioning or emerging democracies. Howard
asserts that traditional media in nondemocratic states ‘‘constrains’’ public opinion to those of ruling
elites, creating a passive public incapable of challenging autocratic institutions and power-relations.
Leslie (2002) and Howard view the Internet as distinct from the one-way communication of radio,
television, and print media that provide information to an audience, but are incapable of soliciting
immediate feedback. The Internet is lauded as having great democratic potential because it does allow
for feedback and encourages the development of ‘‘participant’’ citizens , as described by Almond and
Verba (1963). Rather than acting as passive receptors of political information, participant citizens are
more sophisticated and engage with political information provided to them and subsequently respond
or make ‘‘demands’’ from it (Almond & Verba, 1963). For example, as Lei (2011) observes in the case of
China, the ‘‘Internet has contributed to a more critical and politicized citizenry’’ with ‘‘citizens no longer
merely compliant receivers of official discourse’’ (p. 311). In this sense, Howard sees the potential of the
Internet, especially when paired with organizations such as political parties or movements, to promote
the formation of ‘‘mass’’ public opinion that demands political change within authoritarian or
democratizing states.
Other scholars also embrace the Internet’s capacity to promote political change by serving as a
pluralistic media platform (Bratton et al., 2005; Groshek, 2009; Lei, 2011). Bratton and colleagues (2005)
argue that media use in transitioning or emerging democracies ‘‘expands the range of considerations
that people bear in forming their political and economic attitudes,’’ which promotes democratic
citizenship and greater demand for democratic processes and reform (Bratton et al., 2005, p. 209).
Media that enjoys low government regulation and high plurality of content have ‘‘the greatest impact in
inducing an audience to reject authoritarian rule, especially one- party rule,’’ compared to other forms
of media use (p. 210). In this context, Groshek (2009) draws upon media dependency theory (BallRokeach & DeFleur, 1976) to argue that Internet use influences the democratic orientations of
audiences—which in turn promotes (democratic) change in sociopolitical systems in which audiences
are embedded. Internet penetration, in other words, allows citizens to access more pluralistic content
that increases citizen demand for democracy. Increased demand promotes ‘‘bottom-up’’
democratization by increasing the likelihood of democratic transitions in nondemocratic states or
strengthening democratic institutions in young democracies. Lei (2011) asserts this bottom-up
democratization has emerged in China, with ‘‘netizens’’ constituting ‘‘an important social force that
imposes much pressure on the authoritarian state’’ (p. 311). Moreover, this theoretical perspective is
consistent with scholarship examining the role of citizen attitudes in processes of democratization
(Inglehart & Welzel, 2005; Mattes & Bratton, 2007; Welzel, 2007).
Internet freedom provides the necessary infrastructure for democratic
transitions—social media and communication
Howard 10 – PhD sociology, Director of the Center for Media, Data and Society, studies the impact of
information technologies on democracy and social inequality (Philip, The Digital Origins of Dictatorship
and Democracy: Information Technology and Political Islam, p. 11)//DBI
Cyberactivism is no longer the unique provenance of isolated, politically motivated hackers. It is instead
deeply integrated with contemporary social movement strategy and accessible to computer and
mobile phone users with only basic skills: it is a distinguishing feature of modern political
communication and a means of creating the élan that marks social change. Twitter may have been the
branded information tool of choice for some of Iran’s opposition opinion leaders, and other tools will
emerge in the years ahead. The service routes messages from many sources to many users through
varied outlets from webpages, mobile phones, and many other kinds of consumer electronics. But it is
the networked design that is a distinguishing feature of social media that will be ever more threatening
to authoritarian rule.
Information and communication technologies are the infrastructure for transposing democratic ideals
from community to community. They support the process of learning new approaches to political
representation, of testing new organizational strategies, and of cognitively extending the possibilities
and prospects for political transformation from one context to another. It does not matter that the
number of bloggers, twitterers, or internet users may seem small, because in a networked social
moment only a few “brokers” need to be using these tools to keep everyone up to date. These are the
communication tools for the wealthy, urban, educated elites whose loyalties or defection will make or
break authoritarian rule . Indeed, it is probably more useful to evaluate applications such as Twitter
through the communities they support, rather than through tool features. Twitter communities have
leaders and followers, and tweets supply them with information, misinformation, and disinformation.
During the protests, the top 10 percent of users generated over 65 percent of the tweets.
Internet surveillance and censorship justify international governmental
domination over its citizens- creates authoritarian technocracies
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 13)//AK
Twenty years ago, few governments had any policies regulating the Internet. Today, every country does,
and some of them are pretty draconian. This shouldn’t come as a surprise; the Internet became too big a
deal for governments to ignore. But this change took many Internet watchers by surprise, and continues
to do so.
Increasingly, the world’s governments are fighting against the Internet’s inherently international nature.
If a regime wants to surveil its people, limit what they can read, and censor what they can say, the
international free-and-open nature of the Internet presents a problem.
For this reason, countries like Russia, China, and Saudi Arabia have pushed for years for more national
control over their domestic Internet. Through international organizations like the International
Telecommunications Union—that’s the UN agency that controls telephony standards—they are trying to
wrest control of the Internet from the more informal multi-stakeholder international organizations that
are currently in charge. Their arguments sound benign, but their motivations are not. They want an
Internet that recognizes both national borders and the rights of governments to exert control within
those borders: in this case, resulting in more surveillance and censorship.
The disclosure of the NSA’s surveillance activities has given this position a huge boost. Several
governments have pushed back against US dominance of the Internet because they’re concerned about
their citizens’ privacy. Countries like Brazil and Germany have called for more of their citizens’ data to be
stored within their own borders. Other countries, with the opposite agenda, have seized on the same
rhetoric. Russia passed a law in 2014 mandating that online businesses store data on its citizens within
the country, beyond the reach of the NSA but within easy reach of the Russian government. I hold
conflicting views about this. On one hand, I want countries with stronger privacy laws to protect their
citizens’ data by demanding that it be subject to their jurisdiction. On the other hand, I don’t think this
will protect such data against NSA surveillance. At least the NSA has some constraints on what it may
access within the US. If that same data were stored in Brazilian and German servers, those legal
restrictions would not apply. And given what we know about the NSA’s technical capabilities, I have no
doubt that the agency will gain access in any case.
The fundamentally international nature of the Internet is an enormous benefit for people living in
countries that engage in surveillance and censorship. Cyber sovereignty is often a smoke screen for the
desires of political leaders to monitor and control their citizens without interference from foreign
governments or corporations. And the fight against cyber sovereignty is often viewed as a smoke screen
for the NSA’s efforts to gain access to more of the world’s communications. We need to reaffirm our
support for a free, open, and global Internet, and then work to ensure its continued existence.
Democracy solves war
Empirics prove that democracies are in wars less and if they are lose a lot less
than other systems
Hegre, Peace and Conflict Research, 14 [Havard, Department of Peace and Conflict Research,
Uppsala University & Peace Research Institute Oslo (PRIO), Democracy and Armed Conflict,
jpr.sagepub.com/content/early/2014/01/08/0022343313512852.full.pdf] Schloss
The interstate democratic peace has been studied at several ‘levels of analysis’ (Gleditsch & Hegre,
1997). At the dyadic level, there is considerable agreement that the ‘absence of war between
democratic states comes as close as anything we have to an empirical law in international relations’
(Levy, 1989: 270).3 Important studies in favor of the proposition are Rummel (1983), Doyle (1983, 1986),
and a string of studies by Bruce Russett and coauthors (e.g. Maoz & Russett, 1992, 1993; Russett &
Oneal, 2001). Following the review of Gleditsch (1992), JPR became a major outlet for the debate.4 The
dyadic finding has to a large degree withstood a series of counter-arguments. I discuss these in detail
below.
There is less compelling evidence for democratic countries being less warlike overall – the ‘monadic’
level of the democratic peace. The bulk of the early large-N studies (e.g. Small & Singer, 1976; Weede,
1984), agree with Chan (1984) who found that ‘relatively free’ countries participated in war just as much
as the ‘less free’. Gleditsch & Hegre (1997) show that democracies rarely initiate wars, and Hegre (2008)
that they are more peaceful overall when controlling for their military potential. Research at the system
level has recently attracted renewed attention.5 Gleditsch & Hegre (1997) suggest that a world with an
intermediate share of democracy may be associated with more war since the probability of war on
average is highest in dyads with one democracy and one non-democracy. However, an increase in the
proportion of countries that are democratic may alter the dyadic and monadic probabilities as systemic
democratization affects international interactions (Russett, 1993; Huntley, 1996; Mitchell, Gates &
Hegre, 1999; Kadera, Crescenzi & Shannon, 2003). Cederman (2001) rephrases the standard account of
Kant (1795/1991), seeing the development of the democratic peace as a dialectic process where states
gradually learn to form (democratic) pacific unions. He shows that the risk of war between democracies
has been falling over the past two centuries. The risk of non-democratic war has also declined, but less
swiftly. Relatedly, Mitchell (2002) shows that non-democracies in the Americas became much more
likely to settle territorial claims peacefully when the proportion of democracies in the system increased.
Gartzke & Weisiger (2013), on the other hand, argue that regime type becomes a less salient indicator of
‘otherness’ as more states become democratic, and their empirical analysis indicates that the risk of
conflict between democracies has increased as the world has become more democratic.6
Studies using tools of network analysis also indicate systemic effects of democracy. Dorussen & Ward
(2010) and Lupu & Traag (2013) find support for the democratic peace while accounting for the pacifying
impact of trade networks. Maoz (2006) finds that large ‘democratic cliques’ in networks dampen
conflicts, but Cranmer & Desmarais (2011) conclude that the support for this claim is weak when using a
more appropriate statistical method.
The internal democratic peace A number of studies find empirical confirmation of an ‘inverted-U’
relationship between level of democracy and the probability of onset of internal armed conflict.
Semidemocratic regimes have a higher risk of internal conflict than consistent autocracies or
democracies (Boswell & Dixon, 1990; Muller & Weede, 1990; Hegre et al., 2001; Fearon & Laitin, 2003).
The existence of this ‘inverted U’ has been challenged, however (Elbadawi & Sambanis, 2002; Collier &
Hoeffler, 2004; Vreeland, 2008).7 In any case, very few studies find traces of a monotonic effect of
democracy. When controlling for GDP per capita or other indicators of socio-economic development,
democratically governed countries have no lower risk of internal armed conflict than autocratic ones.8
Buhaug (2006) finds that semi-democracies have a higher risk of wars over government than autocracies
and democracies, but that democracies are more likely to experience conflicts over territory than the
other two regime types. Cederman, Hug & Krebs (2010) find democratization to affect conflicts over
government, but not over territory.
Although democratic institutions by themselves are ineffective in reducing risk of internal conflict onset,
several studies find that they affect how internal conflicts evolve. Lacina (2006) and Gleditsch, Hegre &
Strand (2009) show that internal wars in democracies are less lethal. Democratic governments make use
of less violence against civilians (Eck & Hultman, 2007) and engage in less repression (Davenport, 2007b;
Colaresi & Carey, 2008),9 but rebel groups tend to make more extensive use of violence against civilians
when fighting democratic regimes (Eck & Hultman, 2007). Possibly because of the stronger constraints
on the use of violence against insurgents, democracies tend to have longer internal wars (Gleditsch,
Hegre & Strand, 2009).10
Some studies, such as Mukherjee (2006), find that post-conflict democracies have a lower risk of conflict
recurrence. Other studies report contrasting results (Walter, 2004; Quinn, Mason & Gurses, 2007;
Collier, Hoeffler & So¨derbom, 2008).
Democracy is key to overall peace
Silva, MA International Relations, 11 [Shanila De, MA International Relations, Department of
Politics & International Studies, University of Warwick,
https://www.academia.edu/1139228/Facilitating_Peace_Democracy_Building_Following_Violent_Confli
ct] Schloss
The idea of democracy building as a solution to violent conflict is a challenging one. Statistically, with
high levels of stable and evenly distributed growth, and sufficient governance, regime type becomes
unimportant to peace. However, democracy’s strength lies in its inherent ability to deliver these
conditions. Where policy-makers and theorists run into problems is in the transition and design process
of democracy following civil conflict. The following paper argues that in combination with growth and
governance, democracy can have a positive impact on the peace process. While democracy building can
be challenging, there are ways to mitigate potential instability and to design around potential hurdles.
Given democracy’s intrinsic qualities, policy makers should focus on effective design of democracy and
on facilitating conditions for growth and governance. Such a combination should theoretically result in a
stable system. While reality does not always follow theory, the cases examined in this paper show that
these conditions are effective and mutually reinforcing. They go on to demonstrate, that while there is
no perfect model to create post-conflict stability, with a carefully managed transition, and a series of
necessary conditions, democracy can help to facilitate peace in a developing country.
Democracy solves growth
Democracy is directly correlated with economic growth
Silva, MA International Relations, 11 [Shanila De, MA International Relations, Department of
Politics & International Studies, University of Warwick,
https://www.academia.edu/1139228/Facilitating_Peace_Democracy_Building_Following_Violent_Confli
ct] Schloss
Rodrick and Wacziarg show that democratization is not bad for economic performance and that, in fact,
democracies have positive effects on growth. 60 They conclude that the idea that political reforms
should wait until a country is ‘mature enough’ for democracy, or the idea that growth should precede
democracy, is not supported by evidence. 61 The assumption that autocracies are better equipped to
grow the economy presupposes that autocracies deliver better performance than democracy, which, in
their analysis, is shown to be false. 62
A market system may reduce the tendency towards corruption by providing higher standards of living
and alternative pathways for advancement. 63 However, in a market economy there are winners and
losers, and while growth, overall, may be a stabilizing factor, inequalities can be destabilizing. 64
Wittman explains that in a democracy, it is in the interest of policy makers to create policies that result
in a more equitable distribution of the gains from growth the gains from growth. 65 A more even
distribution, including higher investment in human capital, enhances overall stability. 66 Democracy can
maintain the high standards of living and substantial economic growth that are required for long term
stability. 67
Besley and Kudamatsu show that autocracies that achieve high levels of growth are those which
constrain the behaviour of their leader, meaning that it is not the case that all dictatorships benefit from
growth. 68 Growth seems to be correlated with constrained leaders. 69 Liberal democracies have
constraints built in, through the ability of voters to discipline politicians. 70 They also make sure that
political change, in the event of inadequate leadership, is regular and stable rather than irregular and
unstable. This regular-change effect has further positive impacts on growth. 71
Democracy and growth are mutually reinforcing. 72 While democracy can have a positive effect on postconflict stability, this effect is more pronounced when a country’s income is higher. 73 Overall,
“countries whose citizens enjoy high levels of economic well being and have access to a more open
political system are significantly less likely to experience multiple civil wars than autocratic countries
with low levels of individual welfare.” 74 An appropriately moulded democratic system, combined with
effective institutions results in stable, growth oriented states. 75 Effective institutions highlight the
importance of governance, which is the next condition necessary for stability and is as important as
economic management. 76
Democracy solves terrorism
Democracies are significantly less susceptible to terrorist attacks--- political
freedom, counter terrorist measures, less incentives
Li, Political Science Professor, 15 [Quan, Department of Political Science The Pennsylvania State
University, Does Democracy Promote or Reduce Transnational Terrorist Incidents?,
http://jcr.sagepub.com/content/49/2/278.full.pdf+html] Schloss
One argument in the democracy-terrorism literature posits that aspects of democracy reduce terrorism.
In nondemocratic societies, the lack of opportunities for political participation induces political
grievances and dissatisfaction among dissenters, motivating terrorism (Crenshaw 1981, 383). In
contrast, in democratic societies, free and fair elections ensure that rulers can be removed and that
desirable social changes can be brought about by voters, reducing the need to resort to violence
(Schmid 1992). Democratic rules enable nonviolent resolution of political conflict. Democracies permit
dissenters to express their policy preferences and seek redress (Ross 1993). Different social groups are
able to participate in the political process to further their interest through peaceful means, such as
voting and forming political parties (Eubank and Weinberg 1994, 2001). Since democracy lowers the cost
of achieving political goals through legal means, groups find costly illegal terrorist activities less
attractive (Ross 1993; Eyerman 1998).
Wide democratic participation also has beneficial consequences that remain largely unnoticed in the
literature. To the extent that democratic participation increases political efficacy of citizens, terrorist
groups will be less successful recruiting new members in democracy than in autocracy. This may reduce
the number of terrorist attacks in democracy. Within the context of transnational terrorism, wide
democratic participation helps to reduce incentives of domestic groups to engage in terrorist activities
against foreign targets in a country. When citizens have grievances against foreign targets, greater
political participation under a democratic system allows them to exert more influence on their own
government so that they can seek favorable policy changes or compensation more successfully. Joining a
terrorist group and attacking the foreign target become less appealing options. To the extent that
democratic participation leads to public tolerance of counterterrorist efforts, a democratic government
will be more effective stopping a variety of terrorist attacks, including those by domestic terrorists
against foreign targets as well as those committed by foreign terrorists in the country.
Democracies are proven to reduce terrorist attacks against them
Li, Political Science Professor, 15 [Quan, Department of Political Science The Pennsylvania State
University, Does Democracy Promote or Reduce
Transnational Terrorist Incidents?, http://jcr.sagepub.com/content/49/2/278.full.pdf+html] Schloss
In this article, I investigate the various mechanisms by which democracy affects transnational terrorism.
New theoretical mechanisms are advanced that either complement or encompass existing arguments.
First, democratic participation reduces transnational terrorism in ways in addition to those conceived in
the literature. It increases satisfaction and political efficacy of citizens, reduces their grievances, thwarts
terrorist recruitment, and raises public tolerance of counterterrorist policies. Second, the institutional
constraints over government play a fundamental role in shaping the positive relationship between
democracy and transnational terrorism. Institutional checks and balances create political deadlock,
increase the frustration of marginal groups, impose on the democratic government the tough task of
protecting the general citizenry against terrorist attacks, and weaken the government’s ability to fight
terrorism. The effect of civil liberties on terrorism popularized in the literature is more complex than
commonly recognized. Finally, heterogeneous democratic systems have different implications for
transnational terrorist activities.
Effects of different aspects of democracy on transnational terrorism are assessed in a multivariate
analysis for a sample of about 119 countries from 1975 to 1997. Results show that democratic
participation reduces transnational terrorist incidents in a country. Government constraints, subsuming
the effect of press freedom, increase the number of terrorist incidents in a country. The proportional
representation system experiences fewer transnational terrorist incidents than either the majoritarian
or the mixed system. Overall, democracy is demonstrated to encourage and reduce transnational
terrorist incidents, albeit via different causal mechanisms. The findings suggest several important policy
implications for the war on terrorism. Democracy does not have a singularly positive effect on terrorism
as is often claimed and found. By improving citizen satisfaction, electoral participation, and political
efficacy, democratic governments can reduce the number of terrorist incidents within their borders.
Democracy key to human rights
Democratic countries don’t violate human rights abuses
Mesquita et al, political scientist, 05 [BRUCE BUENO DE MESQUITA, GEORGE W. DOWNS,
ALASTAIR SMITH, FERYAL MARIE CHERIF, political scientist, professor at New York University, and senior
fellow at Stanford University's Hoover Institution., American political scientist and pioneer of the
application of noncooperative game theory , Political Science, Thinking Inside the Box: A Closer Look at
Democracy and Human Rights, http://onlinelibrary.wiley.com/doi/10.1111/j.14682478.2005.00372.x/pdf] Schloss
The principal prescriptive message of the analysis appears to be that those interested in human rights
should focus their time and effort on figuring out how best to promote broad-based participation and
competition. In particular, the building blocks that help institutionalize democracy do not appear to yield
major gains in respect for human rights until party competition is normalized. This means that patience
is critical to improving human rights, but patience must be rewarded by the steady development of the
institutions that can support multiparty competition in genuinely competitive elections. It is unlikely that
one will see dramatic improvements in respect for human rights as the process of institutionalizing
democracy unfolds. Rather, the payoff comes when the threshold has been passed in terms of party
competition. More than 93 percent of cases fall into the two best human rights categories once that
stage is reached. Executive constraints certainly help: 73 percent of the time when executives are
maximally constrained, human rights records fall in the two best categories. But, when executive
constraints are fully in place and multiparty competition is not, the average human rights score is a
mediocre 2.77 (N ¼ 270), while the average human rights score improves dramatically to 1.51 (N ¼ 382)
when both executive constraints and multiparty competition are in place.
The probability that the human rights record is in the two best categories is relatively low when
associated with other institutional changes that may, nevertheless, foreshadow improvements in critical
areas. For instance, only 26 percent of the times when countries have open executive recruitment have
they also institutionalized multiparty competition. But, if they have multiparty competition, then 97
percent of the time they also have open executive recruitment. Open recruitment appears to be
necessary but not sufficient for multiparty competition. Thus, structural change is necessary for
behavior to change, but behavior does not change until enough structures are in place to make it
compelling for political leaders to restrain themselves and to respect the rights of their subjects.
Democracy key to stop famine
Democracy is key to prevent and survive famine
Waal, Executive Director of the World Peace Foundation, 2000 [Alex, British writer and researcher on
African issues, is the executive director of the World Peace Foundation at the Fletcher School of Law and
Diplomacy at Tufts University, Democratic Political Process and the Fight Against Famine,
https://www.ids.ac.uk/files/Wp107.pdf] Schloss
The assumption behind the claim that democracy prevents famine is that civil and political rights – to
free speech, to free association, to elect representatives of one's choice - contribute to the protection of
social and economic -- the right to food and livelihood. Certainly, one of the major uses of civil and
political liberties has been to promote social, economic and cultural rights. Those engaged in the
women's suffrage movement, the anti-colonial independence movements, and the civil rights
movement, did not claim their civil and political rights solely for their own sake. They also believed that
achieving these liberties would help them to attain better livelihoods, economic advancement,
improved education, and more respect for their cultures and societies. The struggles for the different
categories of rights were indivisible. In mature capitalist democracies, politicians appeal to voters'
economic self- interest, and many people cast their votes because they hope they can better their
economic position. It1 retribution of their constituents in the polling booths, and hope for the electoral
reward of successfully delivering famine prevention. Civil servants fear disgrace or demotion of their
failure to prevent famine is exposed, while hoping that they can use the opportunities of a famine
emergency to prove their capabilities and win promotion. The democracy-dictatorship distinction is of
course not clear cut.
AT: Internet freedom hurts democracy
Internet freedom promotion mitigates the negative effects of the internet
Morozov, 2012– Contributing editor at The New Republic and author of two books ; has written for The
New York Times, The Economist, The Wall Street Journal, Financial Times, London Review of Books,
Times Literary Supplement (Evgeny, The Net Delusion: The Dark Side of Internet Freedom, p. 256)//TT
While Internet enthusiasts like to quote the optimistic global village reductionism of Marshall McLuhan,
whom Wired magazine has chosen as its patron saint, few of them have much use for McLuhan’s darker
reductionism, like this gem from 1964: “That Hitler came into political existence at all is directly owing to
radio and the public-address system.” As usual, McLuhan was overstating the case, but we certainly do
not want to discover that our overly optimistic rhetoric about the freedom to connect has deprived us of
the ability to fix the inevitable negative consequences that such freedom produces. Some networks are
good; some are bad. But all networks require a thorough ethical investigation. Promoting Internet
freedom must include measures to mitigate the negative side effects of increased
interconnectedness.
AT: Foreign surveillance prevents Internet Freedom
Protections against domestic surveillance are sufficient to draw a sharp
distinction between democracies and authoritarian governments
Fontaine, 14 – President of the Center for a New American Security; was foreign policy advisor to
Senator John McCain for more than five years; Worked at the State Department, the National Security
Council and the Senate Foreign Relations Committee; was associate director for near Eastern affairs at
the National Security Council; B.A. in International Relations from Tulan University (Richard, “Bringing
Liberty Online; Reenergizing the Internet Freedom Agenda in a Post-Snowden Era”, Center for a New
American Security, September 18, 2014, http://www.cnas.org/sites/default/files/publicationspdf/CNAS_BringingLibertyOnline_Fontaine.pdf)//TT
Reenergizing the Internet freedom agenda begins with acknowledging that the United States must
promote that agenda even as it continues to engage in electronic surveillance aimed at protecting
national security . The U.S. government will simply have to endure some significant amount of
continuing criticism and opposition. At the same time, it should continue to draw a sharp distinction
between surveillance for national security purposes (in which all governments engage) and
monitoring as a means of political repression (which democracies oppose). To those who see no
distinction between American surveillance and that of autocracies, government officials should point
out that key legal guarantees matter: the U.S. Constitution’s first amendment protects against
censorship and political repression at home, while in autocratic systems such safeguards are nonexistent
or not enforceable.49
AT: Keane not about internet
The internet is vital to realizing communicative abundance
Keane, 11 – Professor of Politics at the University of Sydney (John, “Democracy in the Age of Google,
Facebook and WikiLeaks” http://sydney.edu.au/arts/downloads/news/ALR.pdf)
In the spirit of the revolution, fascination mixed with excitement is fuelling bold talk of the
transcendence of television, the disappearance of printed newspapers, the decline of the book, even the
end of literacy as we have known it. There is broad recognition that time is up for spectrum scarcity,
mass broadcasting and predictable prime-time national audiences. Symbolised by the Internet, the age
of communicative abundance is widely seen as a whole new world system of overlapping media devices
that integrate texts, sounds and images in compact and reproducible form. The perception is correct:
this is indeed a new multi-media world system that enables communication to take place, for the first
time in human history, through dispersed user points, in chosen time, either real or delayed, within
modularised and ultimately global networks that are affordable and accessible to more than a billion
people scattered across the globe.
AT: Corporate surveillance
Government surveillance is uniquely worse
Heymann, 15 [Philip B, former Deputy Attorney General in the Clinton administration and currently a
law professor at Harvard Law School, AN ESSAY ON DOMESTIC SURVEILLANCE,
file:///C:/Users/Jonah/Downloads/Lawfare-Philip-Heymann-SURVEILLANCE-for-publ-10-May-2015.pdf]
Schloss4
Why should we care particularly about government surveillance in a world where private surveillance on
the internet and the information and predictions that can be derived from a mass of such information
are driving much of the economy of the internet as companies seek knowledge useful for developing
and selling new products?
Government surveillance has far greater reach. FBI and other law enforcement agents can – without any
need of a predicate or judicial warrant – do whatever private individuals are allowed to do to discover
information, using one of the “not-a-search” exceptions. But they can do much more. They can demand,
with the assistance of a federal prosecutor, any records that “might” be useful to a grand jury – a
standard much more far-reaching than probable cause or reasonable suspicion. The government can be,
and is, empowered to demand access to any records kept by third parties, including the vast array of
electronic records now kept by businesses about their customers. What private businesses can obtain by
requiring a waiver of privacy rights as a condition of access to their goods or services, the government
can also obtain without even that strained form of consent and without the alerting knowledge that
consent gives to the individual being monitored.
The government is allowed to use informants and undercover agents in a way that is not available to
businesses. The government can and does develop technology, such as drones, which can greatly
increase its powers to observe the activities of individuals. All of this can be done without any special
showing of need and without getting a judge’s certificate that a required predicate such as “probable
cause” is met. With a predicate and a judicial warrant, the government can search places or activities,
such as electronic communications, that no private individual can search without consent.
The government also has capacities to use information it acquires in ways far more frightening and more
likely to be hostile than those of a company seeking to make you a loyal customer. It can turn suspicions
into investigations, arrest and search with probable cause; it can deny appointments or other
discretionary benefits, insist on cumbersome formalities when you cross U.S. borders, and influence the
actions of others by making obvious its suspicion of, or attention to, particular individuals. It can store
data to be used for any of these purposes or for noncriminal forms of regulation.
Data localization
Data localization increasing
Global data localization now
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the
Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL
SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.20-23, 2015, Hein Online)//JJ
C. Data Localization and Data Protection
Over the past eighteen months, countries around the world have increasingly adopted data localization
laws, restricting the storage, analysis, and transfer of digital information to national borders.45 To some
extent, the use of barriers to trade as a means of incubating tech-based industries predated the
Snowden releases.46 In the aftermath of the leaks, the dialogue has gained momentum . The asserted
purpose is to protect government data and consumer privacy.
As of the time of writing, China, Greece, Malaysia, Russia, South Korea, Venezuela, Vietnam, Iran, and
others have already implemented local data server requirements. Turkey has introduced new privacy
regulations preventing the transfer of personal data (particularly locational data) overseas. Others, such
as Argentina, India, and Indonesia are actively considering new laws, even as Brazilian president, Dilma
Rousseff, has been promoting a law that would require citizens' personal data to be stored within
domestic bounds. Germany and France are considering a Schengen routing system, retaining as much
online data in the European Union as possible.
As a regional matter, the European Union (EU) Commission's Vice President, Viviane Reding, is pushing
for Europe to adopt more expansive privacy laws. In March 2014, the European Parliament passed the
Data Protection Regulation and Directive, imposing strict limits on the handling of EU citizens' data.
Reding announced, "The message the European Parliament is sending is unequivocal: This reform is a
necessity, and now it is irreversible. Europe's directly elected parliamentarians have listened to
European citizens and European businesses and, with this vote, have made clear that we need a uniform
and strong European data protection law, which will... strengthen the protection of our citizens."
Regardless of where the information is based, those handling the data must obtain the consent of the
data subjects to having their personal information processed. They also retain the right to later
withdraw consent. Those violating the directive face steep fines, including up to five percent of
revenues. Apart from the new directive, the Civil Liberties, Justice, and Home Affairs Committee of the
European Parliament passed a resolution calling for the end of the US/EU Safe Harbor agreement .
Some 3000 U.S. companies rely on this framework to conduct business with the EU.
Data localization proposals are spreading to democracies—now is key
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Today, more than a dozen countries,1 both developed and developing, have introduced or are actively
contemplating introducing data localization laws. The laws, restrictions, and policies under consideration
are diverse in their strategies and effects. Some proposals would enforce limitations for data storage,
data transfer, and data processing; others require the local purchasing of ICT equipment for government
and private sector procurements. There are proposals for mandatory local ownership of data storage
equipment, limitations on foreign online retailers, and forced local hiring.
Proposals of this sort are not historically unprecedented. Indeed, forms of data localization policies have
been actively in place in many countries for years, including in the United States, where sensitive
government data, such as certain classified materials, must be maintained within the servers of
domestic companies. Broader localization rules, which apply to all citizen data, have tended to be
pursued by authoritarian governments such as Russia, China, and Iran, for which data localization laws
have been viewed as an effective means to control information and to monitor the activities of their
citizens.2 Post- Snowden, however, even democratic countries are now seriously considering these
more expansive data localization measures. Most notably, Brazil, Germany, and India– countries that
have witnessed some of the most virulent anti-NSA reactions –are now contemplating enacting
significant data localization laws. The EU is also contemplating localization within its area of authority.3
Surveillance key - data localization
Surveillance overreach is the driving force of global data localization
Castro and McQuinn 15 – * Vice President of the Information Technology and Innovation Foundation
and Director of the Center for Data Innovation, B.S. in Foreign Service from Georgetown University and
an M.S. in Information Security Technology and Management from Carnegie Mellon University, AND **
Research Assistant with the Information Technology and Innovation Foundation, B.S. in Public Relations
and Political Communications from the University of Texas (Daniel and Alan, Beyond the USA Freedom
Act: How U.S. Surveillance Still Subverts U.S. Competitiveness, Information Technology and Innovation
Foundation, June 2015, http://www2.itif.org/2015-beyond-usa-freedomact.pdf?_ga=1.33178294.940386433.1435342104)//JJ
U.S. SURVEILLANCE POWERS ARE THE JUSTIFICATION FOR FOREIGN PROTECTIONISM
The ability of companies — both tech and traditional — to easily share data across borders has brought
a vast array of benefits to countries, companies, consumers, and economies through increased
efficiency, decreased costs, and improved services. 26 And yet nations have continued to erect barriers
to cloud computing and cross - border data flows, much to their own detriment. 27 While some
defenders of these policies have asserted that they are designed to increase the privacy or security of
their citizens’ data, it is clear that they are also motivated by misguided self - interest . By creating rules
that advantage domestic firms over foreign firms, many countries believe they will build a stronger
domestic tech industry or gain short - term economic value , such as jobs in domestic dat a centers . In
reality, these policies unwittingly limit the ability of a country’s own firms to innovate by shielding them
from international competition. 28 These policies not only limit the number of services that a country’s
citizens and businesses can en joy, but also harm that country’s productivity and competitiveness.
Some countries used U.S. surveillance laws to justify data protectionism even before Snowden’s NSA
revelations. For example, when Rackspace built data centers in Australia in 2012, an Australian
competitor stirred up fears that the United States would use the Patriot Act to track Australian citizens
as a means to force Rackspace out of Australia. 29 In addition, this same Australian company funded a
report calling on Australian policymakers to impose additional regulations designed to put foreign cloud
computing competitors at a disadvantage. 30 However, since the recent NSA revelations, the use of
privacy concerns to justify protectionist barriers has grown significantly.
Amid growing anti - U . S . sentiment, Europe has seen calls for data localization requirements,
procurement preferences for European providers, and even a “Schengen area for data” — a system that
keeps as much data in Europe as possible — as ways to promote deployment of cloud services entirely
focused on the European market. 31 France and Germany have even started to create dedicated
national networks : “Schlandnet” for the former and the “Sovereign Cloud” for the latter. 32 The French
government has gone so far as to put € 150 million ($200 million) into two start - ups, Numergy and
Cloudwatt, to create a domestic infrastructure independent of U.S. tech giants. 33 Furthermore, some
groups have invoked U.S. cyber espionage to argue that European citizens are n ot adequately protected
and are call ing for the removal of the “safe harbor” agreement — an agreement that allows Internet
companies to store data outside of the European Union . Yet if this were removed it would cut
Europeans off from many major Internet services
There is also an increasingly distressing trend of countries , such as Australia , China , Russia , and
India , passing laws that prevent their citizens’ personal information from leaving the country’s
borders — effectively mandating that cloud computing firms build data centers in those countries or
risk losing access to their markets. For example, in 201 4 Russian implemented and Indonesia began
considering policies that would require Internet - based companies to set up local data centers. 35 These
policies are often a veiled attempt to spur short term economic activity by creating data - center jobs.
However, this benefit is often outweighed by the substantial cost of building unnecessary data centers, a
cost that is eventually passed along to the country’s citizens. Several U.S. tech giants, such Apple and
Salesforce, have already started to build their data c enters abroad to appease foreign watchdogs and
privacy advocates. 36 For example, Amazon started running Internet services and holding data in
Germany for its European business partners in an effort to downplay threats of online spying.
The perception of overreach prevents the US from stopping data localization
globally
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
Costs to the Internet Freedom Agenda and U.S. Credibility in Internet Governance
“As the birthplace for so many of these technologies, including the internet itself, we have a
responsibility to see them used for good,” declared Secretary of State Hillary Clinton in January
2010.175 Her speech at the Newseum in Washington DC effectively launched the United States’ Internet
Freedom agenda, articulating a leading role for the U.S. in using the Internet to promote freedom of
expression, freedom of worship, and the freedom to connect around the world. Clinton went on to give
two other major addresses on Internet Freedom, becoming the first global leader to emphasize Internet
Freedom as a foreign policy priority and urging “countries everywhere… to join us in the bet we have
made, a bet that an open internet will lead to stronger, more prosperous countries.”176 As Richard
Fontaine and Will Rogers describe in a seminal paper on the subject in June 2011, “Internet Freedom,
broadly defined, is the notion that universal rights, including the freedoms of expression, assembly and
association, extend to the digital sphere.”177
Although there were questions from the beginning about whether the United States would hold itself to
the same high standards domestically that it holds others to internationally,178 the American
government has successfully built up a policy and programming agenda in the past few years based on
promoting an open Internet.179 These efforts include raising concerns over Internet repression in
bilateral dialogues with countries such as Vietnam and China,180 supporting initiatives including the
Freedom Online Coalition, and providing over $120 million in funding for “groups working to advance
Internet freedom – supporting counter-censorship and secure communications technology, digital safety
training, and policy and research programs for people facing Internet repression.”181 However, the
legitimacy of these efforts has been thrown into question since the NSA disclosures began. “Trust has
been the principal casualty in this unfortunate affair,” wrote Ben FitzGerald and Richard Butler in
December 2013. “The American public, our nation’s allies, leading businesses and Internet users around
the world are losing faith in the U.S. government’s role as the leading proponent of a free, open and
integrated global Internet.”182
Prior to the NSA revelations, the United States was already facing an increasingly challenging political
climate as it promoted the Internet Freedom agenda in global Internet governance conversations. At the
2012 World Conference on International Telecommunications (WCIT), the U.S. and diverse group of
other countries refused to sign the updated International Telecommunications Regulations based on
concerns that the document pushed for greater governmental control of the Internet and would
ultimately harm Internet Freedom.183 Many observers noted that the split hardened the division
between two opposing camps in the Internet governance debate: proponents of a status quo
multistakeholder Internet governance model, like the United States, who argued that the existing
system was the best way to preserve key online freedoms, and those seeking to disrupt or challenge
that multistakeholder model for a variety of political and economic reasons, including governments like
Russia and China pushing for greater national sovereignty over the Internet.184 Many of the proposals
for more governmental control over the network could be understood as attempts by authoritarian
countries to more effectively monitor and censor their citizens, which allowed the U.S. to reasonably
maintain some moral high ground as its delegates walked out of the treaty conference.185 Although few
stakeholders seemed particularly pleased by the outcome of the WCIT, reports indicate that by the
middle of 2013 the tone had shifted in a more collaborative and positive direction following the
meetings of the 2013 World Telecommunications/ICT Policy Forum (WTPF) and the World Summit on
Information Society + 10 (WSIS+10) review.186
However, the Internet governance conversation took a dramatic turn after the Snowden disclosures.
The annual meeting of the Freedom Online Coalition occurred in Tunis in June 2013, just a few weeks
after the initial leaks. Unsurprisingly, surveillance dominated the conference even though the agenda
covered a wide range of topics from Internet access and affordability to cybersecurity.187 Throughout
the two-day event, representatives from civil society used the platform to confront and criticize
governments about their monitoring practices.188 NSA surveillance would continue to be the focus of
international convenings on Internet Freedom and Internet governance for months to come, making
civil society representatives and foreign governments far less willing to embrace the United States’
Internet Freedom agenda or to accept its defense of the multistakeholder model of Internet governance
as a anything other than self-serving. “One can come up with all kinds of excuses for why US surveillance
is not hypocrisy. For example, one might argue that US policies are more benevolent than those of many
other regimes… And one might recognize that in several cases, some branches of government don’t
know what other branches are doing… and therefore US policy is not so much hypocritical as it is
inadvertently contradictory,” wrote Eli Dourado, a researcher from the Mercatus Center at George
Mason University in August 2013. “But the fact is that the NSA is galvanizing opposition to America’s
internet freedom agenda.”189 The scandal revived proposals from both Russia and Brazil for global
management of technical standards and domain names, whether through the ITU or other avenues.
Even developing countries, many of whom have traditionally aligned with the U.S. and prioritize access
and affordability as top issues, “don’t want US assistance because they assume the equipment comes
with a backdoor for the NSA. They are walking straight into the arms of Russia, China, and the ITU.”190
Consequently, NSA surveillance has shifted the dynamics of the Internet governance debate in a
potentially destabilizing manner. The Snowden revelations “have also been well-received by those who
seek to discredit existing approaches to Internet governance,” wrote the Center for Democracy &
Technology’s Matthew Shears. “There has been a long-running antipathy among a number of
stakeholders to the United States government’s perceived control of the Internet and the dominance of
US Internet companies. There has also been a long-running antipathy, particularly among some
governments, to the distributed and open management of the Internet.”191 Shears points out that
evidence of the NSA’s wide-ranging capabilities has fueled general concerns about the current Internet
governance system, bolstering the arguments of those calling for a new government-centric governance
order. At the UN Human Rights Council in September 2013, the representative from Pakistan—speaking
on behalf of Cuba, Venezuela, Zimbabwe, Uganda, Ecuador, Russia, Indonesia, Bolivia, Iran, and China—
explicitly linked the revelations about surveillance programs to the need for reforming Internet
governance processes and institutions to give governments a larger role.192 Surveillance issues
continued to dominate the conversation at the 2013 Internet Governance Forum in Bali as well, where
“debates on child protection, education and infrastructure were overshadowed by widespread concerns
from delegates who said the public’s trust in the internet was being undermined by reports of US and
British government surveillance.”193
Further complicating these conversations is the fact that several of the institutions that govern the
technical functions of the Internet are either tied to the American government or are located in the
United States . Internet governance scholar Milton Mueller has described how the reaction to the NSA
disclosures has become entangled in an already contentious Internet governance landscape. Mueller
argues that, in addition to revealing the scale and scope of state surveillance and the preeminent role of
the United States and its partners, the NSA disclosures may push other states toward a more nationally
partitioned Internet and “threaten… in a very fundamental way the claim that the US had a special
status as neutral steward of Internet governance.”194 These concerns were publicly voiced in October
2013 by the heads of a number of key organizations, including the President of the Internet Corporation
for Assigned Names and Numbers (ICANN) and the chair of the Internet Engineering Task Force (IETF), in
the Montevideo Statement on the Future of Internet Cooperation. Their statement expressed “strong
concern over the undermining of the trust and confidence of Internet users globally due to recent
revelations of pervasive monitoring and surveillance” and “called for accelerating the globalization of
ICANN and Internet Assigned Numbers Authority (IANA) functions, towards an environment in which all
stakeholders, including all governments, participate on an equal footing.”195 In particular, the process
of internationalizing ICANN—which has had a contractual relationship with the Commerce Department’s
National Telecommunications and Information Association (NTIA) since 1998—has progressed in recent
months.196
That will collapse the global internet
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
The era of a global Internet may be passing. Governments across the world are putting up barriers to the
free flow of information across borders. Driven by concerns over privacy, security, surveillance, and law
enforcement, governments are erecting borders in cyberspace, breaking apart the World Wide Web.
The first generation of Internet border controls sought to keep information out of a country - from Nazi
paraphernalia to copyright infringing material. n1 The new generation of Internet border controls seeks
not to keep information out but rather to keep data in. Where the first generation was relatively narrow
in the information excluded, the new generation seeks to keep all data about individuals within a
country.
Efforts to keep data within national borders have gained traction in the wake of revelations of
widespread electronic spying by United States intelligence agencies. n2 Governments across the world,
indignant at the recent disclosures, have cited foreign surveillance as an argument to prevent data from
leaving their borders, allegedly into foreign hands. n3 As the argument [*680] goes, placing data in
other nations jeopardizes the security and privacy of such information. We define "data localization"
measures as those that specifically encumber the transfer of data across national borders. These
measures take a wide variety of forms - including rules preventing information from being sent outside
the country, rules requiring prior consent of the data subject before information is transmitted across
national borders, rules requiring copies of information to be stored domestically, and even a tax on the
export of data. We argue here that data localization will backfire and that it in fact undermines privacy
and security, while still leaving data vulnerable to foreign surveillance. Even more importantly, data
localization increases the ability of governments to surveil and even oppress their own populations.
Imagine an Internet where data must stop at national borders, examined to see whether it is allowed to
leave the country and possibly taxed when it does. While this may sound fanciful, this is precisely the
impact of various measures undertaken or planned by many nations to curtail the flow of data outside
their borders. Countries around the world are in the process of creating Checkpoint Charlies - not just
for highly secret national security data but for ordinary data about citizens. The very nature of the World
Wide Web is at stake. We will show how countries across the world have implemented or have planned
dramatic steps to curtail the flow of information outside their borders. By creating national barriers to
data, data localization measures break up the World Wide Web, which was designed to share
information across the globe. n4 The Internet is a global network based on a protocol for
interconnecting computers without regard for national borders. Information is routed across this
network through decisions made autonomously and automatically at local routers, which choose paths
based largely on efficiency, unaware of political borders. n5 Thus, the services built on the Internet,
from email to the World [*681] Wide Web, pay little heed to national borders. Services such as cloud
computing exemplify this, making the physical locations for the storage and processing of their data
largely invisible to users. Data localization would dramatically alter this fundamental architecture of the
Internet.
Such a change poses a mortal threat to the new kind of international trade made possible by the
Internet - information services such as those supplied by Bangalore or Silicon Valley. n6 Barriers of
distance or immigration restrictions had long kept such services confined within national borders. But
the new services of the Electronic Silk Road often depend on processing information about the user,
information that crosses borders from the user's country to the service provider's country. Data
localization would thus require the information service provider to build out a physical, local
infrastructure in every jurisdiction in which it operates, increasing costs and other burdens enormously
for both providers and consumers and rendering many of such global services impossible.
While others have observed some of the hazards of data localization, especially for American
companies, n7 this Article offers three major advances over earlier work in the area. First, while the
earlier analyses have referred to a data localization measure in a country in the most general of terms,
our Article provides a detailed legal description of localization measures. Second, by examining a variety
of key countries around the world, the study allows us to see the forms in which data localization is
emerging and the justifications offered for such measures in both liberal and illiberal states. Third, the
Article works to comprehensively refute the various arguments for data localization offered around the
world, showing that data localization measures are in fact likely to undermine security, privacy,
economic development, and innovation where adopted.
[*682] Our paper proceeds as follows. Part I describes the particular data localization measures in place
or proposed in different countries around the world, as well as in the European Union. Part II then
discusses the justifications commonly offered for these measures - such as avoiding foreign surveillance,
enhancing security and privacy, promoting economic development, and facilitating domestic law
enforcement. We appraise these arguments, concluding that, in fact, such measures are likely to
backfire on all fronts. Data localization will erode privacy and security without rendering information
free of foreign surveillance, while at the same time increasing the risks of domestic surveillance.
Data localization causes war
Data localization will end globalization, cause war
Schwartz, 2014 Peter, co-founder of the Global Business Network, (Peter, “WARNING: The Internet Might End in December”, September
22, 2014 http://www.huffingtonpost.com/peter_schwartz/end-of-internet_b_5856168.html//DM)
THE GEO-DIGITAL WORLD ORDER
Among the most important battlefields is the one for control of the world's information networks,
especially the Internet. The Internet was designed to facilitate the easy movement of information, and it
has succeeded brilliantly. For anyone with access to it, the Internet makes available a vast amount of the
world's knowledge. Money flashes all over the world in a globally integrated marketplace. The Internet
has eliminated friction from almost every market and transaction.
The rapidly growing concerns about privacy, government spying and hacking, have set in motion a
cascade that may be unstoppable, having created an alliance of both our friends and challengers.
The next battle will be fought in Busan, Korea in a few weeks at the meeting of the International
Telecommunications Union, a body chartered to technically regulate the interconnection standards of
telephone and telegraph networks and assign parking spots in Earth orbit for communications satellites.
At that meeting the challenger countries will once again, as they tried to do last December in Dubai, try
to wrest control from the multi-stakeholder coalition that has been governing the Internet under a
contract with the U.S. government.
THE END OF THE WORLD AS WE KNOW IT
If they succeed, it very well may lead to the end of the world as we know it. There will be no Internet.
There will be many nets : ChinaNet, Euronet, maybe Deutsche Net and France net and Brazil Net and
Russia Net. It will resemble the world before the Internet with many private networks and a constant
challenge of interconnection.
I remember carrying around all the devices I needed to use to connect to the early Internet because of a
variety of technical standards. The Internet was created to take the friction out of digital
communications, whether those borders were university boundaries or national borders. The digital
borders will begin to rise and with it the cost of doing everything will begin to grow. The nations of the
world will once again begin to diverge. Economies of scale will disappear.
A HIGH FRICTION FUTURE
As we disconnect, nationalism is likely to grow. We will be in a high friction world with the
opportunities for conflict growing fast. It is a recipe for poverty and war . Just as Smoot-Hawley was a
staggeringly self-destructive act that made the Great Depression much worse, so the fragmentation of
the Internet driven by the desire for national control will accelerate the end of the second era of
globalization
Data localization kills cybersecurity
Data localization wrecks cybersecurity
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
Closely related to the goal of avoiding foreign surveillance through data localization is the goal of
protecting the privacy and security of personal information against nongovernmental criminal activities.
As the country studies above show, the laws of many countries make it difficult to transfer personal data
outside of national borders in the name of privacy and security. While these laws are not explicitly
designed to localize data, by creating significant barriers to the export of data, they operate as data
localization measures.
[*719] The irony is that such efforts are likely to undermine, not strengthen, the privacy and security of
the information. n195 First, localized data servers reduce the opportunity to distribute information
across multiple servers in different locations. As we have noted above, the information gathered
together in one place offers a tempting jackpot, an ideal target for criminals. As some computer experts
have noted, "Requirements to localize data ... only make it impossible for cloud service providers to take
advantage of the Internet's distributed infrastructure and use sharding and obfuscation on a global
scale." n196 Sharding is the process in which rows of a database table are held separately in servers
across the world - making each partition a "shard" that provides enough data for operation but not
enough to re-identify an individual. n197 "The correct solution," Pranesh Prakash, Policy Director with
India's Centre for Internet and Society suggests, "would be to encourage the creation and use of decentralised and end-to-end encrypted services that do not store all your data in one place." n198
Second, as we noted above, the Protected Local Provider offering storage and processing services may
be more likely to have weak security infrastructure than companies that continuously improve their
security to respond to the ever-growing sophistication of cyberthieves. As a recent cover feature of the
IEEE Computer Society magazine observes, "The most common threats to data in the cloud involve
breaches by hackers against inadequately protected systems, user carelessness or lack of caution, and
engineering errors." n199 Information technology associations from Europe, Japan, and the United
States have echoed this observation, arguing that "security is a function of how a product is made, used,
and maintained, not by whom or where it is made." n200 When Australia was contemplating a rule
requiring health data to [*720] remain in the country (a rule that was subsequently implemented),
Microsoft made a similar argument. Microsoft argued that the rule might undermine the security of
Australian health information by limiting consumer choice among potential providers and wrote,
"Consumers should have the ability to personally control their [personal electronic health records] by
choosing to have their [personal electronic health records] held by an entity not located within
Australia's territorial boundaries if they believe that entity can provide to them a service that meets
their individual needs." n201
Indeed, countries pushing for data localization themselves are sometimes hotbeds of cybercrimes.
According to experts, "Cyber security is notoriously weak in Indonesia." n202 Indeed, the nation has
been called a "hacker's paradise." n203 One 2013 report on Vietnam suggests that "2,045 agency and
business websites were hacked this year, but the number of cyber security experts was too small to
cope with all of them." n204 Another account suggests that "Brazil is among the main targets of virtual
threats such as malware and phishing." n205 For example, in 2011, hackers stole one billion dollars from
companies in Brazil, as Forbes put it, the "worst prepared nation to adopt cloud technology." n206 At
times, a cybertheft can begin with a domestic burglary, as in the case of one recent European episode.
n207 Or cyberthefts can [*721] be accomplished with a USB "thumb" drive. In January 2014,
information about more than 100 million South Korean credit cards was stolen, likely through an "inside
job" by a contractor armed with a USB drive. n208
Most fundamentally, there is little reason to believe that the personal information of British Columbians
is more secure just because it is stored on a government computer in Vancouver than one owned by
IBM, a few miles further south.
Data Localization kills internet
Mandatory data localization wrecks US internet company competitiveness and
US internet freedom – also threatens the functioning of the internet itself
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
Some analysts have questioned whether data localization and protection proposals are politically
motivated and if they would actually enhance privacy and security for ordinary individuals living in
foreign countries,160 especially given the existence of similar laws in a number of countries and Mutual
Legal Assistance Treaties (MLATs) between nations that provide cross-border access to data stored for
lawful investigations.161 Yet there is no doubt that American companies will pay a steep price if these
policies move forward. Mandatory data localization laws could lead to soaring costs for major Internet
companies such as Google, Facebook, and Twitter, who would be faced with the choice of investing in
additional, duplicative infrastructure and data centers in order to comply with new regulations or pulling
their business out of the market altogether.162 In testimony before Congress last November, for
example, Google’s Director of Law Enforcement and Information Security suggested that requirements
being discussed in Brazil could be so onerous that they would effectively bar Google from doing business
in the country.163 The penalties that companies face for violating these new rules are also significant. In
some cases, unless U.S. policy changes , it may be virtually impossible for American companies to avoid
violating either domestic or foreign laws when operating overseas.164 The costs and legal challenges
could easily prevent firms from expanding in the first place or cause them to leave existing markets
because they are no longer profitable.165 ITIF’s Daniel Castro has suggested that data privacy rules and
other restrictions could slow the growth of the U.S. technology-services industry by as much as four
percent.166
Data localization proposals also threaten to undermine the functioning of the Internet, which was built
on protocols that send packets over the fastest and most efficient route possible, regardless of physical
location. If actually implemented, policies like those suggested by India and Brazil would subvert those
protocols by altering the way Internet traffic is routed in order to exert more national control over
data.167 The localization of Internet traffic may also have significant ancillary impacts on privacy and
human rights by making it easier for countries to engage in national surveillance, censorship, and
persecution of online dissidents, particularly where countries have a history of violating human rights
and ignoring rule of law.168 “Ironically, data localization policies will likely degrade – rather than
improve – data security for the countries considering them, making surveillance, protection from which
is the ostensible reason for localization, easier for domestic governments, if not foreign powers, to
achieve,” writes Jonah Force Hill.169 The rise in data localization and data protection proposals in
response to NSA surveillance threatens not only U.S. economic interests, but also Internet Freedom
around the world.
Data localization kills the global internet
Vogel, 14– E-Commerce Times Columnist, Chair of the Internet, eCommerce & Technology Team at
Gardere Wynne Sewell (Peter S., “Will Global Localization Kill the Internet?”, E-Commerce Times,
February 10, 2014, http://www.ecommercetimes.com/story/79946.html)//TT
In the wake of revelations that the U.S. and UK governments regularly monitor private communications - including Internet usage, GPS data, and cell information -- a number of countries are considering a new
type of law called "data localization."
In the simplest of terms, data localization laws would require that businesses that operate on the
Internet -- including Internet service providers, companies with data operations, and cloud services that
control and maintain digital data for business and individuals, including redundant backups -- store that
data within the country where the businesses are located, rather than on servers in other countries.
Internet businesses that do not comply could be barred from doing business in that country or fined
millions of dollars. So far, Brazil is the only country where data localization laws are now pending, but
other countries are considering such laws.
Data Localization Will Transform the Internet
Google and many other Internet businesses have expressed concern that data localization may change
the Internet as we know it. In November 2013, Richard Salgado, Google's director of law enforcement
and information securit, testified before the US Senate in support of the Surveillance Transparency Act
of 2013. He made the following statement:
If data localization and other efforts are successful, then what we will face is the effective Balkanization
of the Internet and the creation of a 'splinternet' broken up into smaller national and regional pieces,
with barriers around each of the splintered Internets to replace the global Internet we know today.
Until data localization laws are passed and implemented, Google's point is, of course, theoretical.
Where Should Data Be Stored?
If data localization becomes widespread, determining what data belongs in which country may be easier
said than done. People generally reside in one country, but many people work, travel and study in
various countries. So when a person travels from Brazil to the U.S. to work for a year -- or goes on
vacation for a month -- which data should be localized, and where?
If data were produced in the U.S. and emailed to Brazil, or the individual were using a Brazil service to
text in the U.S., which country would keep the data? And for how long? Should the data in the U.S. be
transferred when the person returns to Brazil?
Of course, data localization for a company is more complex, because so many companies operate in a
number of countries. For instance, Toyota is headquartered in Japan, but it has subsidiaries around the
world. Does that mean under data localization laws all of Toyota's data would have to be stored in Japan
by cloud services and ISPs it used to manage its digital operations?
Or should localized data be stored in the country of each Toyota subsidiary? Does country of
incorporation matter, or just the country where the particular office or employee is located? For the
moment, there are more questions than answers.
Microsoft Supports Customer Choice
In a recent interview with the Financial Times, Microsoft's general counsel Brad Smith said its customers
should be able choose where their data is stored, that is, "an informed choice of where their data
resides."
Smith went on to say the following:
Technology today requires that people have a high degree of trust in the services they are using... . The
events of the last year undermine some of that trust ... . That is one of the reasons new steps are
needed to address it.
However, it is unlikely that Microsoft, which is both an ISP and cloud service, will build data centers in
every country in the world for either complying with the customer's choice or data localization laws.
Impact on Cloud Providers
Since so many businesses and individuals rely on cloud services, data localization could change Internet
usage dramatically.
For example, data localization laws could require that cloud companies change the way they conduct
business and in what countries they store data to optimize their cloud operations, Forrester suggested.
They might no longer be able to service customers in every country in the world.
In the next three years, the cloud computing industry could lose US$180 billion -- 25 percent of its
revenue.
Data localization kills internet freedom
Data localization threatens internet freedom – creates a bordered internet
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
The NSA disclosures have prompted some foreign leaders to propose new policies for data localization
and data protection that could have serious ramifications for the Internet ecosystem. In the name of
strengthening privacy and security, many of these changes could hurt American tech companies, impact
the future growth of the network as a whole, and endanger human rights and Internet Freedom.99 In
particular, proposals that would require data localization or strengthen data protection laws could
fundamentally alter the way traffic flows over the Internet and create significant additional compliance
costs for American technology companies operating overseas. Major economic powers such as
Germany, Brazil, and India have discussed requiring that all Internet traffic be routed or stored locally.
Various leaders in these countries have also urged government agencies and their citizens to stop using
American tools altogether because of concerns about backdoors or other arrangements with the
NSA.100 Meanwhile, legislators in the European Union have passed strict new data protection rules for
the continent and considered various privacy-focused proposals, including the development of “national
clouds” and the suspension of key trade agreements with the United States.101 “The vast scale of online
surveillance revealed by Edward Snowden is leading to the breakup of the Internet as countries
scramble to protect privacy or commercially sensitive emails and phone records from UK and US security
services,” reported The Guardian in November 2013.102 In combination, these various proposals could
threaten the Internet economy while endangering privacy and free expression.
Mandatory Data Localization and the Costs of a Bordered Internet
Internet jurisdiction and borders were contentious issues long before the Snowden leaks, but the debate
has become significantly more complex in the past year. For decades, the borderless nature of
cyberspace103 has raised concerns about sovereignty and how governments can regulate and access
their citizens’ personal information or speech when it is stored on servers that may be located all over
the world.104 Various data localization and national routing proposals have been put forth by
governments that seek greater control of the information that flows within their borders, often in order
to make censorship and surveillance over the local population easier.105 On the other side, free speech
advocates, technologists, and civil society organizations generally advocate for a borderless cyberspace
governed by its own set of internationally-agreed upon rules that promote the protection of human
rights, individual privacy, and free expression.106 The revelations about NSA surveillance have
heightened concerns on both sides of this debate. But the disclosures appear to have given new
ammunition to proponents of greater governmental control over traffic and network infrastructure,
accelerating the number and scope of national control proposals from both long-time advocates as well
as governments with relatively solid track records on human rights.107
There are now more than a dozen countries that have introduced or are actively discussing data
localization laws.108 Broadly speaking, data localization can be defined as any measures that
“specifically encumber the transfer of data across national borders,” through rules that prevent or limit
these information flows.109 The data localization proposals being considered post-Snowden generally
require that foreign ICT companies maintain infrastructure located within a country and store some or
all of their data on that country’s users on local servers.110 Brazil, for example, has proposed that
Internet companies like Facebook and Google must set up local data centers so that they are bound by
Brazilian privacy laws.111 The Indian government’s draft policy would force companies to maintain part
of their IT infrastructure in-country, give local authorities access to the encrypted data on their servers
for criminal investigations, and prevent local data from being moved out of country.112 Germany,
Greece, Brunei, and Vietnam have also put forth their own data sovereignty proposals. Proponents
argue that these policies would provide greater security and privacy protection because local servers
and infrastructure can give governments both physical control and legal jurisdiction over the data being
stored on them—although the policies may come with added political and economic benefits for those
countries as well. “Home grown and guaranteed security in data storage, hardware manufacture, cloud
computing services and routing are all part of a new discussion about ‘technological sovereignty,’” write
Mascolo and Scott. “It is both a political response and a marketing opportunity.” 113 At the same time,
data localization can also facilitate local censorship and surveillance, making it easier for governments to
exert control over the Internet infrastructure.
Data localization kills democracy
Data localization rolls back global democracy
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
E. Freedom
Information control is central to the survival of authoritarian regimes. Such regimes require the
suppression of adverse information in order to maintain their semblance of authority. This is because
"even authoritarian governments allege a public mandate to govern and assert that the government is
acting in the best interests of the people." n280 Information that disturbs the claim of a popular
mandate and a beneficent government is thus to be eliminated at all costs. Opposition newspapers or
television is routinely targeted, with licenses revoked or printing presses confiscated. The Internet has
made this process of information control far more difficult by giving many dissidents the ability to use
services based outside the country to share information. The Internet has made it harder, though not
impossible, for authoritarian regimes to suppress their citizens from both sharing and learning
information. n281 Data localization will erode that liberty-enhancing feature of the Internet.
The end result of data localization is to bring information increasingly under the control of the local
authorities, regardless of whether that was originally intended. The dangers inherent in this are plain.
Take the following cases. The official motivation for the Iranian Internet, as set forth by Iran's [*736]
head of economic affairs Ali Aghamohammadi, was to create an Internet that is "a genuinely halal
network, aimed at Muslims on an ethical and moral level," which is also safe from cyberattacks (like
Stuxnet) and dangers posed by using foreign networks. n282 However, human rights activists believe
that "based on [the country's] track record, obscenity is just a mask to cover the government's real
desire: to stifle dissent and prevent international communication." n283 An Iranian journalist agreed,
"this is a ploy by the regime," which will "only allow[] [Iranians] to visit permitted websites." n284 More
recently, even Iran's Culture Minister Ali Janati acknowledged this underlying motivation: "We cannot
restrict the advance of [such technology] under the pretext of protecting Islamic values." n285
Well aware of this possibility, Internet companies have sought at times to place their servers outside the
country in order to avoid the information held therein being used to target dissidents. Consider one
example: when it began offering services in Vietnam, Yahoo! made the decision to use servers outside
the country, perhaps to avoid becoming complicit in that country's surveillance regime. n286 This
provides important context for the new Vietnamese decree mandating local accessibility of data. While
the head of the Ministry of Information's Online Information Section defends Decree 72 as
"misunderstood" and consistent with "human rights commitments," n287 the Committee to Protect
Journalists worries that this decree will require "both local and foreign companies that provide Internet
services ... to reveal the identities of users who violate numerous vague prohibitions against certain
speech in Vietnamese law." n288 As Phil Robertson of Human Rights Watch argues, "This is a law that
has been established for selective persecution. This [*737] is a law that will be used against certain
people who have become a thorn in the side of the authorities in Hanoi." n289
Data localization efforts in liberal societies thus offer cover for more pernicious efforts by authoritarian
states. When Brazil's government proposed a data localization mandate, a civil society organization
focused on cultural policies compared the measure to the goals of China and Iran:
[SEE FIGURE IN ORIGNIAL]
Translated, this reads as follows: "Understand this: storing data in-country is the Internet dream of
China, Iran, and other totalitarian countries, but it is IMPOSSIBLE #MarcoCivil." n290
Thus, perhaps the most pernicious and long-lasting effect of data localization regulations is the template
and precedent they offer to continue and enlarge such controls. When liberal nations decry efforts to
control information by authoritarian regimes, the authoritarian states will cite our own efforts to bring
data within national control . If liberal states can cite security, privacy, law enforcement, and social
economic reasons to justify data controls, so can authoritarian states. Of course, the Snowden
revelations of widespread U.S. surveillance will themselves justify surveillance efforts by other states.
For example, Russia has begun to use NSA surveillance to justify increasing control over companies such
as Facebook and Google. n291 Such rules have led critics to worry about increasing surveillance powers
of the Russian state. n292 Critics caution, "In the future, Russia may even succeed in splintering the web,
[*738] breaking off from the global Internet a Russian intranet that's easier for it to control." n293 Even
though officials describe such rules as being antiterrorist, others see a more sinister motive. The editor
of Agentura.ru, Andrei Soldatov, believes that Zheleznyak's proposal is motivated by the government's
desire to control internal dissent. n294 Ivan Begtin, the director of the group Information Culture,
echoes this, arguing that Zheleznyak's surveillance power "will be yet another tool for controlling the
Internet." n295 Begtin warns, "In fact, we are moving very fast down the Chinese path." n296
Finally, creating a poor precedent for more authoritarian countries to emulate is not the only impact on
liberty of data localization by liberal states. Even liberal states have used surveillance to undermine the
civil rights of their citizens and residents. n297 The proposal for a German "Internetz" has drawn worries
that national routing would require deep packet inspection, raising fears of extensive surveillance. n298
The newspaper Frankfurter Allgemeine argues that not only would a state-sanctioned network provide
"no help against spying," it would lead to "a centralization of surveillance capabilities" for German spy
agencies. n299 India's proposed localization measures in combination with the various surveillance
systems in play - including Aadhaar, CMS, National Intelligence Grid (Natgrid), and Netra - have raised
concerns for human rights, including freedom of expression. n300
[*739] In addition to concerns regarding human rights violations based on surveillance and censorship,
data localization measures also interfere with the freedom of expression - particular the "freedom to
seek, receive and impart information and ideas of all kinds, regardless of frontier[]." n301 Preventing
citizens from using foreign political forums because such use might cause personal data to be stored or
processed abroad might interfere with an individuals' right to knowledge. n302 Armed with the ability to
block information from going out and to filter the information coming in, data location consolidates
power in governments by making available an infrastructure for surveillance and censorship.
Data localization kills US economy
Data localization will cost US corporations tens of billions of dollars
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Unsurprisingly, these declarations from government officials at the ministerial level and higher, and the
policy responses those declarations suggest, are profoundly troubling to American technology
companies. U.S. firms have issued dire warnings in response,14 predicting that they could lose tens of
billions of dollars in revenue abroad as distrustful foreign governments and customers move – either by
choice or by legal mandate – to non-U.S. alternatives. Firms fear that the anti-American backlash and
potentially resulting data localization laws (depending on the specifics of the rules enacted) will mean
that they will be forced out of certain markets, or forced to build expensive – and oftentimes
unnecessarily redundant – data centers abroad. Analysts are suggesting the fallout could mirror what
happened to Huawei and ZTE, the Chinese technology and telecommunications firms that were forced
to abandon some U.S. contracts when American lawmakers accused the companies of planting in their
products coding “backdoors” for the Chinese People’s Liberation Army and intelligence services.15 A
much-cited estimate16 by the Information Technology and Innovation Foundation, an independent
think-tank, confirmed American tech firms’ worst fears when it opined that the U.S. cloud computing
industry alone could lose between $21.5 billion and $35 billion over the next three years as a result of
the NSA backlash.17
Data localization kills global economy
NSA surveillance leaks are spurring data localization measures—that
undermines the global economy
Kornbluh 14 - senior fellow for digital policy at the Council on Foreign Relations (Karen, “Beyond
Borders: Fighting Data Protectionism”, Democracy, Fall 2014,
http://www.democracyjournal.org/pdf/34/beyond_borders_fighting_data_protectionism.pdf)//DBI
Preserving the ability of information to flow through the pipes of the Internet should be a major U.S.
foreign and international economic policy priority. According to the National Foreign Trade Council, a
business organization, "goods, services, and content flowing through the Internet" were responsible for
15 percent of U.S. GDP growth from 2007 to 2012. Products and services that rely on cross-border data
flows were expected to add an estimated $1 trillion in value to the U.S. economy annually over the next
ten years. Globally, the Organization for Economic Cooperation and Development (OECD) calls the
Internet a technological enabler likely to generate more growth than electricity , the internal
combustion engine, the steam engine, or railways-and an astonishing 60 percent of the planet has yet to
come online. And, as we've been reminded these last few years, the Internet's power to generate
innovation and growth is rivaled only by its potential to help people realize their rights and democratic
aspirations.
All this was put in serious jeopardy by Snowden's revelations of National Security Agency (NSA)
surveillance. Countries already harboring mercantilist fears that U.S. Internet companies are
undermining their commerce and culture are now more openly considering protectionist measures .
The effect of these various government incursions could be to clog the pipes of the Internet, or even to
create, as Google's law enforcement and information security director has warned, a "splinter net."
U.S. entrepreneurs and Silicon Valley giants alike would have a hard time reaching customers, and those
seeking information, expression, and association in repressive societies would have fewer options to do
so safely.
The United States has championed the open, rules-based trading system since World War II. But as a
number of governments have attempted to control the flow of digital goods, services, and information
into and out of their countries, U.S. efforts have been hamstrung -first by the lack of successful foreign
Internet companies, then by the lack of foreign participation in global Internet governance mechanisms,
and finally by the surveillance revelations. In addition, a disconnect between U.S. Internet "geek" policymakers (at the Federal Communications Commission, the White House Office of Science and Technology
Policy, the Commerce Department's National Telecommunications and Information Administration, and
the State Department's Internet and telecommunications units) and national security and economic
policy "wonks" (at the National Security Council, National Economic Council, Treasury, and the Office of
the U.S. Trade Representative) has kept the issue at the margins of policy-making.
Several countries are turning to data localization now—that harms several
sectors of the economy
Kornbluh 14 - senior fellow for digital policy at the Council on Foreign Relations (Karen, “Beyond
Borders: Fighting Data Protectionism”, Democracy, Fall 2014,
http://www.democracyjournal.org/pdf/34/beyond_borders_fighting_data_protectionism.pdf)//DBI
Following the initial diplomatic protests and media attention abroad about eavesdropping on the
German chancellor and Brazilian president (and lack of public acknowledgement by our allies that they
engage in similar activities), we began to see the repercussions. Brazil debated legislation to require that
all data remain local, and the European Parliament voted to revoke the U.S.-EU Safe Harbor Framework.
Even as negotiations continue, a lawsuit filed in the Irish courts by privacy activists is attempting to
strike down the safe harbor through the European court system. A recent European Court of Justice
ruling codified a person's "right to be forgotten," or the obligation of search engines to remove links to
personal information upon request from the subject. In order to comply, ISPs must act as censors rather
than as neutral platforms. This causes friction-and high costs. An analysis by the U.S. Chamber of
Commerce estimated that implementing the "right to be forgotten" fully could lead to a decrease of
between 1.5 and 3.9 percent in the EU's GDP.
This summer, Russia passed a new law requiring that beginning in 2016, Internet companies store
Russian data on servers based in Russia. This has caused concerns about the potential for censorship,
but it would also eliminate the efficiencies gained by using data centers in other countries.
In Asia, there has been a flurry of privacy regulation. South Korea's restriction requires that personal
data be hosted locally, absent very specific consent from the data subject. Where obtaining consent is
not practicable, the law effectively bans many data offshoring arrangements. Indonesia has a draft
regulation that may require all sites that facilitate online transactions to maintain local data centers.
Vietnam's Decree 72 requires that any website, gaming platform, or social network have at least one
server in Vietnam so that it can be inspected by Vietnamese authorities. This means domestic
companies cannot use international platforms. And the "Golden Shield Project," better known as the
"Great Firewall of China," blocks routing through designated IP addresses.
These efforts clog the pipes of the Internet , but a more drastic proposal would do even more damage
by giving national governments sovereign control of the traffic in their countries. A group of countries
including Russia, China, and a number of African and Middle Eastern nations voted at the UN's
International Telecommunications Union (ITU) a year and a half ago for the Internet to be covered by
UN regulations-meaning that the current "multi-stakeholder" governance system (especially ICANN, but
also including the Internet Engineering Task Force, the Internet Architecture Board, the World Wide
Web Consortium, and the Internet Society) would be supplanted by national governmental control.
Regulating the Internet through the UN, rather than allowing it to continue to work out issues with the
relevant stakeholders, would effectively allow clogging throughout the network through conflicting
technical and regulatory requirements, potentially preventing many smaller and noncommercial users
from traversing the Web.
These restrictions have significant implications not only for Internet companies but also for sectors of
the economy like finance, transport, communication, energy, health, education, and commerce . They
can cause severe unintended consequences, such as a reduction in data security, increased cost,
decreased competitiveness, and harm to consumers.
The United States has a lot to lose, but so does the world. A recent report by the Boston Consulting
Group reiterates that uncoordinated policies hampering access to content can prevent a country-or, by
extension, the world-from realizing the Internet's full benefits. Yet restrictions on the free flow of data
among countries are not seen as a global no-no. And as more countries without a history of light-touch
regulation come online, a far different, far slower, less innovative, and more expensive Internet may
result.
Data localization wrecks the global economy
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
This is a deeply troubling development – not just for the technology firms of the United States who
stand to lose customers and contracts as a result of these policies,4 but also for all the nations, firms,
and individual Internet users who rely on the Web for economic trade and development,
communications, and civic organizing. Not only do data localization policies fail to achieve their stated
goals, they introduce a host of unintended consequences. By restricting data flows and competition
between firms, localization will likely bring up costs for Internet users and businesses, may retard
technological innovation and the Internet’s “generativity,”5 may reduce the ability of firms to
aggregate services and data analytics through cloud services, and will surely curb freedom of
expression and transparency globally. Ironically, data localization policies will likely degrade – rather
than improve – data security for the countries considering them, making surveillance, protection from
which is the ostensible reason for localization, easier for domestic governments (and perhaps even for
foreign powers) to achieve. Restricted routing, often a core component of data localization rules, may
be technically infeasible without initiating a significant overhaul of the Internet’s core architecture and
governance systems, which itself would have significant negative effects. And perhaps most worrying,
data localization policies – if implemented on a wide international scale – could have the effect of
profoundly fragmenting the Internet,6 turning back the clock on the integration of global
communication and ecommerce , and putting into jeopardy the myriad of societal benefits that Internet
integration has engendered.
Unquestionably, online espionage, citizen privacy, government overreach, and the protection of
fundamental rights are legitimate concerns of states. Advances in surveillance technologies and
offensive cyber capabilities have plainly outpaced the legal, normative, and diplomatic mechanisms
needed to protect digital data. For government officials hoping to take meaningful action in response,
data localization looks to be a convenient and simple solution. But a close examination reveals that it is
not a viable remedy to any of the privacy, security, or surveillance problems governments hope to
address. This paper discusses these points and seeks to expose the often dubious and pretextual
motivations behind the new push for data localization, to explain how such measures are profoundly
imprudent and often self-defeating, and to offer United States businesses and the United States
government a few key recommendations for how to counter this problematic trend.
Economy impact – global war
Economic decline causes great power instability
Green and Schrage 09 - Senior Advisor and Japan Chair at the Center for Strategic and International
Studies (CSIS) and Associate Professor at Georgetown University, CSIS Scholl Chair in International
Business and a former senior official with the US Trade Representative's Office, State Department and
Ways & Means Committee (Michael and Steven, “It's not just the economy”, Asia Times Online,
03/26/09, http://www.atimes.com/atimes/Asian_Economy/KC26Dk01.html)
Facing the worst economic crisis since the Great Depression, analysts at the World Bank and the US Central
Intelligence Agency are just beginning to contemplate the ramifications for international stability if there is
not a recovery in the next year. For the most part, the focus has been on fragile states such as some in Eastern Europe. However, the Great
Depression taught us that a downward global economic spiral can even have jarring impacts on great
powers. It is no mere coincidence that the last great global economic downturn was followed by the
most destructive war in human history. In the 1930s, economic desperation helped fuel autocratic regimes
and protectionism in a downward economic-security death spiral that engulfed the world in conflict. This
spiral was aided by the preoccupation of the United States and other leading nations with economic troubles at
home and insufficient attention to working with other powers to maintain stability abroad. Today's challenges are different, yet
1933's London Economic Conference, which failed to stop the drift toward deeper depression and world war, should be a cautionary tale for
leaders heading to next month's London Group of 20 (G-20) meeting. There is no question the
US must urgently act to address
banking issues and to restart its economy. But the lessons of the past suggest that we will also have to keep an eye on those
fragile threads in the international system that could begin to unravel if the financial crisis is not reversed early in the Barack Obama
administration and realize that economics and security are intertwined in most of the critical challenges we face. A disillusioned rising power?
Four areas in Asia merit particular attention, although so far the current financial crisis has not changed Asia's fundamental
strategic picture. China is not replacing the US as regional hegemon, since the leadership in Beijing is too nervous about the
political implications of the financial crisis at home to actually play a leading role in solving it internationally. Predictions that the US
will be brought to its knees because China is the leading holder of US debt often miss key points. China's currency controls
and full employment/export-oriented growth strategy give Beijing few choices other than buying US Treasury bills or harming its own economy.
Rather than creating new rules or institutions in international finance, or reorienting the Chinese economy to generate
greater long-term consumer demand at home, Chinese leaders are desperately clinging to the status quo (though Beijing
deserves credit for short-term efforts to stimulate economic growth). The greater danger with China is not an eclipsing of US
leadership, but instead the kind of shift in strategic orientation that happened to Japan after the Great
Depression. Japan was arguably not a revisionist power before 1932 and sought instead to converge with the global economy through open
trade and adoption of the gold standard. The worldwide depression and protectionism of the 1930s devastated the
newly exposed Japanese economy and contributed directly to militaristic and autarkic policies in Asia as the
Japanese people reacted against what counted for globalization at the time. China today is similarly converging with the
global economy, and many experts believe China needs at least 8% annual growth to sustain social stability. Realistic growth predictions
for 2009 are closer to 5%. Veteran China hands were watching closely when millions of migrant workers returned to work after the Lunar New
Year holiday last month to find factories closed and jobs gone. There were pockets of protests, but nationwide unrest seems unlikely this year,
and Chinese leaders are working around the clock to ensure that it does not happen next year either. However, the economic slowdown has
only just begun and nobody is certain how it will impact the social contract in China between the ruling communist party and the 1.3 billion
Chinese who have come to see President Hu Jintao's call for "harmonious society" as inextricably linked to his promise of "peaceful
development". If the Japanese example is any precedent, a sustained economic slowdown has the potential to open a dangerous path from
economic nationalism to strategic revisionism in China too. Dangerous states It
is noteworthy that North Korea, Myanmar
and Iran have all intensified their defiance in the wake of the financial crisis, which has distracted the world's leading
nations, limited their moral authority and sown potential discord. With Beijing worried about the potential impact of
North Korean belligerence or instability on Chinese internal stability, and leaders in Japan and South Korea under
siege in parliament because of the collapse of their stock markets, leaders in the North Korean capital of Pyongyang have
grown increasingly boisterous about their country's claims to great power status as a nuclear weapons state. The
junta in Myanmar has chosen this moment to arrest hundreds of political dissidents and thumb its nose at fellow members of the 10-country
Association of Southeast Asian Nations. Iran continues its nuclear program while exploiting differences between the US, UK and France (or the
P-3 group) and China and Russia - differences that could become more pronounced if economic friction with Beijing or Russia crowds out
cooperation or if Western European governments grow nervous about sanctions as a tool of policy. It is possible that the economic
downturn will make these dangerous states more pliable because of falling fuel prices (Iran) and greater need for foreign aid
(North Korea and Myanmar), but that may depend on the extent that authoritarian leaders care about the well-being of their people or face
internal political pressures linked to the economy. So far, there is little evidence to suggest either and much evidence to suggest these
dangerous states see an opportunity to advance their asymmetrical advantages against the international system.
Data localization kills trade
Free internet solves trade, growth, competitiveness, and innovation –
Wyden 10 – U.S. Senator from Oregon, chairman, Subcommittee on International Trade, Customs, and
Global Competitiveness, Committee on Finance, Juris Doctor degree from the University of Oregon
School of Law (Ron, INTERNATIONAL TRADE IN THE DIGITAL ECONOMY: HEARING BEFORE THE
SUBCOMMITTEE ON INTERNATIONAL TRADE, CUSTOMS, AND GLOBAL COMPETITIVENESS OF THE
COMMITTEE ON FINANCE UNITED STATES SENATE, p. 1-2, 11/18/10, ProQuest)//JJ
I apologize to all our guests. As you may have gathered, it is somewhat chaotic in terms of trying to get
through all of the organizing. My colleague, ranking minority member, and very, very valuable Senator,
Senator Crapo, has been called to a meeting of the Deficit Commission, otherwise he would be here. He
is very interested in today's subject: International Trade in the Digital Economy. I appreciate all our
guests and their patience. We will go to your remarks here in just a moment.
There is rampant global protectionism being deployed today against America's digital exports . The
purpose of our hearing this afternoon is to expose it, describe it, and identify ways to combat it. Today
the subcommittee is going to shed new light on an old issue: the importance of keeping the modes of
international trade open. Whether it is the Oregon Trail, the Silk Road, or the World Wide Web, safe and
efficient trade routes that enable people to connect are essential for economies to grow .
The modes over which trade is conducted have changed over time, but the fundamentals of trade do
not. The development of civilization parallels the growth of open trade routes, and the Internet
represents the trade route of the 21st century . Keeping the net open at home and overseas is of
paramount importance to the American economy because it is increasingly the primary way that the
global population will communicate , create , and conduct commerce .
Our economy has faced some dark times, but one bright spot, one very vibrant spot , is the continued
innovation in the digital space . American companies, whether they are designing and manufacturing
semiconductors or rearranging the way that Americans socialize and engage in commerce, are
transforming global society in profound and irreversible ways.
This innovation does not just happen in Silicon Valley; it is occurring in communities across the country.
To be sure, Intel, Facebook, Apple, and Google come to mind when many of us think of the digital
economy, but these firms are also the platforms upon which further innovation occurs, the platforms by
which a seller in the Pacific Northwest can reach a buyer in Southeast Asia without leaving his desk.
That is why I am especially pleased that Mike Sax is here. He is from beautiful Eugene, OR, home of the
University of Oregon Ducks, where we are number one and will never let a moment pass when we can
point that out. Mike develops applications that piggy- back on the mobile IT platforms like Apple's
iPhone. Thanks to Mike, over a million early iPhone adopters around the world can download his app to
type their e-mail and text messages much easier. Mike, in my view, is going to speak today for hundreds
of small developers and entrepreneurs throughout the country, and we are glad once again to see
leadership coming from our home State.
The ability of American IT companies to penetrate foreign markets directly affects American
companies' ability to increase exports of goods and services , digital or otherwise. So, when an Internet
website is blocked or filtered or data flow is impeded, it has a direct impact on the American economy
and its ability to produce the new, good-paying jobs that our country needs.
As American technology firms create and expand global markets for digital products and outpace our
competition, foreign governments have responded by resorting to discriminatory measures against
American technology and content providers. According to industry sources that relied on the work of
the Open Network Initiative, now more than 40 countries impose broad restrictions on online
information, which represents a 10-fold increase from a decade ago.
In many cases, the censorship does not aim to serve a repressive political motive, but is about blatant
commercial protectionism . Make no mistake about it, it is not primarily about politics, it is about
commercial protectionism, pure and simple. My view is, these actions constitute a direct economic
threat to the United States, and that is what our subcommittee is going to be working to combat.
Now, we have seen this before. American firms drive innovation , but we have seen in the past that
foreign regimes think that they have a license to disfavor American technology because their own
companies cannot get out of the starting gate. Witnesses today will describe specific trade barriers that
go beyond discriminating against American content. Secret regulations, licensing standards, various
practices are being deployed to disadvantage American companies and the American workers that they
rely on.
Internet growth solves trade
Wyden 10 – U.S. Senator from Oregon, chairman, Subcommittee on International Trade, Customs, and
Global Competitiveness, Committee on Finance, Juris Doctor degree from the University of Oregon
School of Law (Ron, INTERNATIONAL TRADE IN THE DIGITAL ECONOMY: HEARING BEFORE THE
SUBCOMMITTEE ON INTERNATIONAL TRADE, CUSTOMS, AND GLOBAL COMPETITIVENESS OF THE
COMMITTEE ON FINANCE UNITED STATES SENATE, p. 94-96, 11/18/10, ProQuest)//JJ
Given the borderless nature of the Internet, it should surprise no one that Internet firms have become
important exporters in their own rights, as well as key generators of international trade . According to a
study by Hamilton Consultants, large U.S. Internet corporations earn about one-half their revenues
outside the United States." In the case of Google, revenues from outside of the United States comprised
53 percent of total revenues in the first quarter of 2010, and more than half of Google searches come
from outside the United States."
Even in more traditional trade sectors , like the goods and services businesses, the Internet has also
been transformative . The Internet has empowered businesses of all sizes to reach international
markets in ways unimaginable a generation ago. It has dramatically reduced the high entry costs to
export markets that has for centuries kept most small business limited to local geography. This
transformation of industry happens in both the industrial and developing world. In the U.S. state of
Georgia, a small manufacturing operation is reaching out to international customers through Internet
advertising . 2 In Idaho, a wilderness tourism company has attracted international customers through
online search ads." And in the South American nation of Guyana, women are using online marketing to
sell hand-woven hammocks to people around the world."
Many companies rely on the Internet, including particular websites, as their key advertising platform.
For instance, companies are projected to spend over $225 billion on Internet advertising over the next
three years (2011-2013).'$ Google alone generated more than $54 billion in economic activity in the
United States in 2009 based largely on returns that businesses received from advertisements run next to
search results and on websites.
The Internet's impact on export growth is clear and demonstrable . According to one recent study, a 10
percent increase in a country's overall Internet penetration is associated with a 1.7 percent increase in
export growth in the services sector. A lower, but similar correlation pertains to trade in goods."
As a new dynamic and open force in the global economy, the Internet has helped produce phenomenal
change and growth . This growth has been accompanied by increasing demand worldwide for
information and services from beyond national borders. While many governments have welcomed the
new trade, some have recoiled at the new openness - and are determined to restrict the flow of
information across the Internet.
Tech protectionism spills-over
Castro and McQuinn 15 – * Vice President of the Information Technology and Innovation Foundation
and Director of the Center for Data Innovation, B.S. in Foreign Service from Georgetown University and
an M.S. in Information Security Technology and Management from Carnegie Mellon University, AND **
Research Assistant with the Information Technology and Innovation Foundation, B.S. in Public Relations
and Political Communications from the University of Texas (Daniel and Alan, Beyond the USA Freedom
Act: How U.S. Surveillance Still Subverts U.S. Competitiveness, Information Technology and Innovation
Foundation, June 2015, http://www2.itif.org/2015-beyond-usa-freedomact.pdf?_ga=1.33178294.940386433.1435342104)//JJ
U.S. SURVEILLANCE POWERS ARE THE JUSTIFICATION FOR FOREIGN PROTECTIONISM
The ability of companies — both tech and traditional — to easily share data across borders has brought
a vast array of benefits to countries, companies, consumers, and economies through increased
efficiency, decreased costs, and improved services. 26 And yet nations have continued to erect barriers
to cloud computing and cross - border data flows, much to their own detriment. 27 While some
defenders of these policies have asserted that they are designed to increase the privacy or security of
their citizens’ data, it is clear that they are also motivated by misguided self - interest . By creating rules
that advantage domestic firms over foreign firms, many countries believe they will build a stronger
domestic tech industry or gain short - term economic value , such as jobs in domestic dat a centers . In
reality, these policies unwittingly limit the ability of a country’s own firms to innovate by shielding
them from international competition. 28 These policies not only limit the number of services that a
country’s citizens and businesses can en joy, but also harm that country’s productivity and
competitiveness .
Data localization causes poverty
Data localization collapses the global economy and increases poverty
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Economic Growth Objectives Not Well Served
Data localization (most especially, as a ban on foreign firms operating local servers) appeals to those
political and business leaders who hope to give domestic technology firms a competitive advantage. It
also appeals to those leaders who believe that that competitive advantage will, over time, lead to the
development of a strong technology sector, following what might be thought of as a “China
developmental model,” in which early domestic protectionism is tapered off as local firms find their
competitive edge. But again, the benefits of this kind of policy (which generally only advantage certain
favored local companies) are outweighed by its drawbacks. By prohibiting foreign firms from operating
in country, or by making operations prohibitively expensive for foreign firms, governments are
dramatically limiting the options available to local consumers. This includes small businesses that often
require the cheaper and more advanced services that only international firms can provide. Indeed, even
non tech-related industries that nevertheless rely on IT services, such as advanced manufacturing, are
likely to see that their costs rise and their efficiencies deteriorate as a consequence of Internet
protectionism in the guise of localization.
These costs may not be trivial. The European Centre for International Political Economy has estimated
that if and when cross-border data flows between the U.S. and EU are seriously disrupted (assuming
existing models for cross-border transfer and processing of data, such as the Safe Harbor and BCRs108
are disrupted), the negative impact on EU GDP could reach -0.8% to -1.3% , and EU services exports to
the United States could drop by as much as -6.7% due to loss of competitiveness.109 Developing
countries, too, would likely suffer. There, Internet access and data services are significant drivers of
economic growth. According to several important studies on the issue, access to the Internet can
dramatically reduce the effect on developing countries of geographical isolation from major exports
markets.110And, according to a Deloitte study, expanding access to the 4 billion people who live in
developing countries to levels developed economies currently enjoy would increase productivity in
those areas by as much as 25 percent , add $2.2 trillion in additional GDP, increase the GDP growth
rate by 72 percent , add more than 140 million new jobs , and lift 160 million people out of extreme
poverty. 111 Certainly, the cost inherent in localization alone will not forestall all of these positive
developments, but it would retard them. To leaders in developing nations such as India and Brazil,
where data localization measures are under serious consideration, these potential adverse economic
impacts ought to give serious pause.
Less directly, but perhaps even more critically as a long-term matter, data localization adversely affects
the Internet’s capacity for productivity by reducing the Internet’s “network effect” and
“generativity.112” By placing limitations on which firms can participate in the network, data localization
reduces the overall size of the network, which, according to network theory as well as Metcalfe’s Law
(which states that the value of a communications network is proportional to the number of users of the
system), would bring up both costs and the overall innovative potential of the aggregated network.
Consider big data analytics, for example, which often involves the transfer of data from numerous
sources without regard to geography and can have major benefits for society.113 By severing the ties
between nations and the data that can be collected an analyzed, data localization vastly diminishes the
capacity for new discoveries and for new solutions to some of the world’s most pressing problems.
Data localization kills advanced manufacturing
Data localization stifles competitiveness and innovation – wrecks manufacturing
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.27)//GK
Data localization (most especially, as a ban on foreign firms operating local servers) appeals to those political and business leaders who hope to
give domestic technology firms a competitive advantage. It also appeals to those leaders who believe that that competitive advantage will, over
time, lead to the development of a strong technology sector, following what might be thought of as a “China developmental model,” in which
early domestic protectionism is tapered off as local firms find their competitive edge. But again, the benefits of this kind of policy (which
generally only advantage certain favored local companies) are outweighed by its drawbacks. By
prohibiting foreign firms from
operating in country, or by making operations prohibitively expensive for foreign firms, governments are
dramatically limiting the options available to local consumers. This includes small businesses that often
require the cheaper and more advanced services that only international firms can provide. Indeed, even
non tech-related industries that nevertheless rely on IT services, such as advanced manufacturing , are
likely to see that their costs rise and their efficiencies deteriorate as a consequence of Internet
protectionism in the guise of localization. These costs may not be trivial. The European Centre for International Political
Economy has estimated that if and when cross-border data flows between the U.S. and EU are seriously disrupted
(assuming existing models for cross-border transfer and processing of data, such as the Safe Harbor and BCRs108 are disrupted), the
negative impact on EU GDP could reach -0.8% to -1.3%, and EU services exports to the United States could
drop by as much as -6.7% due to loss of competitiveness.109 Developing countries, too, would likely suffer.
There, Internet access and data services are significant drivers of economic growth. According to several important
studies on the issue, access to the Internet can dramatically reduce the effect on developing countries of
geographical isolation from major exports markets.110And, according to a Deloitte study, expanding access to the
4 billion people who live in developing countries to levels developed economies currently enjoy would
increase productivity in those areas by as much as 25 percent, add $2.2 trillion in additional GDP,
increase the GDP growth rate by 72 percent, add more than 140 million new jobs, and lift 160 million
people out of extreme poverty. 111 Certainly, the cost inherent in localization alone will not forestall all of these positive
developments, but it would retard them. To leaders in developing nations such as India and Brazil, where data localization measures are under
serious consideration, these potential adverse economic impacts ought to give serious pause. Less directly, but perhaps even more critically as
a long-term matter, data
localization adversely affects the Internet’s capacity for productivity by reducing the
Internet’s “network effect” and “generativity.112” By placing limitations on which firms can participate in the network,
data localization reduces the overall size of the network, which, according to network theory as well as Metcalfe’s Law
(which states that the value of a communications network is proportional to the number of users of the system), would bring up both
costs and the overall innovative potential of the aggregated network. Consider big data analytics, for example, which often
involves the transfer of data from numerous sources without regard to geography and can have major benefits for society.113 By severing the
ties between nations and the data that can be collected an analyzed, data
localization vastly diminishes the capacity for
new discoveries and for new solutions to some of the world’s most pressing problems.
Brazil internal link
Snowden disclosures have strained US-Brazil relations
Young 14– President and General Counsel of Ronin Analytics, LLC. and former NSA senior leader (Mark,
“National Insecurity: The Impacts of Illegal Disclosures of Classified Information”, I/S: A Journal of Law
and Policy for the Information Society, 2014,
http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Young-Article.pdf)//DBI
The disclosures have impacted U.S. national security relationships with Latin America, but particularly
Brazil. Good intentions over the past three years to establish a trade deal and Brazilian membership in
the UN Security council have been unsuccessful. Brazil’s President Dilma Vana Rousseff has stated that
each country has much to gain from deepening coordination with the U.S. It is reasonable to assume,
given the threats to stability and the illicit narcotics trafficking from Latin America, that the U.S.
intelligence Community has a partnership with Brazil. If true, then the disclosures by Snowden will
complicate this cooperation. According to the New York Times, “Diplomatic ties have also been
damaged, and among the results was the decision by Brazil’s president, Dilma Rousseff, to postpone a
state visit111 to the United States in protest over revelations that the agency spied on her, her top aides
and Brazil’s largest company, the oil giant Petrobras.”112 Although an apology113 may be enough to
have a trade deal between the U.S. and Brazil reenergized, other issues continue to strain the
relationship between Washington and Brasília.
According to the Council of Foreign Relations, the Snowden scandal, the White House “response to it
and President Dilma Rousseff's decision to cancel the state visit has (sic) revealed the weakness of the
U.S.-Brazil relationship.”114 Snowden’s disclosures are now spawning an effort within Latin America to
strengthen protections against alleged NSA collection. “According to the AP, Brazilian Foreign Minister
Luiz Alberto Figueiredo said, ‘We’re going to talk with our partners, including developed and developing
nations, to evaluate how they protect themselves and to see what joint measures could be taken in the
face of this grave situation.’”115
Not only is U.S. national security affected by reactions in Brazil, but U.S. commercial interests as well.
According to the LA Times, President Rousseff is “promoting legislation that would require technology
companies such as Google and Facebook to store data collected in Brazil on Brazilian soil and therefore
submit it to Brazilian law.”116 In addition, Brazil is now planning to develop a secure e-mail system to
improve the security of government communications against American spying. Ironically, “President
Dilma Rousseff used the secure messaging channel Twitter to make the announcement that she's going
to order SERPRO – that country's federal data processing service – to implement a whole-of-government
secure e-mail system.”117
Perceived NSA overreach caused immediate Brazilian backlash
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.14-15)//GK
In certain interesting ways, the Brazilian response to the Snowden revelations has mirrored that of Germany. Brazilians, like their German
counterparts, took serious umbrage when they learned that the NSA targeted their head of state—in Brazil’s case,
President Dilma Rousseff. Perhaps more significantly, if less sensationally, Brazilians were angered to learn that the NSA
conducted a program that infiltrated the networks of Brazil’s national oil and gas company, Petrobas.52
The parallels between Brazil and Germany have not been lost on the leaders of either of the two countries. Brazil, like Germany, is
deeply
scarred by its own history of military dictatorship and the system of state surveillance orchestrated by
that regime. When the NSA leaks became public, President Rousseff, who herself fought against Brazil’s dictatorship as an
anti-government guerilla fighter, canceled a planned U.S. visit and state dinner with President Obama.53 Later, in
November, she launched a long and impassioned diatribe from the podium of the UN General Assembly
against the intrusion of U.S. surveillance. Acting upon their shared perceptions of the seriousness of the NSA’s transgressions,
Germany and Brazil have jointly proposed a resolution on 54 online privacy to the UN,55 and have put
forward proposals to build an undersea fiber-optic cable that is intended to funnel Internet traffic between South America
and Europe, without having to pass through the U.S. 56
Current NSA perception results in loss of Brazilian markets
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.15-16)//GK
On the home front, the Brazilian government has announced plans to abandon Microsoft Outlook for its own
domestic email system that utilizes only Brazilian data centers.57 The Brazilian parliament has also recently passed
its “Marco Civil da Internet,” an Internet “bill of rights”—the first major Internet policy legislation in
Brazilian history—that enshrines fundamental rights for Internet users, and establishes legal obligations of Internet
companies in furtherance of those rights. The Brazilian Parliament and ministries have, since 2009, been engaged in
negotiations over the details of the bill, which the Center for Democracy and Technology, a prominent American technology think tank, has
called a “major victory for Brazilian civil society,” in that it provides sweeping new protections for Brazilian Internet users. 58 Following the
Snowden firestorm, however, some legislators proposed to expand the Marco Civil beyond its “bill of rights” function, arguing for the inclusion
of a provision requiring foreign companies to store copies of all data pertaining to Brazilians in local data servers. That provision, which was
initially backed by President Rousseff but has since been removed from the current bill as passed, 59 was aimed at enabling greater access for
Brazilian law enforcement to data stored abroad or belonging to foreign companies. 60 While the Marco Civil was signed into law on April 23,
201461 with the most potent localization provision rescinded, one provision remained, Article
11,62 which deeply troubles
international business interests, in that it extends the reachof Brazilian law to any Internet service in the
world with Brazilian users. A firm based in the United States whose services are used by Brazilians could, for example, be penalized for
adhering to its domestic data-disclosure laws if they conflict with Brazil’s. Penalties include fines of up to ten percent of a
firm’s Brazilian revenues or even termination of the offending company’s services in Brazil.63 Additionally,
immediately following the passage the Marco Civil, Brazil’s largest paper, Folha de Sao Paulo, reported that the Minister of Communications,
Paulo Bernardo, stated that the government has not totally abandoned its desire to pursue a local server requirement, despite the deletion of
the provision from the Marco Civil, and is considering pursuing the policy as part of a new “Data Protection Law.”64 With more
than 94
million Internet users, and Facebook usage second only to the United States, 65 the Brazilian market is enormously
important for the major U.S. Internet companies. It will be extremely difficult and expensive for them to
remove themselves from the Brazilian market. However, if the Brazilian President elects aggressively to
enforce the rules found in the Marco Civil, or if the Brazilian government pursues localization as part of other legislation such as
a new data protection law, affected U.S. companies may be left with no choice but to take their business
elsewhere.
EU internal link
The EU is threatening new data protection rules
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
New rules would include much higher fines for firms deemed to be in violation of data protection law in
the EU (including those firms located outside of Europe), a limited right of citizens to demand the
deletion or limited retention of their personal data, and strict limitations on what can be done with EU
citizens’ data outside the Union. Fines for violating certain rules could be as high as €100 million or up to
five percent of an enterprise’s annual revenue, whichever is larger48 – an eye-popping sum. Companies
such as Google could, under the new EU regulatory regime, face much higher fines for privacy breaches
than the relatively trivial sums they pay today for the same violation. Perhaps most importantly, EU
privacy rules now apply to the processing of EU citizens’ data, even if that data is processed in another
country, a requirement that could force U.S. firms to set up additional servers in Europe.
The effect of these proposed EU rules could seriously undermine the position of some U.S. firms. They
would bar some firms’ practice, embedded in their business models, of selling data (not necessarily
sensitive or private data) to third parties, while others use data analytic tools at odds with the new rules.
Furthermore, business models aside, the rules if adopted may require U.S. firms to place their servers,
and European citizen data they hold, permanently in Europe, potentially a prohibitively expensive – or
even technically unfeasible – requirement. The consequences, in either case, would be de facto, if not
de jure, data localization .
Snowden disclosures have strained US-EU relations, especially with Germany
and France
Young 14– President and General Counsel of Ronin Analytics, LLC. and former NSA senior leader (Mark,
“National Insecurity: The Impacts of Illegal Disclosures of Classified Information”, I/S: A Journal of Law
and Policy for the Information Society, 2014,
http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Young-Article.pdf)//DBI
European Union. Traditional strong diplomatic and intelligence sharing relationships with members of
the European Union have also been strained by revelations of programs allegedly collecting the personal
communication of 35 heads of state.88 These reports of U.S. surveillance in Europe are “eating away at
the fabric of trust that is part of the alliance.”89 According to the Council on Foreign Relations Senior
Fellow Charles A. Kupchan, there is a direct relationship between the political discomfort with alleged
U.S. intelligence collection and European disappointment about the President’s inability to better
balance security and civil liberties. Kupchan has noted that many Europeans feel that Obama “has failed
to deliver on his pledge to clean up some of the excesses left behind by the George W. Bush
administration.” 90
German Chancellor Angela Merkel originally defended the apparent intelligence cooperation disclosed
by Snowden. She pointed out that Germany had “avoided terrorist attacks hanks to information from
allies.” But, in the face of new disclosures, she is now discussing limits on intrusions on privacy. Berlin
has alluded repeatedly to “Cold War” tactics and has said spying on friends is unacceptable. Her
spokesman has said a transatlantic trade deal requires a level of “mutual trust.” 91 Chancellor Merkel
has been criticized for her apparently feigned indignation about alleged cooperation with the U.S.
intelligence community. “Germany has demanded explanations for Snowden's allegations of large-scale
spying by the NSA, and by Britain via a programme codenamed ‘Tempora,’ on their allies including
Germany and other European Union states, as well as EU institutions and embassies.”92
The Head of Germany’s domestic intelligence has said he knew nothing about the reported NSA
surveillance. Opposition parties believe otherwise. They claimed that, because German intelligence
activities are coordinated within the Office of the Chancellor, high-level officials must have known about
speculative NSA activities.93 Der Spiegel has reported that NSA monitored about 20 million German
phone connections and 10 million internet sessions on an average day and 60 million phone connections
on above average days.94 Thus, unconfirmed U.S. intelligence activities are now an issue that will affect
German political leadership and the diplomatic and intelligence relationships between Germany and the
U.S.
The impact on European Union allies is already seen in the talks being held between EU member states
and the US about American surveillance tactics that may have included spying on European allies.95
President Obama assured Germany that the United States “takes seriously the concerns of our European
allies and partners.”96
The initiation of a dialogue between the U.S. and EU Members about intelligence collection and
appropriate oversight97 will also complicate the transatlantic relationship. Restrictions or legislation
that shifts standards of privacy and data protection will diminish American and EU security.
France. Tensions in the European Union are not limited only to Germany. Although not as vocal, the
French government has expressed concerns about U.S. intelligence activity because of the Snowden
leaks. In response to allegations that NSA had collected “more than 70 million phone calls in France over
a 30-day period,” U.S. Ambassador to France Charles Rivkin was called meet with French diplomats.98 A
news release from French President Francois Hollande's office said he expressed his "deep disapproval
with regard to these practices" and that “such alleged activities would be unacceptable between allies
and friends.”99
Surveillance kills US-EU relations
Tene, 14 - Associate Professor at the College of Management School of Law (Omar,2014, “A NEW
HARM MATRIX FOR CYBERSECURITY SURVEILLANCE”, http://ctlj.colorado.edu/wpcontent/uploads/2014/11/Tene-website-final.pdf)//gg
Over the past decade, a range of factors has transformed the nature of national security threats and
amplified tensions between operational personnel and counsel applying laws and regulations. First,
military threats have transcended national borders and become pervaded by non-state actors.
Traditional national security threats, which were once the domain of Cold War superpowers, are now
“privatized” through terrorist networks. Similarly, cybersecurity threats, once focused on cyber
superpowers such as China and Russia, have now spilled over to private organizations such as
Anonymous and even lone-wolf hackers who are sometimes co-opted by hostile states. Unlike nuclear
proliferation, which requires a deployment of resources unavailable to non-state actors, very
rudimentary tools are sufficient to unleash potentially devastating cyber attacks.
Second, defending national infrastructure is complicated by the interdependence of military and private
networks. Indeed, the Internet itself emerged from the military domain, as have technologies, software
and applications such as mobile phones and encryption tools. The vulnerability of such networks and
connected infrastructure presents a menacing threat to the functioning of society. This includes risks not
only to military assets and critical infrastructure but also to peripheral networks and even individual
devices, which could be used as discreet gateways to stage focused attacks. Lord Cameron of Dillington
famously coined the phrase that “no society stands more than nine meals away from total anarchy.”47
He predicted that merely three days of disruption to British supermarket supply chains would be enough
to send law and order reeling, at grave risk to the life and security of ordinary citizens. Despite this,
neither the United Kingdom nor any other country categorizes its supermarket chains as critical
infrastructure.48
Third, the distinction between domestic and foreign communications is muddled. Indeed, the crisis in
international relations resulting from the Snowden revelations, particularly between the European
Union and the United States, is rooted in the fact that large amounts of foreign communications are
routed through or stored in the United States.49 At the same time, a large volume of domestic
communications has cross-border elements, such as connections with foreign websites, services or
counterparties.
Countries are turning to domestic content production since NSA leaks
Bauman et al, 14 - Professor Emeritus of Sociology at the University of Leeds (Zygmunt, “After
Snowden: Rethinking the Impact of Surveillance”, 29 May 2014, International Political Sociology Journal,
Volume 8 Issue 2, pages 121-144)//gg
The policies announced by the Brazilian government to contain the threats presented by US mass
surveillance techniques include the increase of international Internet connectivity and domestic content
production. According to Brazilian authorities, the production of domestic content, such as a national
email service or a national social media, would allow Brazilian citizens to keep their data within national
borders. The debate regarding the creation of a “European data cloud” raises similar issues. Indeed,
Brazilian authorities are not alone. In a similar vein, Dutch authorities have tried to keep the
government’s data out of the reach of American companies, while the European Union is discussing
the possibility of isolating data storage from US mining techniques , and the German government is
trying to keep traffic local by warning Internet users when they pull out of European cyberspace. Not to
mention the well-known cases of the Chinese “GreatFirewall” or the Iranian “Halal Internet.” In every
case, states are thickening their digital borders. Although one should not overlook the differences
between what Brazilian or German authorities are doing to protect data and privacy, and what the
Chinese government is doing with its firewall, in each of these cases a massive infrastructure has to be
built. Hence, a vast array of technologies, legislations, and expertise has to be developed and deployed
either to protect data, to control traffic or even for surveillance. On top of all of these investments in
state capacities for protection or surveillance, security professionals and intelligence experts have to be
mobilized to manage the nation al systems.
By building their fortresses in the clouds, states shift from the cosmopolitan move to strategic play.
While the first move is based on claims to universal rights, the strategic game is based on claims to state
sovereignty, or in this case cyber-sovereignty. Within these strategic games, very often, the reference to
universal rights fades and ends up being replace d by a strategic reasoning embedded in uncertainty and
fear. Concepts such as national interest, national or state security, espionage, and war come to the fore
when state representatives go public to support policies and techniques that protect a given society.
Cyberspace is, then, described as a US-centered space, and so US cyber power should be balanced
through the development of national cyber capabilities or international coalitions.
Germany internal link
German companies are preparing for data localization now
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
What such a proposal would mean in practice is unclear; what is clear, however, is that some Germany
technology companies are now spearheading the data localization movement. In particular, Deutsche
Telekom, the largest provider of high-speed Internet and wireless services in Germany and the largest
telecommunications organization in the European Union, has begun to act in advance of any German
government legislation. In partnership with GMX, one of Germany’s largest email providers, the
company has already implemented its " e-mail made in Germany " service, a program that promises to
keep German email communications within German territory.32 Thomas Tschersich, who heads
Deutsche Telekom's IT Security, explained that IP addresses will be used to recognize when both the
sender and the recipient of the emails are in Germany, and based on that information, arrangements
between national email providers will be used to transfer this information.33
Further, consistent with, and supported by, Chancellor Merkel’s declarations of Internet independence,
Deutsche Telekom has also raised the idea of creating a “ Schengen area routing ,” a network for the 26
European countries that have agreed to remove passport controls at their borders. 34 (The Schengen
area does not include the U.K., which the Snowden documents have revealed has closely cooperated
with the U.S. spying programs through its own signals intelligence agency, the GCHQ). This network
would supposedly allow the network nations’ citizens securely to exchange data within the area without
having to send that data to the United States. “The idea is that when the sender and recipient of any
Internet data are in Germany their data is not sent via another country, as it sometimes is today,”
Philipp Blank, a Deutsche Telekom spokesman explained. Blank left no doubt as to which other
countries’ practices – and companies – troubled him: "We're simply asking: Why does an e-mail from
Bonn to Berlin have to pass through New York or London?" 35
Indonesia internal link
Indonesia already passed data protection policies
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Quick Glance: Indonesia’s “Regulation 82”
In Indonesia, U.S. companies are closely watching how a 2012 amendment to the Law No. 11 regarding
“Implementation of Electronic Systems and Electronic Transactions (‘Regulation 82’)” and how “public
service” data is defined. 66 According to Regulation 82, all digital providers of a “public service” are
required to build a domestic data center in the country. The government has not yet offered a
regulatory definition of “public service” under Regulation 82. For the time being, regulators are relying
on a definition found in Public Service Law no. 25 of 2009. There, “public service” is defined
extraordinarily broadly as “anything that is pertinent to people’s welfare.” This crucial definitional issue
is currently being worked out in the Indonesian legislature and within the Ministry of Communications
and Information. Depending on how expansively or narrowly lawmakers ultimately define the term, they
could determine how freely American companies will be to operate in Indonesia.
India internal link
NSA overreach will cause a forceful push for domestic data localization laws in
India
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.17-18)//GK
In September 2013, The Hindu newspaper, one of India’s largest English language dailies, reported that the NSA had used the PRISM
and other secret programs to gather information on India's domestic politics and on a variety of the country's most
important strategic and commercial interests, including India’s nuclear and space industries. 67 A separate NSA document, also
obtained by The Hindu, suggested that the NSA had selected the office of India's UN mission and Washington
embassy as "location targets," where records of Internet traffic, emails, telephone and office conversations could
potentially be accessed.68 Indeed, Snowden’s disclosures revealed that India was one of the most highly
surveilled countries on the NSA target list.69 In contrast to the anger generated by the Snowden
revelations within other democratic countries such as Germany and Brazil, and despite the apparent extent of the NSA’s
targeting of Indian security and political secrets, the Snowden revelations did not evoke wide-scale condemnation in India, nor
did a particularly harsh response issue from Delhi.70 After discussing the matter with U.S. Secretary of State John Kerry, India’s
Foreign Minster stated that, “We had an issue, which was discussed when Secretary Kerry was in India...He [Kerry]made a very clear
explanation that no content has been sought or received of any email... So, I think as far as we are concerned, there is no issue today.” The
reasons for the measured, even mild, Indian diplomatic response are complex, but it seems possible that at the level of
Internet policy, as opposed to bilateral or international relations, a more forceful response may be coming, and it may
take the form of domestic data localization laws. The Indian national security establishment, at least,
appears to be considering localization in the wake of Snowden’s revelations as an important policy
objective. Significantly, in February 2014 The Hindu published the contents of an internal memorandum of the
Indian National Security Council (NSC) proposing a policy that would require Indian data to be stored locally. 71
According to the memorandum, the policy would provide that “[a]ll email service providers may be mandated to host servers for their India
operations in India. 72 All
data generated from within India should be hosted in these India-based servers and
this would make them subject to Indian laws.”73 The NSC proposal would prohibit “as a general principle,
mirroring of data in these servers to main servers abroad.”74 Additionally, India’s National Security Advisor
has called on the Department of Telecom to mandate that all telecom and Internet companies route local
data through the National Internet Exchange of India (NIXI) to ensure that domestic Internet traffic remains within the country, and “to
limit the capacity of foreign elements to scrutinize intra-India traffic.”75
A push for Indian data localization jeopardizes U.S. business prospects
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.18-19)//GK
The formation of a government under the leadership of the Bharatiya Janata Party – which came to power in the
Indian national elections in May 2014 – is likely to give greater impetus to Indian localization efforts. During the campaign,
BJP leaders stated publicly that data localization may be a necessary means to force foreign (read: American)
Internet companies to comply with local law and to respect Indian cultural norms. India has become an important
outsourcing hub for U.S. multinational organizations. American firms have established extensive IT and back-office centers
in India’s growing technology capitals, such as Bangalore and Hyderabad. The total expulsion of American tech firms from the country seems
remote,78 but
any significant data localization legislation of the kind proposed by the NSC could impose a
substantial financial burden on American companies; perhaps more importantly, it could jeopardize the firms’
business prospects in a country in which reside hundreds of millions of potential customers.
Pakistan internal link
Snowden disclosures have undermined US-Pakistan relations
Young 14– President and General Counsel of Ronin Analytics, LLC. and former NSA senior leader (Mark,
“National Insecurity: The Impacts of Illegal Disclosures of Classified Information”, I/S: A Journal of Law
and Policy for the Information Society, 2014,
http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Young-Article.pdf)//DBI
The Snowden disclosures are undermining an already tense relationship between the U.S. and Pakistan.
The illegal disclosures will likely reduce intelligence sharing and military cooperation at time when
threats for both countries are still extremely grave. The disclosures have diminished U.S. national
security by damaging the diplomatic and intelligence relationship with a key ally in a region from
whence one of the greatest attacks against the U.S. originated.
The diplomatic and intelligence relationships established over the past sixty years have been critical to
the security of the United States. National security is proportionally linked to cooperation with other
nations. The quantity and quality of intelligence sharing with foreign intelligence services can reduce the
burden and expense on U.S intelligence agencies. Regardless of the veracity of the information illegally
disclosed by Snowden, the tensions it is causing within foreign relations must negatively impact the
intelligence sharing and cooperation. Less sharing and cooperation equals reduced national security for
the U.S.
Intelligence relationships with foreign security services support good partnerships between the U.S. and
the partner nation. These relationships provide access to areas the U.S. may not have direct admission.
Partners can offer intelligence agility with an ability to collect information that may take longer in the
U.S. They provide local insight to a particular target of areas with expertise not resident in the U.S.
intelligence community. And relationships with foreign intelligence services may provide cover for U.S.
interests by masking American action under their domestic security or military organizations.130 These
advantages have been placed at risk by the recent disclosures of potentially classified information.
Russia internal link
Russia already passed a data localization law
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Note: this law takes effect in September 2015
Quick Glance: Russia’s “Six-Month” Local Server Law
In April 2014, Russia’s State Duma approved a draft law49 that would require Internet companies such
as Google to locate servers handling Russian traffic inside the country and store user data locally for six
months after the data is created.50 The move came as Russian agencies had been pressuring foreign
Internet companies for data on Ukrainians who had been supporting the February overthrow of the
country’s Kremlin-backed president, Viktor Yanukovych, and following President Vladimir Putin’s
remarks that the Snowden disclosures had demonstrated that the Internet was a “CIA project.”51 How
the law will be enforced remains unclear, but as with other localization proposals the new law could
have the effect of forcing non-Russian firms and their services out of the country.
South Korea internal link
South Korea is considering data localization measures
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Quick Glance: South Korea’s Financial Services Requirement
The South Korean Financial Services Commission is considering regulations that would require insurers
and other financial institutions to maintain servers for housing company financial data in-country, and
would restrict transfers of such data outside of South Korea’s borders. The U.S.-Korea Free Trade
Agreement (KORUS FTA) states, “Parties shall endeavor to refrain from imposing or maintaining
unnecessary barriers to electronic information flows across borders,” and establishes principles for nondiscrimination for digital products. 37 However, this provision is a non-binding feature of the FTA, and
could 38 be revoked by the Korean Parliament. Revocation would create a daunting logistical
obligation for American financial firms and the companies those firms use to store their data.
AT: Data localization solves surveillance
Data localization increases the risk of surveillance
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
Fourth, far from making surveillance more difficult for a foreign government, localization requirements
might in fact make it easier. By compelling companies to use local services rather than global ones, there
is a greater likelihood of choosing companies with weak security measures. By [*717] their very nature,
the global services are subject to intense worldwide competition, while local services - protected by the
data localization requirements - might have less need to offer stronger security to attract customers,
and fewer resources to do so, than companies with a global scale. Weaker security makes such systems
easier targets for foreign surveillance. This is what we call the "Protected Local Provider" problem.
Fifth, data localization might actually facilitate foreign surveillance. Centralizing information about users
in a locality might actually ease the logistical burdens of foreign intelligence agencies, which can now
concentrate their surveillance of a particular nation's citizens more easily. We call this the "Jackpot"
problem.
Data localization worsens privacy intrusions
Hill 14 - technology and international affairs consultant, formerly worked in the Office of the
Cybersecurity Coordinator on the National Security Staff at the White House (Jonah, “The Growth of
Data Localization Post-Snowden: Analysis and Recommendations for U.S. Policymakers and Business
Leaders”, Conference on the Future of Cyber Governance, 5/1/14)//DBI
Advocates for data localization who understand this fact often point to jurisdictional differences
between nations as a reason to keep data local. Data stored in the U.S. is unsafe, they argue, because it
can be obtained by the NSA under legal coercion. Data localization (as a restriction on data storage
abroad), they insist, would negate this risk. While this may be true in certain respects, the argument
omits an important reality, namely that while locating data beyond the borders of the United States
might preclude the NSA or FBI from obtaining data via a subpoena or other formal legal mechanism,
moving data abroad could actually empower the NSA by lowering the legal threshold required to
obtain that same data by way direct intrusion into foreign data servers or data links. As was mentioned
briefly above, U.S. domestic law (as it is currently written and interpreted) puts fairly strict limits on the
collection of intelligence information on American soil. Data capture outside the U.S., by contrast, even
when that data is in the hands of American firms, is in large measure legally permissible when there is a
“national security interest,” a fairly broad criterion. Data localization (as a local data requirement) could
potentially give the NSA greater freedom to mine data, not less.104
Furthermore, while moving data into the servers outside the U.S. may prevent the U.S. government
from obtaining certain types of data via subpoena (ignoring the direct intrusion distinction for a
moment), data localization in that form would, at the same time, give domestic intelligence agencies of
the home country increased data collection powers over their citizens’ data. Given the fact that it is
those domestic agencies and their governments, and not the NSA and the United States, that can more
immediately impose and enforce coercive measures upon the citizens, those citizens need to ask
themselves, first, which presents the greater threat to their liberty generally, and to the security of
their personal information in particular? And, once recognizing that one’s own government may not be
trusted to abjure obtaining data of its citizens, is a domestic company possessing the data more or less
likely than a giant like Google to knuckle under to the demands of one’s own government? With respect
to most of the nations of the world, where there exist scant judicial independence and little
governmental transparency, the questions, I would argue, are answered in the asking.105
AT: Data localization helps law enforcement
Data localization doesn’t aid law enforcement
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
Equally important, it seems unlikely that data localization will prove an effective means to ensure that
data about their residents is available to law enforcement personnel when they want it. Moreover,
other alternatives are reasonably available to assist law enforcement access to data - alternatives that
are both less trade restrictive and more speech-friendly than data localization.
Data localization will not necessarily provide law enforcement better access to a criminal's data trail
because localization requirements are extremely hard to enforce. They might simply end up driving
potential wrongdoers abroad to less compliant and more secretive services. Indeed, the most lawabiding companies will follow costly data localization rules, while others will simply ignore them,
comforted by the knowledge that such laws are difficult to enforce. Any success with gaining
information from these companies will likely prove temporary, as, over time, potential scofflaws will
become aware of the monitoring and turn to services that intentionally skirt the law. The services
avoiding the law will likely be foreign ones, lacking any [*733] personnel or assets on the ground
against which to enforce any sanction. Thus, understood dynamically, the data localization requirement
will only hamper local and law-abiding enterprises, while driving some citizens abroad.
Law enforcement is, without doubt, a laudable goal, so long as the laws themselves do not violate
universal human rights. Many governments already have authority under their domestic laws to compel
a company operating in their jurisdictions to share data of their nationals held by that company abroad.
A recent study of ten countries concluded that the government already had the right to access data held
extraterritorially in the cloud in every jurisdiction examined. n268 Although the process varied, "every
single country ... vests authority in the government to require a Cloud service provider to disclose
customer data in certain situations, and in most instances this authority enables the government to
access data physically stored outside the country's borders." n269
Even if companies refuse to comply with such orders, or if the local subsidiary lacks the authority to
compel its foreign counterpart to share personal data, governments can resort to information-sharing
agreements. For example, the Convention on Cybercrime, which has been ratified by forty-four
countries including the United States, France, and Germany, n270 obliges Member States to adopt and
enforce laws against cybercrimes and to provide "mutual assistance" to each other in enforcing
cyberoffenses. n271 Many states have entered into specific Mutual Legal Assistance Treaties (MLATs)
with foreign nations. These treaties establish a process that protects the rights of [*734] individuals yet
gives governments access to data held in foreign jurisdictions. Currently, the United States has MLATs in
force with fifty-six countries. n272 The United States also entered into a Mutual Legal Assistance
Agreement (MLAA) with China and Taiwan. n273 All the countries discussed in the country studies
above, with the exception of Indonesia, Kazakhstan, and Vietnam, have MLAT arrangements in force
with the United States. Generally, MLATs "specify which types of requested assistance must be
provided, and which may be refused." n274 Requests for assistance may be refused typically when the
execution of such request would be prejudicial to the state's security or public interest; the request
relates to a political offense; there is an absence of reasonable grounds; the request does not conform
to the MLAT's provisions; or the request is incompatible with the requested state's law. n275 The
explanatory notes to the MLAT between the United States and the European Union observe that a
request for data shall only be denied on data protection grounds in "exceptional cases." n276 At the
same time, there are procedural requirements to help ensure that the information gathering is
supporting a proper governmental investigation. For example, Article 17 of the U.S.-Germany MLAT
provides that the government requesting assistance must do [*735] so in writing and must specify the
evidence or information sought, authorities involved, applicable criminal law provisions, etc. n277
An effective MLAT process gives governments the ability to gather information held on servers across
the world. The International Chamber of Commerce has recognized the crucial role of MLATs in
facilitating the lawful interception of cross-border data flow and stressed the need to focus on MLATs
instead of localization measures. n278 Similarly, the European Commission has recently stressed that
the rebuilding of trust in the U.S.-E.U. relationship must focus in part on a commitment to use legal
frameworks such as the MLATs. n279 Mutual cooperation arrangements are far more likely to prove
effective in the long run to support government information gathering efforts than efforts to confine
information within national borders.
AT: Alt causes
Significant FISA reform solves international perception of NSA and mitigates the
fear driven data localization agenda
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.30)//GK
The primary justification raised in favor of data localization policies is the need to protect citizens and
companies from government surveillance of the like orchestrated by the NSA. While the U.S.
government should not compromise what it perceives as essential national security objectives in the
face of threats to American businesses (especially in light of the hypocrisy involved in some of those
threats), it should nevertheless seriously address the concerns of the international community.
Specifically, the U.S. can start by adopting some of the important recommendations of the President
Review Group on Communications and Technologies, in particular, “Chapter IV: Reforming Foreign
Intelligence Surveillance Directed at Non-United States Person,” recommendations 12-15, focusing on
reforming section 702 of the Foreign Intelligence Surveillance Act, such as applying the 1974 Privacy Act
to non- U.S. persons. These are serious recommendations, and their implementation ought to go a long
way towards reducing (though surely not eliminating) international concerns over the surveillance
policies of the United States. Implementation will demonstrate a willingness on the part of the U.S.
government to respect global opinion and to impose limits on the reach of its intelligence agencies.
Technological leadership
Surveillance kills competitiveness
The perception of NSA overreaching wrecks global trust in the US tech sector –
that wrecks the US economy and competitiveness
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
“It is becoming clear that the post-9/11 surveillance apparatus may be at cross-purposes with our hightech economic growth,” declared Third Way’s Mieke Eoyang and Gabriel Horowitz in December 2013.
“The economic consequences [of the recent revelations] could be staggering.”25 A TIME magazine
headline projected that “NSA Spying Could Cost U.S. Tech Giants Billions,” predicting losses based on the
increased scrutiny that economic titans like Google, Microsoft, Facebook, and Yahoo have faced both at
home and abroad since last June.26 The NSA’s actions pose a serious threat to the current value and
future stability of the information technology industry, which has been a key driver of economic growth
and productivity in the United States in the past decade.27 In this section, we examine how emerging
evidence about the NSA’s extensive surveillance apparatus has already hurt and will likely continue to
hurt the American tech sector in a number of ways, from dwindling U.S. market share in industries like
cloud computing and webhosting to dropping tech sales overseas. The impact of individual users turning
away from American companies in favor of foreign alternatives is a concern. However, the major losses
will likely result from diminishing confidence in U.S. companies as trustworthy choices for foreign
government procurement of products and services and changing behavior in the business-to-business
market.
Costs to the U.S. Cloud Computing Industry and Related Business
Trust in American businesses has taken a significant hit since the initial reports on the PRISM program
suggested that the NSA was directly tapping into the servers of nine U.S. companies to obtain customer
data for national security investigations.28 The Washington Post’s original story on the program
provoked an uproar in the media and prompted the CEOs of several major companies to deny
knowledge of or participation in the program.29 The exact nature of the requests made through the
PRISM program was later clarified,30 but the public attention on the relationship between American
companies and the NSA still created a significant trust gap, especially in industries where users entrust
companies to store sensitive personal and commercial data. “Last year’s national security leaks have
also had a commercial and financial impact on American technology companies that have provided
these records,” noted Representative Bob Goodlatte, a prominent Republican leader and Chairman of
the House Judiciary Committee, in May 2014. “They have experienced backlash from both American and
foreign consumers and have had their competitive standing in the global marketplace damaged.”31
Given heightened concerns about the NSA’s ability to access data stored by U.S. companies, it is no
surprise that American companies offering cloud computing and webhosting services are among those
experiencing the most acute economic fallout from NSA surveillance. Within just a few weeks of the first
disclosures, reports began to emerge that American cloud computing companies like Dropbox and
Amazon Web Services were starting to lose business to overseas competitors.32 The CEO of Artmotion,
one of Switzerland’s largest offshore hosting providers, reported in July 2013 that his company had seen
a 45 percent jump in revenue since the first leaks,33 an early sign that the country’s perceived neutrality
and strong data and privacy protections34 could potentially be turned into a serious competitive
advantage.35 Foreign companies are clearly poised to benefit from growing fears about the security
ramifications of keeping data in the United States. In a survey of 300 British and Canadian businesses
released by PEER 1 in January 2014,36 25 percent of respondents indicated that they were moving data
outside of the U.S. as a result of the NSA revelations. An overwhelming number of the companies
surveyed indicated that security and data privacy were their top concerns, with 81 percent stating that
they “want to know exactly where their data is being hosted.” Seventy percent were even willing to
sacrifice performance in order to ensure that their data was protected.37
It appears that little consideration was given over the past decade to the potential economic
repercussions if the NSA’s secret programs were revealed.38 This failure was acutely demonstrated by
the Obama Administration’s initial focus on reassuring the public that its programs primarily affect nonAmericans, even though non-Americans are also heavy users of American companies’ products.
Facebook CEO Mark Zuckerberg put a fine point on the issue, saying that the government “blew it” in its
response to the scandal. He noted sarcastically: “The government response was, ‘Oh don’t worry, we’re
not spying on any Americans.’ Oh, wonderful: that’s really helpful to companies [like Facebook] trying to
serve people around the world, and that’s really going to inspire confidence in American internet
companies.”39 As Zuckerberg’s comments reflect, certain parts of the American technology industry are
particularly vulnerable to international backlash since growth is heavily dependent on foreign markets.
For example, the U.S. cloud computing industry has grown from an estimated $46 billion in 2008 to $150
billion in 2014, with nearly 50 percent of worldwide cloud-computing revenues coming from the U.S.40
R Street Institute’s January 2014 policy study concluded that in the next few years, new products and
services that rely on cloud computing will become increasingly pervasive. “Cloud computing is also the
root of development for the emerging generation of Web-based applications—home security,
outpatient care, mobile payment, distance learning, efficient energy use and driverless cars,” writes R
Street’s Steven Titch in the study. “And it is a research area where the United States is an undisputed
leader.”41 This trajectory may be dramatically altered, however, as a consequence of the NSA’s
surveillance programs.
Economic forecasts after the Snowden leaks have predicted significant, ongoing losses for the cloudcomputing industry in the next few years. An August 2013 study by the Information Technology and
Innovation Foundation (ITIF) estimated that revelations about the NSA’s PRISM program could cost the
American cloud computing industry $22 to $35 billion over the next three years.42 On the low end, the
ITIF projection suggests that U.S. cloud computing providers would lose 10 percent of the foreign
market share to European or Asian competitors, totaling in about $21.5 billion in losses; on the highend, the $35 billion figure represents about 20 percent of the companies’ foreign market share. Because
the cloud computing industry is undergoing rapid growth right now—a 2012 Gartner study predicted
global spending on cloud computing would increase by 100 percent from 2012 to 2016, compared to a 3
percent overall growth rate in the tech industry as a whole43—vendors in this sector are particularly
vulnerable to shifts in the market. Failing to recruit new customers or losing a competitive advantage
due to exploitation by rival companies in other countries can quickly lead to a dwindling market share.
The ITIF study further notes that “the percentage lost to foreign competitors could go higher if foreign
governments enact protectionist trade barriers that effectively cut out U.S. providers,” citing early calls
from German data protection authorities to suspend the U.S.-EU Safe Harbor program (which will be
discussed at length in the next section).44 As the R Street Policy Study highlights, “Ironically, the NSA
turned the competitive edge U.S. companies have in cloud computing into a liability, especially in
Europe.”45
In a follow up to the ITIF study, Forrester Research analyst James Staten argued that the think tank’s
estimates were low, suggesting that the actual figure could be as high as $180 billion over three years.46
Staten highlighted two additional impacts not considered in the ITIF study. The first is that U.S.
customers—not just foreign companies—would also avoid US cloud providers, especially for
international and overseas business. The ITIF study predicted that American companies would retain
their domestic market share, but Staten argued that the economic blowback from the revelations would
be felt at home, too. “You don’t have to be a French company, for example, to be worried about the US
government snooping in the data about your French clients,” he wrote.47 Moreover, the analysis
highlighted a second and “far more costly” impact: that foreign cloud providers, too, would lose as much
as 20 percent of overseas and domestic business because of similar spying programs conducted by other
governments. Indeed, the NSA disclosures “have prompted a fundamental re-examination of the role of
intelligence services in conducting coordinated cross-border surveillance,” according to a November
2013 report by Privacy International on the “Five Eyes” intelligence partnership between the United
States, the United Kingdom, Canada, Australia, and New Zealand.48 Staten predicts that as the
surveillance landscape around the world becomes more clear, it could have a serious negative impact on
all hosting and outsourcing services, resulting in a 25 percent decline in the overall IT services market, or
about $180 billion in losses.49
Recent reports suggest that things are, in fact, moving in the direction that analysts like Castro and
Staten suggested.50 A survey of 1,000 “[Information and Communications Technology (ICT)] decisionmakers” from France, Germany, Hong Kong, the UK, and the USA in February and March 2014 found
that the disclosures “have had a direct impact on how companies around the world think about ICT and
cloud computing in particular.”51 According to the data from NTT Communications, 88 percent of
decision-makers are changing their purchasing behavior when it comes to the cloud, with the vast
majority indicating that the location of the data is very important. The results do not bode well for
recruitment of new customers, either—62 percent of those currently not storing data in the cloud
indicated that the revelations have since prevented them from moving their ICT systems there. And
finally, 82 percent suggested that they agree with proposals made by German Chancellor Angela Merkel
in February 2014 to have separate data networks for Europe, which will be discussed in further detail in
Part III of this report. Providing direct evidence of this trend, Servint, a Virginia-based webhosting
company, reported in June 2014 that international clients have declined by as much as half, dropping
from approximately 60 percent of its business to 30 percent since the leaks began.52
With faith in U.S. companies on the decline, foreign companies are stepping in to take advantage of
shifting public perceptions. As Georg Mascolo and Ben Scott predicted in a joint paper published by the
Wilson Center and the New America Foundation in October 2013, “Major commercial actors on both
continents are preparing offensive and defensive strategies to battle in the market for a competitive
advantage drawn from Snowden’s revelations.”53 For example, Runbox, a small Norwegian company
that offers secure email service, reported a 34 percent jump in customers since June 2013.54 Runbox
markets itself as a safer email and webhosting provider for both individual and commercial customers,
promising that it “will never disclose any user data unauthorized, track your usage, or display any
advertisements.”55 Since the NSA revelations, the company has touted its privacy-centric design and
the fact that its servers are located in Norway as a competitive advantage. “Being firmly located in
Norway, the Runbox email service is governed by strict privacy regulations and is a safe alternative to
American email services as well as cloud-based services that move data across borders and
jurisdictions,” company representatives wrote on its blog in early 2014.56 F-Secure, a Finnish cloud
storage company, similarly emphasizes the fact that “its roots [are] in Finland, where privacy is a fiercely
guarded value.”57 Presenting products and services as ‘NSA-proof’ or ‘safer’ alternatives to Americanmade goods is an increasingly viable strategy for foreign companies hoping to chip away at U.S. tech
competiveness.58
U.S. surveillance programs are crushing U.S. tech industry competitiveness –
collapse the economy and inflames foreign protectionism – surveillance reforms
key to solve
Castro and McQuinn 15 – * Vice President of the Information Technology and Innovation Foundation
and Director of the Center for Data Innovation, B.S. in Foreign Service from Georgetown University and
an M.S. in Information Security Technology and Management from Carnegie Mellon University, AND **
Research Assistant with the Information Technology and Innovation Foundation, B.S. in Public Relations
and Political Communications from the University of Texas (Daniel and Alan, Beyond the USA Freedom
Act: How U.S. Surveillance Still Subverts U.S. Competitiveness, Information Technology and Innovation
Foundation, June 2015, http://www2.itif.org/2015-beyond-usa-freedomact.pdf?_ga=1.33178294.940386433.1435342104)//JJ
Almost two years ago, ITIF described how revelations about pervasive digital surveillance by the U.S.
intelligence community could severely harm the competitiveness of the United States if foreign
customers turned away from U.S. - made technology and services. 1 Since then, U.S. policymakers have
failed to take sufficient action to address these surveillance concerns ; in some cases, they have even
fanned the flames of discontent by championing weak information security practices . 2 In addition,
other countries have used anger over U .S. government surveillance as a cover for implementing a new
wave of protectionist policies specifically targeting information technology . The combined result is a
set of policies both at home and abroad that sacrifices robust competitiveness of the U.S. tech sector
for vague and unconvincing promises of improved national security.
The failure of U.S. policymakers to address surveillance concerns over the last few years has buoyed
foreign protectionism and hurt American businesses
ITIF estimated in 2013 that even a modest drop in the expected foreign market share for cloud
computing stemming from concerns about U.S. surveillance could cost the United States between $21.5
billion and $35 billion by 2016. 3 Since then , it has become clear that the U.S. tech industry as a whole,
not just the cloud computing sector , has under - performed as a result of t he Snowden revelations .
Therefore, the economic impact of U.S. surveillance practices will likely far exceed ITIF’s initial $35
billion estimate. This report catalogues a wide range of specific examples of the economic harm that has
been done to U.S. busin esses . In short, foreign customers are shunning U.S. companies . The policy
implication of this is clear: Now that Congress has reformed how the National Security Agency ( NSA )
collects bulk domestic phone records and allowed private firms — rather than the government — to
collect and store approved data, it is time to address other controversial digital surveillance activities by
the U.S. intelligence community.
The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the
competitiveness of the U.S. tech sector and cost it a portion of the global market share . 5 This includes
programs such as PRISM — the controversial program authorized by the FISA Amendments Act , which
allows for warrantless access to private - use r data on popular online services both in the United States
and abroad — and Bullrun — the NSA’s program to undermine encryption standards both at home and
abroad . Foreign companies have seized on these controversial policies to convince their customers that
keeping data at home is safer than sending it abroad, and foreign governments have pointed to U.S.
surveillance as justification for protectionist policies that require data to be kept within their national
borders . In the most extreme cases, such as in China, foreign governments are using fear of digital
surveillance to force companies to surrender valuable intellectual property, such as source code.
In the short term, U.S. companies lose out on contracts, and over the long term, other countries create
protectionist policies that lock U.S. businesses out of foreign markets . This not only hurt s U.S.
technology companies , but costs American jobs and weakens the U.S. trade balance. To reverse this
Increase transparency about U.S. surveillance activities
both at home and abroad
i
Complete trade agreements like the Trans Pacific Partnership that ban digital protectionism, and
pressure nations that seek to erect protectionist barriers to abandon those efforts .
The loss of trust locks IT companies out of foreign markets, wrecks
competitiveness
Eoyang, 13 - Director of the National Security Program (Mieke, “NSA Snooping's Negative Impact On
Business Would Have The Founding Fathers 'Aghast'” Forbes,
http://www.forbes.com/sites/realspin/2013/12/20/nsa-snoopings-negative-impact-on-business-wouldhave-the-founding-fathers-aghast/
The revelations about the scope and scale of NSA’s surveillance both at home and abroad have made
many uneasy about the security of their data. This loss of trust could have ongoing consequences for the
U.S. economy and for the future development of the Internet. Policymakers must understand these
implications as they make decisions on how to reform our surveillance efforts.
First, what will this mean for American competitiveness? For years, the Internet has been largely “Made
in America”, but the technical architecture and data transcend national borders. European, Chinese,
Russian, and other global competitors are vying for the billions of consumers who currently use U.S.
Internet services every day—from Google to Facebook to Ebay. One major competitive global advantage
for U.S. companies is that America’s openness and freedoms have brought an implied level of trust in
the security and privacy of the data flowing through their servers. But when the U.S. government asserts
that it can exploit electronic data abroad for intelligence purposes, it creates an international reaction
with profound economic consequences.
For example, Europe’s Commissioner for digital affairs, Neelie Kroes, predicts the fallout from
Snowden’s leaks will have “multi-billion Euro consequences” for US businesses. The EU Commission’s
Vice President, Viviane Reding, is pushing for Europe to adopt more expansive privacy laws that will help
build market share for regional companies—thereby shutting American companies out.
The economic consequences could be staggering . Studies by leading Internet researchers at ITIF,
Gartner, and Forrester examining the NSA surveillance revelations’ impact project potential lost revenue
for U.S. cloud computing companies ranging from $35 billion to $180 billion over the next three years.
More than half of the overseas members of a cloud industry group, the Cloud Security Alliance, said they
were less likely to use U.S. cloud providers in the future. Ten percent of such members said they had
cancelled a U.S. cloud services project as a result of the “Snowden Incident”. While the true costs of the
loss of trust are hard to quantify, and will be reported in future quarters, the potential losses are
enormous.
U.S. surveillance is decimating the entire tech industry
Targeted News Service 6/9/15 – Washington editorial news service, citing VP of ITIF, Daniel Castro
(Tarnished by Association with Ongoing U.S. Surveillance Policies, Tech Sector Likely to Lose More Than
$35 Billion in Sales, Proquest)//JJ
Information Technology and Innovation Foundation issued the following news release:
Shortly after Edward Snowden revealed extensive U.S. government surveillance, the Information
Technology and Innovation Foundation (ITIF) estimated that the U.S. tech sector could lose between
$21.5 billion and $35 billion over three years if U.S. cloud computing providers saw even a modest drop
in their foreign market share due to concerns about electronic surveillance. Since then, it has become
clear that the U.S. tech industry as a whole , not just the cloud computing sector, has under-performed
as a result of these spying concerns . Therefore, the total economic impact of U.S. surveillance practices
will likely far exceed ITIF's initial $35 billion estimate .
ITIF is releasing a new report today, Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts
U.S. Competitiveness, (http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-ussurveillance-still-subverts-us-competitiveness) which catalogues a wide range of specific examples of the
economic harm that has been done to U.S. businesses as result of unreformed government surveillance
practices, and it proposes a series of reforms designed to improve security, protect transparency, and
increase cooperation and accountability in the global technology ecosystem.
"Foreign customers are increasingly shunning U.S. companies , and governments around the world are
using U.S. surveillance as an excuse to enact a new wave of protectionist policies . This is bad for U.S.
companies, U.S. workers, and the U.S. economy as a whole ," notes Daniel Castro, Vice President of ITIF
and co-author of the report. "Now that Congress has passed the USA Freedom Act, it is imperative that
it turn its attention to reforming the digital surveillance activities that continue to impact our nation's
competitiveness ."
The report recommends policymakers level the playing field for the U.S. tech sector by implementing a
series of reforms such as increasing the transparency of its surveillance practices, opposing government
efforts to weaken encryption or introduce backdoors in software, and strengthening its mutual legal
assistance treaties with other nations. In addition, it should combat anti-competitive practices by other
nations through the establishment of international legal standards for government access to data and
pushing for trade agreements to include bans on digital protectionism.
"Over the last few years, the U.S. government's failure to meaningfully reform its surveillance practices
has taken a serious economic toll on the U.S. tech sector and the total cost continues to grow each
day," adds Castro. " Other countries are scrambling to take advantage of this opportunity, and if
policymakers fail to address this issue head on, these losses will be locked in permanently . Ultimately,
Congress must decide how many American jobs it is willing to sacrifice in pursuit of intelligence
gathering and find a better balance between economic interests and national security interests."
NSA overreach is wrecking tech industry competitiveness
Rubinstein and Hoboken 14 – *Senior Fellow at the Information Law Institute (ILI) and NYU School of
Law, AND **Microsoft Research Fellow in the Information Law Institute at New York University, PhD
from the University of Amsterdam (Ira and Joris Van, PRIVACY AND SECURITY IN THE CLOUD: SOME
REALISM ABOUT TECHNICAL SOLUTIONS TO TRANSNATIONAL SURVEILLANCE IN THE POST- SNOWDEN
ERA, 66 Maine L. Rev. 488, September 2014, http://ssrn.com/abstract=2443604)//JJ
On June 5, 2013, the British newspaper The Guardian broke the first of many stories involving the
“Snowden revelations.”104 The leaks revealed—and continue to reveal—that multiple U.S. government
collection and surveillance programs are seemingly beyond the scope of Sections 215 of the USA
PATRIOT Act and 702 of the FAA. The first article described an NSA program to collect millions of calling
records of U.S. customers of Verizon, regardless of whether they are suspected of any wrongdoing. This
program involved the government collection of “telephony metadata” (but not the content of phone
calls) on an ongoing basis, subject to the terms of a court order pursuant to Section 215.105 The next
day, The Guardian reported on another NSA program referred to in the leaked documents as “PRISM,”
under which the government collects the content of electronic communications, including “search
history, the content of emails, file transfers and live chats.”106 One of the leaked documents suggested
that the government was collecting this data directly from the servers of leading U.S. companies
including Google, Facebook, and Apple, although the government and the companies involved have all
denied such claims.107
These and other Snowden revelations ignited a firestorm of criticism. The leaks sparked what many
consider a long overdue debate on the nature and extent of the NSA’s surveillance programs and their
impact on civil liberties, both in the U.S. and abroad.108 In the view of many, the revelations also caused
immediate damage to U.S. foreign relations109 and national security.110 Additionally, the U.S. tech
industry—and especially companies in the cloud computing industry—worried about potential spillover
damage based on foreign businesses and governments threatening not to use their services because of
concerns over NSA spying .111 And they had good reason for these concerns. Over the course of the
next several months, there were at least three additional press reports that undermined U.S. cloud
services in the eyes of foreign customers. First, in August 2013, The New York Times described another
program conducted under Section 702 in which the NSA acquires communications by “systematically
searching—without warrants— through the contents of Americans’ communications that cross the
border . . . temporarily copying and then sifting through the contents of what is apparently most
[international] e-mails and other text-based communications.”112 This is sometimes referred to as
upstream collection, because it apparently involves real- time interception of communications as they
pass through fiber cables or other major data pipelines.113
A month later, The New York Times reported that the NSA has been engaged in and winning a “secret
war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes
persuasion to undermine the major tools protecting the privacy of everyday communications in the
Internet age.”114 This program, which the leaked documents refer to as BULLRUN,115 is especially
significant for present purposes because it reveals how NSA overcame its defeat in the key escrow and
export control debates by finding new ways to exploit vast amounts of encrypted online data. BULLRUN
relied on a number of stealthy methods ranging from the use of superfast computes to break codes, to
allegedly pressuring companies into handing over their master encryption keys or building in backdoors,
to introducing technical weaknesses covertly into commercial encryption standards.116
Finally, in October, the Washington Post reported that the NSA “has secretly broken into the main
communications links that connect Yahoo and Google data centers around the world.”117 Whereas
PRISM apparently provided front-door access to Yahoo and Google accounts through a court-approved
process under Section 702 of the FAA, this alternative program, called MUSCULAR, intercepted Yahoo
and Google data flows through the backdoor as they transited the companies’ private fiber-optic
networks.118 In public statements, the companies expressed their “outrage”119 and, in the wake of
these revelations, analysts predicted that U.S. tech companies may lose as much as $180 billion by
2016 due to international concerns about NSA’s spying .120
NSA surveillance is wrecking the perception of US companies both domestically
and internationally- creating foreign cloud competition
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 9)//AK
Those of us who fought the crypto wars, as we call them, thought we had won them in the 1990s. What
the Snowden documents have shown us is that instead of dropping the notion of getting backdoor
government access, the NSA and FBI just kept doing it in secret. Now that this has become public, US
companies are losing business overseas because their non-US customers don’t want their data collected
by the US government. NSA surveillance is costing US companies business in three different ways:
people fleeing US cloud providers, people not buying US computer and networking equipment, and
people not trusting US companies.
When the story about the NSA’s getting user data directly from US cloud providers— the PRISM
program—broke in 2013, businesses involved faced a severe public relations backlash. Almost
immediately, articles appeared noting that US cloud companies were losing business and their
counterparts in countries perceived as neutral, such as Switzerland, were gaining. One survey of British
and Canadian companies from 2014 found that 25% of them were moving their data outside the US,
even if it meant decreased performance. Another survey of companies found that NSA revelations made
executives much more concerned about where their data was being stored.
Estimates of how much business will be lost by US cloud providers vary. One 2013 study by the
Information Technology and Innovation Foundation foresees the loss of revenue at $22 to $35 billion
over three years; that’s 10% to 20% of US cloud providers’ foreign market share. The Internet analysis
firm Forrester Research believes that’s low; it estimates three-year losses at $180 billion because some
US companies will also move to foreign cloud providers.
US computer and networking companies are also taking severe hits. Cisco reported 2013 fourth quarter
revenue declines of 8% to 10%. AT&T also reported earnings losses, and had problems with its European
expansion plans. IBM lost sales in China. So did Qualcomm. Verizon lost a large German government
contract. There’s more. I have attended private meetings where large US software companies
complained about significant loss of foreign sales. Cisco’s CEO John Chambers wrote to the Obama
administration, saying that NSA’s hacking of US equipment “will undermine confidence in our industry
and in the ability of technology companies to deliver products globally.” Chambers’s comments echo the
third aspect of the competitiveness problem facing US companies in the wake of Snowden: they’re no
longer trusted. The world now knows that US telcos give the NSA access to the Internet backbone and
that US cloud providers give it access to user accounts. The world now knows that the NSA intercepts
US-sold computer equipment in transit and surreptitiously installs monitoring hardware. The world
knows that a secret court compels US companies to make themselves available for NSA eavesdropping,
and then orders them to lie about it in public. Remember the Lavabit story from Chapter 5?
All of this mistrust was exacerbated by the Obama administration’s repeated reassurances that only
non-Americans were the focus of most of the NSA’s efforts. More than half of the revenue of many
cloud companies comes from outside the US. Facebook’s Mark Zuckerberg said it best in a 2013
interview: “The government response was, ‘Oh don’t worry, we’re not spying on any Americans.’ Oh,
wonderful: that’s really helpful to companies trying to serve people around the world, and that’s really
going to inspire confidence in American internet companies.”
To be fair, we don’t know how much of this backlash is a temporary blip because NSA surveillance was in
the news, and how much of it will be permanent. We know that several countries—Germany is the big
one—are trying to build a domestic cloud infrastructure to keep their national data out of the NSA’s
hands. German courts have recently ruled against data collection practices by Google, Facebook, and
Apple, and the German government is considering banning all US companies that cooperate with the
NSA. Data privacy is shaping up to be the new public safety requirement for international commerce. It’s
also a new contractual requirement. Increasingly, large US companies are requiring their IT vendors to
sign contracts warranting that there are no backdoors in their IT systems. More specifically, the
contractual language requires the vendors to warrant that there is nothing that would allow a third
party to access their corporate data. This makes it harder for IT companies to cooperate with the NSA or
with any other government agency, because it exposes them to direct contractual liability to their
biggest and most sophisticated customers. And to the extent they cannot sign such a guarantee, they’re
going to lose business to companies who can.
We also don’t know what sort of increase to expect in competitive products and services from other
countries around the world. Many firms in Europe, Asia, and South America are stepping in to take
advantage of this new wariness. If the 1990s crypto wars are any guide, hundreds of non-US companies
are going to provide IT products that are beyond the reach of US law: software products, cloud services,
social networking sites, networking equipment, everything. Regardless of whether these new products
are actually more secure—other countries are probably building backdoors in the products they can
control—or even beyond the reach of the NSA, the cost of NSA surveillance to American business will be
huge.
Foreign fear of NSA backdoors devastate US tech firm competitiveness
Hill 14* Technology policy consultant at Monitor 360, fellow of the Global Governance Futures 2025
program at the Brookings Institution (Jonah, “THE GROWTH OF DATA LOCALIZATION POST-SNOWDEN:
ANALYSIS AND RECOMMENDATIONS FOR U.S. POLICYMAKERS AND BUSINESS LEADERS” p.)//GK
For a great many around the globe, the Snowden disclosures revealed a disturbing relationship between the major
U.S. technology firms and the American national security establishment. Specifically, the disclosures showed that
Yahoo, Google, and other large American tech companies had provided the NSA with access to the data of the
users of their services. Although there were many programs that tied the major American firms to the NSA, three in particular drew
special ire: the much-discussed PRISM7 program, a collaborative effort between the NSA and the FBI which compelled
Internet companies to hand over data held within servers located on U.S. soil in response a subpoena
issued by a special intelligence court, and two programs known as MUSCULAR and TEMPORA,89 both of which allowed the NSA
(in partnership with Britain’s signals intelligence agency, the GCHQ) to access information transmitted through the data communication links of
American-owned firms located outside the U.S., where statutory limitations on data collection are far less stringent.10 The
fact that
American companies provided the U.S. government with information and access to data (knowingly in some cases,
apparently unwittingly in others) has led many foreign leaders to conclude that only domestic firms – or at least nonAmerican firms – operating exclusively within local jurisdictions, can be trusted to host the data of their citizens.
Prominent political voices around the globe have been anything but subtle in their articulation of this
assessment. Following the publication of the PRISM program in the Guardian newspaper, German Interior Minister HansPeter Friedrich declared that, “whoever fears their communication is being intercepted in any way should use
services that don't go through American servers.”11 France’s Minister for the Digital Economy similarly insisted that it was
now necessary to “locate datacenters and servers in [French] national territory in order to better ensure data security.”12 Brazilian President
Dilma Rousseff agreed, insisting that, "there is a serious problem of storage databases abroad. That certain situation we will no longer
accept."13 Unsurprisingly, these declarations from government officials at the ministerial level and higher, and the policy
responses
profoundly troubling to American technology companies. U.S. firms have issued dire
warnings in response,14 predicting that they could lose tens of billions of dollars in revenue abroad as distrustful
foreign governments and customers move – either by choice or by legal mandate – to non-U.S. alternatives. Firms fear
that the anti-American backlash and potentially resulting data localization laws (depending on the specifics of the rules
enacted) will mean that they will be forced out of certain markets, or forced to build expensive – and
oftentimes unnecessarily redundant – data centers abroad. Analysts are suggesting the fallout could mirror what happened to Huawei
those declarations suggest, are
and ZTE, the Chinese technology and telecommunications firms that were forced to abandon some U.S. contracts when American lawmakers
accused the companies of planting in their products coding “backdoors” for the Chinese People’s Liberation Army and intelligence 15 A muchcited estimate16 by the Information Technology and services. Innovation Foundation, an independent think-tank, confirmed American tech
firms’ worst fears when it opined that the
U.S. cloud computing industry alone could lose between $21.5 billion
and $35 billion over the next three years as a result of the NSA backlash.17
Loss of overseas markets wrecks tech competitiveness
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
The economic impact of NSA spying does not end with the American cloud computing industry.
According to The New York Times, “Even as Washington grapples with the diplomatic and political
fallout of Mr. Snowden’s leaks, the more urgent issue, companies and analysts say, is economic.”59 In
the past year, a number of American companies have reported declining sales in overseas markets like
China (where, it must be noted, suspicion of the American government was already high before the NSA
disclosures), loss of customers including foreign governments, and increased competition from non-U.S.
services marketing themselves as ‘secure’ alternatives to popular American products.
There is already significant evidence linking NSA surveillance to direct harm to U.S. economic interests.
In November 2013, Cisco became one of the first companies to publicly discuss the impact of the NSA on
its business, reporting that orders from China fell 18 percent and that its worldwide revenue would
decline 8 to 10 percent in the fourth quarter, in part because of continued sales weakness in China.60
New orders in the developing world fell 12 percent in the third quarter, with the Brazilian market
dropping roughly 25 percent of its Cisco sales.61 Although John Chambers, Cisco’s CEO, was hesitant to
blame all losses on the NSA, he acknowledged that it was likely a factor in declining Chinese sales62 and
later admitted that he had never seen as fast a decline in an emerging market as the drop in China in
late 2013.63 These numbers were also released before documents in May 2014 revealed that the NSA’s
Tailored Access Operations unit had intercepted network gear—including Cisco routers—being shipped
to target organizations in order to covertly install implant firmware on them before they were
delivered.64 In response, Chambers wrote in a letter to the Obama Administration that “if these
allegations are true, these actions will undermine confidence in our industry and in the ability of
technology companies to deliver products globally.”65
Much like Cisco, Qualcomm, IBM, Microsoft, and Hewlett-Packard all reported in late 2013 that sales
were down in China as a result of the NSA revelations.66 Sanford C. Bernstein analyst Toni Sacconaghi
has predicted that after the NSA revelations, “US technology companies face the most revenue risk in
China by a wide margin, followed by Brazil and other emerging markets.”67 Industry observers have also
questioned whether companies like Apple—which hopes to bring in significant revenue from iPhone
sales in China—will feel the impact overseas.68 Even AT&T reportedly faced intense scrutiny regarding
its proposed acquisition of Vodafone, a European wireless carrier, after journalists revealed the extent
of AT&T’s collaboration with the NSA.69
American companies are also losing out on business opportunities and contracts with large companies
and foreign governments as a result of NSA spying. According to an article in The New York Times,
“American businesses are being left off some requests for proposals from foreign customers that
previously would have included them.”70 This refers to German companies, for example, that are
increasingly uncomfortable giving their business to American firms. Meanwhile, the German
government plans to change its procurement rules to prevent American companies that cooperate with
the NSA or other intelligence organizations from being awarded federal IT contracts.71 The government
has already announced it intends to end its contract with Verizon, which provides Internet service to a
number of government departments.72 “There are indications that Verizon is legally required to provide
certain things to the NSA, and that’s one of the reasons the cooperation with Verizon won’t continue,” a
spokesman for the German Interior Ministry told the Associated Press in June.73
The NSA disclosures have similarly been blamed for Brazil’s December 2013 decision to award a $4.5
billion contract to Saab over Boeing, an American company that had previously been the frontrunner in
a deal to replace Brazil’s fleet of fighter jets.74 Welber Barral, a former Brazilian trade secretary,
suggested to Bloomberg News that Boeing would have won the contract a year earlier,75 while a source
in the Brazilian government told Reuters that “the NSA problem ruined it for the Americans.”76 As we
will discuss in greater depth in the next section, Germany and Brazil are also considering data
localization proposals that could harm U.S. business interests and prevent American companies from
entering into new markets because of high compliance costs.
Perception key
The widespread perception that the NSA is acting beyond the established
legislative framework is destroying the reputation of U.S. tech companies
Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a
center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy,
and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as
as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring
Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19,
http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues
Allegations of intrusive U.S. government electronic surveillance activities have raised international
outcry and created antagonism between U.S. technology companies and the government. Without a
bold and enduring reform, American companies will continue to suffer a competitive disadvantage from
perceptions of U.S. government intrusion into their data. We propose bringing electronic surveillance
collection from U.S. companies into an existing statutory framework in order to reassure international
customers and to respect the rights of U.S. companies operating abroad.
The Problem
In the wake of the Snowden revelations, people around the world have become uneasy about the
security of their communications that flow through the servers of American companies.1 They now
fear—not without reason—that the NSA has broad access to a wide range of their data that may not
have any direct relevance to the core foreign policy or security concerns of the United States.2
Snowden has also alleged that the NSA accessed American companies’ data without their knowledge.3
American technology companies reacted with outrage to media reports that, unbeknownst to them, the
U.S. government had intruded onto their networks overseas and spoofed their web pages or products.4
These stories suggested that the government created and snuck through back doors to take the data
rather than come through well-established front doors.5
Beyond the broad implications for civil liberties and diplomacy, these fears led to two immediate
consequences for the industry: First, many U.S. companies shifted to an adversarial relationship with
their own government. They moved to secure and encrypt their data to protect the privacy rights of
their customers.6 They are pushing for reform.7 They are building state-of-the-art data centers in
Europe and staffing their high-paying jobs with Europeans, not Americans.8 They are challenging the
government in court.9
Second, international customers of U.S. technology and communications companies began taking their
business elsewhere. Brazil decided against a $4.5 billion Boeing deal and cancelled Microsoft
contracts.10 Germany dropped Verizon in favor of Deutsche Telekom.11 Both of these examples suggest
that if even friendly governments can go to the expense and trouble of dropping American companies,
foreign individual and corporate customers could certainly decide to switch their data providers for
greater privacy protection. Simply put, the reputational harm had a direct impact on American
companies’ competitiveness—some estimate that it has cost U.S. tech firms $180 billion thus far.12
Defenders of the programs may argue that the Snowden allegations are overblown or that foreign
companies are just using the revelations for their own protectionist purposes. But it doesn’t matter if
the allegations are actually true because the global public believes them to be true , and they are
therefore real in their consequences.
In many ways, the Snowden revelations have created a sense of betrayal among American companies.
Some had been providing information to the NSA through existing legislative means – either under
Section 215 of the USA Patriot Act,13 or under Section 702 of the FISA Amendments Act (FAA).14 It was
unsettling to read stories that, outside of this statutorily compelled cooperation, the government had
been getting access to huge amounts of their data in other unauthorized ways. As one tech employee
said, “the back door makes a mockery of the front door.”
Tech leadership key to hegemony
*Tech leadership underpins hegemony
Weiss 14 – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government
and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus
University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell
University Press, 4/1/14, p. 1-3)//JJ
Bill Gates's "state-less" depiction of America's high-tech economy perfectly captures the prevailing
understanding of U.S. techno-industrial preeminence. Both at home and abroad, the United States is
widely portrayed as the quintessential free-market economy. In this reputedly freewheeling
entrepreneurial setting, robust antistatism combines with weak State capacity to ensure that the U.S.
government contributes little more to America's global technology leadership than a business-friendly
environment. This book tells a different story, one that links high technology with national security and
(antistatist) political norms. 1 It proposes that there is more to American capitalism and the American
state than meets the free-market eye. In getting to this "something more," we start from the
substantive observation that the U S. has an unmatched capacity for transformative innovation. For half
a century and more, the United States has been the uncontested high-technology hegemon, leading the
world in virtually all the major technologies that drive the modern economy and underpin its prosperity.
Think of innovations such as communications satellites, micro- electronics, computers, software,
biotechnology, the internet—the list goes on. More striking still is that every one of these breakthrough
innovations emanated from the United States precisely in the period since World War Il, giving rise to
entirely new industries. My main argument focuses on the role of what I call the national security state
or NSS (though I use the term in an unusual sense; more on this shortly). Since World War Il, the NSS has
dominated in high-risk, break- through technologies and emerging industries; this pursuit has
established, and continues to secure, the foundations for a high-technology commercial sector.
Nevertheless, the NSS pursues technology leadership in order to sustain U.S. military-political
primacy , not to achieve commercial advantage. To do so it has to rely on the private sector to advance
its technology goals. After all, the days when the military could source all it needed from its arsenals are
long gone. But as leading-edge capabilities came to reside less and less within the pool of large defense
contractors (core of what is traditionally described as the military-industrial complex), and more and
more within high-tech firms reluctant to work on security related projects, the NSS was compelled to
retool its incentive system. As I explain in more detail below, increasingly since the 1980s the NSS has
had to reach outside the traditional pool of large Contractors to attract the most innovative companies,
by building commercial goals into its programs. By placing greater emphasis on commercializalion
opportunities, some of these incentives seek to sweeten collaboration with the Department of Defense
(DoD) and other security-related agencies, and thus to increase NSS influence over the direction of
technology. In this manner, commercialization becomes the sine qua non of technological- cum-military
primacy. Far from being mutually exclusive, security and com- merce have become closely entwined in
NSS policy and practice. At one level then, this is a story about how the geopolitics of threat perception
has generated a vast state machinery geared to perpetual innovation in the quest for technological
superiority . At another level, it is a story about the domestic challenges and political obstacles that
have reshaped the NSS and its relationship with the private sector, not only by integrating the goals of
security with those of commerce but also by merging public and private resources in distinctive ways.
It’s a bigger internal link than econ
Weiss 14 – Fellow of the Academy of the Social Sciences in Australia, Professor Emeritus in Government
and International Relations at the University of Sydney, Honorary Professor of Political Science at Aarhus
University. (Linda, America Inc.?: Innovation and Enterprise in the National Security State, Cornell
University Press, 4/1/14, p. 1-3)//JJ
Pursuit of defense preparedness, driven by Cold War exigencies and threat perceptions, produced a
national security State much broader and more encompassing than the "defense sector," responsible for
mobilizing the nation's science and technology resources. The technology activism of the national
security state—though of inestimable benefit to the nation's industry and innovation— was not
motivated by economic ambition (industry policy) but by the pressure to sustain American primacy
through technological dominance.
Tech leadership key to economic leadership
Technological innovation and leadership are key to economic leadership
Gallagher 12, Under Secretary of Commerce for Standards and Technology and NIST Director, (Patrick,
Innovation as a Key Driver of Economic Growth & Competitiveness, Remarks at FedScoop's U.S.
Innovation Summit, http://www.nist.gov/director/speeches/innovation-summit.cfm)//AK
I'm going to just give you some final parting thoughts on why we're here, why we're talking about
innovation.
One observation I'll make: there was a Wall Street Journal article that was put out last month that talked
about innovation, and it made a couple of interesting comments. It said if you look at the Securities and
Exchange Commission collection of annual and quarterly reports that are filed with that agency, just last
year, the word "innovation" was mentioned 33,000 times. Now, that's a 64 percent increase over just
five years ago.
If you ask executives whether they have a chief innovation officer, about four in 10 will now say they do.
But what's really interesting is if you talk to them about why do you use the term, a common answer is
"well everybody else does it."
I think one of the reasons that we're talking about innovation is that it is now sexy. This is something
that everyone is excited about.
But I want to back up a little bit and from a very government-centric viewpoint, talk about why we're
talking about innovation. And I'm going to be more specific—we're talking about technological
innovation.
The reason we're focused on it, the reason the President, for me, did this rather startling thing of putting
it at the centerpiece of our economic agenda, is because the truth of the matter is it has been the key
driver to our economy.
Well over half of the economic growth in this country since the end of World War II has been directly
attributable to technological innovation. It accounts for most of the positive difference in per capita
income. It drives almost all of the growth in economic output and productivity. And it's really the key to
competitiveness for almost every company that's there. If you look at how innovative companies are,
you can directly correlate that with how competitive and successful they are.
So in the midst of one of the deepest recessions this country has had since the Great Depression, the
reason we're talking about innovation is because it matters. It drives our economy.
The other problems, or a thought about innovation, is that we tend to talk about innovation in the
context of its moving parts. We talk about research and development, the generation of new ideas,
science, obviously a critical part. We talk about the role of the creative engines of innovation, the
entrepreneurial community, the risk takers, the ones who have that vision and took a chance to make it
happen.
Increasingly, we're talking about manufacturing, the producers, the ones who take those ideas to scale
and generate the products and services in our economy.
It's actually an interesting development, as an aside, that the focus on manufacturing, from my
perspective, was an inevitable consequence —I didn't foresee it coming—but it was an inevitable
consequence of raising innovation as a centerpiece. And one of the reasons for that is that's where a lot
of the innovation takes place.
You cannot escape the fact that the process of developing new technologies and new ideas is deeply
entwined with the struggles of making it. And if you look at where scientists and engineers work in the
private sector, they are mostly embedded in our manufacturing-based industries.
If you look at where patents come from, they're almost all from manufacturing-based industries. If you
look at our balance of trade, a lot of it is being driven by manufacturing. So a lot of the action, where the
participation by the broader public in an innovation economy takes place, is really in the production
side.
And so it is evitable that we were going to be talking about it. It's refreshing. When I first came to
Washington and started my career at NIST 19 years ago, we were not openly talking about
manufacturing. It was not sexy. And so that's a refreshing change that we're talking about.
By the way, manufacturing has changed radically—something that we all have a job to talk about. There
was a report the Commerce Department put out about a week and half ago talking about jobs in the
manufacturing sector. Very interesting.
So there is a salary gap. The manufacturing sector on average earns about 8 percent more in salaries and
wages over service-based industries. What's really interesting if you look at benefits, there's a 59
percent advantage in terms of health care benefits and retirement benefits for those who work in
manufacturing-based companies over services—an enormous difference.
The other interesting thing is manufacturing jobs are becoming high-skill jobs. A couple of years ago, the
fraction of the manufacturing workforce that had a college education or more exceeded those without
for the first time in that sector. And it's grown 43 percent, the fraction of manufacturing workers with
college degrees, 43 percent in the last decade alone. One in three of those jobs— those jobs requiring a
college degree—require STEM education: science, technology, engineering, and math. I think that is
something we need to help explain to the public, because I don't think that transformation that is
happening in this country is well understood.
So we talk about innovation from the moving parts. We talk about talent, R&D capacity, translation,
commercialization, entrepreneurship.
The government role in innovation is largely defined by traditional government roles. It's not that there
is anything new to this. The government has always played a role in a lot of these moving parts. It plays
a clear and obvious role in driving research and development, transformative changes in technology that
are essential to our national security and other critical national needs. Its role in promoting effective
infrastructure, whether that's physical infrastructure or transportation infrastructure, cyber
infrastructure, energy infrastructure. Promoting trade. Nurturing the tax and business environment
that's conducive to the risk taking, the entrepreneurial risk and growth that we want to see happening.
And supporting small businesses. These are all traditional roles, long-term roles.
Tech leadership is key to economic leadership- new tech now key
Ashton 6/29, British technology pioneer who cofounded the Auto-ID Center at the Massachusetts
Institute of Technology (MIT), which created a global standard system for RFID and other sensors. He is
known for inventing the term "the Internet of Things" to describe a system where the Internet is
connected to the physical world via ubiquitous sensors, (Kevin, America last? The man who coined
‘Internet of Things’ says this is the first tech race America might lose.,
http://www.politico.com/agenda/story/2015/06/kevin-ashton-internet-of-things-in-the-us-000102)//AK
Almost all transformative new technologies of the past few decades — nuclear energy, advanced jet
aircraft, integrated circuits, computer networks — rose the same way. They were developed in the
United States and seeded by the federal government, typically through defense spending.
This “weaponize to monetize” model served the U.S. well. In addition to enabling the world’s most
powerful, technologically advanced military, it funded basic research in universities and applied research
in corporations, making technology a substantial component of America’s exports. In 1989, the first year
for which there are data, high tech — meaning products that require intense research and development
— made up a third of U.S. exports, worth $77 billion. The U.S. was the global leader, and it retained its
lead through the boom, bust and boom-again years of the Internet.
Then something changed.
The next major technology revolution after the Internet itself has been the “Internet of Things,” a
ubiquitous ad hoc open network of sensors for information systems, which I helped to conceptualize
and develop (and name) in the late 1990s. Like the Internet or the integrated circuit, the Internet of
Things is really a fundamental infrastructure that enables new technologies and applications, and, like
them, it will transform every part of the global economy.
Early Internet of Things development more or less followed the standard U.S. model. My colleagues and
I, for example, did most of our work at the Massachusetts Institute of Technology with funding from the
Department of Defense, as well as forward-thinking U.S. corporations like Wal-Mart, Procter & Gamble
and Coca-Cola.
But as other governments began competing aggressively in the Internet of Things economy, America
loosened its grip. This was partly because of two wars, which focused the Pentagon on immediate
combat needs, and a recession, which reduced government spending. But there was a bigger problem
lurking behind those emergencies — one that remains today, long after the wars and recession have
ended: The U.S. government doesn’t invest in basic science and visionary technology anymore. Or, to be
more precise, it does not invest like it used to.
Last year, federal investment in research and development sank to 0.69 percent of GDP — a level not
seen since 1958. That year, not coincidentally, was the year President Dwight Eisenhower authorized the
creation of the Advanced Research Projects Agency to, as The New York Times described it at the time,
“explore and develop any novel idea, regardless of whether it seems practical at the beginning.” (It’s
now called DARPA, for Defense Advanced Research Projects Agency.) In 1959, because of ARPA and
similar initiatives, the U.S. government’s R&D spending doubled to more than 1 percent of GDP. In 1962,
the Apollo space program followed. At Apollo’s peak, the U.S. government was investing more than 2
percent of GDP on R&D — over three times today’s amount.
ARPA and Apollo were visionary government programs. There are visionary government programs for
the Internet of Things, too, but they are almost everywhere but the United States — in China, the
European Union, Korea, India and Singapore, for example. Over the past 10 years, heads of government
from all over the world have shared their visions for the Internet of Things. China’s sixth premier, Wen
Jiabao, called it the “Wisdom of the Earth”; India’s Narendra Modi declared it the path to “zero defect,
zero effect” manufacturing; and Britain’s David Cameron described it as “a huge transformative
development … the brink of a new industrial revolution.” As far as I know, neither George W. Bush nor
Barack Obama, the U.S. presidents in power during this period, have ever mentioned it.
And, while they were not mentioning it, some key indicators began swinging away from the U.S. In 2005,
China’s high-tech exports exceeded America’s for the first time. In 2009, just after Wen Jiabao spoke
about the Internet of Things, Germany’s high-tech exports exceeded America’s as well. Today, Germany
produces five times more high tech per capita than the United States. Singapore and Korea’s high-tech
exporters are also far more productive than America’s and, according to the most recent data, are close
to pushing the U.S. down to fifth place in the world’s high-tech economy. And, as the most recent data
are for 2013, that may have happened already.
This decline will surprise many Americans, including many American policymakers and pundits, who
assume U.S. leadership simply transfers from one tech revolution to the next. After all, that next
revolution, the Internet of Things, was born in America, so perhaps it seems natural that America will
lead. Many U.S. commentators spin a myth that America is No. 1 in high tech, then extend it to claims
that Europe is lagging because of excessive government regulation, and hints that Asians are not
innovators and entrepreneurs, but mere imitators with cheap labor. This is jingoistic nonsense that
could not be more wrong. Not only does Germany, a leader of the European Union, lead the U.S. in high
tech, but EU member states fund CERN, the European Organization for Nuclear Research, which
invented the World Wide Web and built the Large Hadron Collider, likely to be a source of several
centuries of high-tech innovation. (U.S. government intervention killed America’s equivalent particle
physics program, the Superconducting Super Collider, in 1993 — an early symptom of declining federal
investment in basic research.)
Asia, the alleged imitator, is anything but. Apple’s iPhone, for example, so often held up as the epitome
of American innovation, looked a lot like a Korean phone, the LG KE850, which was revealed and
released before Apple’s product. Most of the technology in the iPhone was invented in, and is exported
by, Asian countries.
Tech leadership key to economy
Tech industry vital to the entire economy and global stability
Donohue 15 – Professor of Law, Georgetown Law and Director, Center on National Security and the
Law, Georgetown Law (Lauren, HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL
SECURITY, Symposium Articles, 4 Am. U. Bus. L. Rev. 11 p.46-47, 2015, Hein Online)//JJ
C. Establishing Economic Security as National Security
Economic strength as national security, as was previously discussed, is not a new concept. The Founding
itself was premised, in part, on the importance of economic security as being vital to U.S. national
interests. In 1787, the Articles of Confederation were written out of existence in part because of concern
about building a stronger economy to allow the government to fulfill its domestic obligations, and to
reassure the international community that the United States was a viable trading partner.64 Since that
time, the United States has at times had to remind itself of the importance of the economy to U.S.
national interests. We are once again at such a moment.
High technology is a vital part of the U.S. economy . It is a symbolic and actual manifestation of the
country's commitment to innovation in every sphere of life. It plays to the United States' strengths as a
nation . It has the potential to change regimes , to alter political relationships , and to shape the daily
lives of people around the globe. And it deserves special attention. The danger is that U.S. industry will
become less competitive and that the U.S. will lose its dominance in the Internet sphere .
To some extent, we do, structurally, pay some attention to the importance of the economy for U.S.
national security. But many consequential decisions are not aired in full light of the possible implications
for U.S. economic interests. One way Congress could rectify this would be to take a look at how to
integrate economic concerns, as an institutional matter, into the national security infrastructure-and not
just at the highest levels, but at a programmatic level, where key decisions about programs are being
made.
Wrecks the economy and industry reforms alone won’t solve
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
It is abundantly clear that the NSA surveillance programs are currently having a serious, negative impact
on the U.S. economy and threatening the future competitiveness of American technology companies.
Not only are U.S. companies losing overseas sales and getting dropped from contracts with foreign
companies and governments—they are also watching their competitive advantage in fast-growing
industries like cloud computing and webhosting disappear, opening the door for foreign companies who
claim to offer “more secure” alternative products to poach their business. Industry efforts to increase
transparency and accountability as well as concrete steps to promote better security by adopting
encryption and other best practices are positive signs, but U.S. companies cannot solve this problem
alone. “It’s not blowing over,” said Microsoft General Counsel Brad Smith at a recent conference. “In
June of 2014, it is clear it is getting worse, not better .”98 Without meaningful government reform and
better oversight, concerns about the breadth of NSA surveillance could lead to permanent shifts in the
global technology market and do lasting damage to the U.S. economy .
Hegemony impact – China
Maintaining US hegemony is key to counter China rise – causes the world to
descend into great power politics which breed conflict
Roloff 14 – Writer of a thesis submitted to Johns Hopkins University in conformity with the
requirements for∂ the degree of Master of Arts in Global Security Studies. (Luke, “PATTERNS OF
INSTABILITY: THE CAUSES AND CONSEQUENCES OF STRUCTURAL INSECURITY AND POWER POLITICS IN
THE ASIA-PACIFIC SPHERE”, May 2014,
https://jscholarship.library.jhu.edu/bitstream/handle/1774.2/37219/ROLOFF-THESIS2014.pdf?sequence=1//DM)
Since the end of the Cold War, the international environment has been a∂ historical anomaly in which
the traditional strategies and motivations for interstate∂ rivalries and zero-sum power politics were
subdued. As the United States emerged as the∂ world’s sole superpower and hegemon, so too did the
current unipolar system. The era of∂ Pax Americana, coupled with the proclaimed victories of
democracy and liberal market,∂ ushered out a 20th century marred by interstate wars and welcomed a
new millennium∂ heralded as an era of cooperation and collective prosperity. It soon became a
common∂ refrain that peace in the post-Cold War era would be founded upon multinational∂
organizations, international norms, and the linkages of a globalized economy. This was a∂ drastic and
marked departure from the great power politics of alliance blocs, deterrence∂ and arms races that had
dominated mainstream strategic rationale during the Cold War∂ and most of history. Under the new Pax
Americana, these concepts of international∂ power contests were deemed obsolete and understandably
became dormant in a time∂ when the most imminent threats ranged from terrorism and pandemics to
rouge states and∂ rising tides. However, the supposed passing of great power politics was prematurely∂
based upon a benign power distribution and not a fundamental change in the structure of∂ the global
order. The cyclical calculus of power politics is rapidly resurfacing in an∂ increasingly multipolar AsiaPacific Sphere due to the rise of China, the forthcoming∂ response of the United States, and the
insecurity of regional actors.1
Future stability of∂ the Asia-Pacific is contingent upon how the relationship between the U.S. and China
will∂ evolve in a new multipolar environment. History cautions that rising powers and the∂ status quo
rarely enjoy a frictionless relationship, but why does this occur? What are the∂ unstable dynamics of the
international system that plague great power politics with such∂ frequency that some even term it the
‘tragedy’ of great powers? The answer to both∂ questions resides in the very structure of the
international order and the instability∂ inherent therein.
The goal of this thesis is to identify the systemic causes for structural instability,∂ which are again
emerging to drive a new regional power rivalry between the U.S. and∂ China and transform the AsiaPacific into a region governed by power rivalries and∂ brinkmanship. There are no new explanations or
theories offered here. Instead, what is∂ unique is the revival of previously discarded explanations of
world politics to address the∂ remerging symptoms of great power conflicts. The strategic value of a
state’s relative∂ power in comparison to potential rivals may resemble Bismarkian Europe, but the∂
following chapters will show that this thinking has a very real and immediate place in∂ modern strategic
planning. It may seem that this historically grounded analysis is too∂ abstract or notional and cannot
offer much strategic guidance in the current Asia-Pacific.∂ However, by identifying the root causes of
power rivalries and incorporating structural∂ influences into operational doctrine, modern strategies can
benefit by accurately∂ deciphering an adversary’s geopolitical decision and predict the outcome based
upon∂ historical precedence. An understanding of great power politics and history allows for∂ preemptive
actions rather than a reactive posture, which only invites further∂ misunderstandings and escalation. An
analytical framework that asks why China is∂ pursuing a seemingly destabilizing posture or assesses the
impact of the U.S.’s own∂ rebalancing actions can prevent the region from continuing to slide towards a
more ∂ 4∂ hostile, militarized and volatile future. Nowhere is the need for accurate information and∂
sound engagements more critical than in the evolving geopolitical postures between the∂ reigning U.S.
and an emerging China.
This outlook hypothesizes that if current strategies fail to account for the∂ underlying structural
influences driving geopolitical struggles, future Sino-U.S.∂ exchanges will succumb to the same historical
cycle of conflict based upon mutual∂ apprehension, distrust and spiraling insecurity. The specter of
China as a prospective∂ regional challenger against American power rekindles the possibility that great
power∂ rivalries will soon preoccupy both sides’ interactions and jeopardize the stability of the∂ region.
This trajectory is incumbent upon China’s expanding military prowess and∂ economic clout, which
threatens to upset the current regional status quo underwritten by∂ American preponderance in the
region. China’s growing capabilities suggest that the∂ region will be soon become a tense bipolar or
even more treacherous and unbalanced∂ multipolar structure.
The prospect of competing powers and a structural shift away from a clear∂ hegemonic power will drive
the calculated cycle of power politics, which manifests itself∂ in the international arena as security
dilemmas, entangling alliances and militarization.∂ However, China’s military growth is not the result of
tyrannical or irrational opponents.∂ This instability is the consequence of the present international
structure. The global∂ commons is still an anarchic environment where each nation must ensure its own∂
survival. Consequently, state strategies are driven by an intrinsic insecurity stemming∂ from
misperceptions of other state’s intentions and relative military capabilities. China’s∂ rise is an ongoing
issue, but the underlying tensions are symptomatic of enduring ∂ 5∂ geopolitical sensitivities that have
long fueled national fears, thwarted peace, and bred∂ conflict.
To demonstrate how structural instability within the global system subsists in∂ emerging strategies and
force postures, the following chapters will present three∂ overarching ‘hazards’ that are commonly
associated with great power politics and∂ regional instability: security dilemmas, balance of power
dynamics and an overreliance∂ upon economic interdependence. Each chapter will identify how the
hazard can∂ negatively influence state strategies and each chapter follows a similar pattern of∂ analysis.
First, a brief, but comprehensive, literature review explains the definition of∂ each hazard, traces the
theoretic lineage and outlines the current scholarship. Second, a∂ historical case study with similar
characteristics to today’s operating environment will∂ demonstrate how each of these elements
contributed to and intensified past power∂ rivalries. Third, the lessons from the case study will be
juxtaposed against current∂ strategies or regional posturing in the modern Pacific to demonstrate how
these structural∂ hazards are increasingly weighing upon today’s strategic calculus.
A US-China confrontation will escalate
Roloff 14 – Writer of a thesis submitted to Johns Hopkins University in conformity with the
requirements for∂ the degree of Master of Arts in Global Security Studies. (Luke, “PATTERNS OF
INSTABILITY: THE CAUSES AND CONSEQUENCES OF STRUCTURAL INSECURITY AND POWER POLITICS IN
THE ASIA-PACIFIC SPHERE”, May 2014,
https://jscholarship.library.jhu.edu/bitstream/handle/1774.2/37219/ROLOFF-THESIS2014.pdf?sequence=1//DM)
The existence and possible consequences of a Sino-American security dilemma∂ will be discussed in the
context of both China and the United States’ nascent operational∂ strategies: China’s anti-access/areadenial (A2/AD) doctrine and the United States’ Joint∂ Operational Access Concept (JOAC). I argue that
neither strategy will effectively ∂ dissuade opposing forces and instead inflame an escalating security
dilemma between the∂ two principal powers of the 21st century. Both strategies seek to gain
operational control∂ of the western Pacific. China’s maturing A2/AD strategy seeks to bypass
conventional∂ balancing metrics and instead relies upon specific technology and regional advantages to∂
create an operating environment that is too dangerous to risk United States’ forces. In∂ response, the
United States’ JOAC mandates assured access in A2/AD environments will∂ be a key operational
requirement for future military plans and force posture. Previous∂ security dilemmas have occurred due
to the insecurity inherent within an anarchic∂ international order in which the security preparations of
one state will inevitable create∂ insecurity within surrounding states. Often historical security dilemmas
manifest themselves as arms races, competing coalitions, or even outright war . If further∂
implemented, China’s A2/AD and the United States’ JOAC will generate an atmosphere∂ ripe for the
development of regional arms races and military tensions within the guise of∂ a larger Sino-American
security dilemma.
I maintain that the operational characteristics of A2/AD and JOAC are indicative∂ of a classical security
dilemma due to three inherent conditions shared by both strategies:∂ the primacy of preemptive
offensive strikes, misperceptions surrounding new A2/AD∂ weapon technology and finally, the
uncertainty created by a lack of discernable∂ information about China’s ultimate strategic goals in the
Pacific. There is no standard∂ list of ingredients for security dilemmas but preemption, misperception,
and uncertainty∂ were chosen because of the frequency these factors appeared in security dilemma∂
literature. These three accelerants combine to create chronic insecurity that is∂ reminiscent of past
security dilemmas and only serve to foster an operational ∂ environment that impedes future stability.
To demonstrate the emerging structural∂ instability within the Asia-Pacific, this chapter will utilize a
historical case study method∂ that compares how preemption, misperception and uncertainty drove the
Cold War-era∂ security dilemma between the Soviet Union and the United States to analogous patterns∂
emerging in the Sino-U.S. relationship. To demonstrate the structural instability of∂ preemptive attack, I
will compare the Cold War’s first strike nuclear doctrine and the∂ offensive long-range first-strike that
are favored in both Chinese and United States∂ strategic literature. For examining how misperceptions of
military capabilities and∂ technology exacerbate regional insecurity, I will compare the paranoia
surrounding early∂ Soviet intercontinental ballistic missiles (ICBMs) to the nascent fear surrounding
China’s∂ anti-ship ballistic missile (ASBM). Finally, I will liken the misperception surrounding∂ Soviet grand
intentions and the ensuing strategic uncertainty with a similar lack of∂ understanding and information
when attempting to decipher China’s long-term strategic∂ goals.
Multipolarity increases conflict
Multipolarity is bad – insecurities cause security dilemmas, proliferation, and
escalatory measures
Roloff 14 – Writer of a thesis submitted to Johns Hopkins University in conformity with the
requirements for∂ the degree of Master of Arts in Global Security Studies. (Luke, “PATTERNS OF
INSTABILITY: THE CAUSES AND CONSEQUENCES OF STRUCTURAL INSECURITY AND POWER POLITICS IN
THE ASIA-PACIFIC SPHERE”, May 2014,
https://jscholarship.library.jhu.edu/bitstream/handle/1774.2/37219/ROLOFF-THESIS2014.pdf?sequence=1//DM)
The security dilemma concept is a theoretical foundation in realist school∂ interpretations of security
problems and especially relevant within the defense realism∂ and offense-defense realist subsets. A
realist interpretation of the world maintains that∂ anarchy, or the lack of any overarching authority to
protect individual states, defines the∂ international order. Therefore, as noted realist scholar John
Mearsheimer predicts, there∂ are certain “bedrock assumptions” that exist in an anarchic international
system. 7∂ Some∂ of Mearsheimer expectations are: states will develop offensive military capabilities;
states∂ are never sure of another actor’s intention; and every state is a rational actor that seeks to∂
survive in such a Hobbesian atmosphere.8
Professor Shiping Tang, in his work The Security Dilemma: A Conceptual∂ Analysis, builds upon
Mearsheimer’s ‘bedrock’ and constructs a theoretical roadmap∂ demonstrating the causal linkages,
which explicate how an anarchic world order leads to∂ security dilemmas and conflict . Tang shares
many of Mearsheimer’s assumptions and∂ draws connections between the self-help anarchic structure
that creates a high level of∂ “uncertainty about each other intentions and fear, states resort to the
accumulation of∂ power and capabilities as a means of defense, and these capabilities inevitably
contain∂ some offensive capabilities”.9∂ This uncertainty and resulting armament generate the∂ security
dilemma, whereas stated, other states begin to arm themselves in response. Tang∂ believes that this
cycle of “actions and reactions” when mixed with national psychologies∂ and material estimations,
entrenches each state into a self-propelled pattern of heightened∂ tensions and escalatory measuresoften referred to as a security spiral.∂ 10 The unfortunate∂ outcome being that the security dilemma
often results in war, deteriorating relations, or∂ arms races. According to the security dilemma, this
creates a self-defeating paradox∂ because a state’s attempts for increased security will regularly result
in a less stable and∂ increasingly hostile environment.
*Multipolarity is uniquely bad in the context of our internal link
Teitelbaum 7 – Senior Research Associate at the Labor and Worklife Program at Harvard
Law School, former Vice President of the Alfred P. Sloan Foundation, former
Commissioner to the U.S. Commission for the Study of International Migration and
Cooperative Economic Development (Michael, Perspectives on U.S. Competitiveness in
Science and Technology, RAND Corporation, p.87-88)//JJ
Implications for National Security
Loss of dominance in the supply of scientific and engineering talent and in high-tech production has
three implications for U.S. national security:
Proposition 4: Foreign countries and groups will have potentially ample supplies of S&E workers for
developing high-tech sectors that may be critical for national security. As the number of scientists and
engineers working in foreign countries continues to increase, the United States’ comparative advantage
in generating scientific and engineering knowledge and in the high-tech sectors and products associated
with that knowledge will decline. Increased numbers of scientists and engineers will stimulate the rate
of technological advance , expand- ing the global production possibility frontier, and benefiting people
worldwide. But the United States will also face economic difficulties as its technological superiority
erodes . The group facing the biggest danger from the loss of America’s technological edge is workers
whose living standards depend critically on America’s technological superiority. The big winners from
the spread of technology will be workers in developing countries and the firms that employ them,
including many U.S. multinational corporations. In the long term, the spread of knowledge and
technology around the world will almost certainly outweigh the loss of U.S. hegemony in science and
technology, but the transition period is likely to be lengthy and difficult —more formidable than that
associated with the recovery of Europe and Japan after World War II. In national security, however, the
risks to the United States—in the form of more countries with potentially competitive technologies in
the military area or more groups with access to possibly dangerous technologies —may
outweigh
any gains from a more multipolar world in which other leading countries could take on
greater responsibilities. The increased supply of S&E specialists overseas and accompanying economic
and technological competence will give foreign countries that seek to compete in high-tech military
areas the potential resources to do so.
Surveillance kills cloud computing
U.S. surveillance pushing cloud computing to the brink –
Rubinstein and Hoboken 14 – *Senior Fellow at the Information Law Institute (ILI) and NYU School of
Law, AND **Microsoft Research Fellow in the Information Law Institute at New York University, PhD
from the University of Amsterdam (Ira and Joris Van, PRIVACY AND SECURITY IN THE CLOUD: SOME
REALISM ABOUT TECHNICAL SOLUTIONS TO TRANSNATIONAL SURVEILLANCE IN THE POST- SNOWDEN
ERA, 66 Maine L. Rev. 488, September 2014, http://ssrn.com/abstract=2443604)//JJ
A. Transnational Surveillance
Transnational surveillance of data in the cloud presents complex scenarios that are currently not
handled in any satisfactory way by existing legal or technical mechanisms. Of particular complexity is the
question of whether and how globally operating services can ensure that the data of an individual or
organization in ‘country T’ (the targeted country) can be secured from disproportionate access by a
government agency in ‘country A’ (the accessing country). In practice, many scenarios are even more
complex, given there may be agencies in multiple countries seeking access to data of a particular
organization, data that could be stored and transmitted across multiple international locations.
It is well established that lawful access frameworks in different jurisdictions permit—to varying
extents—transnational access to cloud data.5 transnational surveillance by foreign governments to
access international data outside the terms of Mutual Legal Assistance Treaties is generally considered
problematic from a legal perspective.6 with a particular reference to the USA PATRIOT Act and other
U.S. lawful access authorities with possible extraterritorial effect.7 the extraterritorial application of
such laws is not necessarily unique to the U.S.; rather, the U.S. occupies a unique position due to the
global strength of U.S. cloud services.
The question of transnational surveillance is of special interest for a number of reasons. First, it is likely
that individuals, businesses, and organizations want to minimize foreign government access to their
data.9 that certain States may impose legal requirements on cloud services aimed at preventing such
access from taking place. Examples of this include discussions about “localization ” (i.e., requiring that
services locate their operations inside the country where the service is offered and/or provide local
storage of data) in Europe and Brazil, and the debate about the revision of the European data protection
framework.10 Third, fundamental questions remain and are the subject of official review, such as
through the President’s Review Group,11 as to the appropriate standards and related safeguards for
lawful access to data of foreign organizations and individuals.12 Finally, it seems likely that cross border
markets and flows of data will continue to grow and intensify in light of the technology and market
dynamics underlying cloud computing services. Thus, the challenges for the cloud industry facing these
unresolved issues of transnational cloud surveillance are substantial.
B. A Cloud Industry Under Threat
If anything, the Snowden leaks clearly illustrate that global cloud service providers are facing a new
class of threats from intelligence agencies across the world. The revelations are many and diverse in
nature. This Article proposes that, from the perspective of the cloud industry, the threats can be
generally distinguished in terms of front-door versus backdoor access to data and communications
handled by cloud providers. Revelations of front-door access in the U.S. context include PRISM and the
widely discussed telephone metadata program.13 The PRISM program is conducted on the basis of
Section 702 of the FISA Amendments Act 2008 (FAA), under which the U.S. intelligence community has
successfully gained access to data from U.S. cloud services related to non-U.S. persons reasonably
believed to be outside the U.S.14 Under this program, the NSA gains access by demanding cloud and
communication service providers hand over customer information and content , requiring annual
certification , and with targeting and minimization procedures reviewed by the Foreign Intelligence
Surveillance Court.15 What is most striking about these programs is the structural basis and scale on
which access takes place. In addition, many have raised doubts about the statutory and constitutional
basis of these programs under U.S., international, as well as foreign law.16 Observers and stakeholders
from outside of the United States are especially troubled by the fact that Section 702 would clearly
violate the Fourth Amendment if it were designed to intercept the communications of U.S. persons.17
Even more worrying from an industry perspective is that intelligence agencies have begun to gain
backdoor access to the data handled by cloud providers. Backdoor access dispenses with serving orders
on cloud providers or otherwise notifying them or seeking their cooperation.18 Reports about a variety
of U.S. and British programs show how the intelligence community has systematically sought such
backdoor access to data outside of the knowledge of cloud providers . For example, a program known
as MUSCULAR apparently enables the NSA to intercept the unencrypted data traffic between cloud
provider data centers.19 Similarly, the UPSTREAM program, details of which were revealed in
combination with the revelations about PRISM, showed that the NSA was gaining sweeping access to
Internet communications through the targeting of the telecommunications infrastructure.20
Additionally, the BULLRUN program showed how the NSA had systematically undermined encryption
and security in available commercial systems through a variety of covert methods.21 These methods
include the undermining of encryption standards, the covert influence of software design, and the
pressuring of industry and firms to hand over encryption keys, thereby allowing for circumvention of
security measures more generally.22 Leaked documents suggest that these programs are conducted
pursuant to Section 702 of the FAA as well as Executive Order 12333 .23 The latter sets guidelines for
intelligence activities including foreign intelligence gathering conducted abroad, but does not involve
any judicial or congressional oversight.24
C. The Cloud Industry Responds While Being Caught in the Middle As discussed in more detail later in
this Article, the revelations involving backdoor access have led to the strongest industry response. Most
fundamentally, backdoor access programs have forced cloud providers to rethink their relationship with
(their own and foreign) governments and to take steps designed to prevent intelligence agencies from
gaining unauthorized access to their systems.25 In other words, when cloud providers implement
security measures against unauthorized access, they are forced to consider intelligence agencies as just
another third-party adversary whose access they must block.26 The main difference is one of resources
and skills: as compared with any other adversary, intelligence agencies have world- class technology and
expertise and seemingly unlimited budgets. Furthermore, cooperation among allied agencies with
similar capabilities acts as a force multiplier, as is the case with the “Five Eyes,” consisting of the U.S.,
the U.K., Canada, Australia, and New Zealand.27
The international political response to the revelations of large scale transnational surveillance has been
significant.28 Foreign governments, such as Germany and Brazil, have not only sought clarifications from
the U.S. but have also started to propose regulatory measures designed to counter it.29 In the EU- U.S.
context, the revelations have complicated ongoing trade negotiations ,30 imperiled the Safe Harbor
Program ,31 and emboldened the European Parliament to adopt poison pill amendments to the
proposed EU data protection regulation.32 In the broader international context, Brazil has been
particularly vocal about its objections to U.S. spying and, with Germany, sponsored a new United
Nations resolution requiring a report on the protection and promotion of privacy “in the context of
domestic and extraterritorial surveillance . . . including on a mass scale. 33 Moreover, the U.S. now faces
significantly more opposition to its historically dominant position in Internet governance. 34
In addition, market conditions for U.S. cloud providers have deteriorated as a result of new doubts
about the security and privacy of cloud data. The revelations have also dealt a significant blow to the
reputation of major Internet industry players, which have seen their brands implicated in the reporting
about NSA spying programs.35 Cloud customers expect providers to reassure them that their data is
safe and that firms are taking active steps to respond to these new threats. The U.S. cloud industry not
only feels besieged by government agencies seeking access to their systems left and right, but rightly
worries that its overseas revenues will dry up due to customer mistrust or new restrictions on market
entry.36 Although the increased emphasis on localization rules and requirements in foreign jurisdictions
may smack of protectionism and local government surveillance demands,37 it further complicates the
geopolitical situation facing the U.S. industry.
US surveillance has negative effects on the international and domestic cloud
computing
Gasser and O’Brien, 14 – * Executive Director at the Berkman Center for Internet and Society at
Harvard University AND ** J.D. in economics (Urs and David, “Governments and Cloud Computing:
Roles, Approaches, and Policy Considerations”, 17 March 2014, Berkman Center Research Publication
No. 2014-6.,http://ssrn.com/abstract=2410270)//gg
Perhaps even more than in other areas of ICT, many governments play multiple roles simultaneously in
the evolving cloud computing ecosystem. Such a multi-role approach can come with great synergies. For
instance, the approach taken by the European Commission to encourage government adoption of the
cloud and boost the industry is a situation where the objectives of the government as a user and as a
promoter are well aligned. However, as in other domains of society and life, governments might face
actual or potential role conflicts when exercising roles corresponding to two or more statues.
Based on the map of roles provided in the previous section, one can identify a number of potential role
conflicts. For instance, conflicts might arise between regulatory compliance (government as regulator)
for agencies conflicts with cloud-first strategy (government as user). And there might be tension areas
between the roles as regulator and promotional activities for industry. The lack of protective legislation
(e.g., security and privacy issues), for example, might discourage private sector adoption both
domestically and internationally. Conversely, regulatory burdens – for instance in sensitive areas such as
health care of the financial industry – may be greater in the cloud and discourages adoption in the
private sector.
A case in point of an actual role conflict along these lines are the recent revelations of the US National
Security Agency’s PRISM plan and its abilities to easily gain access to information being stored at
technology companies. cxlii Analysts and industry executives expect that the surveillance program by
the US government might have substantial negative effects on cloud adoption, both domestically and
internationally .cxliii Public clouds in particular will be met with increased skepticism, according to these
observers, creating an actual conflict between the US government’s efforts to promote cloud technology
(government as promoter) and its national security programs (government as regulator). Decisions by
local data protection authorities in Canada and Europe, which prohibit or discourage domestic or
regional government plans to migrate data to the cloud or use US cloud services , are examples of the
possible consequences of such conflicts.cxliv Already government officials in these countries are
discussing these as possible reactions to this program.
While some of these role conflicts might be hard or impossible to avoid, it is interesting to observe that
discussion about the potential of any role conflicts has not yet received much public attention in policy
circles, not even in countries with advanced cloud strategies such as the US, Europe, or Japan.
Cloud computing key to SSA
Cloud-computing solves effective Space Situational Awareness
Liu et al 14 – Research Assistant at The Research Foundation for SUNY (Bingwei, Yu Chen – Associate
Professor at the Department of Mathematics at New York University, Dan Shen and Genshee Chen –
Infusion Technology Inc., Khanh Pharm and Erik Blasch and Bruce Rubin – Air Force Research Lab, An
adaptive process-based cloud infrastructure for space situational awareness applications, SPIE Digital
Library, 6/3/14, http://proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=1879782)//JJ
*can’t access full-text, that will be much better
Space situational awareness (SSA) and defense space control capabilities are top priorities for groups
that own or operate man-made spacecraft. Also, with the growing amount of space debris, there is an
increase in demand for contextual understanding that necessitates the capability of collecting and
processing a vast amount sensor data. Cloud computing , which features scalable and flexible storage
and computing services, has been recognized as an ideal candidate that can meet the large data
contextual challenges as needed by SSA . Cloud computing consists of physical service providers and
middleware virtual machines together with infrastructure , platform , and software as service (IaaS,
PaaS, SaaS) models. However, the typical Virtual Machine (VM) abstraction is on a per operating systems
basis, which is at too low-level and limits the flexibility of a mission application architecture. In
responding to this technical challenge, a novel adaptive process based cloud infrastructure for SSA
applications is proposed in this paper. In addition, the details for the design rationale and a prototype is
further examined. The SSA Cloud (SSAC) conceptual capability will potentially support space situation
monitoring and tracking , object identification , and threat assessment . Lastly, the benefits of a more
granular and flexible cloud computing resources allocation are illustrated for data processing and
implementation considerations within a representative SSA system environment. We show that the
container-based virtualization performs better than hypervisor-based virtualization technology in an SSA
scenario.
Cloud computing is vital to SSA and stopping space debris
Johnston et al 13 – Ph.D. with the Computational Engineering and Design Group (CED) at the University
of Southampton, MEng degree in Software Engineering from the School of Electronics and Computer
Science, Senior Research Fellow for the Faculty of Engineering and the Environment at University of
Southampton (Steven, Neil O’Brien – Senior Technical Recruiter at Colloco Search, Hugh Lewis –
Astronautics Research Group at the University of Southampton, PhD, Elizabeth Hart – School of
Engineering Science at Southampton University, Adam White – School of Engineering Science at
Southampton University, Simon Cox – professor of Computational Methods and Director of the
Microsoft Institute for High Performance Computing, PhD, Clouds in Space: Scientific Computing using
Windows Azure, Journal of Cloud Computing, 2013,
http://www.journalofcloudcomputing.com/content/pdf/2192-113X-2-2.pdf)//JJ
The space surveillance and tracking segment of ESA’s space situational awareness ( SSA ) system will
provide vital security for space assets due to the increased awareness of the risks posed by space
debris . The requirements of the SSA system will grow as the population of space objects — and the
threat they pose — increases into the future . In this work, we have shown the relevance of a cloudbased architecture to SSA. In particular, the cloud-based architecture is able to manage unpredictable
computational demands , in response to a break-up event, in addition to the predictable requirements
associated with the regular processing of a space object catalogue. The solution can grow to include
more physical computational and storage resources, thereby scaling with the demands of a catalogue of
space objects which is rapidly increasing in size due both to conjunctions which introduce new debris,
and the introduction of new measurement hardware which can provide information on increasingly
smaller debris.
The cloud-based solution provides additional advantages, including the ability to share data with
trusted partners simply, rapidly and securely . The partners, at their option, could then fund additional
compute resources located close to the data to perform further analysis. The data marketplace provided
by Windows Azure is also potentially advantageous, in that it extends the concept of readily and
securely sharing data to include the option for the data owner to monetise the data set, the income
from which could fund additional analysis, for example.
Further, we have illustrated the applicability of the cloud-based architecture to the development of
algorithms that support the long-term sustainable use of outer space . The modular architecture
pattern that a cloud- based solution promotes is ideal for this purpose, since a new algorithm could be
implemented as a new worker type, and could be run in parallel with existing algorithms on the same
data. The computer resources required to try out a novel algorithm and compare its results to those
from an established code could be rented just for the time that they are required, making this an
economical way to proceed .
In conclusion, not only have we shown how a cloud- based architecture using Microsoft Windows Azure
can be successfully applied to an active debris removal mission design task, we have also developed a
modular architecture which will be used in the future to support other SSA activities. The modular,
cloud-based nature of this solution gives it some unique advantages over alternative architectures due
to the rapid availability of huge computational and data storage resources ; due to the simplicity that
it brings to securely sharing raw or processed data; and due to the ease with which it facilitates the
side-by-side comparison of alternative algorithms.
Space debris impact – nuclear war
Debris and satellite collisions deck readiness and missile-response capabilities –
nuclear war
Imburgia 11 – B.S. United States Air Force Academy, J.D. University of Tennessee College of Law, LL.M.
The Judge Advocate General’s Legal Center & School, Judge Advocate in the United States Air Force,
legal exchange officer to the Directorate of Operations and International Law (Joseph, Space Debris and
Its Threat to National Security: A Proposal for a Binding International Agreement to Clean Up the Junk,
Volume 44 of Vanderbilt Journal Transnational Law, p. 608-610, 2011,
http://www.vanderbilt.edu/jotl/manage/wp-content/uploads/Imburgia-FINAL-CR-pdf.pdf)//JJ
These gloomy prognostications about the threats to our space environment should be troubling to
Americans. The United States relies on the unhindered use of outer space for national security.
According to a space commission led by former Secretary of Defense Donald Rumsfeld, “[t]he [United
States] is more dependent on space than any other nation.” According to Robert G. Joseph, former
Undersecretary for Arms Control and International Security at the State Department, “space capabilities
are vital to our national security and to our economic well-being.” Therefore, a catastrophic collision
between space debris and the satellites on which that national security so heavily depends poses a
very real and current threat to the national security interests of the United States. Since “the [1991]
Gulf War, the [United States] military has depended on satellites for communications , intelligence
and navigation for its troops and precision-guided weapons.” Satellites are also used for
reconnaissance and surveillance, command and control, and control of Unmanned Aerial Vehicles.
According to the United States Space Command’s Fact Sheet: Satellites provide essential in-theater
secure communications, weather and navigational data for ground, air and fleet operations and threat
warning . Ground-based radar and Defense Support Program satellites monitor ballistic missile
launches around the world to guard against a surprise missile attack on North America. Space
surveillance radars provide vital information on the location of satellites and space debris for the nation
and the world. Maintaining space superiority is an emerging capability required to protect our space
assets. With the modern speed of warfare, it has become difficult to fight conflicts without the timely
intelligence and information that space assets provide. Space-based assets and space-controlled assets
have created among U.S. military commanders “a nearly insatiable desire for live video surveillance,
especially as provided from remotely piloted vehicles like the Predator and now the Reaper.” Moreover,
military forces have become so dependent on satellite communications and targeting capabilities that
the loss of such a satellite would “ badly damage their ability to respond to a military emergency .” In
fact, the May 2008 malfunction of a communications satellite demonstrates the fragile nature of the
satellite communications system. The temporary loss of a single satellite “effectively pulled the plug on
what executives said could [have been] as much as 90 percent of the paging network in the United
States.” Although this country’s paging network is perhaps not vital to its national security, the incident
demonstrates the possible national security risks created by the simultaneous loss of multiple satellites
due to space debris collisions.
Satellites solve nuclear war
Kallberg 12 – PhD, is a Swedish-American lawyer, political scientist, and opinion writer, MA in political
science from the University of Texas (Jan, Designer Satellite Collisions from Covert Cyber War, Strategic
Studies Quarterly, Spring 2012, http://www.au.af.mil/au/ssq/2012/spring/kallberg.pdf)//JJ
Network-centric warfare is dependent on the global information grid for joint war-fighting capabilities.
The pivotal layer creating global war-fighting capability is the space backbone of the information grid
where space as- sets are the decisive element. The United States depends on space-borne capabilities
for success, and US national security relies today on a limited number of heavily used satellites . These
satellites are crucial for strategic deterrence , surveillance, intelligence gathering, and military
communications . If strategic deterrence fails, the satellites become an integral part of offensive and
defensive ballistic missile defense . Satellites are pivotal not only for American space superiority but
also for information superiority—the engine in the multichannel joint war-fighting machinery that has
proven to be successful in recent conflicts. American forces can fight globally be- cause of access to
satellite-supported C4ISR. Potential adversaries of all sizes and intentions understand that American
military might is closely linked to the capabilities of US space assets. James Finch and Shawn Steene of
the Office of the Undersecretary of Defense for Policy express this unique link between space assets and
national security well: Although other states increasingly utilize space for economic and military
purposes, the United States is by far the most reliant on space systems due to its global responsibilities
and high-technology approach to warfare that heavily leverages space systems for communication,
navigation, and intelligence, surveillance, and reconnaissance. This asymmetry creates an imbalance;
the more a nation relies on space systems, the more tempted a potential adversary is to target those
systems. 4 Since the fall of the Soviet Union, US space superiority has not been extensively challenged,
and we have seen two decades of US space supremacy. At- tacks against US satellites have been a
concern since the 1970s, 5 with a focus on signal jamming, laser beams from the earth, 6 and direct
kinetic antisatellite (ASAT) missile attacks. William J. Lynn III, former US deputy secretary of defense,
stated in the summer of 2011, “The willingness of states to interfere with satellites in orbit has serious
implications for our national security. Space systems enable our modern way of war. They allow our
warfighters to strike with precision, to navigate with accuracy, to communicate with certainty, and to
see the battlefield with clarity. Without them, many of our most important military advantages
evaporate .” 7 Lynn’s comments are to a high degree drawn from the National Security Space Strategy
of January 2011. That strategy states that space is becoming congested, contested, and competitive. It
clearly outlines the importance of protecting US space-borne capabilities: The National Security Space
Strategy draws upon all elements of national power and requires active US leadership in space. The
United States will pursue a set of interrelated strategic approaches to meet our national security space
objectives: Promote responsible, peaceful, and safe use of space; provide improved US space
capabilities; partner with responsible nations, international organizations, and commercial firms;
prevent and deter aggression against space infrastructure that supports US national security; and
prepare to defeat attacks and to operate in a degraded environment.
Space debris impact – terrorism
Debris collisions decks terror response capabilities
Imburgia 11 – B.S. United States Air Force Academy, J.D. University of Tennessee College of Law, LL.M.
The Judge Advocate General’s Legal Center & School, Judge Advocate in the United States Air Force,
legal exchange officer to the Directorate of Operations and International Law (Joseph, Space Debris and
Its Threat to National Security: A Proposal for a Binding International Agreement to Clean Up the Junk,
Volume 44 of Vanderbilt Journal Transnational Law, p. 608-610, 2011,
http://www.vanderbilt.edu/jotl/manage/wp-content/uploads/Imburgia-FINAL-CR-pdf.pdf)//JJ
Simply put, the United States depends on space- based assets for national security, and those assets are
vulnerable to space debris collisions. As Massachusetts Democratic Congressman Edward Markey
stated, “American satellites are the soft underbelly of our national security.” The Rumsfeld Commission
set the groundwork for such a conclusion in 2001, when it discussed the vulnerability of U.S. spacebased assets and warned of the Space Pearl Harbor. Congress also recognized this vulnerability in June
2006, when it held hearings concerning space and its import to U.S. national power and security. In his
June 2006 Congressional Statement, Lieutenant General C. Robert Kehler, then the Deputy Commander,
United States Strategic Command, stated that “space capabilities are inextricably woven into the fabric
of American security.” He added that these space capabilities are “vital to our daily efforts throughout
the world in all aspects of modern warfare” and discussed how integral space capabilities are to
“ defeating terrorist threats , defending the homeland in depth, shaping the choices of countries at
strategic crossroads and preventing hostile states and actors from acquiring or using WMD .”
Space debris impact – NASA budget
Collisions deck NASA’s budget
Imburgia 11 – B.S. United States Air Force Academy, J.D. University of Tennessee College of Law, LL.M.
The Judge Advocate General’s Legal Center & School, Judge Advocate in the United States Air Force,
legal exchange officer to the Directorate of Operations and International Law (Joseph, Space Debris and
Its Threat to National Security: A Proposal for a Binding International Agreement to Clean Up the Junk,
Volume 44 of Vanderbilt Journal Transnational Law, p. 608-610, 2011,
http://www.vanderbilt.edu/jotl/manage/wp-content/uploads/Imburgia-FINAL-CR-pdf.pdf)//JJ
Because so much of the United States’ security depends on satellites, these integral space-based
capabilities would, therefore, be costly to lose. That loss would be felt in more than just the security
arena. Due to the steep price tags attached to some of the national space security platforms, the
economic loss of a satellite due to space debris would also be significant. For example, a pair of new
Global Positioning Satellites (GPS), which provides valuable targeting and battle space awareness to
military commanders, costs $1.5 billion . Accordingly, if a piece of space debris destroys one of these
satellites , $750 million could be lost instantly . Additionally, NASA invests billions of dollars annually
in space assets . Congress provided NASA with $18.3 billion to spend on space utilization and
exploration for fiscal year 2010, and it provided $17.7 billion for fiscal year 2011. Air Force General
(retired) Ronald E. Keys, former Commander of Air Combat Command, summed it up best, stating that a
great deal “rides on space-borne satellites .” Because these space capabilities are so costly yet so vital
to the United States’ national security and economic well-being, the preservation of these space
capabilities should also be vital.
Yes debris
ISS just avoided asteroid but threats are looming- won’t be lucky twice
Fessenden 14, space debris analyst and writer for The Smithsonian, (Marissa, 11/6/14, The
International Space Station Just Avoided a Collision With Space Junk, Smithsonian,
http://www.smithsonianmag.com/smart-news/international-space-station-just-avoided-gravitydisaster-180953265/?no-ist)//AK
Space debris in orbit pose a serious threat: A fleck of paint can travel nearly 17,900 miles per hour and
cause major damage if it slams into a satellite. In Alfonso Cuarón’s Gravity, this threat blooms to its most
extreme in a cascade of collisions between satellites that eventually wipes out even the International
Space Station.
Although the nitpicking on that film’s science made clear that satellites orbit at different altitudes and
couldn’t all be taken out at the same time, collision threats are real.
In fact, the International Space Station just had to do an emergency maneuver to dodge a hand-sized
chunk of the Russian Cosmos-2251 satellite on October 27, reports the European Space Agency.
Fortunately, the agency’s unmanned Georges Lemaître Automated Transfer Vehicle — which ferries
supplies to the station from earth — was docked to the ISS. It fired its thrusters for four minutes to raise
the 463-ton space station by one kilometer and out of the space junk’s path.
The errant satellite piece is one of the remnants from a 2009 collision between the then-deactivated
Russian Cosmos-2251 and a U.S. Iridium satellite. While several entities track space debris in order to
prevent collisions (most satellites can move out of the way) making accurate predictions are tough.
“The main problem here is the data quality for the data representing the satellites locations,” Bob Hall,
Technical Director of Analytical Graphics, Inc., told Universe Today in 2009. That company analyses
potential collisions every day, but uncertainty riddles these calculations. That fateful 2009 collision
wasn’t even in the top-10 collisions predicted for that day.
"While many collision threats are spotted at least days before impact," writes Elizabeth Howell for
Universe Today, "occasionally ground networks aren’t able to see a piece until 24 hours or less before
the potential impact." The Cosmos shard was spotted just six hours before it would pass within 2.5 miles
of the ISS’s position.
The space junk cascade phenomenon is named Kessler Syndrome after the man who discovered it could
happen, explains Corrinne Burns, writing for The Guardian. Donald Kessler, an astrophysicist who
worked for NASA, first applied his calculations about meteorite collisions to satellites in 1978. "The
results of those calculations surprised me – I didn't realize it could be that bad," he told The Guardian in
2013. "But it's building up as I expected. The cascade is happening right now – the Kosmos-Iridum
collision was the start of the process. It has already begun." (Kosmos or Cosmos spellings are used by
different publications.) Burns writes:
Kessler syndrome isn't an acute phenomenon, as depicted in [Gravity] – it's a slow, decades-long
process. "It'll happen throughout the next 100 years – we have time to deal with it," Kessler says. "The
time between collisions will become shorter – it's around 10 years at the moment. In 20 years' time, the
time between collisions could be reduced to five years."
The increasing risk of collision has prompted the ESA to sign an agreement with the U.S. Strategic
Command in order to communicate more and reduce the collision threat, reports the space news site
Sen. The European Space Agency typically has to "preform four to six debris avoidances each year, and
this number has been increasing," Jenny Winder writes. The CryoSat-2 satellite — which measures the
thickness of polar ice sheets — had to avoid a fragment of Cosmos-2251 on October 7.
This recent maneuver wasn’t the first time the ISS had to deal with the remains of the 2009 collision, or
other space debris, but it was remarkable because it was executed within a fairly short time window.
Space debris risks massive collisions with satellites and aircrafts now
Science Daily 5/6, frontier news source for topical science articles, (5/6/15, University of
Southampton, Space debris from satellite explosion increases collision risk for space
craft, Science Daily,
http://www.sciencedaily.com/releases/2015/05/150506084549.htm)//AK
On 3 February 2015, the DMSP F13 satellite exploded in orbit producing over an estimated 100 pieces of
space debris that were detected using radar. In assessing how debris created by the explosion might
affect their spacecraft, the European Space Agency and other satellite operators concluded that it would
pose little risk to their missions.
However, scientists from the Astronautics Research Group at the University of Southampton
investigated the risks to a wide range of space missions, coming from smaller pieces of debris created by
the explosion that cannot be detected using radar based on the ground.
In the case of the explosion of DMSP-F13, they detected 100 new catalogued objects, which suggest that
more than 50,000 small fragments larger than 1mm were created.
PhD student Francesca Letizia, who led the research under the supervision of Dr Camilla Colombo and Dr
Hugh Lewis, says: "The fragments from the explosion spread around the Earth forming a band, which
can be crossed by spacecraft with orbits that are quite different from the one of DMSP-F13."
The Southampton team developed a new technique called CiELO (debris Cloud Evolution in Low Orbits)
to assess the collision risk to space missions from small-sized debris. They produced a collision
probability map showing a peak in the risk at altitudes just below the location of the DMSP-F13
explosion. The map was created by treating the debris cloud produced by the explosion as a fluid, whose
density changes under the effect of atmospheric drag.
Dr Colombo, who proposed this idea as a part of a Marie Curie project in the European 7th Framework
Programme, says: "Treating the fragment band as a fluid allows us to analyse the motion of a large
number of fragments very quickly, and much faster than conventional methods. In this way, the
presence of small fragments can be easily taken into account to obtain a refined estimation of the
collision probability due to an explosion or a collision in space."
Francesca, who was awarded the 2013 Amelia Earhart Fellowship for this work, adds: "This map can be
used with a database of spacecraft or space debris objects to identify the targets that are most exposed.
For example, in the map we show the top ten spacecraft at risk from the fragments generated by the
explosion of DMSP-F13 according to our model. They are mainly US and Russian satellites in sunsynchronous or polar orbits."
The aim of the team's research is to gain a deeper insight into the dynamics of small debris fragments
and their contribution to collision risk in the Earth orbital environment.
Dr Lewis, who represents the UK Space Agency on the Inter-Agency Space Debris Coordination
Committee (IADC), says that it is important to understand this contribution: "Even though many of these
objects will be no bigger than the ball in a ballpoint pen, they can disable a spacecraft in a collision
because of their enormous speed. In the case of the DMSP-F13 explosion, our work has shown that the
introduction of a new cloud of small-sized debris into orbit will have increased the risks for other
spacecraft in the vicinity, even if the risk from the larger fragments has been discounted."
Satellite collision risk increasing now- space debris experts- preventative
measures necessary
Science Daily 14, frontier news source for topical science articles, (9/30/14, Space debris
expert warns of increasing small satellite collision risk, Science Daily,
http://www.sciencedaily.com/releases/2014/09/140930090447.htm)//AK
The increasing number of small 'CubeSat' satellites being launched combined with a relaxed attitude
to debris mitigation could lead to hazards for all space users unless preventative measures are taken,
warns a leading space debris expert from the University of Southampton.
Speaking today at the 65th International Astronautical Congress in Toronto, Dr Hugh Lewis said that this
combination leads to a growth in space debris, as a result of collisions between CubeSats and other
objects in orbit.
CubeSats are small satellites (around 10x10x10cm) that are providing opportunities for companies to
break into the space data and communications industries. Despite many CubeSats not having any
manoeuvring capability so they cannot avoid collisions during the mission or manoeuvre to a disposal
orbit at their mission end, they are still perceived to have a low impact on the space debris environment.
However, despite guidelines requiring the satellites to deorbit within 25 years, some are being launched
into high Earth orbits, which means their orbital lifetime could be much greater.
More than a third of all CubeSats launched to-date (around 160 between 2003 and 2013) are predicted
to remain on-orbit for more than 25 years. Since 2005, CubeSats have been involved in more than
360,000 close approaches of less than 5 km with other orbiting objects.
Dr Lewis says: "To reduce the risks, some effort is needed to engage with the growing small satellite
community. All space users, not just those in the CubeSat community, who are taking the right steps
should be encouraged to continue and, ultimately, lead on sustainable practices and debris mitigation
activities.
"Those who are not yet engaged with this approach should be encouraged to do so. It's probably a
matter of changing their perceptions of the risks and helping them to understand that there is a
collective responsibility to ensure that outer space activities are sustainable so that future generations
have the same opportunities to use space as we do."
Dr Lewis and his team used their Debris Analysis and Monitoring Architecture to the Geosynchronous
Environment (DAMAGE) model to simulate three future CubeSat launch traffic scenarios until the year
2043. By comparing these with close approach data from 2005 to 2013, the team found CubeSats are
estimated to be involved in millions of close approaches over the next 30 years, with a handful leading
to a collision.
Analysis of the close approaches found that most of the collision risk from CubeSats comes from highspeed encounters with large spacecraft. In addition, many of these encounters were in Sun-synchronous
orbits that are popular with remote sensing and Earth science satellites.
Dr Lewis adds: "By far the greatest risk comes from those with long lifetimes at altitudes of about 750
km. If CubeSats continue to be launched into long-lived orbits without any means of disposing of them,
then they will contribute to the growing space debris hazard. This is not a responsible or sustainable
practice, in my view. However, if efforts are made to limit the lifetimes- as some are already doing -then the risks will be reduced."
AT: Doesn’t hurt cloud computing
Data localization is an independent internal link
Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther
King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School
AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D.,
University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J.
677, lexis)
Cloud Computing. Data localization requirements will often prevent access to global cloud computing
services. As we have indicated, while governments assume that global services will simply erect local
data server farms, such hopes are likely to prove unwarranted. Thus, local companies will be denied
access to the many companies that might help them scale up, or to go global. n247 Many companies
around the world are built on top of existing global services. Highly successful companies with Indian
origins such as Slideshare and Zoho relied on global services such as Amazon Web Services and Google
Apps. n248 A Slideshare employee cites the scalability made possible by the use of Amazon's cloud
services, noting, "Sometimes I need 100 servers, sometimes I only need 10." n249 A company like Zoho
can use Google Apps, while at the same time competing with Google in higher value-added services.
n250 [*729] Accessing such global services thus allows a small company to maintain a global presence
without having to deploy the vast infrastructure that would be necessary to scale as needed.
The Internet of Things. As the world shifts to Internet-connected devices, data localization will require
data flows to be staunched at national borders, requiring expensive and cumbersome national
infrastructures for such devices. This erodes the promise of the Internet of Things - where everyday
objects and our physical surroundings are Internet-enabled and connected - for both consumers and
businesses. Consumer devices include wearable technologies that "measure some sort of detail about
you, and log it." n251 Devices such as Sony's Smartband allied with a Lifelog application to track and
analyze both physical movements and social interactions n252 or the Fitbit n253 device from an
innovative start-up suggest the revolutionary possibilities for both large and small manufacturers. The
connected home and wearable computing devices are becoming increasingly important consumer
items. n254 A heart monitoring system collects data from patients and physicians around the world and
uses the anonymized data to advance cardiac care. n255 Such devices collect data for analysis typically
on the company's own or outsourced computer servers, which could be located anywhere across the
world. Over this coming decade, the Internet of Things is estimated to generate $ 14.4 trillion in value
that is "up for grabs" for global enterprises. n256 Companies are also adding Internet sensors not just to
consumer products but to their own equipment and facilities around the world through RFID tags or
through other devices. The oil industry has embraced what has come to be known as the "digital oil
field," where real-time [*730] data is collected and analyzed remotely. n257 While data about oil flows
would hardly constitute personal information, such data might be controlled under laws protecting
sensitive national security information. The Internet of Things shows the risks of data localization for
consumers, who may be denied access to many of the best services the world has to offer. It also shows
the risk of data localization for companies seeking to better monitor their systems around the world.
Data Driven Innovation (Big Data). Many analysts believe that data-driven innovations will be a key basis
of competition, innovation, and productivity in the years to come, though many note the importance of
protecting privacy in the process of assembling ever-larger databases. n258 McKinsey even reclassifies
data as a new kind of factor of production for the Information Age. n259 Data localization threatens big
data in at least two ways. First, by limiting data aggregation by country, it increases costs and adds
complexity to the collection and maintenance of data. Second, data localization requirements can
reduce the size of potential data sets, eroding the informational value that can be gained by crossjurisdictional studies. Large-scale, global experiments technically possible through big data analytics,
especially on the web, may have to give way to narrower, localized studies. Perhaps anonymization will
suffice to comport with data localization laws and thus still permit cross-border data flow, but this will
depend on the specifics of the law.
AT: Alt causes
Surveillance is the most important cause
Donohue, 14 - Professor of Law, Georgetown University Law Center (Laura, “HIGH TECHNOLOGY,
CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY”, Georgetown University Law Center, 17
September 2014,
http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1119&context=cong)//gg
High technology is a vital part of the U.S. economy. It is both a symbolic and actual manifestation of the
country’s commitment to innovation in every sphere of life. It plays to the United States’ strengths as a
nation. It has the potential to change regimes, to alter political relationships , and to shape the daily
lives of people around the globe. And it deserves special attention. The danger is that U.S. industry will
become less competitive and that the U.S. will thus lose its dominance in the Internet economic sphere.
To some extent, we do, structurally, pay some attention to the importance of the economy. But many
consequential decisions are thus not aired in full light of the possible implications for U.S. national
security.122 One way Congress could rectify this would be to take a look at how to integrate economic
concerns, as a statutory matter, into the national security infrastructure.
V. CONCLUDING REMARKS
To redress the negative effects that have followed from public awareness of the NSA programs
conducted under Section 215 of the USA PATRIOT Act and Section 702 of the FISA Amendments Act, the
most important step that Congress could take would be to reign in the surveillance authorities
themselves, in the process providing greater transparency and oversight. An alteration in U.S. privacy
law would also help to reassure U.S. customers and individuals located outside domestic bounds that
consumer privacy is protected, thus allowing industry accurately to assert that the circumstances have
changed. Consideration of how to integrate economic concerns into the national security infrastructure
would further help to emphasize the importance of taking account of the impact of new initiatives on
the United States.
AT: Chinese cloud computing good
the plan resolves all reasons Chinese tech is good
Castro and McQuinn 15 – * Vice President of the Information Technology and Innovation Foundation
and Director of the Center for Data Innovation, B.S. in Foreign Service from Georgetown University and
an M.S. in Information Security Technology and Management from Carnegie Mellon University, AND **
Research Assistant with the Information Technology and Innovation Foundation, B.S. in Public Relations
and Political Communications from the University of Texas (Daniel and Alan, Beyond the USA Freedom
Act: How U.S. Surveillance Still Subverts U.S. Competitiveness, Information Technology and Innovation
Foundation, June 2015, http://www2.itif.org/2015-beyond-usa-freedomact.pdf?_ga=1.33178294.940386433.1435342104)//JJ
Protectionist policies in China have further strained the U.S. tech industry. In January 2015, the Chinese
government adopted new regulations that forced companies that sold equipment to Chinese banks to
turn over secret source code, submit to aggressive audits, and build encryption keys into their products.
38 While ostensibly an attempt to strengthen cybersecurity in critical Chinese industries, many western
tech companies saw these policies as a shot across the bow trying to force them out of China’s markets.
After all, the Chinese government ha d already launched a “de - IOE” movement — IOE stands for IBM,
Oracle and EMC — to convince its state - owned banks to stop buying from these U.S. tech giants. 39 To
be sure, the Chinese government recently halted this policy under U.S. pressure. 40 However, the
halted policy can be seen as a part of a larger clash between China and the United States over trade and
cybersecurity. Indeed, these proposed barriers were in part a quid pro quo from China, after the United
States barred Huawei, a major Chinese computer maker, from selling its products in the United States
due to the fear that this equipment had “back doors” for the Chinese government. 41 Since the
Snowden revelations essentially gave them cover, Chinese lawmakers have openly called for the use of
domestic tech products over foreign goods both to boost the Chinese economy and in response to U.S.
surveillance tactics . This system of retaliation has not only led to a degradation of business interests for
U.S. tech companies in China, but also disrupted the dialogue between the U.S. government and China
on cybersecurity issues. 4
Laundry list of alt causes to Chinese cloud-computing
Mulvenon et al 14 – Vice-President of Defense Group Inc.’s Intelligence Division and Director of DGI’s
Center for Intelligence Research and Analysis, Ph.D. in political science from UCLA (James, Leigh Ann
Ragland – Research Analyst, Defense Group, Inc., Center for Intelligence Research and Analysis, Joseph
McReynolds – Research Analyst at Defense Group Inc.'s Center for Intelligence, Mathew Southerland –
becoming a Master of Public Policy with a specialization in International Security and Economic Policy at
the University of Maryland, B.A. in Anthropology from Georgetown, RED CLOUD RISING: CLOUD
COMPUTING IN CHINA, International Journal of Computer Research section 21.4, p. 281-331, 2014,
Proquest)//JJ
Cloud Computing Capabilities Gaps between China and the World
Although many elements factor into the equation, the relatively low penetration rate of cloud
computing technology in China appears linked to several issues that are common in China's IT sector:
distrust of foreign technology (a common theme in literature discussing government requirements for
indigenous innovation), a lack of crucial technology required to develop the kind of mature
technological capabilities that are needed, and a lack of technical standards and requirements to drive
technology development. Recent reports from Chinese government agencies indicate that they are
aware of these deficiencies. For example, in January 2013, the director of the China Center for
Information Industry Development described the cloud computing industry as being still only in its
infancy . He cited major problems in the industry, including a lack of cloud computing services and
applications.21
On a macro level, self-reported weaknesses in industries that are essential to cloud computing software , integrated circuits , and information security - underscore the broad challenges facing
Chinese firms as they attempt to reach or exceed the technical capacity achieved for cloud computing in
other countries. For example, in the realm of information security, MIIT's assessment of China's
domestic cloud computing industry published in the Information Security Industry Development Plan for
the 12th FYP was that it was -relatively weak as a whole ," and listed a number of the industry's key
deficiencies:
· A reliance on importing foreign products and services
· A lack of core technology
· An absence of large enterprises to lead the development of the industry
· An inability to properly support national security needs
· An inadequate innovation capability
· A lack of high-end information security personnel who can meet the industry's development
requirements
MIIT also identified several deficiencies in China's software and integrated circuits industries, some of
which are similar to the problems found in the information security industry:
· A lack of enterprises with leading global positions
· At an overall level, the industries are at the low-end of the value chain
· An imperfect industrial innovation system
· A lack of core technology
· An inability to fully realize industry chain synergies
· A lack of an industry development plan supporting leading enterprises and small-to-medium
enterprises (SME)
· Serious structural personnel problems - a lack of high-level, well-rounded personnel in leadership
positions
· Deficiencies in the industry's capacity for sustainable development
Chinese cloud computing fails – too immature
Mulvenon et al 14 – Vice-President of Defense Group Inc.’s Intelligence Division and Director of DGI’s
Center for Intelligence Research and Analysis, Ph.D. in political science from UCLA (James, Leigh Ann
Ragland – Research Analyst, Defense Group, Inc., Center for Intelligence Research and Analysis, Joseph
McReynolds – Research Analyst at Defense Group Inc.'s Center for Intelligence, Mathew Southerland –
becoming a Master of Public Policy with a specialization in International Security and Economic Policy at
the University of Maryland, B.A. in Anthropology from Georgetown, RED CLOUD RISING: CLOUD
COMPUTING IN CHINA, International Journal of Computer Research section 21.4, p. 281-331, 2014,
Proquest)//JJ
In 2012, the China Software Industry Association (CSIA) released a report on China's software and
information technology service industry, which also offered insight into issues affecting the technical
capacity of Chinese cloud computing. The report cited six major problems in Chinese cloud computing
development , specifically:22
1) Cloud computing development -l acked understanding ;" 23 there was uninformed -blind"
development,"24 and a hasty issuance of projects at cloud computing centers that resulted in a lack of
coordination between the research organizations and policy makers involved, and a general waste of
resources .
2) China still lacks a mature cloud computing development platform ; key prerequisite technologies
such as massive data processing and large-scale IT resource management still need to be developed.
3) There are issues that are hindering the development of cloud computing technology for the social
management and public service sector. Systemic issues that must be resolved include: a lack of
collaboration between government departments, inadequate sharing of government information and
resources, and government services outsourcing .
4) There are no successful cases of cloud computing applications in the most important sectors of the
Chinese economy, and the capabilities for organizations to integrate cloud computing applications into
existing operations and infrastructure need to be improved.
5) Information security is a great challenge due to the large amount of data being collectively stored
and managed.
6) There is a lack of standards for cloud computing services, and reliability and security inspection
capabilities are weak. Further, user data security and privacy protection require urgent resolution.
Taken together, the CSIA criticisms suggest that the technical capacity of Chinese cloud computing is still
limited and that several basic conditions must be met before cloud computing can mature. One of
these is Internet speed, which is an important factor in performance for cloud computing services, and
where China's cloud computing technical capacity currently lags behind the United States and other
leading ICT countries. As of late 2011, the average rate of data transfer in China was 1463 kilobytes per
second, five times slower than the rate in OECD countries.25 China's network speed is further
burdened by the government's network monitoring requirements, which slow the speed of Internet
traffic. Deschert LLP, an international law firm founded in the United States with practices in Europe,
Asia, and the Middle East, in a report on cloud computing in China, noted that -cloud computing only
functions as a useful commodity when used with a high-speed broadband connection." 26 These and
other infrastructure deficiencies have helped ensure that Chinese cloud computing firms are generally
ill-suited to match the services that are provided in other countries with more advanced cloud
industries.
Alt. cause to cloud computing leadership – Netherlands
Mulvenon et al 14 – Vice-President of Defense Group Inc.’s Intelligence Division and Director of DGI’s
Center for Intelligence Research and Analysis, Ph.D. in political science from UCLA (James, Leigh Ann
Ragland – Research Analyst, Defense Group, Inc., Center for Intelligence Research and Analysis, Joseph
McReynolds – Research Analyst at Defense Group Inc.'s Center for Intelligence, Mathew Southerland –
becoming a Master of Public Policy with a specialization in International Security and Economic Policy at
the University of Maryland, B.A. in Anthropology from Georgetown, RED CLOUD RISING: CLOUD
COMPUTING IN CHINA, International Journal of Computer Research section 21.4, p. 281-331, 2014,
Proquest)//JJ
Emerging cloud computing firms in other foreign markets appear to show a relatively higher technical
capacity as both providers and innovators . Two companies headquartered in the Netherlands ,
Interexion and GoGrid, appear to have made particular headway in this area. Interexion, for instance,
operates 32 cloud data centers spread across 11 countries , including the United Kingdom, Germany,
and France. The Netherland's technical capacity for cloud computing technology is backed by a mature
software industry that has a history of innovations and inventions (e.g., Bluetooth technology, WiFi,
and Route Navigation). Further, the Netherlands currently has the ICT infrastructure needed for cloud
computing and is sometimes considered the leading country for broadband capability in the world.27
Also, Netherlands-based companies appear to operate in an industry-led, rather than government-led ,
standards environment, and also show low rates of software piracy , both factors which typically
encourage innovation and investment in the software industry. This favorable industry environment
shows similarities with that of the US, which BSA reports also enjoy relatively low-levels of software
piracy and industry-led standards environment. Published US government standards for cloud
computing are not mandatory for commercial systems used outside of the government, though many
commercial firms voluntarily adopt these standards.
AT: Domestic limit kills solvency
Extending privacy rights to US companies solves
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE
COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117,
Winter, lexis)
The difficulty, for Section 702 purposes, enters in regard to Kennedy's reliance on the rule that he saw as
most consistent with the United States' role as a sovereign nation. n447 "[W]e must interpret
constitutional protections," he wrote, "in light of the undoubted power of the United States to take
actions to assert its legitimate power and authority abroad." n448 What is the scope of the United
States' legitimate power and authority abroad? To what degree is it rooted in the legal status of the
individual against whom the state is acting? And what is the relationship between different forms of
legal relationships and membership in the political community?
Let us focus here on the types of relationships most at issue with regard to Section 702: global electronic
communications. One danger in according non-U.S. persons Fourth Amendment rights via (substantial)
virtual contact with the United States is that individuals could use such contacts to evade detection.
n449 Foreign persons could become members of Amazon Prime, communicate with associates in the
United States via Verizon, and take Massive Open Online Courses (MOOCs) from the latest American
university to offer them, perhaps even in the process obtaining a U.S. college or graduate degree. This
could then become a shield to mask behavior that may undermine U.S. national security.
One response to this might be that in a global communications environment, privacy protections must
be thought about in a broader sense. It matters little whether a customer is French, English, or
American. Privacy rights should be extended to customers by nature of their dual status with U.S.
persons qua customers--or even as a concomitant of their rights as people. This was the thrust of part of
Privacy and Civil Liberties Oversight Board's (PCLOB) analysis that suggested privacy be regarded as a
human right.
There is a realpolitic argument to be made here as well, which ties more directly to U.S. foreign
interests. Namely, U.S. failure to [*228] ensure privacy protections may lead to a loss in U.S.
competitiveness. And economic concerns are central to U.S. national security. Consider the impact of
the public release of information about NSA Section 702 surveillance on the U.S. cloud computing
industry. There was an immediate, detrimental impact on the strength of the U.S. economy. Billions of
dollars are now on the line because of concerns that the services provided by U.S. information
technology companies are neither secure nor private. n450 The Information Technology and Innovation
Foundation estimates that declining revenues of corporations that focus on cloud computing and data
storage alone could reach $ 35 billion over the next three years. n451 Other commentators, such as
Forrester Research analyst James Staten, have put actual losses as high as $ 180 billion by 2016, unless
something is done to restore overseas' confidence in data held by U.S. companies. n452
Failure to extend privacy protections to individuals with substantial connections to the country via
industry would, in this view, make it harder, not easier for the United States to assert its legitimate
power and authority abroad. So, under Kennedy's reasoning, one could argue that Fourth Amendment
rights should be extended to individuals economically tied to U.S. entities. This determination, however,
is ultimately one of policy--not law. Deciding whether a greater national security threat is entailed in loss
of competitiveness of U.S. industry, versus loss of protections extended to non-U.S. persons in the
interests of privacy, is part of the weighing that must be done by the executive branch in pursuing its
interests abroad. In this way, the Rehnquist opinion and [*229] the Kennedy concurrence can be read
as compatible with not extending Fourth Amendment rights to individuals lacking a legal relationship (in
other words, those stemming directly from the individual's status as a member of the political
community). n453
Addons
Soft power
2ac Soft power addon
Surveillance overreach spills over to gut overall US global legitimacy
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
Broader Foreign Policy Costs
Beyond Internet Freedom, the NSA disclosures “have badly undermined U.S. credibility with many of its
allies,” Ian Bremmer argued in Foreign Policy in November 2013.214 Similarly, as Georg Mascolo and
Ben Scott point out about the post-Snowden world, “the shift from an open secret to a published secret
is a game changer… it exposes the gap between what governments will tolerate from one another under
cover of darkness and what publics will tolerate from other governments in the light of day.”215 From
stifled negotiations with close allies like France and Germany to more tense relations with emerging
powers including Brazil and China, the leaks have undoubtedly weakened the American position in
international relations, opening up the United States to new criticism and political maneuvering that
would have been far less likely a year ago.216
U.S. allies like France, Israel, and Germany are upset by the NSA’s actions, as their reactions to the
disclosures make clear.217 Early reports about close allies threatening to walk out of negotiations with
the United States—such as calls by the French government to delay EU-U.S. trade talks in July 2013 until
the U.S. government answered European questions about the spying allegations218—appear to be
exaggerated, but there has certainly been fallout from the disclosures. For months after the first
Snowden leaks, German Chancellor Angela Merkel would not visit the United States until the two
countries signed a “no-spy” agreement—a document essentially requiring the NSA to respect German
law and rights of German citizens in its activities. When Merkel finally agreed come to Washington, D.C.
in May 2014, tensions rose quickly because the two countries were unable to reach an agreement on
intelligence sharing, despite the outrage provoked by news that the NSA had monitored Merkel’s own
communications.219 Even as Obama and Merkel attempted to present a unified front while they
threatened additional sanctions against Russia over the crisis in the Ukraine, it was evident that relations
are still strained between the two countries. While President Obama tried to keep up the appearance of
cordial relations at a joint press conference, Merkel suggested that it was too soon to return to
“business as usual” when tensions still remain over U.S. spying allegations.220 The Guardian called the
visit “frosty” and “awkward.”221 The German Parliament has also begun hearings to investigate the
revelations and suggested that it is weighing further action against the United States.222
Moreover, the disclosures have weakened the United States’ relationship with emerging powers like
Brazil, where the fallout from NSA surveillance threatens to do more lasting damage. Brazilian President
Dilma Rousseff has seized on the NSA disclosures as an opportunity to broaden Brazil’s influence not
only in the Internet governance field, but also on a broader range of geopolitical issues. Her decision not
to attend an October 2013 meeting with President Barack Obama at the White House was a direct
response to NSA spying—and a serious, high-profile snub. In addition to cancelling what would have
been the first state visit by a Brazilian president to the White House in nearly 20 years, Rousseff’s
decision marked the first time a world leader had turned down a state dinner with the President of the
United States.223 In his statement on the postponement, President Obama was forced to address the
issue of NSA surveillance directly, acknowledging “that he understands and regrets the concerns
disclosures of alleged U.S. intelligence activities have generated in Brazil and made clear that he is
committed to working together with President Rousseff and her government in diplomatic channels to
move beyond this issue as a source of tension in our bilateral relationship.”224
Many observers have noted that the Internet Freedom agenda could be one of the first casualties of the
NSA disclosures. The U.S. government is fighting an uphill battle at the moment to regain credibility in
international Internet governance debates and to defend its moral high ground as a critic of
authoritarian regimes that limit freedom of expression and violate human rights online. Moreover, the
fallout from the NSA’s surveillance activities has spilled over into other areas of U.S. foreign policy and
currently threatens bilateral relations with a number of key allies. Going forward, it is critical that
decisions about U.S. spying are made in consideration of a broader set of interests so that they do not
impede—or, in some cases, completely undermine—U.S. foreign policy goals.
Legitimacy is key to international leadership – solves all global problems
Stanley, 7 (Elizabeth Stanley, Ass Prof @ Georgetown, 7 “International Perceptions of US Nuclear Policy”
Sandia Report, http://www.prod.sandia.gov/cgi-bin/techlib/access-control.pl/2007/070903.pdf)
How important is soft power, anyway? Given its vast conventional military power, does the United
States even need soft power? Some analysts argue that US military predominance is both possible and
desirable over the long term, and thus soft power is not important. But a growing consensus disagrees.
These analysts argue that soft power is critical for four reasons. First, soft power is invaluable for
keeping potential adversaries from gaining international support, for “winning the peace” in
Afghanistan and Iraq, and for convincing moderates to refrain from supporting extremist terrorist
groups. Second, soft power helps influence neutral and developing states to support US global
leadership. Third, soft power is also important for convincing allies and partners to share the
international security burden.14 Finally, and perhaps most importantly, given the increasing
interdependence and globalization of the world system, soft power is critical for addressing most
security threats the United States faces today. Most global security threats are impossible to be
countered by a single state alone. Terrorism, weapons of mass destruction (WMD) proliferation, failed
and failing states, conflicts over access to resources, are not confined to any one state. In addition,
disease, demographic shifts, environmental degradation and global warming will have negative security
implications as well.15 All of these potential threats share four traits: (1) they are best addressed
proactively, rather than after they develop into full-blown crises; (2) they require multi-lateral
approaches, often under the umbrella of an international institution; (3) they are not candidates for a
quick fix, but rather require multi-year, or multi-decade solutions; and, (4) they are “wicked” problems.
Given these four traits, soft power is critical for helping to secure the international, multi-lateral
cooperation that will be necessary to address such threats effectively.
Backdoor access kills soft power
Overreach through back-door access wrecks US soft power
Wheeler, 14 - Marcy Wheeler is an independent journalist and PhD from the University of Michigan. She
specializes in civil liberties, technology, and national security. (Marcy, “The Drama Ahead: Google versus
America” 6/16, http://www.cato-unbound.org/2014/06/16/marcy-wheeler/drama-ahead-googleversus-america
This leaves one central drama to play out, in which Google and other tech companies (and to a much
lesser extent, a few telecoms) begin to push back against the NSA’s overreach. It’s not just that U.S.
cloud (and other tech) companies stand to lose billions as their clients choose to store data locally rather
than expose it easily to the NSA. It’s also that the NSA violated several aspects of the deal the Executive
Branch made six years ago with the passage of the FISA Amendments Act (FAA), Section 702 of which
authorizes the PRISM program and domestic upstream collection.
Congress passed the FISA Amendments Act several years after the New York Times’ exposure of the
illegal wiretap program, ostensibly to address a technical problem used to justify that program.
Technology had changed since the analog and radio world in place when FISA was first passed in 1978.
Now, much of the world’s communications – including those of extremists who were targeting America
– were sitting in Google’s and Yahoo’s and Microsoft’s servers within the United States. So Congress
authorized the NSA to conduct collection inside the United States on targets located outside of the
country (which swept up those who communicated with those targets, wherever they were located). In
exchange , the government and its supporters promised, it would extend protections to Americans who
were overseas.
Yahoo and Google played by the rules, as the PRISM slide released last June revealed. The data of both
Yahoo and Google have been readily available for any of the broad uses permitted by the law since
January 2009. Yet, in spite of the fact that the NSA has a legal way to obtain this Internet data inside the
United States using PRISM, the government also broke in to steal from Yahoo and Google fiber
overseas.
That’s an important implication of Sanchez’ point that “modern communications networks obliterate
many of the assumptions about the importance of geography.” American tech companies now store
data overseas, as well as in the United States. Americans’ data is mixed in with foreigners’ data
overseas. Many of the more stunning programs described by Snowden’s documents – the collection of 5
billion records a day showing cell location, NSA partner GCHQ’s collection of millions of people’s
intimate webcam images, and, of course, the theft of data from Google and Yahoo’s servers – may suck
up Americans’ records too.
Plus there’s evidence the NSA is accessing U.S. person data overseas. The agency permits specially
trained analysts to conduct Internet metadata contact chaining including the records of Americans from
data collected overseas. And in a Senate Intelligence Committee hearing earlier this year, Colorado
Senator Mark Udall asked hypothetically what would happen with a “a vast trove of U.S. person
information” collected overseas; the answer was such data would not get FISA protection (California
Senator Dianne Feinstein, the Intelligence Committee Chair, asked an even more oblique question on
the topic).
Udall and Feinstein’s questions show that a lot of this spying does not undergo the oversight Benjamin
Wittes and Carrie Cordero point to. Last year, Feinstein admitted her committee gets less reporting on
such spying. Even for programs overseen by FISA, the NSA has consistently refused to provide even its
oversight committees and the FISA Court real numbers on how many Americans get sucked into various
NSA dragnets.
Moreover, the government’s threat to tech companies exists not just overseas. When a group of tech
companies withdrew their support for the USA Freedom Act, they argued the bill could permit the
resumption of bulk collection of Internet users’ data domestically. In the past, that has always meant
telecoms copying Internet metadata at telecom switches, another outside entity compromising tech
companies’ services. As with the data stolen overseas, Internet metadata is available to the government
legally under PRISM.
In response to the news that the government at times bypasses the legal means it has to access Google’s
clients’ data, the tech giant and others have found new ways to protect their customers. That consists of
the new encryption Sanchez described – both of that fiber compromised overseas and of emails sent
using Google – but also the right to publish how much data the government collects. Even within the
criminal context, tech companies (including telecoms Verizon and AT&T) are challenging the U.S.
government’s efforts to use tech companies’ presence in the United States to get easy access to
customers’ data overseas.
The conflict between Google and its home country embodies another trend that has accelerated since
the start of the Snowden leaks. As the President of the Computer & Communications Industry
Association, Edward Black, testified before the Senate last year, the disclosure of NSA overreach did not
just damage some of America’s most successful companies, it also undermined the key role the
Internet plays in America’s soft power projection around the world : as the leader in Internet
governance , and as the forum for open speech and exchange once associated so positively with the
United States.
The U.S. response to Snowden’s leaks has, to a significant degree, been to double down on hard power,
on the imperative to “collect it all” and the insistence that the best cyberdefense is an aggressive
cyberoffense. While President Obama paid lip service to stopping short of spying “because we can,” the
Executive Branch has refused to do anything – especially legislatively – that would impose real controls
on the surveillance system that undergirds raw power.
NSA overreach wrecks US smart power
Donahoe, 14 - Eileen Donahoe served as U.S. ambassador to the United Nations Human Rights Council.
She is a visiting scholar at Stanford University's Freeman Spogli Institute for International Studies (“Why
the NSA undermines national security” Reuters, 3/6, http://blogs.reuters.com/greatdebate/2014/03/06/why-nsa-surveillance-undermines-national-security/
But this zero-sum framework ignores the significant damage that the NSA’s practices have done to U.S.
national security. In a global digital world, national security depends on many factors beyond
surveillance capacities, and over-reliance on global data collection can create unintended security
vulnerabilities.
There’s a better framework than security-versus-privacy for evaluating the national security implications
of mass-surveillance practices. Former Secretary of State Hillary Clinton called it “smart power.”
Her idea acknowledges that as global political power has become more diffuse, U.S. interests and
security increasingly depend on our ability to persuade partners to join us on important global security
actions. But how do we motivate disparate groups of people and nations to join us? We exercise smart
power by inspiring trust and building credibility in the global community.
Developing these abilities is as important to U.S. national security as superior military power or
intelligence capabilities.
I adopted the smart-power approach when serving as U.S. ambassador to the United Nations Human
Rights Council. Our task at the council was to work with allies, emerging democracies and human rightsfriendly governments to build coalitions to protect international human rights. We also built alliances
with civil society actors, who serve as powerful countervailing forces in authoritarian systems. These
partnerships can reinforce stable relationships, which enhances U.S. security.
The NSA’s arbitrary global surveillance methods fly in the face of smart power. In the pursuit of
information, the spy agency has invaded the privacy of foreign citizens and political leaders,
undermining their sense of freedom and security. NSA methods also undercut U.S. credibility as a
champion of universal human rights.
The U.S. model of mass surveillance will be followed by others and could unintentionally invert the
democratic relationship between citizens and their governments. Under the cover of preventing
terrorism, authoritarian governments may now increase surveillance of political opponents.
Governments that collect and monitor digital information to intimidate or squelch political opposition
and dissent can more justifiably claim they are acting with legitimacy.
For human rights defenders and democracy activists worldwide, the potential consequences of the
widespread use by governments of mass surveillance techniques are dark and clear.
Superior information is powerful, but sometimes it comes at greater cost than previously recognized.
When trust and credibility are eroded, the opportunity for collaboration and partnership with other
nations on difficult global issues collapses. The ramifications of this loss of trust have not been
adequately factored into our national security calculus.
What is most disconcerting is that the NSA’s mass surveillance techniques have compromised the
security of telecommunication networks, social media platforms, private-sector data storage and public
infrastructure security systems. Authoritarian governments and hackers now have a roadmap to
surreptitiously tap into private networks for their own nefarious purposes.
By weakening encryption programs and planting backdoor entries to encryption software, the NSA has
demonstrated how it is possible to infiltrate and violate information-security systems. In effect, the spy
agency has modeled anarchic behavior that makes everyone less safe.
Some have argued, though, that there is a big difference between the U.S. government engaging in
mass-surveillance activities and authoritarian governments doing so. That “big difference” is supposed
to be democratic checks and balances, transparency and adherence to the rule of law. Current NSA
programs, however, do not operate within these constraints.
With global standards for digital surveillance now being set, our political leaders must remember that
U.S. security depends upon much more than unimpeded surveillance capabilities. As German Chancellor
Angela Merkel, one of President Barack Obama’s most trusted international partners, has wisely
reminded us, just because we can do something does not mean that we should do it.
National security policies that fail to calculate the real costs of arbitrary mass surveillance threaten to
make us less secure. Without trusted and trusting partners, U.S. priority initiatives in complex global
negotiations will be non-starters.
The president, his advisers and our political leaders should reassess the costs of the NSA’s spy programs
on our national security, our freedom and our democracy. By evaluating these programs through a
smart-power lens, we will be in a stronger position to regain the global trust and credibility so central to
our national security.
Soft power solves everything
Soft power is necessary to facilitate international coalition building which is key
to solve a laundry list of existential threats
Nye, 15 - JOSEPH S. NYE, JR. is University Distinguished Service Professor at Harvard and former dean of
Harvard’s Kennedy School of Government (Interview by Christina Pazzanese, “America, still at top”,
Harvard Gazette, March 17, 2015, http://news.harvard.edu/gazette/story/2015/03/america-still-attop//DM)
GAZETTE: You say America’s dominance is not necessarily a direct result of economic power or military
might and that we still have significant soft-power advantages over other countries, including China.
What are some of those advantages, and how might we lose our ability to influence world events in the
coming years?
NYE: Soft power is the ability to get what you want through attraction rather than coercion or payment.
It’s an important component of America’s role in the world. It doesn’t replace the hard power of military
capability or economic capability, but it can be what’s sometimes called a “force multiplier,” something
that, if used in a smart way with your hard power, can make you more powerful by having hard and soft
power reinforce each other. If we were to turn inward, to be less accepting of the rest of the world, [or]
if we were to, in contrast, overextend ourselves as I think we did in the Iraq War, we could damage that
soft power and undercut our ability to help lead coalitions and networks and alliances that are necessary
for being able to provide leadership in the world.
GAZETTE: What challenges does China’s largely internal political focus and the increasing upward
mobility of many more of its citizens pose for it?
NYE: The good news for China is that they’ve raised hundreds of millions of people out of poverty and
developed a large middle class. The bad news is they haven’t figured out how to bring that middle class
into political participation. What we know is that when countries get to about $10,000-per-capita
income, there are increased demands for participation. China hasn’t quite figured out how to
accommodate that. So that’s one problem they face, what you might call the political transition.
Another problem they face is a demographic transition. China’s population is getting older as a result of
the one-child policy. And many Chinese say they “fear they’re going to grow old before they grow rich.”
A third problem is: Can they adapt their growth model, which has been heavily reliant upon export
industries based along the coast, and become more innovative and more oriented toward their
domestic market? Their plans are to do that, but they haven’t yet fully accomplished that. They may be
able to do this — that’s sometimes called the “middle-income trap,” that you reach a certain level on
the growth model that’s worked so far, and then you don’t develop the institutions and the capacity for
innovation that take you to the next level.
GAZETTE: You write: “The real problem for the United States is not that it will be overtaken by China or
another contender, but that it will be faced with a rise in the power resources of many others — both
state and non-state actors,” and that “the U.S. will be less able to control others.” Who are some of
these actors, and how will this diffusion of power likely play out?
NYE: Some of the actors are other large states like India, which will be the largest country in the world
by population by the middle of this century; Brazil; Indonesia, which is the largest Muslim country in the
world; perhaps Nigeria or South Africa — we don’t know how their fates are going to turn out. But the
point is there will be many more states that will have more power than they’ve had in the past. In
addition to those state actors, there are a lot of non-state actors who are empowered by the
information revolution. Perhaps the most dramatic of these would be cyber actors — “hacktivists” and
even cybercriminals and other such groups — who are able to do things that often in the past were
reserved to governments. So the combination of more state actors and more powerful non-state actors
makes a world in which it’s harder to get things done. This is sometimes called entropy, the inability to
get work done. ISIS is a very good example of such a non-state actor. But I worry more about entropy
than I worry about China.
GAZETTE: Does it dilute America’s overall power, or will it force us to rely on other strategies?
NYE: If we rely on other strategies, we can overcome this. If we see that our role is to organize coalitions
and networks to get things done, then we can repair the problems that this creates for American power.
But if we think that we can either do it ourselves or opt out of anybody doing it, then we’ll suffer the
consequences along with others. If you think of problems like global financial stability or dealing with
climate change or dealing with pandemics or dealing with transnational terrorism, these are not
problems that we can solve by ourselves. Our ability to manage those problems depends on our ability
to organize coalitions with others.
Soft power and cooperation is necessary to combat a laundry list of
transnational issues
Nye 12 - JOSEPH S. NYE, JR. is University Distinguished Service Professor at Harvard and former dean of
Harvard’s Kennedy School of Government. He is the author of The Powers to Lead and Soft Power: The
Means to Success in World Politics. (Joesph, “Diversifying American Power”, International
Relations.com, September 9, 2012, http://www.internationalrelations.com/2012/09/09/joseph-s-nye-jrdiversifying-american-power//DM)
Conventional wisdom has always held that the state with the largest military prevails, but in an
information age it may be that the state (or nonstate) with the best story will win. Soft or attractive
power becomes as important as hard military or economic power. Secretary of State Hillary Clinton has
said, “We must use what has been called ‘smart power,’ the full range of tools at our disposal.” Smart
power means the combination of the hard power of command and the soft power of attraction.
In today’s world, power resources are distributed in a pattern that resembles a complex, threedimensional chess game. On the top chessboard, military power is largely unipolar and the United States
is likely to remain the only superpower for some time. But on the middle chessboard, economic power
has already been multipolar for more than a decade, with the United States, Europe, Japan, and China as
the major players, and others gaining in importance.
The bottom chessboard is the realm of transnational relations that cross borders outside of government
control, and it includes non-state actors as diverse as bankers electronically transferring sums larger
than most national budgets at one extreme, and terrorists transferring weapons or hackers threatening
cyber-security at the other. It also includes new challenges like pandemics and climate change. On this
bottom board, power is widely dispersed, and it makes no sense to speak of unipolarity, multipolarity,
hegemony. The soft power to attract and organize cooperation will be essential for dealing with
transnational issues.
The problem for American power in the 21st century is that there are more and more things outside the
control of even the most powerful state. Although the United States does well on military measures,
there is increasingly more going on in the world that those measures fail to capture. For example,
international financial stability is vital to the prosperity of Americans, but the United States needs the
cooperation of others to ensure it. Global climate change too will affect the quality of life, but the
United States cannot manage the problem alone. And in a world where borders are becoming more
porous than ever to everything from drugs to infectious diseases to terrorism, America must help build
international coalitions and build institutions to address shared threats and challenges. In this sense,
power becomes a positive sum game. It is not enough to think in terms of power over others. One must
also think in terms of power to accomplish goals. On many transnational issues, empowering others can
help us to accomplish our own goals. In this world, networks and connectedness become an important
source of relevant power. The problem of American power is less one of decline, than realizing that even
the largest country cannot achieve its aims without the help of others.
Great power war impact
Legitimacy key to global stability - prevents great power war
Fujimoto 12 (Kevin Fujimoto 12, Lt. Colonel, U.S. Army, January 11, 2012, "Preserving U.S. National
Security Interests Through a Liberal World Construct," online:
http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Preserving-US-National-SecurityInterests-Liberal-World-Construct/2012/1/11)
The emergence of peer competitors, not terrorism, presents the greatest long-term threat to our
national security. Over the past decade, while the United States concentrated its geopolitical focus on
fighting two land wars in Iraq and Afghanistan, China has quietly begun implementing a strategy to
emerge as the dominant imperial power within Southeast Asia and the Indian Ocean. Within the next 2
decades, China will likely replace the United States as the Asia-Pacific regional hegemonic power, if not
replace us as the global superpower.1 Although China presents its rise as peaceful and non-hegemonic,
its construction of naval bases in neighboring countries and military expansion in the region contradict
that argument.
With a credible threat to its leading position in a unipolar global order, the United States should adopt a
grand strategy of “investment,” building legitimacy and capacity in the very institutions that will protect
our interests in a liberal global construct of the future when we are no longer the dominant imperial
power. Similar to the Clinton era's grand strategy of “enlargement,”2 investment supports a world order
predicated upon a system of basic rules and principles, however, it differs in that the United States
should concentrate on the institutions (i.e., United Nations, World Trade Organization, ASEAN, alliances,
etc.) that support a world order, as opposed to expanding democracy as a system of governance for
other sovereign nations.
Despite its claims of a benevolent expansion, China is already executing a strategy of expansion similar
to that of Imperial Japan's Manchukuo policy during the 1930s.3 This three-part strategy involves: “(i)
(providing) significant investments in economic infrastructure for extracting natural resources; (ii)
(conducting) military interventions (to) protect economic interests; and, (iii) . . . (annexing) via
installation of puppet governments.”4 China has already solidified its control over neighboring North
Korea and Burma, and has similarly begun more ambitious engagements in Africa and Central Asia
where it seeks to expand its frontier.5
Noted political scientist Samuel P. Huntington provides further analysis of the motives behind China's
imperial aspirations. He contends that “China (has) historically conceived itself as encompassing a “‘Sinic
Zone'. . . (with) two goals: to become the champion of Chinese culture . . . and to resume its historical
position, which it lost in the nineteenth century, as the hegemonic power in East Asia.”6 Furthermore,
China holds one quarter of the world's population, and rapid economic growth will increase its demand
for natural resources from outside its borders as its people seek a standard of living comparable to that
of Western civilization.
The rise of peer competitors has historically resulted in regional instability and one should compare “the
emergence of China to the rise of. . . Germany as the dominant power in Europe in the late nineteenth
century.”7 Furthermore, the rise of another peer competitor on the level of the Soviet Union of the Cold
War ultimately threatens U.S. global influence, challenging its concepts of human rights, liberalism, and
democracy; as well as its ability to co-opt other nations to accept them.8 This decline in influence, while
initially limited to the Asia-Pacific region, threatens to result in significant conflict if it ultimately leads to
a paradigm shift in the ideas and principles that govern the existing world order.
A grand strategy of investment to address the threat of China requires investing in institutions,
addressing ungoverned states, and building legitimacy through multilateralism. The United States must
build capacity in the existing institutions and alliances accepted globally as legitimate representative
bodies of the world's governments. For true legitimacy, the United States must support these
institutions, not only when convenient, in order to avoid the appearance of unilateralism, which would
ultimately undermine the very organizations upon whom it will rely when it is no longer the global
hegemon.
The United States must also address ungoverned states, not only as breeding grounds for terrorism, but
as conflicts that threaten to spread into regional instability, thereby drawing in superpowers with
competing interests. Huntington proposes that the greatest source of conflict will come from what he
defines as one “core” nation's involvement in a conflict between another core nation and a minor state
within its immediate sphere of influence.9 For example, regional instability in South Asia10 threatens to
involve combatants from the United States, India, China, and the surrounding nations. Appropriately,
the United States, as a global power, must apply all elements of its national power now to address the
problem of weak and failing states, which threaten to serve as the principal catalysts of future global
conflicts.11
Topicality
Counterplan answers
Replace 702 CP
AT: Replace 702 CP – terrorism link
Eliminating 702 wrecks terrorism investigations – individualized requirements
are too difficult to meet
Cordero, 15 - Director of National Security Studies, Georgetown University Law Center, Adjunct
Professor of Law (Carrie, “The Brennan Center Report on the FISA Court and Proposals for FISA Reform”
4/2, Lawfare, http://www.lawfareblog.com/brennan-center-report-fisa-court-and-proposals-fisa-reform
1. “End Programmatic Surveillance”…”or If Programmatic Surveillance Continues, Reform It”
One of the major criticisms of the government’s use of FISA to emerge in the recent debate is that the
Court has shifted from approving individual surveillance or search requests directed at a particular agent
of a foreign power or foreign power, to a practice of approving “programmatic” requests for collection
authority. The criticism is a repudiation of not only the bulk telephone metadata program, but also of
section 702 of FISA, which was added to the Act in 2008. Section 702 authorizes the Director of National
Intelligence and the Attorney General to issue directives to communications service providers under a
set of procedures and certifications that have been approved by FISC.
Referring to the collection authorized by Section 702 as “programmatic” can lead to misunderstanding.
Acquisition under section 702 is programmatic in the sense that the Court approves rules and
procedures by which the acquisition takes place. The Court does not, under section 702, make a
substantive finding about a particular target. It does not approve individual requests for collection.
Instead, the FISC approves the rules and procedures, and then intelligence community personnel abide
by a decision-making process in which there are actual intended targets of acquisition. In his February 4,
2015 remarks at Brookings, ODNI General Counsel Bob Litt described it this way:
“Contrary to some claims, this [section 702 collection] is not bulk collection; all of the collection is based
on identifiers, such as telephone numbers or email addresses, that we have reason to believe are being
used by non-U.S. persons abroad to communicate or receive foreign intelligence information.”
Regardless of the characterization, however, it is correct to say that section 702 allows the intelligence
community, not the Court, to make the substantive determination about what targets to collect against.
Those decisions are made consistent with intelligence community leadership and policymaker strategic
priorities, which Litt also discussed in his February 4th remarks. Targets are selected based on their
anticipated or demonstrated foreign intelligence value. And targeting decisions are subject to
continuous oversight by compliance, legal and civil liberties protection authorities internal to NSA, and
external at the Office of the Director of National Intelligence and the Department of Justice.
The question, then, is why was the change needed in 2008? And, if the Brennan Center’s
recommendation were accepted, what would be the alternatives? What follows is a shorthand answer
to the first question (which I previously addressed here): basically, the change was needed because the
pre-2008 definitions in FISA technically required that the government obtain a probable-cause based
order from the Court in order to collect the communications of Terrorist A in Afghanistan with Terrorist
B in Iraq. This was a problem for at least two reasons: one, as non-U.S. persons outside the United
States, Terrorist A and Terrorist B are not entitled to Constitutional protections; and two, the
bureaucratic manpower it took to supply and check facts, prepare applications and present these
matters to the Court were substantial. As a result, only a subset of targets who may have been worth
covering for foreign intelligence purposes were able to be covered.
This is an extremely condensed version of the justification for 702 and does not cover additional reasons
that 702 was sought. But, from my perspective, it is the bottom line, and one that cannot be overlooked
when suggestions are made to scale back 702 authority.
1ar – 702 stops terrorism
An individual court order requirement for U.S. persons effectively means it
would require a court order for any targeting of foreigners
Cordero, 15 - Director of National Security Studies, Georgetown University Law Center, Adjunct
Professor of Law (Carrie, “Focusing on 702: A Brief Reply to the Brennan Center’s Liza Goitein and Faiza
Patel” Lawfare, 4/10, http://www.lawfareblog.com/focusing-702-brief-reply-brennan-centers-lizagoitein-and-faiza-patel
Although Liza and Faiza say that they are not proposing a court order requirement when targeting a
foreigner overseas, replacing Section 702 “with a regime requiring an individual court order for the
interception of communications involving U.S. persons,” as they describe it, would likely do just that,
whether or not that is the intent of their proposal. I’ll highlight but one reason for now: as a practical
matter, the government cannot know, in advance, with whom a target will communicate . Any
communication from anywhere in the world could, potentially, “involve” a U.S. person or person in the
U.S. For example, a U.S. person or person in the U.S. could intentionally be sent an e-mail from a foreign
intelligence target overseas. Or, a U.S. person or person in the U.S. could be one of one several people
cc’d on an e-mail from a non-U.S. person overseas target. The variations on this theme are many. The
U.S. end might be of foreign intelligence value; it might not. The current set of approvals and procedures
under Section 702 would accommodate either situation, without resorting to submitting probable cause
based applications to the court to target a non-U.S. person foreign intelligence target who is outside the
United States.
Status Quo 702 standards are critical to effective counter terrorism strategies
Bennett 14*Managing Editor of Lawfare and a Fellow in National Security Law at the Brookings
Institution (Wells, “Pre-Release PCLOB Report on Section 702 of FISA”, Lawfare, 07/01/14,
http://www.lawfareblog.com/pre-release-pclob-report-section-702-fisa)//GK
The Section 702 program has enabled the government to acquire a greater range of foreign intelligence
than it otherwise would have been able to obtain — and to do so quickly and effectively. Compared with the “traditional” FISA process
under Title I of the statute, Section 702 imposes significantly fewer limits on the government when it targets
foreigners located abroad, permitting greater flexibility and a dramatic increase in the number of people who can
realistically be targeted. The program has proven valuable in the government’s efforts to combat terrorism as well as in other areas of
foreign intelligence. Presently, over a quarter of the NSA’s reports concerning international terrorism include
information based in whole or in part on Section 702 collection, and this percentage has increased every year since the statute
was enacted. Monitoring terrorist networks under Section 702 has enabled the government to learn how they operate, and to understand their
priorities, strategies, and tactics. In addition, the
program has led the government to identify previously unknown
individuals who are involved in international terrorism, and it has played a key role in discovering and disrupting specific
terrorist plots aimed at the United States and other countries.
Section 702 is critical to NSA counter-terrorism strategies
PCLOB 14 - independent, bipartisan agency within the executive branch established by the
Implementing Recommendations of the 9/11 Commission Act (“Report on the Surveillance Program
Operated Pursuant to Sec7on 702 of the Foreign Intelligence Surveillance Act”, 07/02/14,
https://www.pclob.gov/library/702-Report.pdf)//GK p.10
The Section 702 program has enabled the government to acquire a greater range of foreign intelligence
than it otherwise would have been able to obtain — and to do so quickly and effectively. Compared with the
“traditional” FISA process under Title I of the statute, Section 702 imposes significantly fewer limits on the
government when it targets foreigners located abroad, permitting greater flexibility and a dramatic increase
in the number of people who can realistically be targeted. The program has proven valuable in the government’s efforts to combat
terrorism as well as in other areas of foreign intelligence. Presently, over a quarter of the NSA’s reports concerning
international terrorism include information based in whole or in part on Section 702 collection, and this
percentage has increased every year since the statute was enacted. Monitoring terrorist networks under Section 702 has
enabled the government to learn how they operate, and to understand their priorities, strategies, and tactics. In
addition, the program has led the government to identify previously unknown individuals who are involved in
international terrorism, and it has played a key role in discovering and disrupting specific terrorist plots
aimed at the United States and other countries.
Removing section 702 means probable cause requirements would be applied to
foreign investigations
Cordero, 15 - Director of National Security Studies, Georgetown University Law Center, Adjunct
Professor of Law (Carrie, “The Brennan Center Report on the FISA Court and Proposals for FISA Reform”
4/2, Lawfare, http://www.lawfareblog.com/brennan-center-report-fisa-court-and-proposals-fisa-reform
Which brings us to the second question I posed above—what are the alternatives if Section 702
authority, were, as the Brennan Center recommends, repealed? One option is to revert to the pre-2008
practice: obtaining Court approval based on probable cause for non-U.S. persons located outside the
United States. The operational result would be to forego collection on legitimate targets of foreign
intelligence collection, thereby potentially losing insight on important national security threats. Given
the challenging and complex national security picture the United States faces today, I would think that
most responsible leaders and policymakers would say, “no thanks” to that option.
A second option would be to conduct the acquisition, but without FISC supervision. This would be a
perverse outcome of the surveillance debate. It is also, probably, in the current environment, not
possible as a practical matter, because an additional reason 702 was needed was to be able to serve
lawful process, under a statutory framework, on communications service providers, in order to
effectuate the collection.
In light of these options: collect less information pertaining to important foreign intelligence targets, or,
collect it without statutory grounding (including Congressional oversight requirements) and judicial
supervision, the collection framework established under 702 looks pretty good.
Links to politics
Section 702 reform unpopular
Eddington 15 –a former CIA imagery analyst, a former lobbyist, private researcher, author, and
Congressional staffer (Patrick, Surveillance reform wars continue”, The Hill, 06/15/15,
http://thehill.com/blogs/congress-blog/homeland-security/244891-surveillance-reform-warscontinue)//GK
The annual Intelligence Authorization bill has become the latest battleground in the ongoing Surveillance Reform War. The bill’s inclusion of
language that would bar the relatively independent Privacy and Civil Liberties Oversight Board from investigating the links between the NSA’s
surveillance programs and covert actions prompted a barrage of amendments to the bill. While originally scheduled to meet Wednesday
afternoon to decide on whether to approve any of the amendments submitted, the GOP majority abruptly cancelled the Rules Committee
meeting, possibly partly in response to the controversy over the attempt to limit the PCLOB’s oversight activities. Another flashpoint is the
attempt by Rep. Thomas Massie (R-Ky.) and Rep. Zoe Lofgren (D-Calif.) to reprise their success last year in moving through the House a
provision that would prevent the government from conducting warrantless searches of American’s stored communications under Sec. 702 of
the FISA Amendments Act. That same amendment would bar the government from mandating that American tech companies build in
encryption back doors. A version was successfully attached to the Fiscal Year 2016 Defense Department appropriations bill yesterday by a vote
of 255 to 174, but the Intel Auth version would make the provisions permanent. The battle over Massie’s Intelligence Authorization bill
amendment within the GOP conference has become heated, with House Intelligence Committee staff circulating talking points claiming that
“The Massie amendment would seriously damage national security and provide little benefit to Americans’ civil liberties.” Left out of the GOP
HPSCI memo is the fact that no less a figure than Director of National Intelligence James Clapper admitted that
Sec. 702 had in
fact been used to conduct warrantless searches of the stored communications of Americans—in violation of
the Fourth Amendment’s probable cause, warrant-based requirement. House surveillance hawks have been on the losing
end of several recent legislative fights, including the passage of the USA Freedom Act and a Massie-led
amendment to the annual Justice Department funding bill prohibiting the use of government funds to undermine encryption standards.
But the USA Freedom Act’s changes to surveillance law were limited to the illegal telephone metadata
program, which the government is seeking to restart—and any appropriations-related reforms may not survive the
legislative process. The situation in the Senate remains decidedly less favorable to surveillance reform
advocates. In a surprise move, Senate Majority Leader Mitch McConnell (R-Ky.) elected to attach a highly controversial cyber security bill to
the annual National Defense Authorization Act. The so-called Cybersecurity Information Sharing Act is opposed by dozens of groups, who
blasted the bill in a March 2015 letter. McConnell’s gambit failed last week when the amendment was derailed by a procedural vote, his second
defeat in as many weeks in his attempt to expand the government’s surveillance authorities. Whether surveillance reformers will be able to
consolidate their House gains remains to be seen. One thing does seem certain. The Surveillance Wars are far from over.
Ex Post CP
AT: Ex Post CP
State secrets doctrine means it’s impossible to determine the basis of a FISA
warrant ex post
Harper 14, University of Chicago Law School, U.S. Department of Justice, Civil Division, (Nick, “FISA’s
Fuzzy Line between Domestic and International Terrorism”, University of Chicago Law Review;
Summer2014, Vol. 81 Issue 3)//AK
Unfortunately, the following cases cannot definitively prove whether FISA currently operates as the
enacting Congress intended. Such knowledge is shielded from the public by several procedural
requirements that kick in when the government decides to prosecute an alleged international terrorist
using evidence derived from FISA surveillance. These procedures make it possible for the government to
push FISA’s targeting language past its limits and make discovery of such abuse especially difficult. This
potential for abuse makes even an imperfect inquiry into the government’s compliance all the more
necessary.
First, the bases for the vast majority of FISA warrants are never reviewed after they receive FISC
approval because of FISA’s unique notice procedures. FISA requires the government to provide notice to
a target of surveillance only when the government seeks to use information “obtained or derived from”
FISA surveillance in an adversarial proceeding.101 The majority of FISA wiretaps never result in criminal
prosecution and are therefore never reviewed by a district court.102 Once the government does decide
to prosecute based on evidence derived from FISA surveillance, it invites scrutiny of its probable cause
finding by a district court judge. However, if the government expansively interprets FISA’s
internationality requirement, it can avoid such oversight when it never uncovers a subsequent
international connection—the cases most likely to receive the greatest ex post scrutiny—simply by
exercising its prosecutorial discretion.
Second, even when the government does prosecute based on FISA-derived evidence, the barriers to
discovery of FISA warrant applications make it difficult to ascertain the government’s basis for initiating
FISA surveillance. Once a defendant files a motion to disclose the FISA application, FISA permits the
government to submit an affidavit from the attorney general stating that “disclosure or an adversary
hearing would harm the national security of the United States.”103 Needless to say, the government
presents this affidavit in response to every motion to disclose or suppress.104 And once the government
submits that affidavit, the district court judge can require disclosure only when “such disclosure is
necessary to make an accurate determination of the legality of the surveillance.”105 At the time of this
writing, only one court has ever deemed it necessary to require disclosure of FISA application materials,
and then only because the defendant’s counsel had top secret security clearance.106 Moreover, that
court was later reversed by the Seventh Circuit.107
One major problem with this practice is that the facts that constitute probable cause are never made
public. This makes it very difficult for district court judges (and defendants) to evaluate whether the
government has established a sufficient international connection. Furthermore, because the
government almost never has to reveal FISA applications, it is difficult for the defendant to even argue
that probable cause did not exist because he does not know when the surveillance started.108 While
the district court judge does see the application, his or her estimation of probable cause could be
affected by hindsight bias in cases in which sufficient international links are exposed as a result of the
surveillance. This is especially likely to occur considering that only the government is given the
opportunity to present arguments to the judge with the full set of facts.
Perm do both – the FAA includes ex post review mechanisms that solve the link
Blum, 9 (Stephanie, “WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS
FOR FUTURE SURVEILLANCE REFORM” 18 B.U. Pub. Int. L.J. 269, Spring, lexis)
If the Note's assertions are true, the FAA has one advantage over the traditional FISA in that the FAA
relies more on ex post mechanisms. For example, the FAA imposes reporting requirements to Congress
n253 and inspector general reviews, n254 rather than relying solely on ex ante warrants issued by a
secret court. While under the FAA the FISC issues ex ante certifications concerning the executive's
targeting and minimization procedures, these are programmatic reviews and not based on
individualized suspicion of suspects as is required by traditional FISA. Given the arguably limited
effectiveness of ex ante warrants issued by a secret court based on one-sided evidence, the FAA's
greater reliance on ex post review mechanisms could be viewed as a significant improvement over
traditional FISA. As Georgetown law professor Neal Katyal observed, "reporting requirements are
powerful devices" that promote external checks on excessive executive power. n255
In contrast, the high degree of judicial deference in ex ante review may simply result from quality
applications. Applications for traditional FISA warrants must survive considerable review by the
executive branch prior to submission to the FISC; hence, it can be presumed that some, if not many,
applications are not brought. As Alan Dershowitz notes, "although the FISA court has only rarely denied
requests for national security wiretaps, the very existence of this court and the requirement of sworn
justification serves as a check on the improper use of the powerful and intrusive technologies that are
permitted in national security cases." n256 Hence, there are two ways to look at ex ante review: one
could either argue that FISA "forces the executive to self-censor its requests," or that the judiciary is
"acting merely as a 'rubber stamp.'" n257 The reality is probably a little of both.
The FAA contains both ex ante and newly imposed ex post review mechanisms. While the ex ante review
under the FAA is not based on individualized determinations about suspects, but rather focuses on
programmatic reviews, because of its heavy ex post reporting mechanisms, it seems that the FAA
creates [*308] a balanced structure that may prevent executive branch abuse while still protecting the
nation from another terrorist attack.
Ex post review alone fails – courts lack institutional expertise to review
surveillance risks
Harvard Law Review, 8 – no author cited, “SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES
BY ELIMINATING EX ANTE JUDICIAL APPROVAL” http://cdn.harvardlawreview.org/wpcontent/uploads/pdfs/shifting_the_FISA_paradigm.pdf
2. Judicially Ordered Notice to Wrongfully Surveilled Persons. — Another approach would provide a
stronger statutory cause of action for improper surveillance, adding an ex post review function to the
FISC. Such a scheme would “provide compensation to individuals subject to the most grievous instances
of unlawful electronic surveillance” by giving the FISC power to “screen for these violations and
discretionarily notify an individual,” and then compensate him or her if appropriate.82 This approach is
commendable for attempting to remedy the lack of adversariality and the fact that improper
surveillance that occurs after a FISC order is issued — when either changed circumstances or invalid
governmental motives never come to light because the government does not attempt criminal
prosecution — may go unchecked.83 But the suggested remedy, to broaden notice by making a
“distinction . . . between disclosure that concretely threatens national security and disclosure that would
merely embarrass the government,” 84 seems unworkable. Such line drawing necessarily involves
crucial policy determinations that the courts are in a bad institutional position to make. Moreover, the
ability of the remedy to provide a check on the government seems at best dubious and could even be
viewed as permitting the government to purchase the ability to invade constitutional liberties.
Ex post is impossible to enforce and amounts to a rubber stamp
Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily Berman, Regulating
Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3,
http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5
The suggestion that the FISC approximate the role of traditional judicial review of agency decision
making to impose constraints on discretion will also fail to result in the preservation of civil liberties. As
an initial matter, it is unclear what the extent of the FISC’s review might be. Traditional judicial review of
administrative rules asks whether an agency’s action is consistent with the Constitution and its statutory
mandate or whether it is arbitrary or capricious.319 But when it comes to most intelligence-collection
rules, there is no constitutional or statutory standard against which a court could measure agency
compliance.320 One proposed solution to this baseline problem is to have the FISC review policy for
whether it is consistent with the intelligence agencies’ own stated objectives.321 Again, this proposal
fails to account for the fact that when the intelligence community is left to determine the rules of its
own conduct, concerns other than security will get short shrift. By asking intelligence agencies to
identify their own objectives and then subjecting their efforts to meet those objectives to judicial review
would replicate the current situation—where the constraints on agencies are limited to those that they
agree to place on themselves—but with the added legitimating feature of judicial imprimatur.
Another barrier to enlisting the FISC in intelligencecollection governance is that the intelligencecollection activities governed by the Guidelines extend beyond the scope of the FISC’s jurisdiction. The
FISC oversees electronic foreign intelligence surveillance and physical searches of premises connected
with foreign powers.322 It has no role in overseeing purely domestic surveillance of Americans absent
probable cause that those Americans are agents of a foreign power.323 The content of the Guidelines
and the activities they regulate—such as physical surveillance of Americans, infiltration of religious or
political groups, the use of informants, requests for internet history— rarely fall within the FISC’s
jurisdiction. Individuals who wish to challenge FBI activity—if they can establish standing—do not have
access to the FISC.324 Thus, it is unclear what role the FISC could play in reviewing many activities in
which the FBI engages.
The FISC, too, is likely to share the FBI and ODNI’s bias toward the security mission. Unless a recipient of
a FISC order challenges the legitimacy of that order, proceedings in the FISC are not subject to an
adversarial process.325 Instead, like magistrate judges considering whether to issue traditional search
warrants, FISC judges review unopposed government applications for surveillance orders.326 The FISC
thus receives only the Justice Department’s perspective—heavily informed by the FBI’s perspective—
about any given rule. This concern is compounded by the fact that even the judges themselves largely
hail from the law enforcement community—twelve of the fourteen judges who have served this year
are former prosecutors and one is a former state police director.327 Moreover, once selected by the
Chief Justice of the Supreme Court for FISC service, these judges are exposed to a constant stream of
government applications to engage in foreign intelligence collection detailing just how dangerous the
world can be and the important role that intelligence collection plays in combating those dangers.328
FISC involvement thus serves only to reinforce the pro-security perspective already embedded in the
development of domesticintelligence- collection policies.
Empirically true
Brand, 15 - Dean and Professor Emeritus and Chairman of the Center for Law and Global Justice,
University of San Francisco School of Law (Jeffrey, “Eavesdropping on Our Founding Fathers: How a
Return to the Republic's Core Democratic Values Can Help Us Resolve the Surveillance Crisis” 6 Harv.
Nat'l Sec. J. 16 Harv. Nat'l Sec. J. 1, lexis)
That prediction also came to pass. In 2005, the New York Times revealed the Bush Administration's
Terrorist Surveillance Program (TSP) that authorized warrantless surveillance on a massive scale that
clearly violated the dictates of FISA and the Patriot Act. Initially, the Bush Administration argued that the
program was legal, citing the 9/11 attacks and national security emergencies. Ultimately, a simpler path
was taken: the Administration went to and received ex post facto approval from the FISA court. n189 A
moment of accountability--the Bush Administration's acknowledgement that it had engaged in illegal
surveillance--was side-stepped by simply seeking the approval of the court charged with monitoring the
illegal activity, thereby making the Executive Branch unaccountable yet again. n190
The structure of the FISA court--shrouded in secrecy and devoid of any opposition to the government's
position--also took its toll on the accountability of the Executive Branch to the Congress, a consequence
that also had been roundly predicted during the FISA debates. Senators Abourezk, Hart, and Mathias
candidly acknowledged throughout the debates over S. 3197, "In depth congressional oversight is a
crucial element of the safeguards which justify embarking on the [FISA] legislative scheme." n191
Representative Ertel hoped that [*47] FISA's congressional reporting requirements would serve that
end. n192
Secrecy makes meaningful ex post review impossible
Setty, 15 - Professor of Law and Associate Dean for Faculty Development & Intellectual Life, Western
New England University School of Law (Sudha, “Surveillance, Secrecy, and the Search for Meaningful
Accountability” 51 Stan. J Int'l L. 69, Winter, lexis)
The extent of congressional knowledge regarding the NSA Metadata Program is not fully known to the
public and has been the subject of significant debate. Nonetheless, even assuming that Congress was
sufficiently informed as to the potential reach of the PATRIOT Act with regard to surveillance n59 and,
therefore, that the statutory authority for the bulk data collection and storage was sound, the ability of
Congress to effect significant and meaningful ex post oversight appears to be severely limited .
Historically, congressional hearings and investigations have been a powerful tool to rein in executive
branch overreaching. n60 However, it seems that the extreme secrecy surrounding the NSA surveillance
programs undermined the efficacy of these oversight powers, to the point that they may have been
reduced to an ersatz form of accountability. One prominent example stems from a Senate oversight
hearing on March 12, 2013, in which Senator Ron Wyden specifically asked Director of National
Intelligence James Clapper if the NSA was systematically gathering information on the communications
of millions of Americans. n61 Clapper denied this, yet subsequent revelations confirmed that the broad
scope of the data collection included metadata for telephonic communications, as well as content data
for emails, texts, and other such writings. n62 After public discussion of the discrepancy in his testimony,
Clapper commented that he gave the "least most untruthful" answer possible under the circumstances.
n63 Senator Wyden expressed disappointment and frustration that even while under oath at an
oversight hearing, Clapper misled the Senate. n64
The ability for congressional oversight is further hampered by a general lack of access to information
about the details of the NSA Metadata Program n65 and [*82] lack of ability to discuss publicly
whatever knowledge is shared with Congress. n66 In fact, it remains unclear whether senators, including
Dianne Feinstein, Chair of the Senate Intelligence Committee, knew of the lapses in NSA procedure until
after such information was leaked to news sources. n67 Further revelations indicate that administration
statements made to Congress even after the Snowden disclosures were not entirely accurate. n68 These
examples are not determinative, but taken together, they raise significant doubt to the extent of
accurate information regarding surveillance programs being made available to congressional oversight
committees, and whether the oversight committees can function as effective accountability measures
n69 without the benefit of illegally leaked information such as the Snowden disclosures.
FISC review only has a weak effect on executive deterrence
Setty, 15 - Professor of Law and Associate Dean for Faculty Development & Intellectual Life, Western
New England University School of Law (Sudha, “Surveillance, Secrecy, and the Search for Meaningful
Accountability” 51 Stan. J Int'l L. 69, Winter, lexis)
The FISC differs from Article III courts in numerous ways: Its statutory scope is limited to matters of
foreign intelligence gathering; its judges are appointed in the sole discretion of the Chief Justice of the
United States Supreme Court; its proceedings are secret; its opinions are often secret or are published in
heavily [*83] redacted form; and its process is not adversarial as only government lawyers make
arguments defending the legality of the surveillance being contemplated. n70 Many of these differences
bring into doubt the legitimacy of the court, its ability to afford adequate due process regarding civil
liberties concerns, and its ability to uphold the rule of law in terms of government accountability.
Compounding this legitimacy deficit is the FISC's own loosening of the relevance standard under
Section 215 of the PATRIOT Act such that the FISC has found that bulk data collection without any
particularized threat or connection to terrorism is legally permissible. n71
Historically, the FISC has rejected NSA surveillance applications too infrequently to be considered a
substantial check on government overreach as an ex ante matter. n72 As an ex post matter, it is unclear
to what extent the FISC's work guarantees any meaningful accountability over NSA surveillance
activities. On the one hand, because the FISC lacks an adversarial process and has no independent
investigatory authority, the FISC only addresses ex post compliance problems when the government
itself brings the problem to the court's attention. n73 As such, FISC judges rely on the statements of the
government as to the government's own behavior and lack the authority to investigate the veracity of
the government's representations. n74 For example, in 2011, the FISC found one aspect of the
surveillance program - brought to its attention months after the program went into effect n75 - to be
unconstitutional. n76 Additionally, in one declassified opinion, the FISC critiques the NSA's sloppy overcollection of metadata of U.S. communications, and questions the efficacy of bulk data collection as a
national security measure. n77 At one point, the FISC sanctioned the NSA for overreaching in [*84]
saving all metadata and running daily metadata against an "alert list" of approximately 17,800 phone
numbers, only 10% of which had met FISC's legal standard for reasonable suspicion. n78 On such
occasions, the administration has modified problematic aspects of the surveillance and continued
forward without further impediment by the FISC. n79
On the other hand, the fact that the NSA itself has brought potential compliance incidents to the notice
of the FISC n80 indicates at least some internal policing of these programs. However, this is hardly an
effective substitute for external review and accountability mechanisms that would ensure that
consistent controls are in place. Further, the self-reporting of these compliance incidents does not in any
way allow for discourse over the larger structural questions surrounding the surveillance programs.
Finally, the ability of the FISC to act as an effective check on NSA overreaching is severely limited by the
secrecy and lack of information available to the FISC judges. Judge Reggie B. Walton, formerly the Chief
Judge of the FISC, lamented that "the FISC is forced to rely upon the accuracy of the information that is
provided to the Court ... . The FISC does not have the capacity to investigate issues of noncompliance ...
." n81 The ability of the NSA to not only gather and retain bulk metadata, but also to build in backdoor
access into data files despite private encryption efforts has been largely sanctioned by the FISC based on
NSA representations as to the seriousness of the security threats posed to the nation. n82 In an
environment in which there is a tremendous fear of being held responsible for any future terrorist
attack that might occur on U.S. soil, n83 and in which there is a [*85] information deficit for those
outside of the intelligence community, the FISC has consistently deferred to the NSA's assertions and
has not been able to act as an effective accountability mechanism.
Ex post fails – hindsight bias and secrecy
Morgan, 8 - Law Clerk to the Honorable Samuel H. Mays, Jr., United States District Court for the Western
District of Tennessee. J.D., 2007, New York University School of Law (Alexander, “A BROADENED VIEW
OF PRIVACY AS A CHECK AGAINST GOVERNMENT ACCESS TO E-MAIL IN THE UNITED STATES AND THE
UNITED KINGDOM” 40 N.Y.U. J. Int'l L. & Pol. 803, Spring, lexis)
Ex post judicial review is compromised by hindsight bias. n192 Strict reliance on ex post approaches
presupposes that judges charged with determining the sufficiency of original [*836] search
justifications are capable of ignoring potentially inculpatory evidence since uncovered. As with the
notion of a disinterested Home Secretary, this appears at odds with human nature. n193
The delay or outright denial of notice to search targets minimizes the efficacy of judicial review. Without
notice, "the majority of interferences with privacy will be undetected," and most will only learn that
they were surveillance targets if criminal charges follow. n194 By implication, the true extent of
surveillance (and any abuse) remains unknown. n195 Untimely notice also compromises the value of
judicial review because the court will be privy to the fruits of a search already conducted and thus
susceptible to hindsight bias. In the United Kingdom, the Home Secretary never gives notification, n196
and delayed notice is fast growing in the United States through the use of "sneak and peek" warrants.
n197 Gauging the scope of surveillance in the United Kingdom is further frustrated by non-responsive
Tribunal decisions which "simply state whether the determination is favourable ... thus, not necessarily
revealing [if] there has been any interception or its details." n198
[*837] Independent monitors such as the Interception of Communications Commissioner are prone to
hindsight bias and also suffer from distinct shortcomings due to their generalized function. Their general
charge allows them to uncover and address (through recommendations to Parliament) systemic defects
more easily, unlike courts, which are limited to case-by-case review. The converse is that monitors lack
authority to remedy any specific abuses they uncover. n199 Above all, commentators characterize
monitors as helpless because there are too many authorizations to oversee, such that "not all
authorisations are subject to scrutiny; only those selected at random." n200 In sum, the government's
power to withhold notice precludes targets from seeking judicial review, and the result is that many
authorizations are never held "to any form of independent scrutiny." n201
Standing doctrine makes judicial review impossible
Slobogin, 15 – Professor of Psychiatry and Director of Criminal Justice Program at Vanderbilt University
(Christopher, “Standing and Covert Surveillance”, Vanderbilt University Law School Public Law and Legal
Theory, 18 February 2015, Pepperdine Law Review, Forthcoming; Vanderbilt Public Law Research Paper
No. 15-5. , http://ssrn.com/abstract=2567070//gg
By all reports, covert government surveillance activities— surveillance programs meant to be kept secret
from the general public—have expanded tremendously in scope since September 11, 2001.1 Because
much of this surveillance is conducted without a warrant or probable cause, it may violate the Fourth
Amendment or some other constitutional provision.2 But to make that argument in court a litigant must
have standing, which according to the Supreme Court exists only when the challenger can make a
plausible claim of “injury” that is “concrete, particularized, and actual or imminent; fairly traceable to
the challenged action; and redressable by a favorable ruling.”3 Precisely because much modern-day
surveillance is covert, this demanding standing test may be impossible to meet.4 If so, unconstitutional
surveillance programs may be immune from judicial review .5
The NSA and FISA lack notice requirements creating an impossible standing
Slobogin, 15 – Professor of Psychiatry and Director of Criminal Justice Program at Vanderbilt University
(Christopher, “Standing and Covert Surveillance”, Vanderbilt University Law School Public Law and Legal
Theory, 18 February 2015, Pepperdine Law Review, Forthcoming; Vanderbilt Public Law Research Paper
No. 15-5. , http://ssrn.com/abstract=2567070//gg
Thanks to Edward Snowden, the federal government—up to and including President Obama—has been
forced to confirm that the National Security Agency is vacuuming up every phone number we text and
call, and is then subjecting this “metadata” to queries to determine which numbers link with known or
suspected terrorists.9 Press reports suggest that the NSA is also engaging in numerous other types of
“panvasive” surveillance (that is, surveillance that cuts across wide swaths of the population with no
particularized reason to suspect any given subject of terrorist activity or other wrongdoing).10 F.
Michael Maloof of WND has asserted that “[t]he National Security Agency already has access to all the
content of intercepted emails and phone calls, not just the ‘metadata’ such as who contacted who[m],
when and where.”11 Glenn Greenwald, the Guardian journalist who is Snowden’s main conduit to the
outside world, has described XKeyscore, “[a] top secret National Security Agency program” that
purportedly “allows analysts to search with no prior authorization through vast databases containing
emails, online chats and the browsing histories of millions of individuals.”12 Via a program code-named
“Optic Nerve,” the NSA and its British counterpart reportedly have been amassing webcam images of
millions of Yahoo users since at least 2008.
13 A newly disclosed malware program known as “Turbine” allegedly allows the NSA to hack into
computers, computer networks, and phone networks.14 Today Turbine affects thousands of people but
it is predicted to soon to reach “millions.”15 One calculation holds that the NSA “touches” roughly half
of all Internet communications and that, because 68% of those communications are spam, the agency
may have access to all meaningful communication on the Internet.16
Most of this surveillance takes place without any type of judicial authorization,17 or is authorized only
by the Foreign Intelligence Surveillance Court (FISC), which operates in secret.18 Although regulation of
these practices has recently ramped up, even today the decision about what to collect and what to
target and query is largely in the hands of executive agency officials.19 Thus, good arguments can be
made that much, if not all, of this surveillance is unconstitutional under the Fourth Amendment, the
First Amendment, separation of powers doctrine, or some combination thereof.20 But these arguments
may never be fully fleshed out in the courts because of the Supreme Court’s standing doctrine.
The Court’s recent decision in Clapper v. Amnesty International USA21 involved a challenge to section
702 of the Patriot Act, which allows the NSA to intercept communications of non-U.S. persons outside
the United States in the absence of individualized suspicion.22 Despite the plaintiffs’ showing that they
routinely made overseas calls to parties likely to be targeted under section 702, the Court denied them
standing, because they could not show that their calls were in fact intercepted and thus could not prove
that the injury they alleged due to the surveillance was either “actual” or “certainly impending.”
23 As the outcome in Clapper illustrates, because NSA surveillance is, by design, covert, the standing
requirement that plaintiffs allege a “concrete” injury can pose a serious obstacle to parties trying to
challenge it.24 The majority in Clapper nonetheless insisted that “our holding today by no means
insulates [section 702] from judicial review.”25 It noted that the Foreign Intelligence Surveillance Act
requires that the government give notice when it “intends to use or disclose [any] information obtained
or derived from [electronic surveillance]” in a criminal prosecution, and pointed out that, armed with
such notice, the defendant could mount a challenge to section 702.26
Unfortunately, the Court’s optimistic view of how the Foreign Intelligence Surveillance Act’s notice
requirement works was not accurate. First, for undetermined reasons, at the time Clapper was decided
the Department of Justice was not providing the required notice, despite Solicitor General Donald
Verilli’s assertion to the contrary during oral arguments in that case.27 Only in late 2013, apparently
after prodding from Verilli, did the DOJ reverse its policy and begin following the statute; even since
then, however, it is not clear that the DOJ has provided notice every time it is required to do so.28
Moreover, through a process known as “parallel construction,” the government has been known to
launder its surveillance results by surreptitiously providing them to investigators who, clued-in by the
covertly-obtained information, then pursue the investigation through more overt means.29 Thus, even
in connection with interceptions of the contents of electronic communications, standing may be hard to
come by.
More importantly for present purposes, no notice requirement analogous to the provision in section 702
exists in connection with other covert surveillance programs, in particular the metadata and PRISM
programs that collect phone and Internet information.3
Standing blocks judicial review even if the program is unconstitutional
Slobogin, 15 – Professor of Psychiatry and Director of Criminal Justice Program at Vanderbilt University
(Christopher, “Standing and Covert Surveillance”, Vanderbilt University Law School Public Law and Legal
Theory, 18 February 2015, Pepperdine Law Review, Forthcoming; Vanderbilt Public Law Research Paper
No. 15-5. , http://ssrn.com/abstract=2567070//gg
In sum, the federal government is engaged in widespread surveillance that, under current law as
construed by the Supreme Court, may not be challengeable as a practical matter. Programs that could
be blatantly unconstitutional might be allowed to continue unless and until the legislature or the
executive branch decides to shut them down.62 The Supreme Court has made clear that standing need
not be granted simply because unconstitutional government action may otherwise be immune from
judicial review.63 But any government practice that has occasioned as much controversy as the NSA’s
surveillance ought to be subject to such review if a plausible standing argument can be made. The next
two parts of this Article proffer such arguments.
AT: FISC public advocate
A FISA public advocate would just be ignored by the FISC
Slobogin, 15 – Professor of Psychiatry and Director of Criminal Justice Program at Vanderbilt University
(Christopher, “Standing and Covert Surveillance”, Vanderbilt University Law School Public Law and Legal
Theory, 18 February 2015, Pepperdine Law Review, Forthcoming; Vanderbilt Public Law Research Paper
No. 15-5. , http://ssrn.com/abstract=2567070//gg
Other possible mechanisms for challenging the metadata program and related programs are unlikely to
pick up the slack. Of course, as it has with communications interceptions, Congress could grant standing
(and require the predicate notice) to those criminal defendants who are aggrieved by metadata
surveillance.56 But because these programs are even more covert than the Section 702 warrant-based
interceptions involved in Clapper—and given the government’s penchant for engaging in “parallel
construction”57—the chances of such notice would probably be slim to none.58 Congress could also
create a special advocate in the Foreign Intelligence Surveillance Court to represent the interests of
those whose information is queried, a procedure endorsed by President Obama’s special commission
and included in the administration’s recently proposed legislation.59 But whether such an advocate’s
office could be counted on to overcome its governmental provenance and the nonchalance that can
come from proceeding in secret to develop into a vigorous advocate for individual constitutional claims
is at best unclear.60 Moreover, the advocate’s ability to appeal an adverse decision by the FISC is
tenuous.61
Footnote 60:
60 The history of similar internal oversight mechanisms does not inspire optimism in this regard. See
SIMON CHESTERMAN, ONE NATION UNDER SURVEILLANCE: A NEW SOCIAL CONTRACT TO DEFEND
FREEDOM WITHOUT SACRIFICING LIBERTY 80 (2011) (“Secrecy . . . . may facilitate cover-ups, block
investigators, or transform overseers into defenders. . . . [T]here are good reasons to be wary of any
structure that relies entirely on government actors.”).
A FISC public advocate fails – won’t solve cred and the state secrets privilege
allows circumvention
Cetina 14– John Marshall Law School (Daniel, “Balancing Security and Privacy in 21st century America: A
Framework for FISA Court Reform”, John Marshall Law Review, Summer 2014,
http://heinonline.org/HOL/Page?collection=journals&handle=hein.journals/jmlr47&type=Text&id=1540
)//DBI
2. Limitations
These good-faith proposals suffer from numerous flaws. Regarding the first proposal, the ideological
composition of the FISA Court and the judiciary's historic deference to the executive in matters of
foreign affairs113 - especially as applied to domestic defense 114 - suggest that a privacy advocate
would become a token figure without any influence. There is also the critical question of what role a
public advocate would actually assume. Indeed, a "permanently constituted advocate seeking injunctive
relief based on a violation of law in the interest of the general public might be viewed as engaging in a
government function ," but "a private party appointed temporarily to litigate on behalf of the public
might not be considered" a government agent. 115 This distinction could create Appointment Clause
issues.116 Also, the federal government may attempt to circumvent this agent by relying on the state
secrets privilege.117
Likewise, the second proposal suffers from problems. First, the FISA Court judges are appointed from
existing federal districts;118 hence, Congress has already confirmed them. But since the FISA Court is
not a traditional Article III court, 119 what role - if any - the Senate could have in potential confirmations
is unclear at best. Second, requiring a supermajority consensus on FISA Court decisions is a manifestly
unwise decision considering Congress's - and the country's - increasingly polarized nature. 120 Indeed,
absent a supermajority by the sitting president's party, it is highly unlikely Congress could reach such a
substantial threshold consensus on FISA Court surveillance decisions.121 The polarization argument
applies with equal force to the senatorial confrmation suggestion; such hypothetical confirmation
proceedings would arguably be even more rancorous and partisan than regular federal judgeship
confirmations 122 given the controversial nature of the FISA Court and the parties' mutual
obstreperousness. 123
In short, although the two highlighted proposals present promising prospects, their deficiencies
severely blunt their effectiveness . And while some of the proposed remedies may mitigate the
established system's problems from a practical perspective, more is needed to realize true reform. The
FISA Court, along with lower federal courts considering individual surveillance challenges, requires an
articulable substantive remedy that will fairly protect both security interests and privacy interests while
also providing judicial stability and a semblance of decisional uniformity.
Special advocate doesn’t solve and undermines FISA
Bates 14 – United States District Judge for the United States District Court for the District of Columbia,
B.A. from Wesleyan University, J.D. from the University of Maryland School of Law (John, Comments of
the Judiciary on Proposals Regarding the Foreign Intelligence Surveillance Act, ADMINISTRATIVE OFFICE
OF THE UNITED STATES COURTS, 1/10/14,
http://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Grassley.pdf)//JJ
The participation of a privacy advocate is unnecessary and could prove counterproductive in the vast
majority of FISA matters, which involve the application of a probable cause or other factual standard to
case-specific facts and typically implicate the privacy interests of few persons other than the specific
target. Given the nature of FISA proceedings, the participation of an advocate would neither create a
truly adversarial process nor constructively assist the Courts in assessing the facts, as the advocate
would be unable to communicate with the target or conduct an independent investigation. Advocate
involvement in run-of-the-mill FISA matters would substantially hamper the work of the Courts without
providing any commensurate benefit in terms of privacy protection or otherwise; indeed, such pervasive
participation could actually undermine the Courts' ability to receive complete and accurate
information on the matters before them.
In those matters in which an outside voice could be helpful, it is critical that the participation of an
advocate be structured in a manner that maximizes assistance to the Courts and minimizes disruption to
their work. An advocate appointed at the discretion of the Courts is likely to be helpful, whereas a
standing advocate with independent authority to intervene at will could actually be
counterproductive.
Counterplan decimates federal court effectiveness
Bates 14 – United States District Judge for the United States District Court for the District of Columbia,
B.A. from Wesleyan University, J.D. from the University of Maryland School of Law (John, Comments of
the Judiciary on Proposals Regarding the Foreign Intelligence Surveillance Act, ADMINISTRATIVE OFFICE
OF THE UNITED STATES COURTS, 1/10/14,
http://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Grassley.pdf)//JJ
The adoption of many of the measures discussed herein would impose substantial new responsibilities
on the FISC and ultimately the Court of Review. For the Courts to meet such new responsibilities
effectively and with the dispatch often required by national security imperatives, they would need to
receive commensurate augmentation of resources. Depending on what exactly is enacted, the
augmentation may require increased legal or administrative staff , additional judges or devotion of
more of the current judges' time to the work of the Courts, appointment of magistrate judges to work
on the FISC, and enhanced secure spaces and communications facilities. The provision of some of these
resources could well come at the expense of the work of judges in their home districts and circuits,
thereby negatively affecting the operations of their respective federal courts .
We also wish to stress, however, that even significantly increasing resources will not guarantee that all
proposed changes will be successful. Giving new responsibilities to the Courts, while also establishing
more elaborate procedures for the Courts to follow, may actually detract from their ability to identify
and resolve the issues that are most critical to national security and privacy interests. Thoughtful
assessment of the advantages and disadvantages of proposed changes is therefore crucial.
Special advocate fails and increases terror threat
Bates 14 – United States District Judge for the United States District Court for the District of Columbia,
B.A. from Wesleyan University, J.D. from the University of Maryland School of Law (John, Comments of
the Judiciary on Proposals Regarding the Foreign Intelligence Surveillance Act, ADMINISTRATIVE OFFICE
OF THE UNITED STATES COURTS, 1/10/14,
http://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Grassley.pdf)//JJ
In our view, some proposals that have been made - especially those that would create a full-time
independent advocate to oppose a wide range of government applications before the Courts - present
substantial difficulties that would not be resolved by simply increasing the Courts' resources. We
anticipate that this form of advocate participation would not only be cumbersome and resourceintensive , but also would impair the FISC's ability to receive relevant information , thereby degrading
the quality of its decisionmaking. We turn first to this question.
Special advocate fails and causes delay – can’t represent clients or evaluate
facts
Bates 14 – United States District Judge for the United States District Court for the District of Columbia,
B.A. from Wesleyan University, J.D. from the University of Maryland School of Law (John, Comments of
the Judiciary on Proposals Regarding the Foreign Intelligence Surveillance Act, ADMINISTRATIVE OFFICE
OF THE UNITED STATES COURTS, 1/10/14,
http://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Grassley.pdf)//JJ
Recent public debate has focused on matters such as NSA's bulk collection of call detail records under
Section 501 of FISA, codified at 50 U.S.C. § 1861, and the government's acquisition of information
pursuant to Section 702 of FISA , codified at 50 U.S.C. § 1881a. Such matters, however, comprise only a
small portion of the FISC's workload, measured either by number of cases or allocation of time. In all but
a small number of matters, the FISC's role is to apply a probable cause or other factual standard to
target-specific sets of facts and to assess whether the government's proposed minimization procedures
are adequate under the particular circumstances. The authorizations sought in the large majority of
cases do not implicate the privacy interests of many U.S. persons because the collections at issue are
narrowly targeted at particular individuals or entities that have been found to satisfy the applicable legal
standards. Nor, except in a small handful of cases, do such matters present novel or complex legal or
technical issues. Accordingly, as the President's Review Group on Intelligence and Communications
Technologies ("Review Group") has recognized, most FISA cases are similar to law enforcement
applications for search warrants and Title III wiretaps, which also are considered ex parte. Providing for
an advocate in the large majority of cases, then, would be superfluous and would create the unusual
situation in our judicial system of affording , at this stage of the proceedings, greater procedural
protections for suspected foreign agents and international terrorists than for ordinary U.S. citizens in
criminal investigations.
To be sure, genuinely adversarial processes, such as criminal or civil trials, provide an excellent means of
testing a party's factual contentions. But introducing an advocate into the FISA process would not
produce that result. Advocates of the type put forward in various proposals to change FISA would not
actually represent a proposed target of surveillance or any other particular client . For operational
security reasons, such an advocate would not be able to conduct an independent factual investigation ,
e.g., by interviewing the target or the target's associates. An advocate therefore would be of little, if
any, assistance in evaluating the facts of particular cases which, as noted above, is the heart of the
FISC's consideration in the large majority of cases.
Indeed, we are concerned that proposals to create a full-time advocate with the discretion to
participate, or seek leave to participate, in any or all cases would impair rather than improve the FISC's
ability to receive information and rule on applications in an effective and timely manner . Enhanced
resources would help the FISC overcome these impairments, but only to a limited extent. In order to
explain the reasons for these concerns, it is helpful to summarize how the FISC operates.
Advocates fails – delay and crushes effectiveness
Bates 14 – United States District Judge for the United States District Court for the District of Columbia,
B.A. from Wesleyan University, J.D. from the University of Maryland School of Law (John, Comments of
the Judiciary on Proposals Regarding the Foreign Intelligence Surveillance Act, ADMINISTRATIVE OFFICE
OF THE UNITED STATES COURTS, 1/10/14,
http://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Grassley.pdf)//JJ
Introducing an advocate into a substantial number of FISC proceedings would likely slow down and
complicate the Court's information-gathering and consideration of these fact- intensive cases. Under
current FISC rules and practice, in non-emergency cases the government is required to submit proposed
applications to the FISC within seven days of when it seeks to have the final application ruled upon. In
order for an independent advocate to have a meaningful opportunity to review an application, decide
whether he wishes to participate in its consideration, and prepare and submit views to the FISC, and for
the FISC to consider the advocate's submission together with the application, the government would
have to submit a proposed application substantially earlier than the present seven-day period. That
requirement would likely conflict with the government's interest and the public's interest to obtain
expedited consideration of an application or of successive applications when necessary to respond to a
rapidly evolving threat. Moreover, even relatively routine national security investigations often involve
changing facts, such that proposed applications would frequently require change or supplementation.
This process of keeping the FISC and the advocate apprised of changing circumstances over a longer
period of time would be cumbersome and time-consuming .
This prolonged period of consideration in routine cases would also complicate the assignment of
matters to FISC judges because such proceedings would likely extend beyond a judge's normal duty
week. The more cases in which an advocate is involved, the more likely it would be that the Court would
have to modify its current practice of having each FISC judge sit for one week at a time. A different
approach, requiring a judge to engage with FISC matters for longer periods, is likely to require more time
away from judges' home districts, to the detriment of their regular district court work.
The difficulties of such a process would be exacerbated by the need to interact on equal terms with the
applicant and the advocate. In order for the FISC to abide by the procedural and ethical requirements
that apply in adversarial proceedings, and for the advocate to appear on equal footing with the
applicant, the FISC would have to ensure that the advocate was involved in all such interactions in any
case in which the advocate may participate (or, if the advocate must seek leave to participate from the
FISC, perhaps only in those cases where such a request is pending or has been granted). We expect that
the logistical challenges of administering such a three-way process for more than a handful of cases
would be considerable. And even if it were appropriate under the terms of a specific enactment to limit
the involvement of the advocate in such interactions to cases where the advocate has sought or
received leave to participate, the FISC may well need to ensure that the advocate, upon entering a
matter, becomes fully apprised of any interactions that have already occurred.
Special advocate decimates FISA and FISC effectiveness
Bates 14 – United States District Judge for the United States District Court for the District of Columbia,
B.A. from Wesleyan University, J.D. from the University of Maryland School of Law (John, Comments of
the Judiciary on Proposals Regarding the Foreign Intelligence Surveillance Act, ADMINISTRATIVE OFFICE
OF THE UNITED STATES COURTS, 1/10/14,
http://www.judiciary.senate.gov/imo/media/doc/011413RecordSub-Grassley.pdf)//JJ
As a practical matter, a full-time advocate empowered to seek reconsideration in the FISC and to appeal
decisions to the Court of Review would significantly impact the operations of both Courts . An
increased number of reconsideration requests would pose scheduling and logistical challenges in the
FISC's current mode of operations. FISC judges frequently rule on cases toward the end of their duty
week, so in many cases it is highly unlikely that an advocate's request for reconsideration would even
be filed before a sitting judge from a district outside of the District of Columbia area returned to his or
her district. As a result, judges would need to arrange their regular district court schedules to allow for
an additional, return trip to Washington in the event a request for reconsideration were filed. If requests
for reconsideration became sufficiently common, the FISC would likely need to reexamine its current
one-week rotation schedule. Either approach would negatively affect judges' ability to perform their
district court duties.
Oversight CPs
AT: Congressional FISC appointments
Congressional FISC appointments won’t change the FISC
Cetina 14– John Marshall Law School (Daniel, “Balancing Security and Privacy in 21st century America: A
Framework for FISA Court Reform”, John Marshall Law Review, Summer 2014,
http://heinonline.org/HOL/Page?collection=journals&handle=hein.journals/jmlr47&type=Text&id=1540
)//DBI
Likewise, the second proposal suffers from problems. First, the FISA Court judges are appointed from
existing federal districts;118 hence, Congress has already confirmed them. But since the FISA Court is
not a traditional Article III court, 119 what role - if any - the Senate could have in potential confirmations
is unclear at best. Second, requiring a supermajority consensus on FISA Court decisions is a manifestly
unwise decision considering Congress's - and the country's - increasingly polarized nature . 120 Indeed,
absent a supermajority by the sitting president's party, it is highly unlikely Congress could reach such a
substantial threshold consensus on FISA Court surveillance decisions.121 The polarization argument
applies with equal force to the senatorial confrmation suggestion; such hypothetical confirmation
proceedings would arguably be even more rancorous and partisan than regular federal judgeship
confirmations 122 given the controversial nature of the FISA Court and the parties' mutual
obstreperousness. 123
In short, although the two highlighted proposals present promising prospects, their deficiencies
severely blunt their effectiveness . And while some of the proposed remedies may mitigate the
established system's problems from a practical perspective, more is needed to realize true reform. The
FISA Court, along with lower federal courts considering individual surveillance challenges, requires an
articulable substantive remedy that will fairly protect both security interests and privacy interests while
also providing judicial stability and a semblance of decisional uniformity.
AT: Whistleblowers CP
Surveillance disclosures pushed U.S. intelligence capabilities and credibility to
the brink – they collapse hegemony
Mukasey 14 – former U.S. Attorney General, judge for the Southern District of New York, B.A. from
Columbia, LL.B. from Yale (Michael, SAFE AND SURVEILLED: FORMER U.S. ATTORNEY GENERAL MICHAEL
B. MUKASEY ON THE NSA, WIRETAPPING, AND PRISM, National Security Law Journal, 3/25/14,
https://www.nslj.org/wp-content/uploads/3_NatlSecLJ_196-209_Mukasey.pdf)//JJ
What damage has been done to our national security by Snowden’s disclosure? Well, the Defense
Intelligence Agency has prepared a report for the House permanent subcommittee that’s classified, but
what is already clear is that although press reports have focused on NSA foreign intelligence collection,
much of the information that Snowden stole actually relates to current U.S. military operations, and in
the words of [House Permanent Select Committee on Intelligence] Chairman Mike Rogers, is likely to
have “ lethal consequences for our troops in the field.” According to the Ranking Member to the
Committee Dutch Ruppersberger, we have already seen terrorists changing their methods because of
Snowden’s leaks. The operations affected ranged beyond terrorism, into cybercrime, narcotics, and
human trafficking. A program in Latin America that helped rescue women in that part of the world from
human trafficking rings had to be abandoned because documents relating to it were leaked and the
identity of informants was compromised. Vital operations for all four of our military services have been
affected. The exposures as to foreign intelligence operations are potentially devastating . They include,
for example, an NSA report of self-assessment in fifty aspects of counterterrorism that reveals gaps in
our knowledge about the security of Pakistani nuclear material when it’s being transported; of the
capabilities of China’s next generation of fighter aircraft (that includes secrets that were stolen from our
own F35 planes back in 2007); of what plans Russian leaders might have to deal with destabilizing
events, such as large protests or terrorists incidents. The capabilities he has disclosed, thus far, include
how NSA intercepts e-mails, phone calls, and radio transmissions of Taliban fighters in Pakistan; the fact
that NSA is watching the security of Pakistan’s nuclear weapons; that NSA is capable of measuring the
loyalty of CIA recruits in Pakistan; [and] how NSA hacks into telephones in Honk Kong and the rest of
China. Just last weekend, The New York Times carried another leak from the Snowden trove, a story that
describes how NSA has tried— apparently successfully—to penetrate a Chinese manufacturer of
electronic equipment, including communications equipment, [of] Huawei, so that it could monitor what
purchasers of that equipment, including foreign governments, do with it. Right in the body of that story
was the revelation that the Times had withheld certain technical details from the story at the request of
the Obama administration, but nonetheless the Chinese government and Huawei are now on notice of
the effort and can set about taking steps to guard against it.
You want to imagine the nature of the damage that he has done? Think of someone disclosing the
acoustic signature of a nuclear submarine. That’s among the most closely guarded of secrets that we
have, because if it is disclosed, it makes that submarine—an investment of literally billions of dollars—
useless . That is the nature of what he has done to a lot our intelligence capabilities.
It is, of course, no accident that Snowden has wound up in Russia, whose geopolitical goals are
consistent with weakening U.S. intelligence. Russia itself is technologically and economically and
militarily a basket case, but undermining the capabilities of the United States can’t help [but even] the
playing field. The distortion in allocating resources is another byproduct of these disclosures. As you can
imagine, if a single disclosure is made, all possible sources of damage have to be considered and
mitigated to the extent possible. If means and methods are disclosed, adjustments have to be made. If
human assets are disclosed, steps have to be taken to get them and others with whom they may have a
relationship to safety. Two disclosures complicate the problem still further. When you have millions of
documents with varied disclosures, the problem of building a protective wall around what can be
salvaged in each case is one that could absorb virtually the entire resources of even the best- resourced
agency. And, of course, resources devoted to damage control are not then available for the active
protection of our national security. But that’s just the damage within our own intelligence community.
Relationships between the United States and Europe, between European nations themselves, are
undermined because confidence is undermined —and I’m not speaking of the Angela Merkel cellphone
problem. In fact, for years it had been an open secret in the intelligence community [that] Angela
Merkel used a conventional cell phone that could be overheard, and we were by no means the only
country that overheard it. The French were quite active in that regard. Besides, even if we were the only
country, if you’re dealing with a country like Germany that’s been champing at the bit trying to avoid
sanctions on Iran for years, you would certainly want to know what the leaders of that country is saying
in her less-guarded moments.
Rather, what I’m talking about is simply how seriously we can be taken by even our friends. If we can’t
keep secrets secure from somebody like Snowden, how willing do you think foreign intelligence agencies
will be to share information with us? Because the United States is a leader in the gathering of
intelligence , the result is to paralyze western intelligence capabilities and our self-defense . Snowden
and his public handlers . . . have sold the public in general, and some conservatives in particular, on the
idea that what they have disclosed is that the United States Government is secretly spying on all of its
citizens, on their communications, and indeed on all aspects of their lives—of any electronic interaction,
whether through e-mail, banking, telephone calls, card transactions, you name it. They portray Snowden
as romantic and idealistic rather than self-absorbed and traitorous—as someone who more closely
resembles Robin Hood or Paul Revere than Alger Hiss or Benedict Arnold. And the popular press, which
has an ongoing interest in being able to continue to get stories from the Snowden trough, has gone
along with the message in the way it reports information, which guarantees continued access.
What this has produced is kind of an odd coalition of the extreme left, which suspects and opposes any
intelligence-gathering programs [as] an actual or potential infringement of civil liberties, and the
libertarian right, which suspects any branch of government and delights in conjuring up images of Big
Brother so that the narrative of a spying and intrusive government comes very natural to them. As a
result, we saw in the last Congress that almost half of the House of Representatives voted to defund
the programs that I described, led by a coalition of libertarian Republicans and left-wing Democrats.
AT: Executive oversight CP
Internal oversight fails—only a credible perception of oversight solves
Rotenberg, EPIC President and Executive Director, 6-16-15 [Electronic privacy information
center, non-profit research and educational organization established in 1994 to focus
public attention on emerging privacy and civil liberties issues.12 We work with a distinguished panel of
advisors in the fields of law, technology and public policy., COMMENTS OF THE ELECTRONIC PRIVACY
INFORMATION CENTER, file:///C:/Users/Jonah/Downloads/EPIC-12333-PCLOB-Comments-FINAL.pdf]
Schloss2
EO 12333 requires the Intelligence Community to report to the President’s Intelligence Oversight Board (IOB), in a
manner consistent with EO 13462, intelligence activities that the Intelligence Community has reason to believe may be unlawful or
contrary to an executive order or presidential directive.188 Further, the National Security Act of 1947 requires that
Congress be kept “fully and currently informed” about “significant” intelligence activities.189 However, because EO 12333 activities
receive little oversight, the intelligence agencies are left to determine for themselves what “fully and
currently informed” means and thus what information it must share with Congress. So while there exists
a mechanism for oversight, the level of deference given to agencies to determine if they are acting
within the lawful bounds of their authority renders the oversight meaningless. “There’s no clear
definition,” said House Intelligence Committee member Adam Schiff, D-Calif., who discussed whether the NSA had briefed the committee
on its monitoring of German Chancellor Angela Merkel’s cellphone. “We need to have a bigger discussion of what our mutual understanding is
of what we want to be informed of.”190 Simply put, in order to determine whether civil liberties violations have in fact occurred under the
authority of EO 12333, significantly more information is required.191
Even Senator Diane Feinstein, the Chairwoman of the Senate Select Committee on Intelligence who has traditionally defended the
government's use of surveillance authorities, has said that her committee “has not
been able to sufficiently oversee the
programs run under EO 12333.”192 On a related issue, Reggie B. Walton, the FISA Court’s presiding judge, recently wrote that he
recognizes the “potential benefit of better informing the public” about secret surveillance activities.193 And lastly, most saliently stated by
President Obama, “for our intelligence community to be effective over the long haul, we must maintain the trust of the American people, and
people around the world.”194 In July of 2014, EPIC urged PCLOB to review the surveillance activities conducted under EO 12333.195 EPIC
explained how self-regulation
has proven to be ineffective in limiting surveillance overreach.196 While EO
12333 requires a court order to target a United States Person, mass surveillance the NSA conducts
overseas inevitably captures United States Person information.197 And then once captured, all information can
be used and shared without any order from a judge or oversight from Congress.198 Because EO “12333 does not
fall within the purview of the Foreign Intelligence Surveillance Court . . . no neutral arbiter reviews 12333 surveillance for compliance with the
Fourth Amendment.”199 As EPIC previously explained, “[t]he
minimal oversight in place does not even give the
appearance of the checks and balances provided by judicial or congressional oversight. Congress has
admitted to very little oversight of the activities under 12333.200
EPIC testified before Congress in 2012 on transparency and oversight concerns pertaining to the FISA Amendments. EPIC addressed both why
increased transparency is necessary for adequate oversight, and the need for increased oversight
authority.201 A key component to both facets of EPIC’s argument is the need for improved reporting on the activities
conducted under FISA, or analogously, EO 12333. EPIC’s President Marc Rotenberg stated in his testimony, “We might
disagree over whether the federal government engages in too much or too little electronic surveillance, but the annual report of the
Administrative Basis provides a basis to evaluate the effectiveness of wiretap authority, to measure its cost, to even determine the percentage
of communications captured that are relevant to an investigation. These reporting requirements ensure that law enforcement resources are
appropriately and efficiently used while safeguarding important constitutional privacy interests.”
AT: Judicial oversight CP
The state secrets privilege prevents the Supreme Court from ruling against the
government in surveillance cases
Cetina 14– John Marshall Law School (Daniel, “Balancing Security and Privacy in 21st century America: A
Framework for FISA Court Reform”, John Marshall Law Review, Summer 2014,
http://heinonline.org/HOL/Page?collection=journals&handle=hein.journals/jmlr47&type=Text&id=1540
)//DBI
Interestingly - and most problematically - there is not a seminal line of cases involving governmental
surveillance akin to, for example, First Amendment jurisprudence52 or civil rights jurisprudence, 5 3
both of which developed in relatively linear fashions. 54 The dearth of major surveillance cases may be
due to the veritable schizophrenia of salient legislation, which developed sporadically over several
decades. 55
Close examination of certain cases involving federal surveillance yields no discernable formula, test, or
framework to apply in future surveillance controversies. However, two common trends emerge in
surveillance cases: relying56 on the state secrets privilege57 and, relatedly, dismissing for nonjusticiability, 58 specifically lack of standing.59
The state secrets privilege frequently emerges in modern surveillance cases like Hepting v. AT&T.60
When the government is permitted to assert the state secrets privilege6' in the context of surveillance
cases, the privilege allows the government to withhold information regarding the very security
apparatuses and surveillance tactics from which plaintiffs seek relief .62 This withholding leaves
plaintiffs with the paradoxical task of demonstrating injuries that are, due in large part to the state
secrets privilege, incapable of being proven in court.6 3
This is where the justiciability problem arises . 64 Courts often determine that plaintiffs fail to assert
cognizable injuries. For example, in Laird v. Tatum,65 the Court reasoned that the plaintiffs fear of
future harm stemming from governmental surveillance was too attenuated66 and therefore
inappropriate for judicial rectification. 67
Courts cannot hold the government accountable for illegal surveillance now—
multiple cases prove
Greene 14 - John Marshall Law School, B.S. in Political Science (Michael, “Where Has Privacy Gone? How
Surveillance Programs Threaten Expectations Of Privacy”, The John Marshall Journal of Information
Technology & Privacy Law, Summer 2014,
http://heinonline.org/HOL/Page?handle=hein.journals/jmjcila30&div=36&g_sent=1&collection=journals
)//DBI
Suppose you are a member of an unpopular religious organization that has domestic U.S. offices and
international affiliates. You may understand that because of your religion others may be suspicious of
you, or that others do not trust you. If you were to discover that all of your communications had been
wiretapped, stored, and cataloged, and all of these documents and wiretaps and logs were mistakenly
delivered to your home, you would be able to sue the government for unreasonable search and
seizure.1 Unfortunately, that was not the case when, in 2012, the Ninth Circuit Court of Appeals in
California vacated the judgment in Al-Haramain Islamic Foundation, Inc. v. Obama,2 and dismissed the
case when the government invoked the “sovereign immunity” 3 and “state secrets” 4 privileges to
cover up a warrantless wiretap.5 Although the Islamic charity in Al-Haramain had received documents
and logs that outlined the warrantless wiretap of their organization, they were unable to sue the
government and ensure protection from overzealous and unconstitutional search and seizure.6
Unfortunately, the realization of Al-Haramain is not that government agencies possess the technology to
conduct such sweeping surveillance, but that even when they are caught and a plaintiff satisfies all
requirements to seek a relief, the government can protect itself from such lawsuits by invoking broad
protections like “sovereign immunity” or authorizations from intelligence gathering programs.7 AlHaramain is the first lawsuit that addressed recent changes in the authorization of national intelligence
gathering programs. Despite national attention given to this case, intelligence programs operated
unimpeded to absorb and catalog information and communications transmitted through the United
States.
It is fundamental that private citizens have the ability to challenge the constitutionality of policies and
laws that have been enacted and carried out by its representative government. In recent years, and
even months, there has been a deluge of information that has shed light on the abilities of national
intelligence agencies to gather information and records of the communications made by U.S. citizens.
Through information leaks by former workers, it has become known that millions of Americans have
been targeted by intelligence agencies with unprecedented access.8 These agencies have used pressure
on communication and service providers to give direct access to secure private communications with
impunity. With every new information leak, there is a growing distrust and want for change, but so far
plaintiffs do not have the legal ability to challenge these programs.
Clapper v. Amnesty International USA9 was the most recent law- suit addressing national intelligence
programs but it met equally challenging results.10 Clapper was dismissed by the Supreme Court of the
United States for a lack of showing that the plaintiff was injured by warrantless wiretaps.11 Clapper did
not address the important question of whether or not warrantless wiretaps are constitutional.12 The
dismissal created a Catch-22, criticizing secret government programs requires the very information
that the government refuses to disclose. 13 Now that these secret government programs have been
exposed through leaked classified documents, courts cannot be as dismissive without ad- dressing what
so many of these legal battles have been challenging.
Withholding info from defendants is unconstitutional and avoids challenges to
surveillance programs
Greene 14 - John Marshall Law School, B.S. in Political Science (Michael, “Where Has Privacy Gone? How
Surveillance Programs Threaten Expectations Of Privacy”, The John Marshall Journal of Information
Technology & Privacy Law, Summer 2014,
http://heinonline.org/HOL/Page?handle=hein.journals/jmjcila30&div=36&g_sent=1&collection=journals
)//DBI
While proponents for maintaining the current FISA programs have focused on the necessity of national
security, this rationale places the government in a difficult position. If FISA programs have used
information collected through a warrantless wiretap to convict a defendant, the government has yet to
disclose to the defendant that he was in fact monitored, which is a violation of Section 1881a.123 The
inability for a criminal defendant to defend evidence that has been obtained through these programs
violates the defendant’s constitutional right to confront accusers.124 This proves that the abilities for
U.S. citizens to challenge the constitutionality of the FAA of 2008, by Justice Alito’s standard,125 can
never be satisfied and that the FISA surveillance programs have violated constitutional protection of
unreasonable search and seizure under the Fourth Amendment. However, if the government does not
acknowledge the use of information obtained through these warrantless wiretapping programs, there is
no proof that it ”has worked” to stop future terrorist attacks.126
Following the standard created by Justice Alito in Clapper, a plaintiff must prove that an injury in fact is
directly traceable to a surveillance program conducted under Section 1881a.127 This requires that a
plaintiff either shows that the government had no other possible way of obtaining the information on
the target without using warrantless wire- taps or he has direct evidence of being wiretapped without
warrant. This is an impossible standard for plaintiffs to reach because it is a continually moving goal. It
allows for warrantless surveillance to be conducted whenever other alternative surveillance may be
possible. The difference is the breadth and oversight with more traditional routes of gathering
information that often requires a warrant, other than the programs set up in Section 1881a. Plaintiffs
will also have to show that they are actively targeted by the warrantless wiretap programs. Reading
Alito’s decision, plaintiffs are unable to prove an injury in fact based upon the apprehension of possible
surveillance or through collateral surveillance. This restricts plaintiffs’ abilities to challenge the FISA
programs because it narrowly reads Section 1881a “intentional targeting” parameters.128 Plaintiffs will
be hard-pressed to establish an intentional targeting from a collateral targeting when they have contacts
with foreigners. This is primarily a cataloging or descriptor of how surveillance has been conducted, and
skirts the protections for U.S. citizens. Without meeting both of these standards, U.S. persons are unable
to challenge FISA programs.
AT: Transparency CP
Transparency reforms fail – the problem is the surveillance itself is overbroad
Greene 14 - John Marshall Law School, B.S. in Political Science (Michael, “Where Has Privacy Gone? How
Surveillance Programs Threaten Expectations Of Privacy”, The John Marshall Journal of Information
Technology & Privacy Law, Summer 2014,
http://heinonline.org/HOL/Page?handle=hein.journals/jmjcila30&div=36&g_sent=1&collection=journals
)//DBI
SOR= Surveillance Order Reporting Act, STA= Surveillance Transparency Act of 2013
Next, analyzing the SOR Act and STA Act, the focus of these Acts are to push for a more immediate
resolution to some of the concerns that U.S. persons have regarding private companies turning over
their private information to government surveillance programs. However, these legislative pushes run
far shorter than the proposed legislation under the aforementioned ISOR Act. Currently, companies can
only report on the amount of data requests.156 While these requests can be reported in blocks of
1,000, a single request could encompass millions of users.157 The SOR and STA Acts would focus on
refining the language used in the FAA of 2008 to allow private companies to give more detailed reports
regarding the frequency and amount of user data that has been requested under FISC court orders.
All of the above being considered, the SOR and STA Acts are more likely to be passed in Congress and
moving onto the next stage of the legislation process, due to the substantial lobbying of the technology
industry and that these acts will not alter any significant parts of the FAA of 2008. Lobbying by several
large technology companies has increased support in the legislation that would give the companies
more ability to inform their customers and future users about information requests.158 These
companies hope that more transparency will alleviate customer’s concerns about information security.
Endorsement by technology companies also provides more persuasive support to the SOR and ACT Acts
by showcasing the private sector backing of these acts. However, both the SOR and STA Acts still fall
short of offering a substantive solution to the problems of implementing FISA programs because they
do not halt or change any of the policies currently used to collect information .
Standing CP
AT: Standing CP
Standing isn’t enough – clear legislative rules are vital to providing guidance for
courts
Seamon 8 – Professor, University of Idaho College of Law (Richard, “Domestic Surveillance for
International Terrorists: Presidential Power and Fourth Amendment Limits”, Hastings Constitutional Law
Quarterly, Spring 2008, http://www.hastingsconlawquarterly.org/archives/V35/I3/seamon.pdf)//DBI
Legislative rules enforcing the Fourth Amendment can facilitate judicial enforcement not only by
requiring prior judicial authorization for executive surveillance, but also by prescribing substantive
standards for the surveillance. Indeed, FISA prescribes an exhaustively considered standard for
surveillance. 20 0 Legislatively prescribed standards for surveillance can benefit from the legislature's
ability to gather information relevant to balancing government interests in surveillance against
individual privacy interests.20 1 Furthermore, legislatures may be able to make more clear standards
than the courts . Clear rules, in turn, help officials obey the law and give the public notice of what
privacy intrusions are authorized. 2 In addition, the public may better accept surveillance rules made by
their elective representatives than rules made by unelected federal judges.2 °3 Legislative rules can be
revised if they become unacceptable to the public. 0 4 Moreover, legislation can create remedies that
courts alone cannot -such as statutory restrictions on the use of information derived from
surveillance20 5 and sanctions for violations of those restrictions, including criminal sanctions,206 For
those reasons, courts have good reason to give significant weight to legislation that enforces Fourth
Amendment limits on surveillance.20 7
Standing isn’t enough – plaintiffs won’t be able to show they’ve been targeted
Greene 14 - John Marshall Law School, B.S. in Political Science (Michael, “Where Has Privacy Gone? How
Surveillance Programs Threaten Expectations Of Privacy”, The John Marshall Journal of Information
Technology & Privacy Law, Summer 2014,
http://heinonline.org/HOL/Page?handle=hein.journals/jmjcila30&div=36&g_sent=1&collection=journals
)//DBI
ISOR= Intelligence Oversight and Surveillance Reform Act
Analyzing ISOR first, the focus of this act is mainly on reforming the duties of the FISC court, as well as
creating a new form of “judicial constraint.”148 The shortcoming of ISOR is the significant changes to
the FAA of 2008 that are required for it to be implemented.149 The bulk of ISOR seeks to reform the
FISC court by implementing a “Constitutional Advocate to argue against the government when the FISC
is considering significant legal and constitutional questions.”150 This would require the creation of a
new pseudo regulatory agency tailored specifically to the FISC court. Creating this regulatory agency
would create several issues including budget and authority, specifically which branch of the federal
government would the agency be under. ISOR would also declassify significant FISC opinions, which
contain specific interpretations of the law or the Constitution and permit constitutional challenges for
law-abiding Americans who have been professionally impacted by the U.S. government’s collection of
communications.151 Although this would provide a framework for constitutional challenges by private
citizens, this does not address the inabilities for plaintiffs to prove that they were in fact targeted by
NSA surveillance programs.
Minimization procedures are also a significant part of ISOR’s attempt at regaining control over how
surveillance is conducted. ISOR would focus on reasserting the minimization procedures that have been
subverted by the FAA of 2008. The hope under the original FISA scheme was that a judge would act
upon his own volition to minimize the possibility of a U.S. citizen being directly targeted by surveillance
programs.152 However, minimization techniques have been impeded through the assured anonymity
that current FISC court judges have and the FAA of 2008’s elimination of the FISC judge’s power to
challenge the factual predicates of the government’s application.153
Disadvantage answers
Presidential powers
AT: Presidential powers DA
No link – exigent circumstances allows emergency presidential action
Seamon 8 – Professor, University of Idaho College of Law (Richard, “Domestic Surveillance for
International Terrorists: Presidential Power and Fourth Amendment Limits”, Hastings Constitutional Law
Quarterly, Spring 2008, http://www.hastingsconlawquarterly.org/archives/V35/I3/seamon.pdf)//DBI
The hypothetical surveillance order described above, covering all cell phone calls to and from the
doomed Flight 93, falls not only within the intrinsic limits of the President's powers under Article II but
also within the extrinsic limits imposed by the Fourth Amendment. Ordinarily, the Fourth Amendment
requires the government to get a warrant before electronically intercepting phone calls or reading their
mail (presumably including their e-mail). 146 In addition, the Fourth Amendment ordinarily requires a
particularized showing that the monitoring of each phone user is likely to reveal evidence of crime. 147
The traditional Fourth Amendment requirements of a warrant and an individualized showing of
probable cause for a search do not, however, apply to our Flight 93 scenario. The exigent circumstances
doctrine of Fourth Amendment law justifies immediate, warrantless surveillance of all cell phone users
on board the flight.148 Moreover, although the exigent circumstances doctrine normally requires a
particularized showing of probable cause of criminal activity, 149 that showing is unnecessary when
"special needs, beyond the normal need for law enforcement," make the probable cause requirement
impracticable. 50
The Flight 93 scenario thus illustrates the linkage between the President's congressionally irreducible,
intrinsic power under Article II to respond to genuine national security emergencies and extrinsic limits
on that power imposed by the Fourth Amendment. In a "genuine emergency," the President can take
immediate action reasonably necessary to protect national security- even if the action violates
statutory restrictions -and, if the President's action entails a search or seizure (as does Presidentially
authorized electronic surveillance), exigent circumstances in the "special needs" context of national
security will often excuse ordinary Fourth Amendment requirements. In short, the President's power
reasonably to respond to a genuine national security emergency not only is irreducible by Congress but
also satisfies the Fourth Amendment-even if the response entails warrantless, suspicionless searches
and seizures-as long as that response is reasonably justified by the emergency. 51
The perception of protection alone prevents a larger backlash against
presidential power
Small, 8 - United States Air Force Academy (Matthew, “His Eyes are Watching You: Domestic
Surveillance, Civil Liberties and Executive Power during Times of National Crisis”
http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf
In fact, reasonable arguments can be made that there is no clearly formed public mandate demanding
the consideration of an American citizen’s right to privacy as important, if not more so, than national
security. There exists only a concern of abridgement of their right, but this concern does not equate to
motivating factor for government constraint. Studies show that from 1974 to 1983 Americans perceived
little impact of privacy invasion, in its rare instances, on their lives (Katz and Tassone 1990, 125).
Simultaneously, however, Americans did not, and still do not,17 favor wiretaps regardless of the
presence of warrants (Katz and Tassone 1990, 130-131). Despite this, it appears that the public realizes
the necessity of the power of the president to abridge certain rights in order to ensure national security.
The public voices its concern but stops far short of forcing the government to restrain itself. Legislatures
listen to the “broad climate of opinion” (Gandy Jr. 2003, 285) and that climate allows President Bush to
act as he did.18 Like Abraham Lincoln, President Bush realized inadequacy within the government
institutions tasked with keeping America safe through the collection of information on internal threats.
In order to effectively combat terrorism, the NSA needed the ability to expand operations within the US.
President Bush, in the manner of his Civil War predecessor, expanded his power to better equip the NSA
to handle the threat. Court cases and legislation concerning wiretapping and intrusive domestic
surveillance techniques only establish guidelines to give degrees of protection, but more importantly
the perception of protection .19 This still leaves the president with the room to maneuver within these
guidelines to maintain national security at the expense of complete civil liberty.
Justice Black’s dissensions shed more light on this paradox that even though the courts deemed
warrantless wiretaps an invasion of privacy, they still continue. There remains those of the persuasion
that wiretapping is a viable information gathering tool and admissible in court with or without an
accompanying warrant because the Forth Amendment is not a protection of privacy. In American
history, domestic surveillance, later to include electronic surveillance, proved necessary to enforce those
laws passed by Congress that quelled rebellion and silenced dissidents. Presently, the USA Patriot Act
and other similar legislation requires an increase in domestic electronic surveillance in order to combat
terrorism; so in the interest of adhering to the letter and the spirit of the law, President Bush must
expand the use of domestic electronic surveillance.
President Bush took the precedent set by his predecessors and acted accordingly when the United
States plummeted into turmoil. What is important now is for the president to realize when his power
has reached its limit. The crux of the problem lies in justifying the remainder of a threat to American
citizens. While the attacks of 9/11 still linger within the American psyche and legislation supports
executive action, this task is less daunting. American citizens can stand some breaches in privacy but
those breaches must not be permanent. Popular sentiment and legislation may currently favor
expanded presidential power but President Bush, or any subsequent president, would be remiss in
assuming that it will remain as such for the duration of the struggle against international terrorism. The
fickle nature of public and Congressional support in the domestic intelligence realm thus requires a
great deal of prudence on the part of the president.
There are some indicators, albeit vague ones, of when domestic surveillance policy should yield to
citizens’ right to privacy. Following the progression witnessed during the Cold War it would be
reasonable to expect that opposition to presidential power would first come in the form of Supreme
Court rulings striking down certain powers as unconstitutional followed by public opinion more heavily
favoring the right to privacy and finally, legislation codifying judicial rulings in accordance with public
opinion. Court cases challenging the president’s power under the USA Patriot Act have already surfaced.
Both the American Civil Liberties Union (ACLU) and the Center for Constitutional Rights (CCR) have
already filed formal complaints against the executive branch. The CCR, in particular, directly attacked
the president’s power to conduct electronic surveillance without a court order as criminal under the
provisions of FISA. Similarly, the Electronic Frontier Foundation sued AT&T for violating free speech and
the right to privacy by aiding the NSA. Although the president has fought these allegations, fighting most
vehemently in the AT&T case, none of the cases reached the Supreme Court. The legal actions
precipitated neither legislative response nor changes in executive policy. If, however, the populous feels
so compelled as to bring the matter before the Supreme Court, the president risks losing the policy
initiative as one or more unfavorable rulings may force Congress to act on behalf of the right to privacy.
The president must take care to ensure that domestic surveillance policies are commensurate with the
actual national security threat.
Although the war has no foreseeable end, the president’s actions must have one. That end must be in
concert with Congress and must demonstrate to the American people that the security of the US, and by
default their own freedom, is better because of it. If not, the president risks losing all legitimacy and
having his power constrained to the point where neither he nor the agencies below him can effectively
protect the nation.
Terrorism answers
Overload turn
Narrowing targeting key to more effective surveillance- solves overload and
resource overstretch
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 13)//AK
Electronic surveillance is a valuable tool for both law enforcement and intelligence gathering, and one
we should continue to use. The problem is electronic surveillance on the entire population, especially
mass surveillance conducted outside of a narrow court order. As we saw in Chapter 11, it doesn’t make
us any safer. In fact, it makes us less safe by diverting resources and attention from things that actually
do make us safer. The solution is to limit data collection and return to targeted—and only targeted —
surveillance. Cybersecurity and information law researcher Axel Arnbak said about government
surveillance, “The front door governed by law; the backdoor governed by game theory.”
What he meant is that the targeted surveillance process is subject to probable cause, warrants, limits in
scope, and other laws designed to protect our security and privacy. Mass surveillance is subject to an
organization’s cold analyses of what it can collect and how likely it is to get away with it. When we give
the NSA the ability to conduct mass surveillance by evading the warrant process, we allow NSA staff to
think more in terms of what’s possible than in terms of what’s legal. We let them grow arrogant and
greedy, and we pay the price.
Bulk surveillance turns the traditional investigative process on its head. Under a normal sequence of
operations, law enforcement has reason to suspect an individual, and applies for a warrant to surveil
that person. Bulk surveillance allows law enforcement to surveil everyone—to develop grounds for
suspicion. This is expressly prohibited by the US Constitution, and with good reason. That’s why a 2014
UN report concluded that mass surveillance threatens international law.
We need legislation that compels intelligence agencies and law enforcement to target their surveillance:
both new legislation and new enforcement of existing legislation. That combination will give law
enforcement only the information it needs, and prevent abuse. The US Supreme Court took a baby step
in this direction in 2013 when it required police officers to obtain a warrant before attaching a GPS
tracking device to a suspect’s car, and another in 2014 when it required police officers to obtain a
warrant before searching the cell phones of people they stopped or arrested.
Mass surveillance makes it less likely to detect terrorism – overload
Tufekci, 15 - Zeynep Tufekci is an assistant professor at the University of North Carolina (“Terror and the
limits of mass surveillance” Financial Times, 2/3, http://blogs.ft.com/the-exchange/2015/02/03/zeyneptufekci-terror-and-the-limits-of-mass-surveillance/
But the assertion that big data is “what it’s all about” when it comes to predicting rare events is not
supported by what we know about how these methods work, and more importantly, don’t work.
Analytics on massive datasets can be powerful in analysing and identifying broad patterns, or events
that occur regularly and frequently, but are singularly unsuited to finding unpredictable, erratic, and rare
needles in huge haystacks. In fact, the bigger the haystack — the more massive the scale and the wider
the scope of the surveillance — the less suited these methods are to finding such exceptional events,
and the more they may serve to direct resources and attention away from appropriate tools and
methods.
After Rigby was killed, GCHQ, Britain’s intelligence service, was criticised by many for failing to stop his
killers, Michael Adebolajo and Michael Adebowale. A lengthy parliamentary inquiry was conducted,
resulting in a 192-page report that lists all the ways in which Adebolajo and Adebowale had brushes with
data surveillance, but were not flagged as two men who were about to kill a soldier on a London street.
GCHQ defended itself by saying that some of the crucial online exchanges had taken place on a platform,
believed to be Facebook, which had not alerted the agency about these men, or the nature of their
postings. The men apparently had numerous exchanges that were extremist in nature, and their
accounts were suspended repeatedly by the platform for violating its terms of service.
“If only Facebook had turned over more data,” the thinking goes.
But that is misleading, and makes sense only with the benefit of hindsight. Seeking larger volumes of
data, such as asking Facebook to alert intelligence agencies every time that it detects a post containing
violence, would deluge the agencies with multiple false leads that would lead to a data quagmire,
rather than clues to impending crimes.
For big data analytics to work, there needs to be a reliable connection between the signal (posting of
violent content) and the event (killing someone). Otherwise, the signal is worse than useless. Millions of
Facebook’s billion-plus users post violent content every day, ranging from routinised movie violence to
atrocious violent rhetoric. Turning over the data from all such occurrences would merely flood the
agencies with “false positives” — erroneous indications for events that actually will not happen. Such
data overload is not without cost, as it takes time and effort to sift through these millions of strands of
hay to confirm that they are, indeed, not needles — especially when we don’t even know what needles
look like. All that the investigators would have would be a lot of open leads with no resolution, taking
away resources from any real investigation. Besides, account suspensions carried out by platforms like
Facebook’s are haphazard, semi-automated and unreliable indicators. The flagging system misses a lot
more violent content than it flags, and it often flags content as inappropriate even when it is not, and
suffers from many biases. Relying on such a haphazard system is not a reasonable path at all.
So is all the hype around big data analytics unjustified? Yes and no. There are appropriate use cases for
which massive datasets are intensely useful, and perform much better than any alternative we can
imagine using conventional methods. Successful examples include using Google searches to figure out
drug interactions that would be too complex and too numerous to analyse one clinical trial at a time, or
using social media to detect national-level swings in our mood (we are indeed happier on Fridays than
on Mondays).
In contrast, consider the “lone wolf” attacker who took hostages at, of all things, a “Lindt Chocolat Café”
in Sydney. Chocolate shops are not regular targets of political violence, and random, crazed men
attacking them is not a pattern on which we can base further identification. Yes, the Sydney attacker
claimed jihadi ideology and brought a black flag with Islamic writing on it, but given the rarity of such
events, it’s not always possible to separate the jihadi rhetoric from issues of mental health — every era’s
mentally ill are affected by the cultural patterns around them. This isn’t a job for big data analytics. (The
fact that the gunman was on bail facing various charges and was known for sending hate letters to the
families of Australian soldiers killed overseas suggests it was a job for traditional policing).
When confronted with their failures in predicting those rare acts of domestic terrorism, here’s what
GCHQ, and indeed the NSA, should have said instead of asking for increased surveillance capabilities:
stop asking us to collect more and more data to perform an impossible task. This glut of data is making
our job harder, not easier, and the expectation that there will never be such incidents, ever, is not
realistic.
Attention should instead be focused on the causal chain that led the Kouachi brothers on their path. It
seems that the French-born duo had an alienated, turbulent youth, and then spent years in French
prisons, where they were transformed from confused and incompetent wannabe jihadis to hardliners
who were both committed and a lot more capable of carrying out complex violence acts than when they
entered the prison. Understanding such paths will almost certainly be more productive for preventing
such events, and will also spare all of us from another real danger: governments that know too much
about their citizens, and a misguided belief in what big data can do to find needles in too-large
haystacks.
Prefer the overload turn – former NSA analysts confirm it
Alhogbani, 15 – J.D. Candidate, The Catholic University of America, Columbus School of Law
(Abdulmajeed, “GOING DARK: SCRATCHING THE SURFACE OF GOVERNMENT SURVEILLANCE” 474
COMMLAW CONSPECTUS [Vol. 23)
Adrienne Kinne, a former analyst at the NSA, exposed the fact that she and her co-workers had been
spying on U.S. soldiers’ phone calls.279 During her tenure at NSA, she was listening in on “everyday,
average, ordinary Americans who happened to be in the Middle East, in our area of intercept and
happened to be making these phone calls on satellite phones.”280 The phone calls were intimate and
NSA employees “routinely shared salacious or tantalizing phone calls that had been intercepted, alerting
office mates to certain time codes of ‘cuts’ that were available on each operator’s computer.”281 These
are but a few of the known abuses that have occurred and should serve as a warning to supporters of
the NSA’s surveillance practices.
The bulk collection program is doing more harm than good, because “[b]y casting the net so wide and
continuing to collect on Americans and aid organizations, it’s almost like they’re making the haystack
bigger and it’s harder to find that piece of information that might actually be useful to somebody.”282
Kinne admits that she wasted a significant amount of time listening to innocent Americans, instead of
looking for terrorists in the huge net cast by the NSA’s surveillance program.283
Mass surveillance causes information overload
Eddington, 15 - Patrick Eddington is a policy analyst in homeland security and civil liberties at the Cato
Institute. He was formerly a senior policy advisor to Rep. Rush Holt (D-N.J.) and a military imagery
analyst at the CIA’s National Photographic Interpretation Center (“No, Mass Surveillance Won't Stop
Terrorist Attacks” Reason, 1/27, http://reason.com/archives/2015/01/27/mass-surveillance-andterrorism#.ltrezi:U8Io
No, mass surveillance does not prevent terrorist attacks.
It’s worth remembering that the mass surveillance programs initiated by the U.S. government after the
9/11 attacks—the legal ones and the constitutionally-dubious ones—were premised on the belief that
bin Laden’s hijacker-terrorists were able to pull off the attacks because of a failure to collect enough
data. Yet in their subsequent reports on the attacks, the Congressional Joint Inquiry (2002) and the 9/11
Commission found exactly the opposite. The data to detect (and thus foil) the plots was in the U.S.
government’s hands prior to the attacks; the failures were ones of sharing, analysis, and dissemination.
That malady perfectly describes every intelligence failure from Pearl Harbor to the present day.
The Office of the Director of National Intelligence (created by Congress in 2004) was supposed to be the
answer to the "failure-to-connect-the-dots" problem. Ten years on, the problem remains, the IC
bureaucracy is bigger than ever, and our government is continuing to rely on mass surveillance
programs that have failed time and again to stop terrorists while simultaneously undermining the civil
liberties and personal privacy of every American. The quest to "collect it all," to borrow a phrase from
NSA Director Keith Alexander, only leads to the accumulation of masses of useless information, making
it harder to find real threats and costing billions to store.
A recent Guardian editorial noted that such mass-surveillance myopia is spreading among European
political leaders as well, despite the fact that "terrorists, from 9/11 to the Woolwich jihadists and the
neo-Nazi Anders Breivik, have almost always come to the authorities’ attention before murdering."
Mass surveillance is not only destructive of our liberties, its continued use is a virtual guarantee of
more lethal intelligence failures . And our continued will to disbelieve those facts is a mental dodge we
engage in at our peril.
NSA surveillance fails to prevent terrorism threats- data mining fails- lack of
accuracy, too many false alarms, and data overload
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 11)//AK
The NSA repeatedly uses a connect-the-dots metaphor to justify its surveillance activities. Again and
again—after 9/11, after the Underwear Bomber, after the Boston Marathon bombings—government is
criticized for not connecting the dots. However, this is a terribly misleading metaphor. Connecting the
dots in a coloring book is easy, because they’re all numbered and visible. In real life, the dots can only be
recognized after the fact.
That doesn’t stop us from demanding to know why the authorities couldn’t connect the dots. The
warning signs left by the Fort Hood shooter, the Boston Marathon bombers, and the Isla Vista shooter
look obvious in hindsight. Nassim Taleb, an expert on risk engineering, calls this tendency the “narrative
fallacy.” Humans are natural storytellers, and the world of stories is much more tidy, predictable, and
coherent than reality. Millions of people behave strangely enough to attract the FBI’s notice, and almost
all of them are harmless. The TSA’s no-fly list has over 20,000 people on it. The Terrorist Identities
Datamart Environment, also known as the watch list, has 680,000, 40% of whom have “no recognized
terrorist group affiliation.”
Data mining is offered as the technique that will enable us to connect those dots. But while corporations
are successfully mining our personal data in order to target advertising, detect financial fraud, and
perform other tasks, three critical issues make data mining an inappropriate tool for finding terrorists.
The first, and most important, issue is error rates. For advertising, data mining can be successful even
with a large error rate, but finding terrorists requires a much higher degree of accuracy than datamining systems can possibly provide.
Data mining works best when you’re searching for a well-defined profile, when there are a reasonable
number of events per year, and when the cost of false alarms is low. Detecting credit card fraud is one
of data mining’s security success stories: all credit card companies mine their transaction databases for
spending patterns that indicate a stolen card. There are over a billion active credit cards in circulation in
the United States, and nearly 8% of those are fraudulently used each year. Many credit card thefts share
a pattern —purchases in locations not normally frequented by the cardholder, and purchases of travel,
luxury goods, and easily fenced items—and in many cases data-mining systems can minimize the losses
by preventing fraudulent transactions. The only cost of a false alarm is a phone call to the cardholder
asking her to verify a couple of her purchases.
Similarly, the IRS uses data mining to identify tax evaders, the police use it to predict crime hot spots,
and banks use it to predict loan defaults. These applications have had mixed success, based on the data
and the application, but they’re all within the scope of what data mining can accomplish.
Terrorist plots are different, mostly because whereas fraud is common, terrorist attacks are very rare.
This means that even highly accurate terrorism prediction systems will be so flooded with false alarms
that they will be useless.
The reason lies in the mathematics of detection. All detection systems have errors, and system designers
can tune them to minimize either false positives or false negatives. In a terrorist-detection system, a
false positive occurs when the system mistakenly identifies something harmless as a threat. A false
negative occurs when the system misses an actual attack. Depending on how you “tune” your detection
system, you can increase the number of false positives to assure you are less likely to miss an attack, or
you can reduce the number of false positives at the expense of missing attacks.
Because terrorist attacks are so rare, false positives completely overwhelm the system, no matter how
well you tune. And I mean completely: millions of people will be falsely accused for every real terrorist
plot the system finds, if it ever finds any. We might be able to deal with all of the innocents being
flagged by the system if the cost of false positives were minor. Think about the full-body scanners at
airports. Those alert all the time when scanning people. But a TSA officer can easily check for a false
alarm with a simple pat-down. This doesn’t work for a more general data-based terrorismdetection
system. Each alert requires a lengthy investigation to determine whether it’s real or not. That takes time
and money, and prevents intelligence officers from doing other productive work. Or, more pithily, when
you’re watching everything, you’re not seeing anything.
The US intelligence community also likens finding a terrorist plot to looking for a needle in a haystack.
And, as former NSA director General Keith Alexander said, “you need the haystack to find the needle.”
That statement perfectly illustrates the problem with mass surveillance and bulk collection. When
you’re looking for the needle, the last thing you want to do is pile lots more hay on it. More specifically,
there is no scientific rationale for believing that adding irrelevant data about innocent people makes it
easier to find a terrorist attack, and lots of evidence that it does not. You might be adding slightly more
signal, but you’re also adding much more noise. And despite the NSA’s “collect it all” mentality, its own
documents bear this out. The military intelligence community even talks about the problem of “drinking
from a fire hose”: having so much irrelevant data that it’s impossible to find the important bits.
We saw this problem with the NSA’s eavesdropping program: the false positives overwhelmed the
system. In the years after 9/11, the NSA passed to the FBI thousands of tips per month; every one of
them turned out to be a false alarm. The cost was enormous, and ended up frustrating the FBI agents
who were obligated to investigate all the tips. We also saw this with the Suspicious Activity Reports—or
SAR—database: tens of thousands of reports, and no actual results. And all the telephone metadata the
NSA collected led to just one success: the conviction of a taxi driver who sent $8,500 to a Somali group
that posed no direct threat to the US—and that was probably trumped up so the NSA would have better
talking points in front of Congress.
The second problem with using data-mining techniques to try to uncover terrorist plots is that each
attack is unique. Who would have guessed that two pressure-cooker bombs would be delivered to the
Boston Marathon finish line in backpacks by a Boston college kid and his older brother? Each rare
individual who carries out a terrorist attack will have a disproportionate impact on the criteria used to
decide who’s a likely terrorist, leading to ineffective detection strategies.
The third problem is that the people the NSA is trying to find are wily, and they’re trying to avoid
detection. In the world of personalized marketing, the typical surveillance subject isn’t trying to hide his
activities. That is not true in a police or national security context. An adversarial relationship makes the
problem much harder, and means that most commercial big data analysis tools just don’t work. A
commercial tool can simply ignore people trying to hide and assume benign behavior on the part of
everyone else. Government data-mining techniques can’t do that, because those are the very people
they’re looking for.
Adversaries vary in the sophistication of their ability to avoid surveillance. Most criminals and
terrorists—and political dissidents, sad to say—are pretty unsavvy and make lots of mistakes. But that’s
no justification for data mining; targeted surveillance could potentially identify them just as well. The
question is whether mass surveillance performs sufficiently better than targeted surveillance to justify
its extremely high costs. Several analyses of all the NSA’s efforts indicate that it does not.
The three problems listed above cannot be fixed. Data mining is simply the wrong tool for this job, which
means that all the mass surveillance required to feed it cannot be justified. When he was NSA director,
General Keith Alexander argued that ubiquitous surveillance would have enabled the NSA to prevent
9/11. That seems unlikely. He wasn’t able to prevent the Boston Marathon bombings in 2013, even
though one of the bombers was on the terrorist watch list and both had sloppy social media trails—and
this was after a dozen post-9/11 years of honing techniques. The NSA collected data on the Tsarnaevs
before the bombing, but hadn’t realized that it was more important than the data they collected on
millions of other people.
NSA surveillance fails - limitations of information processing
Barnhizer 13 - Professor Emeritus, Cleveland-Marshall College of Law (David, “Through a PRISM Darkly: Surveillance and Speech
Suppression in the “Post-Democracy Electronic State””, working paper, September 2013, p.56//DM)
It is within such a context I argue that even taking the good intentions of the creators of the NSA’s
surveillance programs at face value they are of very limited utility in practice. In part that is due to the
limits of human ability to process information, recognize its nuances and implications, convert even
accurate interpretations to forms capable of informing others, and convincing them of its significance
and the need to identify actions in real time that can eliminate or mitigate the threat.
There is a substantial degree of irony in the tragic fact that the two New York City bombings that were
attempted failed due to poor technical workmanship, not intelligence activity. The arrest of the bomber
in Washington state who was planning to attack LAX with explosives occurred largely by accidental
discovery at the border. The recent Boston Marathon bombing was not detected beforehand even
though there were clear indicators that indicated a potential threat. The Fort Hood murder by a serving
Army Major, Nidal Hasan, occurred even though he had exchanged e-mails with Anwar al-Awlaki and
had already made statements indicating a degree of radicalization.
As these examples suggest, “Who are we kidding” with the idea of a total information government data
gathering, interpretation and action network that is going to keep us secure against threats? We can
certainly do the data gathering and snooping on everyone and everything. We can “collect”. We can
“store”. We can do some interpretation. But bottom line is that a system that fails to understand the
limitations and vagaries of total data, the inadequacies of human interpretations and information
sharing, and the numerous blockages, delays and distortions of the policy makers that have to approve
action is a “social cancer” rather than a solution.
Cooperation turn
The perception of NSA overreach destroys law enforcement cooperation – it’s a
larger internal link to terrorism
Schulhofer, 13 – professor of law at NYU (Stephen, ““Making Sense of the NSA Metadata Collection
Program (Part II)”, 11/8, http://justsecurity.org/2985/making-sense-nsa-metadata-collection-programpart-ii/)
Efforts like the NSA sweeps actually undermine the counterterrorism effort itself. The reason is that
these types of programs generate profound mistrust of government in general and of law enforcement
in particular. We have already seen dramatic examples in the way that the Snowden revelations of our
spying on allies has angered European leaders and endangered our working relationships with them.
Although this breach eventually will be healed, alienation and mistrust among ordinary citizens is
equally important, and it will not be so easily remedied. That mistrust, in turn, has a strong chilling effect
on the willingness of law-abiding, loyal citizens to cooperate in the counterterrorism effort – for
example by working with officials in local counterterrorism programs or by alerting law enforcement to
various kinds of suspicious behavior. This dynamic has been demonstrated in several decades of
extensive law enforcement research, including research focused specifically on counterterrorism policies
and their impact on Muslim communities in the West. In one study, for example, Muslim-Americans in
New York City were 61% less likely to report potentially suspicious precursors of terrorism when they
felt that counterterrorism policies were being unfairly set and implemented. (See Schulhofer, Tyler &
Huq, American Policing at a Crossroads: Unsustainable Policies and the Procedural Justice Alternative,
101 J. Crim. L. & Criminology 335, 364-74 (2011).)
This last point underscores the most important, but least appreciated, “given” of the counterterrorism
enterprise. Because the consequences of a terrorist attack could be so catastrophic, citizens and public
officials alike tend to support strong law enforcement more readily than they do in ordinary times. The
perception is that strong measures are acceptable because the top priority must be to reduce the risk of
attack. And strong measures, whatever their drawbacks, at least seem to offer ways to reduce that risk.
The central lesson of smart law enforcement, however, is that there are no risk-free choices.
Strengthening the powers of the executive enhances some of our defenses against terrorism, but it
weakens others – many of which, including community trust and cooperation, are absolutely essential to
reducing the dangers of terrorism.
Against this background, we must – for the sake of our democracy and even for the sake of our physical
security – find ways to dissipate the cloud of mistrust that now hangs over NSA surveillance.
Information sharing among conventional law enforcement solves – not bulk
data collection
Bergen et al, 14 – a Professor of Practice at Arizona State University and a fellow at Fordham
University's Center on National Security (Peter Bergen, David Sterman, Emily Schneider, and Bailey
Cahall, “Do NSA's Bulk Surveillance Programs Stop Terrorists?”, New America Foundation, 1/13/2014,
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf)//MBB
Finally, the overall problem for U.S. counterterrorism officials is not that they need vaster amounts of
information from the bulk surveillance programs, but that they don’t sufficiently understand or widely
share the information they already possess that was derived from conventional law enforcement and
intelligence techniques. This was true for two of the 9/11 hijackers who were known to be in the United
States before the attacks on New York and Washington, as well as with the case of Chicago resident
David Coleman Headley, who helped plan the 2008 terrorist attacks in Mumbai, and it is the unfortunate
pattern we have also seen in several other significant terrorism cases.
No link – US companies
Snowden leaks mean terrorists won’t use US companies
Young 14– President and General Counsel of Ronin Analytics, LLC. and former NSA senior leader (Mark,
“National Insecurity: The Impacts of Illegal Disclosures of Classified Information”, I/S: A Journal of Law
and Policy for the Information Society, 2014,
http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Young-Article.pdf)//DBI
Terror Groups. It is likely that terrorist groups will change how they conceive, plan, and execute terrorist
attacks as a result of the classified intelligence information now exposed to the public. Terrorist groups
continuously adjust their methodologies for attacking their targets58, but the recent disclosures provide
a roadmap for terror groups to avoid detection.
A similar example of how terrorist groups adjust their planning and communication techniques in
response to the disclosure of classified information is found in the 9/11 Commission Report. Referring to
a 1998 Washington Times story disclosing that Osama Bin Laden communicated via a satellite phone,
the Commission noted that al Qaeda's senior leadership “had stopped using a particular means of
communication almost immediately after a leak to The Washington Times. This made it much more
difficult for the National Security Agency to intercept his conversations.”59 Despite the controversy
surrounding this story, it makes logical sense that terror groups will not use technologies reportedly
monitored by those who seek to disrupt their plans.
Similar changes in terror group practices as reported by the New York Times can be anticipated with the
Snowden disclosures. The details of how intelligence targets will alter their practices are speculative
given the obscurity of terrorist methodologies, but a few points are clear.
If the reports are true and NSA can exploit60 the “worldwide use of nine U.S.-based Internet service
providers, including Google, Yahoo, Skype and YouTube,” then it is reasonable to assume that terrorist
groups using these technologies or services will discontinue use of these services. According to the
New York Times, the Snowden disclosures resulted in jihadists posting Arabic news articles about [NSA’s
capabilities] ... and recommended fellow jihadists to be very cautious, not to give their real phone
number and other such information when registering for a website.” 61 Similar posts recommending
jihadists use “privacy-protecting email systems like The Onion Router, to hide their computer’s IP
address, and to use encrypted links to access jihadi forums”62 provide direct evidence that the recent
disclosures will change how terrorists plan and conduct their attacks.
Another example concerns alleged NSA access to Skype. Purchased by Microsoft in 2011, Skype claims
to employ standard encryption to protect users from hackers and criminals.63 Documents published by
the Guardian suggest that NSA may have had access to Skype servers.64 Despite this suggested access,
others claim that Skype calls made to other Skype customers were untraceable because of Skype
corporate location. “Skype is located in Luxembourg (outside of the United States), and...[encryption]
keys used by Skype cannot be turned over to the FBI because Skype does not hold the keys themselves.
The key is only known by the computers using the program to connect with each other, and Internet
communication is inherently hard to trace because of how packets can be routed.”65
As early as 2011, reports described how terrorist use of Skype was hindering law enforcement in India.
According to the Times of India, “Terrorist organizations targeting India have moved their
communications significantly to Internet and other possible innovative means, denying Indian
intelligence agencies any major breakthrough yet in their post-Mumbai blasts investigations.” 66
Kashmiri terrorists are reportedly using smart phones and Skype according to a senior Indian Army
officer. Terrorists, like the general population, migrate to technologies that enhance communications.
The popularity and proliferation of Skype supports the hypothesis that international terror groups have
used Skype.
Regardless of the validity of the reports of NSA access to Skype servers or the inability of access to Skype
communications, the new attention to alleged Skype vulnerabilities will encourage illicit users to move
to other technologies. By exposing real or imagined capabilities of the U.S. Intelligence Community,
potential state and non-state targets of electronic surveillance are better equipped to avoid surveillance
by avoiding specific technologies and technical services.
One such service is the Society for Worldwide Interbank Financial Telecommunications (SWIFT) network.
SWIFT, a member-owned cooperative, enables the standardized exchange of proprietary financial data
such as payments, securities, and bank commodity trades.67 Financial transactions, such as those
facilitated by SWIFT, are a direct concern to counterterrorism officials. The 9/11 Commission noted,
“Vigorous efforts to track terrorist financing must remain front and center in U.S. counterterrorism
efforts. The government has recognized that information about terrorist money helps us understand
their network, search them out, and disrupt their operations.”68
In support of this understanding, an intergovernmental policymaking group established to address
money laundering issues in 1989 expanded its mission to include “identifying sources and methods of
terrorist financing and adopted nine special recommendations on terrorist financing to track terrorists’
funds.”69 The Financial Action Task Force on Money Laundering, comprising 36 member countries,
develops and promotes “policies to combat money laundering and terrorist financing.”
Because terror financing became a priority well before September 11, 2001 the European Union and
U.S. began to permit US agencies “limited access to bank data transferred through the SWIFT network.”
The agreement supported the US Terrorist Finance Tracking Program established after the September
11 attacks.70 Recent disclosures have focused attention on the data reportedly accessed by NSA.
In response to this arrangement being made public, the European Union has threatened to “suspend or
even terminate the crucial EU-US Terrorist Finance Tracking Programme.”71 The national security
impact of this disclosure is the potential loss of an apparently valued source of financial intelligence.72
The importance of terrorist financing is self-evident. If, pursuant to an international agreement, NSA had
access to international money transfers, it is reasonable to believe that U.S. intelligence community was
well positioned to interdict the planning and execution of violent actions against the U.S. of her allies. If
financial transfers are moved as a result of the illicit disclosures of collection of networks such as SWIFT,
then U.S. understanding and ability to prevent terrorist actions is significantly degraded.
Snowden’s disclosures have already changed terror group’s practices making it more difficult for U.S.
intelligence agencies to provide warnings about terror groups’ plans and intentions. The loss of insight
into these targets diminishes U.S. security, but also prevents the U.S. from sharing information with its
allies and partners, diminishing U.S. global influence. The net effect of Snowden’s disclosures is to
increase terrorist consciousness of their own vulnerabilities. Their response has been immediate and
may have a dangerous cumulative effect.73
No link – surveillance can’t solve
No data proves surveillance reduces terrorism risks
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
So far, the purported benefits of the programs remain unsubstantiated. While intelligence officials and
representatives of the Obama Administration have defended the merits of the NSA programs,18 they
have offered little hard evidence to prove their value. To the contrary, initial analyses of the NSA’s bulk
records collection program suggest that its benefits are dubious at best, particularly compared to the
program’s vast breadth. A January 2014 study from the New America Foundation’s International
Security Program, for example, concluded that “the government’s claims about the role that NSA ‘bulk’
surveillance of phone and email communications records has had in keeping the United States safe from
terrorism… are overblown and even misleading.”19 Similarly, in its review of the telephone records
collection program under Section 215 of the USA PATRIOT Act, the Privacy and Civil Liberties Oversight
Board (PCLOB) could not identify a single instance in which the telephone records program made a
concrete difference in the outcome of a counterterrorism investigation.20 The President’s Review Group
concurred, emphasizing that “there is always a possibility that acquisition of more information—
whether in the US or abroad—might ultimately prove helpful. But that abstract possibility does not, by
itself, provide a sufficient justification for acquiring more information.”21 Although the PCLOB did find in
a separate report that “the information the [Section 702] program collects has been valuable and
effective in protecting the nation’s security and producing useful foreign intelligence,”22 it provided no
details and did not weigh those purported benefits against the various costs of the surveillance.
Furthermore, its conclusions were undermined just days later when The Washington Post revealed that
nine out of ten of the Internet users swept up in the NSA’s Section 702 surveillance are not legally
targeted foreigners.23
The disad’s understanding of terrorism is flawed – no one single program
contributes to the entirety of effective counter-terror
Sanchez 15* Washington, D.C.–based writer, policy analyst, and journalist who covers the intersection
of privacy, technology, and politics (Julian, “GOVERNMENT DISCRETION IN THE AGE OF BULK DATA
COLLECTION: AN INADEQUATE LIMITATION?”, Federalist Edition Volume 2 p.27-29)//GK
On the flip side, when talking about our security interests, we should be much more precise in the way we
talk about “balancing” them against privacy.26 Typically the way these “balancing” arguments proceed is that we have, on the
one side, the particular invasion at issue under a particular program—the collection of telephone records or the collection of
international communications—and on the other side, the full weight of the entire national security interest in
preventing catastrophic terrorist attacks.27 This is not a serious way to do cost-benefit analysis. If every
particularized invasion is always weighed against the full interest in pre-venting a nuclear bomb from going off
in New York, privacy will lose on every occasion.28 A more helpful way to frame the policy question would be
something like this: If the annualized risk for an American of dying in a terror attack is 1 in 3.5 million,29 does a
particular program—let’s say the bulk collection of telephone records— reduce that risk at the margin, compared with
more targeted collection of telephone records, by enough to justify that invasion? Is it a reduction from 1 in 3.5
million to 1 in 4 million or 1 in 3.51 million? That would be a more useful discussion to have, in large part because when we look back
at the track record of the programs we have seen disclosed over the past decade, they often do not live up to their
initial billing. In the aftermath of that initial New York Times story about the warrantless wiretap component of the larger
STELLARWIND program—authorized by President Bush31—Dick Cheney (among others) said that this was a program that
had doubtlessly saved thousands of lives and averted numerous catastrophic terror attacks.32 About five years later, the
inspectors general of the intelligence community looked into it and found that the intelligence officials they spoke to
were hard pressed to identify concrete intelligence successes attributable to the program.33 In other
anonymous interviews, many officials connected to that program suggested that it did not produce any really unique
intelligence, and that the success stories cited publicly on behalf of this program involved people who were already
under surveillance by traditional methods, targeted by the warrants that the FBI had applied for and secured.34
AT: Delay link
Zero data supports a delay link
Alhogbani, 15 – J.D. Candidate, The Catholic University of America, Columbus School of Law
(Abdulmajeed, “GOING DARK: SCRATCHING THE SURFACE OF GOVERNMENT SURVEILLANCE” 474
COMMLAW CONSPECTUS [Vol. 23)
The legislation in question was enacted in response to 9/11.229 Section 215 “enables the Government
to quickly analyze past connections and chains of communication, and increases the NSA’s ability to
rapidly detect persons affiliated with the identified foreign terrorist organizations.”230 The government
acknowledges that other methods are available, but claim that they are complex and time-consuming,
and might jeopardize the NSA’s counter-terrorism efforts.231 According to General Keith Alexander, the
former NSA director, surveillance gathered pursuant to section 215 has thwarted fifty potential terrorist
attacks since September 11, 2001, including at least ten on American soil.232 Yet the government has
not offered a single case “in which NSA’s bulk metadata collection actually stopped an imminent attack,
or otherwise aided the Government in achieving any objective that was time-sensitive in nature.” 233
It is difficult to accept the NSA’s assertion that the time-sensitive nature of the counterterrorism
program is a compelling enough reason to intrude on the citizenry’s privacy rights. Less intrusive
methods that require a heightened level of scrutiny, which may be slightly more time-consuming, must
be set in place. The first step is transparency, so the American people and elected officials know the
extent of the NSA’s surveillance practices. The second step is for legislators and courts to recognize that
the NSA’s rationale is unreasonable. Finally, legislators need to amend the regulations governing NSA
surveillance.
FISA emergency provision would apply if delay threatened an ongoing
investigation
Patel and Goitein, 15 – *co-director of the Liberty and National Security Program at the Brennan Center
for Justice AND ** co-directs the Brennan Center for Justice’s Liberty and National Security Program
(Faiza and Liza, “Fixing the FISA Court by Fixing FISA: A Response to Carrie Cordero” 4/8, Lawfare,
http://www.lawfareblog.com/fixing-fisa-court-fixing-fisa-response-carrie-cordero
If programmatic surveillance ends (as we recommend), there is still no reason to fear that time-sensitive
investigations will be jeopardized by the participation of a Special Advocate. There is already a generous
provision for emergencies in FISA, which allows the government to begin surveillance before even
submitting an application to the FISA Court and to continue that surveillance pending the court’s ruling.
The Justice Department need only certify that there’s an emergency situation and that the surveillance
meets the necessary legal criteria. This provision would not be disturbed under our proposal.
AT: Data retention link
Data retention undermines terrorism investigations – compromises speed, risks
leaks
Rotenberg, EPIC President and Executive Director, 6-16-15 [Electronic privacy information
center, non-profit research and educational organization established in 1994 to focus
public attention on emerging privacy and civil liberties issues.12 We work with a distinguished panel of
advisors in the fields of law, technology and public policy., COMMENTS OF THE ELECTRONIC PRIVACY
INFORMATION CENTER, file:///C:/Users/Jonah/Downloads/EPIC-12333-PCLOB-Comments-FINAL.pdf]
Schloss2
This need for increased minimization and data security is especially acute in light of the federal
government’s inability to protect sensitive personal information. Just this month, the Office of Personnel
Management announced a massive data breach in the federal government’s employee database that
resulted exposure of sensitive personal information for 4 million government employees.141 Such
failures in the protection of its own employees create serious concerns about the protection of US
Persons information being retained under surveillance programs.
Finally, agencies should ensure the prompt deletion—once discovered—of any 12333-intercepted
communication in which (a) a United States person is a participant, or (b) information is revealed about
a United States person, unless it is directly relevant to a specific, authorized national security/terrorism
investigation or is necessary to prevent serious harm to others.
The President’s Review Group on Intelligence and Communication Technologies recommended that “if
the communication either includes a United States person as a participant or reveals information about
a United States person: (1) any information about that United States person should be purged upon
detection unless it either has foreign intelligence value or is necessary to prevent serious harm to
others.”142 Furthermore, “broad data retention requirements impose not only expensive technical
compliance burdens, but also may jeopardize the speed and accuracy of investigations.”143
These recommendations will ensure that agencies are protecting Americans data under EO 12333 from
unnecessary retention and aligning the program with the requirements under the Privacy Act.
AT: Bulk data links
Bulk surveillance doesn’t help – only used in 4.4% of scenarios
Bergen et al, 14 – a Professor of Practice at Arizona State University and a fellow at Fordham
University's Center on National Security (Peter Bergen, David Sterman, Emily Schneider, and Bailey
Cahall, “Do NSA's Bulk Surveillance Programs Stop Terrorists?”, New America Foundation, 1/13/2014,
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf)//MBB
On June 5, 2013, the Guardian broke the first story in what would become a flood of revelations
regarding the extent and nature of the NSA’s surveillance programs.1 Facing an uproar over the threat
such programs posed to privacy, the Obama administration scrambled to defend them as legal and
essential to U.S. national security and counterterrorism. Two weeks after the first leaks by former NSA
contractor Edward Snowden were published, President Obama defended the NSA surveillance programs
during a visit to Berlin, saying: “We know of at least 50 threats that have been averted because of this
information not just in the United States, but, in some cases, threats here in Germany. So lives have
been saved.”2 Gen. Keith Alexander, the director of the NSA, testified before Congress that: “the
information gathered from these programs provided the U.S. government with critical leads to help
prevent over 50 potential terrorist events in more than 20 countries around the world.”3 Rep. Mike
Rogers (R- Mich.), chairman of the House Permanent Select Committee on Intelligence, said on the
House floor in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here
and in Europe – saving real lives.”4
However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone
and email communications records has had in keeping the United States safe from terrorism shows that
these claims are overblown and even misleading.* An in-depth analysis of 225 individuals recruited by
al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States
with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use
of informants, tips from local communities, and targeted intelligence operations, provided the initial
impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance
programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone
metadata, which includes the telephone numbers that originate and receive calls, as well as the time
and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to
have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the
surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA
Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance
under an unidentified authority played a role in 1.3 percent of the cases we examined. Regular FISA
warrants not issued in connection with Section 215 or Section 702, which are the traditional means for
investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although
it’s unclear whether these warrants played an initiating role or were used at a later point in the
investigation. (Click on the link to go to a database of all 225 individuals, complete with additional
details about them and the government’s investigations of these cases:
http://natsec.newamerica.net/nsa/analysis).
Bulk data collection doesn’t prevent terrorism – no data supports and already
existing intelligence is sufficient
Bergen et al, 14 – a Professor of Practice at Arizona State University and a fellow at Fordham
University's Center on National Security (Peter Bergen, David Sterman, Emily Schneider, and Bailey
Cahall, “Do NSA's Bulk Surveillance Programs Stop Terrorists?”, New America Foundation, 1/13/2014,
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf)//MBB
D. The administration has repeatedly exaggerated the role of NSA bulk surveillance programs in
preventing terrorism and is misleading the public when it says that 9/11 could have been prevented by
such programs when, in fact, better information-sharing about already existing intelligence would have
been far more effective in preventing 9/11.
Members of Congress, senior government officials, and NSA officials have justified the programs with
statements about how many terrorist events the surveillance programs have foiled – citing a total of 54
“events” around the globe, of which 13 were in the United States – and have warned of the risk of a
future 9/11-like attack if the programs were curtailed. As mentioned above, President Obama defended
the NSA surveillance programs during a visit to Berlin in June, saying: “We know of at least 50 threats
that have been averted because of this information not just in the United States, but, in some cases,
threats here in Germany. So lives have been saved.”39 Gen. Alexander testified before Congress that:
“the information gathered from these programs provided the U.S. government with critical leads to help
prevent over 50 potential terrorist events in more than 20 countries around the world.”40 Rep. Mike
Rogers, chairman of the House Permanent Select Committee on Intelligence, said on the chamber floor
in July that NSA programs “stopped and thwarted terrorist attacks both here and in Europe – saving real
lives” a total of 54 times.41
The government’s defense has demonstrated a lack of precision regarding the exact nature of the
threats in the terrorism cases the government has claimed were prevented by NSA surveillance. Were
they real attacks that were thwarted? Serious plots that were still somewhere in the planning stages?
Plots that were concerning, but never really operational? Or did they involve some sort of terrorismsupport activity, such as fundraising? President Obama has called them “threats,” Gen. Alexander called
them “events” and then later used the term “activities,” while Rep. Rogers and one of Gen. Alexander’s
slides at the 2013 Black Hat conference referred to them as “attacks.”42
Sen. Leahy brought attention to this disconnect at a Senate Judiciary Committee hearing in July 2013,
saying he had been shown a classified list of “terrorist events” detected through surveillance which did
not show that “dozens or even several terrorist plots” had been thwarted by the collection of American
telephone metadata under Section 215.43 Sen. Leahy asked Gen. Alexander: “Would you agree that the
54 cases that keep getting cited by the administration were not all plots, and of the 54, only 13 had
some nexus to the U.S.?” and Gen. Alexander’s reply was a simple “Yes.”44 On this key point, beyond his
one-word answer, the NSA director did not elaborate while under oath.
Leading reporters have sometimes simply parroted the government claims that more than 50 attacks
have been averted. Bob Schieffer of CBS News, for instance, said on “Face the Nation” on July 28: “Fiftysix terror plots here and abroad have been thwarted by the NASA [sic] program. So what’s wrong with it,
then, if it’s managed to stop 56 terrorist attacks? That sounds like a pretty good record.”45 This
misrepresentation in the media most likely stems from confusion about what this oft-cited 54 number
really refers to – terrorist activity such as fundraising, plots that were really only notional, or actual
averted attacks. Despite the government’s narrative that NSA surveillance of some kind prevented 13
domestic “events” or “attacks” in the United States, of the eight cases we have identified as possibly
involving the NSA, including the three the government has not claimed, only one can be said to involve
an operational al-Qaeda plot to conduct an attack within the United States, three were notional plots,
and one involved an attack plan in Europe. And in three of the plots we identified as possibly having
been prevented by the NSA – Moalin, Muhtorov and Jumaev, and Warsame – the defendants were
committing or allegedly committing crimes of support for a terrorist group, rather than plotting terrorist
attacks.
The administration has also deliberately tried to present the issue as one of preventing future 9/11s,
taking advantage of the emotional resonances of that day. However, our review suggests that this
rhetorical framing does not in any way accurately reflect the character of the plots that might be cited to
justify the NSA programs. NSA talking points acquired by Al Jazeera through a Freedom of Information
Act request, for example, demonstrate that the administration considered the 9/11 attacks a key point
in its defense of the NSA programs. The talking points included statements such as, “NSA AND ITS
PARTNERS MUST MAKE SURE WE CONNECT THE DOTS SO THAT THE NATION IS NEVER ATTACKED AGAIN
LIKE IT WAS ON 9/11.”46 Spokespeople were also encouraged to use “SOUND BITES THAT RESONATE,”
specifically, “I MUCH PREFER TO BE HERE TODAY EXPLAINING THESE PROGRAMS, THAN EXPLAINING
ANOTHER 9/11 EVENT THAT WE WERE NOT ABLE TO PREVENT.”47
Administration officials have adhered to the talking points’ advice to utilize the 9/11 attacks to defend
the program. During a House intelligence committee hearing on June 18, 2013, Gen. Alexander invoked
9/11 using language very close to that in the talking points, stating, “Let me start by saying that I would
much rather be here today debating this point than trying to explain how we failed to prevent another
9/11.”48 Indeed, the need to prevent a future 9/11 functions as the central framing for the
administration’s case. In an October 29, 2013, House intelligence committee hearing on the NSA
programs featuring Gen. Alexander and Director of National Intelligence James Clapper, the 9/11 attacks
were mentioned 14 times.49
On December 27, 2013, in a federal court ruling that the NSA’s bulk collection of American telephone
records is lawful, U.S. District Judge William H. Pauley III of New York cited Gen. Alexander’s June 18
testimony and quoted him, saying, “We couldn't connect the dots because we didn’t have the dots.”50
But is it really the case that the U.S. intelligence community didn’t have the “dots” in the lead-up to
9/11?51 Hardly. In fact, the intelligence community provided repeated strategic warnings in the summer
of 9/11 that al- Qaeda was planning large-scale attacks on American interests. Here is a representative
sampling of the CIA threat reporting that was distributed to Bush administration officials during the
spring and summer of 2001, according to the 9/11 Commission Report:
Imminent,” June 23.
The failure to respond adequately to these warnings was a policy failure by the Bush administration,
not an intelligence failure by the U.S. intelligence community.
Targeted surveillance and information-sharing stop terrorism – bulk data
collection is irrelevant
Bergen et al, 14 – a Professor of Practice at Arizona State University and a fellow at Fordham
University's Center on National Security (Peter Bergen, David Sterman, Emily Schneider, and Bailey
Cahall, “Do NSA's Bulk Surveillance Programs Stop Terrorists?”, New America Foundation, 1/13/2014,
https://static.newamerica.org/attachments/1311-do-nsas-bulk-surveillance-programs-stopterrorists/IS_NSA_surveillance.pdf)//MBB
These multiple missed opportunities challenge the administration’s claims that the NSA’s bulk
surveillance program could have prevented the 9/11 attacks. The key problem was one of informationsharing, not lack of information. If information-sharing had been functioning, Mihdhar would likely have
been caught regardless of the collection of telephone metadata, and if information- sharing was not
functioning, it is unclear why collecting more information would have changed the result. Even if
Mihdhar’s phone calls from San Diego to Yemen is considered a moment for preventing the 9/11
attacks, it is likely that more targeted surveillance of that phone number rather than bulk collection of
metadata would have been sufficient. Communications to and from the house in Yemen were already
being intercepted by the NSA as a result of investigations into the 1998 U.S. embassy bombings in Africa
and the USS Cole bombing in 2000. According to U.S. officials quoted by Josh Meyer, a leading national
security reporter at the Los Angeles Times, the information from the calls could have been shared
through a FISA warrant under the authorities the NSA had even before 9/11.63 The United States
government could and should have been alerted to Mihdhar’s phone calls even without the expanded
authority to collect the telephone metadata of all Americans under Section 215.
Indeed, Richard Clarke, the national coordinator for security, infrastructure protection, and
counterterrorism from 1998 to 2001, has explained that the Justice Department “could have asked the
FISA Court for a warrant to all phone companies to show all calls from the U.S. which went to the Yemen
number. As far as I know, they did not do so. They could have.”64 Clarke played down the need for bulk
collection in such a scenario, continuing, “My understanding is that they did not need the current All
Calls Data Base FISA warrant to get the information they needed. Since they had one end of the calls
(the Yemen number), all they had to do was ask for any call connecting to it.”65 (Clarke was one of the
five members of the White House review group that President Obama established in August 2013 to
review the U.S. government’s surveillance activities and which issued its report on December 18, 2013).
The overall problem for U.S. counterterrorism officials is not that they need the information from the
bulk collection of phone data, but that they don’t sufficiently understand or widely share the
information they already possess that is derived from conventional law enforcement and intelligence
techniques. This was true of the two 9/11 hijackers living in San Diego and it is also the unfortunate
pattern we have seen in several other significant terrorism cases:
Mumbai that killed 166 people. Yet, following the 9/11 attacks, U.S. authorities received plausible tips
regarding Headley’s associations with militant groups at least five times from his family members,
friends, and acquaintances.66 These multiple tips were never followed up in an effective fashion.
al Hasan, a U.S. Army psychiatrist, killed 13 people at Fort Hood, Texas, in 2009. Before the
attack, U.S. intelligence agencies had intercepted multiple emails between Maj. Hasan and Anwar alAwlaki, a U.S.- born cleric living in Yemen who was notorious for his ties to militants. The emails included
a discussion of the permissibility in Islam of killing U.S. soldiers. Counterterrorism investigators didn’t
follow up on these emails, believing that they were somehow consistent with Maj. Hasan’s job as a
military psychiatrist.67
in 2009, several months after returning from a stay in Yemen. As a result of that trip, Bledsoe was under
investigation by the FBI. Yet, he was still able to buy the weapons for his deadly attack when he was
back in the United States.68
Christmas Day 2009 with an “underwear bomb.” Fortunately, the bomb failed to explode. Yet, a few
weeks before the botched attack, Abdulmutallab’s father contacted the U.S. Embassy in Nigeria with
concerns that his son had become radicalized and might be planning something.69 This information
wasn’t further investigated.
AT: PRISM link
The government greatly exaggerates PRISM’s ability to stop terrorism
Sanchez, 13 – senior fellow on technology, privacy and national security and intelligence surveillance at
Cato (Julian, “Epstein on NSA (Again) Part I: PRISM & the FISA Amendments Act” 6/28,
http://www.cato.org/blog/epstein-nsa-again-part-i-prism-fisa-amendments-act
Finally, Epstein and Loyola rather uncritically repeat the claim that the PRISM program surveillance
pursuant to FAA authorities “is responsible for foiling about 40 of the 50 terrorist plots which the
administration recently disclosed to Congress in classified briefings.” If we scrutinize the government’s
claims a bit more closely, we see that in fact NSA Director Keith Alexander claimed that PRISM intercepts
had “contributed” to the disruption of 40 of 50 terrorist “events,” mostly overseas, and judged this
contribution to have been “critical” in 50 percent of these cases.
When we examine some of the specific “events” government officials have discussed, however, it
becomes clear that not all of these are “plots” at all—many seem to have involved funding or other
forms of “material support” for radical groups, though in at least one such case the government appears
to have claimed a “plot” to bomb the New York Stock Exchange where none really existed. (FBI Deputy
Sean Joyce further told Congress that the “plot” must have been serious given that a jury convicted the
plotters. But federal prosecutors themselves emphasized that the men “had not been involved in an
active plot” and there was no jury trial: they were charged with “material support” and pled guilty.)
Presumably at least some of these “events” did involve actual planned attacks, but knowing that PRISM
surveillance was “critical” to disrupting half of them doesn’t in itself tell us much. The question is
whether the same surveillance could have been conducted in these cases using authorities that existed
before the FISA Amendments Act, or under narrower amendments to FISA. Since the bulk of these
“events” appear to have been overseas, the traditional authority to intercept purely foreign
communications without a warrant would seem to have sufficed, or at most required a legal tweak to
accommodate stored data on U.S. servers used by foreigners to communicate with other foreigners.
There is no evidence to suggest that the actually controversial part of the FAA—the revocation of the
warrant requirement for interception of U.S.-to-foreign wire communications—made a necessary
contribution in these cases. Indeed, as national security expert Peter Bergen has documented, the public
record in the overwhelming majority of terror plots we know about shows that they were “uncovered by
traditional law enforcement methods, such as the use of informants, reliance on community tips about
suspicious activity and other standard policing practices.”
There is certainly such a thing as too much skepticism about government. But when officials make vague
allusions to vital, secret successes in an effort to justify their own broad powers, there is also such a
thing as too much credulity.
So much for PRISM and the FISA Amendments Act. I’ll discuss what Epstein and Loyola say about the
NSA’s metadata dragnet in a separate post.
Impact inevitable – CT fails
US counterterrorism efforts are ineffective now—Snowden leaks prove
Young 14– President and General Counsel of Ronin Analytics, LLC. and former NSA senior leader (Mark,
“National Insecurity: The Impacts of Illegal Disclosures of Classified Information”, I/S: A Journal of Law
and Policy for the Information Society, 2014,
http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Young-Article.pdf)//DBI
Regardless of one’s sympathy for Snowden’s conclusion, the scope and scale of the material he has
revealed will continue to have a significant impact on United States national security. There are four
areas where his actions will diminish national security. First, the disclosure of the programs,
relationships, and operations will facilitate operational changes in the behavior of adversarial groups
such as al-Qaida and Hamas.12It will become more difficult, more expensive, and more time consuming
to collect and analyze information on terrorist groups, foreign governments, and foreign militaries.
Second, the disclosures will complicate U.S. foreign relations that directly contribute to U.S. security
interests. Cooperation between U.S. and foreign intelligence organizations is critical to the security of
the U.S.13 Other countries are perpetually concerned about disclosing sensitive information collected by
their intelligence services at great expense and effort. Snowden has now exacerbated these concerns
and weakened traditionally strong American assurances that information provided to the U.S. will be
well protected with little risk of embarrassment or compromise to the providing country. It will become
more difficult to cooperate with these partners when there is a stream of evidence that shows that the
United States cannot keep a secret.
Third, Snowden’s actions have impaired cooperation between the United States government and the
U.S. private sector. It was already challenging to share information between the U.S. public and private
sectors14, but the exposure of alleged relationships – whether voluntary or pursuant to a court order between companies such as Verizon, Google, and Facebook has made corporate entities recoil from the
government in fear of a diminished reputation or decline in stock value.
Finally, despite Snowden’s claimed objective of exposing an “architecture of oppression,”15 his violation
of law, regulation, and oath has eroded the confidence of the American public he was hoping to inform.
In our representative democracy, this loss of public confidence will quickly transform into fewer
resources for the very departments and agencies that safeguard America. Less authority and more
oversight are sure to follow. It is understandable, but the reduction in funding, authority and the
increase in oversight are the type of emotionally satisfying reactions that will undermine U.S. national
security.
Current counter-terrorism fails – lack of human intelligence outweighs
Eddington, 15 - Patrick G. Eggerton worked as a military imagery analyst at the CIA. He is policy analyst
in homeland security and civil liberties at Cato Institute. (Patrick, “US wants to hack your phone because
it doesn’t have real spies it needs” Reuters, http://blogs.reuters.com/great-debate/2015/02/23/the-fbiwas-for-encryption-before-it-was-against-it/
The best way to disrupt any organized criminal element is to get inside of it physically. But the U.S.
government’s counterterrorism policies have made that next to impossible.
The FBI, for example, targets the very Arab-American and Muslim-American communities it needs to
work with if it hopes to find and neutralize home-grown violent extremists, including promulgating new
rules on profiling that allow for the potential mapping of Arab- or Muslim-American communities. The
Justice Department’s refusal to investigate the New York Police Department’s mass surveillance and
questionable informant-recruitment tactics among immigrants in the Arab- and Muslim-American
communities has only made matters worse.
Overseas, the Cold War style of spying — relying on U.S. embassies as bases from which CIA and other
U.S. government intelligence personnel operate — is increasingly difficult in the areas of the Middle East
and southwest Asia undergoing often violent political change.
Steinbach testified about this before the House Homeland Security Committee earlier this month. “The
concern is in Syria,” he explained, “the lack of our footprint on the ground in Syria — that the databases
won’t have the information we need.”
Notice his reference to technology “databases” rather than the importance of the human element. The
U.S. intelligence community’s emphasis should be on the spy on the ground who actually gathers critical
information and makes any penetration of a terrorist organization possible.
This problem is true for Yemen as well, as a recent Washington Post story highlighted:
The spy agency has pulled dozens of operatives, analysts and other staffers from Yemen as part of a
broader extraction of roughly 200 Americans who had been based at the embassy in Sana, officials said.
Among those removed were senior officers who worked closely with Yemen’s intelligence and security
services to target al-Qaeda operatives and disrupt terrorism plots often aimed at the United States.
The CIA’s failure to field agents under nonofficial cover, or to recruit enough reliable local informants on
the ground who could communicate securely with CIA handlers outside Yemen, is symptomatic of the
agency’s failure to break with its reliance on embassy-based operations throughout that part of the
world. Compromising encryption technology will do nothing to solve the intelligence community’s
human-intelligence deficit. This is a problem the agency must address if it is ever going to be successful
in finding and neutralizing terrorist cells overseas.
It boils down to the fact that the FBI and the U.S. intelligence community have failed to adapt their
intelligence-collection practices and operations to meet the challenges of the “new world disorder” in
which we live. As former CIA officer Philip Giraldi has noted:
[I]ntelligence agencies that were created to oppose and penetrate other nation-state adversaries are
not necessarily well equipped to go after terrorists, particularly when those groups are ethnically
cohesive or recruited through family and tribal vetting, and able to operate in a low-tech fashion to
negate the advantages that advanced technologies provide.
The CIA has repeatedly attempted — occasionally at high cost — to penetrate militant organizations like
al Qaeda and Islamic State. Nonetheless, Washington’s overall counterterrorism bias in funding and
manpower has been toward using the most sophisticated technology available as the key means of
battling a relatively low-tech enemy.
The FBI’s new anti-encryption campaign is just the latest phase in the government’s attempt to deny
Islamic State and related groups the ability to shield their communications. If these militant groups were
traditional nation-states with their own dedicated communications channels, we’d all be cheering on the
FBI’s efforts. But the Internet has become the primary means for global, real-time communications for
individuals, nonprofits, businesses and governments. So it should not be treated as just another
intelligence target, which is certainly the FBI’s and Natural Security Agency’s current mindset.
Using the legislative process to force companies to make defective electronic devices with exploitable
communications channels in the hope that they will catch a tiny number of potential or actual terrorists
is a self-defeating strategy. If implemented, the FBI’s proposal would only make all Americans more
vulnerable to malicious actors online and do nothing to stop the next terrorist attack.
Politics DA
Link Uniqueness
Link non –unique – Section 702 reform coming now, either triggers the link or
disproves it
Shackford 15 – Associate editor of Reason (Shawn, “House Votes to Slam Some Surveillance ‘Back Doors’
Shut”, Reason, 6/12/15, http://reason.com/blog/2015/06/12/house-votes-to-slam-some-surveillanceba)//GK
When Rep. Zoe Lofgren (D-Calif.) broke with some of her privacy-focused peers in Congress to vote in favor of the USA Freedom Act, she told
Reason (and others) that this would not be the end of her efforts to restrain unwarranted domestic surveillance by the federal government. She
said she voted for the Freedom Act because—despite its limitations—it was an improvement over the status quo. She was
nevertheless
committed to continue improving that status quo further. Yesterday afternoon she made good on that pledge,
working with Rep. Thomas Massie (R-Ky.) to again pass an amendment placing further restrictions on federal
surveillance against Americans. Congress passed, 255-174, an amendment to a defense appropriations bill that defunds any efforts
by the National Security Agency (NSA) to bypass any warrant requirements for gathering data and correspondence produced by Americans by
trying to collect it from overseas sources. Because of
the nature of the Internet, information passing from person to
person, even domestically, may end up digitally travelling through foreign countries during the
communication process or being stored in foreign countries. Federal snoops have been using the fact that private
information outside the United States doesn't get the same legal protection that it does within the United States to
try to get easier access. This tactic has been used not under the just-expired Section 215 of the PATRIOT Act, but under
Section 702 of the FISA Amendments Act and was not affected by the new data collection restrictions of the USA Freedom Act.
Massie and Lofgren both released statements about their success in trying to stop this form of "backdoor"
surveillance: "The USA Freedom Act is not the last word on surveillance reform," said Rep. Massie. "Backdoor surveillance authorized
under Section 702 of the FISA Amendments Act is arguably worse than the bulk collection of records illegally collected under Section 215 of the
Patriot Act. This amendment is a much needed next step as Congress continues to rein in the surveillance state and reassert the Fourth
Amendment."
Link non-unique – FISA defunding bill thumps the link
Sacks 15 *co –editor of the District Sentinel (Sam “NSA BACKDOOR SEARCHES WOULD END IF HOUSE
AMENDMENT SURVIVES”, The//Intercept, 6/12/15,
https://firstlook.org/theintercept/2015/06/12/house-hopes-provision-close-surveillance-loophole-willsurvive-time/)//GK
The House passed legislation Thursday that would prevent the NSA from spying on American citizens
whose data was incidentally collected during foreign dragnets, marking the second year in a row that the lower chamber has
put the kibosh on backdoor domestic spying. Sponsored by Reps. Thomas Massie, R-Ky., and Zoe Lofgren, D-Calif., the
amendment to the Department of Defense spending bill was approved in a 255-174 vote across party lines. The bipartisan
duo succeeded in passing a similar anti-surveillance amendment during last year’s appropriations process, only to
watch as leadership stripped it out while crafting a final omnibus spending bill last December. Massie said he
hopes the restrictive language will have a better chance of surviving this time around. “If the surveillance-related legislation in
the House and the Senate over the last two weeks is any indication, there’s still an appetite in Congress to
reform the NSA,” he told The Intercept.
No Link
No link – tech giants will use sustained lobbying to push the plan – they hold the
success of their industry at stake
The Economic Times 13 (“US tech giants like Google, Microsoft launch campaign for NSA reforms”, The
Economic Times, 12/09/13, http://articles.economictimes.indiatimes.com/2013-1209/news/44989266_1_internet-surveillance-google-ceo-larry-page-government-surveillance)//GK
WASHINGTON: Setting aside their differences, eight top US technology companies including Google, Facebook and Microsoft,
have joined hands to press the Obama administration and the Congress to reform the secretive National Security Agency.
The agency is in controversy following the leak of classified documents by fugitive CIA operative Edward
Snowden, revealing that it indulged in massive telephone and internet surveillance both inside and outside the
US, at times sneaking into people's private communications, compromising the security settings of these technology
giants. "This summer's revelations highlighted the urgent need to reform government surveillance practices worldwide," the firms wrote in
an open letter to the US President and members of the Congress in national print advertisements today. Apple, Facebook, Google,
Microsoft, Twitter, Yahoo, AOL and LinkedIn wrote the letter calling for a global reform of state-led
spying. "The balance in many countries has tipped too far in favour of the state and away from the rights of the individual -- rights that are
enshrined in our Constitution. This undermines the freedoms we all cherish. It's time for a change," the letter said. As such, technology
giants urged the US to take the lead and make reforms that ensure that government surveillance efforts are
clearly restricted by law, proportionate to the risks, transparent and subject to independent oversight. "We are focused on
keeping user's data secure -- deploying the latest encryption technology to prevent unauthorised surveillance on our networks and
by pushing back on government requests to ensure that they are legal and reasonable in scope," the letter
said. It said US surveillance programs shouldn't keep American tech companies from operating internationally, including in countries that
oppose US access to their citizens' data. "People won't use technology they don't trust," said Microsoft's Brad Smith. "Governments have put
this trust at risk, and governments need to help restore it." "Protecting
the privacy of our users is incredibly important to
Yahoo. Recent revelations about government surveillance activities have shaken the trust of our users, and it is time for the US to act to
restore the confidence of citizens around the world," said Yahoo CEO Marissa Mayer. "The security of users' data is critical,
which is why we've invested so much in encryption and fight for transparency around government requests for
information," said Google CEO Larry Page.
Surveillance reform has bipartisan support
Vladeck 13 - Co-Editor-in-Chief of Just Security, professor of law at American University Washington
College of Law, senior editor of the Journal of National Security Law & Policy (Steve Vladeck, “The
Coming Political Realignment?”, Just Security, 9/29/2013, http://justsecurity.org/1332/coming-politicalrealignment/)//MBB
If so, then the question becomes what happens next… I’ve written before about the phenomenon I
labeled “libertarian hijacking”–when “libertarians form a short-term coalition with progressive
Democrats on national security issues, only to pack up and basically go home once they have extracted
concessions that don’t actually resolve the real issues.” That’s certainly one way to understand the
NDAA mishigas from December 2011, and the Stand-with-Rand filibuster from earlier this year. But
surveillance is different in one critical respect: it’s an area where the central goals of liberals and
libertarians, i.e., to impose greater limits on the government’s ability to collect (and query) information
on those inside the United States, are largely aligned–at least at this moment.
And so unlike in the drone and detention contexts, which lend themselves to differentiation based upon
the citizenship of the targets and the location of the strike/capture/detention, it’s entirely possible that
meaningful reform of the government’s surveillance authorities sufficient to mollify libertarians will also
satisfy at least many progressives in Congress. Thus, as Congress considers NSA/FISA reform proposals, it
might not be enough for the two camps to simply put additional teeth into the judicial review
undertaken by the FISA Court; there may well be sufficient support from the two wings to also impose
tighter constraints on the NSA’s authorities themselves, whether vis-a-vis collection or use.
Even if all of this happens (as the tentative, only-if-there’s-a-budget nature of this Friday’s PCLOB
hearing on the NSA underscores, we’d have to have a functioning government before we can have a
meaningful conversation about NSA reform), it could quite easily be a surveillance-specific result–in
which the “wing nuts” succeed in pushing for greater reforms of the government’s surveillance powers
than we might otherwise have expected, but then are unable to agree when confronted with other
issues, such as life after the AUMF, military commissions after al Bahlul, and so on. After all, at the end
of the day, liberals and libertarians will never see eye-to-eye on any number of national security-related
policy questions–especially those in which citizenship, territoriality, and/or international law play a
significant role.
But insofar as surveillance provides the means pursuant to which national security politics becomes
more than simply hawks vs. doves, executive power vs. legislative power, and Democrats vs.
Republicans, it might stimulate a larger and broader realignment of our discourse when it comes to how
to balance national security with civil liberties–and one that might have lots of unpredictable
consequences going forward.
Critique answers
AT: Dissent alternative
Surveillance creates a chilling effect on society- wrecks dissent and social change
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 7)//AK
Surveillance has a potentially enormous chilling effect on society. US Supreme Court Justice Sonia
Sotomayor recognized this in her concurring opinion in a 2012 case about the FBI’s installing a GPS
tracker in someone’s car. Her comments were much broader: “Awareness that the Government may be
watching chills associational and expressive freedoms. And the Government’s unrestrained power to
assemble data that reveal private aspects of identity is susceptible to abuse. The net result is that GPS
monitoring—by making available at a relatively low cost such a substantial quantity of intimate
information about any person whom the Government, in its unfettered discretion, chooses to track—
may ‘alter the relationship between citizen and government in a way that is inimical to democratic
society.’ ”
Columbia University law professor Eben Moglen wrote that “omnipresent invasive listening creates fear.
And that fear is the enemy of reasoned, ordered liberty.” Surveillance is a tactic of intimidation.
In the US, we already see the beginnings of this chilling effect. According to a Human Rights Watch
report, journalists covering stories on the intelligence community, national security, and law
enforcement have been significantly hampered by government surveillance. Sources are less likely to
contact them, and they themselves are worried about being prosecuted. Human Rights Watch concludes
that stories in the national interest that need to be reported don’t get reported, and that the public is
less informed as a result. That’s the chilling effect right there.
Lawyers working on cases where there is some intelligence interest—foreign government clients, drugs,
terrorism—are also affected. Like journalists, they worry that their conversations are monitored and
that discussions with their clients will find their way into the prosecution’s hands.
Post-9/11 surveillance has caused writers to self-censor. They avoid writing about and researching
certain subjects; they’re careful about communicating with sources, colleagues, or friends abroad. A
Pew Research Center study conducted just after the first Snowden articles were published found that
people didn’t want to talk about the NSA online. A broader Harris poll found that nearly half of
Americans have changed what they research, talk about, and write about because of NSA surveillance.
Surveillance has chilled Internet use by Muslim Americans, and by groups like environmentalists, gunrights activists, drug policy advocates, and human rights workers. After the Snowden revelations of
2013, people across the world were less likely to search personally sensitive terms on Google.
A 2014 report from the UN High Commissioner on Human Rights noted, “Even the mere possibility of
communications information being captured creates an interference with privacy, with a potential
chilling effect on rights, including those to free expression and association.”
This isn’t paranoia. In 2012, French president Nicolas Sarkozy said in a campaign speech, “Anyone who
regularly consults internet sites which promote terror or hatred or violence will be sentenced to prison.”
This fear of scrutiny isn’t just about the present; it’s about the past as well. Politicians already live in a
world where the opposition follows them around constantly with cameras, hoping to record something
that can be taken out of context. Everything they’ve said and done in the past is pored through and
judged in the present, with an exactitude far greater than was imaginable only a few years ago. Imagine
this being normal for every job applicant.
Of course, surveillance doesn’t affect everyone equally. Some of us are unconcerned about government
surveillance, and therefore not affected at all. Others of us, especially those of us in religious, social,
ethnic, and economic groups that are out of favor with the ruling elite, will be affected more.
Jeremy Bentham’s key observation in conceiving his panopticon was that people become conformist and
compliant when they believe they are being observed. The panopticon is an architecture of social
control. Think of how you act when a police car is driving next to you, or how an entire country acts
when state agents are listening to phone calls. When we know everything is being recorded, we are less
likely to speak freely and act individually. When we are constantly under the threat of judgment,
criticism, and correction for our actions, we become fearful that—either now or in the uncertain
future— data we leave behind will be brought back to implicate us, by whatever authority has then
become focused upon our once-private and innocent acts. In response, we do nothing out of the
ordinary. We lose our individuality, and society stagnates. We don’t question or challenge power. We
become obedient and submissive. We’re less free.
INHIBITING DISSENT AND SOCIAL CHANGE
These chilling effects are especially damaging to political discourse. There is value in dissent. And,
perversely, there can be value in lawbreaking. These are both ways we improve as a society. Ubiquitous
mass surveillance is the enemy of democracy, liberty, freedom, and progress.
Defending this assertion involves a subtle argument—something I wrote about in my previous book Liars
and Outliers—but it’s vitally important to society. Think about it this way. Across the US, states are on
the verge of reversing decades-old laws about homosexual relationships and marijuana use. If the old
laws could have been perfectly enforced through surveillance, society would never have reached the
point where the majority of citizens thought those things were okay. There has to be a period where
they are still illegal yet increasingly tolerated, so that people can look around and say, “You know, that
wasn’t so bad.” Yes, the process takes decades, but it’s a process that can’t happen without
lawbreaking. Frank Zappa said something similar in 1971: “Without deviation from the norm, progress is
not possible.”
The perfect enforcement that comes with ubiquitous government surveillance chills this process. We
need imperfect security—systems that free people to try new things, much the way off-the-record
brainstorming sessions loosen inhibitions and foster creativity. If we don’t have that, we can’t slowly
move from a thing’s being illegal and not okay, to illegal and not sure, to illegal and probably okay, and
finally to legal.
This is an important point. Freedoms we now take for granted were often at one time viewed as
threatening or even criminal by the past power structure. Those changes might never have happened if
the authorities had been able to achieve social control through surveillance.
This is one of the main reasons all of us should care about the emerging architecture of surveillance,
even if we are not personally chilled by its existence. We suffer the effects because people around us
will be less likely to proclaim new political or social ideas, or act out of the ordinary. If J. Edgar Hoover’s
surveillance of Martin Luther King Jr. had been successful in silencing him, it would have affected far
more people than King and his family.
Of course, many things that are illegal will rightly remain illegal forever: theft, murder, and so on. Taken
to the extreme, though, perfect enforcement could have unforeseen repercussions. What does it mean
for society if the police can track your car 24/7, and then mail you a bill at the end of the month
itemizing every time you sped, ran a red light, made an illegal left turn, or followed the car in front of
you too closely? Or if your township can use aerial surveillance to automatically fine you for failing to
mow your lawn or shovel your walk regularly? Our legal systems are largely based on human judgment.
And while there are risks associated with biased and prejudiced judgments, there are also risks
associated with replacing that judgment with algorithmic efficiency. Ubiquitous surveillance could lead
to the kind of society depicted in the 2002 Tom Cruise movie Minority Report, where people can
become the subject of police investigations before they commit a crime. Already law enforcement
agencies make use of predictive analytic tools to identify suspects and direct investigations. It’s a short
step from there to the world of Big Brother and thoughtcrime.
This notion of making certain crimes impossible to get away with is new—a potential result of all this
new technology—and it’s something we need to think about carefully before we implement it. As law
professor Yochai Benkler said, “Imperfection is a core dimension of freedom.”
Surveillance secrecy crushes surveillance dissent- transparency is a prerequisite
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 7)//AK
Secrecy generally shrouds government surveillance, and it poses a danger to a free and open society.
In the US, this has manifested itself in several ways. First, the government has greatly expanded what
can be considered secret. One of the truisms of national security is that secrecy is necessary in matters
of intelligence, foreign policy, and defense. If the government made certain things public—troop
movements, weapons capabilities, negotiating positions—the enemy would alter its behavior to its own
advantage. This notion of military secrecy has been true for millennia, but recently has changed
dramatically. I’m using the US as an example here. In World War I, we were concerned about the
secrecy of specific facts, like the location of military units and the precise plans of a battle. In World War
II, we extended that secrecy to both large-scale operations and entire areas of knowledge. Not only was
our program to build an atomic bomb secret; the entire science of nuclear weaponry was secret. After
9/11, we generalized further, and now almost anything can be a secret.
The result is that US government secrecy has exploded. No one knows the exact number—it’s secret, of
course—but reasonable estimates are that hundreds of billions of pages of government documents are
classified in the US each year. At the same time, the number of people with security clearances has
similarly mushroomed. As of October 2012, almost 5 million people in the US had security clearances
(1.4 million at the topsecret level), a 50% increase since 1999.
Pretty much all the details of NSA surveillance are classified, lest they tip off the bad guys. (I’ll return to
that argument in Chapter 13.) Pre-Snowden, you weren’t allowed to read the Presidential Policy
Directives that authorized much of NSA surveillance. You weren’t even allowed to read the court orders
that authorized this surveillance. It was all classified, and it still would be if the release of the Snowden
documents hadn’t resulted in a bunch of government declassifications.
The NSA and the military aren’t the only organizations increasing their levels of secrecy. Local law
enforcement is starting to similarly cloak its own surveillance actions. For example, police requests for
cell phone surveillance are routinely sealed by the courts that authorize them. (The UK police won’t
even admit that they use the technology.) There are many more examples of this.
This kind of secrecy weakens the checks and balances we have in place to oversee surveillance and,
more broadly, to see that we are all treated fairly by our laws. Since the terrorist attacks of 9/11, FBI and
NSA National Security Letters demanding surveillance information from various companies have
regularly come with gag orders attached. Those who receive such a letter are prohibited from talking,
even in general terms, about it. That makes it much harder to fight the letters in court.
Governments are also hiding behind corporate nondisclosure agreements. That’s the reason the FBI and
local police give for not revealing the details of their StingRay cell phone surveillance system. That’s why
local police departments refuse to divulge details of the commercially developed predictive policing
algorithms they use to deploy officers. The second way government secrecy has manifested itself is that
it is being exerted to an extreme degree. The US has a complex legal framework for classification that is
increasingly being ignored. The executive branch abuses its state secrets privilege to keep information
out of public view. The executive branch keeps secrets from Congress. The NSA keeps secrets from those
who oversee its operations—including Congress. Certain members of Congress keep secrets from the
rest of Congress. Secret courts keep their own secrets, and even the Supreme Court is increasingly
keeping documents secret. In Washington, knowledge is currency, and the intelligence community is
hoarding it. The third manifestation of government secrecy is that government has dealt very severely
with those who expose its secrets: whistleblowers. President Obama has been exceptionally zealous in
prosecuting individuals who have disclosed wrongdoing by government agencies. Since his election in
2008, he has pursued prosecutions against eight people for leaking classified information to the press.
There had been only three previous prosecutions since the Espionage Act was passed in 1917.
Intelligence-related whistleblowing is not a legal defense in the US; the Espionage Act prohibits the
defendant from explaining why he leaked classified information. Daniel Ellsberg, the first person
prosecuted under the law, in 1971, was barred from explaining his actions in court. Former NSA senior
executive Thomas Drake, an NSA whistleblower who was prosecuted in 2011, was forbidden to say the
words “whistleblowing” and “overclassification” in his trial. Chelsea Manning was prohibited from using
a similar defense.
Edward Snowden claims he’s a whistleblower. Many people, including me, agree; others don’t. Secretary
of State John Kerry insisted that Snowden should “come back here and stand in our system of justice
and make his case,” and former secretary of state Hillary Clinton proclaimed, “If he wishes to return
knowing he would be held accountable and also able to present a defense, that is his decision to make.”
Both comments are examples of misleading political smoke-blowing. Current law does not permit
Snowden to make his case.
Inasmuch as government surveillance requires secrecy, people lose the power to debate and vote on
what their government is doing in their name, or tell their elected officials what they think should be
done. It’s easy to forget, in the seemingly endless stream of headlines about the NSA and its surveillance
programs, that none of it would be known to the public at all if Snowden hadn’t, at great personal cost
and risk, exposed what the agency is doing.
Mere suspicion of government surveillance shuts down dissent – a formal
warrant requirement solves
Heymann, 15 [Philip B, former Deputy Attorney General in the Clinton administration and currently a
law professor at Harvard Law School, AN ESSAY ON DOMESTIC SURVEILLANCE,
file:///C:/Users/Jonah/Downloads/Lawfare-Philip-Heymann-SURVEILLANCE-for-publ-10-May-2015.pdf]
Schloss4
The presence of fear, even unreasonable fear, has important effects on the confident and free social and
political life on which democracy depends. Fear of discovery alone could easily affect with whom I
associate, for example, or what use I make of psychiatrists or drugs. The fear is far deeper and more
lasting if a warrant from a judge is not required . Internal agency processes are not an adequate
substitute. The deep suspicions that are valuable in an agency charged with preventing terrorism or
preventing crime have a dark side; they will infect its judgment of when there is a genuine need to see
the required information. Important consequences turn on the citizens’ trust that data the government
has acquired will not be used without there being a “real” need for its use. Much of the population
would not trust any such assurance by the NSA or the FBI alone.
Perceptions of government prying do matter. Whether a dramatic growth in the capacity for, and fruits
of, government surveillance would be experienced as harmful to individual freedom, civil society and
democratic institutions depend on more than how the information would, in fact, be used. Fear also
depends on what other potential uses citizens would suspect; the exercise of individual liberty and
autonomy additionally depend on what citizens suspect might happen with that information and the
precautionary steps – curtailment of entirely lawful activities, for example – citizens might take.
Attitudes toward government and one’s freedoms also depend upon a number of broader contextual
factors: the extent of the perceived danger sought to be prevented; the current level of suspicion or
trust in the government; the history and culture of privacy in the society; and much else. Some few
would argue that the loss of privacy might not be a concern at all. After all, most people do not harbor a
crime or a scandal that they must hide behind claims to privacy; their lives are too proper for that. But
those voices are a small minority; for most people, the value of privacy is to protect the possibility of
association and, particularly, intimacy with others, irrespective of whether one has anything to hide in
the way of crime or scandal. One fact is clear. The fear and the prospect of rapidly expanding
government surveillance in the United States are plainly there on the near horizon. The children of the
Snowden age take it for granted that they are being monitored and they fear the social effects of that
monitoring.
Government censorship increasing – surveillance makes it possible
Schneier, 15, fellow at the Berkman Center for Internet and Society at Harvard Law School, a program
fellow at the New America Foundation's Open Technology Institute, a board member of the Electronic
Frontier Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the
Chief Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 7)//AK
Freedom also depends on the free circulation of ideas. Government censorship, often enabled by
surveillance, stifles them both.
China protects its citizens from the “dangers” of outside news and opinions on the Internet by
something called the Golden Shield or, more commonly, the Great Firewall of China. It’s a massive
project that took eight years and cost $700 million to build, and its job is to censor the Internet. The goal
is less to banish harmful ideas or squelch speech, and more to prevent effective organization. The
firewall works pretty well; those with technical savvy can evade it, but it blocks the majority of China’s
population from finding all sorts of things, from information about the Dalai Lama to many Western
search sites.
There’s more government censorship on the Internet today than ever before. And it’s not just politics.
Countries censor websites because of their sexual nature, the religious views they espouse, their hosting
of gambling platforms, and their promotion of drug use or illegal activity. The citizens of most Middle
Eastern countries live under pervasive censorship. France, Germany, and Austria censor neo-Nazi
content, including online auctions of Nazi memorabilia; other countries censor sites that incite violence.
Vietnam’s “Decree 72” prohibits people from discussing current affairs online. Many countries censor
content that infringes on copyright. The UK censors pornography by default, although you can still opt
out of the censorship. In 2010, the US censored WikiLeaks. Most censorship is enforced by surveillance,
which leads to self-censorship. If people know the government is watching everything they say, they are
less likely to read or speak about forbidden topics. This is the point behind a 2014 Russian law requiring
bloggers to register with the government. This is why the Great Firewall of China works so well as a
censorship tool: it’s not merely the technical capabilities of the firewall, but the threat that people trying
to evade it will be discovered and reported by their fellow citizens. Those who do the reporting don’t
even necessarily agree with the government; they might face penalties of their own if they do not
report. Internet companies in China often censor their users beyond what is officially required.
And the more severe the consequences of getting caught, the more excessively people self-censor.
AT: Legalism K
Perm solves – combining legalism with policy intervention solves despite the
risk of the link
Schlanger 15 [Margo, Professor of Law at the University of Michigan Law School, and the founder and
director of the Civil Rights Litigation Clearinghouse., Intelligence Legalism and the National Security
Agency’s Civil Liberties Gap,
file:///C:/Users/Jonah/Downloads/Intelligence%20Legalism%20and%20the%20National%20Security%20
Agency-s%20Civil%20Li%20(2).pdf] Schloss3
The reforms proposed and announced nearly all cluster into one or more of eight categories:
• Deepen surveillance legalism and skepticism towards bulk or wholesale data collection, by eliminating
it, or in the alternative by imposing more court oversight, tighter government access to surveillance
results, more-individuated showings of need.335
• Increase public disclosure.336
• Raise the level of governmental review for a variety of sensitive decisions.337
• Treat foreigners abroad more like (but not just like) U.S. persons.338
• Shrink the NSA’s ambit and perhaps even demilitarize it somewhat.339
• Support global internet openness and security.340
• Improve personnel and network security.341
• Create/strengthen governmental offices and procedures directed at privacy and civil liberties.342
Much of the reform action is, and should be, devoted to substantive interventions. Congress should
itself ask the “should” question, and can insist on, for example, tighter rules governing bulk collection,
requiring more-individuated justifications for data acquisition, analysis, and use. Or to rephrase the
point using the familiar vocabulary of rules and standards,343 Congress, and the President, can design
and promulgate new rules to serve the overarching standard—that liberty should be prioritized where it
carries no, or acceptable, cost to security—and these rules can then be enforced by a compliance
regime.
But what about implementation of the underlying standard itself: the idea that liberty should be
prioritized where it carries no, or acceptable, cost to security? I argued in Part III that surveillance
secrecy and the very significant changes over time mean that some opportunities to further that
standard are likely to remain untouched by the Constitution, statutes, and executive order. So while I
am far from opposed to additional statutory and regulatory-type rules , there remains an additional
opportunity to further individual liberty and privacy with less legalistic, more standard-like
interventions. This opportunity is the thrust of the last category of reforms, which propose to
institutionalize within the Executive branch, the question of “should” rather than “can”:
• The President announced in August 2013 that the NSA would “put in place a full-time civil liberties and
privacy officer.”344 The job announcement went up in September,345 and as already described, the
new NSA Civil Liberties and Privacy Officer, Rebecca Richards, began work in January.346
• The President’s Review Group also recommended “the creation of a privacy and civil liberties policy
official located both in the National Security Staff and the Office of Management and Budget.”347 The
President has agreed; this is included in PPD- 28,348 and several White House staffers are now assigned
to this role, including one each at the Office of Management and Budget, National Security Council staff,
and the Office of Science and Technology Policy. 349
• The President’s Review Group delved further into the type of work product that would promote
consideration of privacy and civil liberties, recommending that the government use Privacy and Civil
Liberties Impact Assessments for “big data and datamining programs directed at communications,” in
order to ensure that such efforts are statistically reliable, cost-effective, and protective of privacy and
civil liberties. 350 NSA’s new Civil Liberties and Privacy Office is working through how to conduct
assessments along these lines.351
• The President’s Review Group also recommended that “program reviews” be instituted, external to
the IC elements in question, “to assess and respond to emerging privacy and civil liberties issues”; these
might be done by the PCLOB or some other way.352 The USA Freedom Act, the leading reform bill—
which though it died in the Senate, will likely be the starting point for any congressional intervention in
2015—would have required the Intelligence Community Inspector General to do a similar kind of
review.353
• A reform proposal endorsed by nearly everyone354 (with some cavil by former FISA presiding Judge
John Bates355) is to adjust FISA proceedings by introducing some kind of public advocate with a
systematic role. In the President’s Review Group formulation: create a “Public Interest Advocate to
represent privacy and civil liberties interests” in the FISA Court, allowing the Court to invite
participation, but also allowing the Advocate to “intervene on her own initiative.” 356 The President
agreed, “calling on Congress to authorize the establishment of a panel of advocates from outside
government to provide an independent voice in significant cases before the Foreign Intelligence
Surveillance Court.”357 This was included in the Senate version of the USA Freedom Act.358
• The PCLOB, in its report on 702 surveillance, urged the government to “develop a comprehensive
methodology for assessing the efficacy and relative value of counterterrorism programs,” in order to
effectively weigh the interests of the government in conducting a program against the intrusions on
privacy and civil liberties that it may cause.”359
Each of these proposals would designate either an office, person, or process to prioritize privacy and
civil liberties—values that, as we have seen, otherwise lack advocates within the NSA’s governance
structure. So might they really change anything at the NSA? I next look at three new/proposed offices.
I have suggested that rights discourse tends to sweep under the rug the messiness of civil liberties
protections—the policy issues that lie at the core of civil liberties interests. That messiness will be
apparent in what follows; there are no magic bullets here. But a measure can be useful even if messy or
compromised. It is possible that that none of the offices described below will accomplish very much. It
seems to me, however, that soft administrative measures are useful tools in the civil liberties toolkit,
well worth trying by a principal—whether that principal is the President or the Congress—who wants to
give more priority to civil liberties but lacks the institutional capacity to do so directly and repeatedly
over time. Each of these three offices might represent civil liberties interests more systematically than
current arrangements, and might advocate for more liberty protective government protocols and
programs. It is worth emphasizing, too, that measures such as these might have not just cumulative but
also mutually reinforcing effects, creating a civil liberties cadre with security clearances, who might
assist each other in a variety of ways.360 In addition to promoting civil liberties/privacy interstitially,
offices like these assist other more authoritative rulemakers to understand the civil liberties implications
of their choices. For example, they can help Congress in its otherwise very difficult oversight task,
flagging issues that need more congressional attention.361 And in several different ways, they may
increase public access to otherwise secret matters, which in turn increases pressure on those
authoritative rulemakers: They generate reports—both public and private—which can be used by
Congress and the public.362 And they build relationships with non-governmental organizations that
promote increased official disclosure. My argument is not that offices like these are a cure-all for
achieving optimal policy, but that they may be a useful part of a complicated ecology.
Perm is the best option despite legalism
Schlanger 15 [Margo, Professor of Law at the University of Michigan Law School, and the founder and
director of the Civil Rights Litigation Clearinghouse., Intelligence Legalism and the National Security
Agency’s Civil Liberties Gap,
file:///C:/Users/Jonah/Downloads/Intelligence%20Legalism%20and%20the%20National%20Security%20
Agency-s%20Civil%20Li%20(2).pdf] Schloss3
Conclusion
The development of intelligence legalism has been a major and salutary change in American governance
over the past 35 years. Informed by recent unprecedented disclosures, this Article has traced the
institutional arrangements that constitute the NSA’s compliance ecology. Rights enunciation and
compliance serve crucial rule-of-law values, and also sometimes further civil liberties. And yet they are
insufficient to ensure appropriate civil liberties policy.
In his opinion for the Court last term, holding that the Fourth Amendment forbids warrantless searches
of cell phones, absent exigent circumstances, Chief Justice Roberts poked some mild fun at internal
government processes as sufficient safeguards of constitutional rights. “[T]he Founders did not fight a
revolution to gain the right to government agency protocols,” he wrote. But he continued, and I agree,
that such protocols are nonetheless “[p]robably a good idea .”410 In this post-Snowden moment,
Congress can and should protect Americans’ privacy and civil liberties by clamping down on bulk
surveillance, creating legal rules that can then be enforced by the courts and the intelligence
community’s large compliance bureaucracy. But Congress and the President should not be limited by
intelligence legalism. They should also follow the quite different strategy of amplifying voices inside the
surveillance state who will give attention in internal deliberations and agency operations to civil
liberties and privacy interests. But institutional design is important; civil liberties offices need deliberate
and careful arrangements to safeguard their influence and commitment. If civil liberties and privacy
officials inside the NSA, at the White House, and at the FISA Court can walk the tightrope of maintaining
both influence and commitment, they might well make a difference—both in debates we now know
about and others that remain secret. And they may help create a document trail useful for public
oversight, too.
Intelligence legalism has proven unequal to the task of opposing the “collect everything” mindset. We
need to add libertarian officials inside the surveillance state to nurture its civil liberties ecology. If that
ecology doesn’t improve, the next big leak, in five or ten or twenty years, may reveal invasions of
Americans’ privacy that dwarf anything we have heard about so far.
AT: Legalism K – PPD-28
PPD28 is essential to overcoming pure intelligence legalism – it changes policy
design to favor liberties first
Schlanger 15 [Margo, Professor of Law at the University of Michigan Law School, and the founder and
director of the Civil Rights Litigation Clearinghouse., Intelligence Legalism and the National Security
Agency’s Civil Liberties Gap,
file:///C:/Users/Jonah/Downloads/Intelligence%20Legalism%20and%20the%20National%20Security%20
Agency-s%20Civil%20Li%20(2).pdf] Schloss3
PPD-28’s new language related to “purpose” is limited in its bite (like any sole purpose requirement). It
is, however, susceptible to implementation under a compliance framework. One can imagine a
compliance regime that requires documentation and audit of the purpose of SIGINT collection, or of the
use of information collected in bulk, to ensure that those purposes are not “suppressing or burdening
criticism or dissent,” or “disadvantaging persons based on their ethnicity, race, gender, sexual
orientation, or religion.” But the other language quoted above reveals a very different, supplemental,
approach. Making “privacy and civil liberties . . . integral considerations in the planning of U.S. signals
intelligence activities,” and ensuring that “[s]ignals intelligence activities . . . [are] as tailored as feasible”
are not compliance tasks; they are policy tasks. PPD-28, like several other recent reform proposals, is
thus adding to the existing intelligence legalism regime a distinct concept of non-legalistic internal
bureaucratic measures—a liberty protective infrastructure that can put civil liberties concerns into the
policy mix, asking the “should” question. This is a new development. Previously, the compliance mindset
within the Executive branch has failed to encourage—and even discouraged—policy-based
consideration of civil liberties, for reasons I now explore.
Changing policy alters intelligence legalism – the NSA will move beyond just
compliance
Schlanger 15 [Margo, Professor of Law at the University of Michigan Law School, and the founder and
director of the Civil Rights Litigation Clearinghouse., Intelligence Legalism and the National Security
Agency’s Civil Liberties Gap,
file:///C:/Users/Jonah/Downloads/Intelligence%20Legalism%20and%20the%20National%20Security%20
Agency-s%20Civil%20Li%20(2).pdf] Schloss3
Intelligence legalism brings lawyers’ rule-of-law commitment into the realm of national security and
surveillance, where secrecy molds its impact in a number of important ways. I see intelligence legalism’s
three crucial and simultaneous features as: imposition of substantive rules given the status of law
rather than policy , limited court enforcement of those rules, and empowerment of lawyers. All three
were in evidence in the 2004 drama. Yet it is no coincidence that that incident did not catalyze a civil
liberties advance. In fact, this Article’s core argument is that intelligence legalism, though useful, gives
systematically insufficient weight to individual liberty. Legalism legitimates liberty-infringing programs.
And its relentless focus on rights and compliance and law (with a definition of law that includes
regulation, executive orders, court orders, etc.) has obscured the absence of what should be an
additional focus on interests, or balancing, or policy. That additional focus is necessary, I argue, for
optimal policy, which I take to be the safeguarding of liberty where there is no cost, or acceptable cost,
to security.
The 2004 hospital-bed confrontation arose out of what has grown to be a large surveillance compliance
apparatus, currently staffed by hundreds of people in both the executive and judicial branches. This
infrastructure implements and enforces a complex system of rules, not flawlessly but—at least in recent
years—with real attention and care.11 Where an authoritative lawgiver has announced rights or rightsprotecting procedures, the compliance apparatus works, to real, though not perfect effect, to effectuate
those rights and to follow those procedures. Of course errors, small and large, occur. Even if perfect
compliance could be achieved, however, it is too paltry a goal. A good oversight system needs its
institutions not just to support and enforce compliance but to design good rules. But as will become
evident, the offices that make up the compliance system of the National Security Agency (NSA) are
nearly entirely compliance offices, not policy offices; they work to improve compliance with existing
rules, but not to consider the pros and cons of more individually-protective rules and try to increase
privacy or civil liberties where the cost of doing so is acceptable. The NSA and the Intelligence
Community (IC) more generally have thought of civil liberties and privacy only in compliance terms. That
is, they have asked only “Can we (legally) do X?” and not “Should we do X?” This preference for can over
should is part and parcel, I argue, of intelligence legalism. More is needed. Additional attention should
be directed both within the NSA and by its overseers to the basic policy issues, weighing the security
gains from surveillance against the privacy and civil liberties risks and costs. That attention will not be a
panacea, but it can play a useful role in filling the civil liberties gap intelligence legalism creates.
Download