Aff - Millennial Speech & Debate

advertisement
Aff
1AC
Plan
The United States Supreme Court should hold in American Civil Liberties Union v. Clapper that the
collection of metadata by or for the use of the National Security Agency is an unconstitutional violation
of the Fourth Amendment to the United States Constitution.
Advantage 1 – Democracy
Failure of the supreme court to rein in NSA metadata surveillance signals abdication of
constitutional scrutiny and loss of judicial independence
McCormack, 2014 (Wayne, E.W. Thode Professor of Law, University of Utah, “U.S. Judicial
Independence: Victim in the ‘war on terror,’” Washington & Lee Law Review, Winter, 71 Wash & Lee L.
Rev. 305)
The battle over NSA surveillance probably has less to do with actual invasions of privacy and more to do
with the sense that government decided it can do whatever it wants to do with total impunity. The
existence of secret NSA programs is not at all surprising to those who have paid close attention to this issue
for the last decade. The fact is that our government was never open or transparent about what it was doing, and we knew it was not. For
example, Attorney General Alberto Gonzales in a number of public statements during 2005 and 2006 was always careful to say "the program
the President has disclosed" is legal, leaving open the inference that there was much more that had not been disclosed: A word of caution here.
This remains a highly classified program. . . . So my remarks today speak only to those activities confirmed publicly by the President, and not to
other purported activities described in press reports. These press accounts are in almost every case, in one way or another, misinformed,
confusing, or wrong. And unfortunately, they have caused concern over the potential breadth of what the President has actually authorized.
n429 Nowhere
in the many public statements of the era--all of which are contained on the DOJ website-is there any mention of [*387] the undisclosed activities of the NSA. Naturally we would get "press accounts . . . [that
were] misinformed, confusing, or wrong." n430 But we probably got some information that was accurate. What do we know now in
2014? We know that NSA and its affiliated agencies are capable of reading all our e-mail and listening to our
phone conversations. n431 Do they do so? They would have us believe they are too busy to bother with us little
people. But it is also clear that if the "metadata mining" reveals a pattern of curiosity, then it is a simple
matter to reach into the grab bag and pull out everything any particular individual has said for a long
period of time. n432 Indeed, some instances of unauthorized snooping into content have been acknowledged and one FISA judge has
described the NSA as having repeatedly misrepresented its activities to the court. n433 The FISA Court has approved
"programmatic" surveillance by interpreting the word "relevant" n434 to mean basically all electronic
communications, which can be monitored for suspicious patterns. n435 "And under the 'reasonable suspicion' standard, there [*388] is no
judicial review when someone decides to look into the content of those communications." n436 Frankly, I'm not so sure that privacy of
information is really that important, except to the extent that I need to be able to protect my bank accounts from being raided. What
makes the NSA dustup more disturbing is the feeling within government that government can act with
impunity in the name of "national security." n437 If they can read my e-mails today, can they haul me off to a military brig without judicial
approval tomorrow? Oh, wait, they did that already--kept several people locked up for years with total impunity--even tortured with impunity.
n438 Recently, two judges have taken a hard look at the NSA activity and disagreed on the merits. n439 At least, these two judges did not yield
to the temptation to abdicate judicial independence in the face of the dreaded word "terrorism." n440 G. Standing The U.S. federal courts have
a rather mystical, ethereal approach to their "special place" in separation of powers. Part of the mystique is a doctrine called "standing," which I
have described elsewhere as part of the "Mythology of Justiciability." n441 The heart of the doctrine is that a person who is not able to show an
injury by another person has no claim of right against that [*389] other person. The mystery is why we need to waste barrels of ink and
jurisprudential energy on a point basic to all of law--if you haven't harmed me, I don't have a claim against you. n442 Be that as it may, there
are two instances in which federal courts have turned blind eyes to what would seem to be palpable injuries, either likely or threatened. These
are the cases dealing with the illegal surveillance by the NSA under the heading of the Terrorist Surveillance Program (TSP), n443 and the
targeted killing of a U.S. citizen, Anwar al-Aulaqi. n444 1. Have I Been Bugged? A number of lawsuits challenged the NSA program. One suit was
brought by the ACLU on behalf of a group of individuals and groups who regularly conducted international telephone and Internet
communications for legitimate professional reasons (for example, journalism or the practice of law). n445 A district court in Michigan granted
the plaintiffs' request for an injunction, finding that the TSP violated FISA, the First and Fourth Amendments, and the separation of powers
doctrine. n446 On appeal, the Sixth Circuit found that the plaintiffs lacked standing to bring the action. n447 They could not show that any
particular conversation was intercepted, nor could the plaintiffs claim that any personal interest was harmed by refraining from conversations
that might [*390] be monitored. n448 Judge Gilman dissented on the ground that the attorney-plaintiffs had a clear duty to refrain from
communicating with clients when those communications were likely to be intercepted, and were thus able to show a cognizable harm from the
threat of interception. n449 Speaking to the merits, Judge Gilman argued that the TSP was illegal because "the clear wording of FISA and Title III
that these statutes provide the 'exclusive means' for the government to engage in electronic surveillance within the United States for foreign
intelligence." n450 At the same time, the Al-Haramain Foundation and two of its lawyers filed a similar action against the government in
Oregon district court. n451 Al-Haramain is a Muslim charity designated a "Specially Designated Global Terrorist" by the Treasury Department's
Office of Foreign Assets Control, which freezes the organization's assets and makes it illegal for others to do business with it. n452 At one point,
the Government inadvertently disclosed a "top secret" document that proved Al-Haramain had been subjected to warrantless surveillance and
prompted a further claim for unlawful surveillance. n453 The Government sought to dismiss the case by invoking the state secrets privilege,
which the district court rejected on the basis that the existence of the TSP was not a secret, and that "no harm [*391] to the national security
would occur if plaintiffs [were] able to prove the general point that they were subject to surveillance as revealed in the Sealed Document," so
long as no other information in the document was revealed. n454 The Ninth Circuit granted the Government's request for interlocutory review
of the state secrets issue, n455 holding that the public disclosures about the TSP had already made the basic dimensions of the program known
and thus the state secrets privilege did not foreclose the lawsuit entirely. n456 Nevertheless, the top-secret document was protected by the
privilege, and the plaintiffs would not be allowed to introduce their memory of the document into evidence. n457 Although the court believed
that the plaintiffs could not establish standing without the document, the Ninth Circuit remanded the case to the district court to determine
whether FISA might preempt the state secrets privilege. n458 On remand, the district court first held that FISA would, in fact, preempt the
privilege, but a remedy would be available only on behalf of someone who was an "aggrieved person" under the statute. n459 The plaintiffs
were able to rely on public announcements by government officials and publicly available press reports to make a prima facie case, based on
nonclassified information, that they were aggrieved persons because of wiretaps and e-mail intercepts [*392] without a court order. n460 After
extended recalcitrance by the Government, the district court ordered: Plaintiffs have made out a prima facie case and defendants have
foregone multiple opportunities to show that a warrant existed, including specifically rejecting the method created by Congress for this very
purpose. Defendants' possession of the exclusive knowledge whether or not a FISA warrant was obtained, moreover, creates such grave
equitable concerns that defendants must be deemed estopped from arguing that a warrant might have existed or, conversely, must be deemed
to have admitted that no warrant existed. The court now determines [that f]or purposes of this litigation, there was no such warrant for the
electronic surveillance of any of plaintiffs. n461 With no genuine issue of material fact, the district court granted summary judgment for the
plaintiffs, and it later awarded them about $ 41,000 in damages and over $ 2.5 million in fees and expenses. n462 The entire amount went to
the attorney-plaintiffs, as the "[d]istribution of any funds to plaintiff Al-Haramain is impossible because Al-Haramain's assets are blocked as a
result of its designation as a SDGT organization." n463 Indeed, the district court acknowledged that "the government had reason to believe that
Al-Haramain supported acts of terrorism." n464 In the final episode of this long-running litigation, the Ninth Circuit ruled that the Government
enjoyed sovereign immunity from a damage action by the organization. n465 Another large number of lawsuits alleged that
telecommunications companies violated their customers' rights by [*393] cooperating and assisting the NSA in surveillance of their phones.
n466 The actions were consolidated as part of the multi-district litigation panel in northern California. n467 While these cases were pending in
district court, Congress enacted a statutory provision rendering an electronic communications service provider immune from suit if the
Attorney General certified that the provider helped the government in intelligence gathering, including assistance in executing the TSP. n468
Based on this provision, the district court dismissed the pending suits against the telecommunications companies. n469 On appeal, the Ninth
Circuit affirmed, rejecting a series of constitutional arguments, including several related to the separation of powers doctrine and due process
considerations. n470 But in another opinion on the same day, the Ninth Circuit allowed a class action suit to proceed against the Government
for what the plaintiffs described as "a communications dragnet of ordinary American citizens." n471 According to the court, the [*394] plaintiffs
had standing by alleging a concrete and particularized injury from the collaboration between the government and AT&T at a specific facility in
San Francisco. n472 And although the claims "strike . . . at the heart of a major public controversy involving national security and surveillance,"
the Ninth Circuit refused to characterize the legal issues as political questions, or to impose a heightened standing requirement for government
surveillance involving national security interests. n473 Where this case will go now after the Snowden revelations remains to be seen, but at
least the Ninth Circuit has shown itself to be the exception in standing up against some of the government abuses. The FISA Amendments Act of
2008 (FAA) n474 continued the authorization of intercepts involving parties outside the United States but stipulated that the government may
not conduct electronic surveillance or intercept wire, oral, or electronic communications except pursuant to express statutory authorization (for
example, FISA). n475 This statement of exclusive authority should have defused the Executive argument for unfettered discretion, but of course
we now have public admissions of massive government gathering of electronic communications data. n476 [*395] The ACLU filed suit against
the FAA on behalf of a group of attorneys, journalists, and legal, media, and human rights organizations, arguing that the provision "allows the
executive branch sweeping and virtually unregulated authority to monitor the international communications . . . of law-abiding U.S. citizens and
residents." n477 The district court granted summary judgment in favor of the government on the basis that the plaintiffs lacked standing to
bring the suit. n478 On appeal, a panel of the Second Circuit reversed and remanded, asserting that the plaintiffs had standing based on a
reasonable fear that their sensitive international electronic communications were being monitored, requiring them to engage in costly and
burdensome measures to protect the confidentiality of communications necessary for their work. n479 In September 2011, the Second Circuit
denied rehearing en banc by an equally divided vote. n480 In February 2013, the Supreme Court reversed on standing grounds, agreeing with
the Government that the plaintiffs failed to show a realistic threat of imminent injury. n481 Their speculations required assuming that the
government would target their communications, that authorization under the statute would be judicially approved, and that government would
succeed in acquiring their communications. n482 Moreover, the plaintiffs' choices to make expenditures to prevent interception of confidential
communications based on hypothetical future harm [*396] was their own choice and not the direct result of identifiable government action.
n483 Of course, now we know the assumptions of the Supreme Court about judicial authorization of intercepts were unfounded because the
NSA has been monitoring anything and everything that it chooses to monitor. n484 This set of assumptions was particularly poignant in some of
the dissents from the earlier Second Circuit denial of rehearing. n485 One dissent pointed to the FISCR's opinion in In re Directives as offering "a
glimpse into the actual world of foreign intelligence targeting," which "appears quite different from the one hypothesized by plaintiffs." n486
[The FISCR] reviewed the actual procedures adopted by the executive to satisfy PAA requirements and found that they in fact afforded
"protections above and beyond those specified" in the statute and adequately allayed any particularity or probable cause concerns. . . . Such
scrupulous oversight rebuts any general assumptions, unsupported by specific facts, that the executive will instinctively abuse its targeting
discretion under the FAA. . . . n487 Now
that it is publicly known that the NSA has been routinely gathering
information on U.S. residents, the assertion that the statutes "rebut . . . any general assumption,
unsupported by specific facts, that the executive will instinctively abuse its targeting discretion" rings extremely
hollow. n488 This is not to say that the judges holding that view were knowingly complicit in government misdeeds, but they certainly
chose consciously to turn a blind eye when their colleagues were insisting on scrutiny of actual
government practices. [*397] 2. Judicial Review of Killing U.S. Citizens The final case that I wish to highlight here is the "targeted killing"
of Anwar Al-Aulaqi, a U.S. citizen who expatriated to Yemen and became a major jihadist figure on the Internet. n489 When it was leaked in the
press that Anwar al-Aulaqi had been placed on the U.S. government's kill lists, his father Nasser al-Aulaqi filed suit to assert his son's rights to
due process. n490 His lawsuit also asserted that the U.S. targeted-killing policy violated the Fourth and Fifth Amendments, as well as treaty and
customary international law. n491 While asking for an injunction to stop the government from killing his son, he sought a declaration that the
policy was illegal and disclosure of the criteria used to determine whether to target a U.S. citizen. n492 The D.C. District Court started with the
observations that this "unique and extraordinary case" presented "[s]tark, and perplexing, questions" such as: "How is it that judicial approval is
required when the United States decides to target a U.S. citizen overseas for electronic surveillance, but that, according to the defendants,
judicial scrutiny in prohibited when the United States decides to target a U.S. citizen overseas for death?" n493 Yet, the court dismissed the
case, holding that Nasser al-Aulaqi lacked standing to bring the constitutional claims on behalf of his son. n494 The court also blindly asserted
that there was nothing to prevent Anwar al-Aulaqi from peacefully presenting himself at the U.S. Embassy in Yemen and announcing his wish to
vindicate his constitutional rights in court, which, as a matter of domestic [*398] and international law, the U.S. government would have to
respect without resorting to violence. n495 Moreover, it was not clear that the father was serving his son's "best interests," understood as
acting in accordance with Anwar al-Aulaqi's intentions or wishes. n496 There was no evidence that Nasser al-Aulaqi wanted to vindicate his
rights in a U.S. court; to the contrary, his public statements showed disdain for the American legal system, as well as a belief that Muslims were
not bound by Western law and it was therefore legitimate to violate U.S. law. n497 Moreover, Nasser al-Aulaqi's claims might have been barred
by sovereign immunity, because a suit against the President, Secretary of Defense, and CIA Director was "tantamount to a suit against the
United States." n498 In the portion of its opinion most strikingly presenting problems of judicial independence, the court refused to decide this
question by exercising its "equitable discretion" to avoid interjecting itself into sensitive issues of foreign affairs and activities by the military
and intelligence community. n499 Serious separation-of-powers concerns would be raised by a "judicial attempt to enjoin the President in the
performance of his official duties." n500 The same would be true of a court order granting declaratory and injunctive relief against the nation's
top military and intelligence advisors regarding the use of force abroad, when such action was (purportedly) authorized by the President
himself. n501 [*399] Finally, in a similar vein, the court concluded that the case was a nonjusticiable political question. n502 This doctrine
exempts from judicial review those matters that are committed by the U.S. Constitution to the political branches, including the precise issue in
this case--the decision to employ military force. n503 According to the court, resolution of the plaintiff's claims would require it to decide: (1)
[T]he precise nature and extent of Anwar Al-Aulaqi's affiliation with AQAP; (2) whether AQAP and al Qaeda are so closely linked that the
defendants' targeted killing of Anwar Al-Aulaqi in Yemen would come within the United States' current armed conflict with al Qaeda; (3)
whether (assuming plaintiff's proffered legal standard applies) n504 Anwar Al-Aulaqi's alleged terrorist activity renders him a "concrete,
specific, and imminent threat to life or physical safety . . . ."; and (4) whether there are "means short of lethal force" that the United States
could "reasonably" employ to address any threat that Anwar Al-Aulaqi poses to U.S. national security interests. . . . Such determinations, in
turn, would require this Court . . . to understand and assess the "capabilities of the [alleged] terrorist operative to carry out a threatened attack,
what response would be sufficient to address that threat, possible diplomatic considerations that may bear on such responses, the vulnerability
of potential targets that the [alleged] terrorist[] may strike, the availability of military and nonmilitary options, and the risks to military and
[*400] nonmilitary personnel in attempting application of non-lethal force." n505 It is truly a mystery why a court should have to decide any of
those questions to rule on whether a U.S. citizen abroad has due process or other legal rights before being executed by executive fiat. The
judicial function consists of setting out the criteria for the Executive to follow in making those decisions. n506 The court confessed its concern
that "there are circumstances in which the Executive's unilateral decision to kill a U.S. citizen overseas is 'constitutionally committed to the
political branches' and judicially unreviewable" but nonetheless concluded that it was barred from adjudicating the merits of the case. n507 The
United States then used aerial unmanned aircraft (drones) to execute not just Anwar but also his son Abdulrahman and a colleague, Samir
Khan. n508 In July 2012, the ACLU filed a new suit on behalf of the families of all three, arguing that the killings violated the Fourth
Amendment's ban on unreasonable seizures, the Fifth Amendment's right to due process, and the Bill of Attainder Clause. n509 In addition, the
ACLU filed a FOIA request and subsequent legal action seeking records related to legal authority and factual basis for the targeted killing of the
three individuals. n510 In a masterly display of the various doctrines considered in this Article, on December 14, 2012, DOJ filed a motion to
dismiss the damage action on the grounds of lack of standing, political question, qualified immunity, failure to state a claim under due [*401]
process, and Executive freedom from the Bill of Attainder Clause. n511 V. Conclusion The
"head in the sand" attitude of the U.S.
Judiciary in the past decade is a rather dismal record that does not fit the high standard for judicial
independence on which the American public has come to rely. Many authors have discussed these cases from the perspective of the civil
rights and liberties of the individual. n512 What I have attempted to do here is sketch out how the undue deference to the
Executive in "time of crisis" has undermined the independent role of the Judiciary. Torture, executive detentions,
illegal surveillance, and now killing of U.S. citizens, have escaped judicial review under a variety of excuses. n513 To
be clear, many of the people against whom these abuses have been levied are, or were, very dangerous if not
evil individuals. Khalid Sheikh Muhamed and Anwar al-Aulaqi should not be allowed to roam free to kill innocent civilians. But hundreds of
years of history show that there are ways of dealing with such people within the limits of restrained
government without resort to the hubris and indignity of unreviewed Executive discretion. The turning of blind eyes by
many, albeit not all, federal judges is a chapter of this history that will weigh heavily against us in the future. [*402] No judge wants to
feel responsible for the deaths of innocents. But direct responsibility for death lies with those who
contribute to the act. Meanwhile, the judge has an ethical responsibility for abuses by government of which
the Judiciary is a part. To illustrate the threat, one federal judge resigned from the secret FISA Court in "protest
because the Bush administration was bypassing the court on warrantless wiretaps." n514 To be fair, his public
statement before Congress included the thought that the judges were independent but not making fully informed decisions. n515 It makes
sense that this courageous judge (who also ruled against the Government in a major Guantanamo case n516) would extol the independence of
the federal Judiciary, but perhaps those of us outside the club can be forgiven for seriously challenging his assessment. Meanwhile, critics
are voicing the belief that recent appointments to the FISA Court will be even more deferential to the
Executive. n517 To repeat, there is nothing "new" in the killing of innocents for religious or political vengeance. n518 This violence has
always been with us and unfortunately will continue despite our best efforts to curb it. Pleas for Executive carte blanche
power are exactly what judicial independence was developed to avoid, and what many statements in
various declarations of human rights are all about. The way of unreviewed Executive discretion is the
way of tyranny.
The US has transitioned into authoritarianism – surveillance power coupled with the
absence of judicial review eviscerates any possibility of democratic modeling
Turley, 2012 (Jonathan, Shapiro professor of public interest law at George Washington University, “10
reasons the U.S. is no longer the land of the free,” http://jonathanturley.org/2012/01/15/10-reasonsthe-u-s-is-no-longer-the-land-of-the-free/)
Below is today’s column in the Sunday Washington Post. The column addresses how the continued rollbacks on
civil liberties in the
United States conflicts with the view of the country as the land of the free. If we are going to adopt Chinese legal
principles, we should at least have the integrity to adopt one Chinese proverb: “The beginning of wisdom is to call things by their right names.”
We seem as a country to be in denial as to the implications of these laws and policies. Whether
we are viewed as a free country
with authoritarian inclinations or an authoritarian nation with free aspirations (or some other hybrid definition),
we are clearly not what we once were. [Update: in addition to the column below, a later column in the Washington Post explores
more closely the loss of free speech rights in the West]. Every year, the State Department issues reports on individual rights in other countries,
monitoring the passage of restrictive laws and regulations around the world. Iran, for example, has been criticized for denying fair public trials
and limiting privacy, while Russia has been taken to task for undermining due process. Other countries have been condemned for the use of
secret evidence and torture. Even as we pass judgment on countries we consider unfree, Americans
remain confident that any
definition of a free nation must include their own — the land of free. Yet, the laws and practices of the land
should shake that confidence. In the decade since Sept. 11, 2001, this country has comprehensively reduced civil
liberties in the name of an expanded security state. The most recent example of this was the National Defense Authorization Act, signed
Dec. 31, which allows for the indefinite detention of citizens. At what point does the reduction of individual rights in our country change how
we define ourselves? While each
new national security power Washington has embraced was controversial when enacted, they
operate in isolation. They form a mosaic of powers under which our
country could be considered, at least in part, authoritarian. Americans often proclaim our nation as a symbol
of freedom to the world while dismissing nations such as Cuba and China as categorically unfree. Yet, objectively,
are often discussed in isolation. But they don’t
we may be only half right. Those countries do lack basic individual rights such as due process, placing them outside any reasonable definition of
“free,” but the
United States now has much more in common with such regimes than anyone may like to
admit. These countries also have constitutions that purport to guarantee freedoms and rights. But their governments have broad discretion
in denying those rights and few real avenues for challenges by citizens — precisely the problem with the new laws in this country. The list of
powers acquired by the U.S. government since 9/11 puts us in rather troubling company. Assassination of U.S. citizens President Obama has
claimed, as President George W. Bush did before him, the right to order the killing of any citizen considered a terrorist or an abettor of
terrorism. Last year, he approved the killing of U.S. citizen Anwar al-Awlaqi and another citizen under this claimed inherent authority. Last
month, administration officials affirmed that power, stating that the president can order the assassination of any citizen whom he considers
allied with terrorists. (Nations such as Nigeria, Iran and Syria have been routinely criticized for extrajudicial killings of enemies of the state.)
Indefinite detention Under the law signed last month, terrorism suspects are to be held by the military; the president also has the authority to
indefinitely detain citizens accused of terrorism. While Sen. Carl Levin insisted the bill followed existing law “whatever the law is,” the Senate
specifically rejected an amendment that would exempt citizens and the Administration has opposed efforts to challenge such authority in
federal court. The Administration continues to claim the right to strip citizens of legal protections based on its sole discretion. (China recently
codified a more limited detention law for its citizens, while countries such as Cambodia have been singled out by the United States for
“prolonged detention.”) Arbitrary justice The president now decides whether a person will receive a trial in the federal courts or in a military
tribunal, a system that has been ridiculed around the world for lacking basic due process protections. Bush claimed this authority in 2001, and
Obama has continued the practice. (Egypt and China have been denounced for maintaining separate military justice systems for selected
defendants, including civilians.) Warrantless searches The
president may now order warrantless surveillance, including
a new capability to force companies and organizations to turn over information on citizens’ finances,
communications and associations. Bush acquired this sweeping power under the Patriot Act in 2001, and in 2011, Obama extended
the power, including searches of everything from business documents to library records. The government can use “national
security letters” to demand, without probable cause, that organizations turn over information on
citizens — and order them not to reveal the disclosure to the affected party. (Saudi Arabia and Pakistan operate
under laws that allow the government to engage in widespread discretionary surveillance.) Secret evidence The government now routinely uses
secret evidence to detain individuals and employs secret evidence in federal and military courts. It also forces the dismissal of cases against the
United States by simply filing declarations that the cases would make the government reveal classified information that would harm national
security — a claim made in a variety of privacy lawsuits and largely accepted by federal judges without question. Even legal opinions, cited as
the basis for the government’s actions under the Bush and Obama administrations, have been classified. This allows the government to claim
secret legal arguments to support secret proceedings using secret evidence. In addition, some cases never make it to court at all. The federal
courts routinely deny constitutional challenges to policies and programs under a narrow definition of standing to bring a case. War crimes The
world clamored for prosecutions of those responsible for waterboarding terrorism suspects during the Bush administration, but the Obama
administration said in 2009 that it would not allow CIA employees to be investigated or prosecuted for such actions. This gutted not just treaty
obligations but the Nuremberg principles of international law. When courts in countries such as Spain moved to investigate Bush officials for
war crimes, the Obama administration reportedly urged foreign officials not to allow such cases to proceed, despite the fact that the United
States has long claimed the same authority with regard to alleged war criminals in other countries. (Various nations have resisted investigations
of officials accused of war crimes and torture. Some, such as Serbia and Chile, eventually relented to comply with international law; countries
that have denied independent investigations include Iran, Syria and China.) Secret court The
government has increased its use of
the secret Foreign Intelligence Surveillance Court, which has expanded its secret warrants to include
individuals deemed to be aiding or abetting hostile foreign governments or organizations. In 2011, Obama renewed these powers, including
allowing secret searches of individuals who are not part of an identifiable terrorist group. The administration has asserted the right to ignore
congressional limits on such surveillance. (Pakistan places national security surveillance under the unchecked powers of the military or
intelligence services.) Immunity from judicial review Like the Bush administration, the Obama administration has successfully
pushed for immunity for companies that assist in warrantless surveillance of citizens, blocking the ability
of citizens to challenge the violation of privacy. (Similarly, China has maintained sweeping immunity claims both inside and
outside the country and routinely blocks lawsuits against private companies.) Continual monitoring of citizens The Obama administration has
successfully defended its claim that it can use GPS devices to monitor every move of targeted citizens
without securing any court order or review. It is not defending the power before the Supreme Court — a
power described by Justice Anthony Kennedy as “Orwellian.” (Saudi Arabia has installed massive public surveillance
systems, while Cuba is notorious for active monitoring of selected citizens.) Extraordinary renditions The government now has the ability to
transfer both citizens and noncitizens to another country under a system known as extraordinary rendition, which has been denounced as using
other countries, such as Syria, Saudi Arabia, Egypt and Pakistan, to torture suspects. The Obama administration says it is not continuing the
abuses of this practice under Bush, but it insists on the unfettered right to order such transfers — including the possible transfer of U.S. citizens.
These new laws have come
with an infusion of money into an expanded security system on the state and
federal levels, including more public surveillance cameras, tens of thousands of security personnel and a
massive expansion of a terrorist-chasing bureaucracy. Some politicians shrug and say these increased powers are merely a
response to the times we live in. Thus, Sen. Lindsey Graham (R-S.C.) could declare in an interview last spring without objection that “free
speech is a great idea, but we’re in a war.” Of course, terrorism will never “surrender” and end this particular “war.” Other politicians
rationalize that, while such powers may exist, it really comes down to how they are used. This is a common response by liberals who cannot
bring themselves to denounce Obama as they did Bush. Sen. Carl Levin (D-Mich.), for instance, has insisted that Congress is not making any
decision on indefinite detention: “That is a decision which we leave where it belongs — in the executive branch.” And in a signing statement
with the defense authorization bill, Obama said he does not intend to use the latest power to indefinitely imprison citizens. Yet, he still
accepted the power as a sort of regretful autocrat. An
authoritarian nation is defined not just by the use of
authoritarian powers, but by the ability to use them. If a president can take away your freedom or your
life on his own authority, all rights become little more than a discretionary grant subject to executive will. The
framers lived under autocratic rule and understood this danger better than we do. James Madison famously
warned that we needed a system that did not depend on the good intentions or motivations of our
rulers: “If men were angels, no government would be necessary.” Benjamin Franklin was more direct. In 1787, a Mrs. Powel confronted
Franklin after the signing of the Constitution and asked, “Well, Doctor, what have we got — a republic or a monarchy?” His response was a bit
chilling: “A republic, Madam, if you can keep it.” Since
9/11, we have created the very government the framers
feared: a government with sweeping and largely unchecked powers resting on the hope that they will be
used wisely.
The USA Freedom Act attempted reform, but it only institutionalizes NSA spying; it
can’t solve the advantage
Zeese, 2015 (Kevin, lawyer and privacy advocate, “Modest changes to US patrit act left major problems
unresolved,” RT, June 1, http://rt.com/op-edge/263861-patriot-act-surveillance-snowden-usa/)
Kevin Zeese: [Yesterday] the Senate basically decided to go forward with the USA Freedom Act, which will
make some modest
changes to the Patriot Act. The main change will be that the metadata will no longer be stored by the
federal government or the NSA, rather it will be stored by the telephone companies, and then if the NSA
wants to get access, they have to apply, and get a warrant from a judge to do so. So that is an improvement on a portion of
the Patriot Act. We still have a major problem in the US of massive NSA snooping, and that’s really left
unresolved. I supported Rand Paul’s effort, the Republican from Kentucky, to try to stop the Patriot Act from being renewed, and real
rethinking of how we deal with this kind of intelligence gathering in the US and around the world; it is not just snooping in the US, but around
the world as well. Unfortunately, I think the Senate is going to go forward with a modest change, a slight improvement. I guess you can look at
that in two ways: it
is a slight improvement, it is the first time the Patriot Act has lost any power, but it does also
institutionalize the practice of this kind of snooping and provides now a new way of handling it and it
combines corporate and government working together, which is always dangerous in the US.
Supreme court action is key to restore global democracy – judicial independence is
internationally modeled and checks authoritarianism caused by rising executive power
Flaherty, 2008 (Martin S., Co-Director for International Law and Justice, Leitner Family Professor in International
Human Rights, Fordham Law School; visiting Professor, Woodrow Wilson School of Public and International Affairs, Princeton
University, “Globalization and Executive power,” Internationall Human rights Colloquium at Georgetown Law, Spring,
http://www.law.georgetown.edu/internationalhrcolloquium/documents/GEPLRev.doc)
That “old-time” separation of powers should be enough to turn back any trend toward deference. The balance of this essay, however, offers
one more which is at once more original and potentially the most powerful. Call this separation of powers in a global context – or “global
separation of powers” for short. The premise is straightforward. It assumes, first, that globalization generally has resulted in
a net gain in power not for judiciaries, but for the “political” branches – and above all for executives – within domestic
legal systems. In other words, the growth of globalized transnational government networks has yielded an imbalance among the three (to four)
Such an imbalance, among other things, poses a significant and
growing threat for the protection of individual rights by domestic courts, whether on the basis of international or
national norms. Yet is separation of powers analysis helps identify the problem, it also suggests the solution. If
globalization has comparatively empowered executives in particular, it follows that fostering – rather than prohibiting –
judicial globalization provides a parallel approach to help restore the balance. In this way, judicial separation of
powers justifies judicial borrowing on both non-democratic and non-democratic grounds. From a non-democratic
perspective, transnational judicial dialogue with reference to international law and parallel comparative questions gives
major branches of government in separation of powers terms.
national judiciaries a unique expertise on once aspect of foreign affairs, and so is a further exception to the usual
presumption that the judiciary is the least qualified branch of government for the purposes of foreign affairs. More important,
from a democratic point of view, restoring the balance that separation of powers seeks promotes self-government
to the extent that separation of powers is itself seen as a predicate for any well-ordered form of democratic selfgovernment.
Constitutional liberalism and respect for civil liberties is key to achieve democratic
peace
Tarzi, 2007 (Shah M., L. Morgan Chair of International Affairs, “Democratic peace, illiberal democracy,
and conflict behavior,” International Journal on World Peace, Vol. XXIV, No. 4, December)
The proposition that mature, stable "constitutionally liberal" democratic republics do not go to . war with each other is
compelling. or dyadic peace, is ^his type of democracy implies also widespread in "constitutional liberalism," which, as international relations.
Eareed Zakada has aptly stated, refers to "the tradition, deep in Western history, that seeks to protect an individual's autonomy and dignity
against coercion, whatever the source—state, church, or society."^ A
glance at Western democracies in North America and
Western Europe today would have one readily conclude that mature "constitutional liberal"
democracies are highly unlikely to initiate war with each other. The overwhelming majority of democracies
today, however, can be characterized as young democracies, in most instances even as protodemocratic
regimes, semi-democracies, or "illiberal democracies."^ This essay offers preliminary observations on the importance of the
profound analytical and evidentiary divide between the mature "liberal constitutional" democracy and the other types. While war
between liberal democracies is rare or less likely, electoral democracy does not necessarily lead to
"liberal constitutionalism," and therefore it does not follow that these are as unlikely to engage in
confiict with other democratic regimes. Without paying due attention to this divide, there is the danger that the rich body of
empirical research may become a justification rather than an explanation for the mutual democratic pacifism thesis. This essay highlights the
theoretical basis of democratic peace theory and the evidence offered to support the causal logic. Accordingly, the next section will refiect on
the key normative and institutional explanations in support of this theory and present selective samples of empirical findings that buttress the
causal link. Next, this article underscores some of the shortcomings of democratic peace and examine the challenges to the theory, including
that posed by the realist critique. Thereaft:er, the study draws attention to several interpretive examples to illuminate the aforementioned
propositions. The ultimate goal is to generate overall hypotheses that take into account the different types of democracies referenced above
and thus present opportunity for additional systematic studies. THE DYADIC PATHWAY TO DEMOCRATIC PEACE There
are two widelyoffered explanations regarding the causal logic for democratic war behavior and democratic peace. The
normative explanation stresses the role of democratic political culture and shared democratic values
and norms. Accordingly, common values, including respect for individual freedom, human rights, civil liberties, due
process, and related broader shared beliefs about representative government are vital for explaining known facts regarding
democratic behavior. According to William Dixon, one vital shared norm is the "normative guideline of bounded
competition," that is, political leaders recognize the legitimacy of competing values and interests and
are experienced in its exercise when international disputes involve democracies. "In situations where both parties
to a dispute are democracies, not only do both sides subscribe to these norms, the leaders of botii are fully cognizant that bounded competition
is the norm, both for themselves and for their opponents.'" Several authors, noted scholar Bruce Russet among them, emphasize
tiic
role of pacific settlement of disputes, reliance on negotiation, arriving at mutually acceptable
compromise, and other elements of the democratic political culture. These attributes shape approaches to political
dispute resolution amongst democratic states.'" Russet in particular notes the relevance of the norm of peaceful conflict
resolution amongst democracies. This is a nineteenth century social norm that found application and confirmation in the World
War II and Cold War alliances among Western democracies." Finally, a modern version of the classical Kantian formulation argues that a
combination of factors such as the commitment of democratic governments to human rights, citizens'
abhorrence of violence, the fact that citizens bear the cost of war, and the ability of citizens to constrain
political leaders, together make it difficult for democratic governments to engage in war with other
democracies.'^
This form of institution-building is the only way to prevent democratization from
causing instability and war
Owen, 2005 (John M., Associate Professor of Politics at the University of Virginia, “Iraq and the
Democratic peace,” Foreign Affairs, Vol. 84, No. 6)
The theory, which originated in the work of the eighteenth-century philosopher Immanuel Kant and was refined in the 1970s and 1980s by
several researchers working independently, has, since the 1990s, been one of the hottest research areas in international relations. Although
some skeptics remain and no one agrees about why exactly it works, most
academics now share the belief that
democracies have indeed made a separate peace. What is more, much research suggests that they are also
unusually likely to sign and honor international agreements and to become economically
interdependent. The administrations of Presidents George H.W. Bush and Bill Clinton made frequent appeals to the theory in public, and
it seems to have informed their support for democratization in former communist lands and in Haiti. The current Bush administration, however,
has gone much further in its faith in the idea, betting the farm that the theory holds and will help Washington achieve a peaceful, stable, and
prosperous Muslim world as, over time, Iraq's neighbors, following Iraq's example, democratize. The United States' real motives for attacking
Iraq may have been complex, but "regime change"-the replacement of Saddam Hussein's gruesome tyranny with a democracy-was central to
Washington's rhetoric by the time it began bombing Baghdad in March 2003. Why has a president who set his defining policy around one of
political science's crown jewels come in for so much venom from the same academics who endorse the idea? After all, a host of peer-reviewed
journal articles have implicitly supported the president's claim that a democratic Iraq would not threaten the United States or Israel, develop
weapons of mass destruction, or sponsor terrorism. Are professors simply perpetual critics who refuse to take responsibility for the
consequences of their ideas? Or does Bush hatred trump social science? The Bush
administration's desire to break with its
predecessors and alter the authoritarian status quo in the Middle East was admirable. But the White House
got its science wrong, or at least not completely right: the democratic peace theory does not dictate that the United
States can or should remake Iraq into a democracy. In Electing to Fight: Why Emerging Democracies Go to War, the veteran
political scientists Edward Mansfield and Jack Snyder make two critical points. Not only is turning authoritarian countries into democracies
extremely difficult, much more so than the administration seems to have anticipated. The Middle East could also become a much more
dangerous place if Washington and the rest of the world settle for a merely semi-democratic regime in Baghdad. Such an Iraq, Mansfield and
Snyder imply, would be uncommonly likely to start wars--a bull in the Middle Eastern china shop. Unfortunately, such an Iraq may also be just
what we are likely to end up with. ILLIBERAL DEMOCRACIES At first glance, the realists' critique of the Iraq war is easier to understand than that
of the democratic peace theorists. Indeed, realism--which holds that a country's type of government has no systematic effects on its foreign
policy--is enjoying a revival in Washington these days, precisely because of the war. According to the realists, the best way to have dealt with
Saddam would have been not to overthrow him but to use coercive bargaining: to have threatened him with annihilation, for example, if he
ever used nuclear weapons. Even
the democratic peace theory, however, does not necessarily prescribe the use of
force to transform despotisms such as Iraq into democracies. Indeed, by itself, the argument that democracies do not fight
one another does not have any practical implications for the foreign policymaker. It needs an additional or minor premise, such as "the United
States can make Iraq into a democracy at an acceptable cost." And it is precisely this minor premise about which the academy has been
skeptical. No scholarly consensus exists on how countries become democratic, and the literature is equally murky on the costs to the United
States of trying to force them to be free. This last part of the puzzle is even more complicated than it first appears. Enter Mansfield and Snyder,
who have been contributing to the democratic peace debate for a decade. Their thesis, first published in 1995, is that although
mature
democracies do not fight one another, democratizing states--those in transition from authoritarianism to democracy-do,
and are even more prone to war than authoritarian regimes. Now, in Electing to Fight, the authors have refined their
argument. As they outline in the book, not only are "incomplete democratizing" states--those that develop democratic institutions in the wrong
order--unlikely ever to complete the transition to democracy; they are also especially bellicose. According to Mansfield and Snyder, in
countries that have recently started to hold free elections but that lack the proper mechanisms for
accountability (institutions such as an independent judiciary, civilian control of the military, and protections for opposition parties and the
press), politicians have incentives to pursue policies that make it more likely that their countries will start
wars. In such places, politicians know they can mobilize support by demanding territory or other spoils
from foreign countries and by nurturing grievances against outsiders. As a result, they push for extraordinarily
belligerent policies. Even states that develop democratic institutions in the right order--adopting the rule of law before holding elections-are
very aggressive in the early years of their transitions, although they are less so than the first group and more likely to eventually turn into full
democracies. Of course, politicians
in mature democracies are also often tempted to use nationalism and xenophobic rhetoric to
buttress their domestic power. In such cases, however, they are usually restrained by institutionalized mechanisms of
accountability. Knowing that if they lead the country into a military defeat or quagmire they may be punished at the next election,
politicians in such states are less likely to advocate a risky war. In democratizing states, by contrast, politicians know that
they are insulated from the impact of bad policies: if a war goes badly, for example, they can declare a state of emergency, suspend
elections, censor the press, and so on. Politicians in such states also tend to fear their militaries, which often crave foreign enemies and will
overthrow civilian governments that do not share their goals. Combined, these
factors can make the temptation to attack
another state irresistible. Mansfield and Snyder present both quantitative and case-study support for
their theory. Using rigorous statistical methods, the authors show that since 1815, democratizing states have indeed been
more prone to start wars than either democracies or authoritarian regimes. Categorizing transitions according to
whether they ended in full democracies (as in the U.S. case) or in partial ones (as in Germany in 1871-1918 or Pakistan throughout its history),
the authors find that in the early years of democratic transitions, partial democracies--especially those that get their institutions in the wrong
order--are indeed significantly more likely to initiate wars. Mansfield and Snyder then provide several succinct stories of democratizing states
that did in fact go to war, such as the France of Napoleon III (1852-70), Serbia between 1877 and 1914, Ethiopia and Eritrea between 1998 and
2000, and Pakistan from 1947 to the present. In most of these cases, the authors find what they expect: in these democratizing states, domestic
political competition was intense. Politicians, wing for power, appeased domestic hard-liners by resorting to nationalistic appeals that vilified
foreigners, and these policies often led to wars that were not in the countries' strategic interests. Although their argument would have been
strengthened by a few comparative studies of democratizing states avoiding war and of flail democracies and authoritarian states starting wars,
Mansfield and Snyder are persuasive. In part this is because they carefully circumscribe their claims. They acknowledge that some cases are
"false positives," that is, wars started by states that have wrongly been classified as democratizing, such as the Iran-Iraq War, started by Iraq in
1980. They also answer the most likely objections to their argument. Some skeptics, for example, might counter that Mansfield and Snyder get
the causality reversed: it is war or the threat of it that prevents states from becoming mature democracies. Others might argue that
democratizing states become involved in more wars simply because their internal instability tempts foreign states to attack them--in other
words, that democratizers are more sinned against than sinning. Analyzing data from 1816 through 1992, Mansfield and Snyder put paid to
these alternative explanations. Bad domestic institutions usually precede wars, rather than vice versa, and democratizing states usually do the
attacking. Where does Electing to Fight leave realism, the dominant theory of international conflict? The quantitative data support the realist
claims that major powers are more likely to go to war than minor ones and that the more equal are the great powers, the more likely are wars
among them. But democratization makes war more likely even after one takes these factors into account. Furthermore, the case studies
suggest that democratizing states very often lose more than they gain from the wars they begin, which implies that they do not respond to
international incentives as rationally as realism would expect. That said, notwithstanding its preference for viewing states from the inside, the
Mansfield-Snyder theory is still "realist" in the general sense that it assumes that politicians and other actors are rationally self-interested. Their
self-interest simply involves building and maintaining domestic power as well as external security--and sometimes trading some of the latter in
order to gain the former. The authors' conclusions for foreign
policy are straightforward. The United States and other
international actors should continue to promote democracy, but they must strive to help democratizing
states implement reforms in the correct order. In particular, popular elections ought not to precede the
building of institutions that will check the baleful incentives for politicians to call for war. Mansfield and Snyder are
unsparing toward well-intentioned organizations that have pressured authoritarian governments to rush to elections in the past--often with
disastrous consequences. As the authors show, for example, it was organizations such as the World Bank and the National Democratic Institute
that pushed Burundi and Rwanda to increase popular sovereignty in the early 1990s--pressure that, as Mansfield and Snyder argue, helped set
off a chain of events that led to genocide. Acknowledging their intellectual debt to writers such as Samuel Huntington (particularly his 1968
book Political Order in Changing Societies) and Fareed Zakaria, Mansfield and Snyder have written a deeply conservative book. Sounding like
Edmund Burke on the French Revolution but substituting statistics and measured prose for rhetorical power, the
authors counsel
against abruptly empowering people, since premature elections may well usher in domestic upheavals
that thrust the state outward against its neighbors.
Democracy is key to solve multiple existential risks
Diamond, prof of pol sci, 95—prof of political science and sociology, Stanford. Senior research fellow at Hoover. (Larry, Promoting Democracy in the 1990s,
http://wwwics.si.edu/subsites/ccpdc/pubs/di/1.html)
Nuclear, chemical, and biological weapons continue to proliferate. The very source of life on Earth, the global ecosystem, appears increasingly
endangered. Most of these new and unconventional threats to security are associated with or aggravated by the weakness or absence of democracy, with its provisions for legality,
accountability, popular sovereignty, and openness. LESSONS OF THE TWENTIETH CENTURY The experience of this century offers important lessons. Countries that govern
themselves in a truly democratic fashion do not go to war with one another. They do not aggress against their neighbors to
aggrandize themselves or glorify their leaders. Democratic governments do not ethnically "cleanse" their own populations, and they are much less likely to face ethnic insurgency. Democracies
do not sponsor terrorism against one another. They do not build weapons of mass destruction to use on or to threaten one another. Democratic
countries form more reliable, open, and enduring trading partnerships. In the long run they offer better and more stable climates for investment. They are
more environmentally responsible because they must answer to their own citizens, who organize to protest the destruction of their environments.
Democracy incrementally reduces the risk of war and systemic harms
Rummel, prof of pol sci, 7—BA from U Hawaii and PhD in pol sci from NU. Former prof, Yale and Indiana U. Prof of pol sci, U Hawaii (R.J., 9/7, Why Freedom? Let Me
Count the Reasons, http://freedomspeace.blogspot.com/2007/09/why-freedom-let-me-count-reasons.html, AG)
Democratically free people do not make war on each other Why? The diverse groups, cross-national bonds, social links, and shared
values of democratic peoples sew them together; and shared liberal values dispose them toward peaceful negotiation and
compromise with each other. It is as though the people of democratic nations were one society This truth that democracies do not make war on each other provides a solution for eliminating
war from the world: globalize democratic freedom Second: The less free the people within any two nations are, the bloodier and more destructive the wars between them; the greater their
freedom, the less likely such wars become And third: The more freedom the people of a nation have, the less bloody and destructive their wars What this means is that we do not have to
As we promote freedom, as the people of more and more nations gain
greater human rights and political liberties, as those people without any freedom become partly free, we will decrease the bloodiness of the world’s wars. We
have already seen this in the sharp decrease in world violence with the great increase in the number of democracies. In short:
wait for all, or almost all nations to become liberal democracies to reduce the severity of war.
Increasing freedom in the world decreases the death toll of its wars. Surely, whatever reduces and then finally ends the scourge of war in our history, without causing a greater evil, must be a
moral good. And this is freedom In conclusion, then, we have wondrous human freedom as a moral force for the good. Freedom produces social justice, creates wealth and prosperity,
minimizes violence, saves human lives, and is a solution to war. In two words, it creates human security. Moreover, and most important: People should not be free only because it is good for
them. They should be free because it is their right as human beings In opposition to freedom is power, its antagonist. While freedom is a right, the power to govern is a privilege granted by a
people to those they elect and hold responsible for its use. Too often, however, thugs seize control of a people with their guns and use them to make their power total and absolute. Where
freedom produces wealth and prosperity, such absolute power causes impoverishment and famine. Where
freedom minimizes internal violence, eliminates genocide
and mass murder, and solves the problem of war, such absolute power unleashes internal violence, murders millions, and produces the bloodiest wars. In short,
power kills; absolute power kills absolutely.
Advantage 2 – Legitimacy
NSA metadata collection hurts US soft power – it’s used for propaganda by
competitors
Arkedis, 2013 (Jim, senior fellow at the Progressive Policy Institute, “PRISM is bad for American soft
power,” The Atlantic, June 19, http://www.theatlantic.com/international/archive/2013/06/prism-is-badfor-american-soft-power/277015/)
There was a foreign policy angle to Truman's civil rights awakening, too. In the ideological battle pitting
democracy against communism, the Soviet Union began to churn out propaganda saying that Jim Crow
proved America's inability to live up to its own fundamental values on human rights. The argument was effective,
argues Caley Robertson of Colby University: segregation was frustrating the United States' attempts to export democracy during the Cold War.
In other words, Jim
Crow was damaging America's soft power, defined by Harvard professor Joseph Nye as a country's ability
to achieve its aims through attraction rather than coercion. Which brings us to PRISM, the NSA program that collects
meta-data from Americans' telephone and online communications. I am a former Department of Defense intelligence
analyst. I have never used PRISM, and do not know if it existed during my tenure. However, I have used NSA databases, and became aware of
two ironclad truths about the agency: First, its data is a critical intelligence tool; and second, that access to databases by non-NSA intelligence
analysts is highly controlled. It's like buying drugs (so I'm told): you need "a guy" on the inside who passes you the goods in the shadows, then
disavows any connection to you. In addition to being useful and tightly controlled, PRISM is, of course, legal by the letter of the law. Its
existence is primarily justified by the "business records" clause in the PATRIOT Act, and President Obama has argued that the legislation has
been authorized by "bipartisan majorities repeatedly," and that "it's important to understand your duly elected representatives have been
consistently informed on exactly what we're doing." Salvation from excessive government snooping would seem to lie at the ballot box. Fair
enough. But in the immediate wake of September 11, Americans questioned little of what their government would do to keep them safe. Just
four months after the attacks in January 2002, Gallup reported that fully half of Americans would support anti-terrorism measures even if they
violated civil liberties. Times have changed. As soon as August 2003, Gallup found just 29 percent of Americans were willing to sacrifice civil
liberties for security. By 2009, a CBS poll concluded only 41 percent of Americans had even heard or read about the PATRIOT Act, and 45
percent of those believed the law endangered their civil liberties. A Washington Post poll from April 2013--after the Boston marathon attacks
but before PRISM's disclosure-- found 48 percent of Americans feared the government would go too far in compromising constitutional rights
to investigate terrorism. And following the Edward Snowden leaks, 58 percent were against the government collecting phone records. Not a
total reversal, but certainly trending in one direction. This shift has existed in a vacuum of public debate. Prior
to the PRISM leaks,
the last time domestic government surveillance made headlines was in very late 2005 and early 2006,
following revelations that the Bush administration was wiretapping Americans without a warrant.
Despite the scandal, the PATRIOT Act was quickly reauthorized by March 2006. The Bush administration did announce
the end of warrantless wiretapping in 2007, and he moved the program under jurisdiction of the FISA court , a panel of Supreme Courtappointed judges who approve domestic surveillance requests. To call the FISA court a rubber stamp is an understatement. This year, it has
rejected a grand total of 11 warrant requests out of--wait for it--33,996 applications since the Carter administration. The PATRIOT Act's
reauthorization wouldn't come up again until 2009. By then, public uproar over warrantless wiretapping had long since receded, and the year's
debate played out as a relatively quite inside-baseball scuffle between civil liberties groups and the Hill. When the law came up for its next
presidential signature in 2011, it was done quietly by autopen--a device that imitates Obama's John Hancock--from France. Shifting
attitudes and quiet reauthorization flies in the face of the standard the president has set for himself. In a
2009 speech at the National Archives, Obama emphasized the importance of the consent of the governed in
security affairs, "I believe with every fiber of my being that in the long run we cannot keep this country safe unless we enlist the power of
our most fundamental values... My administration will make all information available to the American people so that they can make informed
judgments and hold us accountable." The
president's inability to live up to this ideal is particularly jarring as he
defends PRISM. Following the leaks, he's said he is pushing the intelligence community to release what it
can, and rightly insists that the NSA is not listening in on Americans' phone calls. Those are helpful steps, but should have been raised during
the National Archives speech just months into his administration, not six months into his second term. Director of National Intelligence James
Clapper continues to argue that disclosure of collection methods will give America's enemies a
"'playbook' to avoid detection." That's thin gruel. First, America's enemies are already aware of the NSA's extensive electronic
surveillance capabilities. That's why Osama Bin Laden and deceased al Qaeda in Iraq leader Abu Musab al Zarqawi used a complex network of
couriers rather than electronic communications. It's typical operational security of truly dangerous operatives. Second, Obama stated as
recently as late May that the threat from al Qaeda's core operatives has decreased significantly, shifting to less deadly cells scattered
throughout the Middle East and North Africa. The
lack of public debate, shifting attitudes towards civil liberties,
insufficient disclosure, and a decreasing terrorist threat demands that collecting Americans' phone and
Internet records must meet the absolute highest bar of public consent. It's a test the Obama administration is failing.
This brings us back to Harry Truman and Jim Crow. Even though PRISM is technically legal, the lack of recent public debate and support for
aggressive domestic collection is hurting America's soft power. The evidence is rolling in. The China Daily, an Englishlanguage mouthpiece for the Communist Party, is having a field day, pointing out America's hypocrisy as the Soviet
Union did with Jim Crow. Chinese dissident artist Ai Wei Wei made the link explicitly, saying "In the Soviet Union before, in China
today, and even in the U.S., officials always think what they do is necessary... but the lesson that people should learn from history is the need to
limit state power." Even
America's allies are uneasy, at best. German Chancellor Angela Merkel grew up in the East
German police state and expressed diplomatic "surprise" at the NSA's activities. She vowed to raise the
issue with Obama at this week's G8 meetings. The Italian data protection commissioner said the program would
"not be legal" in his country. British Foreign Minister William Hague came under fire in Parliament for his government's participation.
Unrestrained NSA surveillance undermines US soft power and prevents it from
maintaining influence amid shrinking material power gap
Quinn, 2013 (Adam, Senior lecturer in international politics at the University of Birmingham in
Birmingham, Britain, “NSA revelations threaten Obama’s soft power and America’s global influence,”
CSM, October 29, http://www.csmonitor.com/Commentary/Opinion/2013/1029/NSA-revelationsthreaten-Obama-s-soft-power-and-America-s-global-influence)
For presidents, like sports-team managers, the tough weeks tend to outnumber the jubilant. But even by the standards of an unforgiving job,
Barack Obama
could be forgiven for feeling unusually buffeted of late. Many of the blows have come on
the domestic front, with the all-consuming stand-off of the government shutdown segueing into frantic efforts to defend and repair the
roll-out of Obamacare amid charges of fatal technological incompetence. But if he were tempted to seek solace in the autonomy
of foreign policy – as modern presidents have been wont to do – there has been little consolatory triumph to be
found. In August and September, he was caught in a mighty tangle over Syria, threatening military strikes over
its chemical weapons use before being hamstrung first by Britain’s refusal to join the charge and then by
the reluctance of his own Congress. The legacy of that mess continues to work itself out in unpredictable
ways, such as increasingly public tensions between the United States and Saudi Arabia, hitherto one of its more solid allies. Though the
eventual Russian-orchestrated deal to remove Syria’s chemical weapons was a respectable one given
the circumstances, the episode as a whole spoke of an America straining to translate its power into
influence, or to maintain, a united front among its friends. Recommended: 3 views on NSA reform Now the rolling
scandal over National Security Agency (NSA) surveillance, triggered by the mass leak of secrets by Edward Snowden, has
entered another phase of intensity, this time centered on Europe. Revelations that the US tapped the phone of
German Chancellor Angela Merkel, operated numerous “listening posts” on European soil, and sucked up
vast quantities of communications data from millions of citizens across Europe have broken in the press.
Public expressions of displeasure have been forthcoming, including a European Union statement. Taken together, these
vignettes of public dissension will be enough to make many ask the question: Is the US losing its
influence even over its allies? Is this just a tricky moment for a particular president, or is it a harbinger of a broader trend? 3 views
on NSA reform GALLERY Monitor Political Cartoons PHOTOS OF THE DAY Photos of the weekend Global shift First, the necessary caveats:
Enduring alliance relationships resemble long marriages, in that the mere presence of moments of strain, or even audible arguments, cannot be
taken as evidence of imminent separation. Looking back over the longer-term history of America’s relations with its allies, episodes such as the
Vietnam War, the “Euromissile” crisis of the 1980s, and the controversial interventions in the former Yugoslavia in the 1990s demonstrate that
sharp differences of opinion and conflicting priorities are no radical, new state of affairs. And however unhappy they may be with their recent
treatment, it is not obvious that countries such as Germany, France, or Saudi Arabia have anywhere to go if they did decide the time had come
to tout for alternative alliance partners. It is not entirely clear how European annoyance might manifest in ways that have practical importance.
It is true the Europeans have it in their power to threaten progress on the Transatlantic Trade and Investment Partnership process, but it is not
clear that such an action would harm the US more than Europe itself. In short, even if they are disgruntled, necessity may ultimately prove a
sufficient force to help them get over it. The
reason present friction between the US and its allies carries greater
weight, however, is that it arises in the context of a global shift in power away from the US and its
established allies and toward new powers. The prospect of “American decline” in terms of relative international
power is the focus of a great deal of debate over both substance and semantics. But the central fact is that
even the part of the US’s own intelligence apparatus charged with long-term foresight regards it as
established that, within 20 years, the world will have transitioned from the “unipolar” American
dominance of the first post-cold war decades to a world in which multiple centers of power must
coexist. The center of economic gravity has already shifted markedly toward Asia during the last decade. This certainly does not mean any
single new power is about to rise to replace the US as a hegemonic force. Nor does it mean the US will be going anywhere: The scale of its
existing advantages across a range of fronts – military, economic, institutional – is sufficiently great that it is assured a prominent place at the
table of whatever order may come. What it
does mean is that Americans must presently be engaged in thinking
carefully about how best to leverage their advantages to retain the maximum possible influence into the
future. If they cannot continue to be first among equals in managing the world order, they will wish at
least to ensure that order is one that runs in line with their own established preferences. Soft power Many
of those who are optimistic about the ability of the US to pull off this project of declining power without
declining influence place emphasis on two things: the extent to which the US has soft power due to
widespread admiration for its political and cultural values, and the extent to which it has locked in
influence through the extent of its existing networks of friends and allies. Even if these advantages cannot arrest America’s decline on
harder metrics, if played properly, they can mitigate its consequences and secure an acceptable future. Shoring up
support from like-minded countries such as those of Europe ought to be the low-hanging fruit of such an effort. So the
current problems do harm on both fronts. It will be difficult to maintain the allure of soft power if global opinion
settles on the view that American political discord has rendered its democracy dysfunctional at home, or
that its surveillance practices have given rein to the mores of a police state. And it will be harder to preserve
American status through the force of its alliances if its politicians' economic irresponsibility (for example, publicly contemplating a default on
American national debt) or scandals over surveillance or drone strikes alienate their public or cause their leaders to question the extent to
which they really are on the same side as the US.
Restoration of judicial enforcement of constitutional norms is key to overall US
legitimacy; this solves major power war
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
International relations scholars are still struggling to define the current era. The U.S.-led international order is unipolar, hegemonic,
and, in some ways, imperial. In any event, this order diverges from traditional realist assumptions in
important respects. It is
unipolar, but stable. It is more hierarchical. The U.S. is not the same as other states; it performs unique functions in the world and
has a government open and accessible to foreigners. And the stability and legitimacy of the system depends more on
successful functioning of the U.S. government as a whole than it does on balancing alliances crafted by elite statesmen
practicing realpolitik. “[W]orld power politics are shaped primarily not by the structure created by interstate anarchy but by the foreign policy
developed in Washington.”368 These differences require a new model for assessing the institutional competences of the executive and judicial
branches in foreign affairs. One approach would be to adapt an institutional competence model using insights from a major alternative theory
of international relations – liberalism. Liberal IR theory generally holds that internal characteristics of states – in particular, the form of
government – dictate states behavior, and that democracies do not go to war against one another.369 Liberalists also regard economic
interdependence and international institutions as important for maintaining peace and stability in the world.370 Dean Anne-Marie Slaughter
has proposed a binary model that distinguishes between liberal, democratic states and non-democratic states.371 Because domestic and
foreign issues are “more convergent” among liberal democracies, Slaughter reasons, the courts should decide issues concerning the scope of
the political branches’ powers.372 With respect to non-liberal states, the position of the U.S. is more “realist,” and courts should deploy a high
level of deference.373 A strength of Dean Slaughter’s binary approach is that it would tend to reduce the uncertainty in foreign affairs
adjudication. Professor Nzelibe has criticized this approach because it would put courts in the difficult position of determining which countries
are liberal democracies.374 But even if courts are capable of making these determinations, they would still face the same dilemmas
adjudicating controversies regarding non-liberal states. Where is the appropriate boundary between foreign affairs and domestic matters? How
much discretion should be afforded the executive when individual rights and accountability values are at stake? To resolve these dilemmas, an
institutional competence model should be applicable to foreign affairs adjudication across the board. In constructing a new realist model, it is
worth recalling that the functional justifications for special deference are aimed at addressing problems of a particular sort of role
effectiveness—which allocation of power among the branches will best achieve general governmental effectiveness in foreign affairs. In the
21st Century, America’s global role has changed, and the best means of achieving effectiveness in foreign affairs have changed as well. The
international realm remains highly political—if not as much as in the past— but it is American politics that matters most. If the U.S. is truly an
empire— and in some respects it is—the problems of imperial management will be far different from the problems of managing relations with
one other great power or many great powers. Similarly, the management of hegemony or unipolarity requires a different set of competences.
Although American predominance is recognized as a salient fact, there is no consensus among realists about the precise nature of the current
international order.375 The hegemonic model I offer here adopts common insights from the three IR frameworks—unipolar, hegemonic, and
imperial—described above. First, the “hybrid” hegemonic model assumes that the goal of U.S. foreign affairs should be
the preservation of American hegemony, which is more stable, more peaceful, and better for America’s security
and prosperity, than the alternatives. If the United States were to withdraw from its global leadership role, no other
nation would be capable of taking its place.376 The result would be radical instability and a greater risk of major
war.377 In addition, the United States would no longer benefit from the public goods it had formerly produced; as the largest consumer, it
would suffer the most. Second, the hegemonic model assumes that American hegemony is unusually stable and durable.378 As noted above,
other nations have many incentives to continue to tolerate the current order.379 And although other nations or groups of nations—China, the
European Union, and India are often mentioned—may eventually overtake the United States in certain areas, such as manufacturing, the U.S.
will remain dominant in most measures of capability for decades to come. In 2025, the U.S. economy is projected to be twice the size of
China’s.380 The U.S. accounted for half of the world’s military spending in 2007 and holds enormous advantages in defense technology that far
outstrip would-be competitors.381 Predictions of American decline are not new, and they have thus far proved
premature.382 Third, the hegemonic model assumes that preservation of American hegemony depends not just on power, but
legitimacy.383 All three IR frameworks for describing predominant states—although unipolarity less than hegemony or empire—suggest that
legitimacy is crucial to the stability and durability of the system. Although empires and predominant states in
unipolar systems can conceivably maintain their position through the use of force, this is much more likely to
exhaust the resources of the predominant state and to lead to counter-balancing or the loss of control.384
Legitimacy as a method of maintaining predominance is far more efficient. The hegemonic model generally values courts’
institutional competences more than the anarchic realist model. The courts’ strengths in offering a stable
interpretation of the law, relative insulation from political pressure, and power to bestow legitimacy are important
for realizing the functional constitutional goal of effective U.S. foreign policy . This means that courts’ treatment of deference
in foreign affairs will, in most respects, resemble its treatment of domestic affairs. Given the amorphous quality of foreign affairs deference,
this “domestication” reduces uncertainty. The increasing boundary problems caused by the proliferation of treaties and the infiltration of
domestic law by foreign affairs issues are lessened by reducing the deference gap. And the dilemma caused by the need to weigh different
functional considerations—liberty, accountability, and effectiveness—against one another is made less intractable because it becomes part of
the same project that the courts constantly grapple with in adjudicating domestic disputes.
Wars from US hegemonic decline spread globally and go nuclear
Kagan 7 (Robert, Senior Associate at the Carnegie Endowment for International Peace, “End of Dreams, Return of History” Policy Review,
http://www.hoover.org/publications/policyreview/8552512.html#n10)
This is a good thing, and it should continue to be a primary goal of American foreign policy to perpetuate this relatively benign international configuration of power. The unipolar order
with the United States as the predominant power is unavoidably riddled with flaws and contradictions. It inspires fears and jealousies. The United States is not immune to error, like all other
nations, and because of its size and importance in the international system those errors are magnified and take on greater significance than the errors of less powerful nations.
Compared to the ideal Kantian international order, in which all the world's powers would be peaceloving equals, conducting themselves wisely, prudently, and in strict obeisance to international law, the
unipolar system is both dangerous and unjust. Compared to any plausible alternative in the real world,
however, it is relatively stable and less likely to produce a major war between great powers. It is also
comparatively benevolent, from a liberal perspective, for it is more conducive to the principles of economic and political liberalism that Americans and many others value. American
predominance does not stand in the way of progress toward a better world, therefore. It stands in the way of regression toward a more
dangerous world. The choice is not between an American-dominated order and a world that looks like
the European Union. The future international order will be shaped by those who have the power to
shape it. The leaders of a post-American world will not meet in Brussels but in Beijing, Moscow, and Washington. The return of great powers and great games If the world is marked by
the persistence of unipolarity, it is nevertheless also being shaped by the reemergence of competitive national ambitions of the kind that have shaped human affairs from time immemorial.
During the Cold War, this historical tendency of great powers to jostle with one another for status and influence as well as for wealth and power was largely suppressed by the two
superpowers and their rigid bipolar order. Since the end of the Cold War, the United States has not been powerful enough, and probably could never be powerful enough, to suppress by itself
the normal ambitions of nations. This does not mean the world has returned to multipolarity, since none of the large powers is in range of competing with the superpower for global influence.
Nevertheless, several large powers are now competing for regional predominance, both with the United States and with each other. National ambition drives China's foreign policy today, and
the Chinese are powerfully motivated to
return their nation to what they regard as its traditional position as the preeminent power in East Asia.
although it is tempered by prudence and the desire to appear as unthreatening as possible to the rest of the world,
They do not share a European, postmodern view that power is passé; hence their now two-decades-long military buildup and modernization. Like the Americans, they believe power, including
military power, is a good thing to have and that it is better to have more of it than less. Perhaps more significant is the Chinese perception, also shared by Americans, that status and honor,
Japan, meanwhile, which in the past could have been counted as an
aspiring postmodern power -- with its pacifist constitution and low defense spending -- now appears
embarked on a more traditional national course. Partly this is in reaction to the rising power of China
and concerns about North Korea's nuclear weapons. But it is also driven by Japan's own national ambition to be a leader in East Asia or at least not
and not just wealth and security, are important for a nation.
to play second fiddle or "little brother" to China. China and Japan are now in a competitive quest with each trying to augment its own status and power and to prevent the other 's rise to
predominance, and this competition has a military and strategic as well as an economic and political component. Their competition is such that a nation like South Korea, with a long unhappy
history as a pawn between the two powers, is once again worrying both about a "greater China" and about the return of Japanese nationalism. As Aaron Friedberg commented, the East Asian
Russian foreign policy, too, looks more like something from the nineteenth century. It
is being driven by a typical, and typically Russian, blend of national resentment and ambition. A postmodern
future looks more like Europe's past than its present. But it also looks like Asia's past.
Russia simply seeking integration into the new European order, the Russia of Andrei Kozyrev, would not be troubled by the eastward enlargement of the EU and NATO, would not insist on
predominant influence over its "near abroad," and would not use its natural resources as means of gaining geopolitical leverage and enhancing Russia 's international status in an attempt to
regain the lost glories of the Soviet empire and Peter the Great. But Russia, like China and Japan, is moved by more traditional great-power considerations, including the pursuit of those
valuable if intangible national interests: honor and respect. Although Russian leaders complain about threats to their security from NATO and the United States, the Russian sense of insecurity
has more to do with resentment and national identity than with plausible external military threats. 16 Russia's complaint today is not with this or that weapons system. It is the entire postCold War settlement of the 1990s that Russia resents and wants to revise. But that does not make insecurity less a factor in Russia 's relations with the world; indeed, it makes finding
India's regional
ambitions are more muted, or are focused most intently on Pakistan, but it is clearly engaged in
competition with China for dominance in the Indian Ocean and sees itself, correctly, as an emerging great power on the world scene. In the
compromise with the Russians all the more difficult. One could add others to this list of great powers with traditional rather than postmodern aspirations.
Middle East there is Iran, which mingles religious fervor with a historical sense of superiority and leadership in its region. 17 Its nuclear program is as much about the desire for regional
hegemony as about defending Iranian territory from attack by the United States. Even the European Union, in its way, expresses a pan-European national ambition to play a significant role in
the world, and it has become the vehicle for channeling German, French, and British ambitions in what Europeans regard as a safe supranational direction. Europeans seek honor and respect,
too, but of a postmodern variety. The honor they seek is to occupy the moral high ground in the world, to exercise moral authority, to wield political and economic influence as an antidote to
militarism, to be the keeper of the global conscience, and to be recognized and admired by others for playing this role. Islam is not a nation, but many Muslims express a kind of religious
nationalism, and the leaders of radical Islam, including al Qaeda, do seek to establish a theocratic nation or confederation of nations that would encompass a wide swath of the Middle East
and beyond. Like national movements elsewhere, Islamists have a yearning for respect, including self-respect, and a desire for honor. Their national identity has been molded in defiance
against stronger and often oppressive outside powers, and also by memories of ancient superiority over those same powers. China had its "century of humiliation." Islamists have more than a
century of humiliation to look back on, a humiliation of which Israel has become the living symbol, which is partly why even Muslims who are neither radical nor fundamentalist proffer their
sympathy and even their support to violent extremists who can turn the tables on the dominant liberal West, and particularly on a dominant America which implanted and still feeds the Israeli
cancer in their midst. Finally, there is the United States itself. As a matter of national policy stretching back across numerous administrations, Democratic and Republican, liberal and
conservative, Americans have insisted on preserving regional predominance in East Asia; the Middle East; the Western Hemisphere; until recently, Europe; and now, increasingly, Central Asia.
This was its goal after the Second World War, and since the end of the Cold War, beginning with the first Bush administration and continuing through the Clinton years, the United States did
Even as it maintains its position as the
predominant global power, it is also engaged in hegemonic competitions in these regions with China in
East and Central Asia, with Iran in the Middle East and Central Asia, and with Russia in Eastern Europe,
Central Asia, and the Caucasus. The United States, too, is more of a traditional than a postmodern power, and though Americans are loath to acknowledge it, they
not retract but expanded its influence eastward across Europe and into the Middle East, Central Asia, and the Caucasus.
generally prefer their global place as "No. 1" and are equally loath to relinquish it. Once having entered a region, whether for practical or idealistic reasons, they are remarkably slow to
withdraw from it until they believe they have substantially transformed it in their own image. They profess indifference to the world and claim they just want to be left alone even as they seek
daily to shape the behavior of billions of people around the globe. The jostling for status and influence among these ambitious nations and would-be nations is a second defining feature of the
Nationalism in all its forms is back, if it ever went away, and so is international competition
for power, influence, honor, and status. American predominance prevents these rivalries from
intensifying -- its regional as well as its global predominance. Were the United States to diminish its influence
in the regions where it is currently the strongest power, the other nations would settle disputes as
great and lesser powers have done in the past: sometimes through diplomacy and accommodation but often through
confrontation and wars of varying scope, intensity, and destructiveness. One novel aspect of such a multipolar world is that
most of these powers would possess nuclear weapons. That could make wars between them less likely, or it
could simply make them more catastrophic. It is easy but also dangerous to underestimate the role the United States plays in providing a measure of stability in the world even as it
new post-Cold War international system.
also disrupts stability. For instance, the United States is the dominant naval power everywhere, such that other nations cannot compete with it even in their home waters. They either happily
or grudgingly allow the United States Navy to be the guarantor of international waterways and trade routes, of international access to markets and raw materials such as oil. Even when the
United States engages in a war, it is able to play its role as guardian of the waterways. In a more genuinely multipolar world, however, it would not. Nations would compete for naval
Conflict between nations would involve struggles on the oceans as
well as on land. Armed embargos, of the kind used in World War I and other major conflicts, would
disrupt trade flows in a way that is now impossible. Such order as exists in the world rests not merely on the goodwill of peoples but on a foundation
dominance at least in their own regions and possibly beyond.
provided by American power. Even the European Union, that great geopolitical miracle, owes its founding to American power, for without it the European nations after World War ii would
Europe's stability depends on the guarantee,
however distant and one hopes unnecessary, that the U nited S tates could step in to check any dangerous development on the
continent. In a genuinely multipolar world, that would not be possible without renewing the danger of
world war. People who believe greater equality among nations would be preferable to the present American predominance often succumb to a basic logical fallacy. They believe the
never have felt secure enough to reintegrate Germany. Most Europeans recoil at the thought, but even today
order the world enjoys today exists independently of American power. They imagine that in a world where American power was diminished, the aspects of international order that they like
would remain in place. But that 's not the way it works. International order does not rest on ideas and institutions. It is shaped by configurations of power. The international order we know
today reflects the distribution of power in the world since World War ii, and especially since the end of the Cold War. A different configuration of power, a multipolar world in which the poles
were Russia, China, the United States, India, and Europe, would produce its own kind of order, with different rules and norms reflecting the interests of the powerful states that would have a
hand in shaping it. Would that international order be an improvement? Perhaps for Beijing and Moscow it would. But it is doubtful that it would suit the tastes of enlightenment liberals in the
Even under
the umbrella of unipolarity, regional conflicts involving the large powers may erupt. War could erupt
between China and Taiwan and draw in both the United States and Japan. War could erupt between Russia and Georgia, forcing the United
States and its European allies to decide whether to intervene or suffer the consequences of a Russian victory. Conflict between India and Pakistan remains possible, as
does conflict between Iran and Israel or other Middle Eastern states. These, too, could draw in other great powers, including the United States.
Such conflicts may be unavoidable no matter what policies the United States pursues. But they are more likely to erupt if the U nited S tates weakens
or withdraws from its positions of regional dominance. This is especially true in East Asia, where most nations
agree that a reliable American power has a stabilizing and pacific effect on the region. That is certainly the view of most
United States and Europe. The current order, of course, is not only far from perfect but also offers no guarantee against major conflict among the world's great powers.
of China 's neighbors. But even China, which seeks gradually to supplant the United States as the dominant power in the region, faces the dilemma that an American withdrawal could unleash
In Europe, too, the departure of the U nited S tates from the scene -- even if it remained the world's most powerful
nation -- could be destabilizing. It could tempt Russia to an even more overbearing and potentially forceful
approach to unruly nations on its periphery. Although some realist theorists seem to imagine that the disappearance of the Soviet Union put an end to the
an ambitious, independent, nationalist Japan.
possibility of confrontation between Russia and the West, and therefore to the need for a permanent American role in Europe, history suggests that conflicts in Europe involving Russia are
If the United States withdrew from Europe -- if it adopted what some call a strategy of "offshore
balancing" -- this could in time increase the likelihood of conflict involving Russia and its near neighbors,
which could in turn draw the United States back in under unfavorable circumstances. It is also optimistic to imagine that a
retrenchment of the American position in the Middle East and the assumption of a more passive,
"offshore" role would lead to greater stability there. The vital interest the United States has in access to oil and the role it plays in keeping access
possible even without Soviet communism.
open to other nations in Europe and Asia make it unlikely that American leaders could or would stand back and hope for the best while the powers in the region battle it out. Nor would a more
"even-handed" policy toward Israel, which some see as the magic key to unlocking peace, stability, and comity in the Middle East, obviate the need to come to Israel 's aid if its security became
threatened. That commitment, paired with the American commitment to protect strategic oil supplies for most of the world, practically ensures a heavy American military presence in the
In the Middle
East, competition for influence among powers both inside and outside the region has raged for at least
two centuries. The rise of Islamic fundamentalism doesn't change this. It only adds a new and more
threatening dimension to the competition, which neither a sudden end to the conflict between Israel and the Palestinians nor an immediate American
withdrawal from Iraq would change. The alternative to American pre dominance in the region is not balance and peace. It is
further competition. The region and the states within it remain relatively weak. A diminution of American influence would not be
followed by a diminution of other external influences. One could expect deeper involvement by both
China and Russia, if only to secure their interests. 18 And one could also expect the more powerful states of the region, particularly Iran, to expand and fill the vacuum. It is
region, both on the seas and on the ground. The subtraction of American power from any region would not end conflict but would simply change the equation.
doubtful that any American administration would voluntarily take actions that could shift the balance of power in the Middle East further toward Russia, China, or Iran. The world hasn 't
changed that much. An American withdrawal from Iraq will not return things to "normal" or to a new kind of stability in the region. It will produce a new instability, one likely to draw the
United States back in again. The alternative to American regional predominance in the Middle East and elsewhere is not a new regional stability. In an era of burgeoning nationalism, the future
is likely to be one of intensified competition among nations and nationalist movements. Difficult as it may be to extend American predominance into the future, no one should imagine that a
reduction of American power or a retraction of American influence and global involvement will provide an easier path.
Legitimacy independently solves multiple existential risks – key to global cooperation
on security and the environment
Stanley, security prof, 7 (Elizabeth Stanley, Ph.D. is an Assistant Professor of Security Studies in the Edmund A. Walsh School of Foreign Service and the Department of
Government, 7 “International Perceptions of US Nuclear Policy” Sandia Report, http://www.prod.sandia.gov/cgi-bin/techlib/access-control.pl/2007/070903.pdf)
How important is soft power, anyway? Given its vast conventional military power, does the United States even need soft power? Some analysts argue that US military predominance is both
possible and desirable over the long term, and thus soft power is not important. But a growing consensus disagrees. These analysts argue that soft power is critical for four reasons. First,
soft power is invaluable for keeping potential adversaries from gaining international support, for “winning the
peace” in Afghanistan and Iraq, and for convincing moderates to refrain from supporting extremist terrorist
groups. Second, soft power helps influence neutral and developing states to support US global leadership. Third, soft power is also
important for convincing allies and partners to share the international security burden.14 Finally, and perhaps most importantly, given the increasing interdependence and
globalization of the world system, soft power is critical for addressing most security threats the United States faces today. Most global security
threats are impossible to be countered by a single state alone. Terrorism, weapons of mass destruction (WMD) proliferation, failed and failing states, conflicts
over access to resources, are not confined to any one state. In addition, disease, demographic shifts, environmental degradation and global
warming will have negative security implications as well.15 All of these potential threats share four traits: (1) they are best addressed proactively, rather than after they develop into
full-blown crises; (2) they require multi-lateral approaches, often under the umbrella of an international institution; (3) they are not candidates for a quick fix, but
rather require multi-year, or multi-decade solutions; and, (4) they are “wicked” problems. Given these four traits, soft power is critical for helping to secure
the international, multi-lateral cooperation that will be necessary to address such threats effectively.
Independently, excessive national security deference causes WMD terrorism and
extinction – courts are key to stop it
Knowles, 2010 (Robert, Visiting assistant professor of Chicago-Kent college of law, “Responses to the
ten questions,” William Mitchell Law Review, 36 Wm. Mitchell L. Rev. 5061)
Second, unipolarity increases the power of the U.S. executive branch, which faces fewer external constraints than it
would in a world with several great powers balancing one another militarily.3 This became especially apparent with America's post-9/11
detention policies. At
one time, the executive branch faced much more exogenous pressure from other great
powers to comply with international law in the treatment of captured enemies. If the United States strayed too far from
established norms, it would risk retaliation upon its own soldiers or other sanctions from powerful rivals. Today, there are
few such constraints: enemies such as al Qaeda are not great powers in the traditional sense and are not likely to obey international law
anyway. Instead, the danger is that American rule-breaking will undermine the legitimacy of U.S. leadership.
America's military predominance enables it to set the rules of the game. When the United States breaks its own rules, it loses
legitimacy. With U.S. legitimacy at stake, it follows that courts should be more, not less, active in national
security cases. Courts are widely regarded as rule-based institutions, rather than political institutions, that
can ensure that the political branches do not shortcircuit processes for changing the law or act to violate fundamental
constitutional principles. The approval of courts lends legitimacy to government action. When other nations see the United
States following the law, they are more likely to acquiesce in U.S. leadership. This makes this task of providing
global public goods-such as fighting terrorism-easier for the United States. As the largest public-goods consumer, the United
States benefits the most from perceptions of its own legitimacy. Legitimacy becomes especially important in view of
declining U.S. influence relative to other powers. The world may not be multi-polar today, but it could be by mid-century.
America's enormous military advantage will decrease over time, and its reduced share of global economic
output will give it less ability to throw its weight around. Although the costs for the United States of disregarding
international legal norms may seem worth it now, those costs will increase from year-to-year. To the extent that international institutionsincluding frameworks of international law-provide some "stickiness," the United States is
better off investing its own
legitimacy in these institutions now, while it has maximum influence. If the United States leaves its imprint on international law and
institutions, they will be less costly for the United States to comply with in the future and much more costly for a rising rival, such as China, to
ignore. Nonetheless, there are some who argue that we are already living in a multi-polar world, and that rogue states and terrorist groups like
al Qaeda are our true rivals. Advances
in technology will-if they do not already-enable terrorists or rogue states to
deploy small nuclear and biological weapons to threaten American cities, making up in sheer mayhem what they
lack in armies and navies. A nuclear explosion in a large metropolitan area-such as New York-has the potential to
change life as we know it. In this sense, al Qaeda can be viewed as an existential threat. 9 However, the
capacity for small groups to leverage extremism into great destruction does not alter the fundamental structure of geopolitics. Not all
existential threats are the same. A nuclear device would be just as dangerous in the hands of a domestic
group or a lone wolf as it would be in the hands of al Qaeda. It would be a mistake to assume that these
new threats are best pursued by giving the executive branch greater deference. In fact, the dangers from
terrorism make even clearer the need to adhere to established principles. The United States will occupy a global
leadership role for decades to come. Successful management of global crises-including a catastrophic terrorist attack-lies not in
counterbalancing rivals, but in better management of the international system. The United States cannot
hope to tackle large-scale global problems-terrorism especially-if the rest of the world loses confidence
in American leadership. The best way for courts to help carry out this task is to ensure that the political
branches adhere to the rule of law.
Judicial enforcement of constitutional principles are key to US soft power and solving
terrorism
Sidhu, 2011 (Dawinder S., attorney with a primary focus on the intersection of individual liberties and
national security, “Judicial Review as Soft Power: How the courts can help us win the post-9/11 conflict,”
National Security Law Brief, Volume 1, Number 1,
http://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1003&context=nslb)
There can be little doubt that military
victory overseas, at present, stands beyond the grasp of American’s long and
powerful arm.22 Perhaps even more sobering is the fact that even if the United States was faring better on the
military front, such success would be insuffi cient to prevail in the war. As the 9/11 Commission noted, al Qaeda “represents
an ideological movement, not a fi nite group of people,” akin to a “decentralized force.”23 The American strategy, however, appears to be one
based on warfare. Judge Richard A. Posner observed that “we have no strategy for defeating them, only fi ghting them.”24
President Obama’s foreign policy objectives in the war have been considered to be “exclusively military” and, on that score, the war “is not
going well.”25 Put differently, the
American efforts appear to be limited in scope and disappointing in that
narrow subset of possible action against transnational terrorism. These facts are beyond dispute—in committing the
terrorist atrocities on 9/11, al Qaeda provoked the United States into a war in Afghanistan that was expanded to Iraq. These confl icts are being
waged primarily on the military arena, and the achievement of American goals in both arenas has been frustrated despite years of effort,
billions of dollars, and the lives of many American soldiers. What can we do differently? What other instruments are available to the United
States such that defeating—not just capably fi ghting—the terrorists may be a closer prospect? Specifi cally, how can American law be an
advantage to our national security? This Article seeks to answer these questions. In this Article, I will argue that the
American response
to Islamic terrorist factions must move outside the military sphere in which battles are fought between arms and men
to a more conceptual contest for hearts and minds, where the ammunition in this abstract war will be
fundamental American principles, particularly a constitutional commitment to the rule of law, and where
advancements in the war will be based on incrementally increased attraction to America. This approach will
speak to one’s will and conscience in an effort to secure a more lasting respite from the ongoing struggles that have no foreseeable end in sight,
have been attended by suffering and sorrow, and have claimed a growing number of victims on all sides.26 Part I will distinguish between “hard
power,” which generally constitutes the ability to attain favorable foreign policy outcomes by way of military force or economic coercion, and
“soft power,” defi ned as the ability to achieve those outcomes by way of attraction.27 Though
soft power generally is thought
to include a nation’s values, social norms, and culture, academic studies have not fully demonstrated that a
nation’s legal dimensions—specifi cally its legal institutions and adherence to the rule of law—are also a form of soft
power.28 This part will attempt to make this showing, citing to aspects of the American constitutional design that may be
attractive to people of other communities, including Muslims.29 The legal principles established by the
Framers and enshrined in the Constitution are a source of attraction only if we have meaningfully adhered to
them in practice. Part II will posit that the Supreme Court’s robust evaluation of cases in the wartime context
suggests that the nation has been faithful to the rule of law even in times of national stress. As support, this
part will provide examples of cases involving challenges to the American response to wars both before and after 9/11, the discussion of which
will exhibit American respect for the rule of law. While
the substantive results of some of these cases may be
particularly pleasing to Muslims, for instance the extension of habeas protections to detainees in Guantánamo,30 this part will
make clear that it is the legal process—not substantive victories for one side or against the
government—which is the true source of American legal soft power. If it is the case that the law may be an element of
soft power conceptually and that the use of the legal process has refl ected this principle in practice, the conclusion argues that it would benefi
t American national security for others in the world to be made aware of the American constitutional framework and the judiciary’s activities
related to the war. Such information would make it more likely that other nations and peoples, especially moderate Muslims, will be attracted
to American interests. This Article thus reaches a conclusion that may seem counterintuitive—that the
judicial branch, in the
performance of its constitutional duty of judicial review, furthers American national security and foreign
policy objectives even when it may happen to strike down executive or legislative arguments for
expanded war powers to prosecute the current war on terror and even though the executive and legislature constitute the foreign
policy branches of the federal government. In other words, a “loss” for the executive or legislature, may be considered,
in truth, a reaffi rmation of our constitutional system and therefore a victory for the entire nation in the
neglected but necessary post-9/11 war of ideas.31 As such, it is the central contention of this Article that the judicial branch is a
repository of American soft power and thus a useful tool in the post-9/11 conflict.
Advantage 3 – Privacy
Court ruling on NSA metadata collection is the key to all privacy rights – upholding the
program ensures chilling effect
Barnett, 2015 (Randy, Carmack Waterhouse Professor of Legal Theory, Georgetown University Law
Center; director, Georgetown Center for the Constitution, “Why the NSA data seizures are
unconstitutional,” Harvard Journal of Law & Public Policy, Vol. 38, No. 1)
Although the only
surveillance program that has been challenged thus far concerns phone records,8 the
principle offered to support this data seizure applies as well to all other business records of our dealings, including our
credit card transactions. Indeed, in upholding the constitutionality of the program, Judge William Pauley of the Southern
District of New York cited cases that held that "an individual has no constitutionally protected expectation of
privacy" in bank records, records given to an accountant, subscriber information provided to an internet
service provider, and information from a home computer that is transmitted over the Internet or by
email.9 Imagine the chilling effect on liberty if everyone knew that the government is in possession of all
this data about their private transactions on its super computers. The relationship between the citizens of the United
States and their supposed agents or servants in government would be fundamentally reversed, turning We the People into mere subjects of our
rulers. So there is a lot more at stake here than just this particular bulk data seizure program. With the challenge to the
Affordable Care Act, we not only wanted to stop Obamacare from being implemented—which sadly we failed to do—we also wanted to defeat
the limitless constitutional arguments that were being offered in its defense. In this effort, I am pleased to say we succeeded.10 Now, we
need to think very hard about whether these blanket data seizure programs comport with the Fourth
Amendment before, not after, the government decides it needs to seize data about every facet of our
personal lives.
Judicial ruling against Clapper is key to protect all electronic communication
Adbo, 2014 (Alex, staff attorney in the ACLU’s speech, privacy, and Technology Project, “Is dragnet
surveillance constitutional?” Jurist, March 26, http://jurist.org/hotline/2014/03/alex-abdo-nsa-cellsurveillance.php)
Ever since Edward Snowden
exposed the National Security Agency's (NSA) sweeping surveillance of US citizens and residents,
our country has been engaged in a historic debate about privacy in the digital age. The centerpiece of that debate is a question
that has the potential to shape the meaning of privacy in this country for decades to come: does the
Constitution permit the NSA to collect the phone records of millions of innocent Americans every single
day? The government thinks so, based on a US Supreme Court case from 1979 called Smith v. Maryland. Given the importance of
that case to the ongoing debate, it's worth asking whether Smith actually answers the question raised by
the NSA's unprecedented surveillance program. The question is important in part because it reflects a fundamental
shift in the way that the intelligence agencies do their business: from targeted collection to bulk
collection. However it is critical for yet another reason: at stake are not just our phone records, but every digital track
we leave as we browse the internet, communicate with loved ones, or even just carry around our
increasingly nosy phones. Should the NSA have access to all of that information every single day about every single American? Within
a week of the disclosure of the NSA's phone-records program, the ACLU and others filed lawsuits challenging the program. Most recently,
Senator Rand Paul joined the fray with a class action on behalf of all Americans. The challenges differ in various ways, but central to each is
the key question of whether the Supreme Court effectively approved the dragnet collection of our phone
records in Smith. Two federal judges have already issued dueling opinions on that question. One—Judge Richard J. Leon—declared what is
perhaps intuitive to many: that bulk collection of the records of innocent Americans likely violates the Constitution, Smith notwithstanding. The
other—Judge William H. Pauley III—countered that the phone-records program is unquestionably constitutional under Smith. So which is it?
Does Smith justify the NSA's dragnet collection of every American's phone records (and perhaps every American's bank records, credit-card
statements, and internet and email records)? The answer is "no." Here's why. In
Michael Lee Smith
Smith, the Baltimore police suspected that
was making threatening and obscene phone calls to a woman he had robbed days earlier. To confirm their
suspicions, they asked Smith's telephone company to install a "pen register" on his line to record the numbers he
dialed. After just a few days, the pen register confirmed that, sure enough, Smith was the culprit. He was convicted, he appealed, and the
Supreme Court for the first time faced the question of whether the warrantless use of a pen register on a criminal suspect violated the
Constitution. The
Supreme Court held that it did not, because—in the court's estimation—individuals do not expect
privacy in the telephone numbers that they dial. That's what the Supreme Court held: that an individual had no expectation
of privacy in the numbers that he dialed over the course of several days. Here's what the court did not hold: that the
government may, therefore, record the phone numbers that every American dials for all time. The
distinction is important. It confirms one predicate of Leon's ruling, that Smith does not—in the words (PDF) of the Foreign
Intelligence Surveillance Court—"squarely control" the legality of the NSA's program. In other words, the Supreme Court
simply has not decided whether the mass, suspicionless collection of millions of innocent Americans' phone records is constitutional. Of course,
even the government concedes that the Supreme Court has not actually answered the precise question that the NSA's phone-records program
raises. What it argues, instead, is that if you have no right to privacy in your phone records for a few days, you have no right to privacy in your
phone records for five years. That is to say, the government argues that zero plus zero equals zero. Sounds reasonable, right? The problem is
that our
constitutional right to privacy is not a mathematical equation. Just as grains of sand piled up
eventually form a mountain, so too can the accumulation of seemingly insignificant privacy invasions
eventually trigger the Constitution's protections. The Supreme Court has made that clear on several occasions. Take the
case of United States v. Knotts from 1983, which involved the use of a beeper to track the car of a suspected manufacturer of illicit drugs. Based
in part on Smith, the Supreme Court held that the warrantless tracking of a suspect as he moves in public does not violate the Constitution,
because Americans do not expect their public movements to remain private. Here's the critical part: the court made clear that its ruling on the
tracking of a single person's location for a short period of time could not be mathematically converted into a formula for pervasive surveillance:
[I]f such dragnet-type law enforcement practices ... should eventually occur, there will be time enough then to determine whether different
constitutional principles may be applicable. In other words, dragnet
surveillance is different. When it comes to privacy,
zero plus zero does not always equal zero. And that makes sense. When you share bits and pieces of your private life with others,
that's not the same as sharing everything with everyone all at once. If that logic sounds familiar, it's because the government uses precisely the
same logic when it argues that seemingly innocuous details in classified reports cannot be disclosed lest they be combined into a "mosaic" that
reveals far more than the sum of their parts. The
Supreme Court confirmed this understanding of our privacy—that the
mosaic is often more revealing than the individual tiles—just a few years ago in the landmark case United States v. Jones (PDF). In that case,
five justices in two concurring opinions rejected the government's argument that the pervasive tracking of an individual's location in public is no
different than the isolated beeper-tracking in Knotts. Some have argued that the Jones concurrences were just that: concurrences and not a
majority opinion. However, that's beside the point. The five justices in Jones only confirmed what the Supreme Court made clear in 1983 in
Knotts. If there were any doubt about that, you would only need to look to the appellate decision in Jones, which the Supreme Court eventually
upheld. In that case (United States v. Maynard), the United States Court of Appeals D.C. Circuit (the very same court that will hear the
government's appeal from Leon's ruling) held that cases like Smith and Knotts are relevant to the question of dragnet surveillance, but do not
actually answer the question. In short, the
constitutionality of the NSA's mass tracking of our phone calls is an open
question, at least insofar as Supreme Court precedent is concerned. The real question is the one that has now divided
the courts: whether dragnet surveillance is a simple extension of Smith or rather a radical departure
from our values and from our Constitution. The answer to that question should be straightforward: the
Constitution protects us from dragnet surveillance.
Fourth amendment ruling is key to solve tech competitiveness and internet fracturing
Dolan, 2013 (Ed, economist and educator with a Ph.D. from Yale University, “The fourth amendment
and the economic spillover from NSA surveillance to e-commerce,” August 5,
http://www.economonitor.com/dolanecon/2013/08/05/the-fourth-amendment-and-the-economicspillover-from-nsa-surveillance-to-e-commerce/)
Violation of an inherent right is wrong in itself, whether or not the victim can prove actual damages. Still, as the founders
knew, exposure to unreasonable searches and seizures can do real economic harm. That remains true
today, as we can see from the case of e-commerce. The web has been abuzz with commentary on the effects of NSA
surveillance on e-commerce. Consider, for example, an interesting exchange that began last week when Lynne Kiesling of
Northwestern University posted a brief item on her blog, The Knowledge Problem. She began by noting that NSA surveillance is
“much in the nature of the ‘general warrants’ that were the whole reason the authors of the Bill of
Rights put the Fourth Amendment in there in the first place,” and then added: Make no mistake: this deep and
broad US government surveillance diminishes trust not just in the federal government (as if there is any
general trust in the federal government any more), but also in Internet companies — communications companies, ISPs,
Apple, Google, Yahoo, Amazon, and so on. The economic implications of the deep and broad US government
surveillance are profound. How much economic activity on the Internet will leave those companies? Will government surveillance be
able to access substitutes for these companies in other countries, if substitutes come into being? Isn’t this going to cause the commercial
Internet to shrink? The
federal government may not have intended to stifle the role of the Internet as an
economic value-creating commercial platform, but that consequence is almost certain. Kiesling’s contribution
was reposted to Reddit, where a reader going by the screen name of Mkawick submitted this comment (slightly abbreviated here, with some
acronyms spelled out in full): Working for a small company who does business by selling small games, we have recently added a new
networking component to allow people to chat while in game, make purchases online, etc. We use highly sanitized data so that even if
someone captures our entire database, putting it back together is nigh impossible. So recently we talked about moving our server to Amazon
because of bandwidth and latency. But now with revelations of NSA, Amazon is no longer a viable option. We instead decided to host
everything internally, behind pix, expand our infrastructure, and avoid the compromises that are sure to come as a result of the NSA backdoors
that are ubiquitous. Every two days there is a new reveal from the NSA that they are invading users’ privacy even more or that they have some
new back door previously unknown. Is my company an outlier… probably. However, I know other startups that are also gnashing their teeth
similarly and opting to not use Amazon or Google because of that. Add to that Apple’s vulnerability revealed last week (the developer site was
compromised and possibly all developer info was stolen) and going to the Cloud is not even a good idea anymore. . . . Add to this the fact that
most growth in the economy starts with small companies (depending on how you do the numbers), and if a lot more small companies are
opting to take the more “secure” route and avoid Amazon because of the NSA, then this means that the NSA is in effect creating a new market.
Already, new secure email systems are popping up (hushmail.com), secure chat (tox.im), and docs and on and on. These
NSA
revelations are having a profound impact, and the older companies like Google (15 years old) and Yahoo (only
18 years old now) are going to struggle being shackled to US Government bureaucracy and the NSA. In other
words, the long slide away from being able to do business has already started for these well-established
companies. Even Microsoft (especially them) admitted putting backdoors into Windows, and last week, I began
REALLY using linux … which I have only been tinkering with for 15 years now. In the same vein, John Naughton, writes in The Guardian that
The days of the internet as a truly global network are numbered. It was always a possibility that the
system would eventually be Balkanized, i.e. divided into a number of geographical or jurisdiction-determined subnets as societies
such as China, Russia, Iran and other Islamic states decided that they needed to control how their citizens communicated. Now,
Balkanization is a certainty. Commenting on the Naughton article, James Fallows of The Atlantic adds that Because of what the U.S.
government assumed it could do with information it had the technological ability to intercept, American companies and American
interests are sure to suffer in their efforts to shape and benefit from the Internet’s continued growth. American companies,
because no foreigners will believe these firms can guarantee security from U.S. government surveillance American
interests, because the United States has gravely compromised its plausibility as world-wide administrator
of the Internet’s standards and advocate for its open, above-politics goals. . . . The real threat from terrorism has
never been the damage it does directly, even through attacks as horrific as those on 9/11. The more serious threat comes from the overreaction, the collective insanity or the simple loss of perspective, that an attack evokes. Our government’s ambition to do everything possible to
keep us “safe” has put us at jeopardy in other ways. The bottom line The bottom line is that the
founders of our republic not only stood on
solider moral ground than our present leaders, but they were also savvier about the practical reasons for insisting on
observance of fundamental rights to life, liberty, and property. They did not insert a national security exception
in the fourth amendment, or elsewhere in the Bill of Rights, not just because to do so would have been cowardly, but also because
it would have been stupid to give the government that much rope. Our current spymasters are not that
smart. They have tunnel vision: Get the bad guys at any cost, regardless of the constitution and regardless of the collateral damage.
We saw that mentality in action a couple of years ago when the CIA sent an agent with cover as a polio vaccination worker to gather DNA
samples at Bin Laden’s compound in Pakistan. When revealed, the ruse stoked Pakistani paranoia about vaccinations, already at a troubling
level, to a fever pitch. They didn’t have to do it. It is highly unlikely that the choice of a different cover for the agent would have tipped the
scales enough to let Bin Laden go free. What is certain, though, is that thousands of Pakistani kids will go unvaccinated, some of whom will die
of polio or live a life of disability. Either our security folks didn’t think about those consequences, or more likely, they just didn’t care. Saving
kids from polio is not their mandate, nor, they seem to think, is protecting the integrity of e-commerce. Some
reader will object, of
course, that Congress has authorized everything that NSA is doing. To the shame of our Congress, there is some truth
in that. The real question, though, is whether the law under which NSA claims to act complies with the
fourth amendment.
Loss of technological leadership causes great power war
Taylor, 04 [Mark, Professor of Political Science – Massachusetts Institute of Technology, “The Politics
of Technological Change: International Relations versus Domestic Institutions”, 4-1,
http://www.scribd.com/doc/46554792/Taylor]
Technological innovation is of central importance to the study of international relations (IR), affecting almost
every aspect of the sub-field. 2 First and foremost, a nation’s technological capability has a significant effect
on its economic growth, industrial might, and military prowess; therefore relative national technological
capabilities necessarily influence the balance of power between states, and hence have a role in
calculations of war and alliance formation. Second, technology and innovative capacity also determine a nation’s trade
profile, affecting which products it will import and export, as well as where multinational corporations will base their production facilities.
3 Third, insofar as innovation-driven economic growth both attracts investment and produces surplus capital, a nation’s technological
ability will also affect international financial flows and who has power over them. 4 Thus, in broad theoretical
terms, technological change is important to the study of IR because of its overall implications for both the relative and absolute power of
states. And if theory alone does not convince, then history
also tells us that nations on the technological ascent
generally experience a corresponding and dramatic change in their global stature and influence, such
as Britain during the first industrial revolution, the United States and Germany during the second industrial revolution, and Japan during
Conversely, great powers which fail to maintain their place at the technological
frontier generally drift and fade from influence on international scene. 6 This is not to suggest that technological
innovation alone determines international politics, but rather that shifts in both relative and absolute technological
capability have a major impact on i nternational r elations, and therefore need to be better understood by IR scholars. Indeed,
the importance of technological innovation to international relations is seldom disputed by IR theorists.
the twentieth century. 5
Technology is rarely the sole or overriding causal variable in any given IR theory, but a broad overview of the major theoretical debates
reveals the ubiquity of technological causality. For example, from Waltz to Posen, almost all Realists have a place for technology in their
explanations of international politics. 7 At the very least, they describe it as an essential part of the distribution of material capabilities
technology is the very
cornerstone of great power domination, and its transfer the main vehicle by which war and change
occur in world politics . 8 Jervis tells us that the balance of offensive and defensive military technology
affects the incentives for war. 9 Walt agrees, arguing that technological change can alter a state’s aggregate
power, and thereby affect both alliance formation and the international balance of threats. 10 Liberals
across nations, or an indirect source of military doctrine. And for some, like Gilpin quoted above,
are less directly concerned with technological change, but they must admit that by raising or lowering the costs of using force, technological
progress affects the rational attractiveness of international cooperation and regimes. 11 Technology also lowers
information &
transactions costs and thus increases the applicability of international institutions, a cornerstone of Liberal
IR theory. 12 And in fostering flows of trade, finance, and information, technological change can lead to Keohane’s interdependence 13 or
Thomas Friedman et al’s globalization. 14 Meanwhile, over at the “third debate”, Constructivists cover the causal spectrum
on the issue, from Katzenstein’s “cultural norms” which shape security concerns and thereby affect technological innovation; 15 to
Wendt’s “stripped down technological determinism” in which technology inevitably drives nations to form a world
state. 16 However most Constructivists seem to favor Wendt, arguing that new technology changes
people’s identities within society, and sometimes even creates new cross-national constituencies, thereby affecting
international politics. 17 Of course, Marxists tend to see technology as determining all social relations
and the entire course of history, though they describe mankind’s major fault lines as running between economic classes rather
than nation-states. 18 Finally, Buzan & Little remind us that without advances in the technologies of transportation, communication,
production, and war, international systems would not exist in the first place
It escalates
Paone, 09 [Chuck, 66th Air Base Wing Public Affairs for the US Air Force, 8-10-09, “Technology
convergence could prevent war, futurist says,” http://www.af.mil/news/story.asp?id=123162500]
The convergence of "exponentially advancing technologies" will form a "super-intelligence" so
formidable that it could avert war, according to one of the world's leading futurists. Dr. James Canton, CEO and chairman of the Institute for
Global Futures, a San Francisco-based think tank, is author of the book "The Extreme Future" and an adviser to leading companies, the military and other government agencies. He is consistently
listed among the world's leading speakers and has presented to diverse audiences around the globe. He will address the Air Force Command and Control Intelligence,
Survelliance and Reconnaissance Symposium, which will be held Sept. 28 through 30 at the MGM Grand Hotel at Foxwoods in Ledyard, Conn., joining Air Force Chief of Staff Gen. Norton Schwartz and a bevy of other
The superiority
of convergent technologies will prevent war," Doctor Canton said, claiming their power would present an
overwhelming deterrent to potential adversaries. While saying that the U.S. will build these super systems faster and better than other nations, he acknowledged
government and industry speakers. He offered a sneak preview of his symposium presentation and answered various questions about the future of technology and warfare in early August. "
that a new arms race is already under way. "It will be a new MAD for the 21st century," he said, referring to the Cold War-era acronym for Mutually Assured Destruction, the idea that a nuclear first strike would trigger an
rational nation
states, considering this imminent technology explosion, will see the futility of nation-on-nation
warfare in the near future. Plus there's the "socio-economic linking of the global market system." "The fundamental macroeconomics on the planet favor peace, security, capitalism and
equally deadly response. It's commonly held that this knowledge has essentially prevented any rational state from launching a nuclear attack. Likewise, Doctor Canton said he believes
prosperity," he said. Doctor Canton projects that nations, including those not currently allied, will work together in using these smart technologies to prevent non-state actors from engaging in disruptive and deadly acts.
Doctor Canton and his team study and predict many things, but their main area of expertise -- and the one in which he's personally most interested -- is
advanced and emerging technology. "I see that as the key catalyst of strategic change on the planet, and it will be
for the next 100 years," he said. He focuses on six specific technology areas: "nano, bio, IT, neuro, quantum and
robotics;" those he expects to converge in so powerful a way. Within the information technology arena, Doctor Canton said systems must create
"meaningful data," which can be validated and acted upon. "Knowledge engineering for the analyst and the warfighter is a critical
competency that we need to get our arms around," he said. "Having an avalanche of data is not going to be helpful." Having the right data is. "There's no way for
As a futurist,
the human operator to look at an infinite number of data streams and extract meaning," he said. "The question then is: How do we augment the human user with advanced artificial intelligence, better software presentation
and better visual frameworks, to create a system that is situationally aware and can provide decision options for the human operator, faster than the human being can?" He said he believes the answers can often be found
already in what he calls 'edge cultures.' "I would look outside of the military. What are they doing in video games? What are they doing in healthcare? What about the financial industry?" Doctor Canton said he believes
more sophisticated artificial intelligence applications will transform business, warfare and life in
general. Many of these are already embedded in systems or products, he says, even if people don't know it.
that
Economic crisis is the most likely cause of great power conflict
Nader Elhefnawy 11, Professor of English at the University of Miami, writer on IR published in peerreviewed journals including International Security, Astropolitics, and Survival, Spring 2011, “Twenty
Years After the Cold War: A Strategic Survey,” Parameters, The U.S. Army War College Quarterly,
http://strategicstudiesinstitute.army.mil/pubs/parameters/Articles/2011spring/Ehlefnawy.pdf
Relative calm has prevailed among the great powers since the demise of the Soviet Union. Large-scale
warfare remains a possibility, but by and large interstate war has been confined to the margins of the
international system, and limited in its intensity, with the operational realities of the world’s major armed forces characterized by
alternative missions. Neoliberal globalization has been robust but economically problematic, characterized by
slow growth, financial instability, and other factors contributing to social and political stress. East Asia, and
especially China, constituted the principal exception to the slow growth characterizing these decades. East Asia has massively increased its
share of world manufacturing, exports, and exchange reserves, while at the same time the EU expanded and consolidated the continent’s
resources, with some “game-changing” implications (like the euro). Additionally, rising commodity prices have resulted in booms among
resource exporters, particularly energy exporters, which have also permitted these nations to enjoy greater political leverage.¶ As a result,
while the United States remains in a class of its own with regard to military power, and its large national market,
there have been some substantial shifts in economic power from the United States and Japan to other actors over the
past two decades. This is particularly true of China, the EU, and a select number of energy exporters, resulting in a more complex and diffuse
distribution of power. At the same time the relationships of the major
powers are less defined by concerns related
to traditional, state-centered threats than at any time since the nineteenth century, if not earlier. While these may not be the
traditional threats, they do present an unprecedented array of non-traditional security concerns in areas like
energy, the environment, and finance , and physical threats presented by non-state actors, such as international terrorism and high-seas
piracy. Despite these mounting threats, cooperation has consistently fallen short of the levels hoped for in the early 1990s.¶ Many of the
current trends seem likely to continue through the foreseeable future. The interaction
of the crises of the past several years
(especially in energy and international finance) combined with long-mounting stresses in the global
economy (slow growth, debt, ecological pressure) all raise the possibility of changes in some areas of
development, particularly if these changes impact the world’s three principal loci of economic power: China, the European
Union, and the United States. China may continue to grow rapidly, though perhaps less so as it matures, and begins to pursue goals beyond the
mere maximizing of GDP. Even if the EU’s attempts at integration and expansion recede (as is plausible), Europe as a whole is likely to remain
powerful, even if that power is less extensive and well-organized.¶ Meanwhile the US position is not unlike what the “declinists” of the 1980s
and early 1990s anticipated. The
most significant direct challenges to the United States some twenty years after
the Cold War are not military, but economic: deindustrialization, balance of payments problems, debt,
and surviving inside an ever-more integrated global economy and strained ecosystem. Relations among
the great powers may yet grow more intense, but economic crisis seems the most likely cause of any
future conflict, with the less traditional dimensions of security presenting the most realistic obstacles to the United States’ freedom of
action if such events ever do materialize.
Extinction
Richard N. Haass 13, President of the Council on Foreign Relations, 4/30/13, “The World Without
America,” http://www.project-syndicate.org/commentary/repairing-the-roots-of-american-power-byrichard-n--haass
The most critical threat facing the United States now and for the foreseeable future is not a rising
China, a reckless North Korea, a nuclear Iran, modern terrorism, or climate change. Although all of these constitute potential or actual threats, the
biggest challenges facing the US are its burgeoning debt, crumbling infrastructure, second-rate primary and secondary schools, outdated immigration
system, and slow economic growth – in short, the domestic foundations of American power. Readers in other countries may be
Let me posit a radical idea:
tempted to react to this judgment with a dose of schadenfreude, finding more than a little satisfaction in America’s difficulties. Such a response should not be surprising. The US and those
representing it have been guilty of hubris (the US may often be the indispensable nation, but it would be better if others pointed this out), and examples of inconsistency between America’s
practices and its principles understandably provoke charges of hypocrisy. When America does not adhere to the principles that it preaches to others, it breeds resentment. But, like most
America’s failure to
deal with its internal challenges would come at a steep price. Indeed, the rest of the world’s stake in American success is nearly as large as
that of the US itself. Part of the reason is economic. The US economy still accounts for about one-quarter of global output. If US growth accelerates, America’s
capacity to consume other countries’ goods and services will increase, thereby boosting growth around the
world. At a time when Europe is drifting and Asia is slowing, only the US (or, more broadly, North America) has the potential
to drive global economic recovery. The US remains a unique source of innovation. Most of the world’s citizens communicate with mobile devices based on
temptations, the urge to gloat at America’s imperfections and struggles ought to be resisted. People around the globe should be careful what they wish for.
technology developed in Silicon Valley; likewise, the Internet was made in America. More recently, new technologies developed in the US greatly increase the ability to extract oil and natural
gas from underground formations. This technology is now making its way around the globe, allowing other societies to increase their energy production and decrease both their reliance on
costly imports and their carbon emissions. The US is also an invaluable source of ideas. Its world-class universities educate a significant percentage of future world leaders. More
the US has long been a leading example of what market economies and democratic politics can
accomplish. People and governments around the world are far more likely to become more open if the
American model is perceived to be succeeding. Finally, the world faces many serious challenges, ranging from the need
to halt the spread of weapons of mass destruction, fight climate change, and maintain a functioning world
economic order that promotes trade and investment to regulating practices in cyberspace, improving global
health, and preventing armed conflicts. These problems will not simply go away or sort themselves out.
While Adam Smith’s “invisible hand” may ensure the success of free markets, it is powerless in the world of geopolitics . Order
requires the visible hand of leadership to formulate and realize global responses to global challenges. Don’t
fundamentally,
get me wrong: None of this is meant to suggest that the US can deal effectively with the world’s problems on its own. Unilateralism rarely works. It is not just that the US lacks the means; the
multilateralism is much easier to
advocate than to design and implement. Right now there is only one candidate for this role: the US. No other
country has the necessary combination of capability and outlook. This brings me back to the argument that the US must put
its house in order – economically, physically, socially, and politically – if it is to have the resources needed to promote
order in the world . Everyone should hope that it does: The alternative to a world led by the US is not a world led by China, Europe,
Russia, Japan, India, or any other country, but rather a world that is not led at all. Such a world would almost certainly be
characterized by chronic crisis and conflict. That would be bad not just for Americans, but for the vast majority of the planet’s inhabitants.
very nature of contemporary global problems suggests that only collective responses stand a good chance of succeeding. But
Failure to curtail NSA surveillance causes internet fracturing and undermines the
global structure
Meinrath, 2013 (Sascha, vice president of the New America Foundation and director of the Open
Technology Institute, “the future of the Internet: Balkanization and Borders,” October 11,
http://ideas.time.com/2013/10/11/the-future-of-the-internet-balkanization-and-borders/)
Brazilian President Dilma Rouseff’s recent indictment of the United States’ cyberspying practices has profound global
repercussions for the U.S vision of a borderless, open Internet. What makes this backlash especially potent and
lamentable is that it is being fueled not by democracies that oppose American ideals, but rather by allies that
resent Washington’s betrayal of its own overarchingly positive vision. Advertisement Rouseff’s offensive to change Internet
governance follows reports that the National Security Agency’s watchful eye could see as far as her Palácio do Planalto in Brasília. According to
leaked documents, the United States has been surveilling Rousseff’s email, intercepting internal government communications, and spying on
the country’s national oil company. After canceling an official visit to meet with President Obama in Washington, Rousseff took to the podium
at the U.N.’s General Assembly to call on other countries to disconnect from U.S. Internet hegemony and develop their own sovereign Internet
and governance structures. Rousseff’s
move could lead to a powerful chorus—one that would transform the
Internet of the future from a global commons to a fractured patchwork severely limited by the political
boundaries on a map. Brazil is one of a handful of countries—including Indonesia, Turkey, and India—that have wavered in the debate over
whether to develop an international framework to govern the Internet, one that would replace the role that the United States has played as
chief Internet steward. Traditionally, that debate has featured America in the role as champion of a free and open Internet, one that guarantees
the right of all people to freely express themselves. Arguing against that ideal: repressive regimes that have sought to limit connectivity and
access to information. The
NSA’s actions have shifted that debate, alienating key Internet-freedom allies and
emboldening some of the most repressive regimes on the planet. Think of it as an emerging coalition between countries
that object to how the United States is going about upholding its avowed principles for a free Internet, and countries that have objected to
those avowed principles all along. Our close
allies in the European Union, for instance, are now considering revoking datasharing agreements with the United States and requiring American website providers to prominently warn
Europeans that their data is subject to U.S. government surveillance. Meanwhile, repressive regimes like Iran, Syria,
and China are wresting control of information over their networks, poisoning popular applications and
services, and undermining the foundations for the Internet’s open, interconnected structure. NSA misdeeds
undoubtedly further embolden these regimes to do as they please. The motivations of those nations questioning America’s de facto control
over the global Internet may vary, but their responses are all pointing in the same troubling direction: toward a Balkanized Internet. Today,
the Internet is in danger of becoming like the European train system, where varying voltage and 20
different types of signaling technologies force operators to stop and switch systems or even to another
locomotive, resulting in delays, inefficiencies, and higher costs. Netizens would fall under a complex array of different
jurisdictions imposing conflicting mandates and conferring conflicting rights. And much as different signaling hampers the movement of people
and the trade of physical goods, an Internet within such a complex jurisdictional structure would certainly hamper modern economic activity.
The NSA has opened a Pandora’s box that treats “citizens” and “foreigners” differently (even defining both groups in myriad
different ways). Its rules also impose geo-locational-based jurisdictional mandates (based upon the route of your
Internet traffic or the location of the data services and databases you use). They also include requirements based upon
ownership; the location of a company’s headquarters may lead to surveillance mandates covering
services and infrastructure in other countries. This creates tremendous technical challenges for startups
and entrepreneurs—who will have to overcome impossible compatibility hurdles just to get up and running—stifling innovation at
a moment when we need greater economic momentum, not dead weight. Already, a German citizen accessing a New York City data center via a
Chinese fiber line may find her data covered by an array of conflicting legal requirements requiring privacy and active surveillance at the same
time. Fracturing the Internet undermines Internet freedom as well. The basic principle at the heart of Article 19 of the
Universal Declaration of Human Rights—protecting the right to freedom of opinion, expression, and the opportunity to participate in the
information society—is at risk. Brazil
may not be pressing to assert control over everything online or censor its
own people, or spy on them, but plenty of other countries with darker motives are cheering Brazil on. The
U.S. has done a disservice to all people already living and working under repressive regimes by creating a
new international norm that massive-scale surveillance is acceptable. As others adopt the U.S. model, particularly in
areas where movements for fundamental freedoms are burgeoning and fighting against oppression, there will be even less access to basic
communications, hampering the ability to interact online outside of the regime’s control and censorship. Furthermore, the NSA has made a
remarkably myopic tradeoff—overreaching its legal authorities for a slight boost in signals intelligence today that will lead to massive problems
in response. Even before all the recent revelations of NSA misbehavior, the United States was already facing calls for a more “democratic”
global system of Internet regulation that gave other countries more say in setting rules. Now, for the sake of a free Internet, it is imperative for
Washington to move fast to restore a belief that America is a trustworthy Internet steward. It’s
time for bold leadership to
defend our core principles. Reforms need to go far beyond pro-forma reviews carried out by intelligence
and administration insiders. There are precedents for the United States’ exercising restraint in order to advance larger interests. As
a country, we agreed to stop atmospheric testing of nuclear weapons, not to stockpile or deploy
chemical weapons, and not to militarize outer space. There must be a cyberspace equivalent of this restraint—a restoration
of balance that prioritizes civil rights, not surveillance, as vital to (inter)national security. Is the benefit of spying on Brazil’s oil company worth
the cost of antagonizing the people of our hemisphere’s second-largest democracy and giving China and Russia the moral high ground in
debates over how people around the world should access information? Do we really want a world where this behavior is normalized and where
it’s acceptable for every country to surveil and hack indiscriminately? The answer to that question seems pretty clear. Today
we need bold
reforms from Washington—we need to curtail our unhealthy addiction to surveillance and covert hacking. Only by being
radically transparent about the scope of current activities and ceasing activities that transgress national norms will we regain
global trust and shift the rather bleak trajectory we are currently on.
Free Internet failure causes extinction
Eagleman 10 [David Eagleman is a neuroscientist at Baylor College of Medicine, where he directs the Laboratory for Perception and
Action and the Initiative on Neuroscience and Law and author of Sum (Canongate). Nov. 9, 2010, “ Six ways the internet will save civilization,”
http://www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no]
Many great
civilizations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually this results from: natural
disasters, resource depletion, economic meltdown, disease, poor information flow and corruption. But
we’re luckier than our predecessors because we command a technology that no one else possessed: a rapid communication network that finds
its highest expression in the internet. I propose that there are six ways in which the
net has vastly reduced the threat of
societal collapse. Epidemics can be deflected by telepresence One of our more dire prospects for collapse is an infectiousdisease epidemic. Viral and bacterial epidemics precipitated the fall of the Golden Age of Athens, the Roman Empire and most of the empires of
the Native Americans. The internet can be our key to survival because the
ability to work telepresently can inhibit microbial
transmission by reducing human-to-human contact. In the face of an otherwise devastating epidemic, businesses can keep supply chains
running with the maximum number of employees working from home. This can reduce host density below the tipping point required for an
epidemic. If we are well prepared when an epidemic arrives, we
can fluidly shift into a self-quarantined society in which
microbes fail due to host scarcity. Whatever the social ills of isolation, they are worse for the microbes than for us. The internet will
predict natural disasters We are witnessing the downfall of slow central control in the media: news stories are increasingly becoming
user-generated nets of up-to-the-minute information. During the recent California wildfires,locals went to the TV stations to learn whether
their neighbourhoods were in danger. But the news stations appeared most concerned with the fate of celebrity mansions, so Californians
changed their tack: they uploaded geotagged mobile-phone pictures, updated Facebook statuses and tweeted. The balance tipped: the internet
carried news about the fire more quickly and accurately than any news station could. In this grass-roots, decentralised scheme, there were
embedded reporters on every block, and the news shockwave kept ahead of the fire. This head start could provide the extra hours that save us.
If the Pompeiians had had the internet in 79AD, they could have easily marched 10km to safety, well ahead of the pyroclastic flow from Mount
Vesuvius. If the Indian Ocean had the Pacific’s networked tsunami-warning system, South-East Asia would look quite different
today. Discoveries are retained and shared Historically, critical information has required constant rediscovery. Collections of learning -- from the
library at Alexandria to the entire Minoan civilisation -- have fallen to the bonfires of invaders or the wrecking ball of natural disaster.
Knowledge is hard won but easily lost. And information that survives often does not spread. Consider smallpox inoculation: this was under way
in India, China and Africa centuries before it made its way to Europe. By the time the idea reached North America, native civilisations who
needed it had already collapsed. The net solved the problem. New
discoveries catch on immediately; information spreads widely.
is
In this way, societies can optimally ratchet up, using the latest bricks of knowledge in their fortification against risk. Tyranny
mitigated Censorship of ideas was a familiar spectre in the last century, with state-approved news outlets ruling the press, airwaves and
copying machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In many cases, such as Lysenko’s agricultural despotism in the USSR,
it directly contributed to the collapse of the nation. Historically, a more successful strategy has been to confront free speech with free speech -and the internet allows this in a natural way. It democratises the flow of information by offering access to the newspapers of the world, the
photographers of every nation, the bloggers of every political stripe. Some posts are full of doctoring and dishonesty whereas others strive for
independence and impartiality -- but all are available to us to sift through. Given the attempts by some governments to build firewalls, it’s clear
that this benefit of the net requires constant vigilance. Human capital is vastly increased Crowdsourcing brings people together to
solve problems. Yet far fewer than one per cent of the world’s population is involved. We need expand human capital. Most of the world not
have access to the education afforded a small minority. For every Albert Einstein, Yo-Yo Ma or Barack Obama who has educational
opportunities, uncountable others do not. This squandering of talent translates into reduced economic output and a smaller pool of problem
solvers. The
net opens the gates education to anyone with a computer. A motivated teen anywhere on the planet can
walk through the world’s knowledge -- from the webs of Wikipedia to the curriculum of MIT’s OpenCourseWare. The new human capital
will serve us well when we confront existential threats we’ve never imagined before. Energy expenditure is
reduced Societal collapse can often be understood in terms of an energy budget:when energy spend outweighs energy return, collapse ensues.
This has taken the form of deforestation or soil erosion;currently, the worry involves fossil-fuel depletion. The internet addresses the energy
problem with a natural ease. Consider the massive energy savings inherent in the shift from paper to electrons -- as seen in the transition from
the post to email.Ecommerce reduces the need to drive long distances to purchase products. Delivery trucks are more eco-friendly than
individuals driving around, not least because of tight packaging and optimisation algorithms for driving routes. Of course, there are energy costs
to the banks of computers that underpin the internet -- but these costs are less than the wood, coal and oil that would be expended for the
same quantity of information flow. The tangle of events that triggers societal collapse can be complex, and there are several threats the net
does not address. But vast,
networked communication can be an antidote to several of the most deadly
diseases threatening civilization. The next time your coworker laments internet addiction, the banality of tweeting or the decline of
face-to-face conversation, you may want to suggest that the net may just be the technology that saves us.
Democracy Advantage
Uniqueness – Democraccy
Global democracy is declining
Mead, 2014 (Sir Walter Russell, professor of foreign affairs and humanities at Bard College and editor
at large of the American Interest, “A strategy to Counter Democracy’s global retreat,” January 31, The
Wall Street Journal, http://www.jackmillercenter.org/walter-russell-mead-world-needs-cheaptranslations-locke-et-al/)
In Thailand, the streets are filled with demonstrators demanding the replacement of an elected
government with an appointed council. In Egypt, the largest and most important Arab country, the 2011 revolution
and much-ballyhooed “transition to democracy” ended in a military coup. President Obama’s lead-from-behind
approach to Libya has ushered in anarchy, and Pakistan’s transition from one democratically elected set
of powerless and corrupt politicians to another, widely cheered in Washington, has had no discernible positive
impact on anything whatsoever. A democratically elected government in Hungary is flirting with fascists.
Meantime, political reforms in Burma led to waves of religious violence against that country’s Muslim minority. And
in Ukraine, protesters face off against a corrupt, elected government aligned withVladimir Putin. According to Freedom House’s 2014 Freedom
in the World Report, 2013
was the eighth year in a row in which freedom lost ground. Yet the decade of
freedom’s retreat was also a decade of unprecedented effort on the part of governments and nonprofit
organizations to help freedom thrive. Between 2006 and 2012, the U.S. government alone spent $18.6 billion on democracy
promotion, partly because of stepped up efforts in Afghanistan and the Middle East. This is a substantially higher rate of spending than during
the post-Cold War years, when the former Warsaw Pact states were moving toward democracy. The
gloomy prospects for
democratic self-government in many parts of the world should not come as a surprise. Building
democracy took generations in much of the Atlantic world, and most revolutions didn’t succeed in establishing stable
democratic regimes. Some, like the Hungarians’ in 1848 and again in 1956, failed to hold power and were overthrown. Others, like the French
and Russian Revolutions, gained power only to install dictatorships worse than the ones they overthrew. The South American revolutions
against Spain, like many anti-colonial movements in the 20th century, succeeded against the imperial power—but then failed to build stable,
democratic governments in its place. Egypt’s transition didn’t fail because Egypt’s democrats didn’t attend enough conferences on democracy
building. It failed because the weight of their nation’s history, economics, religion and culture was too heavy for the relative handful of true
democrats to lift. This
should be a sobering lesson. While breakthroughs can sometimes occur, the
construction of open, democratic systems in many countries around the world is likely to be slower and
harder than many of us thought.
Yes Modeling
Supreme court is internationally modelled
Kersch, 2004 (Ken L., Assistant Professor of Politics at Princeton University, “The 'Globalized Judiciary'
and the Rule of Law,” The good Society, 13.3)
The contemporary revival of globalist utopianism is distinctive from its 1940s precedessor in a crucial respect: it post-dates the U.S. Supreme
Court's Brown v. Board of Education (1954) decision and the judge-led "rights revolution" it inaugurated. This revolution was closely followed,
and proved highly influential around the world, inspiring many countries to accept the radical empowerment of their judiciaries at the expense
of democratically elected legislatures. Whereas the traditional, post-war study of comparative constitutionalism was
aimed at scholars and constitutional drafters, today comparative constitutionalists are speaking chiefly to lawyers
and judges. Brown, the proliferation of litigation advocacy groups it inspired, and the rise of public law litigation,
reversed the traditional progressive suspicion of judges as the (anti-democratic) handmaiden of economic elites
and helped create the modern identification of judicial power with progress, civil liberties, and civil rights. The rise of Kantian legal theory, in
turn, which envisaged the judge as the heroic tribune of universal morality, reinforced the moral authority - and, hence, political power - of the
For various reasons, foreign judges, post-1989, found the judicialized
American politics increasingly attractive as a model. The U.S. Supreme Court, the European Court of Justice ("ECJ") duly
noted, had helped to nationalize American politics by gradually negotiating away key aspects of the sovereignty of
the American states. Nations newly emerging from dictatorships, and countries paralyzed by legislative and executive sclerosis
knew that the Warren Court (1953-1969) had broken the southern stranglehold on Congress in the name of
unimpeachable national goals. Cognizant of this American success story, they turned optimistically to courts to
break their own policy deadlocks and advance the causes of civil liberties and human rights. Unlike their American counterparts,
however, these judges were not able to defend their assertiveness by appealing to a centuries-old tradition anchoring
judicial review in constitutional popular sovereignty. Instead — and crucially — they anchored their claims to political power in
their participation, as fellow professionals, in a global project involving the identification and protection of human
rights, the stewardship of the "new" international law, and the technical improvement of the quality of constitutional reasoning generally
through transnational professional consultation. For judges in nations that were not so long ago living in isolation and
tyranny, drawing a demonstrable connection to a worldwide project involving a movement toward "global governance" became a
key source of judicial legitimacy. For them, put otherwise, the process of "judicial globalization" was itself the sine
qua non of the construction of judicial legitimacy. A feedback loop soon developed. After decades of sustained
battering at home, which included major intellectual assaults on [End Page 18] their use of the doctrines of
substantive due process and substantive equal protection to justify their assertiveness, American judges - and a wide
array of political activists and legal academics interested in the aggrandizement of American judicial power - began to see the
opportunities in connecting themselves to this worldwide movement by tapping in to its freshened wellsprings of
legitimacy. The currently intense interest of scholars in the doings of judges worldwide is a direct outgrowth of this process.
judge, and inflated his governing pretensions worldwide.
Courts globally will model the CP and the new mechanism of treaty interpretation
Kersch, 2004 (Ken L., Assistant Professor of Politics at Princeton University, “The 'Globalized
Judiciary' and the Rule of Law,” The good Society, 13.3)
Scholars of the emerging globalized judiciary have described a process that looks very much like that of bureaucratic formation at work
amongst judges around the world. In charting the development of transnational judicial networks and support structures, Anne-Marie
Slaughter, Andrew S. Tulumello, and Stepan Wood have suggested that "a wide range of possibilities exist for strengthening formal and
informal links between international and domestic institutions in ways that blur the distinction between international and domestic law ...."7 As
this process develops, she and her co-authors add, "it is possible that domestic institutions will become more interested in
and receptive to their counterpart international institutions as they begin to perform the same functions
horizontally rather then vertically." And, indeed, this is precisely what they observe happening amongst judges.
"Domestic judges, at least in the United States," they add, "are beginning to articulate their responsibility to 'help the
world's legal systems work together, in harmony, rather than at cross purposes.' Such cooperation includes not only
procedural mechanisms of deference and collaboration, but also substantive evaluation of the degree of convergence
between domestic and foreign law."8 This cooperation has been made possible by "a deep sense of participation in a common global
enterprise of judging." "It [involves]," Slaughter asserts, "a vision of a global community of law, established not by the World Court in the
Hague, but by national courts working together around the world."9 "Constitutional cross-fertilization," as Slaughter calls its, is a crucial part of
this trend.
Yes Modeling – SOP
Plan spills over to affect separation of powers internationally – courts are globalized
and share doctrine
Flaherty, 2008 (Martin S., Co-Director for International Law and Justice, Leitner Family Professor in International
Human Rights, Fordham Law School; visiting Professor, Woodrow Wilson School of Public and International Affairs, Princeton
University, “Globalization and Executive power,” Internationall Human rights Colloquium at Georgetown Law, Spring,
http://www.law.georgetown.edu/internationalhrcolloquium/documents/GEPLRev.doc)
For the purposes of present analysis, however, by far the most important aspects of judicial globalization involve national courts use of
comparative materials and international law – above all international human rights law. Ostensibly new and controversial in the United States,
these aspects of globalization are familiar in most other jurisdictions. As noted, national, supreme, and appellate courts have with
apparent frequency cited to comparable case law in other jurisdictions as at least persuasive authority to resolve
domestic constitutional issues.108 Likewise, such courts also cite with increasing frequency the human rights
jurisprudence of such transnational tribunals as the European Court of Human Rights and its Inter-American counterpart.109 In
spectacular fashion, the House of Lords has recently been doing both.110 Likewise, the still-recent South African Constitution famously
requires judges interpreting its Bill of Rights to consult international law and while expressly allowing them to consult “foreign,” i.e.
So marked is the phenomenon that several comparative constitutional law casebooks that
highlight such borrowing have carved out a significant market niche, even in the U.S. 112 It follows that in all these
comparative law.111
ways the global interaction of judges strengthens their hands within their respective countries. In both theory and in the substance of these
interactions, the bolstering of judiciaries generally
works toward a greater protection of individual and minority
rights. But while leading authorities view judicial globalization as outpacing its legislative counterpart, so too do
they describe a world in which executive and regulatory interaction outpaces them all .
To this extent, judicial
globalization helps identify a problem yet also suggests a solution. The problem, simply, is that transgovernmental globalization
taken as a whole draws power to national executive branches and away from rights-protecting judiciaries. Against
this problem, the
solution becomes fostering the judicial side of the phenomenon, particularly
with regard to the use of comparative and international materials.
US separation of powers spills over globally and prevents tyranny
Flaherty, 2008 (Martin S., Co-Director for International Law and Justice, Leitner Family Professor in International
Human Rights, Fordham Law School; visiting Professor, Woodrow Wilson School of Public and International Affairs, Princeton
University, “Globalization and Executive power,” Internationall Human rights Colloquium at Georgetown Law, Spring,
http://www.law.georgetown.edu/internationalhrcolloquium/documents/GEPLRev.doc)
Alexander Hamilton, among the United States’ most cosmopolitan Founders, famously declared that, “[t]he truth is, after all the declamations
we have heard, that the Constitution is itself, in every rational sense, and to every useful purpose, a Bill of Rights.”1 Among other things, this
Hamilton had in mind separation of powers, including and especially an independent judiciary armed with judicial review. As his then alter-ego,
James Madison, even more famously declared, “The accumulation of all powers, legislative, executive, and judiciary,
in the
same hands . . . may justly be pronounced the very definition of tyranny.” Then as now separation of powers has
global implications. In the 18th century, Hamilton and his peers wrestled with the doctrine’s likely effects in foreign
affairs as in domestic matters. An enhanced national legislature would now, for example, take the lead in
regulating international trade. A stronger executive would better safeguard national security. An independent
judiciary would help enforce the law of nations and so keep the republic at peace. Two hundred years later, the
doctrine no longer simply has effects beyond U.S. borders, but transcends borders altogether . Most obviously, the
doctrine has migrated abroad. Early on, nations around the world adopted some version of the U.S. separation of
powers conceptions in modeling their own constitutions, a phenomenon that only accelerated with the decline of
colonialism after World War II.3 Though usually overlooked, elements of the doctrine also inform key aspects of
international human rights law, such as treaty provisions calling for legislative implementation of fundamental freedoms or mandating
the protection of those freedoms by independent judicial bodies.4
JI Solves Democracy
Judicial independence key to democracy
John
Ferejohn Carolyn S.G. Munro Professor of Political Science and Senior Fellow of the Hoover Institution, Stanford University.
Visiting Professor of Law and Politics, New York University School of Law. “ INDEPENDENT JUDGES, DEPENDENT JUDICIARY: EXPLAINING
JUDICIAL INDEPENDENCE” 72 S. Cal. L. Rev. 353 January / March, 19
99
What is the purpose of judicial independence in a constitutional democracy? In principle, judicial independence furthers three distinct values.
First, a high degree of judicial independence seems a necessary
condition for the maintenance of the rule of law -
ensuring that everyone is subject to the same publicly communicated general legal rules. This concern suggests the necessity of
making sure that powerful people - particularly elected officials - cannot manipulate legal proceedings to their
advantage. Secondly, in a constitutional government, only those laws that are constitutionally legitimate ought to be
enforced, and courts must be able to do much of the work in deciding which laws survive this test. Thus, there is a
need to ensure that courts are sufficiently independent to overturn congressional statutes that subvert these
values. Finally, in a democracy, it is important that constitutionally legitimate laws be given full effect. The worry here is that officials in the
executive branch, or the cur [*367] rent legislature itself, may interfere in the enforcement of statutes enacted by previous legislatures
without bothering to go through procedural formalities. In the interest of democracy, courts must have sufficient autonomy
to resist the temptations to give too much deference to current holders of economic or political power.
JI Good – Illiberal Backsliding
Re-invigorated judicial independence sends a global signal- it's the only way to
liberalize democratizing states.
The Center for Justice and Accountability ’04 (Amici Curiae in support of petitioners
in Al Odah et al. v USA, "Brief of the Center for Justice and Accountability, the International League for
Human Rights, and Individual Advocates for the Independence of the Judiciary in Emerging
Democracies," 3-10,
http://www.jenner.com/files/tbl_s69NewsDocumentOrder/FileUpload500/82/AmiciCuriae_Center_for_
Justice_Int_League_Human_Rights_Adv_For_Indep_Judiciary2.PDF)
Many of the newly independent governments that have proliferated over the past five decades have adopted
these ideals. They have emerged from a variety of less-than-free contexts, including the end of European colonial rule in the 1950's and
1960's, the end of the Cold War and the breakup of the former Soviet Union in the late 1980's and 1990's, the disintegration of Yugoslavia, and
the continuing turmoil in parts of Africa, Latin America and southern Asia.
Some countries have successfully transitioned to stable
and democratic forms of government that protect individual freedoms and human rights by means of judicial
review by a strong and independent judiciary. Others have suffered the rise of tyrannical and oppressive rulers who consolidated
their hold on power in part by diminishing or abolishing the role of the judiciary. And still others hang in the balance,
struggling against the onslaught of tyrants to establish stable, democratic governments. In their attempts to shed
their tyrannical pasts and to ensure the protection of individual rights, emerging democracies have consistently
looked to the United States and its Constitution in fashioning frameworks that safeguard the independence of their
judiciaries . See Ran Hirschl, The Political Origins of Judicial Empowerment through Constitutionalization: Lessons from Four Constitutional
Revolutions, 25 Law & Soc. Inquiry 91, 92 (2000) (stating that of the “[m]any countries . . . [that] have engaged in fundamental constitutional
reform over the past three decades,” nearly all adopted “a bill of rights and establishe[d] some form of active judicial review”). Establishing
judicial review by a strong and independent judiciary is a critical step in stabilizing and protecting these new
democracies. See Christopher M. Larkins, Judicial Independence and Democratization: A Theoretical and Conceptual Analysis, 44 Am. J.
Comp. L. 605, 605-06 (1996) (describing the judicial branch as having "a uniquely important role" in transitional countries,
not only to "mediate conflicts between political actors but also [to] prevent the arbitrary exercise of government
power; see also Daniel C. Prefontaine and Joanne Lee, The Rule of Law and the Independence of the Judiciary, International Centre for Criminal
Law Reform and Criminal Justice Policy (1998) ("There is increasing acknowledgment that an independent judiciary is the key
to upholding the rule of law in a free society . . . . Most countries in transition from dictatorships and/or statist
economies recognize the need to create a more stable system of governance, based on the rule of law."), available
at http://www.icclr.law.ubc.ca/Publications/Reports/RuleofLaw. pdf (last visited Jan. 8, 2004). Although the precise form
of government differs among countries, “they ultimately constitute variations within, not from, the American
model of constitutionalism . . . [a] specific set of fundamental rights and liberties has the status of supreme law, is
entrenched against amendment or repeal . . . and is enforced by an independent court . . . .” Stephen Gardbaum, The New
Commonwealth Model of Constitutionalism, 49 Am. J. Comp. L. 707, 718 (2001). This phenomenon became most notable
worldwide after World War II when certain countries, such as Germany, Italy, and Japan, embraced independent
judiciaries following their bitter experiences under totalitarian regimes. See id. at 714- 15; see also United States v.
Then, 56 F.3d 464, 469 (2d Cir. 1995) (Calabresi, J., concurring) (“Since World War II, many countries have adopted
forms of judicial review, which — though different from ours in many particulars — unmistakably draw their origin and inspiration from
American constitutional theory and practice. See generally Mauro Cappelletti, The Judicial Process in Comparative Perspective (Oxford:
Clarendon Press, 1989).”). It is a trend that continues to this day. It bears mention that the United States has consistently affirmed and
encouraged the establishment of independent judiciaries in emerging democracies. In September 2000, President Clinton observed that
"[w]ithout the rule of law, elections simply offer a choice of dictators. . . . America's experience should be put to use to advance
the rule of law, where democracy's roots are looking for room and strength to grow." Remarks at Georgetown University
Law School, 36 Weekly Comp. Pres. Doc. 2218 (September 26, 2000), available at http://clinton6.nara.gov/2000/09/2000-09-26- remarks-bypresident-at-georgetown-international-lawcenter. html. The United States acts on these principles in part through the assistance it provides to
developing nations. For example, the United States requires that any country seeking assistance through the Millenium Challenge Account,
a development assistance program instituted in 2002, must demonstrate, among other criteria, an "adherence to the rule of law." The White
House noted that the rule of law is one of the "essential conditions for successful development" of these countries.
See http://www.whitehouse.gov/infocus/developingnations (last visited Jan. 8, 2004).12
Illiberal majoritarian transitions cause genocide and war
Fareed Zakaria, PhD Poli Sci @ Harvard, Managing Editor of Foreign Affairs, 1997
(http://www.fareedzakaria.com/ ARTICLES/other/democracy.html)
Lang's embarrassment highlights two common, and often mistaken, assumptions -- that the forces of democracy are the forces of ethnic
harmony and of peace. Neither is necessarily true. Mature liberal democracies can usually accommodate ethnic divisions
without violence or terror and live in peace with other liberal democracies. But without a background in
constitutional liberalism, the introduction of democracy in divided societies has actually fomented nationalism,
ethnic conflict, and even war. The spate of elections held immediately after the collapse of communism were won in the Soviet Union
and Yugoslavia by nationalist separatists and resulted in the breakup of those countries. This was not in and of itself bad, since those countries
had been bound together by force. But the rapid
secessions, without guarantees, institutions, or political power for the
many minorities living within the new countries, have caused spirals of rebellion, repression, and, in places like Bosnia, Azerbaijan,
and Georgia, war. Elections require that politicians compete for peoples' votes. In societies without strong traditions of multiethnic groups or
assimilation, it is easiest to organize support along racial, ethnic, or religious lines. Once an ethnic group is in power, it tends to exclude other
ethnic groups. Compromise seems impossible; one can bargain on material issues like housing, hospitals, and handouts, but how does one split
the difference on a national religion? Political competition that is so divisive can rapidly degenerate into violence. Opposition movements,
armed rebellions, and coups in Africa have often been directed against ethnically based regimes, many of which came to power through
elections. Surveying the breakdown of African and Asian democracies in the 1960s, two scholars concluded that democracy "is simply not viable
in an environment of intense ethnic preferences." Recent studies, particularly of Africa and Central Asia, have confirmed this pessimism. A
distinguished expert on ethnic conflict, Donald Horowitz, concluded, "In the face of this rather dismal account . . . of the concrete failures of
democracy in divided societies . . . one is tempted to throw up one's hands. What is the point of holding elections if all they do in the end is to
substitute a Bemba-dominated regime for a Nyanja regime in Zambia, the two equally narrow, or a southern regime for a northern one in
Benin, neither incorporating the other half of the state?" Over the past decade, one of the most spirited debates among scholars of
international relations concerns the "democratic peace" -- the assertion that no two modern democracies have gone to war with each other.
The debate raises interesting substantive questions (does the American Civil War count? do nuclear weapons better explain the peace?) and
even the statistical findings have raised interesting dissents. (As the scholar David Spiro points out, given the small number of both democracies
and wars over the last two hundred years, sheer chance might explain the absence of war between democracies. No member of his family has
ever won the lottery, yet few offer explanations for this impressive correlation.) But even if the statistics are correct, what explains them? Kant,
the original proponent of the democratic peace, contended that in democracies, those who pay for wars -- that is, the public -- make the
decisions, so they are understandably cautious. But that claim suggests that democracies are more pacific than other states. Actually they are
more warlike, going to war more often and with greater intensity than most states. It is only with other democracies that the peace holds.
When divining the cause behind this correlation, one thing becomes clear: the democratic peace is actually the
liberal peace. Writing in the eighteenth century, Kant believed that democracies were tyrannical, and he specifically excluded them from his
conception of "republican" governments, which lived in a zone of peace. Republicanism, for Kant, meant a separation of powers, checks and
balances, the rule of law, protection of individual rights, and some level of representation in government (though nothing close to universal
suffrage). Kant's other explanations for the "perpetual peace" between republics are all closely linked to their
constitutional and liberal character: a mutual respect for the rights of each other's citizens, a system of checks and
balances assuring that no single leader can drag his country into war , and classical liberal economic policies -- most
importantly, free trade -- which create an interdependence that makes war costly and cooperation useful. Michael Doyle, th leading scholar on
the subject, confirms in his 1997 book Ways of War and Peace that without constitutional liberalism, democracy
itself has no
peace-inducing qualities: Kant distrusted unfettered, democratic majoritarianism, and his argument offers no
support for a claim that all participatory polities -- democracies -- should be peaceful, either in general or between
fellow democracies. Many participatory polities have been non-liberal. For two thousand years before the modern age, popular rule was
widely associated with aggressiveness (by Thucydides) or imperial success (by Machiavelli) . . . The decisive preference of [the] median voter
might well include "ethnic cleansing" against other democratic polities. The distinction between liberal and illiberal democracies
sheds light on another striking statistical correlation. Political scientists Jack Snyder and Edward Mansfield contend,
using an impressive data set, that over the last 200 years democratizing states went to war significantly more often than
either stable autocracies or liberal democracies. In countries not grounded in constitutional liberalism, the rise of
democracy often brings with it hyper-nationalism and war-mongering. When the political system is opened up,
diverse groups with incompatible interests gain access to power and press their demands. Political and military
leaders, who are often embattled remnants of the old authoritarian order, realize that to succeed that they must
rally the masses behind a national cause. The result is invariably aggressive rhetoric and policies, which often drag
countries into confrontation and war. Noteworthy examples range from Napoleon III's France, Wilhelmine Germany, and Taisho Japan
to those in today's newspapers, like Armenia and Azerbaijan and Milosevic's Serbia. The democratic peace, it turns out, has little to
do with democracy.
Illiberalism – Backsliding Now
The vast majority of democracies are illiberal and young – only a risk of transitional
conflicts now
Tarzi 7 (Shah, Professor of Economic Affairs @ Bradley, Democratic Peace, Illiberal Democracy and
Conflict Behavior, International Journal on World Peace, vol 24)
The proposition that mature, stable "constitutionally liberal" democratic republics do not go to war with each
other is compelling. This type of democracy implies "constitutional liberalism," which, as Fareed Zakaria has aptly stated, refers to "the
tradition, deep in Western history, that seeks to protect an individual's autonomy and dignity against coercion, whatever the source--state,
church, or society." (7) A glance at Western democracies in North America and Western Europe today would have one readily conclude that
mature "constitutional liberal" democracies are highly unlikely to initiate war with each other. The overwhelming
majority of democracies today, however, can be characterized as young democracies, in most instances even as
proto-democratic regimes, semi-democracies, or "illiberal democracies." (8) This essay offers preliminary observations on the
importance of the profound analytical and evidentiary divide between the mature "liberal constitutional" democracy and the other types.
While war between liberal democracies is rare or less likely, electoral democracy does not necessarily lead to
"liberal constitutionalism," and therefore it does not follow that these are as unlikely to engage in conflict with
other democratic regimes. Without paying due attention to this divide, there is the danger that the rich body of empirical research may
become a justification rather than an explanation for the mutual democratic pacifism thesis.
Democratic backsliding now
Beinart 7 (Peter, Senior fellow at the Council on Foreign Relations, Time.com: Is Freedom Failing?,
http://www.time.com/time/magazine/article/0,9171,1619543,00.html)
That was then. But when Nigerians went to the polls again last month, democracy lost. In an orgy of ballot-box stuffing and violence,
punctuated by an attempted truck bombing of the electoral-commission headquarters, the ruling party won what some observers thought was
the most fraudulent election ever in Nigeria--which is saying something. Once again, Nigeria is catching a wave. From Bangladesh to
Thailand to Russia, political freedom is in retreat. In a book due out this fall, Hoover Institution political scientist
Larry Diamond notes that "we have entered a period of global democratic recession." What happened? Iraq, for
one. The U.S.'s war on terrorism was always a mixed blessing for democracy. President Bush says spreading
freedom is key to preventing future terrorist attacks, but his own policies have made reform much harder. For
Middle East dictators who equate democratization with chaos, Iraq has been a godsend. With anarchy threatening
to engulf the region, the U.S. now needs dictators like Egypt's Hosni Mubarak and Saudi Arabia's King Abdullah more than they
need us, which leaves us little leverage to push reform. When Secretary of State Condoleezza Rice went to Cairo in
June 2005, she made Egyptian democracy the centerpiece of her trip. By the time Defense Secretary Robert Gates
went there last month, he refused to discuss the topic at all. Then there's oil. As Thomas Friedman has noted, the price of
crude and the tide of freedom tend to move in opposite directions. Before 9/11, the price per bbl. fluctuated
between $20 and $30. Now it hovers between $50 and $65. And that's not likely to change anytime soon, given
rising demand from China and India. That gives oil-producing autocracies such as Russia, Iran, Venezuela, Sudan
and now Nigeria more money to crush or buy off internal dissent. And it makes it easier for them to win friends
and influence people around the world. A decade ago, authoritarian governments were largely on the defensive. Today Venezuela's
Hugo Chávez is cloning himself in Bolivia and Ecuador. And Iran is on the verge of dominating the Middle East. For democracy's future,
these are real problems. But there's an even bigger one: democracy is not improving people's lives. In Bangladesh,
among the most corrupt countries in the world, many were thrilled when the military seized power in January. By
most accounts, Russians like how Vladimir Putin has ruled. And though Chávez is one of Latin America's least
democratic leaders, he's also one of the most popular. In many countries that have embraced democracy since the
cold war's end, free elections haven't reduced corruption, violence or poverty. When generals topple democratic
governments or when autocrats like Putin or Chávez strangle them from within, they usually do so in the name of
honest government and meat for dinner. And for people who have gone years without either, that sounds pretty
good.
Illiberalism – Liberal Democ = Stable
Liberal democracies are peaceful
Danilovic and Clare, associate professor of political science at the University at Buffalo and visiting assistant
professor of political science at the University of Illinois at Urbana-Champaign, 2007 (Vesna and Joe, American
Journal of Political Science, April, InterScience Online)
It has been commonplace to identify the democratic peace research with the Kantian tradition, yet the main emphasis in this research is on the
representative nature of electoral democratic institutions while largely ignoring the liberal elements of Kant's "republic" as a source of
international peace. Like political theorists and Kantian scholars, we show that the respect for civil liberties and the rule of law—
that is, liberal constitutionalism—represent even more fundamental elements of Kantian republicanism than
procedural democratic institutions. While it is plausible to expect democracy and liberalism to be correlated, they are nevertheless
theoretically and empirically distinct, and our reexamination of Kant's theory of the domestic sources for peace as well as our empirical analysis
validate such a distinction. Consider, for example, the recent rise of new regimes, which are not merely transitional, but are rather being
consolidated as "competitive" or "electoral" autocracies (Levitsky and Way 2002) or "illiberal democracies" (Zakaria 1997). These prima facie
pass as democracies, yet do not score as high on the criteria of liberal constitutionalism. Our study shows that it would be erroneous, and
certainly inconsistent with Kant's political theory, to conflate their external relations with liberal democracies simply because they share similar
procedural institutions. Thus, when critics point to
some conflicts such as that between Peru and Ecuador in the 1990s (e.g.,
Gates, Knutsen, and Moses 1996) as disputes that defy the democratic peace argument, our study shows that these are
not necessarily disputes between liberal states (the cited conflict was actually between Fujimori's illiberal democracy and Ecuador's
liberal state). This then reconfirms Kant's original penchant for civil liberties and rule of law as domestic solutions for peace. We first revisit
Kant's notion of republic to delineate its constitutive elements—civil liberties and the rule of law, separation of powers, and representative
governance—and show how all three are essential for Kant's reasoning behind the "liberal peace." Secondly, unlike previous studies that
associate Kant's original argument with either the monadic claim that liberal states are peaceful in general, or dyadic ("separate peace")
explanations for the democratic peace, we show that either expectation is consistent with his theory. Thirdly, we point to several levels of
explanations concerning domestic sources for peace in Kant's writings, which are based on his dual understanding of motivations behind human
actions—both moral and self-interested. This in turn means that, if we are to draw strictly from Kant, there are theoretical justifications for
both norm-based and interest-based accounts for the democratic peace. Finally, we depart from the previous international relations literature
that associates Kant's theory only with international peace and instead demonstrate that it is consistent with his theory to expect the decline in
both international and civil wars with the rise of liberalism. We derive several propositions from our discussion of Kant's approach to liberalism
and peace, which are then tested quantitatively. Our results reinforce the need for a careful differentiation between liberal constitutionalism
and democratic representation as two related but also distinct aspects of what is referred to as "liberal democracy." We find evidence for
both monadic and dyadic expectations for the liberal peace, and the results are more robust when based on the measures for
liberalism rather than procedural democracy. Our results for domestic ("civil") peace point even to the opposite pattern.
Only liberal states experience less civil wars than any other type of regime. On the other hand, if the states are measured on
a strictly democratic scale—regardless of their respect for civil liberties—they are in fact more vulnerable to civil wars than are autocracies. We
draw important theoretical implications from these findings. Ultimately, besides the theoretical contribution to the Kantian studies of peace,
our analysis validates the caution about the peaceful expectations from the current rise of "new democracies," many of which turn out to be
semi- or illiberal societies with different conflict propensities than established liberal democracies.
Studies prove that liberal democracy solves both international and civil peace.
Danilovic and Clare, associate professor of political science at the University at Buffalo and visiting assistant
professor of political science at the University of Illinois at Urbana-Champaign, 2007 (Vesna and Joe, American
Journal of Political Science, April, InterScience Online)
In our study, we addressed theoretical and empirical gaps in the Kantian tradition in international relations. Our focus was on domestic sources
of conflict in Kant's theory, and we showed that, although democracy is consistent with Kantian thinking, the most essential elements of his
"republic" concern the protection of civil liberties, the separation of powers, and the rule of law as barriers to arbitrary rule. Our interpretation
of Kant's republicanism is in agreement with Kantian political theorists (e.g., Ellis 2005; Rosen 1993), yet liberal governance has routinely been
subordinated to electoral democracy in the democratic peace studies. The distinction we draw between procedural democratic
rule and liberal governance is relevant both theoretically and empirically. Once we unpack Kant's republic in terms
of constitutional liberal governance, we can uncover several levels of his reasoning behind the domestic sources
for peace which were largely obscured in the previous studies. Not only do we find that monadic and dyadic views are consistent with Kant's
theory, but also that both normative and interest-based explanations for international peace can equally draw on Kant as their theoretical
precursor. We further demonstrate that, if we are to fully understand all constitutive elements of his republicanism, we can additionally infer
that the Kantian legacy is related to a liberal civil peace as well. Though one of our primary goals was to provide a theoretical contribution to
the Kantian tradition in international relations, we also examined its empirical validation. The results of our empirical analysis strongly support
all hypotheses inferred from our reexamination of Kantian legacy. While the results are mixed for the "democratic peace"—
international and domestic alike—the findings are robust and consistent with our theoretical expectations
concerning the
impact of constitutional liberalism on both international and civil "liberal peace." The compelling evidence in this study
validates Doyle's (2005) recent response to the critics of democratic peace, especially those questioning its historical validity (e.g., Farber and
Gowa 1995; Rosato 2003), that the verdict is still out as previous empirical studies have not incorporated "the principles of liberal
individualism"—the heart of Kant's republic. As Doyle points out, while these might "evolve" with "democratic institutions,""we cannot be sure
of this" (2005, 466), and thus the theory needs additional testing that separately codes a liberal component. We precisely provide such
an analysis, casting doubt on the critics' rejection of liberal peace on the grounds of empirical invalidity , though our
analytical aim extends well beyond this empirical task. Finally, our study is particularly relevant today. In the last "wave" of
democratization, many states that are commonly categorized as democracies continue to have questionable
records concerning the protection of individual freedoms, civil rights, and the rule of law against arbitrary rulings or
policy implementations. Indeed, as our descriptive analysis indicates, there is a substantial group of states that fit into the category of
semiliberal democracies. As comparative politics scholars point out, these are not transitional regimes, but rather consolidated systems that
elude previous classifications, which typically conflate the liberal and democratic regime dimensions. Like comparativists, but from a very
different—that is, Kantian—angle, we also caution against conflating liberal democracies and "hybrid regimes." At the same time, we have gone
a step further to show the implications of analyses for conflict behavior. Our empirical analysis validates the caution against quick conclusions
about the peaceful prospects for these new regimes. As demonstrated in our study, if the spread of democracy is indeed going to
lead to international and domestic peace, it must be simultaneous with the full development of what was at the heart
of Kant's republicanism, that is, constitutional liberal governance.
JI Good – A/T Accountability
Ending deference increases overall government accountability
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
The accountability justification generally overstates the degree to which courts are insulated from politics.286 On the domestic front,
Supreme Court appointments have become an increasingly prominent issue in presidential elections, at least since Roe
v. Wade and the nominations of Robert Bork and Clarence Thomas.287 Although foreign affairs have not played much of a role in
these debates thus far, this is almost certainly due to the courts’ generally deferential approach to foreign relations
controversies. When the courts have been bolder, such as in the three Guantánamo cases, they have captured the attention
of policy-makers and the public, creating issues for presidential campaigns.288 Moreover, accountability cuts both
ways. It is a core purpose of the separation of powers.289 The courts can serve an important information-forcing
role that assists the People in holding the executive branch accountable for foreign affairs decisions, many of which are
shrouded in secrecy.290 Court cases require the government to articulate clearly the rationales for its policies and the
procedures through which those policies were enacted. Habeas corpus forces federal officers to justify their detention of
individuals whose imprisonment would otherwise remain unscrutinized.291 In any event, assuming that the courts are relatively less
accountable than the political branches, this aspect of the constitutional regime is accepted in the domestic context. Why
should foreign affairs require faster and easier accountability ? Ultimately, the one-voice arguments for special deference— for
uniformity, accountability, and avoiding embarrassment—must be grounded in assumptions about the peculiar requirements of managing a
great power’s foreign policy in an anarchic world. These are considerations of realpolitik, which I discuss in the next subpart.
JI Good – A/T Courts Not Transparent
Turn – court opacity is key to deliberation and democracy
Peters, 2000 (Christopher J., Assistant Professor of Law, Wayne state University Law School, “Assessing the new judicial minimalism,”
Columbia Law review, 100 Colum. L. Rev. 1454, October)
Deliberation is not necessarily promoted by transparency; indeed, it is frequently hindered by it. This is a point that Sunstein
himself has made quite powerfully in the past. In The Partial Constitution, Sunstein sides with Madison against Jefferson in favor of the closing
of the Constitutional Convention in 1787: On Madison's view, it was best "to sit with closed doors, because opinions were so various and at
first so crude that it was necessary they should be long debated before any uniform system of opinion could be formed. Meantime the minds of
the members were changing, and much was to be gained by a yielding and accommodating spirit... By secret discussion no man felt
himself obliged to retain his opinions any longer than he was satisfied of their propriety and truth, and was open to
the force of argument." n187 Indeed, the Federalists thought that opacity was necessary for true democratic
deliberation. They distrusted open public discussion and, as James Martin has written, "believed that the public interactions and
debates that are a part of any democracy should take place via the representative mechanisms that operate
through the legal institutions of the state." n188 The relationship between the opacity and the quality of deliberation recently
surfaced in the debate over whether the Senate, sitting as a court of impeachment in the trial of President Clinton, should deliberate publicly or
behind closed doors. Some, like Iowa Senator Tom Harkin, opposed deliberations in "secret session" and argued that opening the debate
"would send an important message. The public has a right to know how the Senate reaches its final decision on the removal or acquittal of the
President." n189 Others, like Alabama Senator Richard Shelby, held a different view: "I think we explain[] to our constituents how we're going
to vote as we vote and afterwards... But I believe that the deliberations ought to be like every jury in America, they
ought to
be behind closed [*1497] doors where we can be candid...." n190 In the end, those advocating open-door deliberations failed to
achieve the two-thirds majority necessary to waive the Senate rule requiring secret debate. n191 Madison, Senator Shelby, and Sunstein
himself have recognized that the glare of the public spotlight is not conducive to the candidness and openmindedness necessary to true deliberation. This is so for the same reasons that support representative rather than direct democracy:
Public opinion may be raw, "based on inadequate information and on popular passions that are insufficiently influenced by reason-giving
and understanding of context." n192 Exposing important decisions, and the processes of making them, to instantaneous
and continuous public scrutiny threatens to infect representative democracy with the sorts of emotional, knee-jerk
tendencies it was designed to avoid. n193 This is especially so when the decisions to be made involve not simply policy
issues, but questions of individual rights against the majority. Writing of the dangers of referenda in the affirmative action context,
Sunstein notes the risk that "outcomes will not be based on a careful assessment of facts and values, but instead on crude 'we-they' thinking."
n194 This point can be generalized across all decisions involving individual rights. Questions of individual rights are inherently "we-they" affairs:
The majoritarian "we" is pitted against the individual or minority "they." True deliberation about such questions - decisionmaking characterized
by reason-giving, openness to opposing arguments, consideration of various relevant perspectives, and willingness to compromise - is made
difficult from the start in the political system, where the ultimate decisionmakers, the citizens, by definition have something to gain or to lose.
Deliberation is made all the more difficult when representatives are constantly bombarded, through public opinion
polls and the ever-more-massive media, by the self-interests they are supposed to be filtering. n195 [*1498] The
increasing transparency of politics stands in stark contrast to the opaque process of adjudicative decisionmaking.
Only very rarely, as in the O.J. Simpson case, does the actual process of adjudication attract significant public attention.
What publicity adjudication does draw invariably goes to the trial process, not to the appellate process, where law is made. Appellate court and
Supreme Court proceedings are not televised, and only the results of those proceedings tend to receive publicity (and then only
when they decide high-profile issues). And of course the actual deliberations of appellate courts invariably take place behind
closed doors. It is true, and important, that the tools of Supreme Court deliberation - briefs filed by the parties, and transcripts or recordings
of oral arguments - and the results of that deliberation - written opinions - usually are made public, more frequently and quickly than ever
these days. But these sources only confirm the extent to which adjudication is meticulously deliberative. Legal briefs, oral arguments, and court
opinions, unlike arguments made in the political realm, typically eschew entreaties to "public opinion" or "the public interest," instead replacing
them with arguments based on the interpretation of legal authorities. Briefs, arguments, and opinions also typically address the reasoning both
for and against the results they espouse. They are not allowed to be "supported by self-interest or force" n196 or to rely on "'naked
preferences.'" n197 They are models of "reason-giving in the public domain." n198 The quoted phrases in the previous paragraph are taken
from Sunstein's description of "deliberative democracy" in One Case at a Time. Remarkably, though, they describe the everyday adjudicative
process much more accurately than they describe the everyday political process. n199 This is because the adjudicative process is, in
these important ways, far more "deliberative" than politics typically can be. Part of the reason for this is the much-
maligned isolationism of the law - its insulation from worldly affairs, its persistent formalism, its self-referential
reliance only on appropriately pedigreed authorities. n200 Law in our system takes place behind [*1499] closed doors, away from
the public spotlight and with little regard for it. And this opacity may work to the judiciary's advantage in attracting public
trust; a recent survey indicates that the public has more "respect" for the Supreme Court than for the political branches. n201 It is strange,
then, that Sunstein sees judicial review primarily as a tool for increasing the deliberativeness of the political branches. Much of the point of
judicial review is that it is more deliberative than the political process, and thus better constituted to produce
decisions that require deliberation above all else. As I explain in the next section, the adjudicative brand of deliberation does
not lend itself to many kinds of decisionmaking that the political branches are good at. But it does lend itself to decisionmaking about
individual rights - when they exist, what they look like, how far they ultimately extend. Decisions about individual
rights are particularly poorly made in the spotlight, where they can be distorted by the very pressures that rights
are meant to stand against. They are better made by courts, which can, in the current phrase, "fly under the radar"
of public scrutiny.
A/T Democracy Resilient
Backsliding into illiberalism and authoritarianism is possible
Pillar, 2012 (Paul R., “What America can learn from Hungary’s backsliding democracy,” The Atlantic,
January 20, http://www.theatlantic.com/international/archive/2012/01/what-america-can-learn-fromhungarys-backsliding-democracy/251701/)
This affair shows how even a country where liberal democratic principles seem to have been firmly established (and
in this case a country that until now has been a member in good standing of the club of advanced democracies known as the European Union)
may back away from consistent application of those principles. Democratization and liberalization are
not necessarily one-way processes. To realize this goes against the tendency to think of them as a one-way process. Perhaps some of
this tendency comes from interpretations of Francis Fukuyama's end-of-history idea. Perhaps we should remember the ideas of an
earlier big-think political philosopher, Plato, about how different forms of government degenerate into other forms. Democracy, as
Plato saw it, was not the end state of this process. It was the penultimate state, degenerating into
tyranny. Plato's progression of political forms has not matched subsequent history very well, but it provides some food for thought about
different possible types of political transformation. We see the common one-way view of political change in much
current political thought and interpretations of current events. The Arab Spring, for example, is usually
regarded as a push in the direction of greater democracy as long as the process doesn't get hijacked by
those nasty Islamists. Apostles of regime change presume that destabilizing any undemocratic regime will
result in a new political system that is freer and more democratic, even though that is not necessarily
the case. And there is smugness about the endurance of democratic values in our own political system. The Democracy ReportWhat is going
on in Hungary suggests that we should not be so smug. Some of what is involved in Hungary's creeping
authoritarianism has echoes in American politics. There is the use of brute legislative force or outright
coercion to get one's way, even if this in effect means a compromise of democratic values. And there is a
hubristic belief that it is so important for one's own party or movement to be in power that this takes
precedence over all other interpretations of the national interest. Viktor Orban has a soulmate of sorts in Mitch
McConnell when the latter says his top priority is to defeat the president of the opposing party.
Plan Solves Democracy
NSA domestic surveillance undermines democracy and individual rights – reassertion
of independent judiciary key
Hafez, 2013 (Jonathan, Associate Professor of Law at Seton Hall Law School, “how NSA surveillance
endangers the fourth amendment,” Constitution Daily, August 13,
http://blog.constitutioncenter.org/2013/08/how-nsa-surveillance-endangers-the-fourth-amendment/)
The Fourth Amendment provides a bulwark against this type of dragnet surveillance. Before searching Americans’
private communications, the Fourth Amendment requires that the government demonstrate probable cause or
individualized suspicion. The Fourth Amendment also interposes an independent judiciary between the
government and its citizenry—requiring that the government obtain a warrant by making this individualized showing before a federal
judge. Review by a neutral and independent decisionmaker is crucial to the Madisonian system of checks
and balances, designed to prevent government overreaching and safeguard individual freedoms. The NSA
surveillance programs undermine these protections, threatening to render them a dead letter for all “foreign
intelligence information”—a category broadly defined to include information not only about terrorism, but also about intelligence activities,
national defense, and even the “foreign affairs” of the United States. Further, given
the lax standards the NSA uses to
determine whether prospective surveillance targets are foreigners abroad, errors are inevitable. This
means that the NSA is likely collecting the content of purely domestic communications as well. In 1978,
Congress established a special court—known as the Foreign Intelligence Surveillance Court (FISC)—to review requests for national security
surveillance. But, at
best, the FISC is merely providing review of the overall surveillance programs conducted
under the FAA, and not individual requests for information. Moreover, no FISC ruling explaining its legal analysis of
the FAA or “about the target” searches of Americans’ cross-border communications has been disclosed to the public. The
secrecy that shrouds the FISC’s decisions heightens the risk to the Fourth Amendment, as even the
reasoning used to justify massive government surveillance remains secret. The impact of NSA surveillance is
deep and far-reaching. Vacuuming up Americans’ communications undermines basic principles of
privacy. It also chills the communications and discourse essential to a democratic society and
fundamentally alters the citizenry’s relation with its government. The NSA’s widespread, suspicionless
surveillance of Americans’ private communications will not only impact the work of journalists, lawyers,
and others who frequently communicate with people abroad. It will also affect the conduct of ordinary
citizens, now fearful of visiting a controversial website or discussing a particular topic via email. Over time, the vibrant exchange of
ideas essential to democracy will diminish and trust in the government will erode. At the same time, the
government will be emboldened to justify further incursions on individual liberty in name of protecting
the United States from terrorism or other threats.
Courts Key to Democracy
Independent judiciary and rule of law key to democracy – prevents arbitrary exercise
of political power
Reenock et al, 2013 (Christopher, Florida State University, Jeffrey K. Staton, Emory University, Marius
Radean, Florida State University, “Legal institutions and Democratic survival,” The Journal of Politics,
Vol. 75, No. 2, April)
Institutional systems designed to limit arbitrary state power, when they are effective, address the kind of
monitoring and coordination problems that Przeworski’s leaders confront. By an effective institutional
system that limits arbitrary state power, we have in mind a cluster of two classes of elements (themselves collections of many
attributes), which scholars have proposed as useful to the creation of credible commitments. One is a set of rules that define the
limits of state power (e.g., North 1991). These typically include formal constitutional rules, e.g. prohibitions on the
impairment of contracts, due process guarantees, equal protection rights, etc. But they can also include unwritten norms or more typically
statutory rules governing standing, the freedom of access to information, etc., and even elements of judicial doctrine that ensure things like the
‘‘reasonableness’’ of government actions. Importantly, although neoinstitutional scholars largely agree that state constraint is promoted by
rules, there is little consensus over the precise bundle of rules necessary for an effective system, much less over the precise way of expressing
these rules. Even scholars seeking to ‘‘unbundle’’ rules are typically not successful in laying out precisely which rules, in combination with which
others, are necessary or suffi- cient to ensure credible commitments (Acemoglu and Johnson 2005). Indeed, it seems highly likely that the
perfect bundle of formal rules is likely to be contextually dependent. The reason is that if they are going to set behavioral incentives correctly,
they must reflect shared understandings about the real limits of state authority, and these understandings can manifest in a variety of ways
(Weingast 1997). The bottom line is that while formal limits on the state must exist, they are unlikely to manifest identically in every context.
The second element of an effective institutional system consists of independent mechanisms for
applying and enforcing rules in particular contexts. An effective system thus includes people who serve
on courts, labor boards, and bodies for alternative dispute resolution, and who are willing to provide judgments that are
independent of current government preferences. This is not to say that an effective institutional system need bind state
practices in every context. Judges, for example, may be ignored on occasion (e.g., Vanberg 2005). What is critical for an effective system is that
when violations are observed, they are declared. Such institutional systems attempt to limit arbitrary state
power in a
variety of dimensions. In the context of the Przeworski model, an institutional system for the protection of property
rights is particularly salient. As Acemoglu and Johnson write, the key feature of these institutions is that: [T]hey are
intimately linked to the distribution of political power in society because they regulate the relationship
between ordinary private citizens and the politicians or elites with access to political power. When property
rights institutions fail to constrain those who control the state, it is not possible to circumvent the ensuing problems by writing alternative
contracts to prevent future expropriation, because the state, with its monopoly of legitimate violence, is the ultimate arbiter of contracts.
(2005, 951) We will focus largely on this kind of institutional system here, recognizing that the argument can be generalized beyond property
rights. In understanding how institutions might influence the monitoring and coordination problems of Przeworski’s (2005) model, we are
benefited by the fact that two extant models of law (Carrubba 2005; Weingast 1997) are directly on point. Carrubba considers a game in which
players confront an informational challenge that complicates their ability to monitor cooperative agreements. Weingast considers a game in
which citizens confront a coordination problem, the solution to which is necessary in order to keep the state from violating fundamental limits
on its power. The institutional solutions the authors propose do not exhaust all elements of a complete property rights system, the examples (a
judicial dispute resolution function and a set of constitutional rules) are critical components of such a system and the mechanisms proposed are
easily extended to a complete system. We consider each in turn. Monitoring. Carrubba’s model is essentially an infinitely repeated prisoner’s
dilemma,7 in which the players do not observe period-specific costs of cooperation paid by their opponents. In some periods, mutual
cooperation is efficient, whereas in other periods it is not (2005, 672). Carrubba considers an equilibrium in which the players wish to punish
non-cooperative behavior only when cooperation would have been mutually beneficial. The problem is that they do not observe the nature of a
defection perfectly; and, in the absence of this information, parties are forced to use punishment strategies that result in conflict. These
strategies successfully prevent opponents from violating agreements opportunistically but they ensure conflict when agreements are violated
for good reasons (i.e., when mutual cooperation would be inefficient). Carrubba argues that the
judiciary can serve as a monitor
of cooperative agreements and eliminate costly conflicts. It does so by offering strategic declarations on
the nature of alleged breaches, declaring a violation only when cooperation would have been mutually
beneficial. The implications of this kind of judging is that the parties are permitted to ignore their obligations when
mutual cooperation would be inefficient and incentivized to cooperate when it would be efficient.8 By so
doing, courts help manage cooperative agreements, agreements like the parties implicitly strike in
Przeworski’s model. There are two important caveats. To serve this informational function, judges must be returning decisions that are
not simply reflections of either party’s desire. Otherwise, the information revealed would not be credible. Second, judicial monitoring will not
induce mutual cooperation in all contexts. As in the Przeworski model, there are some contexts in which a set of cooperative strategies simply
cannot be sustained in equilibrium, regardless of the monitoring provided by a court (2005, 673–77). Coordination. Weingast reminds us that
monitoring alone cannot solve the leader’s commitment problem. Leaders must believe that they will be
punished for ignoring declarations about having violated a limit on power. To hold such beliefs, leaders must
perceive that people will mobilize to punish a violation and that this depends on the resolution of a
significant coordination problem. If individuals cannot coordinate, they will not be able to enforce limits on the state, the result of
which will be that democratic regimes will violate limits on their authority. Weingast suggests that constitutions can serve as focal
points, selecting equilibria in which individuals successfully mobilize to redress transgressions from among the set of possible solutions.
Although this kind of formal constitutional mechanism is plausible, Weingast’s argument applies to nonconstitutional limits on authority, as
well as to the entities that formally recognize violations, e.g., courts. This is to say that judicial
decisions finding a violation can
serve as a focal point for social coordination. Yet again, it is important to remember that this mechanism works only if rules or
the bodies that enforce them actually can create focal points. That is, they must work in practice. To have such an effect courts and other
enforcement bodies ought to be at least minimally independent of the parties they regulate. Without independence, it is unclear how they
would communicate credibly that a fundamental regime rule had been violated. This mechanism also will be limited by the underlying structure
of democratic compromises. If the conditions for compromise are not met, there will be no fundamental limits on state authority to enforce
and thus no losing party constituents to coordinate. In summary, systems
of institutions facilitate political order by helping
competing political coalitions enforce their own bargains. Specifically, they solve a leader’s commitment
problem in three ways: (1) by helping to identify violations, (2) by helping to sort out reasonable
violations from unreasonable violations, and (3) by helping to coordinate group actions in the event of
an unreasonable violation.
Legitimacy Advantage
Link/Solvency
Deference on the NSA destroys judicial independence and legitimacy
Buttar, 2013 (Shahid, executive director of the Bill of Rights defense Committee, “Dueling judicial
rulings on NSA spying, and why they don’t matter,” December 30, Bill of Rights Defense Committee,
http://www.bordc.org/blog/dueling-judicial-rulings-nsa-spying-and-why-they-dont-matter)
Two weeks ago, US District
Judge Richard Leon rightly described the NSA’s domestic spying operations as an
“indiscriminate and arbitrary invasion.” He ruled in favor of a preliminary injunction against the programs, and stayed his ruling
pending appeals that could go on for years. Last Friday, Judge William Pauley opined that the NSA’s program does not
violate the Fourth Amendment, prompting outrage among observers who understand either the NSA’s programs, or the role of
courts, better than Judge Pauley. His decision reflects a disturbing judicial deference to executive spin, and
undermines not only constitutional rights, but also judicial independence. Why Judge Pauley’s ruling is silly: what
congressional oversight? We've known for some time of executive officials of lying to Congress about the NSA's
domestic dragnet. Yet Judge Pauley’s deferential opinion states that the NSAs domestic spying programs have
been subjected to rigorous oversight by all three branches of government. That is simply and demonstrably false:
multiple members of Congress have publicly complained that they were kept in the dark, and even those few who were exposed to the
programs through their roles on oversight committees have posed tough questions, only to hear lies in response. Several members of Congress
have gone so far as to seek the prosecution of the Director of National Intelligence for deliberately misleading Congress about the scope,
extent, and scale of NSA spying —which, even after the litany of revelations this year, remain unknown to the public, press, and Congress.
Among the members of Congress seeking to curtail NSA powers are the original authors of the PATRIOT Act themselves, who claim that they
never intended their signature legislative achievement to be abused as it has been over the past decade. Yet Judge Pauley relied on
congressional approval of the programs. Why Judge Pauley’s ruling is silly: effectiveness? really? Judge Pauley also predicated his decision on
the supposed effectiveness of the NSA’s programs, which the president's own review board rejected a week before the judge released his
poorly reasoned opinion. Even to whatever extent the programs were proven effective -- which they have not been -- that issue would be well
outside the judicial scope of inquiry. The Fourth Amendment requires searches and seizures to be justified with a specific warrant. In this
context, the crucial jurisprudential question is whether or not NSA collection of telephony metadata counts as conducting a “search” or
“seizure.” Why Judge Pauley’s ruling is silly: what’s a search? In 1979 -- over 30 years ago, well before the rise of anything even remotely
resembling the Internet -- the Supreme Court held that capturing telephony metadata did not constitute a search when the government
pursued a specific target, for whom authorities had a basis for individual suspicion, in the context of a particular investigation. None of those
limiting principles apply to cases challenging the NSA's spying programs, yet judge Pauley -- like the NSA -- preposterously presents Smith v
Maryland as a basis for the legality of tapping the back end of the entire phone system and Internet. At the end of the day, there
could
not be a more wanton violation of the Fourth Amendment than the NSA's domestic dragnet. Judge Leon,
appointed by the president responsible for initiating the programs in the first place, understood that. Stepping back At stake, in addition
to the vitality of privacy, and the opportunity for dissent in America, is the independence — and legitimacy — of our
judiciary. Each of these ingredients are required for our democracy to be healthy. The fact that the NSA
continues to wage a decade-long assault on the American people using our own tax dollars is a clear sign
that it is not. The dueling judicial rulings are ultimately a distraction, however, as Congress is poised to take action much more quickly to
resolve the current controversy. Having said that, despite the mounting controversy and escalating momentum in
Congress for dramatic restrictions on NSA powers, whatever emerges from the current legislative process is likely to
remain inadequate, as most agencies involved in domestic spying have yet to draw any sustained public or congressional attention.
A/T Courts Not Perceived
Courts are internationally perceived
Feldman, 2008 (Noah, Law professor at Harvard University and adjunct senior fellow at the Council
on Foreign Relaitons, “When judges make foreign policy,” September 28, NYT,
http://www.nytimes.com/2008/09/28/magazine/28lawt.html?_r=3&oref=slogin&ref=magazine&pagewanted=print)
This problem has many dimensions. It includes mundane practical questions, like what force the United States should give to the law of the sea.
It includes more symbolic questions, like whether high-ranking American officials can be held accountable for crimes against international law.
And it includes questions of momentous consequence, like whether international law should be treated as law in the United States; what rights,
if any, noncitizens have to come before American courts or tribunals; whether the protections of the Geneva Conventions apply to people that
the U.S. government accuses of being terrorists; and whether the U.S. Supreme Court should consider the decisions of foreign or international
tribunals when it interprets the Constitution. In recent years, two prominent schools of thought have emerged to answer these questions. One
view, closely associated with the Bush administration, begins with the observation that law, in the age of modern liberal
democracy, derives its legitimacy from being enacted by elected representatives of the people. From this standpoint, the
Constitution is seen as facing inward, toward the Americans who made it, toward their rights and their security. For the most part, that is, the
rights the Constitution provides are for citizens and provided only within the borders of the country. By these lights, any interpretation
of the Constitution that restricts the nation’s security or sovereignty — for example, by extending constitutional rights to
noncitizens encountered on battlefields overseas — is misguided and even dangerous. In the words of the conservative legal scholars
Eric Posner and Jack Goldsmith (who is himself a former member of the Bush administration), the Constitution “was designed to create a more
perfect domestic order, and its foreign relations mechanisms were crafted to enhance U.S. welfare.” A competing view, championed
mostly by liberals, defines the rule of law differently: law is conceived
not as a quintessentially national phenomenon but
rather as a global ideal. The liberal position readily concedes that the Constitution specifies the law for the United
States but stresses that a fuller, more complete conception of law demands that American law be pictured
alongside international law and other (legitimate) national constitutions. The U.S. Constitution, on this cosmopolitan view, faces
outward. It is a paradigm of the rule of law: rights similar to those it confers on Americans should protect all people everywhere, so that no
one falls outside the reach of some legitimate legal order. What is most important about our Constitution, liberals stress, is not that it provides
The Supreme Court, whose new term begins Oct. 6, has become a
battleground for these two worldviews. In the last term, which ended in June, the justices gave expression to both visions.
In two cases in particular — one high-profile, the other largely overlooked — the justices divided into roughly two blocs,
representing the “inward” and “outward” looking conceptions of the Constitution, with Justice Anthony Kennedy voting
rights for us but that its vision of freedom ought to apply universally.
with liberals in one case and conservatives in the other. The Supreme Court is on the verge of several retirements; how the justices will address
This may seem like an odd way of thinking
about international affairs. In the coming presidential election, every voter understands that there is a choice to be
made between the foreign-policy visions of John McCain and Barack Obama. What is less obvious, but no less important,
is that Supreme Court appointments have become a de facto part of American foreign policy. The court , like the State
Department and the Pentagon, now makes decisions in cases that directly change and shape our relationship with the
world. And as the justices decide these cases, they are doing as much as anyone to shape America’s fortunes in an
age of global terror and economic turmoil.
critical issues of American foreign policy in the future hangs very much in the balance.
JI Solves Hege – A/T Counterbalancing
Multiple factors increase perceived legitimacy of US dominance, prevents
counterbalancing
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
Hegemonic orders take on hierarchical characteristics, with the preeminent power having denser
political ties with other nations than in a unipolar order.333 Stability in hegemonic orders is maintained in part
through security guarantees and trade relationships that result in economic specialization among
nations.334 For example, if Nation X’s security is supplied by Hegemon Y, Nation X can de-emphasize military power and focus on economic
power. In a hegemonic system, the preeminent state has “the power to shape the rules of international politics according to its own
interests.”335 The
hegemon, in return, provides public goods for the system as a whole.336 The hegemon
possesses not only superior command of military and economic resources but “soft” power, the ability
to guide other states’ preferences and interests.337 The durability and stability of hegemonic orders
depends on other states’ acceptance of the hegemon’s role. The hegemon’s leadership must be seen as
legitimate.338 The United States qualifies as a global hegemon. In many ways, the U.S. acts as a world government.339 It
provides public goods for the world, such as security guarantees, the protection of sea lanes, and support for open
markets.340 After World War II, the U.S. forged a system of military alliances and transnational economic and political institutions such as
the United Nations, NATO, the International Monetary Fund, and the World Bank that remain in place today. The U.S. provides security for
allies such as Germany and Japan, maintaining a strong military presence in Asia and Europe.341 Because
of its overwhelming
military might, the U.S. possesses what amounts to a “quasi-monopoly” on the use of force.342 This prevents other
nations from launching wars that would tend to be truly de-stabilizing. Similarly, the United States provides a public good through its efforts to
combat terrorism and confront—even through regime change—rogue states.343 The
United States also provides a public good
through its promulgation and enforcement of international norms. It exercises a dominant influence on the definition
of international law because it is the largest “consumer” of such law and the only nation capable of enforcing it on a global scale.344 The U.S.
“was the primary driver behind the establishment of the United Nations system and the development of contemporary treaties and
institutional regimes to effectuate those treaties in both public and private international law.”345 Moreover, controlling
international
norms are sometimes embodied in the U.S. Constitution and domestic law rather than in treaties or customary
international law. For example, whether terrorist threats will be countered effectively depends “in large part on
U.S. law regarding armed conflict, from rules that define the circumstances under which the President
can use force to those that define the proper treatment of enemy combatants.”346 These public goods
provided by the United States stabilize the system by legitimizing it and decreasing resistance to it. The
transnational political and economic institutions created by the United States provide other countries with informal access
to policymaking and tend to reduce resistance to American hegemony, encouraging others to “bandwagon”
with the U.S. rather than seek to create alternative centers of power.347 American hegemony also coincided with the rise
of globalization—the increasing integration and standardization of markets and cultures—which tends to stabilize the global system and reduce
conflict.348 The legitimacy
of American hegemony is strengthened and sustained by the democratic and
accessible nature of the U.S. government. The American constitutional separation of powers is an
international public good. The risk that it will hinder the ability of the U.S. to act swiftly, coherently or decisively in
foreign affairs is counter-balanced by the benefits it provides in permitting foreigners multiple points of
access to the government.349 Foreign nations and citizens lobby Congress and executive branch agencies in the State, Treasury,
Defense, and Commerce Departments, where foreign policy is made.350 They use the media to broadcast their point of view in an effort to
influence the opinion of decision-makers.351 Because the United States is a nation of immigrants, many American citizens have a specific
interest in the fates of particular countries and form “ethnic lobbies” for the purpose of affecting foreign policy.352 The
courts, too, are
accessible to foreign nations and non-citizens. The Alien Tort Statute is emerging as an important vehicle
for adjudicating tort claims among non-citizens in U.S. courts.353
JI Solves Hege
Judiciary key to international credibility – less arbitrary than the executive
Sullivan, 2008 (Scott M., Assistant Professor of Law, Emerging Scholars Program, The University of
Texas School of Law, “Rethinking Treaty Interpretation,” Texas Law Review, 86 Tex. L. Rev. 777, March)
c. Promoting Uniformity. - The judicial doctrine of stare decisis and judicial modesty typically lead to very few
contenders in legal interpretations. Court decisions, while ultimately vulnerable to changing judicial opinion, are structurally
and procedurally more enshrined than executive determinations that are easily discarded from administration to
administration or, in certain political circumstances, within an administration. n97 [*798] d. Legitimacy Enhancing. - As
demonstrated by the Bush Administration's interpretation of the requirements of the Geneva Conventions, a unilateral executive
interpretation of international obligations is often viewed as subjectively biased rather than objectively reached. In
contrast, the diverse, politically insulated federal Judiciary fares much better in world opinion polls. n98 Beyond basic
popularity, the perception of an independent, structural check on executive power in foreign affairs assists in creating an aura of legitimacy
surrounding the implementation of international law.
A/T Deference Key to Hege
Our link to hege outweighs their turn – strict offensive realism is false, means
legitimacy is the biggest internal link, only we access it
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
Why do foreign affairs demand that the executive branch enjoy unfettered discretion? The courts’ view of their own competence
has been shaped by America’s role in the world. There is a deep , if usually unarticulated, connection between the
assumed need for special deference and a popular theory of international relations known as realism. Realism depicts an
anarchic international realm, populated only by nation-states, and dominated by roughly co-equal great powers carefully balancing one
another.6 Executive competences are required to handle this dangerous and unstable external environment.7 This classic realist model of
comparative institutional competence seemed appropriate when America was one of several, or even two, great powers.
But even then, importing IR realism into constitutional foreign affairs doctrine was a recipe for chaos. Realpolitik
teaches that the state must do whatever is necessary to protect itself.8 But how can courts successfully balance this overriding
principle against other constitutional values such as the protection of liberty? Moreover, the post-Cold War world has provoked a
crisis in realism.9 The United States is a global hegemon. It is unrivaled in its ability to deploy force throughout the
globe, and it provides “public goods” for the world – such as the protection of sea lanes – in exchange for broad
acceptance of U.S. leadership.10 Although realism predicts counter-balancing, no great power or coalition has yet
emerged to challenge America’s predominance. And despite a new round of predictions about American decline,
the U.S. is still projected to have by far the largest economy and the largest military for decades to come .11 Political
scientists have struggled to define this American-led system, but courts and scholars of constitutional law have largely
ignored it.12 Instead, most debates about special deference have simply accepted outmoded classic realist assumptions that became
conventional wisdom in the 1930s and 40s. This Article offers a new model for assessing appropriate judicial deference in foreign affairs that
takes account of American hegemony. By
maintaining consistent interpretation of U.S. and international
law over time and providing virtual representation for other nations and non-citizens, U.S.
courts bestow legitimacy on the acts of the political branches, provide public goods for the
world, and increase America’s soft power – all of which assist in maintaining the stability
and legitimacy of the American-led hegemonic order.
A/T Executive Key
Turn—court interpretation increases executive legitimacy
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
Professors Posner and Sunstein
have argued for exceptional deference on the ground that, unless the executive is the voice
of the nation in foreign affairs, other nations will not know whom to hold accountable for foreign policy decisions.412 But the
Guantánamo litigation demonstrated that American hegemony has altered this classic assumption as well. The
transparent and accessible nature of the U.S. government made it possible for other nations to be informed about
the detainee policy and, conceivably, to have a role in changing it. The Kuwaiti government hired American attorneys
to represent their citizens held at Guantánamo.413 In the enemy combatant litigation, the government was forced
to better articulate its detainee policies, justify the detention of each detainee, and permit attorney visits with the
detainees.414 Other nations learned about the treatment of their citizens through the information obtained by attorneys.415
Their argument relies on false realist assumptions – credibility gained from the courts
outweighs hard power gained from the executive
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
The enemy combatant litigation also underscores the extent to which the classic realist assumptions about courts’ legitimacy in foreign affairs
have been turned on their head. In an anarchic world, legitimacy derives largely from brute force.
The courts have no
armies at their disposal and look weak when they issue decisions that cannot be enforced .440 But in a hegemonic
system, where governance depends on voluntary acquiescence, the courts have a greater role to play. Rather than
hobbling the exercise of foreign policy, the courts are a key form of “soft power .”441 As Justice Kennedy’s majority opinion
observed in Boumediene, courts can bestow external legitimacy on the acts of the political branches.442 Acts having a
basis in law are almost universally regarded as more legitimate than merely political acts . Most foreign policy experts
believe that the Bush Administration’s detention scheme “hurt America’s image and standing in the world.”443 The restoration of habeas
corpus in Boumediene may help begin to counter-act this loss of prestige.
A/T Executive Key to Speed
International relations doesn’t change fast enough for this to be relevant
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
Since Curtiss-Wright, speed has been recognized as an important executive branch characteristic. The executive branch can reach a uniform
interpretation of the law quickly, and the courts are, by comparison, quite slow.299 This is understandable in a world in which
subtly-shifting alliances determine the balance of power. And in the age of terrorism, speed remains a crucial component of
effective foreign policy. The ace card for defenders of special deference remains the national security emergency . How
can we possibly take the risk that the courts will hobble the President’s efforts to protect the United States in a time of crisis?300 It is
important to separate the very slender category of true emergencies from the vast category of foreign relations in
general. Ninety-nine percent of foreign affairs controversies do not involve the President sending troops abroad or
a threatened terrorist attack, and there is very little opportunity for courts to interfere with an executive response
to a crisis situation. Courts typically review the legality of presidential decisions years later.301 Most of the “enemy
combatants” detained at Guantánamo were captured within a few months of September 11, 2001 and arrived at Guantánamo in early
2002.302 The Supreme Court did not address the detainees’ constitutional right to habeas review until 2008.303
A/T Executive Key to Flexibility
Even if this is true, the loss of credibility and predictability from deference outweighs
any increased flexibility
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
The hegemonic model also reduces the need for executive branch flexibility, and the institutional competence
terrain shifts toward the courts. The stability of the current U.S.-led international system depends on the ability of
the U.S. to govern effectively. Effective governance depends on, among other things, predictability.421 G. John Ikenberry
analogizes America's hegemonic position to that of a “giant corporation” seeking foreign investors: “The rule of law and the
institutions of policy making in a democracy are the political equivalent of corporate transparency and
accountability.”422 Stable interpretation of the law bolsters the stability of the system because other nations will
know that they can rely on those interpretations and that there will be at least some degree of enforcement by the
United States. At the same time, the separation of powers serves the global-governance function by reducing the ability
of the executive branch to make “abrupt or aggressive moves toward other states .”423 The Bush Administration’s detainee
policy, for all of its virtues and faults, was an exceedingly aggressive departure from existing norms, and was therefore bound to generate
intense controversy. It was formulated quickly, by a small group of policy-makers and legal advisors without consulting Congress and over the
objections of even some within the executive branch.424 Although the Administration invoked the law of armed conflict to justify its detention
of enemy combatants, it did not seem to recognize limits imposed by that law.425 Most significantly, it designed the detention scheme around
interrogation rather than incapacitation and excluded the detainees from all legal protections of the Geneva Conventions.426 It declared all
detainees at Guantánamo to be “enemy combatants” without establishing a regularized process for making an individual determination for
each detainee.427 And when it established the military commissions, also without consulting Congress, the Administration denied defendants
important procedural protections.428 In an anarchic world characterized by great power conflict,
one could make the
argument that the executive branch requires maximum flexibility to defeat the enemy, who may not adhere to
international law. Indeed, the precedents relied on most heavily by the Administration in the enemy combatant
cases date from the 1930s and 1940s—a period when the international system was radically unstable, and the United
States was one of several great powers vying for advantage.429 But during that time, the executive branch faced much more
exogenous pressure from other great powers to comply with international law in the treatment of captured
enemies. If the United States strayed too far from established norms, it would risk retaliation upon its own soldiers
or other consequences from powerful rivals. Today, there are no such constraints: enemies such as al Qaeda are not great
powers and are not likely to obey international law anyway. Instead, the danger is that American rule-breaking will
set a pattern of rule-breaking for the world, leading to instability .430 America’s military predominance enables it to
set the rules of the game. When the U.S. breaks its own rules, it loses legitimacy.
A/T Deference Key to Hege
Deference not key to hege – Courts won’t be overly intrusive
Jonathan Turley, Prof of Law @ George Washington, George Washington Law Review, August 2002
(70 Geo. Wash. L. Rev. 649)
The judicial incompetence rationale is hardly compelling in an age of regulation in which courts routinely deal with
the most complex and comprehensive issues involving federal agencies. Courts often review actions taken by
agencies like the DOE and NASA despite their classified functions and specialized communities. More importantly,
there is objectively little reason for courts to be so self-critical and self-doubting when dealing with military
matters. There is a mystique of a warrior class that obscures the fact that the legal issues dealt with in military
courts are largely conventional criminal matters. If, as suggested in this article, military jurisdiction were reduced to core military
functions and violations, the excluded cases where the status of the defendant is merely incidental. Once again, there was an element of truth
in the danger of supplanting martial traditions and values with judicial edicts and analysis. This danger, however, was primarily limited to those
core areas of discipline and obedience, such as orders violations. This rationale breaks down rapidly as the subjects of individual cases move
further from the center of military concerns and into more conventional violations. As will be argued below, a significant reduction in the
military justice system can be made without touching on these core areas. n296
A/T Confuses Diplomats
Non-unique, confusion inevitable
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
A related argument, and a justification for the one-voice rationale, is that the United States will be “embarrassed” by
conflicting pronouncements from different branches of government. The risk of embarrassment plays a key role in the Curtiss-Wright
homily on superior executive competence, and has been frequently mentioned in foreign affairs political question decisions since Baker v.
Carr.280 The core of the embarrassment justification is, apparently, that U.S. diplomats will be undermined in their
delicate negotiations with other nations because court decisions that conflict with executive branch policy could baffle or even offend foreign
officials.281 But it is difficult to argue that foreign dignitaries will fail to understand how the branches of the U.S.
government can reach different interpretations of the law. America’s current structure of government has existed
for almost 230 years. In the past, “other nations [were] asked to understand our complex constitutional system of
checks and balances and we somehow managed to survive as a nation.”282
JI Good – Terrorism
Judicial independence key to solve terrorism – provides credibility to government
commitments
Findley and Young, 2011 (Michael G., Brigham Young University, and Joseph K., American University,
“Terorism, Democracy, and Credible commitments,” International Studies Quarterly, Vol. 55)
In the context of terrorism, we consider credible commitment problems that groups face in assessing
their future relations with the government (Fearon 1995; Lake and Rothchild 1998). Groups in all societies have policy
goals, some more extreme than others, along with a variety of possible strategies to achieve those goals. Groups with
extreme preferences are likely to opt for violence in pursuit of their goals more often than groups with
moderate preferences (Lake 2002), especially when their rights cannot be guaranteed. Groups pursuing extreme policy
changes face a strategic dilemma: it is possible that pressing extreme policy change will result in a violent response from the government.
Similar to bargaining theories of war, whether the
government of a state can provide a credible commitment not
to violate rights in the future, and to conduct its behavior through the formal political process, is a
salient concern for extremist groups seeking policy change. Whether the group’s policy preferences will
be considered might then be secondary to the group’s survival. Some political institutions can mitigate
credible commitment problems by binding governments to respect the formal political process and
allow diverse opportunities for groups to air their grievances, even when groups pursue extreme policy change. Put
otherwise, even in the presence of extremism within the population, institutions can help mitigate the desire to turn
to violence. Other institutions (or lack thereof) prevent governments from making this commitment to future restraint credible. When
the political institutions do not constrain a government from repressing groups with extreme demands in
the future, these same groups then have incentives to act outside of the formal political process. Political
institutions are an important part of an explanation of terrorism precisely because different institutions provide distinct strategic incentives for
groups to pursue policy change. Both
democracies and nondemocracies could have higher or lower levels of
terrorism depending on how well their institutional arrangements make government commitments
credible. We consider a specific institutional arrangement, whether a state has an independent judiciary, and hypothesize that
independent judiciaries make government commitments more credible, thereby providing less incentive
for groups to use terrorism. Without independent judiciaries, executives cannot credibly restrain
themselves from future violations of rights. Thus, groups seeking to make extreme demands through a
formal political process must assess whether the executive will resort to force. An independent judiciary
offers some assurances about future government behavior in this situation. We examine this credible
commitment hypothesis using a new data set of all domestic and transnational terrorist events in 149
countries from 1970 to 1997 (LaFree and Dugan 2007).2 The results indicate that independent judiciaries
decrease the likelihood of terrorism, offering support for the credible commitment hypothesis. We also find that variation in
terrorism exists both within and across regime type, although on average democracies have higher levels of terrorism than autocracies. In
addition to standard statistical tests and robustness checks, we use matching methods and demonstrate that our results are not dependent on
any one model specification (Rosenbaum and Rubin 1983; Ho, Imai, King, and Stuart 2007).
Best statistical evidence shows judicial independence solves terrorism
Findley and Young, 2011 (Michael G., Brigham Young University, and Joseph K., American University,
“Terorism, Democracy, and Credible commitments,” International Studies Quarterly, Vol. 55)
The results of our analysis indicate
that independent judiciaries have a pacifying effect on domestic terrorism,
even controlling for other factors. To be sure the results are not sensitive to certain measures or model specifications, we
conducted a series of additional robustness checks consisting of (i) including a lagged dependent variable in the model, (ii) adding the GTD’s
1993 marginal estimates, (iii) including the 1998–2004 data, (iv) employing different measures of domestic and transnational terrorism, (v)
including a lagged measure of state violence, (vi) estimating a zero-inflated negative binomial rather than the simple negative binomial, and (vii)
using matching methods to reduce dependence on model assumptions. We report the results of the additional analyses in an online web
appendix and briefly review the major findings here. Despite Brandt et al. (2000) and Brandt and Williams’s (2001) advice not to use a lagged
dependent variable, we
checked whether the independent judiciary result is sensitive to the inclusion of the
lagged measure of terrorism and find that the independent judiciary result is still statistically significant
at the 5% level, although the coefficient attenuates some. We then added the GTD’s marginal estimates for the lost
1993 data and also included the 1998–2004 data in our analyses to lengthen the time in our analysis. In
both cases, we find that the independent judiciary result remains negatively related to terrorism and is
statistically significant. When we operationalize domestic terrorism differently, the results are qualitatively almost identical. We
included a measure of transnational terrorism and found that the results are also similar to domestic
terrorism, suggesting that domestic and transnational terrorism may follow similar causal processes. We
follow up on this point both in the conclusion and in the appendix, as it is an especially important distinction for terrorism research. We added a
measure of state violence, furthermore, to address the possibility that calculated state repression reduces the levels of terrorism, and find that
the opposite occurs—the more state violence that occurs, the more frequently dissident terrorism occurs as well. Independent
judiciaries continue to be associated with less terrorism, even controlling for state violence. Rather than rely
solely on the negative binomial regression model, we estimated the results using a zero-inflated negative binomial and find that our baseline
results on independent judiciaries are robust to this change in estimator. Finally, to
ensure that our results are not dependent
upon the assumptions of any particular model, we pre-process our data using a variety of matching
procedures. After matching, we again estimate zero-inflated negative binomial and simple negative
binomial models and find that independent judiciaries remain associated with fewer terror events.
Conclusion Terrorism is a frequent and persistent form of political behavior in contexts as diverse as Colombia, the United
Kingdom, Russia, and Pakistan. We have argued that a common explanation underlies terrorist acts in democracies and
authoritarian regimes alike and have emphasized the importance of examining credible commitment
problems, an important class of strategic dilemmas (Lake and Rothchild 1998). We argued that certain institutional arrangements, especially
an independent judiciary, can help resolve strategic dilemmas between the state and violent opposition.
Namely, if an independent judiciary exists, extremists can be less concerned about a strong crackdown by
the government in the future. In contrast to many studies that use data on transnational terror to evaluate
arguments about state–opposition interactions, we use new data on terrorism throughout the world
from 1970 to 1997 that includes domestic events. To show that our results are robust and not
dependent on a particular model specification or assumptions embedded in the models, we estimate a
series of models using alternative measures of terrorism and credible commitments, different time
periods, and also employ matching methods to pre-process our data (Ho et al. 2007). The statistical analyses
all provide substantial and robust support for the hypotheses, leading us to conclude that strategic
dilemmas, such as commitment problems, are important determinants of terrorist behavior. Because we use the GTD
data, we are better able to support claims about the process of domestic terrorism. We did not find substantial differences, however, between
the effects of an independent judiciary on domestic and transnational terrorism. It is possible that domestic and transnational terrorism are, in
fact, fundamentally similar in this particular context. We would not expect domestic and transnational terrorism to follow similar causal
processes, however, because ‘‘[m]ost attacks are domestic and, more importantly, [transnational] attacks are not a representative sample of all
terrorist activity’’ (Sa´nchez-Cuenca and De la Calle 2009:37). We suspect that domestic and transnational terrorism are indeed different and
contend that the similar finding in our analysis is an artifact of the data and statistical tests. Transnational terrorism data and tests need to be
refined in order to accurately understand the relationship between domestic and transnational terrorism. Namely, like other recent
transnational terrorism studies, we used the standard country-year unit of analysis. Given that multiple nationalities are involved in
transnational terrorism, directed dyads may need to be used instead, especially if the target of the terrorist act is separate from the state
where the act occurred (Young and Findley 2010). In this case, information about institutions or other domestic factors in both states is
necessary to evaluate arguments concerning transnational terrorism. Future theoretical and empirical work should consider more directly
whether there exist differences between international and domestic terrorism. These differences may be applicable in varying contexts such as
different samples of states or in unique time periods. If future work finds that meaningful differences do not exist, the large literature on
transnational terrorism (for example, Sandler et al. 1983; Li 2005) may not need to set itself aside as a different area of study altogether. If
meaningful differences are found, then attention should be focused on understanding the conditions under which this is the case. Our
study
has implications for several research areas, such as the connection between democracy and terrorism (Li
2005) as well
as more general conflict processes. Rationalist explanations for war (e.g., Fearon 1995) suggest
that conflict is caused by commitment problems, information problems, and (possibly) issue indivisibilities.
Our findings suggest that, at least in the context of terrorism, issue indivisibilities may not be as salient for
conflict resolution. If creating institutions, such as independent judiciaries, mitigates conflict, then even
indivisible issues like territory can be dealt with. Most importantly, it suggests the need to understand better
how government commitments affect the propensity for terrorism as a strategy for change. Both
democracies and authoritarian regimes provide a diverse array of incentives for political participation,
and further research could be devoted to addressing which of these incentives contributes to credible commitments. Beyond looking at just
cross-national variation in terrorism activities, we suspect that a particularly fruitful area of research could address commitment problems at
local and regional levels within countries, such as those created by geographic and other local factors. Additionally, variation in party systems
and electoral systems within larger states like India (Piazza 2009) could help unpack some of these difficult issues. At the other end,
intergovernmental organizations or non-governmental organizations might also be able to contribute to
making commitments more credible, which could have the effect of decreasing terrorism throughout
the world.
Terror – A/T War on Terror Key
Even if the war on terror is good, rule of law is key to solve
Feldman, 2008 (Noah, Law professor at Harvard University and adjunct senior fellow at the Council
on Foreign Relaitons, “When judges make foreign policy,” September 28, NYT,
http://www.nytimes.com/2008/09/28/magazine/28lawt.html?_r=3&oref=slogin&ref=magazine&pagewanted=print)
So what do we need the Constitution to do for us now? The answer, I think, is that the Constitution must be read to help us
remember that while the war on terror continues, we are also still in the midst of a period of rapid globalization . An
enduring lesson of the Bush years is the extreme difficulty and cost of doing things by ourselves. We need to build and rebuild
alliances — and law has historically been one of our best tools for doing so. In our present precarious situation, it
would be a terrible mistake to abandon our historic position of leadership in the global spread of the rule of law.
Our leadership matters for reasons both universal and national. Seen from the perspective of the world, the
fragmentation of power after the cold war creates new dangers of disorder that need to be mitigated by the sense
of regularity and predictability that only the rule of law can provide. Terrorists need to be deterred. Failed states
need to be brought under the umbrella of international organizations so they can govern themselves. And
economic interdependence demands coordination, so that the collapse of one does not become the collapse of all .
Privacy Advantage
Tech Internal Link
Failure to curtail surveillance undermines technological leadership
Zetter, 2014 (Kim, award-winning, senior staff reporter at Wired covering cybercrime, privacy, and
security, “Personal privacy is only one of the costs of NSA surveillance,” Wired, July 29,
http://www.wired.com/2014/07/the-big-costs-of-nsa-surveillance-that-no-ones-talking-about/)
“Too often, we have discussed the National Security Agency’s surveillance programs through the distorting lens of a simplistic ‘security versus
privacy’ narrative,” said Danielle Kehl, policy analyst at the Open Technology Institute and primary author of the report. “But if you look closer,
the more accurate story is that in
the name of security, we’re trading away not only privacy, but also the U.S. tech
economy, internet openness, America’s foreign policy interests and cybersecurity.” Over the last year,
documents leaked by NSA whistleblower Edward Snowden, have disclosed numerous NSA spy operations that have
gone beyond what many considered acceptable surveillance activity. These included infecting the computers of network
administrators working for a Belgian telecom in order to undermine the company’s routers and siphon mobile traffic; working with companies
to install backdoors in their products or network infrastructure or to devise ways to undermine encryption; intercepting products that U.S.
companies send to customers overseas to install spy equipment in them before they reach customers. The Foundation’s report, released
today, outlines some of the collateral
damage of NSA surveillance in several areas, including: Economic losses to US
businesses due to lost sales and declining customer trust. The deterioration of internet security as a result
of the NSA stockpiling zero-day vulnerabilities, undermining encryption and installing backdoors in software and hardware
products. Undermining the government’s credibility and leadership on “internet freedom” and governance
issues such as censorship. Economic Costs to U.S. Business The economic costs of NSA surveillance can be difficult to gauge, given
that it can be hard to know when the erosion of a company’s business is due solely to anger over
government spying. Sometimes, there is little more than anecdotal evidence to go on. But when the German government,
for example, specifically cites NSA surveillance as the reason it canceled a lucrative network contract with
Verizon, there is little doubt that U.S. spying policies are having a negative impact on business. “[T]he ties
revealed between foreign intelligence agencies and firms in the wake of the U.S. National Security Agency (NSA) affair show that the German
government needs a very high level of security for its critical networks,” Germany’s Interior Ministry said in a statement over the canceled
contract. Could the German government simply be leveraging the surveillance revelations to get a better contract or to put the US on the
defensive in foreign policy negotiations? Sure. That may also be part of the agenda behind data localization proposals in Germany and
elsewhere that would force telecoms and internet service providers to route and store the data of their citizens locally, rather than let it pass
through the U.S. But, as the report points out, the
Germans have not been alone in making business decisions based
on NSA spying. Brazil reportedly scuttled a $4.5 billion fighter jet contract with Boeing and gave it to Saab
instead. Sources told Bloomberg News “[t]he NSA problem ruined it” for the US defense contractor. Governments aren’t
the only ones shunning US businesses. American firms in the cloud computing sector are feeling the pressure as
consumers and corporate clients reconsider using third-party storage companies in the U.S. for their
data. Companies like Dropbox and Amazon Web Services reportedly have lost business to overseas competitors like
Artmotion, a Swiss hosting provider. The CEO of the European firm reported that within a month after the first
revelations of NSA spying went public, his company’s business jumped 45 percent. Similarly, 25 percent of
respondents in a survey of 300 British and Canadian businesses earlier this year said they were moving their data outside the US as a result of
NSA spying. The Information Technology and Innovation Foundation has estimated that repercussions from the spying
could cost the
U.S. cloud computing industry some $22 to $35 billion over the next few years in lost business. Will the NSA spying revelations
have long-term effects? Or will customers return to U.S. companies once the news fades into the background? It’s hard to tell. But German
chancellor Angela Merkel
has suggested that Europe build a separate permanent internet to keep data local
and prevent it from traversing networks the NSA can more easily monitor. Germany also has instituted new data rules
that prohibit any company from obtaining a federal contract unless it can guarantee that it will protect data stored in Germany from foreign
authorities. These
kinds of policies and infrastructure changes tend to remain long after the circumstances
that spawned them have passed.
Third Party Doctrine Bad
Clapper is key to the Fourth amendment – limiting the scope of the third party
doctrine is key to restore it
Napolitano, 2014 (Andrew P., Senior Judicial Analyst, Fox News Channel, 1998 to present;
Distinguished Visiting Professor of Law, Brooklyn Law School, 2013 to present; Judge of the Superior
Court of New Jersey, 1987 to 1995, “A legal history of national security law and individual rights in the
United States,” NYU Journal of Law & Liberty, 8 NYU J.L. 7 Liberty 396)
In American Civil Liberties Union v. Clapper, Judge Pauley reached the opposite conclusion that Judge Leon did, relying on the third party
doctrine. The
Third Party Doctrine is an outdated rule in Fourth Amendment law which states that once a
piece of information or data is given to a third party, like a medical record or a business record including personal data, the
owner of that piece of information has no further legitimate privacy interest in that piece [*550] of information. n639
Consequently, Judge Pauly held that "the business records created by Verizon are not "Plaintiffs' call records.' Those records are created and
maintained by the telecommunications provider, not the ACLU. Under the Constitution, that distinction is critical because when a person
voluntarily conveys information to a third party, he forfeits his right to privacy in the information." n640 When the D.C. and Second Circuits
hear the inevitable appeals from these cases, they as well may split or rule against the government. A circuit split over so fundamental a
question cannot be ignored by the Supreme Court for long. In United States v. Jones, five justices filed concurring opinions to Justice Antonin
Scalia's approach of Fourth Amendment analysis. In light of the massive government intrusion into privacy as of late, Justice Sonia Sotomayor's
description of the privacy harms rings ever more true: This
approach is ill suited to the digital age, in which people
reveal a great deal of information about themselves to third parties in the course of carrying out
mundane tasks. People disclose the phone numbers that they dial or text to their cellular providers; the URLs that
they visit and the e-mail addresses with which they correspond to their Internet service providers; and the books, groceries, and
medications they purchase to online retailers... . I for one doubt that people would accept without complaint the
warrantless disclosure to the Government of a list of every Web site they had visited in the last week, or
month, or year. But whatever the societal expectations, they can attain constitutionally [*551] protected status only if
our Fourth Amendment jurisprudence ceases to treat secrecy as a prerequisite for privacy. n641 While Justice
Samuel Alito and the other more liberal justices on the court concurring separately, it is likely the Justices will at least grant certiorari and
evaluate the Third Party doctrine as part of their analysis, perhaps even reaching a compromise majority. 6. President Obama's NSA Reforms On
January 17, 2014, President Obama introduced a series of NSA spying privacy "reforms" his administration will work towards institutionalizing in
the future. These reforms can be succinctly described as too little, too late. The Electronic Frontier Foundation gave the Obama's reforms a
3.5/12 rating when "stacked up against 12 common sense fixes that should be a minimum for reforming NSA surveillance." n642 Obama's
reform promise to do the following: "end the bulk collection of domestic phone records "as it currently exists [pursuant to PATRIOT Act
Section 215]'" n643; abrogate the use of National Security Letters (gag order records demands) n644; lessening spying on foreigners n645;
[*552] and, reforming the FISA court while opposing the deplorable FISA Improvements Act. n646 As the Electronic Frontier Foundation points
out, this does
nothing to stop the NSA from continuously undermining internet security through breaking
encryption and security safeguards. n647 President Obama has not rejected the Third Party Doctrine, nor
"embraced meaningful transparency reform." n648 Information obtained can still be used against criminal
defendants without showing it to them. n649 And most importantly, the trove of data the government has
collected over the last decade isn't going to be destroyed, as it should be; instead, it may be transferred into someone
else's custody. In the grand scheme of things, these reforms are meaningless and maintain the hallmarks of a totalitarian government.
Conclusion Overall, the
historical record we have examined gives a less than satisfactory view of federal
regard for civil liberties when it comes to matters of national security. Rights to trial, free speech, privacy, to be
secure in one's home, to be free from indefinite detention, to fairness from the government, and many others have been sacrificed in the name
of "security;" often for the satisfaction of the majority rather than for an actual national security need. With respect to the three rights
specifically addressed in this article, the historical record demonstrates the need for serious and [*553] specific concerns if we are to be a free
people. The attacks on the Freedom of Speech, the "oldest" of these constitutional norms, began in 1798, became a nationwide and prominent
issue between World War I and the Cold War, and generally were corrected by the Warren Court. As to due process, the battle over the right to
a civilian trial is still ongoing, but generally has been expanded since the days of President Lincoln. This battle has also come front and center in
the Global War on Terror, with the judicial recognition of the due process rights of non-state actors engaged in combat against American
troops. The detention of enemy combatants at Gitmo and other military bases has brought the vitality of military jurisdiction and military
commissions to the forefront of jurisprudence in the cases of Hamdan and Padilla, tipping off a continuing disagreement between Congress,
and the President, and the Supreme Court. With
the right to privacy, however, the historical trend seems to be in the
opposite direction. Governmental assaults on privacy began a while ago with less discrete violations,
similar to President Adam's pinprick incursions on speech in the late 1790s, but eventually developed into a massive,
nationwide, pressing issue because of the extreme and shocking breadth of the government's massive
reach. It is probable that the current Supreme Court will arrive at a fundamental and necessary
reimagining of the Third Party Doctrine and the Fourth Amendment jurisprudence that permits the sort
of twisted executive reasoning described in this work. Justice Sotomayor, who has not shied away from finding
constitutional theories to uphold the constitutional excesses of Big Government, recently revealed an inclination to engage in recovering lost
privacy protections through this jurisprudence in United States v. Jones: More fundamentally, it may be necessary to reconsider the premise
that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the
digital age, in which [*554] people reveal a great deal of information about themselves to third parties in the course of carrying out mundane
tasks, [and moreover, the Court should] not assume that all information voluntarily disclosed to some member of the public for a limited
purpose is, for that reason alone, disentitled to Fourth Amendment protection. n650 And Justice Scalia
himself, who has argued for a
textualist reading of the Fourth Amendment - that is, it only protects persons, houses, papers, and effects - paused poignantly and
emitted a "gotcha" smile when asked recently in public if a computer chip in a cell phone or a desktop is
an "effect" under the Fourth Amendment. n651 Is the postman entitled to read your mail just because you gave him a letter to
deliver? Is Verizon entitled to listen to your telephone conversations and tell the feds what it heard just because you used its equipment to
conduct them? Can Google tell the feds all you have emailed just because you used Google's servers? Could the Fourth Amendment possibly
permit this? While
the court has shown a willingness to intervene and is poised to make substantial strides
in the area of privacy protections, there is still a significant chance the law could go the other way; yet
the law's reasonable expectation standard lets your neighbors sacrifice your freedom.
Clapper is key for the supreme court to reexamine the third party disclosure doctrine.
Third party doctrine eviscerates the constitutional protection of privacy
Geverd, 2015 (Timothy, Law clerk for the Honorable B. Avant Edenfield, United States District Court
for the Southern District of Georgia, “Bulk telephony metadata collection and the fourth amendment:
the case for revisiting the Third-party disclosure doctrine in the Digital age,” The John Marshall Journal
of Information Technology & Privacy Law, Winter, 31 J. Marshall J. Info. Tech. & Privacy L. 191,
http://repository.jmls.edu/cgi/viewcontent.cgi?article=1759&context=jitpl)
On June 5, 2013, Glenn Greenwald of The Guardian reported on leaked National Security Agency (“NSA”) documents revealing that the Agency
was “collecting the telephone records of millions of US customers. . . under a top secret order issued in April.”2 On June 9, 2013, The Guardian
released the identity of the source of the NSA leaks as Edward Snowden.3 Snowden, claiming that
the NSA surveillance
programs “pose[] „an existential threat to democracy,‟”4 leaked the top secret documents in order “„ . . .
to inform the public as to that which is done in their name and that which is done against them‟”—i.e.,
government use of dragnet surveillance to destroy “basic liberties.”5 Snowden recently appeared by videoconference at the South by
Southwest Conference in Austin, Texas.6 When asked if he would leak the details of the NSA surveillance programs again if given the chance,
Snowden responded, “„Absolutely yes,” and added “that he „took an oath to support and defend the Constitution and [he] saw the
Constitution . . . being violated on a massive scale.‟”7 However, it
is far from clear that the NSA‟s surveillance
programs do indeed violate the Constitution under current Fourth Amendment principles. Despite the
Fourth Amendment‟s guarantee that “[t]he right of the people to be secure in their persons, houses, papers,
and effects, against unreasonable searches and seizures, shall not be violated,”8 the United States Supreme
Court “consistently has held that a person has no legitimate expectation of privacy in information
voluntarily turned over to third parties.”9 Thus, information disclosed to third parties falls outside of the
protection of the Fourth Amendment. Under this third-party disclosure doctrine, the Court has held that the phone
numbers one dials are beyond the scope of Fourth Amendment protection.10 Similarly, lower federal courts have
applied the third-party disclosure doctrine to power records produced by utility companies,11 to records kept by Internet Service Providers
(“ISPs”), 12 and to credit card information.13 The
third-party disclosure doctrine thus clears the way for broad
surveillance programs like the ones Edward Snowden leaked, capturing the attention of the American people and
the world. Lack of constitutional protection for such information certainly is cause for alarm in today‟s digital
world. Simply put, “your privacy is not Fourth Amendment safe” in the digital age.14 For many years,
electronic surveillance has been beyond the reach of federal courts, because “[o]nce [information is]
disclosed, that is the end of the privacy inquiry, and the result is that privacy protection is lost” regardless of “the
circumstances surrounding that disclosure.”15 However, in the wake of the Edward Snowden leaks, federal courts will be
forced to consider the continued vitality of the third-party disclosure doctrine in today‟s technological
age. 16 Thus far, three United States District Courts have considered the legality of the NSA‟s bulk data
collection and have reached conflicting conclusions.17 Three United States Courts of Appeals have since heard oral
argument on the constitutionality of the bulk telephony collection program.18 This Article argues that federal courts should seize
the opportunity presented by the Snowden leaks to reexamine the continued vitality of the current
third-party disclosure doctrine in Fourth Amendment jurisprudence. Specifically, this Article argues that Smith v.
Maryland19 simply cannot continue to act as the “North Star” for judges navigating the “Fourth
Amendment waters” of the digital age,20 and that instead, Smith should apply more narrowly in the digital age. In so arguing, this Article
advocates that courts apply a modified, twostep test to evaluating third-party disclosures rather than applying the traditional binary rubric that
courts have drawn from Smith and United States v. Miller21—i.e., if information is disclosed, that information is unprotected. Thus, this Article
suggests that courts ask, first, what individuals reasonably expect the scope of their disclosure to be and, second, whether a particular
surveillance program is capable of revealing information beyond what those individuals reasonably expected to reveal. If the technology reveals
information beyond that which individuals reasonably expected to reveal, then the use of such technology implicates the Fourth Amendment.
ACLU v. Clapper Key
Supreme court action in Clapper is key to restore privacy protection
Brand, 2015 (Jeffrey S., Dean and Professor Emeritus and Chairman of the Center for Law and Global
Justice, University of San Francisco School of Law, “Eavesdropping on our founding fathers: how a return
to the republic’s core democratic values can help us resolve the surveillance crisis,” Harvard National
Security Journal, 6 Harv. Nat’l Sec. J. 1)
Most ominously, Section
215 of the Patriot Act expanded the power of the FBI to subpoena "tangible things" if
they were believed to be "relevant to an authorized investigation" into international terrorism or foreign intelligence
activities. n73 The amendment proved to be a bonanza for the Executive Branch when the FISA Court, in an
opinion that remains secret to this day, expanded the definition of "relevance" to include "an entire database of
records on millions of people." n74 The Wall Street Journal reported that, according to the FISA Review Court, "the special nature of
the national-security and terrorism-prevention cases means 'relevant' can have a broader meaning for those investigations." n75 In 1991, the
United States Supreme Court in United States v. R. Enterprises rejected such a broad definition of relevance in criminal cases because it
inevitably meant that records of innocent individuals would be included. n76 Ironically, it would be a Democrat, Senator Diane Feinstein (D-CA),
who would seek to explain and support the rationale for President George W. Bush's signature legislation: In today's world, things are not so
simple. In many cases surveillance will have two key goals--the gathering of foreign intelligence and the gathering of evidence for a criminal
prosecution. . . . Rather than forcing law enforcement to decide which purpose is primary . . . this bill strikes a new balance. It will now require
that a "significant" purpose of the investigation must be foreign intelligence gathering to proceed with surveillance under FISA. n77 [*20]
Post-9/11 history also included a willingness on the part of the Bush Administration to ignore FISA completely if it
believed national security so demanded--a tack it took with the institution of the 2002 Terrorist Surveillance Program
(TSP) that completely side-stepped FISA. The program was revealed by the New York Times in 2005, and the Bush Administration was forced
to admit that TSP violated existing surveillance statutes. n78 By 2008, the perfect storm roiled to a peak when, with
overwhelming bipartisan support, Congress passed the FISA Amendments Act (FAA), n79 which eliminated many of the
specificity requirements needed to obtain a warrant under the FISA regime in its initial incarnation. Moreover,
the FAA for the first time defined an "international wire communication" to include communications where an
"end point is in the United States," thereby subjecting U.S. citizens to its reach. n80 The amendment led the
Congressional Research Service to conclude that FISA now "provides a mechanism for the domestic acquisition without a court order, of
communications that persons in the United States, including citizens, would be a party to. Prior to the enactment of Section 702, such
acquisitions would require a court order in all but emergency situations." n81 [*21] Finally, in
2013, the FISA court received an
additional layer of insulation from review when the Supreme Court decided Clapper v. Amnesty
International. n82 In Clapper, the Court rejected an opportunity to rule on the constitutional merits of many
of the post-9/11 changes to FISA by holding that the plaintiffs lacked standing to bring the action. In a 5-4
opinion authored by Justice Alito, the Court held that plaintiffs' fear that they would be subject to surveillance in the future was "too
speculative" to establish standing. n83 Ultimately, new laws, amendments to FISA, secret rulings of the FISA court, and Clapper are partially
responsible for landing us where we are today--in a surveillance environment in which it is possible for the government to collect data on
essentially every phone call made in the United States. In fact, in light of all of these changes, it would be unfair to place all of the blame on the
drafters of the original FISA statute for the Act's inability to weather the 9/11 storm and the concurrent technology revolution. Nonetheless,
the reality is that even without the Patriot Act, the FAA, and Clapper, FISA was destined to implode
because of fundamental flaws in its structure. FISA may have been ambushed by subsequent events but
it is not blameless for its own demise. FISA may no longer be recognizable relative to its initial incarnation, but the seeds of its
destruction in its original structure surely are and they shed light on the lessons that FISA teaches for the future. It is to those flaws and those
lessons that we now turn. Time
is of the essence. After the Supreme Court's decision in Clapper, one commentator wrote: "Absent a
radical sea change from the courts, or more likely intervention from the Congress, the coffin is slamming shut on the
ability of private citizens and civil liberties groups to challenge government counterterrorism policies."
n84 That ominous prognosis punctuates the urgency of learning from the past if we are to halt the march
toward democracy's extinction, a march led by the very institutions that the Framers created to sustain
it.
Internet Internal Link
NSA surveillance gives countries an excuse to restrict data flows – damages the
internet’s viability
Giovanetti, 2013 (Tom, president of the Institute for Policy Innovation, “NSA Mass Surveillance
Harming the Free Flow of Data,” September 19, http://www.ipi.org/ipi_issues/detail/nsa-masssurveillance-harming-the-free-flow-of-data)
The American people have been outraged to find that their ordinary, uneventful communications and ecommerce transactions have been
collected, analyzed and stored for future access in a mass surveillance program by the National Security Agency (NSA). But beyond its
domestic political impact, the mass surveillance scandal may have far
reaching economic consequences that affect
the ability of American companies to compete internationally. The free movement of goods and people across borders has
long been an element of a free society that contributes to economic growth. Barriers to trade in goods and lawful migration of
citizens are rightly seen as creating unnecessary friction and harming economic freedom. But in our new global,
digital economy, the free flow of data across borders is equally important. The Internet we have today and
the Internet we want in the future depends on the free, unhindered flow of data across national borders.
Various countries have long wanted to control digital traffic. Some despotic regimes want to have total control
over Internet traffic for obvious reasons, but many other countries see data flows as resources to
harness for domestic development purposes. India and Brazil, among others, have advocated “forced
localization” policies that would compel data companies to: Build in-country data storage facilities so they are subject to countryspecific regulation and taxation; Share software code and other sensitive design elements with in-country government and industrial players;
and Be subject to involuntary technology transfer requirements. This is why cross-border data flow protection has been a key element in recent
trade agreements like the Trans Pacific Partnership (TPP) and the emerging Transatlantic Trade and Investment Partnership (TTIP) agreement
with the EU. Tragically, the NSA
mass surveillance scandal has provided these countries with the excuse they
needed to move toward more control, regulation and forced localization of data. This week Dilma Rousseff, the
president of Brazil, announced a series of measures aimed at insulating Brazil’s data flows from the United
States.
Tech Competitiveness Internal Link
NSA surveillance undermines tech competitiveness – companies can’t deal with
international overregulation
Kosner, 2013 (Anthony Wing, “All major tech companies say NSA actions put public trust in internet at
risk,” Forbes, December 9, http://www.forbes.com/sites/anthonykosner/2013/12/09/all-major-techcompanies-say-nsa-actions-puts-public-trust-in-internet-at-risk/)
America’s biggest tech
companies have gone from begging congress for surveillance reform, as Kashmir Hill
reported here at the end of October, to taking their case to President Obama and members of Congress directly in
an open letter published today. At risk is the public’s trust in the internet itself and all of the economic and
cultural benefits it contains. The letter, signed by AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter and Yahoo, urges the
U.S. to “take the lead and make reforms that ensure that government surveillance efforts are clearly restricted by law, proportionate to the
risks, transparent and subject to independent oversight.” Microsoft’s general counsel, Brad Smith, released a statement asserting that, “People
won’t use technology they don’t trust. Governments have put this trust at risk, and governments need to help restore it.” This is a striking
development given the varying degree to which these same companies have cooperated and/or collaborated with the NSA’s data collection
efforts. Clearly the balance has tipped and America’s tech companies now feel emboldened to call for sweeping reforms even as the
Democratic chair of the Senate Intelligence Committee, Dianne Feinstein of California, is sponsoring a bill maintain the security agencies’ right
to continue to collect bulk data. The Big-8, with a combined valuation of $1.4 trillion, are trying to convince their billions of users worldwide
that they can still trust American tech companies. “For our part,” the open letter reads, “we are focused on keeping user’s data secure —
deploying the latest encryption technology to prevent unauthorized surveillance on our networks and by pushing back on government requests
to ensure that they are legal and reasonable in scope.” Google, Twitter, Yahoo and Microsoft have all beefed up their internal encryption
systems. ”The security of users’ data is critical,” says Google CEO Larry Page, “which is why we’ve invested so much in encryption and fight for
transparency around government requests for information.” This
may all sound political, but as with most things coming out of
Silicon Valley (and Redmond), it is primarily economically motivated. America’s leadership role in consumerfacing internet technology is clearly at risk, as are the benefits of true global connectivity for businesses
and individuals. As governments around the world have expressed their displeasure with the Snowden revelations, a thicket of
international regulation threatens to choke the global growth of the Internet giants. The Guardian explains that
“The eight technology companies also hint at new fears, particularly that competing national responses to the
Snowden revelations will not only damage their commercial interests but also lead to a balkanisation of
the web as governments try to prevent internet companies from escaping overseas.” The Guardian’s role,
particularly, in providing journalistic support for Snowden’s leaked material (more of which is still to come) has made it hard for American tech
companies to deny the extent to which their own infrastructure has been compromised and repurposed for the cause of state surveillance.
These companies
have a mixed track record in terms of their relationship with the NSA, but most have
expressed outright anger (and in some case expletives!) as these revelations have rolled out about the degree of
their infiltration.
CP 2ACs
Notes
The 2AC blocks are the bare minimum that you need in the 2AC – depending on the specific 1NC you
may want to pull cards from the advantage sections of the file into the blocks.
2AC Congress CP
1. Perm – Do both
2. No solvency – a. Courts are key to legitimacy because they are perceived as rulebased institutions – this convinces potential terrorists and rival nations that the US
won’t act arbitrarily and prevents counterbalancing; b. Key to democratic modeling –
Flaherty evidence says that courts are engaged in international dialogue and
supporting independence is the only way to place institutional checks on executive
power; c. courts are key to democratic sustainability – electoral and representative
democracies are natural unstable and tend toward war-making – courts are the only
way to solve democratic peace; d. judicial precedent key to spillover to solve other
privacy rights – fourth amendment protection is key to the internet and tech
advantage.
Current precedent grants undue deference to the executive; only the plan can reverse
this trend
Hall, 2014 (Jame, former political operative having worked on multiple campaigns, currently journalist
for the sleuth journal, “The fourth amendment, NSA and metadata,” Sleuth Journal, June 13,
https://www.thesleuthjournal.com/fourth-amendment-nsa-metadata/)
Since the post World War II era, the radical shift from the remnants of the former Republic, into a global authority, where the meaning of
the law has no correlation to the intent of original constitutional conviction, is undeniable. What was enemy signals interception became
complete domestic scrutiny and monitoring. Lost for all practical legal purposes was
The Central Meaning of the Fourth
Amendment. Tracey Maclin provides a historic account and judicial context on how the constitution was perverted. “The Court’s
rational basis model essentially asks whether the police have acted irrationally while intruding upon the
Fourth Amendment rights of individuals. The Court’s model rarely requires warrants authorizing searches,
disfavors vigorous judicial oversight of police searches, and prefers deference to police procedures as the mode
of constitutional decision-making. Most importantly, a rational basis model severely diminishes our rights under
the Fourth Amendment. As the private container cases demonstrate, a rational basis model does not subject police
searches to vigorous judicial check. In many instances, the police are free to undertake unsupervised
and suspicionless searches, even when less intrusive means are available to serve the state’s interests. In other contexts, warrantless
searches are permitted when the only justification for such a search is police convenience. In the end, the Court finds that all of these searches
are reasonable because they rationally serve legitimate state interests. This
degree of deference to police searches is at
odds with the central purpose of the Fourth Amendment, which is distrust of discretionary police power. The Fourth
Amendment was not inserted in the Bill of Rights so that judges could meekly defer to government intrusions of privacy; rather, the
amendment was designed to control such intrusions.” The
NSA purports that national security not only encompasses
data mining on all citizens, but also allows for effective total immunity from oversight and accountability.
This mindset expands the ordinary boundaries of maintaining the peace into a tyrannical police state. The
commitment to Open Government and Transparency is as believable as the fairy tale that anyone can become President. Abdication of
judicial responsibility is so blatant that the century old decision by Justice William R. Day, Weeks v. United States (1914), U.S.
Supreme Court, has no substantive application when the NSA deems that its ECHELON monitoring systems
require that a PRISM be kept on everyone person. Also, watch the video, One Year Of Leaks That Turned Surveillance
Conspiracy Theory to FACT! “The point of the Fourth Amendment which often is not grasped by zealous officers is not that it
denies law enforcement the support of the usual inferences which reasonable men draw from evidence.
Its protection consists in requiring that those inferences be drawn by a neutral and detached magistrate,
instead of being judged by the officer engaged in the often competitive enterprise of ferreting out crime.
Any assumption that evidence sufficient to support a magistrate’s disinterested determination to issue a search warrant will justify the officers
in making a search without a warrant would reduce the Amendment to a nullity, and leave the people’s homes secure only in the discretion of
police officers. Crime, even in the privacy of one’s own quarters, is, of course, of grave concern to society, and the law allows such crime to be
reached on proper showing. The right of officers to thrust themselves into a home is also a grave concern, not only to the individual, but to a
society which chooses to dwell in reasonable security and freedom from surveillance. When the right of privacy must reasonably yield to the
right of search is, as a rule, to be decided by a judicial officer, not by a policeman or government enforcement agent. There are exceptional
circumstances in which, on balancing the need for effective law enforcement against the right of privacy, it may be contended that a
magistrate’s warrant for search may be dispensed with. But this is not such a case. No reason is offered for not obtaining a search warrant
except the inconvenience to the officers and some slight delay necessary to prepare papers and present the evidence to a magistrate. These are
never very convincing reasons and, in these circumstances, certainly are not enough to bypass the constitutional requirement. No suspect was
fleeing or likely to take flight. The search was of permanent premises, not of a movable vehicle. No evidence or contraband was threatened
with removal or destruction, except perhaps the fumes which we suppose in time will disappear. But they were not capable at any time of
being reduced to possession for presentation to court. The evidence of their existence before the search was adequate and the testimony of
the officers to that effect would not perish from the delay of getting a warrant. If the officers in this case were excused from the constitutional
duty of presenting their evidence to a magistrate, it is difficult to think of a case in which it should be required.” The
cyber
environment of digital existence does not void the need for probable cause. However, the NSA does not
observe such constitutional needs when the personal computer is the depository of your private papers.
Other than advancements in technological communications and archiving, the precedent of the “exclusionary rule”, established in this case, is
the ubiquitous causality from NSA collection that vacuums up every byte of data, using the presumption that everyone is a criminal. Even if not
charged for an offense at this time, the information awaits future prosecutorial discretion. So, when
in the case Klayman v. Obama, “On
December 16, Richard J. Leon of the Federal District Court for the District of Columbia ruled that the metadata collection
program violates the Fourth Amendment”, hopes were high that at least one federal judge had the
courage to uphold the constitution. Metadata and the Fourth Amendment then cites that soon
thereafter, the weight and magnate of the intelligence snooping force felt the usual letdown, when
American Civil Liberties Union v. Clapper was decided. “On December 27, Judge William H. Pauley III came to the opposite conclusion.
Contrary to Judge Leon’s belief that the metadata program has not been effective, Judge Pauley argued that the program could potentially have
stopped the 9/11 attacks. However, the
crux of his determination was that the Smith precedent applies and that
no Fourth Amendment claim can be made out for Americans have no reasonable expectation of privacy
regarding the metadata related to their phone calls.” Note the bizarre endorsement of this absurdly twisted legal logic that
conveniently destroys the intentional importance of preserving essential privacy that corrupt courts want to make conditional. “Among the
requirements for a successful Fourth Amendment claim is establishing that a reasonable expectation of privacy was violated. On this point, the
most relevant precedent to the metadata cases is 1979’s Smith v. Maryland, in which the U.S. Supreme Court held that individuals have no
reasonable expectation of privacy regarding the telephone numbers they call, for that information is freely provided to telephone companies
and it is generally known that telephone companies keep this information in their records.” Abolishing
the expectation of privacy
is not subject to the redefining of what are reasonable restrictions that the government places upon its
agencies. The reason why the NSA is so dangerous stems from the total lack of observing that the spying
on ordinary citizens is a profound repudiation of basic and inalienable rights of each individual. Such
systematic and surreptitious gathering also has No Fourth Amendment right in metadata embedded in posted
photo, so say the U.S. Court of Appeals for the Fifth Circuit. Before long, this parade of government
inspection and retention will subject even the hermit and the deliberate recluse to a profile third
degree. It is a never-ending process until snatching your individual identity is the ultimate outcome.
Congressional involvement doesn’t solve constitutional rights – multiple structural
incentives
Huq, 2012 (Aziz Z., Assistant professor of Law at the University of Chicago Law School, “Structural
constitutionalism as counterterrorism,” California Law Review, August, 100 Calif. L. Rev. 887)
Second, legislators may
be more skeptical about pro-liberty than about pro-security proposals. Error costs
on the liberty margin involve harms to discrete, potentially scattered individuals. Errors on the security side
are more likely to be widespread, affecting many people and imposing a high political cost. Pro-liberty innovation thus
has a greater downside risk at the polls than pro-security innovation. As a result, pro-liberty legislative action is less
likely than new pro-security law. A parallel dynamic has played out in the politics of crime control. Elected officials worry about
relaxing crime controls and being blamed for high-profile crimes (which affect many electors) more than they [*922] worry about erroneous
convictions (which affect few, if any, electors). n182 Consider the impact of the 1988 "Willie Horton" ad run against candidate Michael Dukakis,
which implied that the Massachusetts governor's decisions had resulted in 268 first-degree murders. n183 Although the actual number was
zero, the ad "substantially raised the public's anxiety about Dukakis." n184 Third, the
combination of such legislative risk along
with the executive's attitudes to risk may dramatically cabin the domain of feasible coordinated bilateral
action by the political branches. Some analysts have argued that presidents attempt to "reduce ... political risk by
seeking and obtaining the approval of another government branch." n185 By allying with Congress, the
President signals that a given proposal is not the product of idiosyncratic preferences or interest-group capture.
n186 Sharing praise as well as blame, presidents dilute both upside and downside risk. As a consequence, they are more willing to engage in
risky policies with congressional support. But
Congress seeks to avoid proposals with large downside risk. Precisely
when the President wants congressional involvement because a proposal is risky, legislators will be slow
to act. As a result, counterterrorism policies with some perceived downside risk are not enacted even if they are
on balance beneficial. Fourth, when legislators do act, they tend to avoid resolving hard questions. In a political
system with "many veto players separated by large ideological distance ... legislation can only be
incremental." n187 Multiparty bargaining delimits the possible policy space for solutions. As the complexity,
[*923] difficulty, and enactment costs of legislative specificity rise, legislators will tend more and more to delegate decisions rather than to
resolve hard questions themselves. n188 Terrorism
is a subject matter that is especially prone to legislative
delegation because it often entails hard trade-offs. Post-9/11 legislation generally leaves large discretion in executive hands.
For example, when fashioning substitutes for habeas corpus, Congress left open both substantive and
procedural rules. n189 While pressing for military commissions in 2006 and 2009, Congress also left to the executive
branch the discretion to decide in which cases to use such tribunals. The 2008 tinkering with the Foreign
Intelligence Surveillance Act also left considerable discretion in executive hands about how surveillance resources would be
deployed. n190 Finally, it is worth underscoring that Congress's involvement does not mean that eventual policy will
be more sensitive to values such as individual constitutional rights, despite Justice Souter's argument to that effect. n191
At the time that the Court happens to dispose of a case, there is no ex ante reason that subsequent legislative involvement
will necessarily moderate executive decisions in ways that favor constitutional rights. Policy outcomes in a vetogate system depend on the relative positions of Congress and the executive. n192 If the Supreme Court rejects a liberty-invading innovation by
the executive, the ensuing statutory response will be less invasive of liberty only if Congress is more libertarian than the executive and the
courts at the specific time that legislators are called on to act. If the executive is more libertarian than Congress at that instant, by contrast,
judicial resetting of the policy framework may well end up producing a less libertarian outcome because it allows Congress to reset policy. Yet
there is no ex ante reason to predict that Congress will always be more libertarian than the executive in this
fashion. The relative preferences of Congress and the executive depend on the outcomes of recent
elections. The "cooling" function Justice Souter predicted is thus a contingent function of transient politics.
n193 [*924] In other words, legislative action on terrorism is unlikely to be timely and cannot be assumed to
have a dampening effect on executive ardor. It is instead likely to respond erratically to exogenous
pressures and to punt hard questions; often, it will be simply unwise. This is hardly the model of Madisonian
deliberation assumed by the Separation of Powers.
2AC Clear Statement CP
Perm – do both
Perm – do the counterplan. The CP still declares a violation of the fourth amendment;
it adds additional reasoning to the plan
No solvency – the CP still puts congress in control because it can declare its intent to
override the fourth amendment. Potential for override means there’s no lasting
precedent and no signal of judicial independence
Clear statement rules don’t solve – they reduce constitutional rules to arbitrary values
Manning, 2010 (John F., Bruce Bromley Professor of Law, Harvard Law School, “Clear statement rules
and the constitution,” Columbia Law Review, Vol. 100, No. 2,
http://www.law.uchicago.edu/files/files/manning_clearstatement.pdf)
This Essay argues that if
the legitimacy of constitutionally inspired clear statement rules depends on the
plausibility of tracing them meaningfully to the Constitution, that burden cannot be met. Such rules seek to
enforce constitutional values in the abstract, standing apart from the constitutional provisions from
which they are derived. Indeed, the defining feature of constitutionally inspired clear statement rules is that even when a given
interpretation of a statute would not violate the constitutional provision(s) from which the triggering value emanates, that interpretation might
still be said to collide with the background value itself. But constitutional
values do not, I argue, exist in the abstract.
Values such as federalism, nonretroactivity, and the rule of law, do not exist in freestanding form. Rather, like all constitutional values, they
find concrete expression in many discrete constitutional provisions, which prescribe the means of
implementing the value in question. For example, the Ex Post Facto Clause embodies the value of nonretroactivity but it does so
by proscribing the enactment of retroactive criminal penalties.20 Abstracting from that specific proscription to a background
value of nonretroactivity, as the Court’s cases do,21 makes nonsense of a constitutionmaking process that determined in
what ways and to what degree to proscribe retroactive government conduct. Constitutional penumbras, then, are problematic
not because they “expand” the document’s reach, but rather because one cannot meaningfully speak of
a constitutional value without reference to the constitutionmakers’ decisions about how to put that
value into effect.22 The intuition behind this point is most easily felt from a textualist perspective. Textualism rests centrally upon the
idea that all enacted texts, including the Constitution, entail compromise, which inevitably involves difference-splitting decisions about how far
and in what ways to carry a value into effect.23 Accordingly, enforcing
an abstract “value,” shorn from the implementing
provisions that define its scope and limits, risks upsetting whatever compromise produced the text. But
the concern about enforcing “values” in the abstract, I submit, holds even if one believes, as many do, that
constitutional doctrine generally does and should unfold through common law elaboration (viz. through
judge-made doctrine whose details cannot be traced directly to the constitutional text).24 Even given such an understanding, received
constitutional doctrine prescribes means—often, quite elaborate means— of protecting the values at stake. Indeed, many such frameworks
expressly call upon courts to consider competing values through some specified filter. Within such a doctrinal framework, clear statement rules
tend to slight some values relative to others. Put another way, by
focusing on one dimension of often complex doctrinal
frameworks, clear statement rules do not supplement, but rather risk contradicting, the premises of the
Supreme Court’s common law exegesis of the Constitution’s meaning.
No solvency and no net benefit – clear statement rules increase intrusion on congress
and lead to arbitrary doctrines
Manning, 2010 (John F., Bruce Bromley Professor of Law, Harvard Law School, “Clear statement rules
and the constitution,” Columbia Law Review, Vol. 100, No. 2,
http://www.law.uchicago.edu/files/files/manning_clearstatement.pdf)
Critics of clear
statement rules have posed three major objections to their use. First, they argue that the practice does not
mitigate the countermajoritarian dilemma. Frederick Schauer, for example, argues that, under the canon’s influence, “the
Court frequently interprets a statute in ways that its drafters did not anticipate, and, constitutional questions
aside, in ways that its drafters may not have preferred.”101 If so, he adds, “it is by no means clear that a strained
interpretation of a federal statute that avoids a constitutional question is any less a judicial intrusion
than the judicial invalidation on constitutional grounds of a less strained interpretation of the same
statute.”102 Second, even if one assumes that aggressive construction is somewhat less intrusive than invalidation, the application of
clear statement rules—which of course require no finding of unconstitutionality—may nonetheless accentuate the
countermajoritarian difficulty by multiplying the occasions upon which courts act in the teeth of
apparent legislative preferences. In this vein, Judge Posner writes that the canon of avoidance “enlarge[s] the
already vast reach of constitutional prohibition beyond even the most extravagant modern
interpretation of the Constitution—to create a judge-made constitutional ‘penumbra.’”103 Similarly, Professors
Eskridge and Frickey have suggested that because clear statement rules purport only to guide statutory interpretation, the Court’s reliance on
such rules may actually “provide [it] with a cover for a great deal more countermajoritarain activism,
overall, than would open invalidation through judicial review.”104 Third, with respect to subject-specific clear statement
rules,105 critics suggest that judges may be willful in picking and choosing which constitutional values to
emphasize. In particular, some have complained that the clear statement rules developed since the advent of the
Rehnquist Court have tended to favor states’ rights, executive power, and economic interests.106 Or, cast
more generally, the critics contend that “[t]he precise way in which a Court deploys substantive canons of statutory
construction reflects an underlying ‘ideology,’ or mix of values and strategies that the Court brings to
statutory interpretation.”107 They are not, in any sense, “policy neutral.”108
Fourth Amendment Ruling Key
Only a constitutional ruling on the NSA solves our advantages
Blum, 2015 (Bill, former judge and death penalty defense attorney, “Why the ACLU’s big victory
against NSA surveillance falls short,” truthdig, May 12,
http://www.truthdig.com/report/item/why_the_aclus_big_victory_against_nsa_surveillance_falls_short
_20150512)
I don’t like to be a wet blanket, but at the risk of mixing metaphors, I’m
going to throw some cold water on the decision last
week in American Civil Liberties Union v. Clapper, which held that the National Security Agency’s vast telephone metadata collection
program is illegal. While the
ruling by the 2nd Circuit Court of Appeals is a clear advance for civil liberties—and the ACLU legal team that
engineered it has every right to be proud—the advance, in fact, is modest and incremental. To understand why I’m less enthused than
some others, let’s deconstruct what the decision actually said as well as what it didn’t say. The ACLU, in concert with its New York affiliate—the
New York Civil Liberties Union—filed the case to have the NSA’s mammoth and indiscriminate surveillance sweeps conducted under Section
215 of the Patriot Act declared unconstitutional. They also sued to have the sweeps invalidated under the terms of the statute itself for
exceeding the scope of the statute, and they sought an injunction to stop the sweeps. They succeeded only with their statutory claim. The
unanimous 97-page opinion was penned by Judge Gerard Lynch—and joined by Judges Robert Sack and Vernon Broderick with a
separate 13-page concurrence by Sack. Both Lynch and Sack are circuit court members, but Broderick is a district court judge designated to sit
on the panel. (Appellate courts do this to give lower-court judges experience and to relieve staffing shortages.) All three were appointed to the
bench by former President Bill Clinton. But then, so was William H. Pauley III, the U.S. District Court judge for the Southern District of New York
whose earlier pro-government order dismissing the case was under appeal. Lynch’s opinion is
a model of clarity but also of
caution. He begins with a historical overview that takes us back to the bad old days of the early 1970s, when the intelligence agencies of the
Nixon era were running roughshod over civil liberties. The Nixonian abuses begat the hearings of the famed select committee on intelligence
headed by Sen. Frank Church that resulted in passage of the Foreign Intelligence Surveillance Act (FISA) of 1978 and the creation of the Foreign
Intelligence Surveillance Court (FISC) that were designed to curb the abuses. Lynch’s narrative then fast-forwards through the attacks of 9/11
and the enactment of the Patriot Act in 2001. Section 215 of that legislation, together with subsequent revisions and congressional
reauthorizations, amended FISA (as codified in 50 United States Code § 1861) to create the Frankenstein monster that is the NSA’s present
telephone metadata program. As Lynch
notes, Section 215 allows the FBI—on behalf of the NSA—to “make an
application [to the FISC] for an order requiring the production of any tangible things (including books, records,
papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a
United States person [meaning, basically, a citizen or lawful resident] or to protect against international terrorism or clandestine activities.” The
section requires such applications to include “a statement of facts” showing that there are “reasonable grounds to believe the tangible things
sought are relevant to an authorized investigation … to obtain foreign intelligence information. …” Astonishingly, the
government has
interpreted this language to mean that it can force telecom companies on an ongoing and easily
renewable basis to turn over digital records of virtually every phone call made in the country. Such records
reveal not only the length of each call but the number on each end of the call and sometimes the location of the callers. And far from acting as
a gatekeeper winnowing out frivolous surveillance requests, the FISC—which convenes in secret and whose members are appointed by the
Chief Justice of the Supreme Court—has performed as a rubber stamp, approving surveillance applications at a rate exceeding 99 percent. With
this framework in place, the NSA has amassed a trove of metadata that it stores for rolling five-year periods, which it can access at any time
with specific and detailed searches aimed at individual phone numbers. The key to understanding Lynch’s rejection of the government’s
interpretation are the words “relevant” and “authorized investigation” as used in Section 215. Lynch’s discussion of the terms is masterful, but
before parsing them, he first had to rebuff two preliminary objections by the Department of Justice—following a long-established litigation
script—that the case should be dismissed to avoid an embarrassing ruling on the merits. First, Lynch held that the ACLU plaintiffs, as phone
subscribers, had sustained the necessary legal injury to establish standing to sue. Second, he determined that the NSA’s practices may be
examined in courts of general jurisdiction rather than solely by the FISC. As a result, he found the ACLU’s lawsuit was not blocked or precluded
by any need to maintain state secrecy. Dispensing with the preliminaries, Lynch, to put it tenderly, proceeded to tear the government a
proverbial new one, writing: “The records sought are all-encompassing; the government does not even suggest that all of the records sought, or
even necessarily any of them, are relevant to any specific defined inquiry.” Exposing the absurdity of the government’s position, he continued:
“[T]he government effectively argues that there is only one enormous ‘anti-terrorism investigation’’ and that any records that might ever be of
use in developing any aspect of that investigation are relevant to the overall counterterrorism effort.” Lynch
concluded that “such
an expansive concept of ‘relevance’ is unprecedented and unwarranted.” He found, too, that Congress
never intended to endorse such an astounding reading. From there, however, the decision largely fell apart, as
Lynch not only refused to rule on the constitutionality of the NSA’s implementation of Section 215 but also
declined to order the government to stop its bulk metadata collection program. Instead, he wound up kicking the case back to Pauley on the
District Court for further consideration, and inviting Congress to weigh in on whether to redraft and revamp the metadata program before
Section 215 is due to expire on June 1. To be fair to Lynch, judges often decline to make constitutional rulings when they can dispose of cases
on lesser statutory grounds. Sometimes, however, judges are compelled to issue rulings on both statutory and constitutional bases, depending
on the urgency of the matters before them or as a safeguard in the event that their statutory analyses are later found wanting by a higher
court. The ACLU’s case plainly was sufficiently urgent to necessitate constitutional adjudication. To be fair
again, it’s not as though Lynch ignored the constitutional concerns. In fact, he devoted 12 pages to what he termed the “vexing” Fourth
Amendment questions implicated by the NSA’s data sweeps. But after
noting the seriousness of the issues, he ducked
them, citing a series of old Supreme Court opinions which instruct that individuals have no reasonable
expectation of privacy under the Fourth Amendment in information (such as the phone numbers they dial) that
they voluntarily turn over to third parties. The cited cases include the decision most frequently invoked by the DOJ to uphold the
constitutionality of the NSA’s dragnet surveillance—Smith v. Maryland, a 1979 case that upheld the constitutionality of installing a pen register
without a warrant at a telephone company’s office to record the numbers dialed from a criminal suspect’s home. In his concurrence, Sack
ventured further, reminding us that one of the core functions of the judiciary is to examine the constitutionality of government actions. He
even compared Edward Snowden’s disclosure of the metadata program to those of Daniel Ellsberg, which “gave rise to the legendary ‘Pentagon
Papers’ litigation.” Alas, Stack’s views did not command a majority. So where
does the 2nd Circuit’s decision leave us? In
the absence of any directive halting the NSA’s practices, the practices will continue at least until June 1
and even after that for any “investigations” initiated before that date. Meanwhile, the spotlight is now on
Congress, which has three basic options as the June 1 deadline approaches. None, regrettably, would
fundamentally alter the landscape of government surveillance. Option No. 1 is to pass the USA Freedom Act, a version of
which cleared the House in 2014 but has since stalled in the Senate. If this bill becomes law, telephone metadata would be stored by phone
companies rather than the NSA. Intelligence agencies could still access the data, but only with FISC approval upon specific showings of need. As
under current law, however, the attorney general could authorize limited data sweeps in an “emergency” for seven days before seeking court
endorsement. The act would also make very minor changes to Section 702 of FISA (codified in 50 U.S.C. § 1881a) and the so-called PRISM and
“upstream” programs designed under that section to intercept the content of emails and phone calls from terror suspects abroad.
Unfortunately, as the NSA has acknowledged, such programs also “incidentally” sweep up the communications of Americans. Additionally,
under the act, a panel of amicus curiae (friends of the court) would be established to give “independent” advice to the FISC on privacy matters,
and more FISC decisions would be declassified. However, the act would not repeal Executive Order 12333, promulgated by President Reagan in
1981, which empowers intelligence agencies to do nearly everything that they can under Section 702 but without any court oversight. Both
President Obama and Hillary Clinton have announced their support for the Freedom Act. Sen. Rand Paul has opposed the Freedom Act, arguing
that it doesn’t go far enough to protect privacy interests. Option No. 2 for Congress would be to reject the USA Freedom Act and instead ratify
the Patriot Act Reauthorization bill sponsored by Senate Majority Leader Mitch McConnell. The bill would leave the status quo entirely
unchanged until December 31, 2020. The third option is for Congress to do nothing. Doing nothing would allow Section 215 to sunset and
expire. But as tempting as that choice may seem from a civil liberties perspective, it would actually do little to rein in the NSA. As Harley Geiger
of the Center for Democracy and Technology has written on the influential Lawfare blog, the NSA could simply substitute another provision of
FISA (50 U.S.C. § 1842) dealing with electronic pen registers and trap devices that would similarly permit it to acquire bulk telephone and email
metadata. What we’re involved in, it now seems clear, is a game of move and countermove. What then should our next move be? Politically,
what we need at a minimum is an open, ongoing and informed national debate about the pervasive reach, cost, effectiveness and proper limits
of government surveillance. Legally,
at a minimum, we need judges willing to confront the full constitutional
dimensions of whatever actions the legislative and executive branches undertake.
A/T Statutory Interpretation
Statutory interpretation doesn’t solve – fourth amendment decision is key
Nelson, 2015 (Steven, “NSA phone record program illegal, appeals court finds,” US News & World
Report, May 7, http://www.usnews.com/news/articles/2015/05/07/nsa-phone-record-program-illegalappeals-court-finds)
“I
don’t think that Congress alone giving an endorsement to these words would be sufficient under the
says. “I think Congress would actually have to say very clearly what it was doing in order to get over that and then the
question is whether that would survive [constitutional analysis].” Klayman, who like Cohn and many civil liberties advocates is unconvinced
the Section 215-reforming Freedom Act goes far enough, is less pleased. “It was a total cop out,” he says. “We look for the
D.C. Circuit to put its foot down and end this unconstitutional, illegal abuse of the surveillance system.”
“Who’s to say, now that we’ve seen how the government violates the law, they don’t grab [the data] from
Verizon and the other carriers surreptitiously?” he says. “That’s why there needs to be a clear-cut decision saying
this is unconstitutional. It’s not a question of this statute or that statute, it’s a violation of the Fourth
Amendment.” Klayman says the court’s decision not to issue an injunction to the ACLU, citing pending legislation, “is
totally inappropriate, it’s playing politics” – a sentiment likely shared by some supporters of the collection within government. The NSA
court’s analysis,” she
referred questions about the decision to the White House’s National Security Council. Edward Price, a spokesman for the council, declined to
comment directly on the ruling but said President Barack Obama remains supportive of legislation that would alter the collection. Attorney
General Loretta Lynch, who oversees the attorneys who defend the NSA program, told a Senate subcommittee Thursday her staff was
reviewing the decision and "we are also and have been working with this body and others to look for ways to reauthorize Section 215 in a way
that does preserve its efficacy and protect privacy." Obama initially defended the collection but later pivoted and endorsed a new system that
would allow the NSA to acquire records as needed from phone companies. Though he oversaw the existing collection with limited
congressional input, he declined to make the change without legislation. ACLU Deputy Legal Director Jameel Jaffer, lead counsel on the
appeal-winning case, suggested the
decision is a larger step toward expanded privacy rights than may at first
be appreciated. “This ruling focuses on the phone-records program, but it has far broader significance,
because the same defective legal theory that underlies this program underlies many of the government’s
other mass-surveillance programs,” Jaffer said in a statement. “The ruling warrants a reconsideration of all of
those programs, and it underscores once again the need for truly systemic reform.”
DA 2ACs
General A/T Impacts
Prefer our impacts – structural incentives lead to exaggeration of all threats used to
justify NSA surveillance. Giving in to this threat exaggeration causes intelligence arms
races that cause their impacts
Glennon, 2014 (Michael J., Professor of International Law, Fletcher School of Law and Diplomacy,
Tufts University, “National Security and Double Government,” Harvard National Security Journal, 5 Harv.
Nat’l Sec. J. 1)
The Trumanites' propensity to define security in military and intelligence terms rather than political and
diplomatic ones reinforces a powerful structural dynamic. That dynamic can be succinctly stated: Overprotection of
national security creates costs that the Trumanite network can externalize; under-protection creates costs
that the network must internalize. The resulting incentive structure encourages the exaggeration of
existing threats and the creation of imaginary ones. The security programs that emerge are, in economic
terms, "sticky down"--easier to grow than to shrink. The Trumanites sacrifice little when disproportionate
money or manpower is devoted to security. The operatives that they direct do not [*27] incur trade-off costs. n152 The
Trumanites do, however, reap the benefits of that disproportionality--a larger payroll, more personnel,
broader authority, and an even lower risk that they will be blamed in the event of a successful attack. n153 Yet
Madisonian institutions incur the costs of excessive resources that flow to the Trumanites. The President must submit a budget that includes
the needed taxes. Members of Congress must vote for those taxes. A federal agency must collect the taxes. When it comes to picking up the
tab, Trumanites are nowhere to be seen. If
national security protection is inadequate, on the other hand, the
Trumanites are held accountable. They are the experts on whom the Madisonian institutions rely to keep the nation safe. They are
the recipients of Madisonian largesse, doled out to ensure that no blame will be cast by voters seeking retribution for a job poorly done. In
the event of a catastrophic attack, the buck stops with the Trumanites. No Trumanite craves to be the target of a
9/11 commission following a catastrophic failure. Thus they have, as Jeffrey Rosen put it, an "incentive to exaggerate [*28]
risks and pander to public fears" n154 --"an incentive to pass along vague and unconfirmed threats of
future violence, in order to protect themselves from criticism" n155 should another attack occur. Indeed, a
purely "rational" actor in the Trumanite network might hardly be expected to do anything other than inflate
threats. In this way, the domestic political dynamic reinforces the security dilemma familiar to international relations
students, the quandary that a nation confronts when, in taking steps to enhance its security, it
unintentionally threatens the security of another nation and thus finds its own security threatened
when the other nation takes compensatory action. n156 An inexorable and destabilizing arms race is
thereby fueled by seemingly rational domestic actors responding to seemingly reasonable threats-threats that they unwittingly helped create. The budget figures, compiled by David Sanger, n157 reflect the incentive structure
within which the Trumanite network has emerged and thrives. Over the last decade the defense budget has grown 67% in real terms. n158 It
now is 50% higher than it was for an average year during the Cold War n159 --greater than the spending of the next twenty largest military
powers combined. n160 During the decade following the 9/11 attacks, the United States spent at least $ 3.3 trillion responding to the attacks.
n161 This represents $ 6.6 million for every dollar al Qaeda spent to stage the attacks. n162 It
is unclear the extent to which the
specific threats at which the Obama national security policy is directed have been inflated; that
information is classified, and the handful of Trumanites in a position to [*29] know the truth of the matter
can hardly be expected to disclose it. n163 No reliable outside threat assessment is available. Although it is the
Madisonians, not the Trumanites, who are expert in assessing the preferences of the public, including public risk tolerance--the Madisonians
are the ones who hear out constituents, litigants, and lobbyists--the only way to know whether more insurance is needed is to ask the same
Trumanite network that will gladly provide it. If
the precise nature of the threatened harm is uncertain, what is not
uncertain is the fear of threats, which is essential to the maintenance of the Trumanite network's
power--for the fundamental driver of Trumanite power has been emergency, the appearance of threats
that must be addressed immediately, without bringing in the Madisonian institutions. "[A]n entire era of
crisis in which urgent decisions have been required again and again," n164 in the words of Senator J. William
Fulbright, has given rise to the Trumanites' power. Speedy decisions are required that the Madisonian institutions are illequipped to make; the Trumanites have the means at their disposal to act quickly. The perception of threat, crisis, and emergency
has been the seminal phenomenon that has created and nurtures America's double government.
A/T Terror DA
No link – no need for extraordinary process to get necessary records
Wyden et al, 2013 (Ron, Mark Udall, and Martin Heinrich, “End the N.S.A. Dragnet, now,” NYT,
November 25, http://www.nytimes.com/2013/11/26/opinion/end-the-nsa-dragnet-now.html)
Our first priority is to keep Americans safe from the threat of terrorism. If government agencies identify a suspected
terrorist, they should absolutely go to the relevant phone companies to get that person’s phone records. But this can be done
without collecting the records of millions of law­abiding Americans. We recall Benjamin Franklin’s famous admonition that those who
would give up essential liberty in the pursuit of temporary safety will lose both and deserve neither. The usefulness of the bulk
collection program has been greatly exaggerated. We have yet to see any proof that it provides real,
unique value in protecting national security. In spite of our repeated requests, the N.S.A. has not provided
evidence of any instance when the agency used this program to review phone records that could not
have been obtained using a regular court order or emergency authorization.
A/T Terror DA – TMI
NSA surveillance is too broad to be effective; causes abuse and exploitation
Schneirer, 2014 (Bruce, contributing writer for The Atlantic and the chief technology officer of the
computer-security firm Co3 Systems, “How the NSA threatens national security,” The Atlantic, January 6,
http://www.theatlantic.com/technology/archive/2014/01/how-the-nsa-threatens-nationalsecurity/282822/)
The NSA's collect-everything mentality is largely a hold-over from the Cold War, when a voyeuristic interest in the
Soviet Union was the norm. Still, it is unclear how effective targeted surveillance against "enemy" countries really
is. Even when we learn actual secrets, as we did regarding Syria's use of chemical weapons earlier this year, we often can't do
anything with the information. Ubiquitous surveillance should have died with the fall of Communism, but it got a new—and even
more dangerous—life with the intelligence community's post-9/11 "never again" terrorism mission. This quixotic goal of preventing
something from happening forces us to try to know everything that does happen. This pushes the NSA to
eavesdrop on online gaming worlds and on every cell phone in the world. But it's a fool's errand; there
are simply too many ways to communicate. We have no evidence that any of this surveillance makes us
safer. NSA Director General Keith Alexander responded to these stories in June by claiming that he disrupted
54 terrorist plots. In October, he revised that number downward to 13, and then to "one or two." At this
point, the only "plot" prevented was that of a San Diego man sending $8,500 to support a Somali
militant group. We have been repeatedly told that these surveillance programs would have been able to stop 9/11, yet the NSA didn't
detect the Boston bombings—even though one of the two terrorists was on the watch list and the other had a sloppy social media trail. Bulk
collection of data and metadata is an ineffective counterterrorism tool. Not only is ubiquitous surveillance
ineffective, it is extraordinarily costly. I don't mean just the budgets, which will continue to skyrocket. Or the diplomatic costs, as country after
country learns of our surveillance programs against their citizens. I'm also talking about the cost to our society. It breaks so much of what our
society has built. It breaks our political systems, as Congress is unable to provide any meaningful oversight and citizens are kept in the dark
about what government does. It breaks our legal systems, as laws are ignored or reinterpreted, and people are unable to challenge government
actions in court. It breaks our commercial systems, as U.S. computer products and services are no longer trusted worldwide. It breaks our
technical systems, as the very protocols of the Internet become untrusted. And it breaks our social systems; the loss of privacy, freedom, and
liberty is much more damaging to our society than the occasional act of random violence. And finally, these
systems are susceptible
to abuse. This is not just a hypothetical problem. Recent history illustrates many episodes where this information
was, or would have been, abused: Hoover and his FBI spying, McCarthy, Martin Luther King Jr. and the civil rights
movement, anti-war Vietnam protesters, and—more recently—the Occupy movement. Outside the U.S., there are even
more extreme examples. Building the surveillance state makes it too easy for people and organizations
to slip over the line into abuse. It's not just domestic abuse we have to worry about; it's the rest of the world, too. The
more we choose to eavesdrop on the Internet and other communications technologies, the less we are secure from
eavesdropping by others. Our choice isn't between a digital world where the NSA can eavesdrop and
one where the NSA is prevented from eavesdropping; it's between a digital world that is vulnerable to
all attackers, and one that is secure for all users.
A/T Terror DA – Trust DA
Expansive NSA surveillance ruins public trust
Schnier, 2013 (Bruce, contributing writer for The Atlantic and the chief technology officer of the
computer-security firm Co3 Systems, “The only way to restore trust in the NSA,” The Atlantic,
September 4, http://www.theatlantic.com/politics/archive/2013/09/the-only-way-to-restore-trust-inthe-nsa/279314/)
I've recently seen two
articles speculating on the NSA's capability, and practice, of spying on members of Congress and other
elected officials. The evidence is all circumstantial and smacks of conspiracy thinking -- and I have no idea whether any
of it is true or not -- but it's a good illustration of what happens when trust in a public institution fails. The NSA
has repeatedly lied about the extent of its spying program. James R. Clapper, the director of national intelligence, has lied
about it to Congress. Top-secret documents provided by Edward Snowden, and reported on by the Guardian and other newspapers,
repeatedly show that the NSA's surveillance systems are monitoring the communications of American citizens.
The DEA has used this information to apprehend drug smugglers, then lied about it in court. The IRS has
used this information to find tax cheats, then lied about it. It's even been used to arrest a copyright violator.
It seems that every time there is an allegation against the NSA, no matter how outlandish, it turns out to be true. Guardian reporter Glenn
Greenwald has been playing this well, dribbling the information out one scandal at a time. It's looking more and more as if the NSA doesn't
know what Snowden took. It's hard for someone to lie convincingly if he doesn't know what the opposition actually knows. All of this denying
and lying results
in us not trusting anything the NSA says, anything the president says about the NSA, or
anything companies say about their involvement with the NSA. We know secrecy corrupts, and we see that corruption.
There's simply no credibility, and -- the real problem -- no way for us to verify anything these people might say. It's a perfect
environment for conspiracy theories to take root: no trust, assuming the worst, no way to verify the facts. Think JFK
assassination theories. Think 9/11 conspiracies. Think UFOs. For all we know, the NSA might be spying on elected officials. Edward Snowden
said that he had the ability to spy on anyone in the U.S., in real time, from his desk. His remarks were belittled, but it turns out he was right.
Public trust key to solve terrorism
Perlez and Sciolino, 2007 (Jane and Elaine, “Openness sought in British terror trials,” NYT, May 25,
http://www.nytimes.com/2007/05/25/world/europe/25britain.html?_r=0)
Mr. Clarke
lamented the breakdown in the public’s trust of the police, and the public’s unwillingness to “accept
the government’s explanation of the threat” of terrorism. Public criticism that the police were no longer
impartial players has hurt their ability to win the confidence of the public. “It is now difficult for the police
service, and I suspect others, to express a professional opinion on the subject without being accused of
falling on one side or the other in what it seems to me an increasingly wide political divide,” he said. The lack
of trust in the police also severely affected the ability to collect important information from the public that
could help tip them off to potential plots. The British police obtain most of their intelligence about
terrorist planning from classic methods, including electronic surveillance and foreign sources, he said, but very little from local
residents. Recent cases in which the police arrested terrorism suspects in Britain, held them for questioning
and then released them without charges have created doubts about the integrity of law enforcement, he
said. “It is no exaggeration to say the lack of public trust in intelligence is in danger of infecting the relationship
between the police and the communities we serve,” he said.
A/T “One Voice” – Non-Unique
The “one-voice doctrine” is a common justification for judicial deference that says that other branches
may not engage in foreign affair
Non-unique – Court is interfering in foreign affairs now
Moore, 2014 (David, Professor of Law, J. Reuben Clark Law School, Brigham Young University, “Beyond
one voice,” Minnesota Law Review, February, 98 Minn. L. Rev. 953)
This does not mean "that every case or controversy which touches foreign relations lies beyond judicial
cognizance." n33 As noted, just recently in Zivotofsky the Supreme Court concluded that a dispute between
the President and Congress regarding the status of Jerusalem as the capital of Israel was justiciable
notwithstanding Justice Breyer's one-voice argument to the contrary in dissent. n34 In light of Zivotofsky, the current trajectory is
arguably toward a greater judicial role, and thus more voices, in resolving disputes touching on foreign affairs. n35
In harmony with this trend in cases implicating the political question doctrine, the one-voice doctrine leads to lesser shades of deference in
other cases. The Zadvydas v. Davis n36 case in the foreign relations area of immigration exemplifies this end of the deference spectrum. The
Zadvydas Court implied a statutory limitation on the government's ability to detain aliens who had been
ordered removed. n37 In so doing, the Court rejected the government's argument that "a federal habeas
court would have to accept the Government's view about whether the implicit statutory limitation is
satisfied in a particular case, conducting little or no independent review of the matter." n38 Instead, the
Court merely recognized the need to [*965] conduct its review with sensitivity to, among other things,
"the Nation's need to "speak with one voice.'" n39 The one-voice doctrine thus extracted only relatively weak deference to the
executive's immigration judgments. n40
Moore, 2014 (David, Professor of Law, J. Reuben Clark Law School, Brigham Young University, “Beyond
one voice,” Minnesota Law Review, February, 98 Minn. L. Rev. 953)
The doctrine is likewise hard to square with case law that recognizes room for the judiciary in foreign
affairs. The courts employ a number of doctrines - some generic, some unique to foreign relations law - to police judicial
involvement in foreign affairs. Among the generic doctrines are standing, n271 ripeness, n272 [*1008] mootness, n273 personal
jurisdiction, n274 forum non conveniens, n275 Chevron deference, n276 and political question. n277 While in many cases these
doctrines serve to limit judicial involvement in foreign affairs matters, in other cases they do not. Thus, in its
seminal political question opinion, the Court explained that, while there are issues the judiciary will not decide, "it is error to
suppose that every case or controversy which touches foreign relations lies beyond judicial cognizance."
n278 The Court listed a variety of issues that fit within judicial cognizance, such as whether a treaty preempts particular state laws and
whether, in the absence of executive clarity, a foreign war exists that triggers statutes securing U.S. neutrality. n279 The
Court's recent
opinion in Zivotofsky reaffirmed the judiciary's role over certain [*1009] foreign affairs issues n280 and may signal a retreat
from the political question doctrine in foreign affairs. As discussed previously, the question presented was whether
Congress could statutorily require the executive to list Israel on the passport of someone born in Jerusalem notwithstanding the President's
"power to recognize foreign sovereigns" n281 and the State Department's "longstanding policy of not taking a position on the political status of
Jerusalem." n282 The
Court rejected the lower courts' dismissal of the case on political question grounds. n283
The judiciary could properly resolve the question. n284 Just as the Court found room for the judiciary in deciding the
separation of powers question in Zivotofsky, the Court has asserted a role in policing state action even when the executive is unconcerned
about that action. n285 Other
foreign affairs doctrines similarly calibrate, rather than eliminate, the judiciary's
involvement in foreign affairs. n286 Under the act of state doctrine, U.S. courts "will generally refrain from ... sitting in judgment on
... acts of a governmental character done by a foreign state within its own territory and applicable there." n287 However, if there is clear
international law that governs the foreign state's conduct or if the concerns motivating the doctrine are not implicated even though the
doctrine technically applies, courts will disregard the doctrine and independently [*1010] assess the legality of the foreign sovereign's acts.
n288 Similarly, courts
exercise ultimate discretion to decide whether to apply the act of state doctrine when
the executive has represented that the doctrine need not apply. n289 Under principles of international
comity, courts may abstain from exercising jurisdiction in cases involving the executive, legislative, or
judicial acts of foreign states. n290 Pursuant to jurisdiction provided by the Alien Tort Statute, federal courts hear limited claims
based on customary international law. n291 Invoking the Charming Betsy [*1011] canon, courts work to interpret federal statutes to avoid
infractions of international law unless Congress has manifested intent to violate. n292 Similarly, in
applying the presumption
against extraterritoriality, courts interpret federal statutes to apply only domestically absent clear
evidence of congressional intent to the contrary. n293 And under the range of deference given to the
executive in the realm of foreign affairs, courts give more or less weight to the executive's position in
foreign affairs cases. n294 The result is that while the courts recognize limits to their participation in foreign affairs matters, n295 those
limits fall well short of outright exclusion. Many doctrines recognize a role for the judiciary in foreign relations. The room left for the
judiciary results in disagreements between the political branches and the courts. n296 Even recently, the
Court has rejected foreign relations-related positions taken by both the President and Congress. For
example, in Zivotofsky, the Court rejected the executive's claim that a challenge to the executive's refusal to follow a
statute endorsing Jerusalem as the capital of Israel presented a political question. n297 In Medellin v. Texas, the Court concluded
that the President lacked unilateral authority to execute an otherwise non-self- [*1012] executing International
Court of Justice (ICJ) judgment. n298 And in Boumediene, the Court concluded that Congress had
unconstitutionally attempted to deny the writ of habeas corpus to detainees at Guantanamo. n299 In its
separation of powers dimensions, then, the one-voice doctrine contends with a practice that involves multiple federal players.
Non-unique, the US never speaks with one voice in foreign affairs
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
The one-voice rationale is in one sense not functionalist at all, but a formal essentialist assertion about the scope of the Constitution’s
allocation of powers. To the extent that it is functional, it must rest entirely on other rationales. One of the potential rationales is as follows:
because the President is the only unitary, centralized branch of government,274 only the President can truly speak with one voice and is
therefore the only branch that can suitably represent a unitary entity in the international arena. But as has been frequently observed, the
United States has never strictly spoken “with one voice” in foreign affairs.275 The Constitution’s text allocates
foreign affairs powers to both the Congress and the President.276 In practice, Congress has from time to time
disagreed with the President, even regarding highly sensitive national security matters.277 And the courts have,
from the very beginning, rejected executive branch interpretations of treaties.278 Although the separation of
powers has been criticized as interfering with the ability of the United States to form a unified foreign policy, this is
the government that the Constitution created.279 The onevoice argument simply does not hold up to scrutiny, at
least in its strong form. But there are other rationales for a weaker form—embarrassment and accountability.
A/T “One Voice”
Speaking with multiple voices isn’t a problem at all
Knowles, 2009 (Robert, Acting assistant Professor, New York University School of Law, “American
Hegemony and the Foreign Affairs Constitution,” Arizona State Law Journal, 41 Ariz. St. L.J. 87, October)
Moreover, it is entirely possible that other nations would be content with conflicting decisions from different branches of the U.S. government.
Suppose that the President roundly condemns the offensive court decision and declares the judge to be an
“activist.” If the damage done by the court decision was largely dignitary, an angry denouncement from the
executive branch may be all that is needed. Past empires relied on multi-vocal signaling to maintain imperial
rule.396 But with the advent of globalization, intra-executive branch multi-vocality is much more difficult because
advances in communication permit various parts of the “rim” to communicate with one another .397 The American
separation-of-powers system provides a way around this problem, allowing the U.S. government to “speak in
different voices” at once.
A/T Courts Link to Politics
Courts don’t link to politics- avoids political fallout
Whittington 5 (Keith E., Professor of Politics - Princeton University, "Interpose Your Friendly
Hand: Political Supports for the Exercise of Judicial Review by the United States Supreme Court”, The
American Political Science Review, Nov., (99)4, p. 583)
There are some issues that politicians
cannot easily handle. For individual legislators, their constituents may be
sharply divided on a given issue or overwhelmingly hostile to a policy that the legislator would nonetheless like to see adopted.
Party leaders, including presidents and legislative leaders, must similarly sometimes manage deeply divided or cross-pressured
coalitions. When faced with such issues, elected officials may actively seek to turn over controversial political questions
to the courts so as to circumvent a paralyzed legislature and avoid the political fallout that would come
with taking direct action themselves. As Mark Graber (1993) has detailed in cases such as slavery and abortion,
elected officials may prefer judicial resolution of disruptive political issues to direct legislative action,
especially when the courts are believed to be sympathetic to the politician's own substantive preferences but even when the attitude
of the courts is uncertain or unfavorable (see also, Lovell 2003). Even when politicians do not invite judicial intervention, strategically
minded courts will take into account not only the policy preferences of well-positioned policymakers but also the willingness of those potential
policymakers to act if doing so means that they must assume responsibility for policy outcomes. For cross-pressured politicians and
coalition leaders, shifting
blame for controversial decisions to the Court and obscuring their own relationship
to those decisions may preserve electoral support and coalition unity without threatening active judicial
review (Arnold 1990; Fiorina 1986; Weaver 1986). The conditions for the exercise of judicial review may be relatively favorable when judicial
invalidations of legislative policy can be managed to the electoral benefit of most legislators. In the cases considered previously, fractious
coalitions produced legislation that presidents and party leaders deplored but were unwilling to block. Divisions within the governing coalition
can also prevent legislative action that political leaders want taken, as illustrated in the following case.
Courts don’t link to politics- evades electoral consequences
Stoutenborough et al. 6 (James, Political Science Dept @ Utah, Reassessing the Impact of
Supreme Court Decisions on Public Opinion, Political Research Quarterly, p. 419)
In many cases, courts
have been empowered by and served the interests of other political actors. While this
undermines the countermajoritarian difficulty as an empirical hypothesis, it is not at all reassuring from a democratic perspective. Judicial
review can provide an opportunity for elected political actors to evade responsibilities or to pursue
policies while evading electoral consequences. Such actions may enhance or enable domination by letting those actors pursue
policies that might lead to domination without suffering electoral consequences. The possibility that judicial review can provide
another outlet that permits legislators to "run from daylight"85 and effect important policy changes with
a minimum of public scrutiny is a serious concern, and may especially contribute to domination by powerful economic elites. An
additional concern is that judicial review can have the perverse effect of making legislators less attentive to their constitutional responsibilities,
as they may vote for legislation they believe to be unconstitutional under the assumption that the courts will correct their mistake.86
Courts don’t link to politics- shielded from political pressure
Ward 9 (Artemus, Professor @ NIU, Political Foundations of Judicial Supremacy, Congress and The
Presidency, pg. 119)
After the old order has collapse the once- united, new-regime coalition begins to fracture as original commitments are extended to new issues.
In chapter 3 Whittington combines Skowronek's articulation and disjunctive categories into the overarching "affiliated" presidencies as both
seek to elaborate the regime begun under reconstructive leaders. By this point in the ascendant regime, Bourts are staffed by justices from the
dominant ruling coalition via the appointment process - and Whittington spends time on appointment politics here and more fully in chapter 4.
Perhaps counter-intuitively, affiliated
political actors - including presidents - encourage Courts to exercise
vetoes and operate in issue areas of relatively low political salience. Of course, this "activism" is never used against the affiliated
president per se. Instead, affiliated Courts correct for the overreaching of those who operate outside the preferred constitutional vision, which
are often state and local governments who need to be brought into line with nationally dominant constitutional commitments. Whittington
it is easier for affilitated judges, rather than affiliated presidents, to rein in outliers and
conduct constitutional maintenance. The latter are saddled with controlling opposition political figures,
satisfying short-term political demands, and navigating intraregime gridlock and political thickets.
Furthermore, because of their electoral accountability, politicians engage in position-taking, credit-claiming, and blame-avoidance
behavior. By contrast, their judicial counterparts are relatively sheltered from political pressures and have more
straightforward decisional processes. Activist Courts can take the blame for advancing and legitimizing
constitutional commitments that might have electoral costs. In short, a division of labor exists between politicians and
explains why
judges affiliated with the dominant regime. 1999).
A/T Reverse Politics – Perm Solves
Perm solves the net benefit – only congress and the president get perceived
CSM 97(Christian Science Monitor, “Why America Puts Its Supreme Court On Lofty Pedestal,” June
25, Lexis)
Today this holds true even more. In one sense, the reason is obvious: With divided government and partisan sniping in Washington, when
politicians must create a TV image and constantly raise funds, the scholarly-looking justices seem a
refreshing alternative. They come out in black robes from behind red silk curtains, and everyone stands. They ask incisive questions.
They disappear. It looks like competence personified. And there's some truth to it. The members of the court don't
need to campaign for office every few years. They were selected for life. They don't need speech writers or have to
check the polls. The current justices, unlike earlier courts, generally write their own opinions. They are free to dissent, and their rulings
are not tied to interest-group pressure. Moreover, as an institution, the court is uniquely constituted. It is not one targetable political persona,
as is a single chief executive. Yet it is smaller than a Congress of 535 people. Congress
is covered by TV four times as much as
the court is. The White House is covered eight times as much, says Lee Epstein of Washington University in St. Louis.
The court stands out now because it is not part of Washington's political swamp. The carefully cultivated
aloofness of the Supreme Court is, in the Washington scene, almost countercultural in nature. The
court's warts don't show. "People don't see the court infighting; it seems more harmonious and less
political," says one court-watcher. "With Congress and the White House, we see the blood-letting on the street."
Importantly, say scholars, current justices benefit from courageous stands the court took in cases like Brown school desegregation, and the Roe
abortion-rights case - when the majority was fragile and the justices felt under great pressure. Those decisions are a main reason the court
image is so buffed today.
Justices Don't Have to Wade in Washington Swamp
A/T Activism = Backlash
It is the broad opinion of the Court and Public that affect public popularity, not one
particular decision
Caldeira and Gibson 92 (Gregory and James, Ann and Darrell Dreher Chair in Political
Communication and Policy Thinking at The Ohio State University, “The Etiology of Public Support for the
Supreme Court”, American Journal of Political Science, Vol. 36 No. 3, August 1992, JSTOR)
For all these reasons, now is an appropriate juncture at which to reexamine the levels, sources, and explanations of public support for
the Supreme Court. On the methodological front, we offer an alternative means of thinking about and capturing diffuse
support for the Court among the mass public. On the substantive front, we articulate and then test a series of explanations of the etiology of
support for the Court. Naturally, we examine the traditional explanations of diffuse support (Murphy, Tanenhaus, and Kastner 1973), but,
more important, we introduce and demonstrate the explanatory power of a new set of variables, political values.
For the mass public, contrary to previous research, we find no connection between support for specific policies
and diffuse support for the Supreme Court. Instead, broad political values—commitment to social order and
support for democratic norms—do a good job of predicting attitude toward the Supreme Court . We then consider the
important role of “opinion leaders” as supporters of the Supreme Court. In contrast to the mass public, opinion leaders show a greater
tendency to link support for the Supreme Court to the satisfaction of specific policy preferences. Finally, we place these results within the
context of change by suggesting some of the crucial components of a broader theory of the ebb and flow of support and conclude with
speculation on the consequences of attitudes among the mass public and elites for the effective functioning and
resilience of the Supreme Court.
A/T No Enforcement
Other actors will implement the court’s decision regardless of the action
Baum 1999 (Lawrence, Prof of Constitutional Law Ohio State University, The Supreme Court p. 22)
Acceptance of the Court’s Authority. Policy makers may
implement the Supreme Court’s decision even when they have
incentives to resist them. One important reason is the Court’s authority as interpreter of the law. Most people believe that the
Court’s decisions are authoritative judgments about the law and that there is an obligation to comply with those
decisions. Largely as a result the Court’s association with an unpopular policy may help to foster public acceptance of
that policy. For the same reason, even officials who are disposed to disobey the courts decisions may choose not
to do so. Certainly a policy maker who is indifferent toward a Supreme Court policy will be inclined to go along because
of the Court’s authority
The executive wont flout court decisions even if they’re controversial.
Christina Wells. 2004. Missouri Law Review. 69 Mo. L. Rev. 903]
The judicial system is a powerful institution. In the context of resolving constitutional issues, many people, the
Court included, believe that the judicial system has the final (and, thus, most powerful) say. 227 To be sure, executive
officials, past and present, have asserted that national security matters are particularly within the executive
branch's ambit, suggesting that they do not share this view of the Court's legitimacy. 228 Even so, executive
officials rarely flout the Court's authority, instead preferring to enlist the Court's support (which the Court often willingly
provides). Executive officials might prove more willing to deny the Court's authority if it engaged in more rigorous
review of executive decisions regarding national security. However, popular support for the institution of judicial
review would likely preclude outright executive defiance 229 and could eventually spur acceptance. This might be
especially true if the Court's constitutional standards of review focused more explicitly on decision-making processes, thus avoiding the
impression that the Court was substituting its judgment for the executive's.
Their evidence only applies to lower courts – Agencies think the Supreme Court’s word
is final
Michael J. Froehlich, January 1985, The George Washington Law Review, 53 Geo. Wash. L. Rev. 147
Agencies that decline to follow circuit court rulings contend that only the Supreme Court's decisions interpreting
statutes and congressional directives are binding on agencies' implementation of national programs. An agency will not
necessarily appeal an adverse decision to the Supreme Court, however, or petition Congress to clarify the statute in question, but
will simply ignore circuit court precedent in future adjudications within the circuit.
Agencies usually follow
Richard J. Pierce, Professor of Law, Columbia University, April 1993, Duke Law Journal, 42 Duke L.J.
1170
The opinion concluded that any injury the plaintiff might suffer was not redressable for two reasons. First, because the Department of the
Interior was the only agency that was a party to the case, a judicial opinion holding that the Endangered Species Act requires agencies to
consult with the Department before funding overseas projects that are likely to have adverse effects on endangered species would bind
only the Department and not other agencies. Thus, other federal agencies would be free to ignore the Court's
decision if it were to invalidate the Department's rule. That reasoning is inconsistent with precedent. More fundamentally, it
ignores the reality that all federal agencies routinely conform their conduct to decisions of the Supreme Court. If
the Court were to hold that agencies must consult with the Department of the Interior, the agencies would do so.
The opinion itself recognizes that the applicable standard is whether a judicial decision is "likely" to redress the plaintiff's injury. Is the Court
seriously suggesting that federal agencies are unlikely to comply with a Supreme Court decision?
A/T Legitimacy
Turn – Controversial decisions boost legitimacy – positivity bias outweighs and turns
any backlash into support
Gibson and Caldiera 9 (James L., Professor of Government – Washington University and Fellow –
Centre for Comparative and International Politics, and Gregory A., Distinguished University Professor in
Political Communications and Policy Thinking – Ohio State University, Citizens, Courts, and
Confirmations, http://press.princeton.edu/chapters/s8940.pdf)
How is it that the United States Supreme Court avoided any harmful consequences of the election imbroglio? Again,
positivity bias. According to this theory,
discussed more completely below, anything that causes people to pay attention to courts—even
controversies—winds up reinforcing institutional legitimacy through exposure to the legitimizing symbols
associated with law and courts. The theory suggests a bias in favor of developing positive feelings for the
institution, even during conflicts, and even among losers in such conflicts. While there are many elements to this
Gibson, Caldeira, and Spence (2003a) have proffered an answer: the theory of
theory, its central prediction is that legal controversies tend to reinforce judicial legitimacy by teaching
the lesson that
courts are different from the other institutions of the American democracy, and are therefore worthy of respect.
No Link – Court overrules all the time, one more decision not key
Paul Linton, j.d. loyal university of Chicago, St. Louis public law review. 1993, 13 St. Louis U. Pub. L.
Rev. 15
The Court describes this first circumstance as "hypothetical." 272 The distinct impression left by this passage is that decisions of the
Supreme Court overruling earlier decisions on matters of constitutional interpretation are rare and thus should not
be too readily emulated, lest the "legitimacy" of the Court be called into question. But this impression is wrong. On
more than 200 occasions, the Court has overturned previous decisions, and in nearly three-fourths of those cases,
the Court overruled because the earlier decision had wrongly interpreted the Constitution . 273 What does this
remarkable track re [*75] cord of "judicial correction" mean? At the very least, that the "legitimacy" of the Court is not affeced by
its acknowledgement of prior error, even when that error involved an intepretation of the Constitution. Indeed, as
in Brown and West Coast Hotel, the Court has often enhanced its credibility by overruling decisions that were
wrong when originally decided. One more overruling decision, if otherwise appropriate, could not
reasonably be expected to damage that credibility.
No Impact – Legitimacy resilient – history proves
Gibson and Caldiera 9 (James L., Professor of Government – Washington University and Fellow –
Centre for Comparative and International Politics, and Gregory A., Distinguished University Professor in
Political Communications and Policy Thinking – Ohio State University, Citizens, Courts, and
Confirmations, http://press.princeton.edu/chapters/s8940.pdf)
Our contention, however, is that the effects of popular and unpopular decisions are asymmetrical. Popular decisions generate unadulterated
support for the Court, just as they do for any institution. But the effects of unpopular decisions are discounted, both by processes of shirking
and by association with the legitimizing symbols of judicial power. We acknowledge that the decline of institutional legitimacy could
become a nonlinear, cascading process in the sense that as the Court’s reservoir of support becomes shallower, the impact of
.
9
unpopular decisions grows. We know of no such cascade in American history, however Our objective in this book is to
determine whether politicized confirmation processes can have a delegitimizing effect on the Supreme Court by providing an image of the
9
Court incompatible with the processes undergirding positivity theory. [Continues – To Footnote] In all of our thinking about these processes,
we are much influenced by Roosevelt’s attacks on the Supreme Court in the 1930s. If an enormously popular
president, stimulated to action by a continuous string of unpopular and crippling Supreme Court decisions, cannot
succeed in changing the Court, it is difficult to imagine a scenario in which such attacks would succeed. At the same
time, however, Gibson and Caldeira (1992) point to declining support for the Supreme Court among some segments of the African American
community from roughly theWarren Court era to the Rehnquist Court, so clearly a diminution of Court support is possible. Gaining a greater
understanding of the processes of change in Court support is precisely the objective of this book.
Politics – Popular – Tech
Tech companies support restrictions on NSA surveillance
Kosner, 2013 (Anthony Wing, “All major tech companies say NSA actions put public trust in internet at
risk,” Forbes, December 9, http://www.forbes.com/sites/anthonykosner/2013/12/09/all-major-techcompanies-say-nsa-actions-puts-public-trust-in-internet-at-risk/)
America’s biggest tech
companies have gone from begging congress for surveillance reform, as Kashmir Hill
taking their case to President Obama and members of Congress directly in
an open letter published today. At risk is the public’s trust in the internet itself and all of the economic and
cultural benefits it contains. The letter, signed by AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter and Yahoo, urges the
reported here at the end of October, to
U.S. to “take the lead and make reforms that ensure that government surveillance efforts are clearly restricted by law, proportionate to the
risks, transparent and subject to independent oversight.” Microsoft’s general counsel, Brad Smith, released a statement asserting that, “People
won’t use technology they don’t trust. Governments have put this trust at risk, and governments need to help restore it.” This
is a striking
development given the varying degree to which these same companies have cooperated and/or collaborated
with the NSA’s data collection efforts. Clearly the balance has tipped and America’s tech companies now feel
emboldened to call for sweeping reforms even as the Democratic chair of the Senate Intelligence Committee, Dianne
Feinstein of California, is sponsoring a bill maintain the security agencies’ right to continue to collect bulk
data. The Big-8, with a combined valuation of $1.4 trillion, are trying to convince their billions of users worldwide that
they can still trust American tech companies. “For our part,” the open letter reads, “we are focused on keeping user’s data
secure — deploying the latest encryption technology to prevent unauthorized surveillance on our networks and by pushing back on
government requests to ensure that they are legal and reasonable in scope.”
Those companies have huge influence
Harbert, 2012 (Tam, “Internet giants adopt new lobbying tactics,” IEEE Spectrum, September 27,
http://spectrum.ieee.org/telecom/internet/internet-giants-adopt-new-lobbying-tactics)
Regardless of which party controls the U.S. government after next month’s elections, Washington’s interest in
how Internet companies use customers’ data will continue to grow, and so these tech companies have
recognized the need to spend more money on lobbying legislators. Unlike with some other industries, however, their
investment is not limited to traditional lobbying methods. They are looking to their users to put pressure on Congress as well.
Computer and Internet companies have enlisted elite firms clustered on Washington, D.C.’s K Street in their
efforts, according to Bill Allison, editorial director at the Sunlight Foundation, a nonprofit organization that promotes government transparency
by putting information online. Google
even hired former congresswoman Susan Molinari earlier this year to head its
Washington office. The companies have also been inching up their spending. Last year, the computer and Internet industry spent US
$127 million on lobbying, up from $123 million in 2010 and $120 million in 2009, according to the Center for Responsive Politics (CRP).
Spending is trending up again this year, at least by a few million, based on the $65 million figure for the first six months.
The most notable
increases, however, are by two of the hottest U.S. Internet companies. Google’s
lobbying costs are on track to have nearly
quadrupled in the past two years, rising to $9 million in the first half of 2012, according to tallies by the CRP. In fact, last year
Google surpassed all other companies in the computer and Internet category, beating the previous top spender—Microsoft—by more than $2
million. Facebook’s
spending has also quickly accelerated but is still just a fraction of Google’s.
But this year, tech
companies also discovered new political muscle when a grassroots campaign rallied Internet users to
petition Congress, leading to the defeat of the Stop Online Piracy Act (SOPA). The bill would have required websites and
search engines to cut off access to non-U.S sites that the government suspects of copyright infringement. Key Internet companies—
including Microsoft, Google, Yahoo, Facebook, and Twitter—opposed SOPA. But what got the most attention were
constituent complaints, which were encouraged by Internet rights advocates such as Fight for the
Future, Engine Advocacy, and the Center for Democracy and Technology (CDT). The tech companies rode that groundswell of public opinion;
Wikipedia blacked out its website in protest. Google weighed in by covering its logo in black. It
was a watershed moment,
making a huge impression on Congress, Internet firms, and Internet-rights advocates as well. Holmes Wilson,
codirector of Fight for the Future, says the organization simply “stumbled across this new tactic,” realizing that it could team up with Internet
companies that would then appeal directly to their users. (In truth, there was a similar campaign in 1996.) If these companies “align themselves
with the interests of individual users…you have this powerful coalition that can really stand up to any other industry and any other lobbyist,” he
says. In fact, in
the wake of SOPA, Fight for the Future has formed a new group, called the Internet Defense
League, to do just that. “With the Internet Defense League we want to take those tactics that were so
successful in defeating SOPA and try to turn those tactics into an ongoing effort and a permanent force
for defending the Internet,” says Holmes.
Politics – Popular – Public
Patel, 2015 (Faiza, “NSA data collection program must end,” Al Jazeera, April 28,
http://america.aljazeera.com/opinions/2015/4/senate-republicans-want-to-extend-nsa-datasurveillance.html)
Maintaining a database of phone records upends a fundamental premise of the Constitution: The government
should intrude on Americans’ private lives only if it has probable cause to suspect criminal activity. While the database doesn’t
include recordings of actual conversations, it picks up reams of information about who we call and when. This can be even more
revealing of our lives. Calls to the National Rifle Association and the local shooting range show that someone may be a gun owner. Calls to a
suicide prevention hotline may tell the government more than it has any right to know about a person’s mental health. Political associations
and personal ties are easily revealed. The rationale for the telephone database can be used to collect other types of information as well. The
NSA ran an Internet metadata program until 2011 and could well revive it without the public knowing. As we conduct more and more of our
lives online, this could allow the government to stockpile information about who we email, which websites we visit and the books and
medicines we buy online. Even agencies not concerned with national security are warehousing information. It
was recently revealed that for more than two decades starting in 1992, the Drug Enforcement Administration logged virtually all phone calls
made from the United States to 116 countries. The people whose calls to family, friends and business associates were picked up weren’t
suspected of any crime, and no court was asked for approval. Americans
understand the risks these programs pose to
their privacy. Several polls have been conducted to gauge people’s attitudes about electronic
surveillance. While the results vary somewhat, the clear trend in the last two years is that the public is
increasingly uneasy about digital intrusions of unprecedented scale.
K Answers
Generic K Answer – Civic Engagement Good
Education over specific national security policy is key to prevent devolution of
government into despotism
Glennon, 2014 (Michael J., Professor of International Law, Fletcher School of Law and Diplomacy,
Tufts University, “National Security and Double Government,” Harvard National Security Journal, 5 Harv.
Nat’l Sec. J. 1)
Moreover, as a practical matter, it would be difficult to overcome voter ignorance that is in important respects
entirely rational. Consider more closely three of the prerequisites for intelligent participation in governance: minimal intellectual acumen,
sound judgment concerning policy alternatives, and an adequate informational base. The first two elements are in many respects already
widely present. The fact is that "Joe Six-Pack" is neither unintelligent nor irrational. No one familiar with the rules of American football--surely
among the most complicated sports in the world--can doubt the raw intelligence of anyone able to weigh the pros and cons of the nickel
defense. Its moral dimensions notwithstanding, the decision whether to run a play-action fake on third-and-two is not a conceptually more
difficult question than the decision whether to strike a high-value target located in a car in Yemen with four unidentified companions. Different
types of research obviously are required, but neither matter is beyond the intellectual grasp of a person of common intelligence. The moral
implications are also, of course, different, but what
reason is there to believe that the Trumanites have any greater
moral expertise than the average voter? It is often said that the public lacks access to the requisite
information. The reality, however, is that all the material needed to make an informed judgment on the wisdom
of drone strikes as a general policy--as well as 95% of the other issues the Trumanites confront--is
readily available to anyone who can access the internet. One reason that the public does not do so is
that, given competing demands on its time, there is no obvious reason to become more informed.
National security policy remains the same from one president to the next, whomever one votes for, and even in the
most politically accountable of worlds, the public still would necessarily be excluded from sensitive national security deliberations. Why waste
time learning about things one cannot affect? n598 A single vote, in any event, has an infinitesimally small chance of determining the outcome
of an election. [*109] American voters may not have read Voltaire, but they know that there are gardens to be tended. n599 Theirs is, in key
respects, rational ignorance. n600 This
is the nub of the negative feedback loop in which the United States is now locked.
Resuscitating the Madisonian institutions requires an informed, engaged electorate, but voters have
little reason to be informed or engaged if their efforts are for naught--and as they become more uninformed and
unengaged, they have all the more reason to continue on that path. The Madisonian institutions thus continue to atrophy, the power of the
Trumanite network continues to grow, and the public continues to disengage. VI. Conclusion U.S. national security policy has scarcely changed
from the Bush to the Obama Administration. The theory of Walter Bagehot explains why. Bagehot described the emergence in 19th-century
Britain of a "disguised republic" consisting of officials who actually exercised governmental power but remained unnoticed by the public, which
continued to believe that visible, formal institutions exercised legal authority. n601 Dual institutions of governance, one public and the other
concealed, were referred to by Bagehot as "double government." n602 A similar process of bifurcated
institutional evolution has
occurred in the United States, but in reverse: a network has emerged within the federal government that
exercises predominant power with respect to national security matters. It has evolved in response to structural
incentives rather than invidious intent, and it consists of the several hundred executive officials who manage the military, intelligence,
diplomatic, and law enforcement agencies responsible for protecting the nation's security. These officials are as little disposed to stake out new
policies as they are to abandon old ones. They define security more in military and intelligence terms rather than in political or diplomatic ones.
[*110] Enough examples exist to persuade the public that the network is subject to judicial, legislative, and executive constraints. This
appearance is important to its operation, for the network derives legitimacy from the ostensible authority of the public, constitutional branches
of the government. The appearance of accountability is, however, largely an illusion fostered by those institutions'
pedigree, ritual, intelligibility, mystery, and superficial harmony with the network's ambitions. The courts, Congress, and even the presidency in
reality impose little constraint. Judicial
review is negligible; congressional oversight dysfunctional; and presidential control nominal.
reform efforts are no more likely to succeed, relying
as they must upon those same institutions to restore power to themselves by exercising the very power
that they lack. External constraints--public opinion and the press--are insufficient to check it. Both are manipulable, and their vitality
Past efforts to revive these institutions have thus fallen flat. Future
depends heavily upon the vigor of constitutionally established institutions, which would not have withered had those external constraints had
real force. Nor is it likely that any such constraints can be restored through governmental efforts to inculcate greater civic virtue, which would
ultimately concentrate power even further. Institutional restoration can come only from an energized body politic. The prevailing incentive
structure, however, encourages the public to become less, not more, informed and engaged. To many, inculcated in the hagiography of
Madisonian checks and balances and oblivious of the reach of Trumanite power, the response to these realizations will be denial. The image of
a double national security government will be shocking. It cannot be right. It sounds of conspiracy, "a state within," and other variations on that
theme. "The old notion that our Government is an extrinsic agency," Bagehot wrote, "still rules our imaginations." n603 That the Trumanite
network could have emerged in full public view and without invidious intent makes its presence all the more implausible. Its existence
challenges all we have been taught. There is, however, little room for shock. The
pillars of America's double government have
long stood in plain view for all to see. We have learned about significant aspects of what Bagehot described--from some eminent
thinkers. Max Weber's work on bureaucracies showed that, left [*111] unchecked, the inexorability of bureaucratization
can lead to a "polar night of icy darkness" in which humanitarian values are sacrificed for abstract
organizational ends. n604 Friedrich Hayek's work on political organization led him to conclude that "the greatest danger to liberty today
comes from the men who are most needed and most powerful in government, namely, the efficient expert administrators exclusively
concerned with what they regard as the public good." n605 Eric Fromm's work on social psychology showed how people unconsciously adopt
societal norms as their own to avoid anxiety-producing choices, so as to "escape from freedom." n606 Irving Janis's work on group dynamics
showed that the greater a group's esprit de corps, "the greater the danger that independent critical thinking will be replaced by groupthink,
which is likely to result in irrational and dehumanizing actions directed against out-groups." n607 Michael Reisman's work on jurisprudence has
shown how de facto operational codes can quietly arise behind publicly-embraced myth systems, allowing for governmental conduct that is not
approved openly by the law. n608 Mills' 1956 work on power elites showed that the centralization of authority among officials who hold a
common world view and operate in secrecy can produce a "military metaphysic" directed at maintaining a "permanent war economy." n609
One person familiar with Mills' work was political scientist Malcolm Moos, the presidential speechwriter who five years later wrote President
Eisenhower's prophetic warning. n610 "In the councils of government," Eisenhower said, "we must guard against the acquisition of
unwarranted influence, whether sought or [*112] unsought, by the military-industrial complex. The potential for the disastrous rise of
misplaced power exists and will persist." n611 Bagehot anticipated these risks. Bureaucracy, he wrote, is
"the most unimproving
and shallow form of government," n612 and the executive that commands it "the most dangerous." n613 "If
it is left to itself," he observed, "without a mixture of special and non-special minds," decisional authority "will become
technical, self-absorbed, self-multiplying." n614 The net result is responsibility that is neither fixed nor ascertainable but
diffused and hidden, n615 with implications that are beyond historical dispute. "The most disastrous decisions in the twentieth century," in
Robert Dahl's words, "turned out to be those made by authoritarian leaders freed from democratic restraints." n616 The
benefits
derived by the United States from double government--enhanced technical expertise, institutional memory and experience,
quick-footedness, opaqueness in confronting adversaries, policy stability, and insulation from popular political oscillation and decisional
idiosyncrasy--need hardly be recounted. Those benefits, however, have not been cost-free. The price lies in wellknown risks flowing from centralized power, unaccountability, and the short-circuiting of power equilibria. Indeed, in this regard the Framers
thought less in terms of risk than certainty. John Adams spoke for many: "The nation which will not adopt an equilibrium of power must adopt a
despotism. There is no other alternative." n617 The trivial risk
of sudden despotism, of an abrupt turn to a police state or
dictatorship installed with coup-like surprise, has created a false [*113] sense of security in the United States. n618 That a
strongman of the sort easily visible in history could suddenly burst forth is not a real risk. The risk, rather, is the risk of slowly
tightening centralized power, growing and evolving organically beyond public view, increasingly
unresponsive to Madisonian checks and balances. Madison wrote, "There are more instances of the abridgment of the freedom of
the people by gradual and silent encroachments of those in power than by violent and sudden usurpations." n619 Recent history bears out his
insight. Dahl has pointed out that in the
20th century--the century of democracy's great triumph--some seventy
democracies collapsed and quietly gave way to authoritarian regimes. n620 That risk correlates with voter
ignorance; the term Orwellian has little meaning to a people who have never known anything different,
who have scant knowledge of history, civics, or public affairs, and who in any event have likely never heard of George
Orwell. "If a nation expects to be ignorant and free, in a state of civilization," Thomas Jefferson wrote, "it expects
what never was and never will be." n621 What form of government ultimately will emerge from the United
States' experiment with double government is uncertain. The risk is considerable, however, that it will not
be a democracy.
Courts = Movements – Opaque
Courts are key to effective movements – it maintains the opacity necessary for
effective deliberation
Peters, 2000 (Christopher J., Assistant Professor of Law, Wayne state University Law School, “Assessing the new judicial minimalism,”
Columbia Law review, 100 Colum. L. Rev. 1454, October)
Deliberation is not necessarily promoted by transparency; indeed, it is frequently hindered by it. This is a point that Sunstein
himself has made quite powerfully in the past. In The Partial Constitution, Sunstein sides with Madison against Jefferson in favor of the closing
of the Constitutional Convention in 1787: On Madison's view, it was best "to sit with closed doors, because opinions were so various and at
first so crude that it was necessary they should be long debated before any uniform system of opinion could be formed. Meantime the minds of
the members were changing, and much was to be gained by a yielding and accommodating spirit... By secret discussion no man felt
himself obliged to retain his opinions any longer than he was satisfied of their propriety and truth, and was open to
the force of argument." n187 Indeed, the Federalists thought that opacity was necessary for true democratic
deliberation. They distrusted open public discussion and, as James Martin has written, "believed that the public interactions and
debates that are a part of any democracy should take place via the representative mechanisms that operate
through the legal institutions of the state." n188 The relationship between the opacity and the quality of deliberation recently
surfaced in the debate over whether the Senate, sitting as a court of impeachment in the trial of President Clinton, should deliberate publicly or
behind closed doors. Some, like Iowa Senator Tom Harkin, opposed deliberations in "secret session" and argued that opening the debate
"would send an important message. The public has a right to know how the Senate reaches its final decision on the removal or acquittal of the
President." n189 Others, like Alabama Senator Richard Shelby, held a different view: "I think we explain[] to our constituents how we're going
to vote as we vote and afterwards... But I believe that the deliberations ought to be like every jury in America, they
ought to
be behind closed [*1497] doors where we can be candid...." n190 In the end, those advocating open-door deliberations failed to
achieve the two-thirds majority necessary to waive the Senate rule requiring secret debate. n191 Madison, Senator Shelby, and Sunstein
himself have recognized that the glare of the public spotlight is not conducive to the candidness and openmindedness necessary to true deliberation. This is so for the same reasons that support representative rather than direct democracy:
Public opinion may be raw, "based on inadequate information and on popular passions that are insufficiently influenced by reason-giving
and understanding of context." n192 Exposing important decisions, and the processes of making them, to instantaneous
and continuous public scrutiny threatens to infect representative democracy with the sorts of emotional, knee-jerk
tendencies it was designed to avoid. n193 This is especially so when the decisions to be made involve not simply policy
issues, but questions of individual rights against the majority. Writing of the dangers of referenda in the affirmative action context,
Sunstein notes the risk that "outcomes will not be based on a careful assessment of facts and values, but instead on crude 'we-they' thinking."
n194 This point can be generalized across all decisions involving individual rights. Questions of individual rights are inherently "we-they" affairs:
The majoritarian "we" is pitted against the individual or minority "they." True deliberation about such questions - decisionmaking characterized
by reason-giving, openness to opposing arguments, consideration of various relevant perspectives, and willingness to compromise - is made
difficult from the start in the political system, where the ultimate decisionmakers, the citizens, by definition have something to gain or to lose.
Deliberation is made all the more difficult when representatives are constantly bombarded, through public opinion
polls and the ever-more-massive media, by the self-interests they are supposed to be filtering. n195 [*1498] The
increasing transparency of politics stands in stark contrast to the opaque process of adjudicative decisionmaking.
Only very rarely, as in the O.J. Simpson case, does the actual process of adjudication attract significant public attention .
What publicity adjudication does draw invariably goes to the trial process, not to the appellate process, where law is made. Appellate court and
Supreme Court proceedings are not televised, and only the results of those proceedings tend to receive publicity (and then only
when they decide high-profile issues). And of course the actual deliberations of appellate courts invariably take place behind
closed doors. It is true, and important, that the tools of Supreme Court deliberation - briefs filed by the parties, and transcripts or recordings
of oral arguments - and the results of that deliberation - written opinions - usually are made public, more frequently and quickly than ever
these days. But these sources only confirm the extent to which adjudication is meticulously deliberative. Legal briefs, oral arguments, and court
opinions, unlike arguments made in the political realm, typically eschew entreaties to "public opinion" or "the public interest," instead replacing
them with arguments based on the interpretation of legal authorities. Briefs, arguments, and opinions also typically address the reasoning both
for and against the results they espouse. They are not allowed to be "supported by self-interest or force" n196 or to rely on "'naked
preferences.'" n197 They are models of "reason-giving in the public domain." n198 The quoted phrases in the previous paragraph are taken
from Sunstein's description of "deliberative democracy" in One Case at a Time. Remarkably, though, they describe the everyday adjudicative
process much more accurately than they describe the everyday political process. n199 This is because the adjudicative process is, in
these important ways, far more "deliberative" than politics typically can be. Part of the reason for this is the much-
maligned isolationism of the law - its insulation from worldly affairs, its persistent formalism, its self-referential
reliance only on appropriately pedigreed authorities. n200 Law in our system takes place behind [*1499] closed doors, away from
the public spotlight and with little regard for it. And this opacity may work to the judiciary's advantage in attracting public
trust; a recent survey indicates that the public has more "respect" for the Supreme Court than for the political branches. n201 It is strange,
then, that Sunstein sees judicial review primarily as a tool for increasing the deliberativeness of the political branches. Much of the point of
judicial review is that it is more deliberative than the political process, and thus better constituted to produce
decisions that require deliberation above all else. As I explain in the next section, the adjudicative brand of deliberation does
not lend itself to many kinds of decisionmaking that the political branches are good at. But it does lend itself to decisionmaking about
individual rights - when they exist, what they look like, how far they ultimately extend. Decisions about individual
rights are particularly poorly made in the spotlight, where they can be distorted by the very pressures that rights
are meant to stand against. They are better made by courts, which can, in the current phrase, "fly under the radar"
of public scrutiny.
Courts = Movements – Participation
Courts are key to the movement – they allow for active participation in lawmaking
Peters, 2000 (Christopher J., Assistant Professor of Law, Wayne state University Law School, “Assessing the new judicial minimalism,”
Columbia Law review, 100 Colum. L. Rev. 1454, October)
A fact too often overlooked is that these complementary elements - direct participation and indirect participation through representation - are
present not just in decisionmaking by the "political" branches of government, but in adjudication as well. Adjudication, even
constitutional adjudication, is driven primarily by the participation of the litigants, not by the court itself. n141 One
of the litigants (usually acting through counsel) initiates the case, by filing a lawsuit or a criminal prosecution. Each litigant
locates relevant facts and determines whether and how to present them to the court . Each litigant identifies relevant legal
authorities, synthesizes the facts and authorities into legal arguments, and makes those arguments to the court. When the court - meaning the
judge, or panel of judges - makes a decision on the merits, or indeed on procedural matters, that decision typically is responsive to the facts
presented and arguments made by the litigants. In most courts, dispositive decisions are memorialized and defended by
judges in written opinions, largely to ensure precisely this responsiveness. The role of the judge or judges in all of this
remains relatively passive, even under modern rules of procedure and evidence. It consists mostly of rendering a
decision that is responsive to the proofs and arguments. To the extent the judge's role extends beyond simply deciding the
substantive and procedural issues presented in the case by the litigants, it usually is limited to one or more of three kinds of activities: (1)
tending to scheduling and other docket-related matters; n142 (2) narrowing and clarifying the issues that will be contested at trial; n143 and (3)
encouraging settlement. n144 Moreover, these activities are primarily the province of trial judges, not of appellate panels. It is thus rather
narrowminded to think of adjudication as decisionmaking by judges. Adjudication is decisionmaking by judges and
litigants; the boundaries of a judge's or panel's decision are set by the decisions the litigants make with respect to what facts to present, what
arguments to [*1482] make, and how to present and make them. It is true, of course, that litigants often complain about judges ignoring what
they consider to be important facts or rejecting what they consider to be decisive arguments. Indeed, judges often do this. But judges are
subject to criticism when they do this - a point whose significance can hardly be overstated. n145 Judges do not write
their opinions without regard for whether they will be perceived as adequately responsive to what the litigants have done and said. Such
considerations surely are foremost in their minds. Nor do judges (for the most part) write opinions in which they make up facts, or rely upon
evidence not in the record, or rely upon evidence that they themselves have elicited outside the parties' own efforts, or even, in most cases,
rely upon legal arguments not urged by one of the parties. n146 Sunstein cheapens somewhat these de facto, institutionalized constraints on
the judicial role when he classifies judicial reason-giving as a "norm[] associated with legal craft." n147 Reason-giving is a norm
associated with legal (or, more to the point, judicial) craft the way the Hippocratic Oath is a norm associated with medical
craft; it is essential to the enterprise. Judicial reason-giving demonstrates whether, and to what degree, a court's
decision is responsive to the proofs and arguments presented by the litigants . And responsiveness to the proofs and
arguments presented by the litigants is the sine qua non of adjudication . n148 In this sense, judicial reason-giving is even more
vital than reason-giving in the political branches, a norm that Sunstein ranks highly . n149 Inadequately responsive
legislators can be removed from office through the electoral process; inadequately responsive federal judges
cannot be. Norms associated with legal craft are all there is to constrain them. [*1483] Adjudication, then, is a form
of government decisionmaking in which those bound by the decision have the opportunity to participate
meaningfully - in which the affected parties "are bound by something they helped to make." n150 This should sound
familiar, because in this sense adjudication incorporates the democratic ideal of self-government. Litigants bound by a court decision
have participated in that decision no less integrally - indeed, more integrally - than have most citizens bound by
congressional legislation or administrative rulemaking. The synthesizing presence of a judge in adjudication is no
more threatening to the fundamentally participatory nature of the process than is the synthesizing presence of
representatives to the process of political legislation. Nor is the judge's presence any more threatening to
participation than is the presence of majorities in the legislative chamber or the electorate, who must be
convinced to vote a certain way in order for the participation of a particular citizen to be effectual.
Download