Whistleblower Counterplan – Table of Contents

advertisement
Whistleblower Counterplan
RIUDL
Varsity Division
Whistleblower Counterplan – Table of Contents
Summary.............................................................................................................................................. 2
Glossary............................................................................................................................................... 3
First Negative Constructive (1NC) Shell ........................................................................................... 4
Solvency Extensions
AT: No Solvency – Overbroad Surveillance .......................................................................................... 5
AT: No Solvency – Internal Threat Surveillance.................................................................................... 6
AT: Solvency Turn – Collapses Hegemony........................................................................................... 7
AT: Solvency Turn – Leaks Destroy Foreign Relations ......................................................................... 8
AT: Solvency Turn – Decreased Capabilities ........................................................................................ 9
1|Page
Whistleblower Counterplan
RIUDL
Varsity Division
Summary
The Whistleblower Counterplan explains an alternative proposal to solve some of the problems
highlighted in the NSA PRISM Surveillance Affirmative position. Specifically, the counterplan
suggests that the United States Federal Government should offer protection to whistleblowers who
leak classified data. This protection would only be put in place, however, if the data that was leaked
could show that the government, or a member of the government, was doing something illegal. By
protecting whistleblowers, the government could now be held accountable for any illegal surveillance,
guaranteeing the effectiveness of existing oversight. By extension, if current oversight were now
effective, then the Affirmative plan of further restricting government surveillance would become
unnecessary.
The rest of the evidence allows the Negative team to defend its counterplan against Affirmative
attacks. For example, the counterplan allows the government to continue doing the surveillance that
is necessary to defend the public, but it no longer allows government agencies to abuse their
intelligence capabilities with overly invasive attacks on privacy. The counterplan evidence also
explains how Congressional action could prevent the failures of exempting classified documents from
past whistleblower laws. Whistleblowers would provide a level of transparency about government
wrongdoing that would encourage the international community to believe that the U.S. was making
progress in its surveillance practices. This would allow the government to get out in front of the
fallout from any leaks, thus avoiding disproportionate public and media response. The evidence
concludes by emphasizing that the NSA exaggerates the impact of leaks on national security,
showing that whistleblowing doesn’t have to be a practice that puts the public in danger from
international powers.
2|Page
Whistleblower Counterplan
RIUDL
Varsity Division
Glossary
Angela Merkel – A German politician and a former research scientist who has been the leader of the
Christian Democratic Union since 2000 and the Chancellor of Germany since 2005. She is the first
woman to hold either office. It was revealed to the world in 2013 that the NSA had tapped her mobile
phone.
Chelsea Manning – known before 2013 as Bradley Edward Manning – is a United States Army
soldier who was convicted in July 2013 of violations of the Espionage Act and other offenses, after
disclosing to WikiLeaks nearly three-quarters of a million classified or unclassified but sensitive
military and diplomatic documents.
Disclosure – The action of making new or secret information known.
Edward Snowden – An American computer contractor who leaked classified information from the
NSA in 2013. The information revealed numerous global surveillance programs, many run by the
NSA with the cooperation of telecommunication companies and European governments. As of 2015,
he was living in an undisclosed location in Russia while seeking asylum elsewhere.
FAA – FISA Amendments Act of 2008 – an Act of Congress that amended the Foreign Intelligence
Surveillance Act. It has been used as the legal basis for mass surveillance programs disclosed by
Edward Snowden in 2014, including PRISM.
Human Rights Watch – An international non-governmental organization that conducts research and
advocacy on human rights.
NGO – Non-governmental Organization – An organization that is neither a part of a government nor a
conventional for-profit business.
SOR Act and STA Act – The Surveillance Order Reporting Act and Surveillance Transparency Act of
2013 – Two proposed pieces of legislation that seek to give companies more options for disclosing
when and how often they received national security-related requests and provided data to the
government.
Transparency – The right and the means to examine the process of decision-making.
Whistleblower – A person who exposes any kind of information or activity that is deemed illegal,
dishonest, or not correct within an organization that is either private or public.
3|Page
Whistleblower Counterplan
RIUDL
Varsity Division
1NC Shell (1/1)
Counterplan: The United States Federal Government should offer protection to all
whistleblowers who leak classified data, if and only if such leaks provide evidence of
wrongdoing.
1. The Counterplan has the following net benefits: ____________________________________.
2. The Counterplan solves – Expanding whistleblower protection makes existing oversight
effective.
Schneier, 2015
(Fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at
the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier
Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief
Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 13)
Columbia law professor David Pozen contends that democracies need to be leaky— leaks and
whistleblowing are themselves security mechanisms against an overreaching government. In his
view, leaks serve as a counterpoint to the trend of overclassification and, ultimately, as a way for
governments to win back the trust lost through excessive secrecy. Ethnographer Danah Boyd has
called whistleblowing the civil disobedience of the information age; it enables individuals to fight back
against abuse by the powerful. The NGO Human Rights Watch wrote that “those who disclose official
wrongdoing … perform an important service in a democratic society…” In this way of thinking,
whistleblowers provide another oversight mechanism. You can think of them as a random surprise
inspection. Just as we have laws to protect corporate whistleblowers, we need laws to protect
government whistleblowers. Once they are in place, we could create a framework and rules for
whistleblowing legally. This would not mean that anyone is free to leak government secrets by
claiming that he’s a whistleblower. It just means that conscience-driven disclosure of official
wrongdoing would be a valid defense that a leaker could use in court—juries would have to decide
whether it was justified—and that reporters would legally be able to keep their sources secret. The
clever thing about this is that it sidesteps the difficult problem of defining “whistleblower,” and allows
the courts to decide on a case-by-case basis whether someone’s actions qualify as such or not.
Someone like Snowden would be allowed to return to the US and make his case in court, which—as I
explained in Chapter 7— currently he cannot. Additionally, we need laws that protect journalists who
gain access to classified information. Public disclosure in itself is not espionage, and treating
journalism as a crime is extraordinarily harmful to democracy.
4|Page
Whistleblower Counterplan
RIUDL
Varsity Division
AT: No Solvency – Overbroad Surveillance
[___]
[___] Congressional action to systematize whistleblowing can act as a check against abuses
without jeopardizing our intelligence capabilities.
Pozen, 2013
(Yale Law School, J.D., 2007 Oxford University, M.Sc., Comparative Social Policy (distinction), 2003
Yale College, B.A., Economics (summa cum laude), 2002, Columbia Law Professor, expert
surveillance legal analyst, (David, THE LEAKY LEVIATHAN: WHY THE GOVERNMENT
CONDEMNS AND CONDONES UNLAWFUL DISCLOSURES OF INFORMATION , SSRN)
The federal whistleblower statutes might be expected to comprise Congress’s longstanding failure to
confront the executive secrecy system must be understood in light of these institutional and member
level interests in leakiness. With some notable exceptions such as the bill vetoed by President Clinton
that would have strengthened the Espionage Act, 333 Congress has done little to address national
security leaks or the classification system that underlies them. A variety of committees have held
hearings on high-profile incidents, and the intelligence committees have recently mooted measures to
curb certain forms of planting and pleaking. But in general legislative action has been minimal for
decades. Of particular note, members have declined to make use of the protection afforded by the
Constitution’s Speech or Debate Clause334 to reveal, or threaten to reveal, executive branch
information without fear of criminal or civil liability.335 One might expect that a responsible legislature
would try to steer classified information leaks its way, so as to preserve legitimate secrecy while
providing an outside check on the executive.336 Congress has largely bypassed this approach, which
would force it to take greater responsibility over the revelations that emerge, and has instead
countenanced minimal enforcement against media leakers while directing all prospective
whistleblowers to their agency inspectors general in the first instance.337 Many members of
Congress seem quite content to be regular readers (and perhaps occasional purveyors) rather than
recipients of leaks. Systematic recourse to leaking emerges, once again, as the more efficient and
politically palatable alternative to systematic legal reform. Congress’s role in the ecosystem of
national security leaks is a large and complex subject. Certain congressional entities receive a steady
flow of classified information through official channels, supplemented by a side traffic in direct and
indirect unofficial disclosures. Agencies typically incur political risk if they try to limit this traffic by
clamping down on staffers’ communications with their oversight committees. Partisan motivations and
sincere good-governance sentiments sustain a perpetual interest on the Hill in leaks, along with a
ready-made rhetoric of crisis about their prevalence. The recent rise of a “commuter Congress,” in
which many members spend as little time as possible in Washington, may have helped strengthen
relationships between elite reporters and less peripatetic executive officials, shifting power to the
latter in the intragovernmental game of leaks.
5|Page
Whistleblower Counterplan
RIUDL
Varsity Division
AT: No Solvency – Internal Threat Surveillance
[___]
[___] Existing whistleblower laws fail only because of the classified information exemption.
Congressional action would prevent that.
Pozen, 2013
(Yale Law School, J.D., 2007 Oxford University, M.Sc., Comparative Social Policy (distinction), 2003
Yale College, B.A., Economics (summa cum laude), 2002, Columbia Law Professor, expert
surveillance legal analyst, (David, THE LEAKY LEVIATHAN: WHY THE GOVERNMENT
CONDEMNS AND CONDONES UNLAWFUL DISCLOSURES OF INFORMATION)
The federal whistleblower statutes might be expected to comprise the last major piece of the legal
framework, except that in the national security context they play a marginal role. Several laws protect
executive branch employees who disclose information regarding alleged abuses to designated
agency officials or congressional committees under specified procedures.63 But these laws offer
significantly less succor when it comes to classified information, are widely seen as confusing and
user-unfriendly, and under no circumstances permit disclosures directly to the press.64 These laws
also do not ensure against revocation of one’s security clearance,65 which in the national security
and foreign policy fields generally means loss of one’s job. And though the point is contestable, the
laws are fairly read to provide “absolutely zero protection” for those who publicly reveal classified
information, even as a last resort, and even when the information reveals illegal government
conduct.66 The vast majority of leakers have no interest in reporting wrongdoing in any event.67
Consequently, the whistleblower statutes tend to be ignored in the debate over classified information
leaking, apart from occasional calls to revise them. It is telling that in Jack Goldsmith’s recent booklength study of mechanisms that publicize and constrain the executive’s national security activities,
these laws are never once mentioned.
6|Page
Whistleblower Counterplan
RIUDL
Varsity Division
AT: Solvency Turn – Collapses Hegemony
[___]
[___] Surveillance transparency from leaks is key to preventing backlash over surveillance.
Schneier, 2015
(fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at the
New America Foundation's Open Technology Institute, a board member of the Electronic Frontier
Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief
Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 12)
Transparency is vital to any open and free society. Open government laws and freedom of
information laws let citizens know what the government is doing, and enable them to carry out their
democratic duty to oversee its activities. Corporate disclosure laws perform similar functions in the
private sphere. Of course, both corporations and governments have some need for secrecy, but the
more they can be open, the more we can knowledgeably decide whether to trust them. Right now in
the US, we have strong open government and freedom of information laws, but far too much
information is exempted from them. For personal data, transparency is pretty straightforward: people
should be entitled to know what data is being collected about them, what data is being archived about
them, and how data about them is being used—and by whom. And in a world that combines an
international Internet with country-specific laws about surveillance and control, we need to know
where data about us is being stored. We are much more likely to be comfortable with surveillance at
any level if we know these things. Privacy policies should provide this information, instead of being so
long and deliberately obfuscating that they shed little light. We also need transparency in the
algorithms that judge us on the basis of our data, either by publishing the code or by explaining how
they work. Right now, we cannot judge the fairness of TSA algorithms that select some of us for
“special screening.” Nor can we judge the IRS’s algorithms that select some of us for auditing. It’s the
same with search engine algorithms that determine what Internet pages we see, predictive policing
algorithms that decide whom to bring in for questioning and what neighborhoods to patrol, or credit
score algorithms that determine who gets a mortgage. Some of this secrecy is necessary so people
don’t figure out how to game the system, but much of it is not. The EU Data Protection Directive
already requires disclosure of much of this information. It may seem as if I am contradicting myself.
On one hand, I am advocating for individual privacy over forced surveillance. On the other, I am
advocating for government and corporate transparency over institutional secrecy. The reason I say
yes to both lies in the existing power imbalance between people and institutions. Institutions naturally
wield more power than people. Institutional secrecy increases institutional power, and that power
differential grows. That’s inherently bad for personal liberty. Individual privacy increases individual
power, thereby reducing that power differential. That’s good for liberty. It’s exactly the same with
transparency and surveillance. Institutional transparency reduces the power imbalance, and that’s
good. Institutional surveillance of individuals increases the power imbalance, and that’s bad.
7|Page
Whistleblower Counterplan
RIUDL
Varsity Division
AT: Solvency Turn – Leaks Destroy Foreign Relations
[___] Leaks are inevitable—the CP gets out in front of them. We can check abuses while still
controlling the fallout.
Schneier, 2015
(Fellow at the Berkman Center for Internet and Society at Harvard Law School, a program fellow at
the New America Foundation's Open Technology Institute, a board member of the Electronic Frontier
Foundation, an Advisory Board Member of the Electronic Privacy Information Center, and the Chief
Technology Officer at Resilient Systems, Inc (Bruce, Data and Goliath: the Hidden Battles to Collect
Your Data and Control Your World, Ch. 12)
Governments and corporations routinely resist transparency laws of all kinds. But the world of
secrecy is changing. Privacy-law scholar Peter Swire writes about a declining half-life of secrets.
What he observed is that, in general, secrets get exposed sooner than they used to. Technology is
making secrets harder to keep, and the nature of the Internet makes secrets much harder to keep
long-term. The push of a “send” button can deliver gigabytes across the Internet in a trice. A single
thumb drive can hold more data every year. Both governments and organizations need to assume
that their secrets are more likely to be exposed, and sooner, than ever before. One of the effects of a
shrinking half-life for secrets is that their disclosure is more damaging. One of Snowden’s documents
indicated that the NSA spied on the cell phone of German chancellor Angela Merkel. The document is
undated, but it’s obviously from the last few years. If that document had become public 20 years from
now, the reaction in Germany would have been very different from the public uproar that occurred in
2013, when Merkel was still in office and the incident was current events rather than historical.
Cultural changes are also making secrets harder to keep. In the old days, guarding institutional
secrets was part of a lifelong culture. The intelligence community would recruit people early in their
careers and give them jobs for life. It was a private men’s club, one filled with code words and secret
knowledge. The corporate world, too, was filled with lifers. Those days are gone. Many jobs in
intelligence are now outsourced, and there is no job-for-life culture in the corporate world anymore.
Workforces are flexible, jobs are outsourced, and people are expendable. Moving from employer to
employer is now the norm. This means that secrets are shared with more people, and those people
care less about them. Recall that five million people in the US have a security clearance, and that a
majority of them are contractors rather than government employees. There is also a greater belief in
the value of openness, especially among younger people. Younger people are much more
comfortable with sharing personal information than their elders. They believe that information wants
to be free, and that security comes from public knowledge and debate. They have said very personal
things online, and have had embarrassing photographs of themselves posted on social networking
sites. They have been dumped by lovers in public online forums. They have overshared in the most
compromising ways—and they survived intact. It is a tougher sell convincing this crowd that
government secrecy trumps the public’s right to know. These technological and social trends are a
good thing. Whenever possible, we should strive for transparency.
8|Page
Whistleblower Counterplan
RIUDL
Varsity Division
AT: Solvency Turn – Decreased Capabilities
[___]
[___] A New York Times incident proves that the NSA exaggerates the impact of leaks.
Currier, journalist with a focus on national security, foreign affairs, and human rights, 2015
(Cora Currier, “HOW THE NSA STARTED INVESTIGATING THE NEW YORK TIMES’
WARRANTLESS WIRETAPPING STORY”, The Intercept, 6/26/2015,
https://firstlook.org/theintercept/2015/06/26/nsa-started-investigating-new-york-times-originalwarrantless-wiretapping-story/)
Three days after the New York Times revealed that the U.S. government was secretly monitoring the
calls and emails of people inside the United States without court-approved warrants, the National
Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the
story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency
gave no specific examples of investigations that had been jeopardized. The December 2005
bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush
administration’s expansion of spying powers after the 9/11 attacks, and also about the Times editors’
decision to delay its publication for a year. White House officials had warned the Times that revealing
the program would have grave consequences for national security. The NSA’s damage assessment
on the article — referred to as a “cryptologic insecurity” — is among the files provided by former NSA
contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration
officials disclosed “certain details of the special program to select individuals from the New York
Times to dissuade them from publishing a story on the program at that time.” The memo gives a
general explanation of what terrorists might do in reaction to the information revealed. It was “likely”
that terrorists would stop using phones in favor of mail or courier, and use encryption and code
words. They could also plant false information, knowing the U.S. government was listening. But the
leaked program had not “been noted in adversary communications,” according to the memo. It gave
no specific examples of investigations or targets that had or might be impacted by the revelations.
“To this day we’ve never seen any evidence — despite all the claims they made to keep us from
publishing — that it did any tangible damage to national security. This is further confirmation of that,”
Lichtblau told The Intercept. “The reality was that the story told Americans what they didn’t know
about how the system was being stretched; it didn’t tell terrorists anything that they didn’t know, that
the U.S. was aggressively trying to gather their communications,” he said.
9|Page
Download