T-Domestic (SSRA) - Open Evidence Project

advertisement
T-Domestic (SSRA)
1NC
Interp-Domestic Surveillance finds non-public information about US Citizens.
Small 8 (Matthew, US Air Force Academy, “His Eyes are Watching You: Domestic Surveillance, Civil
Liberties and Executive Power during Times of National Crisis,” 2008,
http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf)//ghs-VA
Before one can make any sort of assessment of domestic surveillance policies, it is first necessary to
narrow the scope of the term “domestic surveillance.” Domestic surveillance is a subset of intelligence
gathering. Intelligence, as it is to be understood in this context, is “information that meets the stated or understood
needs of policy makers and has been collected, processed and narrowed to meet those needs” (Lowenthal 2006, 2). In essence,
domestic surveillance is a means to an end; the end being intelligence. The intelligence community
best understands domestic surveillance as the acquisition of nonpublic information concerning United
States persons (Executive Order 12333 (3.4) (i)). With this definition domestic surveillance remains an overly broad concept.
The SSRA repeals the 2008 FISA Amendments Act
U.S Congress 3/19/15 (https://www.congress.gov/bill/114th-congress/house-bill/1466/all-info “All
Bill Information (Except Text) for H.R.1466 - Surveillance State Repeal Act”)
Repeals the USA PATRIOT Act and the FISA Amendments Act of 2008 (thereby restoring or reviving
provisions amended or repealed by such Acts as if such Acts had not been enacted), except with respect
to reports to Congress regarding court orders under the Foreign Intelligence Surveillance Act of 1978
(FISA) and the acquisition of intelligence information concerning an entity not substantially composed of
U.S. persons that is engaged in the international proliferation of weapons of mass destruction.
The FISA Amendments Act of 2008 is surveillance of foreign persons
WSJ 08(The Wall Street Journal is a New York-based English-language international daily newspaper
with a special emphasis on business and economic news. “FISA Amendments Act of 2008”
http://www.wsj.com/articles/SB121391360949290049)
The FISA Amendments Act of 2008 provides critically important authority for the U.S. Intelligence
Community to acquire foreign intelligence information by targeting foreign persons reasonably
believed to be outside the United States. It ensures that the Intelligence Community has the flexibility
and agility it needs to identify and respond to terrorist and other foreign threats to our security.
Voting issue—
1. Limits – Would justify an infinite number of affs that curtail contracts between the
government and International organizations for surveillance which makes neg prep
impossible kills clash.
2. Topic Education – they move the debate away from the core of the topic which is
surveillance of U.S citizens within the country and the NSA.
3. Extra-topicality – Justifies any international untopical action, which kills neg prep
and causes a rush to generics.
2NC—FISA=Foreign
The FISA Amendments Act of 2008 is surveillance of foreign persons
WSJ 08(The Wall Street Journal is a New York-based English-language international daily newspaper
with a special emphasis on business and economic news. “FISA Amendments Act of 2008”
http://www.wsj.com/articles/SB121391360949290049)
The FISA Amendments Act of 2008 provides critically important authority for the U.S. Intelligence
Community to acquire foreign intelligence information by targeting foreign persons reasonably
believed to be outside the United States. It ensures that the Intelligence Community has the flexibility
and agility it needs to identify and respond to terrorist and other foreign threats to our security.
The SSRA repeals the FISA act, which conducts foreign surveillance; this is un-topical.
The wall between criminal and foreign investigations is murky.
DeRosa 05 (Mary, senior fellow in the Technology and Public Policy Program at the Center for Strategic and International Studies. Previously,
she served on the National Security Council staff. “Section 218. Amending the FISA Standard”
https://apps.americanbar.org/natsecurity/patriotdebates/section-218 7/6/05 crc)
Section 218 amends FISA by changing the certification requirement when the government seeks a FISA surveillance or search order. Previously,
the government was required to certify that "the
purpose" of the application was to obtain foreign intelligence
information. After section 218, the government must certify that obtaining foreign intelligence
information is "a significant purpose" of the application. This change was designed to promote information sharing
between intelligence and law enforcement officials and to eliminate what has become known as the "wall" that separated law enforcement
and intelligence investigations.¶ The FISA, passed in 1978, sets forth procedures for the conduct of electronic surveillance and physical searches
for foreign intelligence purposes. Over the years, the Department of Justice interpreted FISA's requirement that "the purpose" of collection be
foreign intelligence to restrict the use of FISA collection procedures when a law enforcement investigation was involved. The restriction was
designed to ensure that prosecutors and criminal investigators did not use FISA to circumvent the more rigorous warrant requirements for
criminal cases. But law
enforcement and foreign intelligence investigations often overlap, and enforcing this
separation between intelligence and law enforcement investigations—the "wall"—inhibited
coordination of these investigations and the sharing of foreign intelligence information with law
enforcement officials. The change to "significant purpose" was intended to clarify that no such separation is necessary.¶ It is not
clear whether the change in section 218 was legally necessary to eliminate the "wall." The Department of
Justice argued to the FISA Court of Review in 2002 that the original FISA standard did not require the
restrictions that the Department of Justice imposed over the years, and the court appears to have
agreed. This leaves the precise legal effect of a sunset of section 218 somewhat murky.
The 2008 FISA Amendments are a form of foreign surveillance
FISA Amendments Act of 2008( Text of the 2008 FISA Amendments Act
http://www.gpo.gov/fdsys/pkg/BILLS-110hr6304enr/pdf/BILLS-110hr6304enr.pdf)
there are procedures in place that have been approved, have been submitted for approval, or will be
submitted with the certification for approval by the Foreign Intelligence Surveillance Court that are
reasonably designed to— ‘‘(I) ensure that an acquisition authorized under subsection (a) is limited to
targeting persons reasonably believed to be located outside the United States
The foreign powers that are targeted by FISA are international, making SSRA untopical.
McCarthy 05 (Andrew, an attorney, and a Senior Fellow at the Foundation for the Defense of Democracies in Washington, DC, an organization
that conducts research and education in national security issues. “Section 218. Amending the FISA Standard”
https://apps.americanbar.org/natsecurity/patriotdebates/section-218 7/6/05 crc)
¶ The suggestion that a "foreign power"
under FISA could be any "political organization" comprised predominantly of non-citizens is
overwrought. One isn't told what Prof. Cole means by a "political organization"—Hezbollah, Hamas and Sinn Fein, for example, describe
the foreign powers FISA targets, by statutory definition, are those engaged in
clandestine intelligence gathering activities, sabotage or international terrorism. See 50 U.S.C. §§ 1801(b)(2)(A),
themselves as such—but
(C).¶ Atop his faulty premise that FISA is suspect, Prof. Cole piles the additional myth that Section 218 is suspect because it permits FISA
searches and surveillance "undertaken primarily for criminal law purposes." To the contrary, as the FISA Court of Review reasoned in its 2002
opinion, FISA as written never limited the government to searches whose primary purpose was intelligence gathering. By mandating that
intelligence gathering be "a primary purpose," Section 218 actually constrains the government in a way that neither the Fourth Amendment nor
FISA does. Given that FISA easily passes Fourth Amendment muster, a provision such as Section 218, which narrows it, a fortiori is not
constitutionally suspect.¶ Finally, Professor Cole's mythical account skews the history of the wall and the purpose of Section 218. Nobody is
saying FISA "mandated a 'wall' between law enforcement officials and intelligence agents"—and when I argued that FISA did not require a wall,
that palpably was an assertion, not, as Professor Cole oddly spins it, a "conce[ssion]." Yes, the wall was unnecessarily erected by the courts and
the Justice Department. But that it was a mistake did not make it any less real. And that there may have been cultural impediments to
intelligence sharing does not mean the structural ones manufactured by the wall were not critical.
Aff AT: T-Domestic
2AC
We meet—repealing SSRA curtails domestic surveillance
Buttar 13 (Shahid, a constitutional lawyer, grassroots organizer and executive director of the Bill of Rights Defense
Committee. “USA vs. NSA: Legislative Efforts to Curtail Spying” http://www.truth-out.org/news/item/18122-thensa-vs-usa 8/14/13 crc)
The sustained grass-roots uproar over domestic surveillance has reached the ear of Congress, which is
considering more than a dozen legislative measures to curtail the National Security Agency's various
programs that spy on Americans en masse. While most address merely the pieces of the problem, one in particular would
address the many facets hidden even in the wake of the Snowden leaks.¶ Even relative to the Leahy and Conyers-Amash proposals, the
widest-ranging bill among those pending in Congress is the "Surveillance State Repeal Act" (HR 2818)
introduced by Rep. Rush Holt, D-New Jersey, a former Princeton physics professor and former leader of the House Intelligence
Committee. The Holt bill, unlike any of the other measures proposed, would fully repeal the Patriot Act and
the 2008 FISA amendments in their entirety, essentially restoring limits on executive power and
unwinding the surveillance abuses of the George W. Bush and Obama administrations at once.¶ The first
two enjoy bipartisan support: the "FISA Accountability and Privacy Protection Act" (SB 1215), introduced by Senate Judiciary
Chairman Patrick Leahy, D-Vermont, as well as the Libert-E Act (HR 2399), co-sponsored by Reps. John Conyers, D-MI, and Justin Amash, R-MI.
Both bills would curtail powers extended in the FISA amendments of 2008, as well as portions of the
Patriot Act.
The FISA amendment act pertains to domestic surveillance
Cato institute 12- (“The Surveillance Iceberg: The FISA Amendments Act and Mass Spying without
Accountability”) http://www.cato.org/events/surveillance-iceberg-fisa-amendments-act-mass-spyingwithout-accountability
History teaches that government spying is naturally subject to abuse without strong oversight, yet only
the tiniest fraction of electronic surveillance of Americans—the tip of a vast and rapidly growing
iceberg—is meaningfully visible to Congress, let alone the general public. Under the controversial FISA
(Foreign Intelligence Surveillance Act) Amendments Act of 2008, set to expire at the end of the year, the
National Security Agency is empowered to vacuum up the international communications of Americans
under sweeping authorizations that dispense with the need for individual warrants. Despite reports of
large-scale overcollection of Americans’ e-mails and phone calls, including purely domestic traffic,
the NSA has brazenly refused to give Congress any estimate of how many citizens’ private conversations
are being captured in its vast databases, and legislators have shown little willingness to demand greater
transparency as they prepare to reauthorize the law. Increasingly, even ordinary criminal investigations
employ off-the-books electronic surveillance techniques that circumvent federal reporting
requirements. The public is informed about the few thousand wiretaps authorized every year but
remains largely in the dark about newer and far more prevalent techniques, such as the routine use of
cell phones as sophisticated tracking devices.
Counter-interpretation—domestic means related to
Merriam Webster Online Dictionary NO DATE(http://www.merriam-webster.com/dictionary/domestic)
: of, relating to, or made in your own country : relating to or involving someone's home or family :
relating to the work (such as cooking and cleaning) that is done in a person's home
Prefer our interpretation
A. Limits- The AFF only being only restricted to the word domestic opens the doors up to plenty of
clash. The negative has more the enough time to prep for any plan that is only affecting the U.S.
Now we are only allowed to being up any AFFS within the resolution.
B. Topic education- Under our interpretation we are only surveiling the U.S citizens. We are not
surveiling anyone else. We are debating about the core topic here so the negative doesn’t lose
education.
Reasonability- All the AFF has to do is prove that we meet enough. Reasonability is
better because
A. There will be no need to debate interpretations. Debating the interpretations just
promotes lazy negative debating.
We Meet
We meet-FISA surveils Americans’ International calls but the calls themselves are still
domestic
ACLU No Date( The American Civil Liberties Union (ACLU) is a nonpartisan, non-profit
organizationwhose stated mission is "to defend and preserve the individual rights and liberties
guaranteed to every person in this country by the Constitution and laws of the United States."[7] It
works through litigation, lobbying, and community empowerment. “FIX FISA - END WARRANTLESS
WIRETAPPING” https://www.aclu.org/fix-fisa-end-warrantless-wiretapping)
The FISA Amendments Act, passed in 2008 and reauthorized in 2012, gives the National Security Agency
almost unchecked power to monitor Americans’ international phone calls and emails. On October 29,
2012, the Supreme Court heard arguments in the ACLU’s challenge to the law. In February 2013, the
Supreme Court dismissed the ACLU's lawsuit. The Foreign Intelligence Surveillance Act (FISA), enacted by
Congress after the abuses of the 1960s and 70s, regulates the government’s conduct of intelligence
surveillance inside the United States. It generally requires the government to seek warrants before
monitoring Americans’ communications. In 2001, however, President Bush authorized the NSA to launch
a warrantless wiretapping program, and in 2008 Congress ratified and expanded that program.
We meet-FISA is domestic surveillance
Granick 12( Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and
Society. Jennifer returns to Stanford after working with the internet boutique firm of Zwillgen PLLC.
Before that, she was the Civil Liberties Director at the Electronic Frontier Foundation. Jennifer practices,
speaks and writes about computer crime and security, electronic surveillance, consumer privacy, data
protection, copyright, trademark and the Digital Millennium Copyright Act. From 2001 to 2007, Jennifer
was Executive Director of CIS and taught Cyberlaw, Computer Crime Law, Internet intermediary liability,
and Internet law and policy. Before teaching at Stanford, Jennifer spent almost a decade practicing
criminal defense law in California. “THE FISA AMENDMENTS ACT AUTHORIZES WARRANTLESS SPYING
ON AMERICANS” http://cyberlaw.stanford.edu/blog/2012/11/fisa-amendments-act-authorizeswarrantless-spying-americans)
By contrast, the FAA allows surveillance of a foreign entity without specifying the people to be
monitored or the facilities, places, premises, or property at which surveillance will be directed. Because
the target can be any foreign entity, the government can direct surveillance at any facility, even those
on American soil, and monitor unspecified Americans’ international communications to or from
suspected agents of the foreign entity, or even about that entity. However, the government may not
target Americans or intentionally acquire purely domestic communications.
SSRA=Domestic Surveillance
the SSRA specifically solves for domestic surveillance.
Greenwald & Hussain 14 (Glenn, a journalist, constitutional lawyer, and author of four New York Times best-selling books on politics and law.
Murtaza Hussain is a journalist and political commentator. His work focuses on human rights, foreign policy, and cultural affairs.
“Meet the Muslim American leaders the NSA has been spying on” https://firstlook.org/theintercept/2014/07/09/under-surveillance/ 7/9/14
crc)
The individuals appear on an NSA spreadsheet in the Snowden archives called “FISA recap”—short for the
Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the topsecret Foreign Intelligence Surveillance Court that there is probable cause to believe that American
targets are not only agents of an international terrorist organization or other foreign power, but also
“are or may be” engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by
the court, usually every 90 days for U.S. citizens.
Neolib K
Neolib Link—SSRA
Neoliberalism has created an expository society—to ensure profit, public and private
actors work to move populations online into “digital amusement parks” to maximize
consumption—curtailing surveillance isn’t the solution, because surveillance isn’t the
problem—the problem is we willingly disclose personal information online in order to
exist in our digitized neoliberal age—the underlying goal of the aff is to distract
citizens with false promises of cyber-security in order to continue the flow of
consumers into their digital theme parks
Harcourt, Professor of Law at Columbia University, 14
Bernard, His scholarship intersects social and political theory, the sociology of punishment, and penal
law and procedure, served most recently as the Julius Kreeger Professor of Law and Political Science at
The University of Chicago, “Digital Security in the Expository Society: Spectacle, Surveillance, and
Exhibition in the Neoliberal Age of Big Data”, SSRN,
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2455223
How then do we conceptualize and visualize relations of power in our digitized neoliberal age?
Both of the classic forms—spectacle and surveillance—seem no longer adequate
Where can we find
the architectural schematic to understand digital security?
,
and to be honest, the contrast between the two may well have been drawn too sharply. As W.J.T. Mitchell presciently observes in The Spectacle Today, neither term can possibly be understood as mutually exclusive in our contemporary condition; rather, spectacle and surveillance should
both forms—spectacle and surveillance—are
overshadowed or surpassed today
by a third: exposure, or exposition, or, perhaps better,
the exhibition. Today, we are not coerced into revealing our most intimate desires.
No, we are not
being surveilled today, so much as we are exposing or exhibiting ourselves knowingly and willingly
The relation is now inversed: we, digital subjects, we homo digitalis, we “digital persons,”
we give ourselves up happily, voluntarily, in a mad frenzy of disclosure.
to become ourselves
be seen, as Mitchell explains, as “dialectical forces in the exertion of power and resistance to power.”54 I would go further, though, and suggest that
, or ought to be complemented,
There is no telescreen forcibly anchored into the wall
of our apartments that we cannot turn off,55 nor are we forcibly detained in a see-through cell within the omnipresent view of a central watchtower. We are neither forced into the arena, nor compelled to reveal our most intimate desires.56
, with all
our love, lust, and passion.
57
We expose our most intimate details in play, in love, in desire, in consumption, in a
stream of texts, Tweets, emoticons and Instagrams, e-mails and Snapchats, Facebook posts, links, shares and likes—throughout our digital lives, in our work, for our political convictions, to satisfy our appetites,
. Even those of us
who do not partake in the rich world of social media have no alternative but to share our intimate lives and political views in texts, e-mails, and Skype conversations—knowing that we are exposing ourselves. We write love notes and political comments, we share intimate photos and
our digital
existence is our life—it is practically the pulse, the bloodstream, the very current of our daily routines.
We need to be plugged not just to feel fully alive, but to be human
we live in the expository society
inside jokes, we throw ourselves onto the screen in our virtual spectacular forms—often wishing more than anything to be seen, to be “liked,” to feel connected, or simply because it is the only way to communicate today. For most of us,
, all too human. Guy Debord spoke of “the society of the spectacle.” Foucault drew our attention
instead to “the punitive society.” But it seems as if, today,
. How then can we visualize the architecture of this society of the exhibition? And recall that there are two key stages to visualize: first, the
neoliberal moment, with its mix of private and public, of consumption and consumerism, of responsibilization and reregulation , of maximizing and minimizing; and second, the digitization of every aspect of the neoliberal paradigm—digital security. Let’s turn first to the neoliberal aspect.
How can we schematize relations of power in our neoliberal condition? What I would propose, as the
architectural schema that best captures the neoliberal moment, is the amusement park
A private commercial space, for profit, that has been underwritten and made possible by state
and municipal governments. A mixed private-public space—or perhaps, more accurately, a space of
private profit and public expenditures—that practices a form of management or control of flows of
populations, to maximize the number of visitors, to attract more advertising, to stimulate
consumption, to facilitate spending. These are quintessential spaces that seek to optimize the
movement of large populations in order to maximize their consumption, while at the same time
minimizing labor and other expenditures. This is not just a spectacle, because everything is scattered.
The goal is to
avoid amassing consumers on any one spectacle. The goal is to
manage the patience of consumers who want to see, but who are never
sitting in the arena
surveillance goes on
The watchful eye is
everywhere That is what renders Disneyland so popular—the feeling that everything is monitored,
that everything is secure, that the children, or rather the parents have nothing to fear. There is
or the theme park—or more generally,
the themed space.
distribute, not concentrate, the population. To
optimize and redirect
queues, to make them feel shorter than they are, to learn how to
never,
. To be sure,
.
, in fact,
, in fact,
; but that is only one dimension of the endeavor. There are, naturally, a large number of CCTV cameras.
, or almost
continuous surveillance, but not in a panoptic form. We do not internalize the gaze, we are reassured
by it.
Neolib Alt—SSRA
The alternative solves best—both teams agree that the state depends on private
corporate services for surveillance—we need critical frameworks that consider NOT
ONLY the domestic security apparatus, but the international capitalist formations that
motivate neoliberal abuses of state intelligence for private gains
Price, Professor of Anthropology, 14
David, Professor of Anthropology in the Department of Society and Social Justice at Saint Martin’s
University, “The New Surveillance Normal”, Monthly Review, July-August 2014,
https://monthlyreview.org/2014/07/01/the-new-surveillance-normal/
Convergence of State and Corporate Metadata Dreams¶ The past two decades brought an accelerated independent growth of corporate and
governmental electronic surveillance programs tracking metadata and compiling electronic dossiers. The NSA, FBI, Department of Defense, and
CIA’s metadata programs developed independently from, and with differing goals from, the consumer surveillance systems that used cookies
and consumer discount cards, sniffing Gmail content, compiling consumer profiles, and other means of tracking individual Internet behaviors
for marketing purposes. Public acceptance of electronic monitoring and metadata collection transpired incrementally, with increasing
acceptance of corporate-based consumer monitoring programs, and reduced resistance to governmental surveillance.¶ These two
surveillance tracks developed with separate motivations, one for security and the other for commerce,
but both desire to make individuals and groups legible for reasons of anticipation and control. The
collection and use of this metadata finds a synchronic convergence of intrusions, as consumer capitalism
and a U.S. national security state leaves Americans vulnerable, and a world open to the probing and
control by agents of commerce and security. As Bruce Schneier recently observed, “surveillance is still the business model of
the Internet, and every one of those companies wants to access your communications and your metadata.”7¶ But this convergence carries its
own contradictions. Public trust in (and the economic value of) cloud servers, telecommunications providers, email, and search engine services
suffered following revelations that the public statements of Verizon, Google, and others had been less than forthright in declaring their claims
of not knowing about the NSA monitoring their customers. A March 2014 USA Today survey found 38 percent of respondents believed the NSA
violates their privacy, with distrust of Facebook (26 percent) surpassing even the IRS (18 percent) or Google (12 percent)—the significance of
these results is that the Snowden NSA revelations damaged the reputations and financial standing of a broad range of technology-based
industries.8 With
the assistance of private ISPs, various corporations, and the NSA, our metadata is
accessed under a shell game of four distinct sets of legal authorizations. These allow spokespersons
from corporate ISPs and the NSA to make misleading statements to the press about not conducting
surveillance operations under a particular program such as FISA, when one of the other authorizations is
being used.9¶ Snowden’s revelations reveal a world where the NSA is dependent on private corporate
services for the outsourced collection of data, and where the NSA is increasingly reliant on corporate
owned data farms where the storage and analysis of the data occurs. In the neoliberal United States, Amazon
and other private firms lease massive cloud server space to the CIA, under an arrangement where it
becomes a share cropper on these scattered data farms. These arrangements present nebulous security relationships
raising questions of role confusion in shifting patron–client relationships; and whatever resistance corporations like Amazon
might have had to assisting NSA, CIA, or intelligence agencies is further compromised by relations of
commerce. This creates relationships of culpability, as Norman Solomon suggests, with Amazon’s $600 million CIA data farm contract: “if
Obama orders the CIA to kill a U.S. Citizen, Amazon will be a partner in assassination.”10 Such arrangements
diffuse complicity in ways seldom considered by consumers focused on Amazon Prime’s ability to speedily deliver a My Little Pony play set for a
brony nephew’s birthday party, not on the company’s links to drone attacks on Pakistani wedding parties.¶ The Internet developed first as a
military-communication system; only later did it evolve the commercial and recreational uses distant from the initial intent of its Pentagon
landlords. Snowden’s revelations reveal how the
Internet’s architecture, a compromised judiciary, and duplexed
desires of capitalism and the national security state are today converging to track our purchases,
queries, movements, associations, allegiances, and desires. The rise of e-commerce, and the soft addictive allure of social
media, rapidly transforms U.S. economic and social formations. Shifts in the base are followed by shifts in the superstructure, and new
generations of e-consumers are socialized to accept phones that track movements, and game systems that bring cameras into the formerly
private refuges of our homes, as part of a “new surveillance normal.”11¶ We
need to develop critical frameworks
considering how NSA and CIA surveillance programs articulate not only with the United States’
domestic and international security apparatus, but with current international capitalist formations.
While secrecy shrouds our understanding of these relationships, CIA history provides examples of some ways that
intelligence operations have supported and informed past U.S. economic ventures. When these historical
patterns are combined with details from Snowden’s disclosures we find continuities of means, motive,
and opportunity for neoliberal abuses of state intelligence for private gains.
Download