Cloud Advantage Neg - SpartanDebateInstitute

advertisement
Cloud Advantage Neg
Uniqueness
Squo Solves
Companies resolve perception link in the status quo
Kendrick 15 (Katharine Kendrick is a policy associate for Internet communications technologies at the
NYU Stern Center for Business and Human Rights., 2.19.15, “Risky Business: Data Localization”
http://www.forbes.com/sites/realspin/2015/02/19/risky-business-data-localization/, ekr)
U.S. companies’ eagerness to please the EU affects their leverage in a place like Russia or China, and undermines their principled calls for a global Internet. Just as
we’ve seen the emergence of company best practices to minimize how information is censored, we need best practices to minimize risks in where it is stored.
Companies should take the following steps: Avoid localizing in a repressive country whenever possible. When Yahoo! entered Vietnam, to meet performance needs
without enabling the government’s Internet repression, it based its servers in Singapore. Explore global solutions. Companies
like Apple and
Google have started encrypting more data by default to minimize inappropriate access by any
government. This doesn’t solve everything, but it’s a step forward for user privacy. Minimize exposure. If you
must have an in-country presence, take steps to minimize risk by being strategic in what staff and services you locate there. Embrace transparency. A
growing number of companies have increased transparency by issuing reports on the number of
government requests they receive. They should also publish legal requirements like localization, so that people understand the underlying risks
to their data. Work together. Companies should coordinate advocacy in difficult markets through organizations like the Global Network Initiative. Tech
companies can take a proactive, collective approach, rather than responding reactively when their
case hits the headlines. We can only expect localization demands to increase—and business pressures to pull in the opposite direction. While
the political dynamics have shifted, companies should still have respect for human rights—and the
strength of the global Internet—at the forefront of decisions over where to store their data.
Freedom Act Solves
Status Quo Freedom Act sufficient
CEA 15 (June 2, 2015, “Washington: CEA Praises Senate Passage of USA FREEDOM Act”
http://www.ce.org/News/News-Releases/Press-Releases/2015-Press-Releases/CEA-Praises-SenatePassage-of-USA-FREEDOM-Act.aspx, ekr)
The Consumer Electronics Association has issued the following news release: The following statement is attributed to Michael Petricone, senior vice
president of government and regulatory affairs, Consumer Electronics Association (CEA)®, regarding the U.S. Senate’s passage of H.R.
2048, the Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring (USA FREEDOM) Act of 2015: “We
welcome this important reform to U.S. intelligence gathering which takes critical steps to increase
transparency and restore trust in American businesses, all while maintaining our commitment to
preserving our national security. The bipartisan USA FREEDOM Act is common-sense reform to our nation’s intelligence gathering
programs, which will preserve American businesses’ competitiveness worldwide, while continuing to protect our national
security. “Following the Senate passage, the legislation now heads to the White House, where we anticipate swift action by President Obama to sign this legislation
into law.”
New Freedom Act is sufficient to solve US’s global credibility gap.
HRW ‘15
Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human
dignity and advance the cause of human rights for all. “Strengthen the USA Freedom Act” - May 19, 2015 http://www.hrw.org/news/2015/05/19/strengthen-usa-freedom-act
As the Senate considers the USA Freedom Act this week, policymakers should strengthen it by limiting large-scale collection of records and reinforcing transparency
and carrying court reforms further. The
Senate should also take care not to weaken the bill, and should reject any
amendments that would require companies to retain personal data for longer than is necessary for business purposes. It has been two years since the
National Security Agency (NSA) whistleblower Edward Snowden unleashed a steady stream of documents that exposed the intention by the United States and the
United Kingdom to “collect it all” in the digital age. These revelations demonstrate how unchecked surveillance can metastasize and undermine democratic
institutions if intelligence agencies are allowed to operate in the shadows, without robust legal limits and oversight.
Representatives approved
On May 13, the US House of
the USA Freedom Act of 2015 by a substantial margin. The bill represents the latest attempt by Congress to rein in
one of the surveillance programs Snowden disclosed—the NSA’s domestic bulk phone metadata collection under Section 215 of the USA Patriot Act. The House vote
followed a major rebuke to the US government by the US Court of Appeals for the Second Circuit, which ruled on May 7 that the NSA’s potentially nationwide
dragnet collection of phone records under Section 215 was unlawful. Section 215 is set to expire on June 1 unless Congress acts to extend it or to preserve specific
powers authorized under the provision, which go beyond collection of phone records. Surveillance reforms are long overdue and can be accomplished while
protecting US citizens from serious security threats. Congress and the Obama administration should end all mass surveillance programs, which unnecessarily and
disproportionately intrude on the privacy of hundreds of millions of people who are not linked to wrongdoing. But reforming US laws and reversing an increasingly
global tide of mass surveillance will not be easy. Many of the programs Snowden revealed are already deeply entrenched, with billions of dollars of infrastructure,
contracts, and personnel invested. Technological capacity to vacuum up the world’s communications has outpaced existing legal frameworks meant to protect
privacy. The Second Circuit opinion represents an improvement over current law because it establishes that domestic bulk collection of phone metadata under
Section 215 of the Patriot Act cannot continue. Section 215 allows the government to collect business records, including phone records, that are “relevant” to an
authorized investigation. The court ruled that the notion of “relevance” could not be stretched to allow intelligence agencies to gather all phone records in the US.
However, the opinion could be overturned and two other appeals courts are also considering the legality of the NSA’s bulk phone records program. The opinion also
does not address US surveillance of people not in the US. Nor does it question the underlying assumption that the US owes no privacy obligations to people outside
its territory, which makes no sense in the digital age and is inconsistent with human rights law requirements. Even if the Second Circuit opinion remains good law,
congressional action will be necessary to address surveillance programs other than Section 215—both domestic and those affecting people outside the US—and to
create more robust institutional safeguards to prevent future abuses. The courts cannot bring about reforms to increase oversight and improve institutional
oversight on their own. Human
Rights Watch has supported the USA Freedom Act because it is a modest, if
incomplete, first step down the long road to reining in the NSA excesses. Beyond ending bulk records collection, the bill would begin to reform the
secret Foreign Intelligence Surveillance Act (FISA) Court, which oversees NSA surveillance, and would introduce new transparency measures to improve oversight. In
passing the bill, the House of Representatives also clarified that it intends the bill to be consistent with the Second Circuit’s ruling, so as to not weaken its findings.
The bill is no panacea and, as detailed below, would not ensure comprehensive reform. It still leaves open the possibility of
large-scale data collection practices in the US under the Patriot Act. It does not constrain surveillance under Section 702 of the FISA Amendments Act nor Executive
Order 12333, the primary legal authorities the government has used to justify mass surveillance of people outside US borders. And the bill does not address many
modern surveillance capabilities, from mass cable tapping to use of malware, intercepting all mobile calls in a country, and compromising the security of mobile SIM
cards and other equipment and services.
Nonetheless, passing a strong USA Freedom Act would be a long-overdue step in the
right direction. It would show that Congress is willing and able to act to protect privacy and impose oversight
over intelligence agencies in an age when technology makes ubiquitous surveillance possible. Passing this bill would also help shift
the debate in the US and globally and would distance the United States from other countries that
seek to make mass surveillance the norm. On a global level, other governments may already be
emulating the NSA’s approach, fueling an environment of impunity for mass violations of privacy. In the last year,
France, Turkey, Russia, and other countries have passed legislation to facilitate or expand large-scale
surveillance. If the USA Freedom Act passes, it would be the first time Congress has affirmatively
restrained NSA activities since the attacks of September 11. Key supporters of the bill have vowed to take up reforms to
other laws next, including Section 702 of the FISA Amendments Act.
Cloud Growth Now
Cloud computing growing now, multiple projections and predictive evidence prove
Columbus ’15 – Louis Columbus, Forbes journalist specializing in CRM, Cloud Computing,
ERP and Enterprise Software, Vice President Worldwide Marketing at iBASEt, Adjunct
Professor Webster University, (“Roundup Of Cloud Computing Forecasts And Market
Estimates, 2015” Jan 24 2015, Forbes, Available Online at
http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloud-computingforecasts-and-market-estimates-2015/) N.H
Global SaaS software revenues are forecasted to reach $106B in 2016, increasing 21% over projected 2015 spending levels.
A Goldman
Sachs study published this month projects that spending on cloud computing infrastructure and
platforms will grow at a 30% CAGR from 2013 through 2018 compared with 5% growth for the overall
enterprise IT.
Centaur Partners and other firms mentioned in this roundup are seeing more enterprise-size deals for
cloud computing infrastructure and applications. While each of these consultancies and research firms
have varying forecasts for the next few years, all agree that cloud computing adoption is accelerating
in enterprises on a global scale.
Key take-aways from the roundup are provided below:
By 2018, 59% of the total cloud workloads will be Software-as-a-Service (SaaS) workloads, up from 41% in
2013. Cisco is predicting that by 2018, 28% of the total cloud workloads will be Infrastructure-as-a-Service
(IaaS) workloads down from 44% in 2013. 13% of the total cloud workloads will be Platform-as-a-Service (PaaS) workloads in 2018, down from
15% in 2013. The following graphic provides a comparative analysis of IaaS, PaaS and SaaS forecasts from 2013 to 2018. Source: Cisco Global
Cloud Index: Forecast and Methodology, 2013–2018. (PDF, free, no opt-in).
Centaur Partners’ analysis of SaaS & cloud-based business application services revenue forecasts the market growing from $13.5B in 2011 to
$32.8B in 2016, attaining a 19.5% CAGR. Centaur provides a useful overview of current market conditions including M&A activity in their latest
market overview published this month, Introduction to Centaur Partners: SaaS Market Overview, (PDF, free, no opt-in). 42% of IT decision
makers are planning to increase spending on cloud computing in 2015, with the greatest growth in enterprises with over 1,000 employees
(52%). The top five tech spending increases in 2015 are shown in the following graphic. Source: Computerworld’s 2015 Forecast Predicts
Security, Cloud Computing And Analytics Will Lead IT Spending.
Global SaaS software revenues are forecasted to reach $106B in 2016, increasing 21% over projected 2015 spending levels.
Spending on
integration, storage management, and database management systems are projected to experience
the greatest growth in 2015. These and other key insights are from Forrester’s SaaS software subscription revenue by category show
below. Source: Enterprise software spend to reach $620 billion in 2015: Forrester.
$78.43B in SaaS revenue will be generated in 2015, increasing to $132.57 in 2020, attaining a compound annual growth rate (CAGR) of 9.14%.
The following graphic and table provides an overview of Forrester’s Global Public Cloud Computing market size analysis and forecast for the
years 2011 to 2020. Source: Institut Sage.
Spending on cloud computing infrastructure and platforms is expected to grow at a 30% CAGR from 2013 through 2018 compared with 5%
growth for the overall enterprise IT. Goldman Sachs estimates that Amazon has taken in $4B in revenue, or 26% of the IaaS and PaaS markets,
in the past 12 months. These and other insights and the graphics below are from an analysis of the recent Goldman Sachs cloud computing
report. Thank you Michael Coté, Research Director, Infrastructure Software at 451 Research for freely sharing your latest presentation, Cloud
State of the Union, 2015. Additional interesting links regarding Goldman Sachs’ recent cloud computing study include Battle Of Cloud Titans Has
Just Begun, Goldman Says and Red Hat: Goldman Cuts to Sell Amidst Bullish Cloud View.
Security (36%), cloud computing (31%) and mobile devices (28%) are the top 3 initiatives IT executives
are planning to have their organizations focus on over the next 12 months. Source: 2015 State of the Network
Study, Technology Adoption Trends & Their Impact on the Network (free PDF, no opt in). A summary of the study can be found here: State of
the Network 2015.
IDC predicts that by 2016, there will be an 11% shift of IT budget away from traditional in-house IT
delivery, toward various versions of cloud computing as a new delivery model. By 2017, 35% of new
applications will use cloud-enabled, continuous delivery and enabled by faster DevOps life cycles to streamline rollout
of new features and business innovation. Source: 2015-2017 Forecast: Cloud Computing to Skyrocket, Rule IT Delivery.
By 2018, IDC forecasts that public cloud spending will more than double to $127.5 billion. This forecast is
broken down as follows: $82.7 billion in SaaS spending, $24.6 billion for IaaS and $20.3 billion in PaaS expenditures. Source: Forecasts Call For
Cloud Burst Through 2018.
27.8% of the worldwide enterprise applications market will be SaaS-based, generating $50.8B in revenue up from $22.6B or
16.6% of the market in 2013. IDC also estimates the overall enterprise applications market in 2013 was $135.9B. Source: IDC
Predicts SaaS Enterprise Applications Will Be A $50.8B Market By 2018.
By
2016 over 80% of enterprises globally will using IaaS, with investments in private cloud computing
showing the greater growth. Ovum forecasts that by 2016, 75% of EMEA-based enterprises will be using IaaS. These and other
insights are from the presentation, The Role of Cloud in IT Modernisation: The DevOps Challenge (free PDF, no opt in). The graphic below
provides an analysis of cloud computing adoption in EMEA and globally.
Cloud computing growing in squo
McCue 14 –[TJ McCue, Forbes Technology contributor/journalist, (“Cloud Computing:
United States Businesses Will Spend $13 Billion On It” JAN 29, 2014, Forbes Tech,
Available Online at http://www.forbes.com/sites/tjmccue/2014/01/29/cloudcomputing-united-states-businesses-will-spend-13-billion-on-it/) N.H
Instead of a slow-moving fluffy white cloud image, the cloud computing industry should use a tornado
– that might be a better way to visualize how fast cloud computing is growing today. Amazon is
dominating, but is followed by the usual suspects: IBM IBM +2.40%, Apple AAPL +2.44%, Cisco, Google
GOOG +1.80%, Microsoft MSFT +0.00%, Salesforce, and Rackspace, to name a few. (Disclosure: I am on
the paid blogger team for IBM Midsize Insider, which covers technology pertinent to midsize companies,
including the cloud, among other topics.)
“The cloud” is frequently in the news, but there is also a fair amount of confusion, outside of technology
teams. What is cloud computing and why do businesses need to care? IBM published this handy
infographic: 5 Reasons Businesses Use The Cloud. Among the reasons: Collaboration, better access to
analytics, increasing productivity, reducing costs, and speeding up development cycles.
By 2015, end-user spending on cloud services could be more than $180 billion.
It is predicted that the global market for cloud equipment will reach $79.1 billion by 2018
If given the choice of only being able to move one application to the cloud, 25% of respondents would
choose storage
By 2014, businesses in the United States will spend more than $13 billion on cloud computing and
managed hosting services.
According to Jack Woods at Silicon Angle, there’s some serious growth forecasted and he lists 20 recent
cloud computing statistics you can use to make your case for why you need the cloud or to understand
why you should consider it for your business. The above bullet points come from his post.
Massive growth of cloud computing in squo- especially true in the American context
Woods 14 – Jack Woods, cloud market contributor and journalist at siliconeangle, (“20
cloud computing statistics every CIO should know” Jan 27 14, available online at
http://siliconangle.com/blog/2014/01/27/20-cloud-computing-statistics-tc0114/) N.H
20 Cloud Computing Stats Every CIO Should Know . 1. By 2015, end-user spending on cloud
services could be more than $180 billion (Tweet this) . 2. It is predicted that the global market for
cloud equipment will reach $79.1 billion by 2018 (Tweet this) . 3. If given the choice of only being
able to move one application to the cloud, 25% of respondents would choose storage
(Tweet this) . 4. By 2014, businesses in the United States will spend more than $13 billion on cloud
computing and managed hosting services (Tweet this) . 5. Throughout the next five years, a 44%
annual growth in workloads for the public cloud versus an 8.9% growth for “on-premise” computing
workloads is expected (Tweet this) . 6. 82% of companies reportedly saved money by moving to the
cloud (Tweet this) . 7. More than 60% of businesses utilize cloud for performing IT-
related operations (Tweet this) . 8. 14% of companies downsized their IT after cloud
adoption (Tweet this) . 9. 80% of cloud adopters saw improvements within 6 months of
moving to the cloud (Tweet this) . 10. 32% of Americans believe cloud computing is a
thing of the future (Tweet this) . 11. There’s an estimated 1 exabyte of data stored in
the cloud (Tweet this) . 12. More than half of survey respondents say their organization
currently transfers sensitive or confidential data to the cloud (Tweet this) . 13. Cisco
forecasts that global data center traffic will triple from 2.6 zettabytes in 2012 to 7.7
zettabytes annually in 2017, representing a 25 percent CAGR (Tweet this) . 14. Global data
center traffic will grow threefold (a 25 percent CAGR) from 2012 to 2017, while global cloud traffic will
grow 4.5-fold (a 35 percent CAGR) over the same period (Tweet this) . 15. From 2012 to 2017, data
center workloads will grow 2.3-fold; cloud workloads will grow 3.7-fold (Tweet this) . 16. 2014 is
the first year the majority of workloads will be on the cloud as 51% will be processed in
the cloud versus 49% in the traditional IT space (Tweet this) . 17. 545 cloud services are
in use by an organization on average (Tweet this) . 18. 56% of survey respondents trust
the ability of cloud providers to protect the sensitive and confidential data entrusted to
them (Tweet this) . 19. 59% of all new spending on cloud computing services originates from North
American enterprises, a trend projected to accelerate through 2016 (Tweet this)
Internal Links
Big Data Doesn’t Solve HC
Big data doesn’t solve disease—predictions are too difficult and the bar for entry is
too low
White 15 - Michael White is a systems biologist at the Department of Genetics and the Center for Genome Sciences and Systems Biology at the Washington
University School of Medicine in St. Louis, where he studies how DNA encodes information for gene regulation. (“The Ethical Risks of Detecting Disease Outbreaks
With Big Data,” http://www.psmag.com/health-and-behavior/ethical-risks-of-detecting-disease-outbreaks-with-big-data 2/24/2015) STRYKER
One of the most urgent ethical issues that the researchers identify lies at what they call "the nexus of ethics and methodology." The
ethical issue can
be reduced to one question: Do these methods actually work? Ensuring that the methods work "is an
ethical, not just a scientific, requirement," the researchers note. Unlike some other social media experiments, a flawed public
health monitoring program can cause serious physical and economic harm to large numbers of people.
Digital disease detection programs are relatively easy to set up compared to traditional disease monitoring systems, which
means there is a risk that the bar for entering this field might be dangerously low. An underprediction of a disease outbreak can result in complacency and lack of preparedness by health
officials or the public. An over-prediction could cause panic, misallocation of limited supplies of
vaccines or medical resources, and, as some reactions to the recent Ebola outbreak demonstrated,
damaging stigmatization of people or communities who don't pose a risk. As the physicist Niels Bohr once noted,
prediction is hard—especially about the future. Big data programs and algorithms often perform well
when they’re used to “predict” the existing data that was used to help build them, but then do poorly
when confronted with new data. That's where digital disease detection tools that use social media
data often run into trouble. Google Flu Trends looked impressive in its initial report in 2009, where it was used to retroactively predict
flu activity of previous years. But it largely missed the two waves of H1N1 swine flu that hit later in 2009 . As the Google Flu
researchers wrote, "Internet search behavior changed during pH1N1, particularly in the categories 'influenza complications' and 'term for influenza'"—two search
terms that are particularly important in the algorithm. The
program also over-predicted the severity of the 2011-12 flu
season by 50 percent .
Big data doesn’t solve healthcare – multiple barriers and empirics prove
**predictive analytics/comparative data are referring to the same idea of large databases with patient
information i.e. big data in general
Crockett 14 (David, Ph.D. from University of Colorado in medicine, Senior Director of Research and
Predictive Analytics at Health Catalyst, “3 Reasons Why Comparative Analytics, Predictive Analytics, and
NLP Won’t Solve Healthcare’s Problems”, https://www.healthcatalyst.com/3-reasons-why-comparativeanalytics-predictive-analytics-and-nlp-wont-solve-healthcares-problems/)
Comparative Data Doesn’t Drive Improvement We’ve had comparative data for years in the U.S.
healthcare system and it hasn’t moved the needle towards better, at all. In fact, the latest OECD data ranks
the U.S. even worse than we’ve ever been on healthcare quality and cost. Comparative data, like the
OECD, is interesting and certainly worth looking at, but it’s far from enough to drive improvements in an organization
down to the individual patient. To drive that sort of change, you have to get your head and hands dirty in your own data
ecosystem, not somebody else’s that is at best a rough facsimile of your organization. There are too many variables and
variations in healthcare delivery right now that add too much noise to the data to make comparative
analytics as valuable as some pundits advocate. We don’t even have an industry standard and clinically
precise definition of patients that should be included (and excluded from routine management) in a diabetes registry,
much less the other 15 chronic diseases and syndromes we should be managing. Predictive Analytics Fails to Include Outcomes We’ve also
had predictive analytics supporting risk stratification for years in healthcare, particularly in case management, but
without outcomes data, what are we left to predict ? Readmissions. That’s a sad state of affairs. Before we start believing
that predictive analytics is going to change the healthcare world, we need to understand how it works, technically and programmatically.
Without protocol and patient-specific outcomes data,
predictive analytics is largely vendor smoke and mirrors in all but
a very small number of use cases.
Big data doesn’t work for disease—only works as well as actual data collection
Swift 14 - Janet Swift is a spreadsheets and statistics specialist for I-Programmer. (“Google Flu Trends Adopts New Model,” http://www.iprogrammer.info/news/197-data-mining/7939-google-flu-trends-new-model.html 11/3/2014) STRYKER
Google Flu Trends is launching a new model in the United States for the coming 2014/2015 flu season.
The important difference is that it is going to incorporate CDC flu data - which rather ruins its original idea. Google Flu Trends (GFT) was launched
in 2008 to predict how many cases of flu are likely to occur based on "aggregate search data". The
premise used by the model was that there is a correlation between the number of cases of flu and the
number of searches on the topic of flu. So rather than collect data from doctors and hospitals about people showing symptoms you can
instead look for searches using terms associated with flu such as "cough" or "fever". Initially the model worked well. Not only did it provide
accurate estimates of the number of cases of flu, it did so ahead of those from the CDC (Centers for Disease Control and Prevention). But over time
Google's model started to overpredict the incidence of flu, due to what could be interpreted as a
positive feedback effect . Heightened media attention to flu when the incidence of flu rises leads to
more people googling flu related terms. For the 2012/2013 flu season the GFT prediction exceeded the
number of "real" flu cases by 95%. Responding to the research that revealed this anomaly Google adjusted the model for
the 2013/2014 flu season (see the details in Google Updates Flu Model but it continued to overpredict. So a more drastic
remedy was sought. According to Christian Stefansen, Senior Software Engineer, in a post on the Google Research blog
announcing "brand new engine" for GFT, for the coming flu season in the US, Google is substituting a:
"more robust model that learns continuously from official flu data". While this may well improve the
model's accuracy, the fact that it uses actual data defeats the idea that flu could be predicted solely
on the basis of Internet users search behavior. If the new model works well, it won't be nearly as interesting a finding as the success of
the old model.
Big data analysis is ineffective—
A. Selection bias
Hoffman and Podgurski 13 - Sharona Hoffman is a Edgar A. Hahn Professor of Law and Professor of Bioethics and Co-Director of LawMedicine Center at Case Western Reserve University School of Law. Andy Podgurski is a Professor of Electrical Engineering and Computer Science at Case Western
Reserve University. (“The Use and Misuse of Biomedical Data: Is Bigger Really Better?” American Journal of Law & Medicine, 39 Am. J. L. and Med. 497, 2013)
STRYKER
If data subjects have the opportunity to opt out of inclusion in a database or if certain individuals' records are otherwise
excluded, a class of problems often called [*522] "selection bias" may arise. n227 Selection bias may occur
when the subset of individuals studied is not representative of the patient population of interest . n228
This kind of selection bias could manifest, for example, if a disproportionate number of people of one
ancestry or economic class opt out of participating in a database. n229 It can likewise exist if individuals
with certain behavior traits that might be important in some studies--such as diet, exercise, smoking status, and alcohol or
drug consumption--choose not to participate or cannot access medical facilities in which studies take place .
n230 Selection bias can distort assessments of measures such as disease prevalence or exposure risk
because study estimates will differ systematically from the true values of these measures for the
target population. n231 That is, the estimates will not be generalizable from the research subjects to the larger population about
which analysts wish to draw conclusions. n232 Another, more subtle kind of selection bias, which is also called " collider-stratification bias ," n233
"collider-bias," n234 or "M-bias," n235 is specific to causal-effect studies. n236 These studies typically seek to measure
the average beneficial effect on patients of a particular treatment or the average harmful effect on
individuals of a particular exposure. n237 Collider-stratification bias occurs in analyzing study data when
the analysis is conditioned on (e.g., stratified by) one or more levels of a variable that is a common effect (a
"collider") of both the treatment/exposure variable and the outcome variable or that is a common effect
of a cause of the treatment/exposure and a cause of the outcome. n238 Consider the following classic example.
Commonly, some patients are lost to follow-up, and thus outcome measurements that would be
essential for research purposes are unavailable. The data from these patients cannot be included in
studies. Both the treatment and outcome at issue may influence which patients stop seeking medical
care. Patients may fail to return for follow-up both because the treatment is unpleasant (treatment factor) and
because they actually feel better and don't see a need to return to their doctors (an outcome factor). The loss of these study subjects can
create a spurious statistical association between the treatment/exposure variable and the outcome
variable that becomes mixed with and distorts the true causal effect of the former on the latter. n239
Because collider-stratification bias is associated with [*523] the exclusion of some patients from a study, it is categorized as a type of selection bias. n240
B. Confounding bias
Hoffman and Podgurski 13 - Sharona Hoffman is a Edgar A. Hahn Professor of Law and Professor of Bioethics and Co-Director of LawMedicine Center at Case Western Reserve University School of Law. Andy Podgurski is a Professor of Electrical Engineering and Computer Science at Case Western
Reserve University. (“The Use and Misuse of Biomedical Data: Is Bigger Really Better?” American Journal of Law & Medicine, 39 Am. J. L. and Med. 497, 2013)
STRYKER
In observational causal-effect studies, confounding bias (confounding) may be an even greater concern
than selection bias . n241 "Classical" confounding occurs because of the presence of a common cause of
the treatment/exposure variable and the outcome variable. n242 Confounding is different from collider-stratification bias
because it involves a common cause of the treatment/exposure and outcome variables rather than a
common effect of the variables. n243 The following hypothetical illustrates classical confounding. Suppose a physician's treatment choices are
influenced by the severity or duration of a patient's disease, which also influence the outcome of treatment. n244 Thus, patients at a later stage of a disease may
receive one treatment (treatment A) and those who are at an earlier stage may receive a different therapy (treatment B). At the same time, sicker patients may
have worse treatment outcomes than healthier individuals. Unless
such a common cause, which is called a "confounding
variable" or "confounder," is adjusted for appropriately during statistical data analysis, it may induce
a spurious association between the treatment variable and the outcome variable, which distorts
estimation of the true causal effects of treatments. n245 In other words, researchers may reach incorrect
conclusions regarding the efficacy of the two treatments because of the confounding variable: the
degree of sickness suffered by patients receiving the different therapies. Treatment A may appear to
be less effective than treatment B not because it is in fact an inferior therapy but because so many of
the patients receiving treatment A are in a late stage of the disease and would not do well no matter
what treatment they received. This particular form of confounding, called "confounding by indication," is especially challenging to adjust for,
because it may involve multiple factors that influence physicians' treatment decisions. n246 Socioeconomic factors and patient lifestyle
choices may also be confounders. Those who lack financial resources or adequate health coverage
may select less expensive treatments not because those are the best choices for them but because
those are the only affordable options. n247 Low income may also separately lead to poor health for reasons such as poor nutrition or
financial stress. In the case of preventive care, a treatment's perceived benefits may be amplified because health-oriented
individuals interested in the intervention also pursue exercise, low-fat diets, and other healthpromoting behaviors. These patients' impressive outcomes thus would not be associated solely with
the preventive measure. n248
C. Measurement bias
Hoffman and Podgurski 13 - Sharona Hoffman is a Edgar A. Hahn Professor of Law and Professor of Bioethics and Co-Director of LawMedicine Center at Case Western Reserve University School of Law. Andy Podgurski is a Professor of Electrical Engineering and Computer Science at Case Western
Reserve University. (“The Use and Misuse of Biomedical Data: Is Bigger Really Better?” American Journal of Law & Medicine, 39 Am. J. L. and Med. 497, 2013)
STRYKER
Measurement biases arise from errors in measurement and data collection . n262 Observational study
results may be compromised if the biomedical records that are analyzed contain such errors. Measurement
errors occur for a variety of reasons. Measurement instruments might not be calibrated properly or might lack
sufficient sensitivity to detect differences in relevant variables. n263 Storage time or conditions for biological samples
might be different and might affect study results. n264 To the extent that researchers solicit and record patients' own accounts and
memories, the subjects' ability to recall details may be influenced by the questioner's competence, patience, and apparent
sympathy or by the degree to which the patient perceives the topic to be important and relevant to her life. n265 In addition, patients may have
impaired memories or may lie in response to questions if they are embarrassed about the truth. n266 Accurate measurement
may be further hindered by incomplete, erroneous, or miscoded EHR data that obfuscates true
values . n267 In causal-effect studies, errors in measurement of the treatment/exposure and the
outcome are most problematic when they are associated (dependent) and when they are differential, that
is, when the treatment affects the measurement error for the outcome or the outcome affects the
measurement error for the treatment. n268 For example, differential measurement error could occur in a study of the effect of treatment A
on dementia, if the use of A was determined only by interviewing study participants, because dementia affects subjects' ability to recall whether and how they were
Mismeasurement of confounding variables also impedes adjustments intended to eliminate
confounding bias. n270
treated. n269
Healthcare prediction can’t be scaled up – no motivation and structural problems
Crockett 13 (David, Ph.D. from University of Colorado in medicine, Senior Director of Research and
Predictive Analytics at Health Catalyst, “Using Predictive Analytics in Healthcare: Technology Hype vs.
Reality”, https://www.healthcatalyst.com/predictive-analytics-healthcare-technology)
The buzzword fever around predictive analytics will likely continue to rise and fall. Unfortunately,
lacking the proper infrastructure, staffing and resource to act when something is predicted with high
certainty to happen, we fall short of the full potential of harnessing historic trends and patterns in
patient data. In other words, without the willpower for clinical intervention, any predictor – no
matter how good – is not fully utilized.
Skepticism
You should be generally skeptical of their evidence – it overstates the value of big data –
studies prove data is mostly irrelevant now
Aslett 13 (Matt, research director for 451 research, formerly the Deputy Editor of monthly magazine
Computer Business Review and ComputerWire's daily news service, “Big data reconsidered: it's the
economics, stupid”, https://451research.com/report-short?entityId=79479&referrer=marketing)
For the past few years the data management industry has been in the grip of a fever related to 'big data' – a
loosely defined term that has been used to describe analysis of large volumes of data, or analysis of unstructured data, or high-velocity data, or
social data, or predictive analytics, or exploratory analytics or all of the above – and more besides. The
expectations for the
potential of big data to revolutionize the data management and analytics industry are great and
inflated , to the extent that it is easy to become disillusioned. A quick check of recent news headlines
suggests that big data has the potential to solve world hunger, defeat terrorism, close the gender gap,
bring about world peace, cure cancer and identify life on Mars. We don't doubt that data management and analytics
will have a critical role to play in efforts related to all those issues, but there is clearly a gap between the potential of big data and the extent to
which related technologies have been adopted to date. For example, interviews from
TheInfoPro, a service of 451 Research, with
storage professionals indicate that big data accounted for just 3% of the total data storage footprint in 2012
– and the exact same percentage in 2013 . While we believe that the big data trend has the potential to revolutionize the IT
industry by enabling new business insight based on previously ignored and underutilized data, it is clear that
massively over-hyped .
big data is also
Impact Defense
Disease Defense
1. No zoonotic disease impact – multiple warrants
A. Empirics Prove
Ridley 12 (Matt Ridley, columnist for The Wall Street Journal and author of The Rational Optimist: How
Prosperity Evolves, “Apocalypse Not: Here’s Why You Shouldn’t Worry About End Times,”
http://www.wired.com/wiredscience/2012/08/ff_apocalypsenot/all/)
The emergence of AIDS led to a theory that other viruses would spring from tropical rain forests to wreak
revenge on humankind for its ecological sins. That, at least, was the implication of Laurie Garrett’s 1994 book, The Coming Plague:
Newly Emerging Diseases in a World Out of Balance. The most prominent candidate was Ebola, the hemorrhagic fever that
starred in Richard Preston’s The Hot Zone, published the same year. Writer Stephen King called the book “one of the most horrifying things I’ve
ever read.” Right on cue, Ebola appeared again in the Congo in 1995, but it soon disappeared. Far from being a harbinger, HIV
was the
only new tropical virus to go pandemic in 50 years.¶ In the 1980s British cattle began dying from mad cow
disease, caused by an infectious agent in feed that was derived from the remains of other cows. When people, too, began to catch this
disease, predictions of the scale of the epidemic quickly turned terrifying: Up to 136,000 would die,
according to one study. A pathologist warned that the British “have to prepare for perhaps thousands, tens of thousands, hundreds of
thousands, of cases of vCJD [new variant Creutzfeldt-Jakob disease, the human manifestation of mad cow] coming down the line.” Yet the
total number of deaths so far in the UK has been 176 , with just five occurring in 2011 and none so far in
In 2003 it was SARS , a virus from civet cats, that ineffectively but inconveniently led to quarantines in Beijing and
Toronto amid predictions of global Armageddon. SARS subsided within a year , after killing just 774
people. In 2005 it was bird flu, described at the time by a United Nations official as being “like a combination of
global warming and HIV/AIDS 10 times faster than it’s running at the moment.” The World Health
Organization’s official forecast was 2 million to 7.4 million dead. In fact, by late 2007, when the disease petered out, the death toll was
roughly 200. In 2009 it was Mexican swine flu. WHO director general Margaret Chan said: “It really is all of humanity that is under threat
during a pandemic.” The outbreak proved to be a normal flu episode.¶The truth is, a new global pandemic is growing less
likely, not more. Mass migration to cities means the opportunity for viruses to jump from wildlife to
the human species has not risen and has possibly even declined, despite media hype to the contrary. Water- and
insect-borne infections—generally the most lethal—are declining as living standards slowly improve.
2012.¶
It’s true that casual-contact infections
such as colds are thriving—but only by being mild enough that their
victims can soldier on with work and social engagements, thereby allowing the virus to spread. Even if a lethal virus does go
global, the ability of medical science to sequence its genome and devise a vaccine or cure is getting
better all the time.
B. Burnout and variation check
York 14 (Ian, head of the Influenza Molecular Virology and Vaccines team in the Immunology and
Pathogenesis Branch of the Influenza Division at the CDC, PhD in Molecular Virology and Immunology
from McMaster University, M.Sc. in Veterinary Microbiology and Immunology from the University of
Guelph, former Assistant Prof of Microbiology & Molecular Genetics at Michigan State, “Why Don't
Diseases Completely Wipe Out Species?” 6/4/2014, http://www.quora.com/Why-dont-diseasescompletely-wipe-out-species)
But mostly diseases don't drive species extinct. There are several reasons for that. For one, the most dangerous
diseases are those that spread from one individual to another. If the disease is highly lethal , then the
population drops, and it becomes less likely that individuals will contact each other during the infectious phase.
Highly contagious diseases tend to burn themselves out that way.¶ Probably the main reason is variation. Within the
host and the pathogen population there will be a wide range of variants. Some
hosts may be naturally resistant. Some pathogens
will be less virulent . And either alone or in combination, you end up with infected individuals who survive .¶ We see this in
HIV, for example. There is a small fraction of humans who are naturally resistant or altogether immune to HIV, either because of their CCR5 allele or their MHC Class
I type. And there are a handful of people who were infected with defective versions of HIV that didn't progress to disease. ¶ We can see indications of this sort of
thing happening in the past, because our genomes contain many instances of
pathogen resistance genes that have spread through
the whole population. Those all started off as rare mutations that conferred a strong selection advantage to the
carriers, meaning that the specific infectious diseases were serious threats to the species.
Innovation Defense
Innovation high and inevitable
Vivek Wadhwa 14, fellow at the Rock Center for Corporate Governance at Stanford University,
director of research at the Center for Entrepreneurship and Research Commercialization at Duke’s
engineering school and distinguished scholar at Singularity and Emory universities, “How the United
States is reinventing itself yet again”, 1/2/14,
http://www.washingtonpost.com/blogs/innovations/wp/2014/01/02/how-the-united-states-isreinventing-itself-yet-again/
And that’s not all the pessimists say. They also argue that while the United States continues to dominate in the emergence of new
technology powerhouses, the biggest IPO of the decade belongs to Facebook, a social network that is more media company than technology
innovator. Stifling red tape and regulations has driven costs of testing new medicines and medical devices so high that many drug
companies have shifted testing regimes and market focus to Europe and Asia. Despite mounting evidence that
skilled immigrant entrepreneurs have delivered a wildly disproportionate share of the country’s technology innovation and technology job
growth, the powers that be in Washington, D.C. have, even with broad bipartisan support, not mustered up the votes to reform the country’s
regressive and punitive immigration policies. Add to all of this an aging populace requiring more and more support from younger workers,
ballooning health costs and a tax structure that beggars the young to underwrite benefits for the aged, and
the United States looks
more and more like a historical footnote than a superpower.¶ Peel back the layers of the onion, and
the reality appears quite different. In fact, the United States stands on the cusp of a dramatic revival and
rejuvenation, propelled by an amazing wave of technological innovation . A slew of breakthroughs will
deliver the enormous productivity gains and the societal dramatic cost savings needed to sustain
economic growth and prosperity. These breakthroughs, mostly digital in nature, will complete the shift
begun by the Internet away to a new era where the precepts of Moore’s Law can be applied to
virtually any field.¶ Computer-assisted design and fabrication will reshape manufacturing forever. These
technologies will slash waste and replace nearly all conventional manufacturing with more environmentally friendly and cost-effective additive
manufacturing run with robots and computer programs. Complex systems resistant to modeling will succumb to advances in big data that allow
mankind to finally make sense and improve upon the most intricate multi-faceted interactions. Where big data fails, ubiquitous
crowd
sourcing will harness untapped brain cycles to train systems and solve problems, one small activity at
a time — on a global scale.¶ In this massively digital world, A/B testing or parallelization of R&D processes will become
commonplace for just about everything from airline design simulations to online advertising to artificial organ construction. This
will, in turn, allow for far more rigorous testing of products and processes. Dirt-cheap digital delivery platforms for
educational content and improvements in the understanding of the way the brain learns will yield a sea
change in how we gain knowledge. This will result in more open, flexible educational systems and structures — and a
smarter, more learned, constantly learning populace. While the world will benefit from these changes, the United
States is uniquely positioned to lead this sea change.
A2: Addons
Ebola
Containment solves
Katie Jennings 14, Business Insider, citing Dr. Amesh Adalja, an infectious disease specialist from the
University of Pittsburgh Medical Center and the Center for Health Security, Aug 4 2014, “Here's Why
Your Panic Over Ebola Patients In The US Is Overblown,” http://www.businessinsider.com/why-ebolapanic-is-overblown-2014-8
A quick scan of recent headlines — "Ebola outbreak moving faster than efforts to contain it" or "Nigeria death shows Ebola can spread by air travel "— makes
it easy to jump to the conclusion that bringing Ebola patients to the United States is risky and could
cause a similar outbreak here. However, U.S. government officials and health experts say this is simply not true: Ebola will not
spread through the United States like it has in West Africa. "[T]he plain truth is that we can stop Ebola," Dr. Tom Frieden, director of the U.S. Centers for Disease
Control and Prevention told ABC's "This Week." "We know how to control it." Don't Believe Everything You See In The Movies Part of the fear about an Ebola outbreak in the U.S. stems from
how the virus has been treated by Hollywood and the media. "Ebola has a mystique about it because the way that it has been treated in fiction," Dr. Amesh Adalja, an infectious disease
specialist from the University of Pittsburgh Medical Center and the Center for Health Security, told Business Insider. He specifically referenced the 1995 movie "Outbreak," starring Cuba
Gooding, Jr., which features a fictional Ebola-like virus. Richard Preston's book The Hot Zone, a terrifying nonfiction thriller that inspired the movie, is another well-known reference. While
fictional stories just aren't true-to-life, there are a few legitimately scary things about Ebola. The symptoms are viscerally horrifying, and
treatments and vaccines
against the disease don't exist at this time. And because scientists aren't totally sure how the virus outbreaks jump to humans, there is also the fear of the unknown.
"The outbreaks are mysterious, they appear out of nowhere, they're explosive and then they disappear," says Adalja. All of these factors work to fuel a panic mentality. But in the
United States, Canada, Europe, and most countries with well-developed health care systems, Ebola
poses almost no real risk, because patients can be isolated and treated without spreading the virus.
Don't Panic: The Virus Doesn't Spread Very Efficiently Ebola "doesn't spread very efficiently through humans," says Adalja. While the virus is
deadly, it's not very contagious. Unlike the common cold or the flu, which spreads through airborne droplets, Ebola can only spread through contact with bodily
fluids, like blood, vomit, and diarrhea. Adalja also points out that Ebola is less contagious than Middle East Respiratory Syndrome, or MERS, which recently
arrived in the United States but was contained . No secondary cases, meaning new cases spread by the individuals who had arrived to the country
already infected, were reported. "
Ebola is a very rare disease that infects a very small number of people ," says Adalja. "It doesn't have that same type of
burden of illness of other diseases like malaria, tuberculosis, HIV."
No risk and alt cause — bodily fluids are necessary and poor living condition increase
the risk.
Forbes 14 — Robert Glatter, 2014 (“Could Ebola Virus Become A Threat In The U.S.?,” July 29th,
Available Online at http://www.forbes.com/sites/robertglatter/2014/07/29/could-ebola-virus-becomea-threat-in-the-u-s/, Accessed on 07-10-15)
Media reports on the death of a Liberian traveler in Lagos, Nigeria, due to the deadly Ebola virus have
caught the world’s attention–and for good reason. As we live in an interconnected world we have to
come to grips with the fact that hopping on a plane may potentially spread any virus–not just Ebola–to
another country. Thus, the importance of enforcing proper infectious screening procedures of departing
air travelers in an endemic area such as West Africa becomes critical to containing the spread of the
Ebola virus. Enforcing a “Do Not Board List” is critical to preventing the spread of such a virus. While
the Ebola virus could potentially be transported by travelers to another country by a plane ride,
according to officials at the CDC, the actual chance of it developing into a serious public health risk in
the U.S. is small. Poor and crowded living conditions, along with improper sanitation, seem to be an
important element in the spread of the virus. These are not the living conditions, in general,
throughout most modernized countries in the Western world. Ebola, comprised of 5 strains, was first
identified in 1976 in the Western Democratic Congo along the Ebola river. Four of the strains can be
spread to humans. The fifth resides only in primates. The fruit bat, considered a delicacy in West Africa,
is typically considered a natural reservoir of the Ebola virus. Ebola is spread directly, human-to-human,
by secretions such as saliva and sweat, but also by blood and feces. It can be spread directly by a
break in the skin or mucous membranes or indirectly after touching your nose, mouth or eyes after
having contact with the virus. It is not transmitted by coughing or sneezing (droplet spread), as would
be the case for someone with influenza or measles.
No extinction or epidemic
Science Alert 10/9/2014, citing Lauren Anciel Meyers, Professor of Integrative Biology at The
University of Texas at Austin, PhD in Biological Sciences from Stanford, and Tom Frieden, Director of the
CDC, “How infectious is Ebola?,” http://www.sciencealert.com.au/news/20140910-26305.html
So there’s a case of Ebola in the US, and the disease has already killed 70 percent of those it infected in
West Africa. Is this the beginning of the end for humanity? Not even close , and here’s why.¶ The US case of Ebola
is the first to be identified outside of Africa. The patient, who has now died from the disease, didn’t know that he was infected straight away, so wasn’t
quarantined by the Texas Health Presbyterian Hospital in Dallas for four days. This sounds like a long time to be walking around being contagious, but medical authorities have assured the
public not to panic.¶ In fact, officials seem pretty sure that
this particular case would not lead to an outbreak in the US. "I have no doubt that we
will control this importation, or case, of Ebola so that it does not spread widely in this country ," director of the Centers for Disease
Control and Prevention (CDC) Tom Frieden told the press earlier this week. ¶ Professor of integrative biology Lauren Ancel Meyers from the University of
Texas agreed, telling The Huffington Post science editor David Freeman, "I think they are striking a good note in saying that most of you out there don’t have to worry. There
doesn’t seem to be a real threat of a large epidemic in the United States."¶ The reason for Frieden’s and Meyers's
confidence is a simple mathematical term known as R0. This is a 'reproduction number' used by epidemiologists to indicate
how infectious a specific disease is. It tells you how many people, on average, will be infected by one
patient. ¶ "The reproduction number provides a lot of information," Meyers told The Huffington Post. "It gives us a baseline for projecting the growth of outbreaks in the absence of
intervention, and it tells us how hard and how effective do our interventions have to be in order to stop an epidemic."¶ Measles, for example, is the most contagious
disease we have, and its R0 is about 18. This means that if no one is vaccinated, an incredible 18 people can be infected by every one person who has the disease. Of course,
this number drops to zero if everyone is vaccinated. For HIV/AIDS and SARS, the R0 number is between 2 and 5, and for Ebola, it’s just 2 . ¶ According to Michaeleen Doucleff
at NPR, while many factors influence a disease’s reproduction number, the fact that Ebola’s is transmitted via bodily fluids, rather than the air, is probably why it’s rated so low. And
because Ebola isn't contagious until the patient starts showing symptoms - at which point the Dallas patient had checked
himself in to the hospital - all that needed to be done to contain the spread of the disease in the US is to isolate anyone
at the hospital who might have been infected .¶ CNBC reports that as of yesterday, none of the 48 people who potentially came in contact with Dallas
patient have developed any definite symptoms.¶ "
Then R0 drops to zero . And Texas is free of Ebola,” says Doucleff.
Ebola doesn’t cause extinction — too hard to catch and it’s danger is ramped up by
fearmongering.
The Washington Post 14 — Abby Ohlheiser, writer for the Post, 2014 (“It’s highly unlikely that
you’ll become infected with Ebola. So what are you so afraid of?,” October 5th, Available Online at
http://www.washingtonpost.com/news/to-your-health/wp/2014/10/05/nothing-to-fear-but-ebolaitself/, Accessed on 07-10-15)
This is how to get Ebola: Come into direct contact with the bodily fluids of a person who is infected
with the virus and already symptomatic. Ebola doesn't travel through the air. A person in Washington,
D.C., can't catch Ebola from an Ebola-infected person in Dallas without going there and coming into
direct contact with the patient's bodily fluids. Still, amid the deadliest Ebola outbreak in history, in
West Africa, the news of the first case diagnosed in the United States has prompted people to act as if
they're a half-breath away from catching the virus anyway. America's Patient Zero is in Texas. He's in
isolation, and the people who were in an apartment with him when he became sick are under
quarantine. None of the people who potentially came into contact with the man while he was
symptomatic have yet become sick with Ebola. Multiple potential U.S. cases elsewhere — from New
York to Washington — have come up negative. The virus has not ravaged the United States. But the
word — Ebola! — is ubiquitous, and so is the fear that comes with it. As The Post noted today in a
front-page story about the global health disaster: "This is both a biological plague and a psychological
one, and fear can spread even faster than the virus." An example, from Wednesday: Mehmet Oz — aka
Dr. Oz — went on television to pronounce that the epidemic could alter the world "as much as any
plague in history." Dr. Oz's apocalyptic statement depended not on the realities of the disease as it
exists now, but, he said, on "the question no one wants to ask, but everyone fears": Will the Ebola virus
mutate and go airborne? Cue a terrifying segment during which little blips on a spinning globe turned
the world red with disease. The doomsday potential is "a question that keeps [experts] up at night,"
Dr. Oz said, adding: "It should keep you up as well." But should it? "People are feeling out of control.
They had no control about whether Ebola comes to the United States," David Kaplan of the American
Counseling Association said last week. For Americans, Kaplan said, there's a cultural imperative to gain
and maintain control of one's own health and safety — an imperative that something like Ebola
confounds. "We always like to feel in control of what we do," he said. "That's why people are often
much more afraid of flying than of driving, even though it is much safer." Even if the threat of
something like Ebola is minuscule or remote, hysterical media coverage, Kaplan argued, can lead us to
"develop a cognitive bias that things occur more frequently than they actually do."
No Impact to an Ebola outbreak — we’re more prepared, it’s dying down, and it’s very
difficult to transmit.
Walsh 14 — Bryan Walsh, foreign editor at TIME, 2014 (“Why Ebola Isn’t Really a Threat to the U.S.,”
Time Magazine, October 21st, Available Online at http://time.com/3525385/ebola-threat-us-cdc/,
Accessed on 07-10-15)
Give us this—when Americans overreact, we do it all the way. Over the past week, in response to fears
of Ebola, parents in Mississippi pulled their children out of a middle school after finding out that its
principal had traveled to Zambia—a nation that is in Africa, but one that hasn’t recorded a single
Ebola case. A college sent rejection notices to some applicants from Nigeria because the school
wouldn’t accept “international students from countries with confirmed Ebola cases”—even though
Nigeria has had less than 20 confirmed cases and the outbreak is effectively over. The American public
is following its leaders, who’ve come down with a bad case of Ebola hysteria. That’s how you get eventempered politicians like New York Governor Andrew Cuomo musing that the U.S. should “seriously
consider” a travel ban on West African countries hit by Ebola, while some of his less restrained
colleagues raise the incredibly far-fetched possibility of a terrorist group intentionally sending Ebolainfected refugees into the U.S. It’s little surprise that a Washington Post/ABC News poll found that
two-thirds of Americans are concerned about an Ebola outbreak in the U.S. They shouldn’t be—and
two events that happened on Monday show why. WHO officials declared Nigeria officially “Ebola-free.”
And in Dallas, the first wave of people being monitored because they had direct contact with Thomas
Eric Duncan, the first Ebola patient diagnosed in the U.S., were declared free of the diseases. Nigeria
matters because the nation’s is Africa’s most populous, with 160 million people. Its main city, Lagos, is a
sprawling, densely populated metropolis of more than 20 million. Nigeria’s public health system is far
from the best in the world. Epidemiologists have nightmares about Ebola spreading unchecked in a city
like Lagos, where there’s enough human tinder to burn indefinitely. Yet after a few cases connected to
Sawyer, Nigeria managed to stop Ebola’s spread thanks to solid preparation before the first case, a quick
move to declare an emergency, and good management of public anxiety. A country with a per-capita
GDP of $2,700—19 times less than the U.S.—proved it could handle Ebola. As Dr. Faisal Shuaib of
Nigeria’s Ebola Emergency Operation Center told TIME: “ There is no alternative to preparedness.” But
Nigeria’s success was also a reminder of this basic fact: If caught in time, Ebola is not that difficult to
control, largely because it remains very difficult to transmit outside a hospital. For all the panic in the
U.S. over Ebola, there has yet to be a case transmitted in the community. The fact that two health
workers who cared for Duncan contracted the disease demonstrates that something was wrong with the
treatment protocol put out by the Centers for Disease Control and Prevention (CDC)—something CDC
Director Dr. Tom Frieden has essentially admitted—and may indicate that the way an Ebola patient is
cared for in a developed world hospital may actually put doctors and nurses at greater risk.
Small Business
Cloud computing is inefficient hurts small business.
Wilson 14 — Dean Wilson, writer for TechRadar, 2014 (“Cloud 'sprawl' causing business
inefficiencies,” March 18th, Available Online at http://www.techradar.com/us/news/internet/cloudservices/cloud-sprawl-causing-business-inefficiencies-1234913, Accessed on 07-10-15)
The growing use of a wide variety of unsanctioned cloud services, the so-called "cloud sprawl," is
causing significant problems for businesses, according to a new survey. Avanade, an Accenture and
Microsoft joint IT consultancy firm, released a report that shows 61 per cent of companies across the
globe blame cloud sprawl for causing inefficiencies in their business. That number falls to 52 per cent
in the UK, but it rises to 71 per cent among those using both public and private clouds. The survey
involved 750 IT decision makers in United States, United Kingdom, Germany, China, France, Sweden,
Brazil, Japan and Australia. The problem is that employees are signing up to cloud services that are
different to the ones provided by their own IT department, so instead of homogenisation there is
growing disparity between what each individual employee is using. 66 per cent of IT decision markers
across the globe have noticed this problem. The number climbs to 69 per cent in the UK. "The study
reinforces what we're seeing in the UK market about the challenges of cloud computing. Whilst the
cloud can deliver significant benefits, some of its advantages also introduce risk. Unmanaged cloud
sprawl in Shadow IT (Dark Cloud) is introducing risk with threats from unmanaged sources," said Mark
Corley, CTO at Avanade UK. "Cloud services are becoming available in increasing variety and ease of
access, and many IT departments simply can't keep up."
Warming
Cloud computing isn’t fast enough to solve for climate change
Foster 11, (Pete, "Cloud computing – a green opportunity or climate change risk?", Guardian, 8-12011, http://www.theguardian.com/sustainable-business/cloud-computing-climate-change)
But cloud computing comes with its own issues of security and reliability. Companies are often
reluctant to trust their data and computing to a remote supplier and climate change itself may make
cloud computing less attractive. The Foresight Programme from the UK's Government Office for
Science produces in-depth studies looking at major issues 20-80 years in the future. It recently published a
report on the International Dimensions of Climate Change that identifies a significant vulnerability from cloud computing. As more data
centres are needed, and with the UK a relatively expensive location, more will be going offshore, but
that makes them potentially more vulnerable to climate change impacts. The report points out that data
storage facilities have already suffered from flooding and cites the Vodafone data centre in Ikitelli, Turkey, which was
putting a quarter of the local network at risk . Similarly, in August 2009 the rainfall from
led to several submarine
landslides which broke at least nine communications cables 4000m down. It disrupted the Internet
and telecommunications between Taiwan, China, Hong Kong and other parts of Southeast Asia. The
study also makes the point that over 95% of global communications traffic is handled by just one million
kilometres of undersea fibre-optic cable. Rising sea levels increase the risk of flooding of coastal cable
facilities and may also affect the stability of the seabed, making cables more vulnerable. It makes worrying
reading. While we are all fighting to try and minimise climate change, we're already too far down the
affected by flash flooding in 2009,
Typhoon Morakot caused rivers to flood in Taiwan flushing large volumes of sediment into the ocean. This
road to stop some of the inevitable impacts . It's ironic that one IT trend that could help reduce
greenhouse gas emissions – cloud computing – may well itself be a victim of the impact.
Warming doesn't cause extinction
Bjørn Lomborg, an adjunct professor at the Copenhagen Business School, founded and directs the
Copenhagen Consensus Center, Project Syndicate, February 14, 2014, "The Davos Apocalypse",
http://www.project-syndicate.org/commentary/bj-rn-lomborg-criticizes-global-leaders-for-creating-anatmosphere-of-panic-about-climate-change
The apocalyptic bombast is even more disturbing. According to Angel Gurría, Secretary-General of the
OECD, “our planet is warming dangerously,” and we need to act now “to avoid catastrophe”; the United
Nations climate chief, Christiana Figueres, maintains that global warming means that “the world
economy is at risk.” Former UN Secretary-General Kofi Annan takes the prize for the most extreme
rhetoric, claiming that not curbing global warming is “a terrible gamble with the future of the planet and
with life itself.” Yet, the rhetoric is unconvincing. Yes, global warming is real and man-made. But
creating panic and proposing unrealistic policies will not help in tackling the problem. Both Annan and
Gurría cited Typhoon Haiyan in the Philippines last November as evidence of increased climate-changerelated damage. Never mind that the latest report by the UN Intergovernmental Panel on Climate
Change (IPCC) found that “current datasets indicate no significant observed trends in global tropical
cyclone frequency over the past century” and reported “low confidence” that any changes in hurricanes
in recent (or future) decades had anything to do with global warming. Annan and Gurría also neglected
to note that global Accumulated Cyclone Energy, an index for total hurricane activity, is hovering at the
lowest values seen since the 1970’s. Indeed, the trend for strong hurricanes around the Philippines has
declined since 1951. Similarly, Gurría tells us that Hurricane Sandy, which slammed into New York City in
2012, is an example of inaction on climate change, costing the United States “the equivalent of 0.5% of
its GDP” each year. In fact, the US currently is experiencing the longest absence of intense landfall
hurricanes since records began in 1900, while the adjusted damage cost for the US during this period,
including Hurricane Sandy, has fallen slightly. Figueres claims “that current annual losses worldwide due
to extreme weather and disasters could be a staggering 12% of annual global GDP.” But the study she
cites shows only a possible loss of 1-12% of GDP in the future, and this is estimated not globally but
within just eight carefully selected, climate-vulnerable regions or cities. By contrast, according to the
IPCC, “long-term trends in economic disaster losses adjusted for wealth and population increases have
not been attributed to climate change.” On the contrary, the bulk of peer-reviewed economic evidence
indicates that, up to around 2050-2070, the net global economic impact of rising temperatures is likely
to be positive. Although global warming will create costs stemming from more heat-related deaths and
water stress, they will be outweighed by the benefits from many fewer cold-related deaths and higher
agricultural productivity from higher levels of CO2. Global warming is a long-term problem. Most models
indicate that the cost toward the end of the century will be 1-5% of world GDP. This is not a trivial loss;
but nor does it put “the world economy at risk.” For comparison, the IPCC expects that by the end of the
century, the average person in the developing world will be 1,400-1,800% richer than today. Such
incorrect statements by leading officials reinforce wasteful policies based on wishful thinking. Figueres
sees “momentum growing toward” climate policies as countries like China “reduce coal use.” In the real
world, China accounts for almost 60% of the global increase in coal consumption from 2012 to 2014,
according to the International Energy Agency. While Figueres lauds China for dramatically increasing its
solar-power capacity in 2013, the increase in China’s reliance on coal power was 27 times greater.
Figueres’s weak grasp on the facts has led her not only to conclude that China is “doing it right” on
climate change, but also to speculate that China has succeeded because its “political system avoids
some of the legislative hurdles seen in countries including the US.” In other words, the UN’s top climate
official seems to be suggesting that an authoritarian political system is better for the planet. The fact
remains that global wind and solar power usage in 2012 cut, at most, 275 million tons of CO2, while
soaking up $60 billion in subsidies. With the electricity worth possibly $10 billion, the average cost of
cutting a ton of CO2 is about $180. The biggest peer-reviewed estimate of the damage cost of CO2 is
about $5 per ton. This means that solar and wind power avoid about $0.03 of climate damage for every
dollar spent. Compare this to smarter technological solutions. In the short run, the US shale-energy
revolution has replaced high-polluting coal with cheaper, cleaner natural gas. This has cut about 300
million tons of US emissions – more than all the world’s solar and wind power combined – and at the
same time has profited Americans by saving them $100 billion in energy costs. In the long run, current
investment in green research and development will help drive the price of future renewable energy
below that of fossil fuels, enabling a choice that is both environmentally and economically sound. In the
meantime, even dramatic cuts in CO2 emissions will have very little impact on hurricanes 50-100 years
from now. Lifting billions of people out of poverty, however, would not only be intrinsically good; it
would also make societies much more resilient in the face of extreme weather, whether caused by
global warming or not.
No impact to warming—recent studies
Condie 4/23, (Bill, editor, journalist for more than 30 years, working as a writer and editor in Europe,
Asia and Australia for newspapers including The Guardian, The Observer and The Times, "Warming
'slowdown' has no impact on longer term climate trends", Cosmos Newsblog, 4-23-2015,
http://blog.cosmosmagazine.com/blog/2015/4/23/warming-slowdown-has-no-impact-on-longer-termclimate-trends)
The recent slowdown in the rise of global average air temperatures will make no difference to how
much the planet will warm by 2100, a new study has found. " The slowdown in global warming has no
bearing on long-term projections – it is simply due to decadal variability. Greenhouse gases will
eventually overwhelm this natural fluctuation,” said lead author and Chief Investigator with the ARC
Centre of Excellence for Climate System Science, Prof Matthew England. The study, published today in Nature
Climate Change,
compared climate models that capture the current slowdown in warming to those that do
not. The study found that long-term warming projections up to 2100 were effectively unchanged
across the two groups of models. “Our research shows that while there may be short-term fluctuations in
global average temperatures, long-term warming of the planet is an inevitable consequence of
increasing greenhouse gas concentrations,” Prof England said. “This much hyped global warming
slowdown is just a distraction to the task at hand”. The models were analysed using one of two IPCC carbon emission
projections. The first was a scenario where greenhouse gas concentrations continue to rise unabated through the
21st Century. The second assumes emissions are reduced to address global warming, peaking by 2040
before declining sharply. Under the high emissions scenario, the difference in average projected endof-century warming between the two groups of models is less than 0.1°C . Warming of this magnitude
is well beyond the 2°C threshold that is considered a target by the
IPCC.
Australian Government and a safe limit by the
Some lobby groups have tried to argue that the recent slowdown in the rise of global average temperatures is a reason to abandon
international and national efforts to curb carbon emissions. Cosmos has reported on several reasons for the apparent slowdown, including the
behaviour of winds in the Pacific Ocean. See Has global warming paused.
6 degree warming inevitable---massively outweighs aff solvency
AP 9 (Associated Press, Six Degree Temperature Rise by 2100 is Inevitable: UNEP, September 24,
http://www.speedy-fit.co.uk/index2.php?option=com_content&do_pdf=1&id=168)
Earth's temperature is likely to jump six degrees between now and the end of the century even if
every country cuts greenhouse gas emissions as proposed, according to a United Nations update. Scientists looked at
emission plans from 192 nations and calculated what would happen to global warming. The projections take into account 80
percent emission cuts from the U.S. and Europe by 2050, which are not sure things. The U.S. figure is based on
a bill that passed the House of Representatives but is running into resistance in the Senate, where debate has been delayed by health care
reform efforts. Carbon dioxide, mostly from the burning of fossil fuels such as coal and oil, is the main cause of global warming, trapping the
sun's energy in the atmosphere. The world's average temperature has already risen 1.4 degrees since the 19th century. Much
of
projected rise in temperature is because of developing nations, which aren't talking much about
cutting their emissions, scientists said at a United Nations press conference Thursday. China alone adds nearly 2 degrees to
the projections. "We are headed toward very serious changes in our planet," said Achim Steiner, head of the U.N.'s environment
program, which issued the update on Thursday. The review looked at some 400 peer-reviewed papers on climate over the last three years.
Even if the developed world cuts its emissions by 80 percent and the developing world cuts theirs in
half by 2050, as some experts propose, the world is still facing a 3-degree increase by the end of the century,
said Robert Corell, a prominent U.S. climate scientist who helped oversee the update. Corell said the most likely agreement out of the
international climate negotiations in Copenhagen in December still translates into a nearly 5-degree increase in world temperature by the end
of the century. European leaders and the Obama White House have set a goal to limit warming to just a couple degrees. The U.N.'s
environment program unveiled the update on peer-reviewed climate change science to tell diplomats how hot the planet is getting. The last big
report from the Nobel Prize-winning Intergovernmental Panel on Climate Change came out more than two years ago and is based on science
Global warming is speeding up, especially in the Arctic, and that means
science projections from 2007 are already out of date and overly optimistic . Corell, who
headed an assessment of warming in the Arctic, said global warming "is accelerating in ways that we are not anticipating." Because
Greenland and West Antarctic ice sheets are melting far faster than thought, it looks like the seas will rise
twice as fast as projected just three years ago, Corell said. He said seas should rise about a foot every 20 to 25
years.
that is at least three to four years old, Steiner said.
that some top-level
Mosaic Theory Advantage
Impact Answers
Privacy (Also See Freedom Act Neg)
Counter-bias – their epistemology’s more flawed. Excess fear of surveillance means Aff
scholarship’s MORE of an exaggeration than ours.
McDonough ’15 (Shannon McDonough – Instructor in Social Sciences at Allen University. The author holds a B.A. in
Sociology from Miami University, Ohio and an M.A. Sociology from The University of South Carolina. This article is co-authored
by Mathieu Deflem – a Professor at the University of South Carolina in the Department of Sociology. His research areas include
law, policing, terrorism, popular culture, and sociological theory. “The Fear of Counterterrorism: Surveillance and Civil Liberties
Since 9/11” – From the Journal: Society - February 2015, Volume 52, Issue 1, pp 70-79 – obtained via the Springer database
collection).
Civil liberties organizations as well as a number of academic scholars have routinely criticized post-9/11
counterterrorism initiatives as unconstitutional and major threats to civil liberties and privacy. Harmonizing with the claims from civil
liberties groups are contributions in the popular and scholarly discourse on surveillance and counterterrorism that lament the
purported negative impact of government al policies and related surveillance and intelligence activities on personal rights and
liberties. The revelations by former security contractor Edward Snowden in June 2013 concerning alleged spying practices by the
National Security Agency (NSA) greatly reinvigorated these debates. We investigate here if there is any counterevidence to the alarmist statements that are often made in the popular and scholarly discourse on civil
liberties and surveillance. Against the background of academic scholarship on surveillance and criticisms from civil liberty and privacy groups, we
rely on archival sources, government documents, and media reports to examine a variety of claims made concerning civil
liberties violations by security
agencies. Our analysis reveals that at least a sizeable number of claims raised
against counterterrorism practices are without objective foundation in terms of any actual violations. As
an explanation for this marked discrepancy, we suggest that, as
not entirely stable,
various survey data show, there is a relatively distinct , albeit it uneven and
culture of privacy and civil liberties in contemporary American society which
independently contributes to a fear of counterterror ism, rather than of terrorism . These specific cultural
sensitivities bring about an increase in the amount of civil rights allegations independent of actual violations
thereof.
Rights can’t be absolute – as they sometimes conflict with other “rights”. If some
rights were absolute, privacy wouldn’t be one of them.
Himma ‘7 (Kenneth - Associate Professor of Philosophy, Seattle Pacific University. The author holds JD
and PhD and was formerly a Lecturer at the University of Washington in Department of Philosophy, the
Information School, and the Law School. “Privacy vs. Security: Why Privacy is Not an Absolute Value or
Right”. San Diego Law Review, Vol. 44, p. 859, 2007. Available at SSRN:
http://ssrn.com/abstract=994458)
It is perhaps worth noting that absolutist conceptions are not limited to privacy rights. Some people take the position that the
moral right to life is absolute; on an absolutist conception of the right to life, it is never justified to take the life of a person—and this rules out not only the death
penalty, but the use of deadly force in defense of the lives of innocent others from a culpable attack. Many people take an absolutist view with respect to something
they call a “right to information,” holding that there should be no restrictions of any kind, including legal protection of intellectual property rights, on the free flow
of information. As this view has most famously, and idiosyncratically, been put by John Perry Barlow, “information wants to be free.”5 When it comes to rights,
absolutist talk among theorists, lawyers, and ordinary folk is not at all uncommon these days. Indeed,
nature, absolute and hence that it is a conceptual truth that
some people seem to think that rights are, by
all rights are absolute. Consider the following quote from Patrick Murphy, a Democrat
who ran for Congress in 2006: I am also very concerned about the erosion of constitutional rights and civil liberties over the past few years. I taught Constitutional
Law at West Point, and it makes me so angry to see our elected leaders in Washington—specifically the White House and the Republican leadership in Congress—
pushing policies that erode the foundation of this country. The equal protection clause of the constitution is absolute. The right to privacy is absolute. The right to
assemble is absolute. Yet time and time again, the administration has supported, and the Congressional leadership has supported nominees and policies that do not
follow the constitution. With my background, I can add to this debate. And I’m not afraid to take a stand for what’s right.6 As Murphy explains it, every right in the
Constitution is absolute and hence utterly without exception. As there is nothing in the Constitution or any legal instrument or norm that suggests or entails that
constitutional rights are absolute, it is reasonable to think that Murphy believes, as many people do, that it is part of the very meaning of having a right that it can
never justifiably be infringed. This is why debates about political issues are frequently framed in terms of whether there is some right that protects the relevant
interests; rights provide the strongest level of moral or legal protection of the relevant interests. It is certainly true that rights provide a higher level of protection
than any other considerations that are morally relevant, but it is not because rights are, by nature, absolute. Rights provide robust protection of the relevant
interests because it is a conceptual truth that the infringement of any right cannot be justified by an appeal of the desirable consequences of doing so. No matter
how many people it might make happy, it would be wrong to intentionally kill an innocent person because her right to life takes precedence over the interests of
other people in their own happiness. As Ronald Dworkin famously puts this conceptual point, rights trump consequences.7 But this conceptual truth about rights
does not imply rights are, by nature, absolute. The claim that rights trump consequences implies only that some stronger consideration than the desirable
there is some such consideration that
would justify infringing some rights. One such candidate, of course, is the existence of other more
important rights. It is commonly thought that at least some rights are commensurable and can be ranked in a hierarchy that expresses the relative weight
each right in the hierarchy has with respect to other rights. For example, one might think that the right to life is at the top of the
hierarchy of commensurable rights, and that property rights are in this hierarchy also. This would explain the common intuition
that one may use deadly force when necessary to defend innocent lives from culpable attack, but not when
consequences of infringing a right can justify doing so. This latter claim leaves open the possibility that
necessary only to defend property rights from violation. If, as seems clear from this example, it is possible for two rights to conflict and for one to outweigh the
other, it follows that rights are not, by nature, absolute. What may explain the mistaken view that rights are necessarily absolute is confusion about the relationship
of various terms that flesh out the status, origin, and contours of moral rights and obligations. For example, rights
are frequently described as
“inviolable,” meaning that a right can never be justifiably violated. This, of course, is a conceptual truth; to say that a right is violated is to say that its
infringement is without justification. But this does not imply that rights can never be justifiably infringed; a person’s
right to life can be justifiably infringed if he (they) culpably shoots at an innocent person and there is no
other way to save that person’s life except through use of lethal force in defense of his life. Rights are also thought, by
nature, to be supreme, relative to some system of norms—moral, social, or legal—in the sense that they cannot be defeated by other kinds of protections; moral
rights are thought to be supreme over all other kinds of considerations, including social and legal rights. But
this does not imply that rights
are absolute because it says nothing about the relative importance of one right to another ; it simply
asserts that, by nature, rights outweigh all other relevant considerations. Supremacy and inviolability are part of the very nature of a
right, but these properties do not entail that rights are, by nature, absolute. Of course, the negation of the claim that all rights are absolute does not imply that no
rights are absolute. The possibility of conflicts between any two rights does not preclude there being one right that wins every conflict because it is absolute, and
hence, without exception. A moral pacifist, for example, takes this view of the moral right to life and holds that intentional killing of a human being is always wrong.
Moreover, if there are two rights that do not come into conflict with each other and win in conflicts with all other rights, those two rights might be absolute. One
might think, for example, that the rights to privacy and life can never conflict and that both are absolute. I
absolute in this strong sense, but if there are any, it will not be privacy.
am somewhat skeptical that any right is
As we will see in more detail, privacy is commensurable with
other rights, like the right to life, which figures into the right to security. It seems clear that privacy rights and the right to life can come into conflict. For
example, a psychologist might be justified in protecting a patient’s privacy interests even though
doing so includes information that might prevent that person from committing a minor property
crime of some kind, but she would not be justified in protecting that information if the psychologist knows its
disclosure is necessary to prevent a murder. In any event, I will discuss these kinds of examples in more detail below.
Why does the Debate community treat security interests as callous or mean ?Security
interests are competing rights claims that impact serous moral questions.
Himma ‘7 (Kenneth - Associate Professor of Philosophy, Seattle Pacific University. The author holds JD and PhD and was
formerly a Lecturer at the University of Washington in Department of Philosophy, the Information School, and the Law School.
“Privacy vs. Security: Why Privacy is Not an Absolute Value or Right”. San Diego Law Review, Vol. 44, p. 859, 2007. Available at
SSRN: http://ssrn.com/abstract=994458)
At the outset, it is important to stress that security interests do not embrace interests not immediately
related to the survival and minimal physiological well-being of the individual. My interest in security encompasses my
interest in continuing life, my interest in being free from the kind of physical injury that threatens my ability to provide for
myself, my interest in being free from the kind of financial injury that puts me in conditions of health- or life-threatening poverty, and my interest in
being free from psychological trauma inflicted by others that renders me unable to care for myself. My interest in
security is a negative one in the sense that it is protected by a moral right constituted, in part, by moral obligations owed to me by other
people to refrain from committing acts of violence or theft capable of causing serious threats to my health, well-
being, and life. While it is difficult to draw the line between a serious harm and a nonserious harm, it will have to suffice for my purposes to say that a
serious harm is one that interferes significantly with the daily activities that not only give my life meaning, but make it possible for me to continue to survive.
Significant trauma to the brain not only interferes with many activities that constitute what Don Marquis calls the “goodness of life,”19 but also
interferes with my ability to make a living teaching and writing philosophy—while a mildly bruised arm does not. Where
exactly to draw the line is not entirely clear, but for my purposes I do not think much turns on it as long as it is understood that security interests do not include
minor injuries of any kind. I imagine the boundaries of the relevant notion of seriousness are likely to be contested in any event, but all would agree that the
interest in security, by nature, protects only against threats of serious injuries.
It should be abundantly clear that morality protects
these interests in the strongest terms available to it. Unless one is a complete skeptic about morality and moral objectivity, little
argument is needed to show that we have a moral right to be free from acts that pose a high risk of
causing either our death or grievous injuries to our bodies. Moreover, I would hazard that non-skeptics about morality would also accept that
the moral right to physical security is sufficiently important that a state is, as a matter of political morality, obligated to protect it, by criminalizing attacks on it, as a
condition of its legitimacy. No state authority
that failed to protect this right could be morally legitimate; at the very least
interests are not, however,
just about our own well-being; they encompass the well-being of other persons whose activities conduce to our own
no state authority that failed to do so could be justified in claiming a legitimate monopoly over the use of force. Security
physical security. We are social beings who live in societies in which there is a pronounced division of labor that makes the security of one person dependent upon
the security of other persons in a variety of ways—some more abstract, some less abstract.
Assessing Utilitarian consequences are good. Putting ethics in a vacuum is morally
irresponsible.
Issac, ‘2 (Jeffery, Professor of Political Science at Indiana University, Dissent, Vol. 49 No. 2, Spring)
Politics, in large part, involves contests over the distribution and use of power. To accomplish anything in the political world one must attend to
the means that are necessary to bring it about. And to develop such means is to develop, and to exercise, power. To say this is not to say that
power is beyond morality. It is to say that power is not reducible to morality. As writers such as Niccolo Machiavelli, Max Weber, Reinhold
Niebuhr, Hannah Arendt have taught, an unyielding
concern with moral goodness undercuts political responsibility.
The concern may be morally laudable, reflecting a kind of personal integrity, but it suffers from three fatal flaws: (1) It fails to see that
the purity of one’s intentions does not ensure the achievement of what one intends. Abjuring violence or
refusing to make common cause with morally comprised parties may seem like the right thing, but if such tactics entail impotence,
then it is hard to view them as serving any moral good beyond the clean conscience of their supporters;
(2) it fails to see that in a world of real violence and injustice, moral purity is not simply a form of powerlessness, it
is often a form of complicity in injustice. This is why, from the standpoint of politics-as opposed to religion-pacifism is always a
potentially immoral stand. In categorically repudiating violence, it refuses in principle to oppose certain violent injustices with any effect; and
(3)
it fails to see that politics is as much about unintended consequences as it is about intentions; it is the
effects of action, rather than the motives of action, that is most significant. Just as the alignment with “good” may
engender impotence, it is often the pursuit of “good” that generates evil. This is the lesson of communism in
the twentieth century: it is not enough that one’s goals be sincere or idealistic; it is equally important,
always, to ask about the effects of pursuing these goals and to judge these effects in pragmatic and
historically contextualized ways. Moral absolutism inhibits this judgment. It alienates those who are not true believers. It
promotes arrogance. And it undermines political effectiveness.
Alt cause – corporate privacy infringements are far worse and the public readily
accepts it.
Lewis ’14 (James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at
the Center for Strategic and International Studies in Washington, D.C., where he writes on technology,
security, and the international economy. Before joining CSIS, he worked at the US Departments of State
and Commerce as a Foreign Service officer and as a member of the Senior Executive Service. His
diplomatic experience included negotiations on military basing in Asia, the Cambodia peace process, and
the five-power talks on arms transfer restraint. Lewis received his Ph.D. from the University of Chicago.
“Underestimating Risk in the Surveillance Debate” - CENTER FOR STRATEGIC & INTERNATIONAL STUDIES
- STRATEGIC TECHNOLOGIES PROGRAM – December - http://csis.org/publication/underestimating-risksurveillance-debate)
Some of the unhappiness created by the Edward Snowden leaks reflects the unspoken recognition that online privacy has changed
irrevocably. The precipitous decline in privacy since the Internet was commercialized is the elephant in the
room we ignore in the surveillance debate. America’s privacy laws are both limited in scope and out of date. Although a majority of
Americans believe privacy laws are inadequate, the surveillance debate has not led to a useful discussion of privacy in
the context of changed technologies and consumer preferences. Technology is more intrusive as companies pursue
revenue growth by harvesting user data. Tracking online behavior is a preferred business model. On average, there are 16 hidden
tracking programs on every website. The growing market for “big data” to predict consumer behavior and
target advertising will further change privacy. Judging by their behavior, Internet users are willing to
exchange private data for online services. A survey in a major European country found a majority of Internet users disapproved of Google
out of privacy concerns, but more than 80 percent used Google as their search engine. The disconnect between consumer statements
and behavior reduces the chances of legislating better protections.
Solvency
Congress Can’t Solve
Congress can’t keep up with speed of technology
Gatewood, 2014 (Jace C., Associate Professor of Law at Atlanta's John Marshall Law School, “District
of Columbia Jones and the Mosaic Theory - In Search of a Public Right of Privacy: The Equilibrium Effect
of the Mosaic Theory” Nebraska Law Review Lexis)
Nevertheless, the question that still remains is why the onus should be on the government, rather
than the courts or legislature, to determine the scope of the mosaic theory's reach. In other words,
why should not the courts or legislature provide specific guidance to law enforcement on the degree
of permissible intrusion that will be permitted by the use of specific technology? The simple answer is
that the courts and legislature cannot keep up with the speed of technology. n223 There is no fix-all
law that will address all current and future technological advances. By not articulating specific
standards in terms of how much information is too much or how long is too long to conduct
surveillance, the courts are free to address each new technological advance on a case-by-case basis to
determine if the necessary mosaic has been created. Law enforcement and privacy will best be served
and preserved if the government is forced to make critical decisions regarding the use and abuse of
advanced technology.
Expansion of Mosaic Theory Bad DA
Uniqueness – Court against Mosaic Now
Courts are not ruling on the Mosaic theory now
Bellovin et al, 2014 (Steven M., Prof of Computer Science @ Columbia, Renee M. Hutchins, Associate
Prof. of Law @ Maryland Francis King Carey School of Law, Tony Jebara, Associate Prof. of Computer
Science @ Columbia, and Sebastian Zimmeck, Ph D. Candidate in Computer Science @ Columbia, “When
Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning” New York University
Journal of Law & Liberty Lexis)
In the context of location tracking, the Court has previously suggested that the Fourth Amendment may (at some
theoretical threshold) be concerned with the accumulated information revealed by surveillance.3 Similarly,
in the Court’s recent decision in United States v. Jones, a majority of concurring justices indicated
willingness to explore such an approach.4 However, in general, the Court has rejected any notion that
technological enhancement matters to the constitutional treatment of location tracking.5 Rather, it has
decided that such surveillance in public spaces, which does not require physical trespass, is equivalent to a human tail and thus not regu-lated
by the Fourth Amendment. In this way, the Court has avoided a quantitative analysis of the amendment’s protections. The
Court’s
reticence is built on the enticingly direct assertion that objectivity under the mosaic theory is
impossible. This is true in large part because there has been no rationale yet offered to objectively
distinguish relatively short-term monitoring from its counterpart of greater duration.6 This article suggests
that by combining the lessons of machine learning with the mosaic theory and apply-ing the pairing to the Fourth Amendment we can see the
contours of a response. Machine learning makes clear that mosaics can be created. Moreover, there are important lessons to be learned on
when this is the case.c
Uniqueness – Sequential Approach
There is a sequential approach to the Fourth Amendment now
Kerr, 2012 (Orin S., Professor of Law @ George Washington University Law School “THE MOSAIC
THEORY OF THE FOURTH AMENDMENT” Michigan Law Review Lexis)
The five votes in favor of a mosaic approach in United States v. Jones do not establish the theory as a
matter of law. The majority opinion in Jones failed to adopt the mosaic approach, and it only touched on the mosaic method in passing to
express skepticism of it.187 Even if five votes of the current court are ready to embrace the theory, lower courts must adhere to Supreme Court
holdings even when subsequent developments suggest that the Supreme Court would reject those holdings if it reviewed them.188 For
now, then, the sequential approach remains good law. At the same time, the concurring opinions in
Jones invite lower courts to consider embracing some form of the mosaic approach. Our attention therefore
must turn to the normative question: Should courts embrace the mosaic theory? Is the mosaic approach a promising new method of Fourth
Amendment interpretation, or is it a mistake that should be avoided? This section argues that courts
should reject the mosaic
theory. The better course is to retain the traditional sequential approach to Fourth Amendment
analysis. The mosaic theory aims at a reasonable goal. Changing technology can outpace the assumptions of existing precedents, and courts
may need to tweak prior doctrine to restore the balance of privacy protection from an earlier age. I have called this process “equilibrium
adjustment,”189 and it is a longstanding method of interpreting the Fourth Amendment. But the mosaic theory aims to achieve this goal in a
very peculiar way.
Hurts Police (General)
Expansion of the Mosaic theory kills investigations – there are no limits, retroactivity,
and ensures court clog.
Ostrander, 2011 (Benjamin M. Candidate for JD @ Notre Dame Law School, “THE “MOSAIC THEORY”
AND FOURTH AMENDMENT LAW” Notre Dame Law Review Lexis)
Maynard left little guidance as to what durational threshold must to be crossed in order for the use of pattern-detecting
technology to be sufficiently prolonged as to render it a search.93 Without a clearly demarcated line, law enforcement
agents, judges, and individuals cannot know when an aggregate of information will receive Fourth
Amendment protection. Law enforcement agents are left to speculate as to how much is too much.94
This lack of clarity will deter law enforcement agents from utilizing the full extent of their
investigatory power . This is even more problematic with respect to the “mosaic theory’s” creation of
retroactive unconstitutionality.95 As soon as a pattern is created, previously permissible individual law
enforcement steps become unconstitutional. Because the “mosaic theory” retroactively renders the
entire mosaic unconstitutional and subject to suppression, law enforcement agents will be even more
hesitant in exercising the full extent of their investigatory power. Further, if the “mosaic theory” in the Fourth
Amendment is premised on the idea that “prolonged GPS monitoring reveals an intimate picture of the subject’s life that he expects no one to
have— short perhaps of his spouse,”96 who has the burden of proof with respect to whether the prolonged surveillance has in fact revealed an
intimate picture of an individual’s life and thus created a mosaic? Unless the location of a “stash-house” is an intimate detail, Maynard can be
read to stand for the proposition that warrantless prolonged GPS surveillance is per se unconstitutional. Such an approach would be overinclusive in that prolonged location monitoring that does not result in a pattern, or a pattern that does not reveal intimate details, would be
rendered a search within the meaning of the Fourth Amendment and therefore subject to suppression. Once the mosaic threshold is crossed
and a mosaic is created, the question that arises is to how to define the scope of the mosaic. If law enforcement officials engage in a number of
sustained investigatory techniques—as they often do—it is likely that whole investigations will be called into question. That is, if a pattern is
detected only through the use of multiple investigatory techniques, and the theory is applied consistently, the investigation in its entirety will
be rendered a search.97 In this respect, the retroactive effect of the “mosaic theory” takes on greater significance. Rather than having the
entire investigation held inadmissible and subject to suppression, law enforcement agents will be overly cautious as to the amount of
surveillance conducted. The
lack of clarity as to how prolonged the surveillance must be to render it a search,
whether intimate details need in fact emerge, and what the proper scope of the mosaic is will provide
defendants with an arsenal to attack every police investigation.
Mosaic theory kills effective law enforcement.
Bedi, 2014 (Monu, Assistant Professor, DePaul University College of Law, “SOCIAL NETWORKS,
GOVERNMENT SURVEILLANCE, AND THE FOURTH AMENDMENT MOSAIC THEORY” Boston University
Law Review Lexis)
The most troubling part of adopting the mosaic theory is that it requires the abandonment of, or dramatic
alterations to, the Doctrines. The basic problem is the inherent conflict between the first and second models of reasonable
expectation. While the Doctrines embrace a per se rule focusing solely on disclosure and why this vitiates privacy, the mosaic
theory rests on society’s opinion and what it deems reasonable.223 Consider the Public Disclosure
Doctrine. The fact that public movements are not protected under the Fourth Amendment is critical
to law enforcement investigations .224 Visual warrantless surveillance remains a central part of police
surveillance.225 It is not clear to what extent these practices will remain constitutional with the
introduction of the mosaic theory. For instance, it is common for officers to track vehicles and
aggregate information from various sources over a period of time.226 As Gray and Citron point out, the “mosaic
theory puts these practices and the line of doctrine endorsing them in obvious jeopardy, particularly
when officers are too successful and their investigations produce too much information.”227 This
danger is compounded by the fact that law enforcement may use a combination of visual and
technology-based surveillance (a la Knotts) when investigating a suspect. “How, after all,” ask Gray and Citron, “are we to
distinguish ‘between the supposed invasion of aggregation of data between GPS-augmented surveillance and a purely visual surveillance of
substantial length’?”228 It won’t do here to simply say that a specific duration of technology-dependent surveillance violates the expectation of
privacy. The
problem is that the Public Disclosure Doctrine treats all public movements the same,
regardless of how much information is disclosed or how long it is observed.229 To carve out exceptions
based on what society thinks is unreasonable leaves vulnerable investigative techniques that are
essential to effective law enforcement.
Using the mosaic theory hampers numerous investigative techniques.
Ostrander, 2011 (Benjamin M. Candidate for JD @ Notre Dame Law School, “THE “MOSAIC THEORY”
AND FOURTH AMENDMENT LAW” Notre Dame Law Review Lexis)
One of the most serious implications of the “mosaic theory” in Fourth Amendment law is that it calls into
question the validity of previously accepted forms of surveillance. GPS surveillance is not the only form of
surveillance that provides law enforcement with a comprehensive and detailed record of someone’s
movements or affairs when it is sustained on a prolonged basis. Thus, the “mosaic theory,” which focuses on the resulting
patterns created by individual law enforcement acts that in and of themselves are not searches, naturally calls into question other
accepted investigative techniques that are performed on a sufficiently prolonged basis.98 For instance, the
“mosaic theory” calls into question the use of pen registers99 and trap and trace devices,100 which have
been held to not implicate the Fourth Amendment.101 The “mosaic theory” would also seemingly implicate the prolonged use of a mail
cover 102 as an investigatory technique. 103 Although the Supreme Court has yet to address the issue, courts have held that the
warrantless use of a mail cover does not violate the Fourth Amendment.104 Another accepted investigatory technique that
can reveal very intimate details of an individual’s life— particularly if sustained for a prolonged
basis—is garbage inspections. 105 It could plausibly be argued that the patterns that result from the prolonged use of garbage
inspections are much more intrusive than any pattern resulting from the use of a GPS device.106 The same could be said about
prolonged video surveillance.107 It is well settled that video surveillance in public areas does not give
rise to a Fourth Amendment issue.108 Thus, video cameras may be placed outside of an individual’s residence, and so long as the
cameras are incapable of viewing the interior of the residence, no Fourth Amendment right is infringed upon.109 Since Maynard, the
“mosaic theory” has in fact been used as the basis for holding a previously accepted investigatory
technique a search. In In re Application of the United States of America for an Order Authorizing the Release of Historical Cell-Site
Information,110 Magistrate Judge Orenstein denied the government’s application for an order under the Stored Communications Act111
directing a service provider to disclose two months worth of historical cell-site location information. 112 According to Magistrate Judge
Orenstein: The Maynard court’s concern with sustained GPS tracking over the course of a month was not its formally continuous nature, but
rather the fact that it results in a vast collection of specific data points that, viewed together, convey the “intimate picture” of a subject’s life. It
is the ability to amass a collection of such points, and not the ability to trace the route from each one to the next, that carries with it the ability
to resolve those points into a comprehensible picture.113 Applying the “mosaic theory” to historical cell-site information, Magistrate Judge
Orenstein concluded that the Fourth Amendment required the government to obtain a warrant based on a showing of probable cause.114
The most significant implication of the “mosaic theory,” however, is that it calls into question the
governmental use of prolonged visual surveillance in criminal investigations.115 In Maynard, the court
addressed the issue of the possible extension of the “mosaic theory” to prolonged visual surveillance.116 Although the court ultimately
declined to decide whether such a situation would constitute a search under the new theory, it suggested that visual surveillance would not be
implicated.117 The
court noted that practically, law enforcement agents do not have the capability to
sustain visual monitoring for a duration that exposes information not revealed to the public.118 This
argument is unpersuasive to the extent that it suggests that a mosaic is only created if the whole of
one’s movements is captured. A pattern can be created, and thus intimate details revealed, by the
aggregation of individual law enforcement steps not necessarily constituting the whole of the
investigatory techniques employed. The court implicitly recognizes this, as even continuous GPS tracking of a vehicle does not
reveal the entirety of one’s movements, but rather only the movements of a particular vehicle. Further, the dismissal of the
implication of visual surveillance is problematic to the extent that it relies on the probability of law
enforcement success. Such probability, however, must be viewed in relation to the factual context in which the investigation is
conducted, and not in the abstract. To be sure, it is not beyond the realm of possibility that a properly equipped
and resourced law enforcement unit would be capable of monitoring an unsuspecting individual for a
continuous period of time sufficient to create a mosaic. As a theoretical matter, the court reasoned that in contrast to
prolonged GPS monitoring, the extension of the “mosaic theory” to visual surveillance would fail as the means used to uncover private
information would not defeat one’s expectation of privacy.119 The
court’s analogy to the distinction between the
placement of undercover agents and wiretapping120 overlooks the fact that here, warrantless GPS
tracking and visual surveillance are constitutional in the first instance. In fact, the “mosaic theory”
focuses on the nature of the information revealed —a pattern exposing intimate details— and does not focus on
the investigatory method used to attain such information. Beyond prolonged visual and video surveillance, Maynard
does not express a view as to whether other investigatory techniques would be called into question by the “mosaic theory.” This analysis
suggests that the
“mosaic theory,” if consistently applied, would implicate the cumulative effect of
previously accepted surveillance methods.121 It is in this capacity that the “mosaic theory” has the potential to revolutionize
the Fourth Amendment.
Court application of the mosaic theory is impractical and hurts police investigations.
Ostrander, 2011 (Benjamin M. Candidate for JD @ Notre Dame Law School, “THE “MOSAIC THEORY”
AND FOURTH AMENDMENT LAW” Notre Dame Law Review Lexis)
The use of emerging and existing intrusive technologies in criminal investigations certainly has the potential to have a substantial effect on
privacy. In an effort to combat the threat of such use, Maynard introduced the “mosaic theory” into Fourth Amendment law. The
“mosaic
theory” holds that individual law enforcement acts that are not “searches” become a “search” when
aggregated, as the whole reveals more than the individual acts it comprises. This Note suggests that despite the
intuitive appeal of a “mosaic theory,” the use of the theory in Fourth Amendment law is misguided. The “mosaic
theory” is inconsistent with the Supreme Court’s voluntary exposure analysis, which has often classified theoretical or limited disclosures of
information as complete exposures warranting no Fourth Amendment protection. 176 It is also inconsistent with the Supreme Court’s implicit
rejection of the proposition that the Fourth Amendment analysis is altered when an investigatory technique is prolonged to the point where
information may be accumulated.177 Not
only is the theory inconsistent with existing Fourth Amendment
jurisprudence, it is also impractical in application. A problematic question arises as to what durational
threshold must be crossed in order for the use of a pattern-detecting technology to be sufficiently
prolonged as to render it a search. Once this illusive threshold is crossed and a mosaic is created, the
question that then arises is how to define the scope of the mosaic. If a pattern is created only through
the use of multiple investigatory techniques, the entire investigation will be rendered a search. Also left
unanswered is the appropriate standard of review for the use of pattern-detecting investigatory techniques in criminal investigations. The
most serious implication of the theory, however, is that it calls into question a number of previously
accepted investigatory techniques.
Removal of the third party doctrine hurts law enforcement’s ability to investigate
Thompson 14 – Richard M Thompson II, is a Legislative Attorney for –––– 2014. (“The Fourth
Amendment Third-Party Doctrine,” Congressional Research Service, June 5, 2014. Available at
https://www.fas.org/sgp/crs/misc/R43586.pdf, Accessed on 07-06-2015)
As a more practical matter, assistance from third parties is utilized by law enforcement in almost every
investigation. When investigating a murder, robbery, or any other crime committed in the real world,
police officers will usually interview witnesses to obtain facts about the crime. To conduct these
interviews, the officers generally need not obtain a warrant, and witnesses who refuse to cooperate
can be compelled to testify with a grand jury subpoena.119 It could be argued that this process of fact
finding is very similar to requesting documentary evidence held by third parties and the same standard
should be applied to each.
In this same vein, Professor Orin Kerr has defended the third-party doctrine on the ground that it
maintains the appropriate balance of privacy and security in the face of technological change.120
Without the ability to use third parties such as telephone or Internet companies, Kerr posits, the
criminal would traditionally have to go out into the public to commit his crime where the Fourth
Amendment offers more limited protection. He argues that a criminal can use the services of these
third parties to commit crimes without having to expose these activities to areas open to public
surveillance.121 This, he posits, upsets the privacy-security balance that undergirds the Fourth
Amendment because it would require police to have probable cause to obtain any evidence of the
crime: “The effect would be a Catch-22: The police would need probable cause to observe evidence of
the crime, but they would need to observe evidence of the crime first to get probable cause.”122 Kerr
contends that the third-party doctrine responds to this imbalance by providing the same amount of
protection regardless of whether the defendant commits the crime on his own or through the use of a
third-party service.
Hurts Undercover Informants
Mosaic theory undermines the ability of undercover agents to work in law
enforcement.
Bedi, 2014 (Monu, Assistant Professor, DePaul University College of Law, “SOCIAL NETWORKS,
GOVERNMENT SURVEILLANCE, AND THE FOURTH AMENDMENT MOSAIC THEORY” Boston University
Law Review Lexis)
Scholars have questioned the viability of the mosaic theory, particularly as it relates to the status of
government investigative practices.11 Accepting this theory puts routine government surveillance in jeopardy of Fourth
Amendment restrictions.12 It seems that even the brief surveillance of an individual could reveal private information. For instance, a single trip
to a particular religious gathering or political function could reveal compromising or otherwise personal information that an individual would
like to keep secret. More generally, people may disagree as to what society thinks is reasonable or unreasonable surveillance.13 Perhaps even
short-term monitoring of a person’s public movements in a remote area where police are not likely to find themselves would also qualify as an
unreasonable intrusion.14 To make matters worse, this
theory also severely curtails the application of the Third
Party Doctrine, the corollary to the Public Disclosure Doctrine (collectively the “Doctrines”).15 The Third Party Doctrine
states that any information disclosed to another person or entity—much like the public generally—
loses any Fourth Amendment protection.16 This doctrine allows law enforcement to use undercover
agents and surreptitiously gather information without a warrant.17 However, under the mosaic approach,
one could also argue that these communications, taken in the aggregate, can reveal private
information about this person (e.g., disclosures about religious or privately held beliefs) and thus should be protected,
particularly if the agent goes to great lengths in gaining the confidence of the suspect. 1
Hurts Third Party Doctrine
Mosaic theory kills the third party doctrine and law enforcement
Bedi, 2014 (Monu, Assistant Professor, DePaul University College of Law, “SOCIAL NETWORKS,
GOVERNMENT SURVEILLANCE, AND THE FOURTH AMENDMENT MOSAIC THEORY” Boston University
Law Review Lexis)
The Third Party Doctrine would also be on shaky ground. Here, too, the mosaic theory would upset
the voluntary disclosure principle that stands at the heart of this doctrine.230 Shifting the focus to
what society or an individual deems reasonable (the first model of reasonable expectation of privacy) would surely
frustrate the use of undercover informants or other surreptitious data collection techniques that do not require a warrant.
Imagine a scenario where an informant is deep undercover for a significant period of time gaining the
trust of a Or imagine an informant who dupes a suspect into allowing her into her home and
disclosing private and incriminating information. suspect. Or perhaps the government simply acquires a wealth of
financial records from a suspect’s bank. Currently, all of these types of law enforcement tools do not trigger Fourth Amendment protection
because the individual voluntarily discloses the information to another person or entity.231 However, under
the mosaic theory,
none of these tactics are secure.232 Societal expectations may find that these methods, too, impinge
on Fourth Amendment rights as they involve unreasonable duplicity and reveal private information.
Police would thus find themselves in the new position of having to secure a warrant based on probable cause before engaging in these
practices. For some, this conclusion may be welcomed, particularly in today’s technological world where disclosures to various entities and
individuals have become ubiquitous.233 Justice Sotomayor, in fact, raises this possibility in her concurrence.234 This Article does not take such
a drastic approach, nor would such a course be desirable. Any
such rejection would come at the cost of jettisoning or
severely curtailing essential law enforcement investigative techniques that have historically not been subject to
warrant and probable cause requirements.235
Child Porn Impact
Police effectiveness and internet surveillance strategies are key to stopping atrocities
such as child pornography
Wortley and Smallbone 12 – Richard Wortley has a PhD in psychology, and worked as a prison
psychologist for ten years, and is a past national Chair of the Australian Psychological Society’s College of
Forensic Psychologists; Stephen Smallbone is a psychologist and Professor in the School of Criminology
and Criminal Justice and an Australian Research Council ‘Future’ Fellow, 2012 (“Child Pornography on
the Internet,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 41, 5/2012,
Avaliable Online at http://www.hawaii.edu/hivandaids/Child_Pornography_on_the_Internet.pdf,
accessed on 7/3/15)//CM
General Considerations for an Effective Response Strategy As noted, Internet child pornography presents some unique
challenges for law enforcement agencies. However, despite the difficulties involved in controlling the
problem, local police have an important role to play. To maximize their contribution, local police departments
need to: Acquire technical knowledge and expertise in Internet pornography. If your department does not have a
specialized Internet crime unit, then find out where you can obtain assistance or training. Appendix B lists online resources that can provide
information on national and international initiatives, tips and leads, technical assistance, and staff training. Establish links with
other
agencies and jurisdictions. It is important that local police departments share information and
coordinate their activities with other jurisdictions. Appendix B also lists agencies that have specific programs or sections
designed to provide a coordinated response to Internet child pornography. Establish links with ISPs. ISPs can be crucial
partners for police. As has been noted, there is often a lack of specific legislation setting out ISPs’
obligations. This makes it especially important for police to establish good working relations with ISPs
to elicit their cooperation in the fight against Internet child pornography. Prioritize their efforts. Because of the
volume of Internet child pornography crime, police forces need to prioritize their efforts and concentrate on the
most serious offenders, particularly those actually involved in abusing children and producing
pornographic images.60 For example, one strategy may be to cross reference lists of Internet child pornography users with sex
offender registries to increase the chance of targeting hands-on offenders (see Appendix B). It has been noted that success in combating child
pornography is too often judged in terms of the number of images recovered, rather than by the more significant criterion of whether the
crimes the images portray have been prevented. Specific Responses to Reduce Internet Child Pornography It is generally acknowledged that it is
impossible to totally eliminate child pornography from the Internet. However, it is possible to reduce the volume of child pornography on the
Internet, to make it more difficult or risky to access, and to identify and arrest the more serious perpetrators. Since 1996, ISPs have removed
some 20,000 pornographic images of children from the web.62 Around 1,000 people are arrested annually in the United States for Internet
child pornography offenses.63 The following strategies have been used or suggested to reduce the problem of child pornography on the
Internet. Computer Industry Self Regulation ISPs
have a central role to play in combating Internet child
pornography. The more responsibility ISPs take in tackling the availability of child pornography images
on the Internet, the more resources police can devote to addressing the production side of the
problem. However, there are two competing commercial forces acting on ISPs with respect to self regulation. On the one hand, if an ISP
restricts access to child pornography on its server, it may lose out financially to other ISPs who do not. Therefore, it will always be possible for
offenders to find ISPs who will store or provide access to child pornography sites. On the other hand, ISPs also have their commercial reputation
to protect, and it is often in their best interests to cooperate with law enforcement agencies.
Most major ISPs have shown a
commitment to tackling the problem of child pornography. By establishing working relationships with
ISPs, and publicizing those ISPs who take self regulation seriously, police may be able to encourage
greater levels of self regulation. Current self-regulatory strategies include:1. Removing illegal sites. A number of ISP
associations have drafted formal codes of practice that explicitly bind members to not knowingly
accept illegal content on their sites, and to removing such sites when they become aware of their
existence. Service agreement contracts with clients will often set out expected standards that apply to site content. Large ISPs may have
active cyber patrols that search for illegal sites.64 2. Establishing complaint sites/hotlines. Some ISP associations have set up Internet sites or
hotlines that allow users to report illegal practices.65 These associations either deal directly with the complaint (e.g., by contacting the
webmaster, the relevant ISP, or the police) or refer the complainant to the appropriate authorities. 3. Filtering browsers/search engines.
ISPs
can apply filters to the browsers and search engines their customers use to locate websites. There are
numerous filtering methods. For example, filters can effectively treat certain key words as if they do
not exist, so that using these words in a search will be fruitless.66 Software that can identify
pornographic images is also being developed. Legislative Regulation Not everyone is satisfied with the current reliance on
self regulation, and there have been calls for increased legislation to compel the computer industry to play
a greater role in controlling Internet child pornography. Police may be an important force in lobbying
for tighter restrictions. Among the proposals for tighter regulation are: 4. Making ISPs legally
responsible for site content. ISPs’ legal responsibilities to report child pornography vary among jurisdictions. In the United
States, ISPs are legally required to report known illegal activity on their sites, but they are not
required to actively search for such sites.68 It has been argued that ISPs’ legal responsibilities should be
strengthened to require a more proactive role in blocking illegal sites.69 5. Requiring the preservation
of ISP records. Police may apply for a court order to seize ISP accounts.70 However, to assist in the prosecution of
offenders, ISPs need to maintain good records of IP logging, caller ID, web hostings, and so forth.71 6. Requiring user verification.
ISPs often exercise little control over verifying the identities of people who open Internet accounts.
Accounts may be opened using false names and addresses, making it difficult to trace individuals who
engage in illegal Internet activity. In addition, without verifying users’ ages, there is no way of knowing if children are operating
Internet accounts without adult supervision. This problem of Internet anonymity is likely to increase as the
potential to access the Internet via mobile phones becomes more common. It has been argued that both ISPs
and mobile phone networks need to strengthen procedures for user verification.72 7. Regulating anonymous remailers.
Remailers are servers that forward emails after stripping them of sender identification. It has been
argued that much tighter regulation of remailers is necessary. Some have advocated making remailer administrators
legally responsible for knowingly forwarding illegal material, while others have called for a complete ban on remailers.73 8. Using key escrowed
encryption. Encryption of pornographic images is shaping to be the biggest technological problem facing law enforcement agencies. Key
escrowed encryption would require anyone selling encryption software to supply a trusted third party with a key to the code.74 This has been
strongly resisted by the computer industry. In the meantime, work continues on developing code-breaking software.
Surv. Key To Solve
Law enforcement responses to child pornographers rely on effectiveness and
surveillance
Wortley and Smallbone 12 – Richard Wortley has a PhD in psychology, and worked as a prison
psychologist for ten years, and is a past national Chair of the Australian Psychological Society’s College of
Forensic Psychologists; Stephen Smallbone is a psychologist and Professor in the School of Criminology
and Criminal Justice and an Australian Research Council ‘Future’ Fellow, 2012 (“Child Pornography on
the Internet,” Problem-Oriented Guides for Police Problem-Specific Guides Series No. 41, 5/2012,
Avaliable Online at http://www.hawaii.edu/hivandaids/Child_Pornography_on_the_Internet.pdf,
accessed on 7/3/15)//CM
Law Enforcement Responses In the strategies discussed so far the police role has largely involved
working in cooperation with other groups or acting as educators. A number of strategies are the
primary responsibility of police. As a rule, local police will not carry out major operations. Most major
operations require specialized expertise and inter-agency and inter-jurisdictional cooperation. (See
Appendix C for a summary of major coordinated law enforcement operations in recent years.) However,
local police will almost certainly encounter cases of Internet child pornography in the course of their
daily policing activities. Law enforcement responses include: 19. Locating child pornography sites.
Police agencies may scan the Internet to locate and remove illegal child pornography sites. Many areas
of the Internet are not accessible via the usual commercial search engines, and investigators need to be
skilled at conducting sophisticated searches of the ‘hidden net.’ Police may issue warnings to ISPs that
are carrying illegal content. 20. Conducting undercover sting operations. Law enforcement agents may
enter pedophile newsgroups, chat rooms, or P2P networks posing as pedophiles and request emailed
child pornography images from others in the group.82 Alternatively, they may enter child or teen
groups posing as children and engage predatory pedophiles lurking in the group who may send
pornography or suggest a meeting. A variation of the sting operation is to place ads on the Internet
offering child pornography for sale and wait for replies.83 Recently, Microsoft announced the
development of the Child Exploitation Tracking System to help link information such as credit card
purchases, Internet chat room messages, and conviction histories.84 21. Setting up honey trap sites.
These sites purport to contain child pornography but in fact are designed to capture the IP or credit
card details of visitors trying to download images. These can be considered a type of sting operation
and have resulted in numerous arrests. However, their primary purpose is to create uncertainty in the
minds of those seeking child pornography on the Internet, and, therefore, reduce the sense of freedom
and anonymity they feel (see Operation Pin in Appendix C). 22. Publicizing crackdowns. Many police
departments have learned to use the media to good effect to publicize crackdowns on Internet child
pornography.85 Coverage of crackdowns in the mass media increases the perception among potential
offenders that the Internet is an unsafe environment in which to access child pornography. 23.
Conducting traditional criminal investigations. Although most media attention is often given to
technological aspects of controlling Internet child pornography, in fact many arrests in this area arise
from traditional investigative police work. Investigations may involve information from: The public:
The public may contact police directly, or information may be received on one of the various child
pornography hotlines. Computer repairers/technicians: Some states mandate computer personnel to
report illegal images.86 There are cases where computer repairers have found child pornography
images on an offender’s hard drive and notified police.87 Police may establish relationships with local
computer repairers/ technicians to encourage reporting. Victims: A point of vulnerability for producers
of child pornography is the child who appears in the pornographic image. If the child informs others of
his/her victimization, then the offender’s activities may be exposed.88 Known traders: The arrest of one
offender can lead to the arrest of other offenders with whom he has had dealings, producing a
cascading effect. In some cases the arrested offender’s computer and Internet logs may provide
evidence of associates. (See Operation Cathedral in Appendix C.) Unrelated investigations: There is
increasing evidence that many sex offenders are criminally versatile and may commit a variety of other
offenses.89 Police may find evidence of Internet child pornography while investigating unrelated crimes
such as drug offenses.
Cyber Harassment Impact
Cyberharassment is a growing problem - mosaic theory hinders apprehension.
Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland
Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of
Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey
School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES”
Journal of Criminal Law & Criminology Lexis)
Cyberharassment is a widespread and growing challenge for law enforcement in the United States.
These online attacks feature threats of violence, privacy invasions, reputation-harming falsehoods,
impersonation, computer hacking, and extortion. They often appear in e-mails, instant messages, blog
entries, message boards, or sites devoted to tormenting individuals. As the executive director of the National Center
for Victims of Crime explained in her congressional testimony supporting the 2006 cyberstalking amendment to the Violence Against Women
Act: Stalkers
are using very sophisticated technology ... - installing spyware on your computer so that they can track
all of your interactions on the Internet, your purchases, your e-mails and so forth, and then using that against you, forwarding e-mails
to people at your job, broadcasting your whereabouts, your purchases, your reading habits and so on, or installing GPS in your car so that you
will show up at the grocery store, at your local church, wherever and there is the stalker and you can't imagine how the stalker knew that you
were going to be there... . I am happy that this legislation amends the statute so that prosecutors have more effective tools, I think, to address
technology through VAWA 2005. n257 Although some attackers confine their harassment to networked technologies, others use all available
tools to harass victims, including real-space contact. Offline harassment or stalking often includes abusive phone calls, vandalism, threatening
mail, and physical assault. n258 According to the Bureau of Justice Statistics, 850,000
adults experienced stalking with an
online component in 2006, including threats in e-mails, text messages, chat rooms, and blogs. n259
Young people are even more likely to experience some form of cyberharassment. The National Center
for Education Statistics reports that, during the 2008-2009 school year, 1.5 million young people in the
United States were victims of some form of cyberharassment. n260 Already a significant problem, [*789]
cyberharassment is on the rise. College students now report more sexually harassing speech in online
interactions than in face-to-face ones. As the National Institute of Justice explains, the "ubiquity of the Internet and the ease
with which it allows others unusual access to personal information" make individuals more accessible and vulnerable to online abuse. n261
Harassing someone online is far cheaper and less personally risky than confronting them in space. n262
Cyberharassment and the identity of its victims follow the well-worn pathways of bias crimes. The most recent Bureau of Justice
Statistics findings report that 74% of online stalking victims are female. n263 Perpetrators are far more
likely to be men. n264 Unsurprisingly, the content of these attacks are often sexually explicit and
demeaning, drawing predominantly on gender stereotypes. As one blogger observed, "the fact is, to be a
woman online is to eventually be threatened with rape and death. On a long enough timeline, the
chances of this not occurring
drop to [*790] zero." n265 Cyberharassment
also follows racial lines. A study
to this study,
nonwhite females faced cyberharassment more than any other group, with 53% reporting having been harassed
online. Next were white females, with 45% reporting having been targeted online, with nonwhite males right behind
them at 40%. The group least likely to have been harassed was white males, at 31%. n266 Across race, being lesbian,
transgender, or bisexual also raised the risk of being harassed. real n267 Another disturbing feature of
cyberharassment is that it tends to be perpetrated by groups rather than individuals. Those who
engage in abusive online conduct often move in packs. n268 Cyberharassers frequently engage proxies to help torment
conducted in 2009 asked 992 undergraduate students about their experience with cyberharassment. According
their victims. n269 These group attacks bear all of the hallmarks of violent mob behavior. So much so, in fact, that one of us has dubbed them
"cyber mobs." n270 As with sole practitioners, online mob harassment is more likely to be perpetrated by members of dominant demographics,
and to draw on popular stigmas for the purpose of shaming and degrading their targets. n271 Of course, cold statistics and
general
description tell at best part of the story of legitimate government and law enforcement interests in
preventing, detecting, and prosecuting cyberharassment. Recent efforts to highlight the privacy
interests that compel recognition of the mosaic theory of Fourth Amendment privacy make liberal use of
individual stories, in part to pluck [*791] empathetic strings in the audience. n272 In weighing the competing interests at
stake in regulating access to and use of digital surveillance technologies, it is therefore fair to consider
the impact of crimes like cyberharassment in individual cases. Take the publicly reported case of D.C. v. R.R. n273 D.C. was a
high school student who was actively pursuing a career in the entertainment industry as a singer and actor. n274 He used a pseudonym in his
professional career, n275 under which he maintained a fan site that, among other features, allowed visitors to post comments to a
"guestbook." Several students at D.C.'s school, who were later identified in a civil suit, engaged in a pattern of targeted harassment of D.C. by
posting comments to his website. Some were simply offensive - one student told D.C. that he was "the biggest fag in the [high school] class."
n276 Others, however, went much further, threatening physical and sexual violence in graphic detail. One person posted on D.C.'s website, "I
want to rip out your fucking heart and feed it to you... . If I ever see you I'm ... going to pound your head in with an ice pick. Fuck you, you dickriding penis lover. I hope you burn in hell." n277 Another post told D.C. that he was "now officially wanted dead or alive," and a third promised
to "unleash my manseed in those golden brown eyes." n278 According to a California appellate court, the contents of these posts suggested
that "the students ... sought to destroy D.C.'s life, threatened to murder him, and wanted to drive him out of [his high school] and the
community in which he lived." n279 In that goal they were successful. On [*792] advice of law enforcement, who consulted the Federal Bureau
of Investigation, D.C. withdrew from his school and moved with his family to the other end of the state. n280 Despite these efforts, the student
newspaper at his former school reported his new location and the name of his new institution. n281 As a consequence of this harassment, D.C.
developed a persistent anxiety disorder. n282 Cyberharassment
has also spawned a new brand of extortion labeled
"sextortion." n283 This is a form of blackmail in which the extortionist threatens to publicize images or
information that his target might find embarrassing unless the victim provides sexually explicit
pictures and videos or agrees to participate in live sex shows via Skype or other direct video
communications. n284 One infamous perpetrator of sextortion schemes invaded his targets' computers using malicious software that
allowed him to mine his victims' hard drives for compromising images or to capture images using their own computer cameras. n285 He then
used those images and access to his targets' computers and e-mail accounts to terrorize them until they agreed to produce sexually explicit
pictures or videos for him. Young
people are particularly vulnerable. n286 Teenagers who are extorted into
engaging in explicit sex acts under threat and at such a formative stage of their development are also
more likely to suffer scarring emotional and psychological harm. n287 As United States Attorney Joseph Hogsett put
the [*793] point when commenting on a successful prosecution, "This defendant may not remember his alleged victims, but the true tragedy is
that not one of them will ever forget." n288 Cyberharassers engage in telephone harassment as well. For example, in
September 2010, Daniel Leonard pleaded guilty to a pattern of harassment that involved over 4,000 threatening and sexually explicit phone
calls made to over 1,200 phone numbers using an Internet "spoofing" service that masked his phone number from the call recipients. n289
Others go further still by using the Internet to incite others to rape and stalk victims. Federal
prosecutors recently brought a
cyberstalking indictment against a man who impersonated his ex-girlfriend online over a four-year
period, inciting others to stalk her in person. The man posted online advertisements with the victim's contact information and
her alleged desire for sex with strangers. On porn sites, he uploaded videos of her having sex (which he filmed while they were dating)
alongside her contact information. n290 Because strange men began appearing at her home demanding sex, the woman changed her name and
moved to another state. Her ex-boyfriend discovered her new personal information and again posted her name, address, and an invitation to
have sex on pornography sites next to her picture. The cycle repeated itself, with strange men coming to her house at night demanding sex.
Although this victim was never physically assaulted, others are not so lucky. In December 2009, Ty McDowell broke into the home of a woman
in Casper, Wyoming, tied her up, and raped her. During the course of the [*794] attack, he told her: "You want an aggressive man, bitch, I'll
show you aggressive." n291 Although McDowell did not know his victim, his crime was not random. Rather, he had responded to an online
advertisement posted on Craigslist that purported to be from a woman seeking to fulfill her own rape fantasies. After a lengthy correspondence
with the ad's poster, McDowell believed that he was fulfilling his victim's desires. n292 He was not. As a subsequent investigation would reveal,
McDowell was in communication with Jebediah Stipe, who posted the ad and arranged the attack on his ex-girlfriend. n293 Stipe and McDowell
were sentenced to sixty-year prison terms after pleading guilty to charges of aggravated kidnapping, rape, and burglary. n294
Cyberharassment can also be more general. Sites that encourage sexualized online abuse are all too
common. The website IsAnyoneUp.com provides a notorious example. For a time, it was one of the most popular forums on the Internet for
"revenge porn," which entails spurned former lovers posting sexualized pictures of their ex-wives and ex-girlfriends on a public forum so that
others can leer at and demean them. n295 Although IsAnyoneUp.com eventually shut down amidst protests and outcry, its operator, Hunter
Moore, started a similar site under a different name, HunterMoore.TV, which may eventually include not only pictures of women, but also an
overlaid map to the homes of those featured in the pictures. n296 Consider too "Violentacrez," a notorious Reddit administrator [*795] who
oversaw forums like "Jailbait," "Creepshots," "Rapebait," "Incest," "Beatingwomen," and "Picsofdeadjailbait," each of which featured pictures
and commentary from his followers that celebrated the interests described by the forums' titles. n297 There
is, of course, much
more to be written about the incidents and dynamics of cyberharassment crimes. For present
purposes, however, the foregoing is sufficient to show that there are significant and legitimate
governmental interests at stake in preventing, detecting, and prosecuting various forms of
cyberharassment. Although cyberharassment is relatively new, executives and legislatures have
manifested these interests by setting up dedicated enforcement units and passing tailored criminal
statutes. n298 As we argue in the next section, adopting a mosaic theory of the Fourth Amendment
likely will implicate these law enforcement concerns by limiting access to both existing and future
digital surveillance techniques and technologies. n299
Online harassment and the lack of response from institutions allows for threats,
violence, and discrimination against women to continue unabated
Hess 14 – Amanda Hess is a Slate staff writer and popular Gender & Sexuality reporter, 2014 (“Why
Women Aren't Welcome on the Internet,” Pacific Standard, 1/6/14, http://www.psmag.com/healthand-behavior/women-arent-welcome-internet-72170, 7/3/15)//CM
A woman doesn’t even need to occupy a professional writing perch at a prominent platform to become a target. According to a 2005 report by
women and men have
been logging on in equal numbers since 2000, but the vilest communications are still
disproportionately lobbed at women. We are more likely to report being stalked and harassed on the
Internet—of the 3,787 people who reported harassing incidents from 2000 to 2012 to the volunteer organization
Working to Halt Online Abuse, 72.5 percent were female. Sometimes, the abuse can get physical: A Pew survey reported
that five percent of women who used the Internet said “something happened online” that led them into
“physical danger.” And it starts young: Teenage girls are significantly more likely to be cyberbullied than boys. Just appearing as
a woman online, it seems, can be enough to inspire abuse. In 2006, researchers from the University of Maryland set up a
the Pew Research Center, which has been tracking the online lives of Americans for more than a decade,
bunch of fake online accounts and then dispatched them into chat rooms. Accounts with feminine usernames incurred an average of 100
sexually explicit or threatening messages a day. Masculine names received 3.7. There are three federal laws that apply to cyberstalking cases;
the first was passed in 1934 to address harassment through the mail, via telegram, and over the telephone, six decades after Alexander Graham
Bell’s invention. Since the initial passage of the Violence Against Women Act, in 1994, amendments to the law have gradually updated it to
apply to new technologies and to stiffen penalties against those who use them to abuse. Thirty-four states have cyberstalking laws on the
But making
quick and sick threats has become so easy that many say the abuse has proliferated to the point of
meaninglessness, and that expressing alarm is foolish. Reporters who take death threats seriously “often give the
books; most have expanded long-standing laws against stalking and criminal threats to prosecute crimes carried out online.
impression that this is some kind of shocking event for which we should pity the ‘victims,’” my colleague Jim Pagels wrote in Slate this fall, “but
anyone who’s spent 10 minutes online knows that these assertions are entirely toothless.” On Twitter, he added, “When there’s no precedent
for physical harm, it’s only baseless fear mongering.” My friend Jen Doll wrote, at The Atlantic Wire, “It seems like that old ‘ignoring’ tactic your
mom taught you could work out to everyone’s benefit.... These people are bullying, or hope to bully. Which means we shouldn’t take the bait.”
In the epilogue to her book The End of Men, Hanna Rosin—an editor at Slate—argued that harassment of women online could be seen as a
cause for celebration. It shows just how far we’ve come. Many women on the Internet “are in positions of influence, widely published and
widely read; if they sniff out misogyny, I have no doubt they will gleefully skewer the responsible sexist in one of many available online outlets,
and get results.” "Twitter is the place where I laugh, whine, work, schmooze, procrastinate, and flirt. It sits in my back pocket wherever I go and
lies next to me when I fall asleep. And since I first started writing in 2007, it's become just one of the many online spaces where men come to
women who are harassed online are expected to either get over ourselves or feel
flattered in response to the threats made against us. We have the choice to keep quiet or respond “gleefully.” But no
matter how hard we attempt to ignore it, this type of gendered harassment—and the sheer volume of it—has
severe implications for women’s status on the Internet. Threats of rape, death, and stalking can
overpower our emotional bandwidth, take up our time, and cost us money through legal fees, online
protection services, and missed wages. I’ve spent countless hours over the past four years logging the online activity of one
particularly committed cyberstalker, just in case. And as the Internet becomes increasingly central to the human
experience, the ability of women to live and work freely online will be shaped, and too often limited,
tell me to get out." So
by the technology companies that host these threats, the constellation of local and federal law
enforcement officers who investigate them, and the popular commentators who dismiss them—all
arenas that remain dominated by men, many of whom have little personal understanding of what
women face online every day. This Summer, Caroline Criado-Perez became the English-speaking Internet’s most famous recipient
of online threats after she petitioned the British government to put more female faces on its bank notes. (When the Bank of England
announced its intentions to replace social reformer Elizabeth Fry with Winston Churchill on the £5 note, Criado-Perez made the modest
suggestion that the bank make an effort to feature at least one woman who is not the Queen on any of its currency.) Rape and death threats
amassed on her Twitter feed too quickly to count, bearing messages like “I will rape you tomorrow at 9 p.m ... Shall we meet near your house?”
Then, something interesting happened. Instead of logging off, Criado-Perez retweeted the threats, blasting them out to her Twitter followers.
She called up police and hounded Twitter for a response. Journalists around the world started writing about the threats. As more and more
people heard the story, Criado-Perez’s follower count skyrocketed to near 25,000. Her supporters joined in urging British police and Twitter
executives to respond. Under the glare of international criticism, the police and the company spent the next few weeks passing the buck back
and forth. Andy Trotter, a communications adviser for the British police, announced that it was Twitter’s responsibility to crack down on the
messages. Though Britain criminalizes a broader category of offensive speech than the U.S. does, the sheer volume of threats would be too
difficult for “a hard-pressed police service” to investigate, Trotter said. Police “don’t want to be in this arena.” It diverts their attention from
“dealing with something else.” Feminine usernames incurred an average of 100 sexually explicit or threatening messages a day. Masculine
names received 3.7. Meanwhile, Twitter issued a blanket statement saying that victims like Criado-Perez could fill out an online form for each
abusive tweet; when Criado-Perez supporters hounded Mark Luckie, the company’s manager of journalism and news, for a response, he briefly
shielded his account, saying that the attention had become “abusive.” Twitter’s official recommendation to victims of abuse puts the ball
squarely in law enforcement’s court: “If an interaction has gone beyond the point of name calling and you feel as though you may be in
danger,” it says, “contact your local authorities so they can accurately assess the validity of the threat and help you resolve the issue offline.” In
the weeks after the flare-up, Scotland Yard confirmed the arrest of three men. Twitter—in response to several online petitions calling for
action—hastened the rollout of a “report abuse” button that allows users to flag offensive material. And Criado-Perez went on receiving
The Internet is a
global network, but when you pick up the phone to report an online threat, whether you are in London or Palm
Springs, you end up face-to-face with a cop who patrols a comparatively puny jurisdiction. And your cop
will probably be a man: According to the U.S. Bureau of Justice Statistics, in 2008, only 6.5 percent of state police
officers and 19 percent of FBI agents were women. The numbers get smaller in smaller agencies. And in many locales,
threats. Some real person out there—or rather, hundreds of them—still liked the idea of seeing her raped and killed.
police work is still a largely analog affair: 911 calls are immediately routed to the local police force; the closest officer is dispatched to respond;
he takes notes with pen and paper. After Criado-Perez received her hundreds of threats, she says she got conflicting instructions from police on
how to report the crimes, and was forced to repeatedly “trawl” through the vile messages to preserve the evidence. “I can just about cope with
threats,” she wrote on Twitter. “What I can’t cope with after that is the victim-blaming, the patronising, and the police record-keeping.” Last
year, the American atheist blogger Rebecca Watson wrote about her experience calling a series of local and national law enforcement agencies
after a man launched a website threatening to kill her. “Because I knew what town [he] lived in, I called his local police department. They told
me there was nothing they could do and that I’d have to make a report with my local police department,” Watson wrote later. “[I] finally got
through to someone who told me that there was nothing they could do but take a report in case one day [he] followed through on his threats,
at which point they’d have a pretty good lead.” The first time I reported an online rape threat to police, in 2009, the officer dispatched to my
home asked, “Why would anyone bother to do something like that?” and declined to file a report. In Palm Springs, the officer who came to my
room said, “This guy could be sitting in a basement in Nebraska for all we know.” That my stalker had said that he lived in my state, and had
plans to seek me out at home, was dismissed as just another online ruse. Of course, some people are investigated and prosecuted for
cyberstalking. In 2009, a Florida college student named Patrick Macchione met a girl at school, then threatened to kill her on Twitter, terrorized
her with lewd videos posted to YouTube, and made hundreds of calls to her phone. Though his victim filed a restraining order, cops only sprung
into action after a county sheriff stopped him for loitering, then reportedly found a video camera in his backpack containing disturbing
recordings about his victim. The sheriff’s department later worked with the state attorney’s office to convict Macchione on 19 counts, one of
which was cyberstalking (he successfully appealed that count on grounds that the law hadn’t been enacted when he was arrested); Macchione
was sentenced to four years in prison. Consider also a recent high-profile case of cyberstalking investigated by the FBI. In the midst of her affair
with General David Petraeus, biographer Paula Broadwell allegedly created an anonymous email account for the purpose of sending harassing
notes to Florida socialite Jill Kelley. Kelley reported them to the FBI, which sniffed out Broadwell’s identity via the account’s location-based
metadata and obtained a warrant to monitor her email activity. In theory, appealing to a higher jurisdiction can yield better results. “Local law
enforcement will often look the other way,” says Dr. Sameer Hinduja, a criminology professor at Florida Atlantic University and co-director of
the Cyberbullying Research Center. “They don’t have the resources or the personnel to investigate those crimes.” County, state, or federal
agencies at least have the support to be more responsive: “Usually they have a computer crimes unit, savvy personnel who are familiar with
these cases, and established relationships with social media companies so they can quickly send a subpoena to help with the investigation,”
Hinduja says. But in my experience and those of my colleagues, these larger
law enforcement agencies have little capacity
or drive to investigate threats as well. Despite his pattern of abusive online behavior, Macchione was ultimately arrested for an
unrelated physical crime. When I called the FBI over headlessfemalepig’s threats, a representative told me an agent would get in touch if the
bureau was interested in pursuing the case; nobody did. And when Rebecca Watson reported the threats targeted at her to the FBI, she initially
connected with a sympathetic agent—but the agent later expressed trouble opening Watson’s file of screenshots of the threats, and soon
stopped replying to her emails. The Broadwell investigation was an uncommon, and possibly unprecedented, exercise for the agency. As
University of Wisconsin-Eau Claire criminal justice professor Justin Patchin told Wired at the time:
“I’m not aware of any case
when the FBI has gotten involved in a case of online harassment.” After I received my most recent round of threats, I
asked Jessica Valenti, a prominent feminist writer (and the founder of the blog Feministing), who’s been repeatedly targeted with online
threats, for her advice, and then I asked her to share her story. “It’s not really one story. This has happened a number of times over the past
seven years,” she told me. When
rape and death threats first started pouring into her inbox, she vacated her
apartment for a week, changed her bank accounts, and got a new cell number. When the next wave of
threats came, she got in touch with law enforcement officials, who warned her that though the men
emailing her were unlikely to follow through on their threats, the level of vitriol indicated that she
should be vigilant for a far less identifiable threat: silent “hunters” who lurk behind the tweeting
“hollerers.” The FBI advised Valenti to leave her home until the threats blew over, to never walk
outside of her apartment alone, and to keep aware of any cars or men who might show up repeatedly
outside her door. “It was totally impossible advice,” she says. “You have to be paranoid about
everything. You can’t just not be in a public place.” And we can’t simply be offline either. When Time journalist Catherine
Mayer reported the bomb threat lodged against her, the officers she spoke to—who thought usernames were secret codes and didn’t seem to
know what an IP address was—advised her to unplug. “Not one of the officers I’ve encountered uses Twitter or understands why anyone would
wish to do so,” she later wrote. “The officers were unanimous in advising me to take a break from Twitter, assuming, as many people do, that
Twitter is at best a time-wasting narcotic.” All of these online offenses are enough to make a woman want to click away from Twitter, shut her
laptop, and power down her phone. Sometimes, we do withdraw: Pew found that from 2000 to 2005, the percentage of Internet users who
participate in online chats and discussion groups dropped from 28 percent to 17 percent, “entirely because of women’s fall off in participation.”
But for many women, steering clear of the Internet isn’t an option. We use our devices to find supportive communities, make a living, and
construct safety nets. For a woman like me, who lives alone, the Internet isn’t a fun diversion—it is a necessary resource for work and
interfacing with friends, family, and, sometimes, law enforcement officers in an effort to feel safer from both online and offline violence. The
Internet is a global network, but when you pick up the phone to report an online threat, you end up
face-to-face with a cop who patrols a comparatively puny jurisdiction. The Polish sociologist Zygmunt
Bauman draws a distinction between “tourists” and “vagabonds” in the modern economy. Privileged
tourists move about the world “on purpose,” to seek “new experience” as “the joys of the familiar
wear off.” Disempowered vagabonds relocate because they have to, pushed and pulled through mean
streets where they could never hope to settle down. On the Internet, men are tourists and women are
vagabonds. “Telling a woman to shut her laptop is like saying, ‘Eh! Just stop seeing your family,’” says Nathan Jurgenson, a social media
sociologist (and a friend) at the University of Maryland. What does a tourist look like? In 2012, Gawker unmasked “Violentacrez,” an
anonymous member of the online community Reddit who was infamous for posting creepy photographs of underage women and creating or
moderating subcommunities on the site with names like “chokeabitch” and “rapebait.” Violentacrez turned out to be a Texas computer
programmer named Michael Brusch, who displayed an exceedingly casual attitude toward his online hobbies. “I do my job, go home, watch TV,
and go on the Internet. I just like riling people up in my spare time,” he told Adrian Chen, the Gawker reporter who outed him. “People take
Abusers tend to operate anonymously, or under pseudonyms. But the
women they target often write on professional platforms, under their given names, and in the context
of their real lives. Victims don’t have the luxury of separating themselves from the crime. When it
comes to online threats, “one person is feeling the reality of the Internet very viscerally: the person
who is being threatened,” says Jurgenson. “It’s a lot easier for the person who made the threat—and the person who is investigating
things way too seriously around here.”
the threat—to believe that what’s happening on the Internet isn’t real.” When authorities treat the Internet as a fantasyland, it has profound
effects on the investigation and prosecution of online threats. Criminal threat laws largely require that victims feel tangible, immediate, and
sustained fear. In my home state of California, a threat must be “unequivocal, unconditional, immediate, and specific” and convey a “gravity of
If police don’t know whether the
harasser lives next door or out in Nebraska, it’s easier for them to categorize the threat as nonimmediate. When they treat a threat as a boyish hoax, the implication is that the threat ceases to be a
criminal offense. So the victim faces a psychological dilemma: How should she understand her own
fear? Should she, as many advise, dismiss an online threat as a silly game, and not bother to inform
the cops that someone may want to—ha, ha—rape and kill her? Or should she dutifully report every
purpose and an immediate prospect of execution of the threat” to be considered a crime.
threat to police, who may well dismiss her concerns? When I received my most recent rape and death threats, one friend
told me that I should rest assured that the anonymous tweeter was unlikely to take any physical action against me in real life; another noted
that my stalker seemed like the type of person who would fashion a coat from my skin, and urged me to take any action necessary to land the
stalker in jail. Danielle Citron, a University of Maryland law professor who focuses on Internet threats, charted the popular response to Internet
death and rape threats in a 2009 paper published in the Michigan Law Review. She found that Internet harassment is routinely dismissed as
“harmless locker-room talk,” perpetrators as “juvenile pranksters,” and victims as “overly sensitive complainers.” Weighing in on one online
harassment case, in an interview on National Public Radio, journalist David Margolick called the threats “juvenile, immature, and obnoxious,
but that is all they are ... frivolous frat-boy rants.” When
police treat a threat as a boyish hoax, the implication is that
the threat ceases to be a criminal offense. Of course, the frat house has never been a particularly safe space for women. I’ve
been threatened online, but I have also been harassed on the street, groped on the subway, followed home from the 7-Eleven, pinned down on
a bed by a drunk boyfriend, and raped on a date. Even if I sign off Twitter, a threat could still be waiting on my stoop. Today,
a legion of
anonymous harassers are free to play their “games” and “pranks” under pseudonymous screen
names, but for the women they target, the attacks only compound the real fear, discomfort, and
stress we experience in our daily lives.
Ext. MT Hurts CH
Adopting the mosaic theory limits investigators ability to solve cyber harassment.
Gray, Keats Citron, and Rinehart, 2013 (David, Associate Professor, University of Maryland
Francis King Carey School of Law, Danielle, Lois K. Macht Research Professor of Law, University of
Maryland Francis King Carey School of Law, and Liz Clark, University of Maryland Francis King Carey
School of Law, “SYMPOSIUM ON CYBERCRIME: FIGHTING CYBERCRIME AFTER UNITED STATES V. JONES”
Journal of Criminal Law & Criminology Lexis)
Despite these complications, tracing an IP address is a common and effective way for authorities to identify
perpetrators of cyberharassment crimes. At present, the public-observation and third-party doctrines
grant law enforcement unfettered discretion to track IP addresses across the Internet. Most
cyberharassment is, to one degree or another, public. Furthermore, the third-party doctrine means that law
enforcement officers need a subpoena, at most, to secure user information associated with an IP
address from ISPs and other third parties, including social-networking sites. n307 A mosaic theory of
Fourth Amendment privacy might well change [*798] all of this. Tracking someone's online activities
using an IP address over a period of time is akin to tracking a person through physical space using GPSenabled tracking devices. By aggregating information about a user and his online activities, law enforcement officers
using these fairly basic digital surveillance techniques can therefore assemble precisely the sorts of
revealing informational mosaics that worried the concurring Justices in Jones. Digital surveillance
technology that offends mosaic sensibilities promises even more benefits than IP traces to law
enforcement officers interested in detecting cybercrimes. Take, for example, forums such as those organized and
moderated by Violentacrez. n308 v c Although under current law and free speech doctrine it is perfectly legal to
view and comment on pictures of young women in public, law enforcement officers might have
reason to worry that habitues of forums like "Jailbait" and "Creepshots" are more likely than most to
produce or possess actual child pornography. It is, of course, impossible to conduct even cursory investigations of the tens
and hundreds of thousands of those who visit these sites, much less to distinguish between casual curiosity seekers and practicing pedophiles.
Here, broad-scale
aggregation technology, in combination with ever more sophisticated data analytics
designed to identify and track those patterns of online conduct that correlate with higher risks of
illegal on-and offline activities, would be tremendously valuable to law enforcement. Once officers
have identified a smaller universe of potential offenders, they can then further narrow their
investigative fields by using passive techniques like online honey traps to more definitively identify
those who are trafficking in or actively seeking to possess child pornography. n309 Again, although
these digital surveillance techniques and technologies are not presently subject to Fourth Amendment
review, either individually or in the aggregate, the situation would likely change under a mosaic
theory . In fact, officers might find themselves assembling informational mosaics sufficient to trigger
Fourth Amendment concerns quite by accident. n310 Regardless, law enforcement's legitimate interests in
using digital surveillance technology would be affected. n311 Fusion centers also hold significant
potential for law enforcement's efforts to detect and prosecute cyberharassment. The Department of Justice,
in conjunction with the National Center for Missing and Exploited [*799] Children, maintains a substantial database of known images of child
pornography, each of which has a unique digital fingerprint called a "hash value." n312 Fusion centers, which have access to most Internet
traffic, provide a unique - although as yet unexploited - resource that law enforcement agents can use to screen for the transmission of known
images of child exploitation. Outside
the relatively narrow field of child pornography cases, those who engage
in cyberharassment and cyberstalking still tend to use a fairly predictable pattern of words, phrases,
and images. The software used by most malicious stalkers also tends to come from a stable of online resources, which again bear an
identifiable digital signature. Although the true technical capacities of fusion centers are largely unknown to the public, they appear to have the
ability to monitor Internet and communications traffic for precisely these sorts of markers. That same capacity is, of course, precisely what
raises concerns about fusion centers from a mosaic theory point of view. Here again, the
prospect of adopting a mosaic theory
of Fourth Amendment privacy raises serious concerns that the legitimate and important law
enforcement goals of detecting and prosecuting cybercrimes may be compromised.
Harassment Turns Privacy
Cyberharrassment leads to violations of privacy and violence in the name of “Free
Speech” – this is especially true for oppressed groups
Schroder 13 - Jared C. Schroeder, doctoral candidate at the Gaylord College of Journalism & Mass
Communication at the University of Oklahoma. His research focuses on free speech and free press issues
as they apply to the emerging network society. Before moving to academia, he was a professional
journalist for several years, 2013 (“Electronically Transmitted Threats and Higher Education: Oppression,
Free Speech, and Jake Baker,” Review of Higher Education 36.3, Spring 2013, Project Muse, 7/3/15)//CM
Numerous conflicts arise when the theories of the First Amendment and concepts regarding oppression
are placed beside one another. This article does not seek to condemn one area of literature or the other. Instead, this section seeks
to illuminate areas of conflict between the two theoretical approaches. The Baker case is particularly relevant because it
captures the challenges involved in the network society, the higher education setting, and conflicts
between oppression and freedom of speech. It is not the only incident that raises questions regarding the impact of emerging
online technology on providing a safe learning atmosphere. Rutgers University student Tyler Clementi committed suicide
after his roommate filmed him having sex with another man and posted the video online (Starkman, 2010).
The roommate and another student face criminal charges for invasion of privacy. Clearly, Clementi’s
privacy was invaded in an insensitive and, likely, ignorant way. In other words, the technological abilities
of his tormentors outpaced their ethical understanding of the power of the new media. The scenario, though
even more tragic, is similar to the Baker case. New technologies allowed a person to be oppressed and tormented,
and the universities were left wondering what they could have done differently. Using Young’s (2010) definition, the young woman who was
named and described in Baker’s story, as well as others on campus, can be viewed as oppressed. While
oppression does not
automatically cross the Supreme Court’s threshold of true threats, it certainly raises questions about
the safety and viability of the learning environment. In the Baker case, oppression comes in the form of
structural norms and values; his actions can be seen as structurally accepted, to some extent, because he followed the rules created
by the dominant culture. This rule-following can be seen in the court’s reasoning for siding with Baker. While his behavior was viewed as
deviant (United States v. Alkhabaz, 1997), the
structural protections for free speech shielded him, while leaving
the young woman vulnerable. This section addresses these ideas by examining the case through the violence and cultural
imperialism concepts discussed by Young (2010). No physical violence occurred toward the female classmate Baker described in his story; but
Young (2010) noted that oppressive
violence includes [End Page 305] harassment, humiliation, and intimidation.
Young (2010) explained: “The oppression of violence consists not only in direct victimization, but in the daily
knowledge shared by all members of oppressed groups that they are liable to violation, solely on
account of their group identitiy” (p. 43). After hearing about the violent, explicit, and deadly story she
was cast in by one of her classmates, the young woman felt the effects of violent oppression. In his
dissent, Judge Krupansky wrote: “Jane Doe’s reaction to those threats when brought to her attention evinces a contrary conclusion of a
shattering traumatic reaction that resulted in recommended psychological counseling” (United States v. Alkhabaz, 1997, p. 1507). Other women
students chose not to attend class when they heard about the story. Their fear-based
response is also evidence of
oppressive violence. Members of the oppressed group were forced to alter the way they live because they felt vulnerable to violence.
Finally, the violence was made possible and somewhat acceptable by the decision of the court. Baker did not
have to stop writing and communicating his stories about the young woman. He did not have to take down his posts. The court said what he did
was legal. The
structures in place made the oppression possible.
A2 No Impact to CH
The timeframe is now. The damage that the aff does to cyber harassment has lasting
implications for future abusers and victims
Citron 09 Danielle Keats Citron is the Lois K. Macht Research Professor of Law, University of Maryland
Francis King Carey School of Law; Affiliate Scholar, Stanford Center on Internet and Society; Affiliate
Fellow, Yale Information Society Project. 2009. (“Law’s Expressive Value in Combating Cyber Gender
Harassment” Michigan Law Review, December. Available via LexisNexis. Accessed on 07-08-2015)
Due to the internet's relative youth, this is an auspicious time to combat the trivialization of cyber
gender harassment before it becomes too entrenched. If it continues unabated, cyber harassment could
very well be the central front of struggles against sexual harassment in the coming decades given our
increasing dependence on the net. More people make friends, apply for jobs, and discuss policy online
than ever before, shifting their social and professional interactions to the net and with it the risk of
sexual harassment. n18 As the market leans toward more realistic sensory experiences in virtual worlds
and as these sites become more popular, cyber gender harassment may more closely approximate
conventional notions of sexual violence. For instance, Second Life users' avatars have reportedly been
forced to perform sexually explicit acts after being given malicious code. n19 These developments, and
others like them, would further threaten gender equality in our digital age.
Wrestling with the marginalization of cyber sexual harassment is a crucial step in combating its genderspecific harms. Law has a crucial role to play in this effort. Law serves different functions here. It can
deter online [*377] harassment's harms by raising the costs of noncompliance beyond its expected
benefits. Law can also remedy such harm with monetary damages, injunctions, and criminal
convictions. My article Cyber Civil Rights explored antidiscrimination, criminal, and tort law's role in
preventing, punishing, and redressing cyber harassment. n20 In this piece, I explore law's other crucial
role: educating the public about women's unique suffering in the wake of cyber harassment and
potentially changing societal responses to it. Because law is expressive, it constructs our understanding
of harms that are not trivial. The application of a cyber civil rights legal agenda would reveal online
harassment for what it truly is - harmful gender discrimination. It would recognize the distinct suffering
of women, suffering that men ordinarily do not experience or appreciate as harmful.
Don’t let them lesson the blow to cyber harassment. The impact is real and should be
acknowledged
Citron 09 Danielle Keats Citron is the Lois K. Macht Research Professor of Law, University of Maryland
Francis King Carey School of Law; Affiliate Scholar, Stanford Center on Internet and Society; Affiliate
Fellow, Yale Information Society Project. 2009. (“Law’s Expressive Value in Combating Cyber Gender
Harassment” Michigan Law Review, December. Available via LexisNexis. Accessed on 07-08-2015)
Such harassment has a profound effect on targeted women. It discourages them from writing and
earning a living online. n5 It interferes with their professional lives. It raises their vulnerability to
offline sexual violence. It brands them as incompetent workers and inferior sexual objects. The
harassment causes considerable emotional distress. n6 Some women have committed suicide. n7
To avoid future abuse, women assume gender-neutral pseudonyms or go offline, even if it costs them
work opportunities. n8 Others curtail their online activities. n9 For the "digital native" n10 generation,
forsaking aspects of the internet means missing innumerable social connections. Although online
harassment inflicts the most direct costs on targeted individuals, it harms society as well by
entrenching male hierarchy online.
But no matter how serious the harm that cyber gender harassment inflicts, the public tends to trivialize
it. Commentators dismiss it as harmless locker-room talk, characterizing perpetrators as juvenile
pranksters and targeted individuals as overly sensitive complainers. n11 Others consider cyber gender
harassment as an inconvenience that victims can ignore or defeat with counterspeech. n12 Some
argue that women who benefit from the internet have assumed the risks of its Wild West norms. n13
Although the arguments [*376] differ, their message is the same - women need to tolerate these
cyber "pranks" or opt out of life online. This message has the unfortunate consequence of discouraging
women from reporting cyber gender harassment and preventing law enforcement from pursuing cyberharassment complaints. n14
Terrorism Impact
A strong law enforcement is key to preventing terrorist attacks
Kris 11 David S. Kris, Assistant Attorney General for National Security at the U.S. Department of Justice
from March 2009 to March 2011. 2011. (“Law enforcement as a Counterterrorism Tool,” Journal of
National Security Law & Policy
Today, law enforcement efforts against terrorism continue. In 2009, as outside observers have remarked,
the DOJ charged more individuals with significant terrorism-related offenses than in any year since
9/11. n49 That trend continued in 2010. Here are a few examples of recent terrorism charges or convictions: In June and August
2009, Syed Ahmed Harris and Ehsanul Islam Sadequee were each convicted in the Northern District of Georgia for providing material support to
al Qaeda, including videotaping potential U.S. targets. They were sentenced to 13 and 17 years in prison, respectively. In September 2009,
Michael C. Finton was arrested and charged with terrorism offenses after he attempted to detonate an explosive device outside a federal
building in Springfield, Illinois. That same month, Hosam Maher Husein Smadi was arrested and charged with attempting to detonate an
explosive device outside an office building in Dallas, Texas. Smadi pleaded guilty in May 2010 to attempting to use a weapon of mass
destruction, and he was sentenced in October 2010 to 24 years in prison. Finton is awaiting trial. Also
in September 2009,
Najibullah Zazi was arrested just before carrying out a very serious plot to bomb the New York subway
system; he pleaded guilty in February 2010 and is awaiting sentencing in the Eastern District of New
York. In October and December 2009, David Coleman Headley and Tahawwur Hussain Rana were
charged in the Northern District of Illinois with conspiracy to attack a Dutch cartoonist overseas, and
with assisting the terror attack in Mumbai, India that killed 164 people. Headley pleaded guilty in March
2010 to a dozen federal terrorism charges, admitting that he participated in planning both attacks, and
he is awaiting sentencing; Rana is awaiting trial. In May 2010, Faisal Shahzad was arrested in the
Southern District of New York in connection with an attempted car bombing in Times Square; he
pleaded guilty in June 2010 to all counts of the 10-count indictment against him, including conspiring
and attempting to use a weapon of mass destruction, conspiring and attempting to commit an act of
terrorism transcending national boundaries, attempting to use a destructive device during and in
relation to a conspiracy to commit an act of terrorism [*17] transcending national boundaries, and
transporting an explosive, among other charges. In October 2010, Shahzad was sentenced to life
imprisonment. In October 2010, James Cromitie, David Williams, Onta Williams, and LaGuerre Pen were
convicted in the Southern District of New York after a jury trial for their participation in a plot to bomb a
synagogue and Jewish community center and to shoot military planes with Stinger surface-to-air guided
missiles. Each faces a mandatory minimum sentence of 25 years and maximum of life imprisonment.
The examples go on to include Mohammed Warsame, the Minnesota al-Shabaab cases, n50 and Colleen
LaRose ("Jihad Jane"), among others. n51 [*18] Not all of these cases made the headlines and not all of
the defendants were hard-core terrorists or key terrorist operatives. The results of the cases vary
according to several factors. First, as in traditional intelligence or criminal investigations, aggressive
and wide-ranging counterterrorism efforts may net many small fish along with the big ones. Those
small fish need to be dealt with, but - if they are indeed small fish - the charges will not necessarily
yield the heavy penalties that accompany more serious offenses. n52 In some of these cases,
moreover, a conviction will support [*19] deportation (and a plea agreement may support rapid
deportation), which can mitigate threats posed to the homeland. n53 Alternatively, there are cases in
which a seemingly small fish may in fact be a big one, yet it may not be feasible either to prove that he
is, or to establish an alternative basis for detaining him, even under the law of war. These cases pose
the traditional tension between the intelligence benefit of continued surveillance and the risk to public
safety from leaving a suspected terrorist at large (in other words, a tension between the values of shortterm disruption and long-term incapacitation). In some of these cases, the risk-benefit equation will
demand immediate action, disrupting a terrorist plot through arrest and prosecution for whatever
criminal conduct can be established. Sometimes, a sentence of even a few months or years can shatter
a terrorist cell and cripple its operational ability. Finally, of course, disruptive arrests may also generate
valuable intelligence. Some small fish may be ripe for recruitment precisely because they are not fully
radicalized. Such persons may be persuaded to cooperate, either before or after they are released.
Moreover, arrests and other disruptive efforts may provoke statements or actions from others that
provide an understanding of a terrorist network - such cases effectively "shake the tree" and show
how suspects still at large respond to the arrest. Since 2001, in fact, the criminal justice system has
collected valuable intelligence about a host of terrorist activities. In effect, it has worked as what the
Intelligence Community would call a HUMINT collection platform. n54 I will first explain how the
system works as an intelligence collection platform - beginning with pre-arrest activity and ending with
sentencing and beyond - and then turn to a few illustrative examples.
Ext. Hurts Terror
The third party doctrine is key to maintaining law enforcement capabilities to combat
terrorists
Sales 14 – Nathan Alexander Sales, Associate Professor of Law, Syracuse University College of Law. This Essay
is based on testimony presented at a July 9, 2013 hearing of the Privacy and Civil Liberties Oversight Board. 2014.
(“NSA SURVEILLANCE: ISSUES OF SECURITY, PRIVACY AND CIVIL LIBERTY: ARTICLE: Domesticating
Programmatic Surveillance: Some Thoughts on the NSA Controversy” I/S: A Journal of Law and Policy for the
Information Society. Summer. Available via LexisNexis. Accessed on 07-08-2015)
The FISA court repeatedly has upheld the section 215 program on both constitutional grounds
(concluding that the acquisition of bulk telephony metadata was not a "search" within the meaning of
the Fourth Amendment, largely on the strength of the third-party doctrine recognized in Smith v.
Maryland n14 and other cases) and statutory ones (concluding that troves of data sought were tangible
things that are relevant to an authorized investigation, as required by section 215). n15 By 2013, 15
different FISA court judges had approved the program in 35 separate rulings since its inception. n16
Other judges are more divided; in a pair of dueling rulings issued late last year, a federal judge in
Washington, DC invalidated the program while another in Manhattan affirmed its legality. n17
The second program--known as PRISM or section 702--uses court orders issued under section 702 of
FISA n18 to collect the content of certain international communications. In particular, the NSA targets
specific non-Americans who are reasonably believed to be located outside the country, and also engages
in bulk collection of some foreign-to-foreign communications that happen to be passing through
telecommunications infrastructure in the United States. n19 The FISA [*527] court does not approve
individual surveillance applications each time the NSA wishes to intercept these communications;
instead, it issues once-a-year blanket authorizations. n20 As detailed below, in 2011 the FISA court
struck down the program on constitutional and statutory grounds after the government disclosed that it
was inadvertently intercepting a significant number of communications involving Americans; n21 the
court later upheld the program when the NSA devised a technical solution that prevented such overcollection. n22
Programmatic surveillance initiatives like these differ in simple yet fundamental ways from the
traditional forms of monitoring with which many people are familiar--i.e., individualized or particularized
surveillance. Individualized surveillance takes place when authorities have some reason to think that a
specific, known person is breaking the law. Investigators will then obtain a court order authorizing
them to collect information about the target, with the goal of assembling evidence that can be used to
establish guilt in subsequent criminal proceedings. Individualized surveillance is common in the world
of law enforcement, as under Title III of the Omnibus Crime Control and Safe Streets Act of 1968. n23 It
is also used in national security investigations. FISA allows authorities to obtain a court order to engage
in wiretapping if they demonstrate, among other things, probable cause to believe that the target is "a
foreign power or an agent of a foreign power." n24
By contrast, programmatic surveillance has very different objectives and is conducted in a very
different manner. It usually involves the government collecting bulk data and then examining it to
identify previously unknown terrorists, spies, and other national security threats. A good example of
the practice is link analysis, in [*528] which authorities compile large amounts of information, use it
to map the social networks of known terrorists--has anyone else used the same credit card as
Mohamed Atta?--and thus identify associates with whom they may be conspiring. n25 (It is also
possible, at least in theory, to subject these large databases to pattern analysis, in which automated
systems search for patterns of behavior that are thought to be indicative of terrorist activity, but it's not
clear that the NSA is doing so here.) Suspects who have been so identified can then be subjected to
further forms of monitoring to determine their intentions and capabilities, such as wiretaps under FISA
or other authorities. In a sense, programmatic surveillance is the mirror image of individualized
surveillance. With individualized monitoring, authorities begin by identifying a suspect and go on to
collect information; with programmatic monitoring, authorities begin by collecting information and go
on to identify a suspect.
Programmatic surveillance is a potentially powerful counterterrorism tool. The Ra'ed al-Banna
incident is a useful illustration of how the technique, when coupled with old-fashioned police work, can
identify possible threats who otherwise might escape detection. Another example comes from a 2002
Markle Foundation study, which found that authorities could have identified the ties among all 19 of
the 9/11 hijackers if they had assembled a large database of airline reservation information and
subjected it to link analysis. n26 In particular, two of the terrorists--Nawaf al-Hamzi and Khalid alMihdhar--were on a government watchlist after attending a January 2000 al-Qaeda summit in Malaysia.
So they could have been flagged when they bought their tickets. Querying the database to see if any
other passengers had used the pair's mailing addresses would have led investigators to three more
hijackers, including Mohamed Atta, the plot's operational leader. Six others could have been found by
searching for passengers who used the same frequent-flyer and telephone numbers as these suspects.
And so on. Again, the Markle study concerns airline reservation data, not the communications data that
are the NSA's focus. But it is still a useful illustration of the technique's potential.
The government claims that programmatic surveillance has been responsible for concrete and actual
counterterrorism benefits, not just hypothetical ones. Officials report that PRISM has helped detect
and [*529] disrupt about 50 terrorist plots worldwide, including ten in the United States. n27 Those
numbers include Najibullah Zazi, who attempted to bomb New York City's subway system in 2009,
and Khalid Ouazzani, who plotted to blow up the New York Stock Exchange. n28 Authorities further
report that PRISM played an important role in tracking down David Headley, an American who aided the
2008 terrorist atrocities in Bombay, and later planned to attack the offices of a Danish newspaper that
printed cartoons of Mohamed. n29 The government also claims at least one success from the telephony
metadata program, though it has been coy about the specifics: "The NSA, using the business record FISA,
tipped [the FBI] off that [an] individual had indirect contacts with a known terrorist overseas. . . . We
were able to reopen this investigation, identify additional individuals through a legal process and were
able to disrupt this terrorist activity." n30 Quite apart from foiling attacks, the government also argues
that the NSA programs can conserve scarce investigative resources by helping officials quickly spot or
rule out any foreign involvement in a domestic plot, as after the 2013 Boston Marathon bombing. n31
SEC DA
Shell
1nc
SEC enforcement works in the squo – it’s strong and aggresive
Wiggin and Dana 2014, (A full service law firm -- clients are publicly traded companies,
entrepreneurs and emerging growth companies, real estate developers, financial institutions,
“TIME TO FOCUS ON COMPLIANCE PROGRAMS AGAIN: SEC ENFORCEMENT ACTIONS AND SANCTIONS
ARE ON THE RISE”, 10/31/2014, http://www.wiggin.com/15507) BBer
Probably to no one's surprise, given the SEC's much publicized enforcement efforts, the Commission has announced that it
filed a record number of enforcement actions over the last three fiscal years and secured record
payouts in penalties and disgorgements.[1] Over this period, the SEC has taken aim at a broad
spectrum of conduct in the securities markets and targeted a diverse range of market actors. Although
the SEC has divided its focus across a range of different areas, three themes have emerged from its
increased enforcement activity . First, the SEC has aggressively targeted lapses in regulatory
compliance and risk controls over a broad spectrum of conduct and industries. Second, the SEC has
increasingly relied on technology to detect such misconduct. And third, the SEC has made substantial
awards to whistleblowers for providing information that has led to successful enforcement actions.
Considering this increase in enforcement activity, companies and individuals engaged in business
relating to the financial industry need to be prepared to meet the SEC's heightened scrutiny. With this in
it is a good time to revisit compliance programs, policies and procedures to assure they are up-todate and focus on the concerns of the SEC and requirements of the securities laws. According to a recent press release, the
Commission reported that it had filed a record high of 755 enforcement actions in Fiscal Year ("FY") 2014.
Along with those actions was another high mark: orders for penalties and disgorgement in the amount of
$4.16 billion. That reflects a 22% increase in penalties and disgorgement as a result of SEC
enforcement actions over last year. In FY 2013, the Commission filed 686 enforcement actions and obtained orders totaling $3.4
mind,
billion in disgorgement and penalties. In FY 2012, the Commission filed 734 enforcement actions and obtained orders totaling $3.1 billion in
disgorgement and penalties. The
SEC continued to crack down on traditional financial fraud, charging more
than 135 parties with violations relating to reporting and disclosure. At the same time, it continued its
focus on misconduct relating to complex financial instruments such as mortgage-backed securities and
collateralized debt obligations, and it brought several novel actions targeting deficient compliance and
control practices. For example, the SEC successfully held global investment bank and brokerage firm Jefferies LLC responsible for its
failure to properly supervise trading on its mortgage-backed securities desk. The SEC also brought actions, for the first time,
under a rule requiring firms to establish adequate risk controls before providing customers with
market access. It imposed the largest penalty ever for net capital rule violations in a case against a
high frequency trading firm and a former senior executive. And it also filed enforcement actions
against the New York Stock Exchange and brokerage subsidiaries for their failure to comply with
exchange rules, and Wells Fargo Advisors LLC in the Commission's first case against a broker-dealer for failing to protect a customer's
material nonpublic information. The compliance and control practices and procedures of private equity firms, investment advisers and
investment companies were also in the SEC's line of sight. According to the Commission, it brought its first-ever action under the investment
adviser "pay-to-play" rule. The SEC also filed its first action arising from a focus on fees and expenses charged by private equity firms. It also
instituted an action against a private equity firm and its president, alleging fraud in the allocation of
expenses to the firm's funds. Finally, the Commission charged three investment advisory firms with failure to maintain adequate
controls on the custody of customer accounts. Accountants, attorneys and compliance professionals also found themselves contending with
SEC enforcement actions this past year. In one matter, the SEC filed an action against Ernst & Young LLP relating to auditor independence rules.
In another, the SEC filed an action against an audit firm and four of its auditors for their roles in the failed audits of three China-based
companies. The Commission charged two Florida-based attorneys, a transfer agent and its CEO for their roles in an offering fraud involving
improper distributions of billions of shares of unregistered stock. Finally, in a fraud case, the Commission charged a company's audit committee
chair, who learned of the misconduct in question and failed to take meaningful action to investigate it or disclose it to investors. The SEC also
touted its success in using new technologies to detect market misconduct over the last three years. SEC Chair Mary Jo White stated that "[t]he
innovative use of technology – enhanced use of data and quantitative analysis – was instrumental in detecting misconduct and contributed to
the Enforcement Division's success in bringing quality actions that resulted in stiff monetary sanctions." The SEC successfully used quantitative
analytics to identify especially high rates of filing deficiencies and brought coordinated charges against 34 individuals and companies for
violating laws requiring them to promptly report information about their holdings and transactions in company stock. The SEC pursued
wrongdoing by asset managers through proprietary analytics that identify hedge funds with suspicious returns. It also employed "next
generation analytical tools to help identify patterns of suspicious trading" in its continued efforts to eliminate trading on the basis of inside
information. Over the last three years, the SEC charged 80 people in connection with insider trading and, among those charged are a former
hedge fund trader, a portfolio manager, the co-chairman of a board, an investment banker, an investor relations executive, an accountant,
husbands who traded on information they learned from their wives, and a group of golf buddies and other friends. There is every reason to
expect that the continued use of these techniques will lead to more enforcement actions across a broad spectrum of market conduct. Lastly,
the SEC's record payout of awards to whistleblowers is bound to incentivize whistleblowers to come
forward and may lead to more prosecutions of individuals . In FY 2014, nine whistleblowers received awards totaling
approximately $35 million, including one that was more than $30 million for a whistleblower who provided key original information that led to
a successful enforcement action. That award was the largest-ever whistleblower award. The
Commission also demonstrated its
commitment to protect whistleblowers in that it brought its first charges under new authority to bring
anti-retaliation enforcement actions. In that case, the SEC charged a hedge fund advisory firm with engaging in prohibited
principal transactions and then retaliating against the employee who reported the trading activity to the Commission. It also charged the firm's
owner in connection with the principal transactions. In terms of actions against individuals in addition to companies, as U.S. Attorney General
Eric Holder recently remarked, cases against individuals are more easily brought when there is a witness who is able to provide evidence of a
corporate executive's knowledge of and intent to participate in wrongdoing.[2] Those witnesses are more incentivized to come forward when
there is a robust whistleblower program. Undoubtedly, the recent provision of substantial awards to whistleblowers will provide such incentive
for people to come forward when they are aware of possible illegal conduct and may lead to increasingly vigorous investigation and
enforcement activity against not only companies but also individuals. According to Chair White over the last three years,
"aggressive
enforcement against wrongdoers who harm investors and threaten our financial markets remains a
top priority, and we brought and will continue to bring creative and important enforcement actions
across a broad range of the securities markets. " As Chair White's and the Commission's statements reflect, the SEC is
committed to using modern data analytics and investigative techniques to monitor the securities
markets and enforce the securities laws. Further, whistleblower awards and legal mechanisms designed to protect
whistleblowers from retaliation by their employers have made it more likely that people in possession of information relating to possible
wrongdoing will report it to law enforcement authorities and both corporations and individuals will be prosecuted on the basis of that
information. Moreover, the SEC continues to hone in on firms' deficient compliance and control practices through bringing novel actions
charging companies with violating various laws and rules. Thus,
companies and individuals engaged in business relating
to the financial industry should expect to encounter even more aggressive enforcement of the
securities laws from the SEC. Going forward, a company's compliance programs, policies and
procedures will likely be subject to heightened scrutiny by the SEC. With this in mind, now is a good time to reevaluate compliance programs and internal controls to assure that they are up-to-date, that best practices have been adopted and are being
followed, and that, importantly, they adequately address the SEC's concerns.
Requiring a probable cause warrant would obliterate routine investigations — no
authority to require a warrant and lack of evidence to receive one.
Baker 11 — James A. Baker, Associate Deputy Attorney General, Statement before the Committee on
Judiciary United States Senate, 2011 ("The Electronic Communications Privacy Act: Government
Perspectives on Protecting Privacy in the Digital Age," American Civil Liberties Union, April 6th, Available
Online at https://www.aclu.org/files/pdfs/email-content-foia/DOJ%20Crim%20Div%20docs/CRM231.pdf, Accessed on 07-08-15)
Finally, the eighth and last potentially appropriate topic for legislation is the standard for compelling
disclosure of the contents of stored communications. As noted above, we appreciate that there are
concerns regarding ECPA's treatment of stored communications - in particular, the rule that the
government may use lawful process short of a warrant to obtain the content of emails that are stored
for more than 180 days. Indeed, some have argued recently in favor of a probable cause standard for
compelling disclosure of all such content under all circumstances. Because communication services are
provided in a wide range of situations, any simple rule for compelled disclosure of contents raises a
number of serious public safety questions. In considering whether or not there is a need to change
existing standards, several issues are worthy of attention. First, current law allows for the acquisition
of certain stored communications using a subpoena where the account holder receives prior notice.
This procedure is similar to that for paper records. If a person stores documents in her home, the
government may use a subpoena to compel production of those documents. Congress should
consider carefully whether it is appropriate to afford a higher evidentiary standard for compelled
production of electronically stored records than paper records. Second, it is important to note that
not all federal agencies have authority to obtain search warrants. For example, the Securities and
Exchange Commission (SEC) and Federal Trade Commission (FTC) conduct investigations in which they
need access to information stored as the content of email. Although those entities have authority to
issue subpoenas, they lack the ability to obtain search warrants. Raising the standard for obtaining
stored email or other stored communications to a search warrant could substantially impair their
investigations. Third, Congress should recognize the collateral consequences to criminal law
enforcement and the national security of the United States if ECPA were to provide only one means —
a probable cause warrant — for compelling disclosure of all stored content. For example, in order to
obtain a search warrant for a particular email account, law enforcement has to establish probable
cause to believe that evidence will be found in that particular account. In some cases, this link can be
hard to establish. In one recent case, for example, law enforcement officers knew that a child
exploitation subject had used one account to send and receive child pornography, and officers
discovered that he had another email account, but they lacked evidence about his use of the second
account. Thus, Congress should consider carefully the adverse impact on criminal as well as national
security investigations if a probable cause warrant were the only means to obtain such stored
communications.
Insider Trading will lead to the collapse of the stock market and SEC regulation
prevents that
Dent ‘12, George W. Dent JR,Professor of Law at Case Western University, 2012 (“Why Legalized
Insider Trading Would Be a Disaster”, November 2012, Available Online at
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2169975,Accessed 07/08/15)
The ban on insider trading probably has something to do with this:100 Stock traders are more sophisticated now than in the 1920s. Most
traders then were individuals, many of whom were buying stock for the first time and knew little of the risks, including insider trading, until
they were rudely educated by the 1929 stock market crash.102 Today, most trading is done by institutions that are keenly aware of such
risks.103 Furthermore, in the 1920s, no foreign stock markets barred insider trading, so investors had no better alternative than the American
markets.104 Today, all
developed countries ban insider trading.105 If America were to legalize insider
trading, investors would simply go elsewhere.106 Legalizing insider trading could effectively destroy public
stock markets.107 Defenders of insider trading claim that it does not harm outsiders.108 Although it is virtually impossible to identify the
victims of any particular act of insider trading, it is easy to see that it must hurt outside investors collectively.109
Imagine two publicly traded companies with identical operations. In one there is some significant amount of insider trading; in the other there
is none. In the former, insiders siphon
off some of the profits from the stock. Accordingly, outsiders must value
its stock lower than the stock of the latter company.110 Nonetheless, as long as the level of insider trading
stays low, the potential profits to outsiders are still high enough to attract them to purchase the stock
at some price.111 This all changes once insider trading is permitted, as it is hard to see how there could be
any other trading.112 Insiders will trade whenever no higher returns are attainable from other investments (e.g., real estate).113
Imagine being asked to bid on a bag whose contents you do not know, but that are known to another bidder. The informed bidder
will raise her bid unless and until you bid more than the bag's fair value. No reasonable person would
enter such a contest.114 It is suggested that insider trading will not scare off outsiders because they "already disregard a large body of
evidence indicating that even the most sophisticated institutions have difficulty outperforming the stock market averages. . . . These investors
may be convinced that certain stocks will make them money; the occurrence of insider trading may have little effect on investment so
motivated."115 Not all "uninformed" traders, however, are so naive.116 Even investors
familiar with the efficient market
hypothesis buy and sell stock when they want to make additional investments, disinvest, or better
diversify their portfolios.117 As already noted, the public market in a stock can survive some level of insider trading.118 To
compensate for the gains siphoned off by insiders, the market will discount a stock's price to allow rational trading
by outsiders.119 In an efficient market, uninformed investors cannot beat the market, but neither will they underperform other outsiders,
"even the most sophisticated institutions."120 They will invest in stocks if the stock market outperforms other
available investments.121 In the long run, it does.122 If insider trading becomes rampant, however, the only
trades left on the table for outsiders will be those that insiders have spurned because they offer a
lower return than is available elsewhere.123 Not even the most sophisticated mutual fund could match
the performance of even a minimally skilled insider. In such a world only a fool would utilize anything but
an insider trading equity fund to trade stock.124 Not even through examining foreign experience can we adequately tell how
stock markets would fare under legalized insider trading because "all countries with developed capital markets limit insider trading to some
extent."125 However, the breadth and enforcement of the prohibitions vary, and stricter
insider trading bans are associated
with wider stock ownership, better stock price accuracy, and deeper market liquidity. 126 The corporate cost
of equity declines significantly when a country forbids insider trading and actually enforces the law. Countries that more effectively
bar insider trading have less volatile stock markets.128 So it is no surprise that whenever the SEC announces
enforcement actions involving insider trading, the price of the affected stock declines.129 All this
evidence contradicts the market efficiency arguments for insider trading. Although less of the pie remains for
outsiders if more of it is taken by inside traders, outsiders might still be better off if insider trading spurs innovation, thereby causing the pie to
expand.130 In that case however, companies in markets that allow insider trading should have a lower cost of capital, and revelations of
possible insider trading in a company's stock should cause its stock price to rise.131 The evidence just discussed demonstrates that the opposite
is true. Outsiders might be able to share in superior profits by investing in insider trading equity funds. However, as already suggested, insiders
will probably have little need to create such funds because they will be able to finance most or all of their trading with (cheaper) debt.132 Thus,
everyone but insiders would abandon the stock market.133 As an obvious consequence, public trading in stocks
would essentially cease.134 Insiders can trade only if there are outsiders (including market makers)135 with whom
to trade. If outsiders pull out, that is associated with a reduction in the cost of equity in a country trading
, there would be no stock market; there would be no publicly traded companies.136 It would not, however, be
tenable to have all the equity of large firms owned by just a few insiders; that is why public ownership originally evolved. If public
ownership were destroyed by insider trading, large firms would have to seek investment from private
equity companies.137 In most cases, private equity owners demand control.138 As part of that control,
they also insist on full disclosure when executives buy or sell the firm's stock.139 In other words, they
do not tolerate insider trading. Thus, ironically, legalizing insider trading would lead to the extinction of
public stock markets and of insider trading itself. Although unrestricted insider trading would destroy the stock markets and
thus preclude insider trading, could market forces somehow react so as to prevent this destruction? It is true that individual insiders
would have no incentive to restrain their trading,140 but, as a response, individual companies could try to
curb insider trading.141
Stock Market Key to the Global Economy
Naes ’11, Writer for the Journal of Finance, Randi Naes, 2011 (“Stock Market Liquidity and the
Business Cycle”, Journal of Finance, February 2011, Available Online at
http://onlinelibrary.wiley.com/doi/10.1111/j.1540-6261.2010.01628.x/pdf, Accessed 07/10/2015)
IN DISCUSSIONS OF THE CURRENT financial crisis, much is made of the apparent causality between a decline
in the liquidity of financial assets and the economic crisis. In this paper we show that such effects are not new;
changes in the liquidity of the U.S. stock market have been coinciding with changes in the real
economy at least since the Second World War. In fact, stock market liquidity is a very good “leading indicator” of
the real economy. Using data for the United States over the period 1947 to 2008, we document that
measures of stock market liquidity contain leading information about the real economy, even after
controlling for other asset price predictors. Figure 1 provides a time-series plot of one measure of market liquidity, the Amihud
(2002) measure, together with the National Bureau of Economic Research (NBER) recession periods (gray bars). This figure illustrates the
relationship found between stock market liquidity and the business cycle. As can be seen from the figure, liquidity clearly worsens (illiquidity
increases) well ahead of the onset of the NBER recessions. Our results are relevant for several strands of the literature. One important strand is
the literature on forecasting economic growth using different asset prices, including interest rates, term spreads, stock returns, and exchange
rates. The forward-looking nature of asset markets makes the use ∗Randi Næs is at the Norwegian Ministry of Trade and Industry. Johannes A.
Skjeltorp is at Norges Bank (the Central Bank of Norway). Bernt Arne Ødegaard is at the University of Stavanger, Norges Bank, and Norwegian
School of Management. We are grateful for comments from an anonymous referee, an associate editor, and our Editor (Campbell Harvey). We
also thank Kristian Miltersen, Luis Viceira, and seminar participants at the fourth Annual Central Bank Workshop on the Microstructure of
Financial Markets in Hong Kong, Norges Bank, the Norwegian School of Economics and Business Administration, Statistics Norway (SSB), Center
for Research in Economics and Statistics, and the Universities of Oslo, Stavanger, and Aarhus for comments. Ødegaard acknowledges funding
from “Finansmarkedfondet” (The Finance Market Fund). The views expressed are those of the authors and should not be interpreted as
reflecting those of Norges Bank or the Ministry of Trade and Industry. 139 140 The Journal of FinanceR -1.2 -0.8 -0.4 0.0 0.4 0.8 1.2 1950 1960
1970 1980 1990 2000 NBER recessions ILR detrended Figure 1. Liquidity and the business cycle. The figure shows time-series plots of the
detrended Amihud (2002) illiquidity ratio (ILR) for the United States over the period 1947 to 2008. The gray bars indicate the NBER recession
periods. ILR is an elasticity (price impact) measure of liquidity and reflects how much prices move in response to trading volume. ILR is first
calculated for each stock for each year. Then the equally weighted cross-sectional average for each year is calculated. A more precise definition
is found in equation (2) in the paper. Note that ILR reflects illiquidity, so a high value reflects a high price impact of trades (i.e., low liquidity). ILR
is detrended using a Hodrick–Prescott filter. of these prices as predictors of the real economy intuitive. If a stock price equals the expected
discounted value of future earnings, it seems natural that it should contain information about future earnings growth. Theoretically, a link
between asset prices and the real economy can be established from a consumption–smoothing argument. If investors
are willing to
pay more for an asset that pays off when the economy is thought to be in a bad state than for an asset
that pays off when the economy is thought to be in a good state, then current asset prices should
contain information about investors’ expectations about the future real economy. In their survey article,
however, Stock and Watson (2003) conclude that there is considerable instability in the predictive power of asset prices. We shift focus to a
different aspect of asset markets: the liquidity of the stock market (i.e., the costs of trading equities). It is a common observation that stock
market liquidity tends to dry up during economic downturns. However, we show that the relationship
between trading costs and the real economy is much more pervasive than previously thought. A link from
trading costs to the real economy is not as intuitive as the link from asset prices, although several possible explanations are suggested in the
literature.
Economic decline triggers lash-out and global war---no checks
Harold James 14, Professor of history at Princeton University’s Woodrow Wilson School who
specializes in European economic history, 7/2/14, “Debate: Is 2014, like 1914, a prelude to world war?,”
http://www.theglobeandmail.com/globe-debate/read-and-vote-is-2014-like-1914-a-prelude-to-worldwar/article19325504/
As we get closer to the centenary of Gavrilo Princip’s act of terrorism in Sarajevo, there is an ever more vivid fear: it could happen
again . The approach of the hundredth anniversary of 1914 has put a spotlight on the fragility of the world’s
political and economic security systems . At the beginning of 2013, Luxembourg’s Prime Minister Jean-Claude Juncker was widely
ridiculed for evoking the shades of 1913. By now he is looking like a prophet. By 2014, as the security situation in the South
China Sea deteriorated, Japanese Prime Minister Shinzo Abe cast China as the equivalent to Kaiser Wilhelm’s Germany; and the
fighting in Ukraine and in Iraq is a sharp reminder of the dangers of escalation. Lessons of 1914 are about more
than simply the dangers of national and sectarian animosities. The main story of today as then is the precariousness of
financial globalization , and the consequences that political leaders draw from it. In the influential view of Norman Angell in his 1910
book The Great Illusion, the interdependency of the increasingly complex global economy made war
impossible. But a quite opposite conclusion was possible and equally plausible – and proved to be the
case . Given the extent of fragility, a clever twist to the control levers might make war easily winnable
by the economic hegemon. In the wake of an epochal financial crisis that almost brought a complete
global collapse, in 1907, several countries started to think of finance as primarily an instrument of raw
power, one that could and should be turned to national advantage. The 1907 panic emanated from the United States but affected the rest of
the world and demonstrated the fragility of the whole international financial order. The aftermath of the 1907 crash drove the then hegemonic
power – Great Britain - to reflect on how it could use its financial power. Between 1905 and 1908, the British Admiralty evolved the broad
outlines of a plan for financial and economic warfare that would wreck the financial system of its major European rival, Germany, and destroy
its fighting capacity. Britain used its extensive networks to gather information about opponents. London banks financed most of the world’s
trade. Lloyds provided insurance for the shipping not just of Britain, but of the world. Financial networks provided the information that allowed
the British government to find the sensitive strategic vulnerabilities of the opposing alliance. What pre-1914 Britain did anticipated the privatepublic partnership that today links technology giants such as Google, Apple or Verizon to U.S. intelligence gathering. Since last year, the Edward
Snowden leaks about the NSA have shed a light on the way that global networks are used as a source of intelligence and power. For Britain’s
rivals, the financial panic of 1907 showed the necessity of mobilizing financial powers themselves. The United States realized that it needed a
central bank analogous to the Bank of England. American financiers thought that New York needed to develop its own commercial trading
system that could handle bills of exchange in the same way as the London market. Some of the
dynamics of the pre-1914
financial world are now re-emerging. Then an economically declining power, Britain, wanted to use
finance as a weapon against its larger and faster growing competitors, Germany and the United States. Now America is in turn
obsessed by being overtaken by China – according to some calculations, set to become the world’s largest economy in 2014. In
the aftermath of the 2008 financial crisis, financial institutions appear both as dangerous weapons of
mass destruction , but also as potential instruments for the application of national power. In managing the 2008 crisis, the dependence
of foreign banks on U.S. dollar funding constituted a major weakness, and required the provision of large swap lines by the Federal Reserve. The
United States provided that support to some countries, but not others, on the basis of an explicitly political logic, as Eswar Prasad demonstrates
in his new book on the “Dollar Trap.” Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were
trying to acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian trade finance. Chinese
banks are being pushed to expand their role in global commerce. After the financial crisis, China started to build up the renminbi as a major
international currency. Russia and China have just proposed to create a new credit rating agency to avoid what they regard as the political bias
of the existing (American-based) agencies. The next stage in this logic is to think about how financial power can be directed to national
advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the pressure applied to rogue states
such as Iran and North Korea. But financial pressure can be much more powerfully applied to countries that are deeply embedded in the world
economy. The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President Vladimir Putin’s calculation in
response is that the European Union and the United States cannot possibly be serious about the financial war. It would turn into a boomerang:
Russia would be less affected than the more developed and complex financial markets of Europe and America. The
threat of systemic
disruption generates a new sort of uncertainty, one that mirrors the decisive feature of the crisis of the
summer of 1914. At that time, no one could really know whether clashes would escalate or not. That
feature contrasts remarkably with almost the entirety of the Cold War, especially since the 1960s, when the strategic doctrine of
Mutually Assured Destruction left no doubt that any superpower conflict would inevitably escalate .
The idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or low cost. But it is inevitably a gamble,
and raises prospect that others might, but also might not be able to, mount the same sort of operation. Just as in 1914, there is an
enhanced temptation to roll the dice, even though the game may be fatal.
Uniqueness
Insider Trading Low
Insider activity low – SEC enforcement
Wiggin and Dana 10/31, (A full service law firm -- clients are publicly traded companies,
entrepreneurs and emerging growth companies, real estate developers, financial institutions,
“TIME TO FOCUS ON COMPLIANCE PROGRAMS AGAIN: SEC ENFORCEMENT ACTIONS AND SANCTIONS
ARE ON THE RISE”, 10/31/2014, http://www.wiggin.com/15507) BBer
The SEC successfully used quantitative analytics to identify especially high rates of filing deficiencies and
brought coordinated charges against 34 individuals and companies for violating laws requiring them to
promptly report information about their holdings and transactions in company stock. The SEC pursued
wrongdoing by asset managers through proprietary analytics that identify hedge funds with
suspicious returns. It also employed "next generation analytical tools to help identify patterns of
suspicious trading" in its continued efforts to eliminate trading on the basis of inside information.
Over the last three years, the SEC charged 80 people in connection with insider trading and, among
those charged are a former hedge fund trader, a portfolio manager, the co-chairman of a board, an
investment banker, an investor relations executive, an accountant, husbands who traded on
information they learned from their wives, and a group of golf buddies and other friends. There is every
reason to expect that the continued use of these techniques will lead to more enforcement actions
across a broad spectrum of market conduct. Lastly, the SEC's record payout of awards to
whistleblowers is bound to incentivize whistleblowers to come forward and may lead to more
prosecutions of individuals. In FY 2014, nine whistleblowers received awards totaling approximately
$35 million, including one that was more than $30 million for a whistleblower who provided key original
information that led to a successful enforcement action. That award was the largest-ever
whistleblower award
Inside trading is on a decline
Nili 3/18, (Yaron, Co-Editor on the Harvard law school forum on Corporate Governance and Financial
Regulation – Went to The Hebrew University: M.B.A., Finance - LL.B., Law --- Activities and Societies:
Teaching assistant, "Mishpatim" Law review editor-in-chief, “SEC Enforcement Developments in 2014,
and a Look Forward", Harvard Law School, 3-18-2015, http://corpgov.law.harvard.edu/2015/03/18/secenforcement-developments-in-2014-and-a-look-forward/) BBer
Substantive Developments Insider Trading Law The year 2014 may have seen the rolling back of the
tide of successful insider trading cases brought both by the Manhattan US Attorney’s Office and the SEC. Last year saw
the SEC bring 52 insider trading actions, charging 80 people, an increase over the 44 cases brought in
2013. Already, the US Attorney’s Office has filed a brief in another insider trading case, United States v. Durant,
arguing that the Second Circuit decision should be construed narrowly. The government argued that, while “[t]he Newman decision
dramatically (and, in our view, wrongly) departs from thirty years of controlling Supreme Court authority,” the decision does not apply in
Durant. Newman applies to insider trading cases brought under the classical theory of liability the government argued, while Durant was
brought under the misappropriation theory.
Insider trading is low – increase in prosecutions and SEC enforcement
Morrison and Foerster 2/21, (Law firm – includes prominent attorneys with decades of experience,
former prosecutors, former SEC enforcement attorneys, former senior officials of the CFTC and FINRA,
and in-house forensic accounting experts, “2014 Insider Trading: Annual Review”, 2/21/2015,
http://www.mofo.com/~/media/Files/ClientAlert/2015/02/150211InsiderTradingAnnualReview.pdf)
BBer
2014 will be remembered as the year that the Department of Justice’s (“DOJ”) winning streak in
insider trading cases came to an end. The last few years have been punctuated by the government’s
aggressive – and highly successful – enforcement of criminal insider trading laws.
Attorney’s Office for the Southern District of New York
(“S.D.N.Y.”)
Since 2009,
the U.S.
had enjoyed a perfect trial record in
insider trading cases. With the high-profile trial conviction of Mathew Martoma, 2014 was poised to be another banner year.
However, in July 2014 the perfect record came to an end when a jury acquitted Rajarengan (Rengan) Rajaratnam of insider trading charges.
Rengan’s acquittal not only ended the government’s seemingly endless winning streak, but also signified the end of the longrunning “Perfect
Hedge” investigation that initially ensnarled his brother, Raj Rajaratnam, and brought down most of the insider trading defendants over the last
few years. To close out 2014, the United States Court of Appeals for the Second Circuit issued the highly anticipated decision overturning the
insider trading convictions of Todd Newman and Anthony Chiasson. The blockbuster opinion cast doubt on countless other convictions and
guilty pleas secured over the past several years. The early effects of the decision have already been felt in the first few weeks of 2015, with a
number of associated guilty pleas by downstream tippees having been vacated. The U.S. Attorney’s Office for the S.D.N.Y. is not going quietly;
instead, it filed a blistering petition for rehearing and suggestion for rehearing en banc, arguing that the panel not only got it wrong, but also
“threaten[ed] the integrity of the securities markets.” The viability of the panel opinion and its ripple effects are among the central events to
watch in insider trading law in 2015. The
consequences of being found liable for insider trading can be severe.
Individuals convicted of criminal insider trading can face up to 20 years imprisonment per violation,
criminal forfeiture, and fines of up to $5,000,000 or twice the gain from the offense. A successful civil
action by the SEC may lead to disgorgement of profits and a penalty not to exceed the greater of
$1,000,000, or three times the amount of the profit gained or loss avoided. In addition, individuals can be
barred from serving as an officer or director of a public company, acting as a securities broker or investment adviser, or in the
case of licensed professionals, such as attorneys and accountants, from serving in their professional capacity before the SEC. In 2014, the
SEC filed insider trading actions against 111 individuals or entities, naming 44 of them in
administrative proceedings, while DOJ brought criminal charges involving insider trading against 20
individuals or entities.
Last year in our Review, we included in our tally for the first time administrative proceedings filed by the SEC.
With the increasing preference by the SEC Staff to bring actions as administrative proceedings instead of federal court cases, reporting only on
the number of SEC enforcement actions would give an incomplete picture of enforcement activity.
As we predicted last year, the
trend towards filing administrative proceedings continued in 2014 . 2014 saw DOJ and the SEC
continue to aggressively pursue insider trading actions. The total number of actions brought
demonstrates that neither agency has lost its interest in enforcing insider trading laws. While 2014
certainly brought some high-profile victories for the government, 2014 will likely be better
remembered for the significant set-backs suffered by both DOJ and the SEC. There are a number of potential
explanations for the disparity in sentences inside and outside the S.D.N.Y. In recent years, prosecutors in the S.D.N.Y . compiled an
impressive win record , largely with the benefit of cooperating witnesses in a series of related actions. The success
of that approach may have provided additional incentive for prosecutors to encourage cooperation by
recommending sentences of probation for cooperators. In addition, because there are more insider trading cases
brought in the S.D.N.Y. than in all other districts combined, judges in the S.D.N.Y. may be less likely to impose as harsh a sentence on a
cooperator as might a judge for which insider trading cases are more novel.
2014 was another big year for insider trading
cases.
Insider trading prosecution on the rise – cooperation
Morrison and Foerster 2/21, (Law firm – includes prominent attorneys with decades of experience,
former prosecutors, former SEC enforcement attorneys, former senior officials of the CFTC and FINRA,
and in-house forensic accounting experts, “2014 Insider Trading: Annual Review”, 2/21/2015,
http://www.mofo.com/~/media/Files/ClientAlert/2015/02/150211InsiderTradingAnnualReview.pdf)
BBer
The 2014 sentencing data stands out in a number of ways. First, ten cooperators received prison time in
2014, more than had been sentenced to prison in the prior four years combined, even though the
number of cooperators sentenced in 2014 was less than in 2013 and equal to 2012. Second, the gap in
expected outcomes between cooperators and those who go to trial has narrowed substantially if one
factors in the reversal of the Newman and Chiasson convictions, the doubt that ruling casts upon the Steinberg and Martoma convictions, and
DOJ’s loss in the Rengan Rajaratnam trial. In short, defendants can now factor in a real chance of acquittal if they go to trial, whereas conviction
seemed all but inevitable just one year ago. If the Newman holding remains undisturbed and is followed in other circuits,
we may well
see a reduction in the absolute number of insider trading criminal cases (and SEC enforcement
actions), as prosecutors forgo hard-to-win remote tippee cases. Despite these developments, however, it
remains true that cooperators receive lower prison sentences (on average 25% of the minimum guidelines in 2014), as
compared to settling defendants who do not cooperate (35% of the minimum guidelines in 2014), and those who go to trial (35% of the
minimum guideline in 2014). In total over the last five years, the numbers are more stark: cooperators
received prison
sentences of approximately 11% of the minimum guidelines on average, as compared to 43% for
settling non-cooperators, and 45% for those who went to trial. The benefits of cooperation in 2014
also remained the most pronounced in the S.D.N.Y. The one cooperator sentenced in the S.D.N.Y. in 2014, Reemah Shah,
received no prison time, whereas numerous non-cooperators received substantial prison time. In contrast, seven cooperators outside the
S.D.N.Y. were sentenced to prison for more than one year, and non-cooperators’ prison sentences were generally not as high outside the
S.D.N.Y.
The aggregate sentencing data from 2010 through 2014 shows a clear trend.
SEC investigations work
SEC investigations successful
Eaglesham 14, (Jean, writes about law enforcement by the Securities and Exchange Commission and
other financial agencies, working from the Wall Street Journal's New York bureau, "As SEC Enforcement
Cases Rise, Big Actions Are Sparse", WSJ, 9-29-2014, http://www.wsj.com/articles/as-sec-enforcementcases-rise-big-actions-are-sparse-1412028262) BBer
Mary Jo White will end her first full fiscal year running the Securities and Exchange Commission able
to claim an increase in its annual tally of cases, the first year-over-year rise since 2011, according to people
close to the agency. It is an important benchmark for the SEC chairman, a former federal prosecutor who promised "aggressive and
creative" enforcement soon after taking office last year. But some SEC watchers said the heightened activity masks
a scarcity of the blockbuster actions that should be a feature of an effective Wall Street cop. "When the
chairman testifies before Congress…she will have nice numbers to cite," said Thomas Gorman, a partner at law firm Dorsey & Whitney LLP. "But
she's not going to have the really good cases that the SEC made its reputation on." Ms. White said
the SEC's enforcement division
has been highly successful in the past year, and aggressive enforcement will continue . " What is most
impressive is that the cases span the spectrum of the securities markets and that we demanded tough
remedies ," she said in a statement. The SEC is still completing its official tally of enforcement actions for the
fiscal year ending Tuesday. But a recent flurry of activity has boosted total enforcement actions, one
of the agency's measures of success, to well over the 686 reached in the previous 12-month period, the
people close to the agency said. Ms. White can also point to recent progress on two of her priorities. Her policy of requiring
admissions of wrongdoing to settle SEC allegations in some cases has produced 12 such pacts, the most
recent last week, according to an analysis by The Wall Street Journal. And her "broken windows" strategy of pursuing even
small legal violations led to 54 new cases this month, a handy addition to the annual tally, according
to the analysis. Senior SEC officials said the agency under Ms. White is moving on from its effort to punish
misconduct related to the financial crisis, which dominated the five years after 2008 . But such actions still
accounted for more than half of its biggest-penalties cases in this fiscal year, according to the analysis by the Journal. Four of seven cases with
settlements of more than $100 million brought by the SEC in the past 12 months, including the three biggest fines, involve conduct dating back
to the financial crisis, the analysis found. Three of these seven
$100 million-plus cases included admissions of
wrongdoing by the firm involved, reflecting the agency's determination to require admissions in some
of its most important cases. But the 12 pacts with admissions reached under the new policy also
include alleged misconduct that resulted in much smaller penalties, in which fraud wasn't alleged,
such as a computer-coding error that resulted in a discount brokerage giving incorrect data to the SEC .
"When you look at the [admissions] cases they've brought so far, it's hard to understand why those have been selected and not others," said
Stephen Crimmins, a partner at law firm K&L Gates LLP. Andrew Ceresney, SEC enforcement chief, said all 12 admissions "are important cases
that warranted admissions, which enhanced the defendants' acceptance of responsibility for their actions." The SEC has chalked up some
notable firsts under Ms. White. This month alone, the agency made a record $30 million payout to a whistleblower and filed its first
enforcement action against a high-frequency trading firm, as well as its first case against a brokerage firm for failing to protect customers'
nonpublic information. Senior SEC officials said the agency's postcrisis strategy is to pursue wrongdoing on a broad range of fronts, on both
"Now that we have completed nearly all of our
financial crisis cases, we will increase our focus in a range of different areas," said Mr. Ceresney. The types
Wall Street and Main Street, rather than target any particular area.
of cases being targeted include insider trading, market structure, microcap-stock fraud, pyramid
schemes, municipal securities, complex financial instruments, and investment-adviser fraud, he said. Mr.
Ceresney highlighted financial-reporting fraud as another area in which the SEC is ramping up efforts.
The numbers of these bread-and-butter, fiddling-the-books cases fell sharply in the aftermath of the
crisis. That trend is now reversing: The SEC will this fiscal year be able to report an increase for this
type of case for the first time since 2008, said a person close to the agency. Accounting and financialreporting fraud numbers are up at least 25% on the 68 total for the year
through September 2013, the person
said. But these cases are mostly on a fairly modest scale, in terms of the sanctions imposed. "We're not seeing many really big actions; there is
nothing to match the accounting fraud cases of the late 1990s," said Thomas Sporkin, a former SEC attorney who is now a partner at law firm
BuckleySandler LLP. Some lawyers question the seeming pressure on the SEC to bring ever-bigger cases. Bradley Bondi, a former counsel to two
former SEC Republican commissioners, said the agency has touted its enforcement statistics as a gauge of its effectiveness for the past decade.
But police chiefs often rate success in terms of falling crime rates, said Mr. Bondi, now a partner at law firm Cadwalader, Wickersham & Taft
LLP. The SEC's increasing numbers of cases and "ever-growing penalty amounts" could show a need to re-evaluate how well it is deterring
future misconduct, he said. Arthur Levitt, the SEC's chairman from 1993 to 2001, said Ms. White has "got off to a good start" on enforcement.
But it is probably too early to judge the effectiveness of her drive to make the SEC a tougher agency. "I don't think we'll really know for a few
years," he said.
SEC investigations will continue to be successful – multiple warrants
Nili 3/18, (Yaron, Co-Editor on the Harvard law school forum on Corporate Governance and Financial
Regulation – Went to The Hebrew University: M.B.A., Finance - LL.B., Law --- Activities and Societies:
Teaching assistant, "Mishpatim" Law review editor-in-chief, “SEC Enforcement Developments in 2014,
and a Look Forward", Harvard Law School, 3-18-2015, http://corpgov.law.harvard.edu/2015/03/18/secenforcement-developments-in-2014-and-a-look-forward/) BBer
As we noted last year in our memorandum focused on 2013 developments, Securities and Exchange Commission Chair Mary
Jo White has called for the SEC to be more aggressive in its enforcement program. By all accounts, the
Enforcement Division has responded to that call . The past year saw the SEC continue the trend, started
under Enforcement Director Robert Khuzami in 2009,
of transforming the SEC’s civil enforcement arm into an
aggressive law enforcement agency modeled on a federal prosecutor’s office. This should not come as a
surprise since both Andrew Ceresney, the current Director, and George Cannellos, Ceresney’s Co-Director for a brief period of time, like
Khuzami, spent many years as federal prosecutors in the Southern District of New York. And the Commission itself is now led for the first time
by a former federal prosecutor, Mary Jo White, the US Attorney for the Southern District of New York from 1993 to 2002. Given the events of
the past decade involving the Madoff fraud and the fallout from the 2008 financial crisis, we believe both
positions the SEC has taken in recent years will continue.
the aggressive tone and
In this post, we outline some of the developments in the SEC’s
enforcement program and the remedies it has pursued over the past year. We also discuss important developments in areas where we expect
to see continued enforcement attention during 2015, including insider trading law, the private equity industry, and accounting and financial
Enforcement Program Focus Adopting a “Broken Windows” Approach to Enforcement
One of the significant and over-arching approaches to the enforcement agenda under Chair White’s
leadership is the so-called “broken windows” style of enforcement. Emulating tactics introduced by
the New York City Police Department in the mid-1990s, the Commission has pledged to crack down on even minor
reporting matters.
securities law infractions in an effort to deter more significant violations.
Chair White has explained that
the
purpose of the “broken windows” approach is twofold: to ensure that the SEC is punishing “even the
smallest infractions” while still pursuing the larger violations, and to make “you feel like we are
everywhere.” Extending the policing analogy further, she has said that “[i]t is important because investors in our markets want to know
that there is a strong cop on the beat—not just someone sitting in the station house waiting for a call, but patrolling the streets and checking on
things.” To the extent the
approach is designed to make clear that the Commission will attempt to have a
presence in virtually every sector of the markets and that it will enforce all of the agency’s rules, the
program should be neither controversial nor unique. The concern in the corporate sector, however, has focused on the
extent to which the “broken windows” policy means that disproportionately harsh sanctions, adverse
publicity, and reputational harm will be the consequence of transgressions that may indeed be minor.
In announcing the program, Chair White suggested that a group of actions in 2013 relating to violations of Rule 105 of Regulation M (prohibiting
certain short sales of a security in advance of a public offering of the same security) were an early example of this approach. Since then,
however, the only matter explicitly described as a “broken windows” effort was a group of actions announced in September 2014 against 28
corporate insiders (officers, directors, and major shareholders) for failure to timely and properly file reports of securities ownership.
It is
noteworthy that these actions do not seem to have been the result of a significant time investment by
the Enforcement staff. Rather, as described by the Commission, the actions were an example of the
SEC’s recent investments in new technology—the deficient filers were identified using sophisticated
computer analysis. This may ultimately be a key feature of this initiative—that more powerful computer-based analysis will expose
technical violations of filing or other requirements that may previously have gone unnoticed, allowing the Commission to bring
such message cases without distracting significantly from other enforcement priorities. The debate over this
enforcement policy will continue. Each Chairman and each Enforcement Director over the past several decades has worried about both the
breadth and reach of the enforcement program, attempting to have a presence throughout the markets and attempting to identify all manner
of violative behavior, whether delinquent filings or even very technical violations. The Chair’s public articulation of a policy, analogized to the
“broken windows” approach, was perhaps the lightning rod here, and the SEC may now be trying to ratchet back that rhetoric. Enforcement
Director Ceresney has recently said that the
“broken windows” approach is not about turning every violation into
an enforcement action but, rather, is about targeting rules where “we have seen a pattern of a lack of
compliance” and bringing cases that “send a strong message” to the market. Increasing Use of the
Administrative Forum The SEC has said that it will increasingly use the authority it gained through the
Dodd-Frank Act to bring more actions administratively. Previously, the Commission was limited in the types of actions it could
bring and the relief it could obtain in administrative proceedings. Dodd-Frank significantly expanded the relief the SEC can obtain
administratively. The
SEC is now authorized to bring actions against non-regulated entities and individuals
and to impose significant penalties in administrative actions. The remedies available to the SEC in the different fora are
now effectively the same. In preparing to both bring and likely litigate more administrative actions, the SEC recently increased the
number of its Administrative Law Judges from three to five and increased the ALJs’ staff. The SEC has
also expanded the types of cases that it will consider bringing administratively . In June 2014, shortly after two
well-publicized trial losses, Director Ceresney noted that, although it had been rare in the past, the SEC would likely bring insider
trading cases as administrative proceedings going forward. The SEC has since filed several insider
trading cases administratively, and the Staff has said that it expects to bring more FCPA cases in the
administrative forum as well. After judicial challenges to a number of negotiated settlements and losses in court over the past
several years, many observers have suggested that the increased use of administrative proceedings is an
effort by the SEC to secure a “home-court advantage” and avoid the scrutiny of federal judges and
juries. In fiscal year 2014, the SEC won all six of its litigated administrative proceedings, but only 11 of its 18
federal court trials. While lauding the agency’s trial record on the one hand, Ceresney has not been shy about highlighting the
advantageous features of the administrative forum, including prompt decisions, specialized fact-finders, and less stringent rules of evidence.
Not surprisingly, the SEC’s decision to use its administrative forum in more cases has come under criticism. For example, Judge Rakoff of the
Southern District of New York has discussed the dangers of bringing more cases administratively, including concerns about the securities laws
being interpreted in a non-judicial forum and the fairness of the administrative proceedings due to the inapplicability of the federal rules of
evidence, the lack of a jury trial, and the deference the decisions are entitled to on appellate review. James Cox, a professor at Duke University
School of Law, has similarly commented that the SEC must be “sensitive to the benefits” of developing precedent in the federal courts. While
there is no basis to believe that the ALJs in these proceedings are not fair and, indeed, that this forum may be more advantageous to
respondents in some cases, the process concerns (absence of clear discovery rules, appeal to the Commission itself if one loses) and
appearance issues (an in-house forum) should concern the Commission and the Staff. A number of respondents in SEC administrative actions
have filed suit in recent months challenging the actions on constitutional and procedural grounds. Thus far, none of these challenges has been
successful, though several remain pending. In the first action to be decided, the District Court for the District of Columbia held that it lacked
subject matter jurisdiction over the action because no final decision had been rendered by the Commission. Even then, the court noted, the
Exchange Act provided for initial judicial review in the Court of Appeals, not the District Court. That case is now on appeal to the DC Circuit. In
December, Judge Lewis Kaplan of the SDNY similarly held that the district court lacked jurisdiction to consider an action seeking to enjoin the
SEC from proceeding with an administrative action against an investment adviser and his firm. Several other cases remain pending. Recently, a
former Standard & Poor’s executive filed a pre-emptive declaratory judgment action against the SEC after being notified that the Staff intended
to recommend that the Commission bring an administrative proceeding against her. She is asking the court to enjoin the SEC proceeding and to
find that, because the SEC’s Administrative Law Judges are officers of the executive branch who cannot be removed from office directly by the
President, the SEC’s adjudicatory system violates Article II of the Constitution. The SEC itself has been dismissive of complaints that its
administrative proceedings are unfair. In the face of criticism regarding the Commission’s increased use of administrative proceedings and the
argument that it is unfair or unconstitutional, Director Ceresney defended the practice, noting that the Commission is still bringing a
“significant” number of cases in district court and arguing that the SEC’s use of its administrative forum is “eminently proper, appropriate, and
fair to respondents.” In seeking to impose individual liability, the
Staff is also increasingly focused on those in so-called
“gatekeeper” roles, including compliance officers, accountants, and attorneys. This focus, which harkens back to
the Stanley Sporkin era in the 1970s, was, if anything, sharpened in 2014 with the Commission introducing an initiative it
refers to as “Operation Broken Gate.” This is an effort to look even more closely at the role of such
gatekeepers—those who are “obviously central to our system”—in enforcement actions. This focus
appears designed to achieve at least two goals: (1) sending a message to the public that the SEC is
getting tough on individuals in positions of authority within public companies who may have
benefited from improper conduct; and (2) incentivizing those in the private sector who can prevent
violations because they hold the keys to disclosure and investor protection by pushing them “to
actively look for red flags, ask the tough questions, and demand answers.” We expect this focus on
“gatekeepers” to continue into 2015 and beyond. Remedial Developments Eroding the “No Admit/No
Deny” Settlement Model
As we noted in last year’s memo, in 2013, the Commission announced a change to its long-standing policy
of concluding nearly all settled enforcement cases without an admission from the respondent. Previously, the SEC had required admissions only
in cases where the respondent had already pled guilty to criminal charges stemming from the same conduct. SEC
settlements
generally included language stating that the respondent neither admitted nor denied the factual
allegations set forth in the Commission’s complaint or order. The policy change comes after the SEC has been subject to
significant criticism from federal judges and others for submitting such “no admit/no deny” settlements to the courts for approval. Over the
past few years, several proposed SEC settlements have been delayed and scrutinized as a result of concerns raised by the presiding judge. Judge
Rakoff started the trend of federal judges refusing to “rubber-stamp” SEC settlements and has been the most vocal critic of the Commission’s
no admit/no deny settlement policy. He initially refused to approve the Commission’s proposed $285 million settlement with Citigroup over its
role in structuring and marketing a package of mortgage bonds to investors. Other courts have followed Judge Rakoff’s lead. For example, Judge
Kane of the District of Colorado issued an opinion rejecting a proposed settlement, stating that “‘[l]ike Judge Rakoff, I will not be a mere
handmaiden to a settlement negotiated on unknown facts, while the public is deprived of ever knowing the truth in a matter of obvious public
importance.’” Although Judge Rakoff’s refusal to approve the Citigroup settlement was overturned by the Second Circuit, the Commission has
nonetheless said it will continue to demand admissions in certain cases. The
new policy reflects the Commission’s view
that admissions increase accountability and boost investor confidence in the SEC and the markets. The
SEC has since sought and obtained admissions in a number of cases. Under the new policy, the SEC will potentially
seek admissions where: a large number of investors were harmed or the conduct was “egregious”; the conduct posed “significant risk” of harm
to the markets or investors; the admissions would “aid investors deciding whether to deal with a particular party in the future”; and reciting the
facts of the case would “send an important message” to the market. Significantly, according to Director Ceresney, admissions are not
negotiable. Once the SEC determines there should be an admission in a particular case, there is no room for negotiation. For example,
according to Ceresney, the SEC will not accept a larger penalty in lieu of an admission. The respondent must either admit or litigate.
Declining to Relieve Collateral Consequences of Settlements When public companies or regulated
entities settle enforcement actions with government regulators, including the SEC, there are often
automatic consequences that apply. These collateral consequences can be quite dramatic and have
significant negative impacts on the settling entity. In the SEC context, for example, a public company that settles to
violations of the anti-fraud provisions of the securities laws automatically loses its status as a Well-Known Seasoned Issuer, or WKSI. WKSI
status allows a company to issue new securities without going through the SEC’s typical review process, allowing for faster capital raising.
Similarly, Dodd-Frank required the
SEC to implement a so-called “bad actor” rule that disqualifies brokerdealers with “a relevant criminal conviction, regulatory or court order, or other disqualifying event”
from relying on a Rule 506 exemption to sell certain private investments, like interests in hedge funds and private-equity funds. Challenges to
the routine granting of waivers seems likely to continue into 2015. Recently, the Department of Labor, which oversees a similar disqualification
regime, took the unusual step of holding an open meeting on a waiver request from Credit Suisse in connection with a disqualification from
managing pension funds as a result of its resolution of a tax evasion case with federal prosecutors. Historically, the DOL staff had routinely
granted such waivers. In Credit Suisse’s case, however, consumer advocates and members of Congress objected to the waiver, prompting the
DOL to hold public hearings on the question in early January 2015. Consumer advocate Ralph Nader testified against granting the waiver. While
the DOL decision-making process seems to be more protracted than the SEC’s, allowing interested parties more opportunity to participate in
the process, it seems likely that activists will eventually turn their attention to the SEC waiver process, increasing the political pressure on the
Commissioners in considering such requests.
Tying Penalties to the Respondent’s Financial Position, Not the
Underlying Activity We expect that the SEC will continue to push for ever-larger penalties in 2015,
especially in cases, as with the examples cited above, where the respondent is not a public company and the impact of the penalties will not be
passed on to shareholders. Under
the discretion the securities laws give the Staff and the Commission to set
penalties, and citing “deterrence” as the key consideration, the Commission will continue to take into account the size
and financial wherewithal of an individual or an enterprise in setting the amount of any penalties sought or assessed. Substantive
Developments Insider Trading Law The year 2014 may have seen the rolling back of the tide of
successful insider trading cases brought both by the Manhattan US Attorney’s Office and the SEC. Last year saw the SEC
bring 52 insider trading actions, charging 80 people, an increase over the 44 cases brought in 2013 .
Already, the US Attorney’s Office has filed a brief in another insider trading case, United States v. Durant, arguing that the Second Circuit
decision should be construed narrowly. The government argued that, while “[t]he Newman decision dramatically (and, in our view, wrongly)
departs from thirty years of controlling Supreme Court authority,” the decision does not apply in Durant. Newman applies to insider trading
cases brought under the classical theory of liability the government argued, while Durant was brought under the misappropriation theory. On
January 23, the US Attorney’s Office asked the three-judge panel that decided the case to reconsider its ruling. If the court elects not to
reconsider its decision, the government may request that the entire Second Circuit hear the case en banc or petition the Supreme Court to hear
the appeal. That said, the decision is already having an effect. On January 29, Southern District prosecutors indicated that, as a result of
Newman, the Office would drop charges against five men who had been indicted on insider trading charges relating to IBM’s acquisition of a
software company in 2009.
Asset Management Industry The SEC has been focused on the private equity
sector for several years. In 2014, the Office of Compliance Inspections and Examinations began
completing a series of “presence exams” it had been conducting of a large number of industry
participants since 2012. The results of the exams were sufficiently troubling to the SEC that, in April 2014, the Commission
announced that it was launching a new unit within OCIE dedicated to the examination of private
equity and hedge funds. In addition to this new unit, two other groups within the SEC continue to focus on
private equity: the Asset Management Unit, established in 2010, and the Financial Reporting and Audit
Task Force. Andrew Bowden, the Director of OCIE, has said that over half of the private equity advisers that have been examined under the
presence exam initiative appear to be violating laws or have material weaknesses around how they assess fees and expenses to clients. The
SEC has filed several enforcement actions arising out of those exams. The actions brought include the
Commission’s first-ever action against a private equity firm for violating the pay-to-play rules. Those rules
prohibit investment advisers from providing advisory services to a government entity for two years following a campaign contribution to an
elected official of that entity.
The SEC also brought an action relating to the fees and expenses charged by a
private equity firm. The SEC alleged that the firm and its president violated the anti-fraud and other provisions of the securities laws by
misallocating assets from the funds to pay expenses of the management company, including rent, salaries, and other employee benefits. The
SEC also alleged that after depleting the funds’ assets, the management company made loans to the funds at “excessive” interest rates. Finally,
the SEC brought fraud charges against a private equity fund manager for breaching its fiduciary duty
by inappropriately allocating expenses between two of its funds. Given the breadth of the presence exams and the
establishment of a new unit focused specifically on this industry, we expect to see more actions against private equity firms in 2015.
Accounting and Financial Reporting Another area where we expect to see increased SEC enforcement
activity in 2015 is in accounting and financial reporting cases.
Although this has not been much of a focus area since
the financial crisis, that is beginning to change. After several years of seeing the number of such actions decline year over year, the
number
of financial reporting and disclosure cases brought by the SEC shot up 45% in fiscal 2014. The SEC has
said it expects to “continue the momentum in pursuing financial reporting and accounting fraud” in
2015. The Financial Reporting and Audit Task Force mentioned above was established by the
Commission to identify and develop potential cases that can then be referred to the Enforcement
Division for investigation. While the Task Force has begun issuing information requests to public companies, it remains to be seen
how active or effective it will be in generating enforcement recommendations. * * * This remains a challenging environment for individuals and
enterprises who find themselves involved in regulatory investigations.
The SEC has demonstrated its increasing willingness
to push traditional boundaries—including bringing more actions administratively, naming individuals,
and seeking admissions in settled matters—suggesting that is not likely to either change course or
become less demanding anytime soon.
Links
Subpoena Key
The SCA impedes federal investigations — they’d need prior approval.
Thompson and Cole 15 — Richard M. Thompson II and Jared P. Cole, Legislative Attorneys for the
Congressional Research Service, 2015 (“Stored Communications Act: Reform of the Electronic
Communications Privacy Act (ECPA),” Federation of American Scientists, May 19th, Available Online at
http://fas.org/sgp/crs/misc/R44036.pdf, Accessed on 07-06-15)
While the various ECPA reform bills discussed above appear to enjoy broad support among technology,
civil liberty, and government constituencies, some federal agencies have argued that passage of these
bills would significantly curtail their ability to conduct investigations. In an apparent effort to assuage
these concerns, the Email Privacy Act, the ECPA Amendments Act, and the LEADS Act include a “rule of
construction” noting that these agencies could still seek electronic communications directly from the
target of their investigation.
Currently, many federal agencies possess subpoena authority which allows them to compel the
production of documents from providers without prior approval of a court. Pursuant to Section
2703(b), federal agencies have issued subpoenas to service providers to obtain subscriber information
about individuals, including their names, telephone numbers, email addresses, and physical
addresses, and have indicated that they have used this authority to obtain the content of emails held
by service providers for more than 180 days.
The plan would prevent agencies from using subpoenas – requires DOJ intervention.
Thompson and Cole 15 — Richard M. Thompson II and Jared P. Cole, Legislative Attorneys for the
Congressional Research Service, 2015 (“Stored Communications Act: Reform of the Electronic
Communications Privacy Act (ECPA),” Federation of American Scientists, May 19th, Available Online at
http://fas.org/sgp/crs/misc/R44036.pdf, Accessed on 07-06-15)
All of the major ECPA reform bills would require a warrant to obtain the contents of electronic
communications held by service providers, whether held for more or less than 180 days. One result of
this provision would be that administrative subpoenas—subject to a lower standard of proof than
warrants—would no longer be sufficient to compel service providers to produce the contents of
electronic communications. However, because most federal agencies—other than the Department of
Justice (DOJ)—do not possess independent authority to seek a warrant from a magistrate judge, such
legislation would appear to preclude agencies conducting an investigation to obtain the contents of
electronic communications held by service providers directly from the provider itself. Instead, in order
to do so, agencies would presumably need to rely on the DOJ to seek a warrant, whose authority is
limited to doing so in criminal investigations.
Probable Cause Link
Requiring higher probable cause makes hampers investigations.
Baker 11 — James A. Baker, Associate Deputy Attorney General, Statement before the Committee on
Judiciary United States Senate, 2011 ("The Electronic Communications Privacy Act: Government
Perspectives on Protecting Privacy in the Digital Age," American Civil Liberties Union, April 6th, Available
Online at https://www.aclu.org/files/pdfs/email-content-foia/DOJ%20Crim%20Div%20docs/CRM231.pdf, Accessed on 07-07-15)
A third potentially appropriate topic for legislation is to clarify the standard for issuance of a court order under § 2703(d) of ECPA. ECPA
provides that the government can use a court order under § 2703(d) to compel the production of noncontent data, such as email addresses, IP addresses, or historical location information stored by
providers. These orders can also compel production of some stored content of communications, although
compelling content generally requires notice to the subscriber. According to the statute, "[a] court order for disclosure...
may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity
offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a
wire or electronic communication, or the records or other information sought, are relevant and
material to an ongoing criminal investigation." 18 U.S.C. § 2703(d). Until recently, no court had questioned that the United
States was entitled to a 2703(d) order when it made the "specific and articulable facts" showing specified by § 2703(d). However, the
Third Circuit recently held that because the statute says that a 2703(d) order "may" be issued if the
government makes the necessary showing, judges may choose not to sign an application even if it
provides the statutory showing. See In re Application of the United States, 620 F.3d 304 (3d Cir. 2010). The Third Circuit's
approach thus makes the issuance of § 2703(d) orders unpredictable and potentially inconsistent; some
judges may impose additional requirements, while others may not . For example, some judges will issue these orders
based on the statutory "reasonable grounds" standard, while others will devise higher burdens. In considering the standard for issuing 2703(d)
orders, it
is important to consider the role they play in early stages of criminal and national security
investigations. In the Wikileaks investigation, for example, this point was recently emphasized by
Magistrate Judge Buchanan in the Eastern District of Virginia. In denying a motion to vacate a 2703(d)
order directed to Twitter, Judge Buchanan explained that "at an early stage, the requirement of a
higher probable cause standard for non-content information voluntarily released to a third party
would needlessly hamper an investigation."
Kills SEC
The SEC is specifically effected — no guarantee targets will provide their e-mails.
Thompson and Cole 15 — Richard M. Thompson II and Jared P. Cole, Legislative Attorneys for the
Congressional Research Service, 2015 (“Stored Communications Act: Reform of the Electronic
Communications Privacy Act (ECPA),” Federation of American Scientists, May 19th, Available Online at
http://fas.org/sgp/crs/misc/R44036.pdf, Accessed on 07-06-15)
Nevertheless, at least one federal agency has claimed that the new warrant requirement contained in
the reform bills would unduly restrict its investigative authority. The Securities and Exchange
Commission (SEC), in a letter to the Senate Judiciary Committee, noted that the targets of agency
investigations do not always “retain copies of their incriminating communications or may choose not
to provide the e-mails in response to Commission subpoenas.”96 Accordingly, the letter argued, the
SEC has historically relied on authority under Section 2703(b) to obtain the contents of electronic
communications from service providers during its investigations. The legislation would foreclose the
SEC from doing so in the future, thereby weakening its investigative authority. The letter argued that if
the individuals under investigation knew that the SEC cannot go directly to the service providers to
obtain the contents of emails, then those individuals would be less likely to be forthcoming in
response to subpoenas issued directly to them. The letter concluded by suggesting that the legislation
be amended by inserting a provision that would allow a federal civil agency to seek the contents of
electronic communications from service providers subject to a standard similar to that governing the
issuance of criminal search warrants.
General Impact to Be Investigated Latter
The ability to access easily access communications data is crucial to law enforcement.
Baker 11 — James A. Baker, Associate Deputy Attorney General, Statement before the Committee on
Judiciary United States Senate, 2011 ("The Electronic Communications Privacy Act: Government
Perspectives on Protecting Privacy in the Digital Age," American Civil Liberties Union, April 6th, Available
Online at https://www.aclu.org/files/pdfs/email-content-foia/DOJ%20Crim%20Div%20docs/CRM231.pdf, Accessed on 07-07-15)
Mr. Chairman, the Department of Justice is charged with the responsibility of enforcing the laws,
safeguarding the constitutional rights of Americans, and protecting the national security of the United
States. As such, we welcome these hearings on this important topic. We appreciate the concerns that
some in Congress, the courts, and the public have expressed about ECPA. We know that some believe
that ECPA has not kept pace with technological changes or the way that people today communicate and
store records, notwithstanding the fact that ECPA has been amended several times for just that purpose.
We respect those concerns, and we appreciate the opportunity to discuss them here today. We also
applaud your efforts to undertake a renewed examination of whether the current statutory scheme
appropriately accommodates such concerns and adequately protects privacy while at the same time
fostering innovation and economic development. It is legitimate to have a discussion about our present
conceptions of privacy, about judicially-supervised tools the government needs to conduct vital law
enforcement and national security investigations, and how our statutes should accommodate both.
For example, we appreciate that there are concerns regarding ECPA's treatment of stored
communications - in particular, the rule that the government may use lawful process short of a warrant
to obtain the content of emails that are stored for more than 180 days. We are ready and willing to
engage in a robust discussion of these matters to ensure that the law continues to provide appropriate
protections for the privacy and civil liberties of Americans as technology develops. As we engage in that
discussion, what we must not do - either intentionally or unintentionally - is unnecessarily hinder the
government's ability to effectively and efficiently enforce the criminal law and protect national
security. The government's ability to access, review, analyze, and act promptly upon the
communications of criminals that we acquire lawfully, as well as data pertaining to such
communications, is vital to our mission to protect the public from terrorists, spies, organized
criminals, kidnappers, and other malicious actors. We are prepared to consider reasonable proposals
to update the statute - and indeed, as set forth below, we have a few of our own to suggest — provided
that they do not compromise our ability to protect the public from the real threats we face.
Significantly, ECPA protects privacy in another way as well: by authorizing law enforcement officers to
obtain evidence from communications providers, ECPA enables the government to investigate and
prosecute hackers, identity thieves, and other online criminals. Pursuant to ECPA, the government
obtains evidence critical to prosecuting these privacy-related crimes.
National security investigations are effected by ECPA standards.
Baker 11 — James A. Baker, Associate Deputy Attorney General, Statement before the Committee on
Judiciary United States Senate, 2011 ("The Electronic Communications Privacy Act: Government
Perspectives on Protecting Privacy in the Digital Age," American Civil Liberties Union, April 6th, Available
Online at https://www.aclu.org/files/pdfs/email-content-foia/DOJ%20Crim%20Div%20docs/CRM231.pdf, Accessed on 07-07-15)
ECPA has never been more important than it is now. Because many criminals, terrorists and spies use
telephones or the Internet, electronic evidence obtained pursuant to ECPA is now critical in
prosecuting cases involving terrorism, espionage, violent crime, drug trafficking, kidnappings,
computer hacking, sexual exploitation of children, organized crime, gangs, and white collar offenses.
In addition, because of the inherent overlap between criminal and national security investigations,
ECPA's standards affect critical national security investigations and cyber security programs.
Internal Link
Ext. Stock Market Key
Wall Street key to the Global Economy
Picardo ’13 Elvis Picardo, CFA and Portfolio manager at Global Securities Corporation,
2013 (“Why Wall Street Is A Key Player In The World's Economy”, Investopedia, No
Month Provided, Available Online at
http://www.investopedia.com/articles/investing/100814/wall-streets-enduring-impacteconomy.asp, Accessed 07/10/15)
The most important financial center in the world? A fabled place of silver spoons and golden parachutes? A hub of cut-throat capitalism? Or all
of the above. Wall Street is many things to many people, and the perception of what it really is depends on who you ask.
Although
people’s views of Wall Street may differ widely, what is beyond dispute is its enduring impact not just
on the American economy, but on the global one. What is Wall Street anyway? Wall Street physically takes up only a few
blocks that amount to less than a mile in the borough of Manhattan in New York City; however, its clout extends worldwide. The
term “Wall Street” was initially used to refer to the select group of large independent brokerage firms that dominated the U.S. investment
industry. But with the lines between investment banks and commercial banks having been blurred since 2008, Wall
Street in current
financial parlance is the collective term for the numerous parties involved in the U.S. investment and
financial industry. This includes the biggest investment banks, commercial banks, hedge funds, mutual funds, asset management firms,
insurance companies, broker-dealers, currency and commodity traders, financial institutions and so on. Although many of these entities may
have their headquarters in other cities such as Chicago, Boston, and San Francisco, the media still refers to the U.S. investment and financial
industry as Wall Street or simply “The Street.” Interestingly, the popularity of the term “Wall Street” as a proxy for the U.S. investment industry
has led to similar “Streets” in certain cities where the investment industry is clustered being used to refer to that nation’s financial sector, such
as Bay Street in Canada and Dalal Street in India. Why Wall Street has such an impact The U.S. is the world’s biggest economy, with 2013 gross
domestic product (GDP) of $16.80 trillion, comprising 22.4% of global economic output. It is almost twice the size of the second-biggest
economy, China (2013 GDP = $9.24 trillion).
In terms of market capitalization, the U.S. is the world’s biggest by
some distance, with a market value of $23.6 trillion dollars (as of September 23, 2014) that comprises
36.3% of global market capitalization. Japan’s $4.6-trillion market is a distant second, with just over 7% of global market cap.
Wall Street has such a significant impact on the economy because it is the trading hub of the biggest
financial markets in the world’s richest nation. Wall Street is home to the venerable New York Stock
Exchange (now called NYSE Euronext), which is the undisputed leader worldwide in terms of average daily share trading volume and total
market capitalization of its listed companies. Nasdaq OMX, the second-largest exchange globally, also has its headquarters on
Wall Street. Street firms together control trillions of dollars in financial assets, while New York is the second-largest trading center in the
foreign exchange market, where daily trading volumes exceed $5 trillion. How does Wall Street have an impact? Wall Street affects the U.S.
economy in a number of ways, the most important of which are – Wealth Effect: Buoyant
stock markets induce a “wealth
effect” in consumers, although some prominent economists assert that this is more pronounced during a real estate boom than it is
during an equity bull market. But it does seem logical that consumers may be more inclined to splurge on big-ticket
items when stock markets are hot and their portfolios have racked up sizeable gains. Consumer Confidence:
Bull markets generally exist when economic conditions are conducive to growth and consumers and businesses are confident about the outlook
for the future. When
their confidence is riding high, consumers tend to spend more, which boosts the U.S.
economy since consumer spending accounts for an estimated 70% of it. Business investment: During bull markets,
companies can use their pricey stock to raise capital, which can then be deployed to acquire assets or
competitors. Increased business investment leads to higher economic output and generates more
employment. Global bellwether The stock market and the economy have a symbiotic relationship, and during good times, one drives the
other in a positive feedback loop. But during uncertain times, the interdependence of the stock market and the
broad economy can have a severely negative effect. A substantial downturn in the stock market is
regarded as a harbinger of a recession, but this is by no means an infallible indicator. For example, the Wall Street crash of 1929
led to the Great Depression of the 1930s, but the crash of 1987 did not trigger a recession. This inconsistency led Nobel laureate Paul
Samuelson to famously remark that the stock market had predicted nine of the last four recessions.
Wall Street drives the U.S.
equity market, which in turn is a bellwether for the global economy. The 2000-02 and 2008-09 global recessions
both had their genesis in the U.S., with the bursting of the technology bubble and housing collapse respectively. But Wall Street can also be the
catalyst for a global expansion, as is evident from two examples in the current millennium. The 2003-07 global economic expansion commenced
with a huge rally on Wall Street in March 2003. Six years later, amid the biggest recession since the 1930s depression, the climb back from the
economic abyss started with a massive Wall Street rally in March 2009. Why Wall Street reacts to economic indicators Prices of stocks and
other financial assets are based on current information, which is used to make certain assumptions about the future that in turn form the basis
for estimating an asset’s fair value. When
an economic indicator is released, it would usually have little impact
on Wall Street if it comes in as per expectations (or what’s called the “consensus forecast” or “analysts’ average estimate”).
But if it comes in much better than expected, it could have a positive impact on Wall Street; conversely, if it is worse than expectations, it would
have a negative impact on Wall Street. This positive or negative impact can be measured by changes in equity indices like the Dow Jones
Industrial Average or S&P 500, for instance. For example, let’s say that the U.S. economy is coasting along and payroll numbers to be released
on the first Friday of next month are expected to show that the economy created 250,000 jobs. But when the payrolls report is released, it
shows that the economy only created 100,000 jobs. Although one data point does not make a trend, the weak payroll numbers may lead some
economists and market-watchers on Wall Street to rethink their assumptions about U.S. economic growth going forward. Some Street firms
may lower their forecasts for U.S. growth, and strategists at these firms may also reduce their targets for the S&P 500. Large institutional
investors who are clients of these Street firms may choose to exit some long positions upon receiving their lowered forecasts. This cascade of
selling on Wall Street may result in equity indices closing significantly lower on the day. Why Wall Street reacts to company results Most
medium to large-sized companies are covered by several research analysts who are employed by Wall Street firms. These analysts have indepth knowledge of the companies they cover, and are sought after by institutional “buy side” investors (pension funds, mutual funds etc.) for
their analysis and insights. Part of analysts’ research efforts are devoted to developing financial models of the companies they cover, and using
these models to generate quarterly (and annual) revenue and earnings per share forecasts for each company. The average of analysts’ quarterly
revenue and EPS forecasts for a specific company is called the “Street estimate” or “Street expectations.” Thus, when a company reports its
quarterly results, if its reported revenue and EPS numbers match the Street estimate, the company is said to have met Street estimates or
expectations. But if
the company exceeds or misses Street expectations, the reaction in its stock price can
be substantial. A company that exceeds Street expectations will generally see its stock price rise, and one that disappoints may see its
stock price plunge.
Insider Trading Enforcement Solves
SEC’s management of Insider trading is effective and evolving
Hohenstein, ’06 -- Kurt Hohenstein, Ph D in History from the University of Virginia, 2006 (“Old Debate
and New Rules: SEC Regulation of Insider Trading in the Global Marketplace”, SEC Historical, November
1, Available online at http://www.sechistorical.org/museum/galleries/it/index.php, Accessed 07/08/15)
Part of the reason for the SEC's success in enforcing its rules against insider trading is how the SEC,
which in its early years battled with the stock exchanges, developed a cooperative relationship with the stock
exchanges, particularly on disclosure and investor confidence issues. Officials of the New York Stock Exchange tightened their
own rules in response to the major insider trading scandals , designed to monitor and flag suspicious trading. While there
is still disagreement on how far the stock exchanges must go to regulate their own traders, SEC officials and NYSE officers have
worked together to create a more transparent system to identify and disclose transactions that
appear to violate the law. Both organizations have agreed that wide-spread investor confidence is a
priority.(55) The SEC's ability to adapt played a prominent role in the agency's success in regulating
insider trading. In 2000, the SEC adopted Rules 10b5-1 and 10b5-2 to deal with new devices for automatic and computer- programmed
securities purchases and sales. In addition, Rule 10b5-2 was intended to provide a guide to investors as to what constituted the kinds of duties
which would make the misappropriation theory applicable. Regulation FD was yet another response by the SEC to concerns by investment
managers, who often shared confidential information with clients, as to how they might avoid insider trading liability yet continue to perform
their duties. The Sarbanes-Oxley Act of 2002 extended the SEC concerns about insider trading by requiring "real time disclosure", increasing
penalties and lengthening the statute of limitations for fraud, requiring prompter reporting for trades by insiders, and prohibiting trading by
insiders during a pension fund blackout.(56) The
SEC continues to respond to new situations with rules meant to
provide additional instruction to investors and securities professionals as to how the SEC would apply
the misappropriation theory to new and changing securities practices. Even as the 21st century
revealed new insider trading scandals involving Enron, Martha Stewart and Imclone, the SEC has
continued its steady push for more disclosure, more fiscal transparency, and more regularity in
financial reporting and accounting in order to ensure that every investor has access to equal
information about regulated companies.(57) But the path of insider trading enforcement becomes increasingly complicated as
SEC regulations are applied to the global market. The story of insider trading regulation to the present has involved
the SEC's use of administrative and common law and institutional competence to react to challenges,
and to reshape legal theories in order to promote fair markets and investor confidence. Whether those
methods can successfully work to regulate insider trading in the global marketplace will prove to be the challenge for SEC officials as the future
history of insider trading unfolds.
SEC regulation deters Insider Trading; multiple warrants
Del Guercio, Odders-White, and Ready ’13 Diane Del Guercio, Professor at University of Oregon, Elizabeth R.
Odders-White, Professor at Wisconsion School of Business, and Mark J. Ready, Professor at Wisconsin School of Business, 2013 (“The
Deterrence Effect of SEC Enforcement Intensity on Illegal Insider Trading”, September 2013, Availabe Online at
http://poseidon01.ssrn.com/delivery.php?ID=218125068102112120114082024088108010103082061020005063086101094127013119113102
1190781231181001200501041121130750841260170021040200590050390770901250971021220800230370120930701151120900080010680
23085114068127031075113003122068092021073100110003&EXT=pdf&TYPE=2, Accessed 07/08/15)
The effects of enforcing insider trading laws have been debated in the law, economics, and finance literature for decades. Early arguments
proposed by Manne (1966) and Carlton and Fischel (1983) predict that price efficiency improves when trading by insiders with superior
information quickly and accurately impounds information into stock prices. An opposing view is that price efficiency is harmed when investors
believe that privileged insiders have an unfair informational advantage because it reduces the incentive of outside investors to gather
information or even participate in the stock market (Fishman and Hagerty (1992) and Khanna, Slezak, and Bradley (1994)). Under this view,
unchecked insider trading crowds out trading by other potential participants, such as institutional
investors, who would otherwise compete for profits under a more level playing field. Although we do not
attempt to settle this debate, we recognize that both arguments assume that enforcement deters insider trading, a largely
untested premise, at least in the United States. We fill this gap by providing direct evidence of the link between
resource-based measures of the U.S. Securities and Exchange Commission’s (SEC’s) enforcement
intensity and the level of insider trading. Despite the fact that the U.S. has a longer history of insider trading
enforcement and devotes more resources toward it than any other country, we have limited empirical evidence
of whether these efforts deter insider trading or affect price efficiency.1 Previous studies have measured the effect of U.S. enforcement by
comparing days on which prosecuted insider trades took place with days when they did not. Most studies in this strand of the literature analyze
detailed transaction-level data from a single court case (Cornell and Sirri (1992), Chakravarty and McConnell (1999), and Fishe and Robe
(2004)), and not surprisingly find mixed evidence. Only Meulbroek (1992) examines a comprehensive sample of Insider trading laws were first
enforced in the U.S. in 1961. In 2012, the SEC dedicated $467 million and 1300 staff to the Enforcement Division. This does not count resources
devoted to other divisions within the SEC or to enforcement by the U. S. Attorney’s Offices of the Department of Justice. See Bhattacharya and
Daouk (2002), Beny (2007), and Coffee (2007) for cross-country comparisons. all prosecuted insider trading cases, although her sample ends
over two decades ago in 1989. In addition, studies
of prosecuted trades suffer from the well-known concern that
the results may not generalize if successfully prosecuted trades systematically differ from the
population of all illegally informed trades. Most empirical evidence on the effects of enforcement comes from cross-country
analysis either comparing countries with different enforcement regimes (Bhattacharya et al. (2000) and Griffin et al. (2011)), or testing for the
impact of the first-time enactment or enforcement of insider trading laws (Bhattacharya and Daouk (2002), Bushman et al. (2005), DeFond et
al. (2007), Fernandes and Ferreira (2009)). The consensus in this literature is that the enforcement
of insider trading laws
matters, rather than just the law on the books, and that more aggressive enforcement is associated
with improvements in liquidity and stock price informativeness, and lower costs of capital, generally
supporting the crowding out view. In this paper, we argue that dramatic changes in insider trading enforcement since the 1980s
enable us to empirically identify the effects of more aggressive enforcement on trader behavior and stock price discovery. First, the types
of trades that expose individuals to legal liability has broadened in scope since the 1980s, extending
far beyond the original principles of those with a fiduciary duty to the stock traded (Nagy, 2009; Bainbridge,
2012). Second, punishments for successfully prosecuted traders have become more severe, while at the
same time the amount of resources devoted to enforcement has increased dramatically. For example, the
SEC’s budget in real terms is over four-times larger today than it was in the 1980s. Finally, high-profile insider trading cases
(e.g., Galleon) and recent developments in SEC enforcement have both received extensive press
coverage, suggesting that regulators have been actively signaling their increased enforcement
aggressiveness. We posit that traders are aware of these developments and test whether more aggressive
SEC enforcement effort deters illegal insider trading and affects price discovery. To measure variation in the
intensity of SEC enforcement over time, we follow recent studies that use resource-based measures to test for the effects of enforcement on
capital market outcomes. For example, Christensen, Hail, and Leuz (2011) show that stock market liquidity increases by 15% after European
reforms to enforce insider trading and market manipulation laws, but only in the countries with the highest regulatory staff and the highest
growth in staff from before to after the reforms. In the spirit of Jackson and Roe (2009), we argue that both the level of the SEC’s budget in
constant 2011 dollars and the number of staff positions available in SEC annual reports are useful proxies for investors’ perceived enforcement
intensity of insider trading laws. We show that SEC resources vary substantially over time, and more importantly, that annual increases and
decreases are often driven by the idiosyncrasies of the federal budgeting process and are arguably exogenous to the level of illegal insider
trading. We also show that the years following the high-profile Galleon insider trading case in October 2009 represent a structural break in SEC
enforcement, and an opportunity for further identification of the effect of enforcement. This date marks the beginning of a transformative
restructuring of the SEC’s Enforcement Division, including the introduction of more effective detection technologies, new legal tools (e.g.,
cooperation agreements), and a commitment to target more sophisticated serial Wall Street offenders. Most legal experts agree that the
SEC’s aggressiveness in detecting and prosecuting insider trading in the post-Galleon era is
unprecedented. For example, former SEC Commissioner and current Stanford Law Professor Joseph Grundfest stated in the Wall Street
Journal that the SEC has “declared war on insider trading” and is taking “a zero-tolerance approach.”2 We use data on a comprehensive sample
of SEC prosecuted cases from fiscal years 2003 through 2007 and 2010 through 2011 to document that the typical prosecuted trader is more
likely to be a sophisticated Wall Street professional in the post-Galleon era, consistent with a structural break. Recent data on SEC prosecuted
cases also allow for a comparison to Meulbroek’s (1992) results from the 1980s, a period with both fewer enforcement budget and staff
resources and less effective tools for detecting and prosecuting insider trading. Under
more aggressive enforcement, traders
with access to inside information before its public announcement should fear detection and
punishment, and thus less illegal trading will occur. As long recognized in the literature, deterrence should also manifest in
the pattern of price discovery around news events. With less illegally-informed trading, the stock price reaction to news should
be more concentrated at the public announcement, with less anticipatory run-up of prices in the pre-
announcement period.3 Market makers and other liquidity providers would also view trading by insiders as a less serious threat under
aggressive enforcement, suggesting that insiders’ trades would result in smaller price changes. We find that the price impact on days
with prosecuted insider trades is in fact much smaller in the last decade than in the 1980s, consistent
with a deterrent effect. Meulbroek reports an average abnormal return of 3.1% on insider trading
days, whereas the average from our more recent sample is 0.5%. Moreover, inflation-adjusted insider
dollar volume is surprisingly similar in the two sample periods despite a roughly eight-fold increase in
total trading volume, suggesting that insiders did not scale up their volume in the later period,
perhaps reflective of an increased fear of prosecution. The pronounced decrease in relative insider trading volume is only
partially responsible for the smaller price impacts. In a subsample representing the top quintile of insider volume, the abnormal insider
trading day return is still only about 1.5%, significantly different from 3.1% at the 1% level, consistent with
more muted reactions to informed trading by liquidity providers. To tie these findings more directly to enforcement intensity, we show that
variation in insider volume is significantly related to variation in SEC enforcement intensity. Specifically, we show that while illegal
insiders trade more in higher-volume stocks, this sensitivity to stock volume is smaller when SEC
budgets and staffing are higher and during the post-Galleon period. This is consistent with the predictions of a
modified Kyle model in which insiders facing greater fear of prosecution scale up their trading less aggressively in response to increases in
uninformed volume.
In light of the potential lack of generalizability of results obtained from any sample of
only prosecuted cases, we also test whether pre-announcement run-up is negatively related to our
proxies for SEC enforcement intensity using two additional samples that are free of selection bias.
Specifically, we analyze patterns of price discovery for all annual earnings announcements and all
takeover bid announcements for publicly-traded target firms from the early 1980s through 2011.
Earnings and takeover news are especially relevant because they represent the most common type of information on which prosecuted insiders
trade. For general samples of both types of informational events, we find significant negative relations between the pre-announcement price
run-ups and both resource-based measures of SEC enforcement intensity after controlling for a time trend and other factors related to the
increased SEC effort reduces insider trading in advance of
these events. Even after controlling for these continuous measures, we find that pre-announcement price runups are
significantly lower for earnings announcements during the 2010 and 2011 fiscal years, indicating that
the change in SEC tools and increased severity of punishment had an additional dampening effect on
insider trading, beyond what would have been expected given the level of SEC budget or staff. Our
information content of the announcement. This suggests that
resource-based, U.S. enforcement intensity measures allow us to exploit thirty years of time-series variation to explain patterns of price
discovery and pre-announcement price run-up, and improve our understanding of the deterrence effects of public enforcement.
Insider Trading Hurts Econ
Insider trading erodes the economy
Stefano 11 — Theodore F. di Stefano is a founder and managing partner at Capital Source Partners,
which provides a wide range of investment banking services to the small and medium-sized business
and is also a frequent speaker to business groups on financial and corporate governance matters,
2011 (“Who's Hurt by Insider Trading”, 11/4/11, available at
http://www.ecommercetimes.com/story/73674.html date accessed 7/10/15 // K.K)
What's Wrong With Insider Trading? I have no doubt that there are still people who wonder what the
big deal is about insider trading. It seems to be a victimless crime, right? The fact is that such trading
erodes our very economic foundation. Why is that? Because such trading creates a trading field that is
not level -- meaning only certain "special" people on this trading field possess valuable information
about specific securities. Such information has the effect of oversized gains for a certain few and
losses to the masses. This is patently unfair on its face. Our economic system and stock exchanges need
to be efficient and honest. This means that everyone involved in trading securities has access to the
same information as everyone else. It doesn't necessarily mean that someone involved in the stock
market will take advantage of the available information. It does mean, however, that no information
is hidden from any participants in our markets. Rajaratnam has paid dearly for his moral lapses.
Besides being sentenced to 11 years in prison, he must pay a US$10 million fine and forfeit $53.8
million of his illegal profits from insider trading. The interesting (and wonderful) thing about this
sentence is that the profits Rajaratnam made from information that wasn't available to the entire
market must be returned. This sentence specifically quantifies the illegal gains derived by a person
who had information that the general market did not. It clearly shows that nature abhors a vacuum -the vacuum created by all of the information possessed by Rajaratnam and not possessed by the rest
of the market.
Insider Trading causes economic decline and prevents growth
Beny 2 — Laura Nyantung Beny is a John M. Olin Fellow in Law and Economics, Harvard Law School,
2000-2001; Assistant Professor of Law, University of Michigan Law School, beginning 2003, 2002, (“The
Political Economy of Insider Trading Legislation and Enforcement: International Evidence”, Harvard Law
Review, 01/2, available at http://www.law.harvard.edu/programs/olin_center/papers/pdf/348.pdf date
accessed 7/10/15 // K.K)
1. Price Informativeness and Capital Allocation Arbitrage (informed) traders play a positive role in
price formation, both in the extent and kind of information that is impounded in stock prices (Morck,
Yeung and Yu, 2000; Goshen and Parchomovsky, 2000). Risk arbitrageurs invest resources in
discovering firm-specific information. Their reward is the profit that they earn by trading with their
superior information against less informed investors. Risk arbitrageurs gather proprietary information
about firms until the marginal cost of doing so is greater than the marginal benefit. The collective
trading of many risk arbitrageurs leads to more efficient capitalization of information into stock prices
(Grossman, 1976; Shleifer and Vishny, 1997). In particular, more firm-specific arbitrage by informed
traders leads to more firmspecific price variation, making stock prices more informative (French and
Roll, 1986; Roll, 1988). Wurgler (2000) shows that capital is more efficiently allocated in the economy
the greater the amount of firm-specific information that is capitalized into stock prices. Therefore, if
insider trading discourages informed/arbritrage traders, it imposes a negative externality on the
economy by reducing the informativeness of stock prices. 2. Capital Constraints and the Cost of
Capital Capital constraints limit the range of feasible investments in the economy, in turn limiting
economic growth (Bekaert, Harvey, and Lundblad, 2001). A lower cost of capital makes investments
more profitable and encourages the entry of new entrepreneurs into the capital market. Using
international time series data, Bhattacharya and Daouk (2001) demonstrate that enforcing insider
trading legislation is followed by a 5% decrease in the cost of capital (measured by stock returns
relative to an international benchmark).18 Their finding suggests that the market’s perception of
unregulated insider trading makes capital more expensive, while serious enforcement of insider
trading laws significantly relaxes capital constraints. Hence enforcing an insider trading ban could lead
ultimately to increased economic growth. 3. Transaction Costs and Liquidity Liquid markets are
socially valuable because greater liquidity makes purchasing and disposing of shares on short notice,
at the appropriate price, easier for investors. The more liquid the market, the more willing investors are
to participate in it. This is true for both primary and secondary markets. Amihud and Mendelson (1986)
confirm that investors value liquidity by showing that companies whose shares are more liquid must
pay investors a lower expected rate of return than companies with less liquid shares. That is,
companies whose shares are more liquid have a lower cost of equity capital. Liquid markets might also
mitigate agency costs, by lowering the opportunity cost of monitoring and facilitating the market for
corporate control (Maug, 2000; Berndt, 2000).19 As noted above, however, insider trading increases
transaction costs and thus reduces stock market liquidity.
Insider trading kills the economy.
Breslow and Yglesias 14 – Jason M. Breslow, degree in communication from American
University, Political and Economic reporter. Matthew Yglesias, business and economics
correspondent for Slate and the author of The Rent Is Too Damn High, (“Should Insider
Trading Be Legal?” Jan 7 2014, PBS, Available online at
http://www.pbs.org/wgbh/pages/frontline/business-economy-financial-crisis/to-catcha-trader/should-insider-trading-be-legal/) N.H
On the other hand, I don’t think the argument that allowing insider trading would improve market
efficiency by putting more information to work makes much sense. As Jie Hue and Thomas Noe write
in their analysis of the issue for the Atlanta Federal Reserve, the existence of a sophisticated securities
analysis industry in the United States means we don’t really face the problem of a major
informational gap. Just look at this year’s Nobel Prize winners in economics. Eugene Fama has shown
that U.S. equities markets are essentially “efficient” in an informational sense as is. His co-winner,
Robert Shiller, has done an enormous amount to demonstrate that this kind of efficiency hardly
precludes periodic manias and panics and that asset prices fluctuate much more dramatically than the
fundamentals. But the substantial holes poked in the theory of the stock market as efficient point to
herd psychology as the key flaw, not hidden information that insider trading would reveal.
The real impact of legalizing insider trading, in this instance, would be twofold. On the one hand, firms
that don’t want their insiders to trade on inside information would need to invest in their own
monitoring and enforcement mechanisms of firm-level rules. On the other hand, firms that didn’t
bother to invest in halting insider trading could construe permissive insider trading rules as a form of
additional compensation to employees.
The first impact hardly seems desirable. Since firms couldn’t level the same kind of sanctions as the
government, the monitoring would need to be much more intensive and expensive to produce
equivalent deterrence, leading to a huge waste of social resources. And the second impact seems
potentially disastrous. The last thing the American economy needs is a dynamic in which managers of
major corporations have even more financial incentive to spend their time thinking about ways to
game the stock market rather than manage their enterprises for the long term.
There are some good questions to be asked about the overall role of surveillance in American law
enforcement that would, of course, have important implications for insider trading cases as well as
other kinds of criminal activity. But the fundamental social goal of securities law is to have wellmanaged, well-capitalized enterprises and the ban on insider trading serves those goals perfectly well
as it stands.
Trillions of dollars are at stake enforcing insider trading rules are key.
Breslow and Yglesias 14 – Jason M. Breslow, degree in communication from American
University, Political and Economic reporter. Matthew Yglesias, business and economics
correspondent for Slate and the author of The Rent Is Too Damn High, (“Should Insider
Trading Be Legal?” Jan 7 2014, PBS, Available online at
http://www.pbs.org/wgbh/pages/frontline/business-economy-financial-crisis/to-catcha-trader/should-insider-trading-be-legal/) N.H
This is perhaps a good way of thinking about the fundamental issue that divides us. When I look at the
contemporary United States, I’m much more inclined to worry that we are seeing systematically too
little capital investment than to worry that owners of corporate stock have too little cash in their
pockets. Business investment could create jobs and raise productivity, while stock ownership is
overwhelmingly concentrated in the hands of the most prosperous Americans.
Weakening insider trading protections will shift us into a lower-trust equilibrium in corporate
governance where we see less investment and more cash flushing out to people who don’t really need
it. A bad recipe.
Your suggestion that vigorous enforcement of insider trading laws is crowding out more worthy
investigations is an intriguing one. Certainly even in my role as designated basher of insider trading, I
wouldn’t try to make the case that this should be our absolute top priority. That said, there are an awful
lot of questions one can raise about priority-setting in the federal law enforcement context. We have
federal resources dedicated to hassling medical marijuana dispensaries in California, to policing the size
of shampoo bottles that people bring onto airplanes, and into deporting otherwise law-abiding people
for the “crime” of moving here from Mexico to roll burritos at Chipotle. Obviously, to debate marijuana
legalization or airport security or immigration reform would take us far outside the scope of this
exercise.
But my point is that to the extent that we’re really worried about resource constraints here, insider
trading enforcement is hardly the only place to look. More broadly, when you look at the scale of the
economic losses associated with the financial crisis and the ensuing recession — literally trillions of
dollars in unrecoverable lost output — it’s obvious that any genuinely useful regulatory efforts would
more than “pay for themselves.” Where I think we can agree is that as a purely political matter the
Obama administration has developed a bad habit of acting as if vigorous insider trading enforcement is a
way of striking at the heart of the issues that led to the crisis. That’s at best political theater aimed at
garnering a little undeserved populist credibility. It’s bad, and the press shouldn’t let them get away with
it. But it’s not a reason to legalize insider trading any more than the existence of unsolved murders
would be a reason for a state to legalize car theft. America’s market regulators and federal
prosecutors likewise need to be able to walk and chew gum at the same time.
Impacts
War
Economic decline triggers multiple impacts such as war and terrorism
Royal 10 - Jedediah Royal, Director of Cooperative Threat Reduction at the U.S.
Department of Defense, (“Economics of War and Peace: Economic, Legal and Political
Perspectives” 2010 pg 213-215 Accessed 7/6/15)
Less intuitive is how periods of economic decline may increase the likelihood of external conflict.
Political science literature has contributed a moderate degree of attention to the impact of economic
decline and the security and defence behavior of interdependent states. Research in this vein has
been considered at systemic, dyadic and national levels. Several notable contributions follow. First, on
the systemic level, Pollins (2008) advances Modelski and Thompson’s (1996) work on leadership cycle
theory, finding that rhythms in the global economy are associated with the rise and fall of a pre-eminent
power and the often bloody transition from one pre-eminent leader to the next. As such, exogenous
shocks such as economic crises could usher in a redistribution of relative power (see also Gilpin, 1981)
that leads to uncertainty about power balances, increasing the risk of miscalculation (Fearon, 1995).
Alternatively, even a relatively certain redistribution of power could lead to a permissive environment
for conflict as a rising power may seek to challenge a declining power (Werner, 1999). Separately,
Pollins (1996) also shows that global economic cycles combined with parallel leadership cycles impact
the likelihood of conflict among major, medium and small powers, although he suggests that the
causes and connections between global economic conditions and security conditions remain unknown.
Second, on a dyadic level, Copeland’s (1996, 2000) theory of trade expectations suggests that ‘future
expectations of trade’ is a significant variable in understanding economic conditions and security
behavior of states. He argues that interdependent states are likely to gain pacific benefits from trade
so long as they have an optimistic view of future trade relations. However, if the expectations of
future trade decline, particularly for difficult to replace items such as energy resources, the likelihood
for conflict increases, as states will be inclined to use force to gain access to those resources. Crises
could potentially be the trigger for decreased trade expectations either on its own or because it
triggers protectionist moves by interdependent states. Third, others have considered the link between
economic decline and external armed conflict at a national level. Blomberg and Hess (2002) find a
strong correlation between internal conflict and external conflict, particularly during periods of
economic downturn. They write, the linkages between internal and external conflict and prosperity
are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict, which in turn
returns the flavor. Moreover, the presence of a recession tends to amplify the extent to which
international and external conflicts self-reinforce each other. (Blomberg & Hess, 2002, p. 89) Economic
decline has also been linked with an increase in the likelihood of terrorism (Blomberg, Hess, &
Weerapana, 2004), which has the capacity to spill across borders and lead to external tensions.
Furthermore, crises generally reduce the popularity of a sitting government . ‘Diversionary theory’
suggests that, when facing unpopularity arising from economic decline, sitting governments have
increased incentives to fabricate external military conflicts to create a ‘rally around the flag’ effect.
Wang (1996), DeRouen (1995), and Blomberg, Hess, and Thacker (2006) find supporting evidence
showing that economic decline and use of force are at least indirectly correlated. Gelpi (1997), Miller
(1999), and Kisangani and Pickering (2009) suggest that the tendency towards diversionary tactics are
greater for democratic states than autocratic states, due to the fact that democratic leaders are
generally more susceptible to being removed from office due to lack of domestic support. DeRouen
(2000) has provided evidence showing that periods of weak economic performance in the United
States, and thus weak Presidential popularity, are statistically linked to an increase in the use of force.
In summary, recent economic scholarship positively correlates economic integration with an increase in
the frequency of economic crises, whereas political science scholarship links economic decline with
external conflict at systemic, dyadic and national levels. This implied connection between integration,
crises, and armed conflict has not featured prominently in the economic-security debate and deserves
more attention.
Economic decline causes conflict, resource competition, terrorism and war
Kemp, 10 - Director of Regional Strategic Programs at The Nixon Center, served in the White House
under Ronald Reagan, special assistant to the president for national security affairs and senior director
for Near East and South Asian affairs on the National Security Council Staff, Former Director, Middle East
Arms Control Project at the Carnegie Endowment for International Peace, Geoffrey The East Moves
West: India, China, and Asia’s Growing Presence in the Middle East”, p. 233-4)
The second scenario, called Mayhem and Chaos, is the opposite of the first scenario; everything that can
go wrong does go wrong. The world economic situation weakens rather than strengthens, and India,
China, and Japan suffer a major reduction in their growth rates, further weakening the global
economy. As a result, energy demand falls and the price of fossil fuels plummets, leading to a financial
crisis for the energy-producing states, which are forced to cut back dramatically on expansion
programs and social welfare. That in turn leads to political unrest: and nurtures different radical
groups, including, but not limited to, Islamic extremists. The internal stability of some countries is
challenged, and there are more “failed states.” Most serious is the collapse of the democratic
government in Pakistan and its takeover by Muslim extremists, who then take possession of a large
number of nuclear weapons. The danger of war between India and Pakistan increases significantly.
Iran, always worried about an extremist Pakistan, expands and weaponizes its nuclear program. That
further enhances nuclear proliferation in the Middle East, with Saudi Arabia, Turkey, and Egypt joining
Israel and Iran as nuclear states. Under these circumstances, the potential for nuclear terrorism
increases, and the possibility of a nuclear terrorist attack in either the Western world or in the oilproducing states may lead to a further devastating collapse of the world economic market, with a
tsunami-like impact on stability. In this scenario, major disruptions can be expected, with dire
consequences for two-thirds of the planet’s population.
Heg
The economy is key to national security
Flournoy and Fontaine ’15 - Michèle Flournoy is chief executive of the Center for a New American
Security and former undersecretary of defense for policy in the Obama administration. Mr. Fontaine is
president of the center and former foreign-policy adviser. Richard Fontaine is President of the Center for
a New American Security (CNAS). He served as a Senior Advisor and Senior Fellow at CNAS from 20092012 and previously as foreign policy advisor. Worked at the State Department, the National Security
Council and on the staff of the Senate Foreign Relations Committee. 2015 (“Economic Growth Is a
National Security Issue” Available Online at http://www.wsj.com/articles/economic-growth-is-anational-security-issue-1432683397, May 26, 2015, Accessed 7/7/15) N.H
The truth is that national security and economic strength are inextricably linked, and Washington
needs to pursue both. In siloed government agencies, though, they are too often considered in isolation.
America’s economy is the foundation of its military and political power, and boosting growth helps
relieve the downward pressure on defense and foreign-affairs budgets that reduces Washington’s
ability to shape international events. With the world aflame from Syria to Ukraine, and tensions with
China rising, the demand for U.S. power is higher than it has been in decades. The challenge today is
supplying it.
Perceptions of American retrenchment in recent years stem partly from Obama administration policies
and congressional dysfunction—the sequester cuts, remember, were supposed to be so onerous that
lawmakers would never let them take effect. But equally important is that in the wake of the financial
crisis, the country turned inward to focus on creating jobs and reducing income inequality at home
rather than sending aid and personnel abroad.
Until the rise of Islamic State in the Middle East and aggression from Russia in Ukraine, the percentage
of Americans saying that the country should mind its own business internationally was 52%. This figure,
from a December 2013 poll, was the highest ever recorded. The sentiment was driven by pervasive warweariness and the middle class’s increased focus on its pocketbook. Indeed, throughout U.S. history,
periods of economic strife have coincided with America’s trimming its national sails overseas. An
internationally engaged U.S. must be an economically prosperous and confident one.
A bright economic outlook is a powerful counter to the narrative of American decline. It boosts
perceptions of U.S. leadership and thus Washington’s ability to shape and enforce the international
rules of the road, in domains as diverse as trade, maritime security and cyberspace.
U.S. security decline triggers a laundry list of impacts and transition wars
1. Transition wars 2. Asian nuclear war 3. Middle East conflicts 4. Nuclear prolif 5. Nuclear miscalc 6.
Terrorism 7. Piracy 8. Organized Crime 9. Climate Change 10. Disease
Brooks 13 – Stephen Brooks, Associate Professor of Government at Dartmouth College, John Ikenberry,
Albert G. Milbank Professor of Politics and International Affairs at Princeton University and Global
Eminence Scholar at Kyung Hee University in Seoul, John Wohlforth, Daniel Webster Professor of
Government at Dartmouth College (“Lean Forward” Foreign Affairs, Available Online at
https://www.foreignaffairs.com/articles/united-states/2012-11-30/lean-forward, January/February
2013) N.H
Of course, even if it is true that the costs of deep engagement fall far below what advocates of
retrenchment claim, they would not be worth bearing unless they yielded greater benefits. In fact, they
do. The most obvious benefit of the current strategy is that it reduces the risk of a dangerous conflict.
The United States' security commitments deter states with aspirations to regional hegemony from
contemplating expansion and dissuade U.S. partners from trying to solve security problems on their
own in ways that would end up threatening other states. Skeptics discount this benefit by arguing that
U.S. security guarantees aren't necessary to prevent dangerous rivalries from erupting. They maintain
that the high costs of territorial conquest and the many tools countries can use to signal their benign
intentions are enough to prevent conflict. In other words, major powers could peacefully manage
regional multipolarity without the American pacifier. But that outlook is too sanguine. If Washington
got out of East Asia, Japan and South Korea would likely expand their military capabilities and go
nuclear, which could provoke a destabilizing reaction from China. It's worth noting that during the
Cold War, both South Korea and Taiwan tried to obtain nuclear weapons; the only thing that stopped
them was the United States, which used its security commitments to restrain their nuclear
temptations. Similarly, were the United States to leave the Middle East, the countries currently
backed by Washington--notably, Israel, Egypt, and Saudi Arabia--might act in ways that would
intensify the region's security dilemmas. There would even be reason to worry about Europe.
Although it's hard to imagine the return of great-power military competition in a post-American Europe,
it's not difficult to foresee governments there refusing to pay the budgetary costs of higher military
outlays and the political costs of increasing EU defense cooperation. The result might be a continent
incapable of securing itself from threats on its periphery, unable to join foreign interventions on which
U.S. leaders might want European help, and vulnerable to the influence of outside rising powers. Given
how easily a U.S. withdrawal from key regions could lead to dangerous competition, advocates of
retrenchment tend to put forth another argument: that such rivalries wouldn't actually hurt the United
States. To be sure, few doubt that the United States could survive the return of conflict among powers
in Asia or the Middle East--but at what cost? Were states in one or both of these regions to start
competing against one another, they would likely boost their military budgets, arm client states, and
perhaps even start regional proxy wars, all of which should concern the United States, in part because
its lead in military capabilities would narrow. Greater regional insecurity could also produce cascades of
nuclear proliferation as powers such as Egypt, Saudi Arabia, Japan, South Korea, and Taiwan built
nuclear forces of their own. Those countries' regional competitors might then also seek nuclear
arsenals. Although nuclear deterrence can promote stability between two states with the kinds of
nuclear forces that the Soviet Union and the United States possessed, things get shakier when there
are multiple nuclear rivals with less robust arsenals. As the number of nuclear powers increases, the
probability of illicit transfers, irrational decisions, accidents, and unforeseen crises goes up. The case
for abandoning the United States' global role misses the underlying security logic of the current
approach. By reassuring allies and actively managing regional relations, Washington dampens
competition in the world s key areas, thereby preventing the emergence of a hothouse in which
countries would grow new military capabilities. For proof that this strategy is working, one need look no
further than the defense budgets of the current great powers: on average, since 1991 they have kept
their military expenditures as A percentage of GDP to historic lows, and they have not attempted to
match the United States' top-end military capabilities. Moreover, all of the world's most modern
militaries are U.S. allies, and the United States' military lead over its potential rivals .is by many
measures growing. On top of all this, the current grand strategy acts as a hedge against the emergence
regional hegemons. Some supporters of retrenchment argue that the U.S. military should keep its forces
over the horizon and pass the buck to local powers to do the dangerous work of counterbalancing rising
regional powers. Washington, they contend, should deploy forces abroad only when a truly credible
contender for regional hegemony arises, as in the cases of Germany and Japan during World War II and
the Soviet Union during the Cold War. Yet there is already a potential contender for regional hegemony-China--and to balance it, the United States will need to maintain its key alliances in Asia and the military
capacity to intervene there. The implication is that the United States should get out of Afghanistan and
Iraq, reduce its military presence in Europe, and pivot to Asia. Yet that is exactly what the Obama
administration is doing. MILITARY DOMINANCE, ECONOMIC PREEMINENCE Preoccupied with security
issues, critics of the current grand strategy miss one of its most important benefits: sustaining an open
global economy and a favorable place for the United States within it. To be sure, the sheer size of its
output would guarantee the United States a major role in the global economy whatever grand strategy
it adopted. Yet the country's military dominance undergirds its economic leadership. In addition to
protecting the world economy from instability, its military commitments and naval superiority help
secure the sea-lanes and other shipping corridors that allow trade to flow freely and cheaply. Were
the United States to pull back from the world, the task of securing the global commons would get
much harder. Washington would have less leverage with which it could convince countries to
cooperate on economic matters and less access to the military bases throughout the world needed to
keep the seas open. A global role also lets the United States structure the world economy in ways that
serve its particular economic interests. During the Cold War, Washington used its overseas security
commitments to get allies to embrace the economic policies it preferred--convincing West Germany in
the 1960s, for example, to take costly steps to support the U.S. dollar as a reserve currency. U.S. defense
agreements work the same way today. For example, when negotiating the 2011 free-trade agreement
with South Korea, U.S. officials took advantage of Seoul's desire to use the agreement as a means of
tightening its security relations with Washington. As one diplomat explained to us privately, "We asked
for changes in labor and environment clauses, in auto clauses, and the Koreans took it all." Why?
Because they feared a failed agreement would be "a setback to the political and security relationship."
More broadly, the United States wields its security leverage to shape the overall structure of the
global economy. Much of what the United States wants from the economic order is more of the same:
for instance, it likes the current structure of the World Trade Organization and the International
Monetary Fund and prefers that free trade continue. Washington wins when U.S. allies favor this status
quo, and one reason they are inclined to support the existing system is because they value their military
alliances. Japan, to name one example, has shown interest in the Trans-Pacific Partnership, the Obama
administration's most important free-trade initiative in the region, less because its economic interests
compel it to do so than because Prime Minister Yoshihiko Noda believes that his support will strengthen
Japan's security ties with the United States. The United States' geopolitical dominance also helps keep
the U.S. dollar in place as the world's reserve currency, which confers enormous benefits on the country,
such as a greater ability to borrow money. This is perhaps clearest with Europe: the EU'S dependence on
the United States for its security precludes the EU from having the kind of political leverage to support
the euro that the United States has with the dollar. As with other aspects of the global economy, the
United States does not provide its leadership for free: it extracts disproportionate gains. Shirking that
responsibility would place those benefits at risk. CREATING COOPERATION What goes for the global
economy goes for other forms of international cooperation. Here, too, American leadership benefits
many countries but disproportionately helps the United States. In order to counter transnational
threats, such as terrorism, piracy, organized crime, climate change, and pandemics, states have to
work together and take collective action. But cooperation does not come about effortlessly, especially
when national interests diverge. The United States' military efforts to promote stability and its broader
leadership make it easier for Washington to launch joint initiatives and shape them in ways that reflect
U.S. interests. After all, cooperation is hard to come by in regions where chaos reigns, and it flourishes
where leaders can anticipate lasting stability. U.S. alliances are about security first, but they also
provide the political framework and channels of communication for cooperation on nonmilitary
issues. NATO, for example, has spawned new institutions, such as the Atlantic Council, a think tank,
that make it easier for Americans and Europeans to talk to one another and do business. Likewise,
consultations with allies in East Asia spill over into other policy issues; for example, when American
diplomats travel to Seoul to manage the military alliance, they also end up discussing the Trans-Pacific
Partnership. Thanks to conduits such as this, the United States can use bargaining chips in one issue
area to make progress in others. The benefits of these communication channels are especially
pronounced when it comes to fighting the kinds of threats that require new forms of cooperation,
such as terrorism and pandemics. With its alliance system in place, the United States is in a stronger
position than it would otherwise be to advance cooperation and share burdens. For example, the
intelligence-sharing network within NATO, which was originally designed to gather information on the
Soviet Union, has been adapted to deal with terrorism. Similarly, after a tsunami in the Indian Ocean
devastated surrounding countries in 2004, Washington had a much easier time orchestrating a fast
humanitarian response with Australia, India, and Japan, since their militaries were already comfortable
working with one another. The operation did wonders for the United States' image in the region. The
United States' global role also has the more direct effect of facilitating the bargains among governments
that get cooperation going in the first place. As the scholar Joseph Nye has written, "The American
military role in deterring threats to allies, or of assuring access to a crucial resource such as oil in the
Persian Gulf, means that the provision of protective force can be used in bargaining situations.
Sometimes the linkage may be direct; more often it is a factor not mentioned openly but present in the
back of statesmen's minds." THE DEVIL WE KNOW Should America come home? For many prominent
scholars of international relations, the answer is yes--a view that seems even wiser in the wake of the
disaster in Iraq and the Great Recession. Yet their arguments simply don't hold up. There is little
evidence that the United States would save much money switching to a smaller global posture. Nor is
the current strategy self-defeating: it has not provoked the formation of counterbalancing coalitions or
caused the country to spend itself into economic decline. Nor will it condemn the United States to
foolhardy wars in the future. What the strategy does do is help prevent the outbreak of conflict in the
world's most important regions, keep the global economy humming, and make international
cooperation easier. Charting a different course would threaten all these benefits. This is not to say that
the United States' current foreign policy can't be adapted to new circumstances and challenges.
Washington does not need to retain every commitment at all costs, and there is nothing wrong with
rejiggering its strategy in response to new opportunities or setbacks. That is what the Nixon
administration did by winding down the Vietnam War and increasing the United States' reliance on
regional partners to contain Soviet power, and it is what the Obama administration has been doing after
the Iraq war by pivoting to Asia. These episodes of rebalancing belie the argument that a powerful and
internationally engaged America cannot tailor its policies to a changing world. A grand strategy of
actively managing global security and promoting the liberal economic order has served the United
States exceptionally well for the past six decades, and there is no reason to give it up now. The
country's globe-spanning posture is the devil we know, and a world with a disengaged America is the
devil we don't know. Were American leaders to choose retrenchment, they would in essence be running
a massive experiment to test how the world would work without an engaged and liberal leading power.
The results could well be disastrous.
Offcase Links
Politics Links
No political support for the plan
Robinson, 2010 (William Jeremy, Georgetown Law, J.D., “Free at What Cost?: Cloud Computing
Privacy Under the Stored Communications Act” Georgetown Law Journal Vol. 98)
Although Congress has historically favored the enlargement of privacy protections, it is unlikely to
lead the fight to expand online privacy. Congressional inertia can be overcome when the right combination of variables
intersect, including political momentum and societal demand.239 Two main obstacles currently prevent these variables from aligning for online
privacy issues. First, the
SCA itself impedes the adoption of new privacy measures by shrinking the gap
between the existing and ideal degree of privacy protections that Congress might want. Second,
recent congressional actions are reducing the sphere of individual privacy, especially after the
September 11, 2001 terrorist attacks, rather than seeking its expansion.240 The SCA limits the political
value of tackling online privacy issues and, therefore, obstructs efforts to adopt stronger protections.
Congress has a limited capacity to pursue new legislation and it is hard to get its finite attention
focused on a particular issue. Consequently, seeking incremental change in a previously legislated
subject area is particularly difficult.241 The SCA already provides some quantum of privacy in online communications and
content, but as society embraces new technologies, including cloud computing, the balance that the Act struck more than two decades ago may
no longer be appropriate. But aligning the SCA’s provisions with current mainstream views about online privacy would not require dramatic
changes that would generate substantial public attention. Instead, such an effort would likely involve making incremental enhancements to the
Act’s structure, clarifying issues of judicial dispute, or modernizing statutory language.242 Because of
the limited political return
such modest changes would offer, politicians have few incentives to advocate for them.
No Turns – impossible to build support for the plan.
Robinson, 2010 (William Jeremy, Georgetown Law, J.D., “Free at What Cost?: Cloud Computing
Privacy Under the Stored Communications Act” Georgetown Law Journal Vol. 98)
The SCA also influences societal expectations about online privacy and thus minimizes the political
pressure for change. Societal forces can cause both Congress and the courts to revisit privacy protections. Within the judicial realm, the
Court held in Katz v. United States that privacy issues under the Fourth Amendment focus on whether society is prepared to recognize an
expectation of privacy under certain circumstances as being reasonable.243 This approach makes it difficult for privacy advocates to advance
their interests because of the circularity in using societal expectations to define new legal protections for individual privacy when those
expectations are influenced by existing legal protections.244 In
the same circular manner, the SCA’s privacy standards
subtly influence societal norms when they are reflected in media reports, judicial decisions, and terms
of service agreements.245 In the legislative realm, the lack of a significant disparity between societal
privacy expectations and the SCA’s existing protections minimizes the political pressure to bring about
change. Political action is motivated when constituencies expand and engage their members to
generate enough momentum to attract attention.246 Yet, privacy issues attract a limited natural
constituency and building a large coalition of interested online users to generate political change is
difficult247—particularly when the SCA’s existing statutory scheme continues to define and reinforce societal norms about online privacy.
Even if there is societal demand for greater online privacy protections, elected officials and judges
need to recognize that a shift in expectations has happened. However, the demographics of Congress
and the Judiciary make it unlikely that their members are well-positioned to determine society’s
expectations, especially about emerging technologies. Younger people are much more likely to
embrace cloud computing services,248 but the average age of senators249 and House members250—
as well as the Justices251 on the Court—reflects a notable generational gap from this core user
population. Advocates for enhanced online privacy measures will have to bridge this divide and ensure that elected officials and judges
understand the technology and its implications for individual privacy before they can secure their assistance in changing the status quo.
SEC opposition makes any reform to ECPA a huge fight — empirics prove the SEC can
block reform
Fulton 14 — Sandra Fulton, 2014 ("SEC Blocking Update to Electronic Privacy Laws," American Civil
Liberties Union, April 11th, Available Online at https://www.aclu.org/blog/sec-blocking-updateelectronic-privacy-laws, Accessed 7-16-2015)
During the long, hard fight to bring the outdated Electronic Communications Privacy Act (ECPA) into
the 21st century, advocates have run into the most unlikely of opponents: the Securities and Exchange
Commission (SEC). Yes, the SEC—the agency charged with regulating the securities industry—has
brought the ECPA update to a screeching halt. Yesterday the ACLU, along with the Heritage
Foundation, Americans for Tax Reform and the Center for Democracy and Technology, sent the agency a
letter calling them out on their opposition.
ECPA, enacted in 1986, is the main statute protecting our online communications from unauthorized
government access. Unfortunately, as our lives have moved online the law has remained stagnant,
leaving dangerous loopholes in our privacy protections. A broad coalition including privacy and
consumer advocates, civil rights organizations, tech companies, and members of Congress from both
parties has been pushing for an update. Strong bipartisan legislation to update the law has over 200
sponsors and is making serious headway in Congress. Even the Department of Justice—the law
enforcement agency with arguably the most to lose in such an update—testified that some ECPA
loopholes need to be closed.
But the SEC is pushing back—essentially arguing that they should get to keep one of the loopholes
that have developed as the law has aged. When ECPA was passed in 1986, Congress developed an
elaborate framework aimed at mirroring existing constitutional protections. Newer email, less than 180
days old, was accessible only with a warrant. Based on the technology of the time, older email was
assumed to be “abandoned” and was made accessible with a mere subpoena. Similarly, another
category of digital records, “remote computing services,” was created for information you outsourced to
another company for data processing. Seen as similar to business records, it could also be collected
with a subpoena under the law.
Fast forward to the 21st Century. Now we keep a decade of email in our inboxes and "remote
computing services” has morphed into Facebook keeping all our photos or Microsoft storing our Word
documents in their cloud. Suddenly the SEC can access content in way it never could before.
But in 2010 the 6th Circuit, in United States v Warshak, ruled that email was protected by the Fourth
Amendment. Since the SEC doesn’t have the power to get a search warrant, they lost the benefit of the
loophole that they had been exploiting.. Up until now this hasn’t seemed like a big deal. They have never
legally challenged this prohibition or been able to identify a case, pre- or post-Warshak, where they
have really needed this authority; they already have a wide range of tools at their disposal.
So while the SEC is trying to frame the issue as a loss of authority, it is really a power grab—one that
would apply not just to the SEC but all federal and state agencies, including the IRS, DEA, and even
state health boards.
Even if the plan has some support, the SEC blocks passage — regardless of the truth of
the SEC’s claims, congress is buying it
Rottman and Mcauliffe 15 — Gabe Rottman and Katie Mcauliffe, 2015 ("How Congress Can Protect
Americans' Email Privacy," Roll Call, January 27th, Available Online at
http://www.rollcall.com/news/how_congress_can_protect_americans_email_privacy_commentary239611-1.html?pg=1&dczone=opinion, Accessed 7-14-2015)
Congress should have passed the bipartisan ECPA reform bills last year. But one federal agency, the
Securities and Exchange Commission, essentially blocked its passage. As a civil regulatory agency, the
SEC doesn’t have warrant authority. It only has subpoena power. By holding up ECPA reform, it’s
trying to obtain the power of a warrant with the lower standards of proof required to issue a
subpoena. In short, the SEC wants indiscriminate power to investigate American businesses and their
employees and customers by gaining access to private records and property stored online, without
convincing a judge a crime is likely being committed. That is an unprecedented, unnecessary and unjust
power grab, and rather than acquiescing to it, members of Congress should regard it as a cause to
rebuke the agency that attempted it.
Terror Links
Even privacy advocates support keeping the SCA to stop threats
Wyden et al. 14 — Ron Wyden, senator from Oregon since 1996, member of Senate Select
Committee on Intelligence with access to classified meta-date program information, Mark Udall, Senator
from Colorado from 2009 to 2015, also a member of the Senate Select Committee on Intelligence, and
Martin Heinrich, senator from New Mexico, 2014 (. “BRIEF FOR AMICI CURIAE SENATOR RON WYDEN,
SENATOR MARK UDALL, AND SENATOR MARTIN HEINRICH IN SUPPORT OF PLAINTIFF-APPELLANT,
URGING REVERSAL OF THE DISTRICT COURT,” Electronic Frontier Foundation, submitted to Smith v.
Obama, September 9th, Available online at https://www.eff.org/document/wyden-udall-heinrich-smithamicus, Accessed 7-16-15)
For example, the Stored Communications Act permits the government to obtain precisely the same
call records that are now acquired through bulk collection under section 215 when they are “relevant
and material to an ongoing criminal investigation.” 18 U.S.C. §2703 (d). Individualized orders for phone
records, as opposed to orders authorizing bulk collection, can also be obtained under section 215. 50
U.S.C. §1861.7National security letters, which do not require a court order, can also be used by the
government to obtain call records for intelligence purposes. See18 U.S.C. §2709. The government can
also acquire telephony metadata on a real-time basis by obtaining orders from either regular federal
courts or the FISC for the installation of pen registers or trap-and-trace devices. See18 U.S.C. §§3122,
3125; 50 U.S.C. §1842. And the government may also seek call records using standard criminal warrants
based on probable cause. See 18 U.S.C. §2703 (c)(A); Fed. R. Crim. P. 17(c). The government can use
many of these authorities without any more evidence than what is currently required to use the bulk
phone-records database, with less impact on the privacy interests of innocent Americans.
SCA is used for tracking in tens of thousands of cases
Witmer-Rich 14 — Jonathan Witmer-Rich, Assistant Professor of Law at Cleveland-Marshall College of
Law of Cleveland State University, JD from University of Michigan School of Law B.A. from Goshen
College 2014 (“The Rapid Rise of Delayed Notice Searches, and the Fourth Amendment "Rule Requiring
Notice,” Pepperdine Law Review, Available to subscribing institutions via Lexis-Nexis, Accessed 7-16-15)
The volume of cell phone location tracking is huge, with one federal judge estimating in 2011 that
"federal courts alone approve 20,000-30,000 tracking requests annually, and the number is rising."
n187 These different cell phone tracking technologies are governed by a variety of different legal
regimes, and there is considerable uncertainty about which legal regimes govern which types of
tracking. n188 In many cases, investigators have been able to covertly track cell phone locations
without using a search warrant, for example through court orders under 18 U.S.C. § 2703(d) (the
Stored Communications Act) or pen/trap orders under 18 U.S.C. § 3123. n189
In recent years, a number of federal magistrate judges have begun demanding that police obtain search
warrants for various categories of cell phone tracking data, while other courts continue to permit
investigators to use less stringent forms of statutory authority. n190 Amidst this uncertainty, it is clear
that investigators are increasingly (though not uniformly) using Fourth Amendment search warrants to
conduct various kinds of cell phone location tracking, and that those warrants are always delayed notice
[*544] warrants. n191 Some courts have been requiring search warrants for at least some types of cell
phone location data (such as prospective, real-time tracking) since at least 2005. n192
To the extent investigators engage in covert cell phone location tracking using statutory orders that are
not search warrants, that practice will not be reported in the Delayed Notice Reports (which reports on
"warrants" issued under § 3103a). But to the extent investigators conduct the exact same covert
tracking using search warrants, that tracking will be reported in the Delayed Notice Reports. It is
impossible to determine precisely what percentage of the delayed notice search warrants in the covered
years (2006-2012) are warrants for cell phone location tracking. Some investigators likely continue to
perform this tracking without using reported search warrants. n193 But given the judicial pressure to
use search warrants, it is quite likely that investigators are increasingly using reported search warrants
to conduct cell phone location tracking. n194 This shift--from conducting covert cell location tracking
searches with court orders, to conducting that same covert tracking with delayed notice search
warrants--would result in a steady increase in the reported number of "delayed notice search warrants"
in the Delayed Notice Reports. This increase would appear even if the total number of covert cell phone
location tracking remained constant.
E-mail messages. A similar trend may be occurring with covert searches of e-mail messages, although
the time frame here is somewhat more recent. At least since 2010, however, and arguably since 2007 or
earlier, investigators have been under increasing pressure to use delayed notice search warrants
(reported in the Delayed Notice Reports) for any [*545] covert searching of e-mail messages, instead of
using other (unreported) legal mechanisms to do so. n195
Access to e-mail messages is governed by the Stored Communications Act (SCA), passed by Congress in
1986. n196 Under the SCA, investigators can obtain e-mail messages in several ways, some of which
do not require a search warrant. Depending on the circumstances, investigators can obtain e-mail
messages by using a subpoena, with a court order under § 2703(d), or with a search warrant. n197 In
some cases, investigators want to access e-mail records without notifying the owner of the account,
and the SCA expressly authorizes that practice in specified circumstances. n198 Indeed, recall that it is
precisely this list, from the SCA, that Congress chose to cross-reference in section 3103a for delayed
notice search warrants. n199
In short, investigators in past years have been able to obtain e-mail messages without using search
warrants (at least in some circumstances), and often have been able to obtain those e-mails covertly,
without giving notice to the account holder until some later date. n200 These covert e-mail searches-if conducted without search warrants--would not have been reported in the annual Delayed Notice
Reports
Download