Terrorism negative Uniqueness AT: Losing war on terror Even if they’re right – current counter-terrorism is still successful in preventing catastrophic directed attacks Poplin, 15 - Cody Poplin is a research assistant at the Brookings Institution where he focuses on national security law and policy (“Safe Havens Still Matter” 1/28, http://www.lawfareblog.com/safe-havens-stillmatter In a recent post over at War on the Rocks, Clint Watts addresses the new threats Zenko and Wolf outline, but with the nuance they lack. While lone wolves do present a new and heretofore unaddressed threat, their presence does not eliminate more traditional terrorist threats. Instead, terrorist attacks now now comes in three forms: inspired, networked, and directed. Directed attacks are those that most come to mind when one thinks of Al Qaeda: large, signature attacks on major financial, defense, or transportation infrastructure. Safe havens provide the greatest opportunity for terror groups like AQAP or Khorasan in Syria to plan and execute these attacks. However, over the last thirteen years, these attacks have proven rare as Western counterterrorism operations have placed groups under sustained pressure while law enforcement improved at disrupting plots already in motion. Networked attacks, such as the Charlie Hebdo attack, are those where veteran fighters will return home, mix together, and create their own communities of jihadi sympathizers. While they will share ties with major terrorist organizations, their attacks may not come at the specific direction of the group. Here, and in the future, law enforcement will be key at disrupting networks that have formed in the wake of failed attempts to root out safe havens. The final type of potential attack is an inspired attack, where lone wolves who seek fame in a highly individualized age of digital media execute attacks on behalf of, but without any connection to, a known terrorist organization. These attacks are the least dangerous, but will still be deadly, and may occur more often than others. And, while unconnected directly to a large terrorist organization, much of the inspiration they receive to radicalize will come from jihadist propaganda created in safe havens around the world. The effect of these actions will be magnified by the group in hiding that issues justifications and calls for homegrown jihad. In the end, Zenko and Wolf’s piece is long on criticisms, but short on solutions. It is possible to argue that the United States has pursued a militarized response to terrorist safe havens that has cost precious lives while achieving little. But, while US intervention hasn't solved the problem, it still remains unclear how retreat will. There are responses other than a forever war accompanied by drone strikes and covert operations, including boosting our aid to civil societies and ramping up our agenda on development and political reform. A recent study by Rand Corporation suggests that fragile states, such as Yemen, are unable to process military assistance in a meaningful way, but that nonmaterial aid in the way of education, law enforcement, and counter-narcotics yields much better results. The US may need to consider alternatives for drying up the safe havens. But turning away from the sanctuaries where terrorists plot will only give space for extremism to succeed. Domestic law enforcement and overseas military and counterterrorism operations will continue to prove key to disrupting attacks before they occur. At times, this will require a more robust military response to destroy safe havens, particularly where the threat is acute and the organization well networked and growing. At other times, success will require strong domestic law enforcement capabilities to disrupt plots gathering in the hotel in Hoboken. A comprehensive approach will be one that weds these critical capabilities together while boosting the ability of our allies on the ground to prevent the conditions that lead to safe havens in the first place. Yet, no matter what the approach, safe havens will continue to matter, and their threat is no myth. Err neg – classified data means the government can’t publish the details of foiled attacks, but independent reviews confirm them Dahl, 13 - Erik J. Dahl is an assistant professor of national security affairs at the Naval Postgraduate School in Monterey, California, where he teaches in the National Security Affairs Department and the Center for Homeland Defense and Security (“Discussion Point: It’s not Big Data, but Little Data, that Prevents Terrorist Attacks” 7/25, http://calhoun.nps.edu/bitstream/handle/10945/35903/Discussion%20Point_%20It%E2%80%99s%20no t%20Big%20Data,%20but%20Little%20Data,%20that%20Prevents%20Terroris.pdf?sequence=1 Our government hasn’t been able to do a very good job of explaining to the public what it has been doing, partly because intelligence agencies are often unable to talk about their successes for fear of revealing their sources and methods. That’s why officials have said that a number of plots and attacks have been foiled, but they haven’t provided much specific information about those cases that wasn’t already in the public record. Research I am currently conducting for the National Consortium for the Study of Terrorism and Responses to Terrorism (START), together with my colleagues Martha Crenshaw and Margaret Wilson, can shed some light on how this NSA data may be used. We are studying unsuccessful terrorist plots, in hopes of finding out what tools and techniques are the most useful in preventing attacks. One finding supports the NSA’s argument that the data they are collecting can be useful in preventing future attacks. Opponents have suggested that the NSA data might only be useful in tracking down terrorists after the fact; because those haystacks of information are not apparently being looked at in real time, they are unlikely to help prevent future attacks. But the history of terrorist plots and attacks within the United States since 9/11 shows that most plots take a long time to develop. Even terrorist actions involving only one or two people typically take months or even years to plan and attempt. This is good news, because it gives law enforcement time to discover what’s going on, and it also gives the NSA time to search those haystacks it’s been collecting. Deterrence by denial solves Deterrence by denial works—empirics. Guthe 14. (Kurt, Director of Strategic Studies at the National Institute for Public Policy. “The Global Nuclear Detection Architecture and the Deterrence of Nuclear Terrorism,” Comparatative Strategy. 18 Nov 2014. Taylor & Francis Online.)//CB Like retaliatory threats, then, defenses can deter. As with current counterterrorism strategy, deterrent strategies may combine punishment and denial. The combination can be stronger than either approach alone. A deterrent based solely on a retaliatory threat provides no protection if that threat proves insufficient to prevent an attack; defenses that support a denial deterrent by making an attack unattractive also offer some insurance if the attack takes place nonetheless. Defenses present an obstacle to attack success, but there can be cases where the prospect of failure alone is not enough to discourage a potential attacker; with a retaliatory threat added, the adversary faces a steeper price for attempting an attack, including one that ends in failure. For deterring a terrorist attack, deterrence by denial may be at least as important as deterrence by threat of punishment. The clandestine nature, decentralized or distributed organization, and relative autonomy of terrorist groups can make them hard to deter through punitive threats; the task of determining to whom and against what such a threat should be directed might be quite difficult. The ability of certain groups, like al-Qa’ida and its affiliates, to withstand considerable punishment over an extended period also can undercut the deterrent effect of retaliatory threats. The options for retaliation, moreover, can be significantly limited by political, moral, legal, and operational considerations. Deterrence by denial, in contrast, depends not on threatening to kill, capture, or otherwise harm the plotters, but on frustrating the plot. The onus is on terrorists to design an attack that can overcome known—and unforeseen—obstacles, including opposing defenses, and do so within available resources or abandon their plan. Deterrence by denial prevents terror attacks—terrorists won’t attack if they don’t think they can succeed. Wilner 15. (Alex, Senior Research Affiliate and Visiting Fellow at the Munk School of Global Affairs at the University of Toronto. Deterring Terrorism: Contemporary Debates. 2015. Project Muse.)//CB First, defensive denial functions by restricting and constraining the terrorism processes. By augmenting structural defenses around potential targets, for instance, a state effectively tightens the security environment and reduces the ease with which terrorists can carry out attacks. This is intuitively understood: By impeding access, structural defenses force terrorists to reassess the costs and benefits of a particular action.86 Other scholars have gone further. They suggest that restricting terrorist financing (by un- covering, foiling, and blocking monetary transactions between terrorists and their supporters) and eliminating an organization’s domestic or foreign sanctuaries (by better policing territory or by more effectively cooperating with neighboring states) might also have a coercive effect on an organization, effectively denying it easy access to the things it needs.87 In theory, the more difficult a target is to attack, the less likely it will be. And, related to this, the higher the level of protection around a target, the more complex the attacks against it will have to be, further augmenting the risk of operational failure. In practice, defensive deterrence requires first assessing what targets terrorists most want to attack and building specific defenses that challenge the utility of attacking. If perpetrators come to believe that attacks are go- ing to be difficult to mount or that they are likely to fail, they may be less willing to try. Defensive denial in counterterrorism is not particularly new. During the 1970s (and especially following the well-coordinated attack at the Munich Olympics) the United States was concerned that foreign militants might manage to steal an American nuclear bomb stored in one of NATO’s Euro- pean bases. In response, U.S. scientists developed new parameter-control mechanisms that could detect and stop intruders. Eric Schlosser recounts that one such mechanism involved mounting nozzles on the walls of bomb storage facilities that could quickly fill rooms with sticky foam, immobiliz- ing intruders and safeguarding the nuclear bombs.88 More recently, during the al Aqsa Intifada, Hamas, Palestinian Islamic Jihad, the al-Aqsa Martyrs Brigade, and other militant groups began by first attacking Israelis within Israel with suicide bombers dispatched against soft targets. Transportation hubs, cafés, bars, restaurants, shopping malls, and public markets were re- peatedly targeted in the first half of the conflict. In response, Israel began defending public access points to bus and train depots, universities, and hos- pitals; restaurants and bars began placing guards outside their doors; blast- proof entrances were added to buildings; checkpoints and security barriers were established in major cities and on highways; and privately owned shuttles—like Sherut, a minivan, taxi-sharing service that ferries passengers between cities—began offering alternative transportation to public buses and trains. The cumulative effect was the eventual restriction of easily accessible soft targets. We like to think that a guard outside a restaurant serves the diners inside; they are protected from harm because the guard is likely to stop a would-be bomber at the door. But there is more to it: In limiting access to a target, defenses go beyond simply protecting that target to manipulating an adversary’s willingness to attack that target. The first process is defense; the second is coercion. In Israel, over time, suicide bombers were forced to target military and police checkpoints over civilian targets, and many deto- nations occurred outside and off target. The result was a diminishment in the utility of suicide attacks in Israel and an eventual reduction in their use. Deterrence by denial need not rest on structural defenses alone. Behav- ioral defenses work by introducing environmental uncertainty into terrorist planning. The U.S. Department of Homeland Security suggests that “vari- ability and unpredictability must be consciously injected into flexible prevention measures.”89 The deterrent target in question here is the terrorism process itself; unpredictability impedes terrorist planning by introducing greater levels of uncertainty. And uncertainty translates into a denial mech- anism in the planning and orchestration of terrorism. As a 2011 report pub- lished by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) at the University of Maryland suggests, “If [terror- ists] cannot understand and game security systems, they cannot have confi- dence that an attack will succeed.”90 In practice, applying behavioral denial involves conducting spot checks at public transportation hubs, establishing a police presence at randomly selected city intersections, and instructing security vehicles to leave their emergency lights on—as they do in Washing- ton, D.C., for instance—to give the impression of an overwhelming security presence. Most of these tactics rely on what is often referred to as random an- titerrorism measures (RAM), which “change the overall security/force protec- tion appearance” around potential civilian and military target sites, as seen “through the eyes of a terrorists.”91 An effective RAM program presents mil- itants with an unscheduled and even “unorthodox situation” that will compli- cate planning attacks and potentially deter behavior as a result. RAM defenses influence behavior because terrorists are generally risk-averse while preparing for attacks—they obey the law; are less likely to steal, speed, or do drugs; and generally try to avoid undue attention—and are usually sensitive to operational risk—which they try to diminish by casing a target in advance, uncovering defensive patterns, and exploiting security gaps.92 Behavioral denial muddles this surveillance process, negating preparation and potentially unnerving planners. Deterrence by denial solves - Cyberterrorism Deterrence by denial prevents cyberterrorism—other methods are out-of-date. Jasper 15. (Scott, lecturer at the Naval Postgraduate School in the Center for Civil-Military Relations and the National Security Affairs department. “Deterring Malicious Behavior in Cyberspace,” Strategic Studies Quarterly. Spring 2015. http://www.au.af.mil/au/ssq/digital/pdf/Spring_2015/jasper.pdf)//CB Deterrence by denial of benefit denies an adversary’s objectives by increasing the security and resilience of networks and systems. Traditional passive reactive methods, like antivirus software and blacklists, have grown ineffective as the volume and complexity of threats increase.52 A defense-in-depth approach emphasizes the continual deployment of reactive solutions to protect multiple threat points, including network, endpoint, web, and e-mail security.53 The spectrum of cybersecurity tools and techniques ranges from next-generation firewalls, applica- tion whitelisting, intrusion prevention systems and sandboxes to access control, data encryption, patch management, and data loss prevention. Layering multiple technologies combined with best practice endpoint management can decrease the risk of customized malware payloads, be- cause each layer blocks a different aspect of multipronged cyberattacks. For example, at the delivery phase, device control can block infected Universal Serial Bus (USB) devices. At the exploitation phase, patch and configuration management can eliminate known vulnerabilities. At the installation phase, application control can prevent unapproved execut- ables.54 Cybersecurity frameworks suggest technical measures that can monitor networks and systems, detect attack attempts, identify com- promised machines, and interrupt infiltration. The Council on Cyber Security’s Critical Security Controls offers a prioritized program for computer security based on the combined knowledge of actual attacks and effective defenses.55 These controls cover a range of best practices, including vulnerability assessment, malware defenses, and access control. The controls identify commercial tools to detect, track, control, prevent, and correct weaknesses or misuse at threat points. The top three drivers for adopting these controls are increasing visibility of attacks, improving response, and reducing risk.56 When the Congress failed to enact the necessary legislation, Pres. Barack Obama signed an executive order for the development of a Cybersecurity Framework that incor- porates voluntary consensus standards and industry best practices. The inaugural Cybersecurity Framework is built around the core functions of identify, protect, detect, respond, and recover.57 The Critical Security Controls are part of the Framework’s informative references that illus- trate methods to accomplish activities under these functions. NSA links 1nc – NSA Restrictions that add time or process to the NSA undermine the entire foundation of US intelligence gathering – collapses counterterrorism McLaughlin, 14 - teaches at the Johns Hopkins School of Advanced International Studies (John, “NSA intelligence-gathering programs keep us safe” Washington Post, 1/2, http://www.washingtonpost.com/opinions/nsa-intelligence-gathering-programs-keep-ussafe/2014/01/02/0fd51b22-7173-11e3-8b3f-b1666705ca3b_story.html It’s time we all came to our senses about the National Security Agency (NSA). If it is true, as many allege, that the United States went a little nuts in its all-out pursuit of al-Qaeda after the Sept. 11, 2001, attacks, it is equally true that we are going a little nuts again in our dogged pursuit of the post-Snowden NSA. Those who advocate sharply limiting the agency’s activities ought to consider that its work is the very foundation of U.S. intelligence. I don’t mean to diminish the role of other intelligence agencies, and I say this as a 30-year veteran of the Central Intelligence Agency who is “CIA” through and through. But in most cases, the NSA is the starting point for determining what holes need to be filled through other means of intelligence-collection. That’s because its information on foreign developments is so comprehensive and generally so reliable. It is the core of intelligence support to U.S. troops in battle . Any efforts to “rein in” the agency must allow for the possibility that change risks serious damage to U.S. security and the country’s ability to navigate in an increasingly uncertain world. The presumption that the NSA “spies” on Americans should also be challenged. In my experience, NSA analysts err on the side of caution before touching any data having to do with U.S. citizens. In 2010, at the request of then-Director of National Intelligence Dennis Blair, I chaired a panel investigating the intelligence community’s failure to be aware of Umar Farouk Abdulmutallab, the “underwear bomber” who tried to blow up a commercial plane over Detroit on Dec. 25, 2009. The overall report remains classified, but I can say that the government lost vital time because of the extraordinary care the NSA and others took in handling any data involving a “U.S. person.” (Abdulmutallab, a Ni-ger-ian, was recruited and trained by the late Anwar al-Awlaki, a U.S. citizen based in Yemen.) Regarding outrage over the NSA’s collection of telephone calling records, or metadata, I don’t know why anyone would have greater confidence in this information being held by private companies. And given the perceived threat to privacy, it’s astonishing how little attention has been paid to the Senate commerce committee’s recent report on companies that gather personal information on hundreds of millions of Americans and sell it to marketers, often highlighting people with financial vulnerability. Some companies group the data into categories including “rural and barely making it,” “retiring on empty” and “credit crunched: city families.” The aim is often to sell financially risky products to transient consumers with low incomes, the report found. That’s a real scandal — and a universe away from the NSA’s ethical standards and congressional oversight. The NSA, of course, is not perfect. But it is less a victim of its actions — the independent commission appointed by President Obama found no illegality or abuses — than of the broad distrust of government that has taken root in the United States in recent decades. Studies by Pew and others show distrust of government around 80 percent, an all-time high. This distrust is the only logical explanation I see for fear of data being held by “the government” — and it’s not a circumstance the NSA created. Although our society lauds, in almost “Stepford Wives”-like fashion, the merits of “transparency,” it lacks a collective, mature understanding of how intelligence works, how it integrates with foreign policy and how it contributes to the national welfare. Meanwhile, prurient interest in the details of leaked intelligence skyrockets, and people devour material that is not evidence of abuse but merely fascinating — and even more fascinating to U.S. adversaries. So what makes sense going forward? Clearly, the widespread perception that there is at least the “potential for abuse” when the government holds information even as limited as telephone call metadata must be addressed. The recent presidential commission recommended adding a public privacy advocate to the deliberation process of courts that approve warrants — one proposal that would do no harm. But as the administration contemplates reform, it must reject any ideas that add time and process between the moment the NSA picks up a lead overseas and the time it can cross-check records to determine whether there is a domestic dimension to overseas plotting. As our debate continues, the terrorist threat is not receding but transforming. The core leadership of alQaeda has been degraded and remains under pressure, but robust al-Qaeda affiliates have multiplied. With the decline of central government authority in the Middle East and North Africa in the wake of the Arab Spring and the war in Syria, terrorists have the largest havens and areas for operational planning in a decade. If anything, the atomization of the movement has made the job of intelligence more labor-intensive, more detail-oriented and more demanding. Now is not the time to give up any tool in the counterterrorism arsenal. Data localization Data localization is vital to NSA collection Byman and Wittes, 14 - *professor in the Security Studies Program in the Edmund A. Walsh School of Foreign Service with a concurrent appointment with the Georgetown Department of Government AND **senior fellow in Governance Studies at Brookings (Daniel and Benjamin, “Reforming the NSA” Foreign Affairs, May/June, https://www.foreignaffairs.com/articles/united-states/2014-04-17/reforming-nsa Meanwhile, foreign countries have toyed with the idea of requiring Internet companies to provide local data-storage services to their citizens. Some foreign governments and companies may turn to domestic firms for their technological needs; such firms will be sure to emphasize that their U.S. competitors will not keep foreign data secure. But these efforts may ironically make the NSA’s job easier, since the agency is less constrained by laws or oversight in accessing data stored abroad. AT: Doesn’t stop attacks Their argument misunderstands the role of intelligence – it can’t be measured casually in preventing specific incidents – instead it’s part of a whole-of-government approach that boosts the effectiveness of counterterrorism generally Byman and Wittes, 14 - *professor in the Security Studies Program in the Edmund A. Walsh School of Foreign Service with a concurrent appointment with the Georgetown Department of Government AND **senior fellow in Governance Studies at Brookings (Daniel and Benjamin, “Reforming the NSA” Foreign Affairs, May/June, https://www.foreignaffairs.com/articles/united-states/2014-04-17/reforming-nsa The NSA claims that its activities have helped prevent numerous terrorist attacks at home and abroad since 9/11. Such claims are difficult to verify without access to classified data. More important, they rely on an inappropriate measure of success. The agency’s true remit goes beyond just stopping attacks: the NSA seeks to identify terrorists, understand their organizations, and anticipate and disrupt their activities. On that broader set of tasks, the agency has accomplished a great deal in recent years. But however important, the NSA’s data collection is rarely the only factor in effective counterterrorism. Such operations are the result of coordination and cooperation among many different intelligence organizations. OCO links 1nc – OCOs OCO’s are vital to target ISIS use of the internet – prevents cyber attacks and disrupts command and control Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ Going on Cyber Offense At the moment, the web presence of Islamist extremists is a sort of “gateway drug” into the cyber world. If the United States and its allies do not address it now, they may have to accept extremist cyber activity of increasing breadth and sophistication, with greater cyberspace consequences. Terrorist use of cyberspace also works to internationalize the Islamist fight. In a sense, the “cyber jihad” world is flat, connecting individuals worldwide who might not otherwise have been connected. If Islamist extremists turn their attention to disruption and destruction through the web, they are likely to conduct distributed denial of service (DDOS) attacks and threaten the controls for electric power grids, oil pipelines, and water systems. Should social media accounts become useful for disseminating cyber weapons, Islamists would gain additional capacity. Threat is a function of expertise and access. Fortunately, the Islamic State’s cyber expertise overall is low, as is its access to high-quality advice or tutelage. But unlike with the development of WMD, both expertise in and access to cyber capabilities can change overnight, particularly should a capable revisionist state or individual decide to assist the Islamic State. With WMD, a research-and-development phase exists during which U.S. and other intelligence services can discern, evaluate, and plan accordingly. With cyber weapons, space, time, and geography offer up no comparable advantages. Delivery methods for cyber weapons are much easier to devise and disseminate, and have little to no lead-time (no lengthy research and development phase). In short, the targets would likely not see it coming. There is reason for concern. A 2013 edition of Inspire called upon jihadists to burn parked cars, make oil slicks to cause car accidents, and puncture tires with nails hammered into blocks of wood. It used to be that al-Qaeda wanted a spectacular follow-on attack to 9/11 and desired to take on the West as a whole. It did not want just any attack; it wanted a good one. Today, al-Qaeda affiliates seem to be calling for any attack, even those as comparatively minor as an individual picking up an AK-47 or using a private vehicle to run over people. The Islamic State’s online magazine, Dabiq, has called for its supporters living in Western countries to rise up individually and attack law enforcement and government officials. It seems to have abandoned the long-sought “spectacular” follow-up to 9/11. It is reasonable to think al-Qaeda’s attitude toward cyber weapons may change too. Should just the right expert hacker join the Islamic State or al-Qaeda, whether for money or out of sympathy, either group could move overnight from a cyber nuisance to a serious cyber power. It is not inconceivable that rivals to the United States, Israel, or the cultural West in general such as Iran might provide such cyber weapons to al-Qaeda, or even to its enemy the Islamic State. Tehran might do so as a means to fight the United States asymmetrically, divert U.S. attention from its nuclear weapons program or its support for Shi‘a terrorists worldwide, or simply create a deeply distracting economic drain for the United States. Further, the forensic attribution problem for the United States and its allies, should a cyber weapon be used against it, would be horrendous. The cyber weapon might appear to be Russian- or Chinese- or Iranian-made if its code were originally written in one of those countries, but that will not mean the weapon was delivered by that state. Regardless of whether al-Qaeda or the Islamic State took credit for the attack, the United States might be confused as to who created such a cyber weapon, who sent it and why, and how to defend against a repeat attack. So far, the Islamic State has not been too interested in cyber weapons for three probable reasons: cyber weapons are not spectacular enough in their destruction (messing with websites and infrastructure is not as powerful an image as a beheading video); it lacks the technical ability to create such weapons; and “cyber jihad 2.0” has served it well thus far. Despite some setbacks, the Islamic State is currently flushed with success—why change anything? One of those successes is of a particularly unusual and alarming nature. Most Islamic State supporters today were teenagers when 9/11 occurred and are children of the internet and social media. Their radicalization is very recent; it is a post-bin Laden phenomenon. Their motivation for joining the Islamic State has more to do with the dynamics of a social network that provides direction, identity, and excitement than it does with religious understanding. The Islamic State dangles the opportunity to join something new and exciting in front of bored and disaffected teens.19 This social media strategy is aimed purposefully at youth worldwide. How does this work? Islamic State videos take the traditional Western narrative, that Islamist extremists kill Muslims and are wanton, heretical murderers, and stand it on its head. It has made images of murder the centerpiece of its new message. Its production quality is so good that it has spawned the term “jihadi cool.” Whereas al-Qaeda produced rather flat websites that merely posted radical content (“cyber jihad 1.0”), the Islamic State produces videos and online magazines that are on par in quality, editing, and message delivery with current Western media. It practices “cyber jihad 2.0” at the least through its production quality and cutting-edge use of social media. It keeps pace with advances in Western media production, aided, no doubt, by the many Western supporters it has managed to attract. Its video production, in particular, is constantly uploaded, taken down but then uploaded again to numerous video sites so that it ultimately reaches its intended audience.20 Islamic State videos proclaim righteous victory over the Shi‘a and other so-called non-believers, about which there is nothing unusual or unexpected. But it showcases acts of brutality, a new phenomenon that Western analysts ignore at all our peril. ISIS professionals have managed to frame brutality in such a way that it engenders pride and a sense of inclusion, rather than revulsion. It does not occur to most normal adults in Western countries how this can work. We do not readily understand why a first- or second-generation Muslim living in London, or Amsterdam, or Marseilles, or Toronto would want to leave a typical middle-class life to go wallow in blood in the middle of the Syrian desert. Until we do come to understand this, and understand why some such people are attracted by the opportunity to do unspeakably brutal things to total strangers, we will never defeat the Islamic State. What to Do To repeat, the strategic goal of the U.S. government is to defeat al-Qaeda and the Islamic State. To do so, the United States must shut down the insidious messages of its jihadi enemies and contest their presence on the internet. Counter-Islamist efforts, therefore, must make it a priority to shut down its militant websites and social media. Well-meaning professionals argue that these websites and social media outlets serve as the means to identify, monitor, and assess jihadi groups and their sympathizers. But the argument that the intelligence loss would outweigh the gain of contesting these sites misunderstands the end goal: denying the enemy’s ability to recruit, support operations, pass weapons information and formulae, and promote extremist ideology that encourages terrorism. The point is to end the threat, not write reports about it. 2nc – internet key to ISIS The internet is the most important venue for terrorist communication Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ The Islamic State of Iraq and al-Sham (ISIS) would not exist today were it not for its prolific and shrewd use of the internet and social media. Al-Qaeda would have likely died years ago, too, had its appeal not been kept alive by the same means. Without contesting extremist use of the internet, the United States and its allies will fail to defeat the Islamic State and to eliminate al-Qaeda, both of which are, let us remember, the stated goals of U.S. policy. Certainly, bombing ISIS without a broad and complementary political strategy will not work, and may even prove counterproductive in the long run by strengthening evidence for the radical Salafi narrative that all means of defense are justifiable since the West started a war with Islam. Lacking infrastructure and the resources of a state, Islamist extremists use the web to redress strategic disadvantages in planning attacks, maintaining and financing their organizations, and recruiting and inspiring new affiliates. ISIS leaders and workers will likely rely on the web to maintain a global presence and reach, but also use it in creatively offensive ways that al-Qaeda never did. There are three types of Salafi websites: official Islamic State and al-Qaeda websites; “wanna-be sites” (by groups that want to be recognized as aligned); and mirror sites (groups or individuals who merely repost extremist content). Through the internet, these groups also maintain a somewhat organized command-and-control structure. Given the heavy physical stress the United States and its allies have placed on al-Qaeda in particular since 2001, some argue that al-Qaeda leadership has since devolved into “only” a media organization that now practices terrorism only when it can get its depleted ways and means together. It is a “terrorism studio” today and not much else; it no longer attempts much strategic planning and plotting, or deploys facilitators, logisticians, operators, and execution managers. Once al-Qaeda lost its physical safe havens where it hid from U.S. harassment, it established virtual safe havens. The Islamic State’s internet presence, however, is not residual and defensive in nature; it is increasingly sophisticated and effective. The Islamic State has established an internet sanctuary, perhaps learning from al-Qaeda’s experience. But it has added much more savvy operational security (OPSEC) to its communications, especially through social media. It has rejected al-Qaeda’s squeamishness about the murder of Muslims (not that al-Qaeda has not murdered a great many Muslims anyway) and made such murder the centerpiece of its online message. It seems to work for recruitment purposes; murder has become a form of performance art by which the Islamic State advances its brand. Given that al-Qaeda and the Islamic State use cyberspace to attack us in the real world, it follows that cyberspace should constitute no special sanctuary for them. Yet for all practical purposes it does. Their presence in cyberspace is more or less uncontested, enabling the internet to serve well as a “drive-thru” radicalization asset. Anyone from anywhere can read the radical ideology of al-Qaeda and the Islamic State unmolested, getting their fill of pseudo-intellectual ideology and bomb-making instructions. The internet thus serves as a kind of on-ramp for those who then travel abroad for specific training or to make personal connections. Once in theater, the clever use of social media allows the Islamic State to use temporary email accounts, Twitter accounts, and hashtag re-postings to communicate crude operational commands. The internet has become a key means for the Islamic State leadership to bring the ideological seeker and mentor together, and thus operationalize its forces via an infrastructure that the United States and its Western allies developed, financed, installed, and still maintain. It provides that sense of identity and belonging required for the disaffected and psychologically vulnerable to move to the stage of violence. In other words, the internet has become not just a jihadi mentor—a “virtual spiritual sanctioner” as it has been called—but also a virtual, globe-spanning minbar, the podium from which sermons in the mosque are delivered.1 The internet provides jihadi support groups with a source of religious justification that characterizes and is required of all jihadi cells.2 As a result, given that radicalization via online mentoring can move faster than mentoring in person, the use of the internet shortens the timeframe between the beginning of radicalization and the onset of terrorist activity.3 The internet gives ISIS a global recruiting presence and ability to keep communications secret Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ Online and OPSEC Savvy The leadership of the Islamic State uses the internet, dedicated websites, and social media such as YouTube, Twitter, and Facebook to propagate its ideology, history, impressive recruitment record, and claims of battlefield success. It can do this because there is an audience. There are almost three million Facebook members in Iraq, more than one million in Syria; 10,000 Twitter users in Iraq, 8,000 in Syria. The Islamic State has more than 50,000 Twitter followers.4 Many of these consumers knew how to read al-Qaeda online, and now have transferred over to the “strong horse”, the radical organization that now leads the pack. Through social media the Islamic State leadership proclaims to the world explicitly that it is the successor to Osama bin Laden’s legacy and is fulfilling the original goal of establishing a caliphate.5 According to the cybersecurity company Zerofox, not only has the Islamic State built an online propaganda strategy using many social media networks; it also employs experts in marketing, public relations, and visual-content production with a sophistication far surpassing al-Qaeda.6 For example, ISIS activists will use a trending hashtag as a means of infiltrating conversations by adding that hashtag to one of their unrelated tweets. They also mass-tweet using their own designated hashtags, which gets them to trend. In addition, ISIS has created its own app, an Arabic-language Twitter app called “The Dawn of Glad Tidings” (or just “Dawn”). When users sign up, they give ISIS permission to send tweets through their own personal accounts. This allows ISIS tweets to reach hundreds or thousands more accounts, giving the perception that its content is bigger and more popular than it is. The Dawn app is used as an education tool, distributing news and information about ISIS to its users. ISIS also uses networks of computers it has infiltrated (“bots”) to carry out its campaigns via remote control, rendering the individuals behind the activities unidentifiable. Because these bot armies are so widespread and continually regenerate accounts, the group is always one step ahead of governments and social media networks attempting to thwart its maneuvers. ISIS also distributes propaganda specifically designed to target a Western audience, for instance by using hashtags they know the Western world is searching for—like #worldcup2014 #fifaworldcup—for the purposes of recruitment or inciting fear. In addition to promoting information about itself, ISIS also educates its social media followers on how to access information blocked by governments and social media sites through TOR/anonymizer tutorials. Quite aside from their technical prowess, those who labor for the Islamic State also produce attractive and effective content. They produce high-quality video, which chronicles the group’s alleged historical success and records its violence, including executions, beheadings, and attacks, to intimidate opponents and the regimes it aspires to topple. It blends recent history, such as its supposed success against U.S. occupation forces in post-Ba‘athi Iraq, with historical allusions to the great apocalyptic Sunni struggles against opponents of Islam, implying to would-be recruits that now is the time to join the great, successful Islamic State struggle. ISIS workers have also reportedly created recruitment propaganda using video game formats. So much for the internet being an ineffective base of operations for offensive maneuvers. As for defense, the Islamic State leadership practices online operational security to stay anonymous and advises online readers on how to enhance their anonymity as well. It also uses temporary accounts, changes accounts periodically, and uses TOR to mask IPs, making the Islamic State’s communications largely dark, hard to track or target, and resilient. The State’s self-proclaimed leader, Abu Bakr al-Baghdadi, and his followers have proven exceptionally difficult to track because they reportedly encrypt their communications and take steps to avoid being detected by enemy surveillance. Islamic State leaders also likely use FireChat, a commercially available service that permanently deletes messages sent via the internet, making them nearly impossible to intercept.7 Finally in this regard, Islamic State operators study Western media carefully, including the history of successful Western counterterrorism operations against al-Qaeda. They do this to learn how to protect their work and their masters from similar attacks in the future. By maintaining multiple official and non-official accounts, Islamic State cyber-operators promote the ISIS brand and message, solicit funds, recruit followers, and maintain a crude organizational structure. Although such use is contrary to Twitter policy, the geometric propagation of messages via use of hashtags with links to advance perishable messages and images has allowed the Islamic State to maintain a resilient and disposable communications structure to connect with supporters even if accounts are subsequently shut down by Western or local internet service providers. Through decentralization, it has largely secured its communications from the traditional warfare techniques of jamming or interception. In a sense, it has crowd-sourced its communications. The internet is vital to ISIS command and control Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ All Islamic State web media productions fall under the umbrella of Al-Furqan Media, while another media organization associated with ISIS, Fursan Al-Balagh Media, works on video transcriptions, giving viewers the chance to both read and watch all productions.8 And whether by accident or design, Islamic State operators have created a new form of operational command and control: C2 via app. Thousands of Twitter followers have downloaded a Twitter app—the aforementioned Dawn of Glad Tidings—through which users give permission to receive Islamic State messages, images of military success, and video feeds, affording the Islamic State a Hollywood-quality feel.9 The application, flagged by Twitter as “potentially harmful”, requests user data and personal information.10 After downloading it, the app sends news and updates on ISIS operations in Syria and Iraq. Islamic State cadres include selected individuals who are expert at Adobe and video production. Each Islamic State region has its own dedicated social media accounts and supporters worldwide provide further channels through which to get its message to Western media.11 In addition to official Islamic State social media accounts, hundreds of Islamic State sympathizers use private accounts to connect to thousands of internet followers. Islamic State media products are thus tweeted and then its hashtags re-tweeted by “private” supporters, enablers, and voyeurs, using the power of social media to project an image beyond its true capability, creating what is now-known as a “Twitter storm.”12 Imagery, slogans, and would-be success stories are all crowd-sourced, allowing quality production to rise to the top through the power of social media. It is equivalent to allowing individual experts in Hollywood, Silicon Valley, and beyond to advance a positive image of America independently of any government oversight or direction. Examples of these tactics illustrate the cleverness of ISIS media operations, which have propelled the Islamic State far beyond al-Qaeda-afffiliated groups in the effectiveness of their information operations: One Islamic State supporter tweeted during the 2014 World Cup, ‘This is our ball,’ along with a photo of a decapitated head and the #WorldCup hashtag, which ensured that it would pop up on news feeds on the World Cup.13 On July 4, 2014, Abu Bakr al-Baghdadi appeared unexpectedly on social media to give a sermon that was pre-posted via Twitter (before his video was uploaded onto YouTube) to guarantee its dissemination.14 A video series named ‘Mujatweets’ shows the life of Muslims in the Islamic State and testimonials from Western militants reporting their alleged commitment to the new Islamic State.15 The ISN (Islamic State News), a new, online Islamic State publication in English, provides news, information, and inspirational stories to readers worldwide (including, of course, the Western media). Launched in May 2014, a new Islamic State media branch, Al-Hayat Media, distributes materials in several languages, including video with subtitles, as well as articles, news reports, and translated jihadi materials. Its main Twitter account is in German, but it also publishes in English and French, as well as Turkish, Dutch, Indonesian, and Russian. Al-Hayat Media’s videos and materials are also distributed via Archive.org and other free web-hosting services; they are also regularly listed on justepaste.it, a web service for sharing free user-created contents, as well as on lesser-known social media such as Quitter and diaspora.16 On July 8, 2014, The ISR (Islamic State Report), also known as “An Insight Into the Islamic State”, which contains articles on Islamic State events, first began to release its showcase online magazine, Dabiq, consisting of detailed, well-written stories in fluent English. It resembles the well-known but cruder English-language magazine, Inspire, published by al-Qaeda in the Arabian Peninsula, famous for providing bombing-making instructions (in slightly broken English) to aspiring terrorists worldwide.17 Dabiq is named after the area Halab (Aleppo) in Sham (Syria), mentioned in the hadith as the place for Malahim (“Armageddon”)—an allusion to the site of a major 16th-century battle where the Ottomans defeated their enemies and established their first caliphate.18 In short, the Islamic State’s information operations are slick, de-centralized, and resilient, designed to withstand private-sector account cancellations for violations of terms of service. They have propelled the Islamic State to the forefront of terrorist information-operations success. Today, the Islamic State, al-Qaeda, and al-Qaeda affiliates use media services to upload pleas for readers to conduct local and worldwide terrorism, manuals on how to create improvised explosive devices, invitations to join the fight in the Middle East, and claims of success and ideological purity. Someday they may also disseminate cyber weapons via the web, should they acquire or devise them. The odds they will are high unless they are stopped beforehand. 2nc – OCOs solve OCO’s are key to stop ISIS Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ The Fifth Domain of Warfare, so called by the Department of Defense, is here, like it or not. Cyber attacks can amount in their significance to armed attacks, subject to international humanitarian law and the rules of war, according to the U.S. State Department’s Legal Advisor. What is unique about this domain is the fact that Islamist extremist activity on the web takes place every day. It is a war without timeouts or truces. What is also unique about this domain is that the private sector more or less owns most of this infrastructure. The Islamic State exists in the cyber domain and specifically in social media. Unless we demand that social media companies cleanse themselves of violent extremist content, we will need to get used to the fact that our own counterterrorism cyber forces will be forced to fight in this media as well. Few of us want to go there, given the hornet’s nest of constitutional issues that will arise from it. But we may have no choice. No counter-Islamic State strategy that ignores its use of the internet and social media will succeed. No military strategy or comprehensive whole-of-government approach can really be whole without addressing the Islamic State’s use of the internet. All warfare today includes the new Fifth Domain, and the sooner we recognize its importance to our adversaries, the sooner we will begin to address the threat seriously. Interfering with the ISIS internet generates greater intelligence gathering and moderates extremism Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ There are several other secondary, but important, aspects to contesting the extremist message on the internet. Interfering with extremist websites and social media stimulates communications and useful chatter (‘hey, what’s going on?’) for intelligence collection. As suggested above, curtailing the aggregate number of extremist websites allows more moderate Muslim voices to be heard among the discussion groups and above the din of the militant ones. Contesting such websites forces extremist groups to expend valuable time, resources, infrastructure, and technical expertise to compete with these other sources. Challenging the al-Qaeda/Islamic State internet presence is not technically difficult for host nations, allies, and the United States. (We simply choose not to do so for political reasons or because of the myth that such actions would be futile.) AT: Whac-A-Mole It’s technically feasible to shut down ISIS internet – even if it devolves to Whac-AMole Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ Shutting down these resources is technically feasible for internet service providers, host nations, allies, and all those who oppose al-Qaeda’s and the Islamic State’s message of violence on the internet. The assumption among much of the media, punditry, intelligence, and defense communities that contesting al-Qaeda and the Islamic State online is somehow technically challenging is wrong. Although jihadi web administrators can pop up new sites quickly, the U.S. Department of Defense, other U.S. government, allied, and host-nation elements can just as quickly shut them down. And should the competition between al-Qaeda or the Islamic State on the one side and the United States and its allies on the other devolve into a “Whac-A-Mole” game, such a result would be overwhelmingly to our advantage, given how viewership would drop precipitously if forum members had to try to re-acquire al-Qaeda or Islamic State sites day in and day out. The vast majority of viewers and members would quickly give up. Further, it is a myth that extremist websites come back quickly, if contested. In the past, when ISPs or host countries contested some websites, many never came back at all. And those that do come back often return in a diminished manner, with far fewer members and more limited exposure. And since most militant sites merely post content from the top extremist sites, should the top sites go down the smaller sites will be starved of content (and non-militant content may enjoy greater readership). AlQaeda and the Islamic State are increasingly dependent on a coherent and clear message conveyed through the internet. If they are perceived as weak or inept at delivering that message (or can’t deliver it at all), their appeal will falter. AT: Kills internet freedom Doesn’t undermine internet freedom Van de Velde, 15 - adjunct professor at the Johns Hopkins University, Georgetown University, and the National Intelligence University (James, “Crash Their Comms” The American Interest, http://www.theamerican-interest.com/2015/06/10/crash-their-comms/ Some will cry “censorship” at the suggestion that Western governments shut down the jihadi web presence, but confronting websites that advocate violence does not undermine internet freedom. We can and do distinguish between speech that advocates violence and protected speech. Furthermore, confronting ISPs that host content that violates their own terms of use does not undermine any right or law. TSA links TSA Effective Recent revelations ensure TSA security is effective- high spending and increased surveillance SCHOLTES 7/15— Transportation Reporter. (Jennifer, “TSA's response to criticism: Longer airport lines,” Politico, 7/15/15, http://www.politico.com/story/2015/07/longer-airport-lines-likely-as-tsa-triesto-plug-security-holes-120117.html). WM The Transportation Security Administration has a new strategy for improving its woeful performance in catching airport security threats — and it will likely mean longer lines and more government bucks . A month after the TSA was embarrassed by its almost-total failure in a covert security audit, Homeland Security Secretary Jeh Johnson has ordered the agency to pursue an improvement plan that will require more hand-wanding of passengers, more use of bomb-sniffing dogs and more random testing of luggage and travelers for traces of explosives. It will also consider reducing travelers’ chances of being sent through the expedited PreCheck lines at airports. Increased reliance on PreCheck is just one strategy TSA has used to become slimmer and swifter in the past few years, drawing buckets of praise from a Congress that’s otherwise largely criticized the agency. It has also relied more on technology like body-scanners and analyses of specific travelers’ risks while leaning less on labor-intensive methods like pat-downs, allowing the TSA to save manpower costs and shrink its workforce. But then came the leak of a still-classified inspector general report in June, which found that TSA agents had failed to find fake explosives and weapons 67 out of 70 times during covert testing — and that the screening technology often just doesn’t work. The 96-percent failure rate drew sharp rebukes from Capitol Hill, led to the immediate ouster of then-acting Administrator Melvin Carraway and caused much shuttle diplomacy between lawmakers and the agency’s top brass. Now the response threatens to gum up airport checkpoints. “In light of the 96 percent failure, they’re probably going to slow things down,” House Homeland Security Chairman Mike McCaul (R-Texas) acknowledged in an interview. He added that “the technology failure was a big part of the problem” and that the DHS inspector general pointed to the agency’s policy of funneling travelers from regular security lines through the less-intensive PreCheck queues as one of the “big weaknesses.” Kevin Mitchell, chairman of the Business Travel Coalition, agreed that air passengers will probably feel the impact of the latest changes. “Things are going to slow down, and consumers are going to get increasingly frustrated,” he said. Johnson said this month that he had ordered TSA to start doing more manual screening, such as using handheld metal detectors and doing more random tests for trace explosives, and to take a second look at the agency’s policy of selectively diverting non-vetted travelers into the PreCheck lanes. “Some of those things he’s talking about are going to slow the lines down,” the House Homeland Security Committee’s ranking Democrat, Rep. Bennie Thompson of Mississippi, told POLITICO. “So the question is: What’s this going to do to throughput?” While Thompson says he supports adding more manual screening and being more selective about which travelers get expedited treatment, he’s concerned about how this shift reflects on all the work the agency has done to move away from slower procedures. “If walking back allows us to identify more vulnerabilities, then that’s good. But what does that say for all the tens of millions of dollars that we’ve spent on technology that was supposed to move us forward?” Thompson said. “It’s clear that our technology that’s being deployed — either because of the machines or the operators — failed us.” Johnson also said this month that he has directed the TSA to rethink performance standards for the screening equipment implicated in the inspector general’s report. He noted that the CEO of the company that manufactures the machines has said he will help make the technology more effective. Although Johnson didn’t directly pin the blame on the scanning machines, McCaul and Rep. Kathleen Rice (D-N.Y.) say the IG’s report noted that the body imaging technology has an unacceptable failure rate and that the manufacturer guarantees threat detection accuracy at well under 100 percent. Because the report is still classified, the agency hasn’t disclosed exactly which types of equipment were involved or how they failed. But McCaul and Rice identified them as the millimeter-wave body scanners, made by L-3 Communications Corp., that force passengers to pose inside a booth with their arms raised. The machines are supposed to find both “metallic and nonmetallic” objects hidden under passengers’ clothing, including guns and explosives, and “can detect a wide range of threats to transportation security in a matter of seconds,” TSA boasts on its website. McCaul said his panel is looking into how much of the failure rate can be attributed to technology issues versus human error. He plans a hearing on the issue this month with testimony from new TSA Administrator Peter Neffenger, who assumed his post July 6 after being confirmed by the Senate. The current plan, McCaul said, is for DHS to update the imaging machines’ software. “Jeh Johnson’s a smart guy,” the chairman said. “He and I talk a lot. And he knows that updating that software is probably going to reduce the failure rate.” What’s less clear is how the department is going to handle vulnerabilities in its PreCheck program, which allows travelers to pass through security checkpoints with their shoes and belts on, and without removing laptops and liquids from bags. The main problem, many lawmakers say, is TSA’s “managed inclusion” policy of giving that special treatment to travelers who haven’t gone through the program’s vetting process. To enroll in PreCheck, passengers must provide fingerprints, undergo a background check and pay an $85 fee. One purpose of steering non-enrolled passengers into the PreCheck lanes has been to give travelers a taste of what life could be like if they signed up for the expedited screening program, said David Inserra, a homeland security policy analyst at the Heritage Foundation. It also makes more efficient use of TSA’s screeners when the speedier lines are drastically shorter than the regular queues. “You’ve got these people working these lines, and sometimes they’re going to be doing nothing, or we can use them for something,” Inserra said. “But that’s not really a good security mindset. That’s really an efficiency mindset.” Patricia Rojas Ungár, vice president of government relations at the U.S. Travel Association, says the “managed inclusion” program “really has run its course.” Now, she said, it’s important for TSA “to double down in getting people enrolled in the actual program.” The agency’s standard security policies were born of credible threats and real terrorism plots, such as Richard Reid’s attempt to detonate explosives packed in his shoes on a flight from Paris to Miami just three months after the Sept. 11, 2001, terrorist attacks. Lawmakers first started to challenge the “managed inclusion” policy after learning this spring that TSA screeners had allowed a known former domestic terrorist through a PreCheck line last year. And the issue has only gotten more attention since the IG’s report was leaked. “The inspector general highlighted that one of the big weaknesses was managed inclusion,” said McCaul, whose committee approved a bill last month that would bar the agency from allowing most non-vetted travelers into PreCheck lines. “Do we want to be kicking in people who may be a threat? I don’t know. Obviously we’re not going to target the grandmother and the baby. … It has to be risk-based, but with security in mind, because the terrorists — unfortunately — they still want to blow up airplanes.” In his 10-point plan for the TSA, Johnson has also directed the agency to reassess whether it should allow non-vetted travelers into PreCheck. But Thompson, who wrote the bill that would prohibit the policy, says there’s no doubt the practice is weakening security and should already be changed. “If you know a system you have deployed creates a vulnerability, you fix it,” Thompson said. “If throughput is one of the objectives, it should not be the sole objective.” Homeland Security officials often reiterate that individual aspects of physical security screening, or even the whole checkpoint process, are only layers of a vast aviation security system that includes behavior detection officers, bomb-sniffing canine teams, federal air marshals and reinforced cockpit doors. And it’s the strength of those layers in combination that will ultimately thwart terrorist attacks, says Senate Homeland Security and Governmental Affairs Chairman Ron Johnson (R-Wis.). The Senate chairman said he views the new steps the TSA is taking as “kind of Band-Aids” to try to provide some interim security improvements while Congress and the department consider bigger changes, such as expanding the role of air marshals to give them more law enforcement and investigative power. “We’re obviously far from 100 percent secure. I mean, far from 100 percent secure. So we really need to look at a layered approach, think outside the box,” he told POLITICO. “There’s so many different facets of this problem that we need to look at, but I think security’s got to be multi-layered — some visible, some invisible.” The TSA “Playbook” Strategy is backed up by decades of crime prevention practices Lum et. Al. 11— Ph.D., Criminology and Criminal Justice, (Cynthia Lum; Charlotte Gill, Ph.D. in Criminology; Breanne Cave Ph.D. Criminology, Law, and Society; Julie Hibdon, Ph.D., Criminology, Law and Society; David Weisburd, Ph.D, Criminality, Law, and Society; “Translational Criminology: Using Existing Evidence for Assessing TSA’s Comprehensive Security Strategy at Airports,” Evidence-Based Counterterrorism Policy, 19 Aug 2011, Springer: http://link.springer.com/chapter/10.1007/978-1-4614-0953-3_10). WM Conclusion This chapter describes the fi rst systematic, evidence-based review and assessment of TSA’s Playbook strategy to prevent and deter crime and terrorist activity at our nation’s airports using a translational criminological approach. As we have seen, there are very few evaluations of counterterrorism measures or airport security compared to other law enforcement sectors. Given the massive amount of money spent on such measures since 9/11, evaluation of the effi ciency and outcome effectiveness of such measures is imperative. However, many of the crime-prevention measures at airports mirror a broader criminological literature on situational crime-prevention, deterrence, and interagency cooperation. Here, we have used these parallels in our preliminary assessment and evaluation of the TSA Playbook. In classifying the Playbook using an “Airport Security Matrix,” we found that most plays are immediate and tactical in nature, and few are strategic. Further, the vast majority of plays do not require cooperative deployment. Thus, much of our analysis focuses on immediate and tactical plays that are primarily carried out by TSA personnel. For these plays, we discovered four general tendencies. The first is that these plays more often involve mechanisms of prevention that aim to harden targets, deter and prevent offenders by increasing their perceived effort, rather than increase guardianship, or reduce vulnerabilities of passengers or other targets. Second, most of these plays focus on the public and employee screening areas; there is defi nitely a focus in the Playbook on employees rather than passengers. Third, plays occurring in public areas outside or directly inside of the airport entrance tend to be guardianshiporiented rather than specifi cally focused on deterring offenders. Finally,n the Playbook tends to focus on reducing passenger and target vulnerability largely at the fi nal “layer of security” located at gates and airplanes. When we examined the immediate/tactical plays within each of the sub-books, we found additional concentrations of plays in both mechanism type and location of play. For instance, FSD plays primarily occur in screening and secure areas (both passenger and employee) and mainly involve approaches designed to increase offender efforts. HQ plays are also designed to deter offenders, but unlike the FSD plays, they are typically designed for public areas. The HQ Playbook also contains a signifi cant majority of the plays that require cooperation between TSA and other non-TSA agencies. NR plays typically occur at secure passenger areas and gate locations and tend to use increased guardianship as their main mechanism of prevention. A small minority of the plays was strategic in nature, and most focus on longterm management activities that incorporate the use of general watchfulness and increased guardianship. It is expectedly in the strategic plays where requirements for cooperation are found. When comparing more general descriptions of plays at intersecting Matrix dimensions, we found that the Playbook generally and loosely incorporates many evidence-based practices for prevention and deterrence, although this evidence base varies across studies by design rigor as well as applicability to airport security and counterterrorism. Of course, how and which plays are implemented at any given time ultimately tempers the Playbook’s effectiveness. The majority of plays within the Playbook use situational crime-prevention mechanisms (e.g., blocking offender access and target hardening), which have been supported in other crime-prevention evaluations . Additionally, studies confirm and support the use of tailored, placespecifi c interventions for crime prevention and deterrence. The Playbook illustrates some compliance with this evidence-based mechanism through the location focus of many of the plays. However, how places are chosen for play implementation is not clear. More importantly, exactly how such studies translate to the context of terroristic violence within a confi ned location (airports) is still unknown. With regard to the notion of randomization as a deterrence mechanism, the research indicates that randomly allocating patrol at selected high-risk places can increase crime-prevention effects. However, whether the locations in which the plays are implemented are indeed the highest-risk locations in the airport is unknown. Further, although the Playbook has a built-in randomization component with regard to selection of the set of plays used at any particular time, this element of the Playbook may be manipulated in such a way that reduces randomization. However, whether this is a negative or positive change with regards to increasing security is also unknown in the absence of evaluation. Reducing random deployment of plays may not be problematic depending on whether such randomization increases or decreases deterrence. This is not clearly understood in criminological research and is not researched at all in counterterrorism studies. Further, although there is research supporting some of the prevention mechanisms that are found in both situational crime-prevention measures and airport security (which itself needs to be more closely scrutinized for comparison), there are some types of airport security measures for which we could not easily identify parallel evidence in the crime-prevention literature. Ultimately, the determination of effectiveness must be supported by evaluations, through experimentation and simulation, of the actual interventions within airports. Finally, we think the Playbook, which uses plays that involve interagency cooperation, can actually serve as a means of facilitating and fostering working relationships between the TSA and other agencies that operate in and around the airport. It might be worthwhile to explore how these interagency relationships and efforts could benefi t from involvement in additional plays beyond public airport areas and areas external to the airport. The Playbook attempts a broad range of prevention and deterrence tactics across multiple contexts. Understanding the prospects and challenges of implementing such a strategy and identifying ways in which measures of success might be derived are imperative in accurately judging this method of airport security TSA behavioral monitoring solves- Israeli Airline empirics prove Adams, NORDHAUS and SHELLENBERGE 11— leading global thinkers on energy, environment, climate, human development, and politics. All work for the Breakthrough Institute. Norhaus is chairman, Shellenberg is cofounder (NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGE, “COUNTERTERRORISM SINCE 9/11 Evaluating the Efficacy of Controversial Tactics,” THE SCIENCE OF SECURITY- a project of the Breakthrough Institute, SPRING 2011, http://thebreakthrough.org/images/pdfs/CCT_Report_revised-3-31-11a.pdf). WM The TSA also employs behavioral profiling, whereby agents seek to discover passenger nervousness, irritability, or other suspicious signs that might indicate their intentions to commit terrorism. The methods are reputed to be highly effective in Israel , where the national airline, El Al, despite receiving almost daily terror threats, has not experienced a major attack in over three decades. TSA’s use of behavioral profiling is much less intensive than El Al’s. The latter approach submits every passenger to a battery of open-ended questions and psychological evaluations. By contrast, TSA’s Screening Passengers by Observation Techniques (SPOT) program only closely questions the rare passengers that agents deem suspicious. In practice, probably owing to the human tendency to interpret the behaviors of poorly understood out-group members as 'exotic' (Tajfel 1982), TSA agents, according to multiple anecdotal accounts, have been prone to apply greater scrutiny to Muslim, Arab, Sikh, and SouthAsian air passengers TSA Screening methods effectively combat terrorism Adams, NORDHAUS and SHELLENBERGE 11— leading global thinkers on energy, environment, climate, human development, and politics. All work for the Breakthrough Institute. Norhaus is chairman, Shellenberg is cofounder (NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGE, “COUNTERTERRORISM SINCE 9/11 Evaluating the Efficacy of Controversial Tactics,” THE SCIENCE OF SECURITY- a project of the Breakthrough Institute, SPRING 2011, http://thebreakthrough.org/images/pdfs/CCT_Report_revised-3-31-11a.pdf). WM MORE UNIVERSAL SCREENING METHODS SHOULD BE IMPLEMENTED IN AIRPORTS, GIVEN THEIR EFFECTIVENESS SINCE 9/11 IN PREVENTING ATTACKS. Given that terrorist groups have avoided heightened airport screening by recruiting new members who do not fit CAPPS (or ‘Secure Flight’) profiles, DHS and the TSA need to universally apply the highest available levels of screening to all passengers. Universal screening for liquids and metal have already made it more difficult for terrorists to either bring, or effectively detonate, bombs on planes , as the botched bombing attempts of the shoe bomber and the Christmas Day bomber demonstrate. Minimally invasive full body scanners can pose an even more effective barrier. TSA should install these scanners as quickly as possible and also consider greater implementation of randomized and unseen screening methods – which cannot be reverse-engineered by terrorists – if they continue to distinguish passengers for secondary screening The TSA has 20 checks against terrorism, making threats very unlikely Dillon and Thomas 15— Ph.D., Professor of Computer Information Systems, and Professorship of Business Administration, both at James Madison University (Thomas W. Dillon, Daphyne S. Thomas, “Exploring the acceptance of body searches, body scans and TSA trust,” Journal of Transportation Security, May 2015, Springer: http://link.springer.com/article/10.1007/s12198-0150157-7). WM In response to this heightened level of concern, the Transportation Security Administration (TSA) has established a system of “20 Layers of Security.” Strengthening security through a layered approach is designed to provide defense-in-depth protection of the traveling public and the United States transportation system. Of these 20 layers, 14 are pre-boarding security designed to deter and apprehend terrorists prior to boarding aircraft (Stewart and Mueller 2008). Both pat-down body searches and full-body scanning fall under “pre-screening” measures found within the Pre-Boarding Security category. There are important issues surrounding the need for a better and more effective screening process, and a higher level of acceptance by flyer. These include designing more agile screening operations, balancing technology and human approaches to security, and focusing the appropriate levels of security resource on both stopping terrorist and meeting privacy concerns (Jacobson et al. 2009). TSA machinery deters terrorists Frimpong 11— PhD in public affairs (Agyemang, “Introduction of full body image scanners at the airports: a delicate balance of protecting privacy and ensuring national security,” Texas Southern University, Houston, TX, USA, 1 April 2011, Springer: http://link.springer.com/article/10.1007/s12198011-0068-1/fulltext.html). WM There has been a challenge for governments around the world balancing the security of aviation travel while protecting civil liberties and privacy of the people. In America any form of encroachment on civil liberties and personal privacy is highly resisted no matter where it comes from. The introduction of the new full body image scanners at some of the nation’s airports have stoked high passions from private citizens alleging that TSA officials would be spying on their naked bodies. The federal government counteracts these complaints by saying that the new machines could go a long way to deter potential terrorists from sneaking contrabands and weapons through the old security system. So far scholars and experts have not been able to come up with a possible solution as to how to avoid invasion of privacy while ensuring security of air travel. Airplane security is effective- Multiple checks and deterrence Abend 15— captain for a major airline and aviation analyst(Les, “Pilot: Is TSA security a complete failure?,” CNN, June 4, 2015, http://www.cnn.com/2015/06/03/opinions/abend-tsa-screening-failure/). WM The process we all have come to know and love involves technology like magnetometers and full body scanners. But while it seems that the process starts with the smashing of your roller bag onto the security belt, trained personnel are observing behaviors. Profiling is politically incorrect, but all aspects of passenger dress and demeanor are considered part of threat assessment. If a nervous twentysomething male is wearing a winter coat in Miami rather than carrying it, an alert TSA agent will most likely apply extra scrutiny. During boarding, flight attendants perform their own screening . Over my 31 years with the airline, I have found no better people watchers than flight attendants. Passengers are their captive audience. All flight attendants are trained in defensive tactics , too, with the ability to use creative resources you could never imagine. And finally, the buck stops in the cockpit . Pilots are also trained in defensive tactics. In some cases, an unknowing terrorist who breaks into the flight deck may find himself facing the business end of a very loud and lethal semiautomatic weapon. So what's up with the Grandma screening or the child-in-the-stroller wanding? A lot of security procedures involve deterrent logic. In other words, an individual with nefarious intentions might conclude that his evil plot carries a high risk of detection, especially if everyone is a suspect. And don't underestimate the evil sickness of terrorists. It is indeed possible that Grandma or a toddler could be used to transport something threatening. Another aspect of deterrence is randomness: not maintaining a routine during the security process, or not having the same routine at every airport. That said, my experiences at various airports around the world make me question the rationale behind procedures. At one very civilized and busy international destination, crew members are corralled through specifically designated screening areas away from passenger traffic. Almost every other crew member sets off the magnetometer alarm and then receives a thorough wanding and pat-down. In other countries, it's the opposite -- screeners are just going through the motions. Although crew members pass through the same magnetometers as passengers, everyone appears to receive the same indifferent treatment, uniform or not. Terrorism may be increasing but the TSA has accounted for it Herridge 14— award-winning Chief Intelligence correspondent (Catherine Herridge, “TSA head: Threat from terrorism worse now but US better able to combat it,” Fox News, December 17, 2014, http://www.foxnews.com/politics/2014/12/17/tsa-head-threat-from-terrorism-worse-now-but-usbetter-able-to-combat-it/). WM The outgoing and longest-serving head of the Transportation Security Administration says the threat from terrorism is worse now than when he took the job four years ago, but the U.S. is better positioned to combat foreign plots. "The threat today is unfortunately more expansive than what it was four-and-a-half years ago," John Pistole told Fox News during an interview before he leaves at the end of the month, concluding 31 years of government service -- including 27 at the FBI, where he rose to the rank of deputy director. "With that being said, we also have better insights into who the potential bombers are," he added. From Pistole’s unique position at the TSA and FBI, he watched Al Qaeda's strategy evolve from the 9/11 attacks that murdered nearly 3,000 Americans, to the failed underwear bomb plot to bring down a jet on Christmas Day 2009 and the non-metallic explosive devices buried in cargo a year later. Although Al Qaeda experimented in 2012 with surgically implanted bombs before apparently abandoning the idea as impractical, Pistole suggested they are now focused on devices held close or strapped to the body. "That is one of things that concerns us, how well do they design, construct and then conceal," he said. Pistole will become president of his alma mater, Anderson University in Anderson, Ind., this spring. Fox News asked Pistole whether the threat to American aviation had diminished since August, when the U.S. launched a bombing campaign against ISIS in Syria and Iraq, and the Al Qaeda-led "Khorasan" group. Khorasan contains long-time associates of Usama bin Laden, including Sanafi al-Nasr and Muhsin al-Fadhli, as well as a handful of operatives trained by the Yemeni bomb maker Ibrahim al-Asiri, who specializes in non-metallic bombs that traditional airport screening can miss. "Without going into details about what that may look like from a classified intelligence perspective, we do remain concerned that there is active plotting going on," Pistole said. And with new information that the French bomb maker David Drugeon likely survived a U.S. air strike last month, Pistole added, "there is concern that there are still individuals out there who have not only the ability to do that, but also the intent to use that on a flight to Europe or the US." The TSA administrator also described classified procedures that track foreign fighters, based on their travel history, before they check in at overseas airports for U.S.-bound flights. "There are individuals we are concerned about and we are again looking at if they make travel reservations, then they of course receive proper scrutiny," Pistole said. Empirics and other countries prove the TSA is the best option Maxa 7/14— travel expert(Rudy, host and executive producer of “Rudy Maxa’s World,” the Emmy Award-winning, travel series, “Travel Minute — A Word In Defense of the TSA,” Rudy Maxa’s World, JUL 14TH, 2015, http://rudymaxa.com/2015/07/travel-minute-a-word-in-defense-of-the-tsa/). WM I and others often take the TSA to task for sloppy work, rudeness, or plain, old lack of common sense. I thought it might be nice to note that since 9/11, not a single US airline has been a victim of terrorism . Oh, folks have tried. Remember the failed effort of the so-called “Christmas underwear bomber” who tried to blow up a Northwest Airline flight from Amsterdam to Detroit in 2009? And let us keep in mind that terrorism targeting airliners is older than most know. Way back in 1933, a bomb blew up a United Airlines Boeing 247—a Chicago gangland murder was suspected–but the case was never solved. The first in-flight bombing of a jet liner was in 1962 when a Continental Airlines flight was blown up over Iowa while flying from Chicago to Kansas City, MO. An investigation determined a passenger had brought a bomb aboard in order to commit suicide as part of an insurance fraud scheme. And while Islamist terrorists have attacked Russian aircrafts—two in 2004—and a Chinese carrier was brought down in 2002 in another insurance scam, US carriers have been blessedly free of a successful terrorist action in the last 14 years. I don’t know that the TSA can take full credit, but I am certain that security curtain has caused some terrorists to re-think strategies. Airline attacks coming Security expert indicates airline attack coming now Page 15— Washington Bureau chief of USA TODAY (Susan, “CIA veteran Morell: ISIS' next test could be a 9/11-style attack,” USA Today, May 11, 2015, http://www.usatoday.com/story/news/politics/2015/05/10/michael-morell-cia-the-greatwar/27063655/). WM WASHINGTON – The Islamic State simply inspired the deadly assault by two men on an exhibit of cartoons depicting the prophet Mohammed near Dallas last week, CIA veteran Michael Morell says. But it's only a matter of time before the jihadist group is likely to be in a position to direct more elaborate attacks on American soil that could result in mass casualties. "If we don't get ISIS under control, we're going to see that kind of attack," the kind of attack al-Qaeda launched on 9/11 , Morell told USA TODAY. So far, U.S. efforts haven't been effective in countering the Islamic State's success in recruiting hundreds of American converts, he says, "and we're not effective at it because it's very hard to do." Morell was by President George W. Bush's side at a Florida elementary school in 2001 when the president was told hijacked airliners had crashed into the World Trade Center, and he was in the White House Situation Room with President Obama nearly a decade later when the first word was relayed that Navy Seal Team Six had killed Osama bin Laden. After 33 years in the CIA, including two stints as acting director, Morell has written an account of his experiences, published Tuesday by Twelve, titled The Great War of Our Time: The CIA's Fight Against Terrorism From Al Qa'ida to ISIS. His central point: This "great war," which already has tested the nation's national security and its politics, is likely to stretch for decades more. "For as far as I can see," he says. Just last Friday, the threat level at U.S. military bases was raised to the highest level since the 10th anniversary of 9/11, in part because of concern about the Texas attack that left the two assailants dead. "We're very definitely in a new phase in the global terrorist threat," Homeland Security Secretary Jeh Johnson warned Sunday on ABC's This Week. On Fox News Sunday, House Homeland Security Chairman Mike McCaul, R-Texas, said the groups' sophisticated use of the Internet means that "really, terrorism has gone viral." "It was a mistake to think that al-Qaeda died along with bin Laden in Abbottabad," Morell says, an assumption made by some relieved Americans that he says wasn't shared by intelligence agencies. While al-Qaeda's leadership in Afghanistan and Pakistan has been decimated, other branches of the group have thrived, including alQaeda in the Arabian Peninsula, based in Yemen. " They today have the ability to bring down an airliner in the United States ," Morell says. "If that happened tomorrow, I would not be surprised." ISIS will attempt 9/11 style attacks soon- masterminds currently on their side and experts see the most dangerous combination of events Kaplan 14—political reporter (Rebecca, “Will ISIS plan a 9/11-style terror plot against the U.S.?,” CBS News, June 16, 2014, http://www.cbsnews.com/news/will-isis-plan-a-911-style-terror-plot-against-theu-s/). WM Republicans are sounding the warning that the next 9/11-like terror plot could emerge from the regions of Iraq and Syria that are currently dominated by an extremist group bearing down on Baghdad. As the Islamic State of Iraq and Syria (ISIS) - which has already captured the cities of Tikrit and Mosul and is threatening to take the capital city as well - grows in strength and numbers, will it pose an immediate threat to the United States homeland as well? Experts say the group's increasing power and reach is concerning, though it's not entirely clear when they might be able to threaten the U.S. "You've got motivation mixed with opportunity, ideology and foreign fighters and all of that looks like a very extreme version of Afghanistan in the '90s, plus what was happening in Iraq after the Iraq war," said CBS News National Security Analyst Juan Zarate. "This is a cauldron of future terrorist threats to the west." The bigger danger, Zarate said, is that the U.S. does not yet know exactly what the group will look like once it evolves. While ISIS might not launch an attack on U.S. soil tomorrow, he said, "I think the grave threat here is that you have the seeds of a new terrorist movement emerging very aggressively." Sen. Lindsey Graham, R-S.C., said on CBS' "Face the Nation" Sunday that U.S. officials have warned the next major attack on U.S. soil could emanate from the region. " The seeds of 9/11s are being planted all over Iraq and Syria," Graham said. "They want an Islamic caliphate that runs through Syria and Iraq...and they plan to drive us out of the Mideast by attacking us here at home ." Graham's concerns were echoed on ABC's "This Week" by Ret. Gen. Peter Chiarelli, who said that "all Americans should be concerned" by ISIS' quick rise and success in Iraq. And on "Fox News Sunday," House Intelligence Committee Chairman Mike Rogers, R-Mich., said, "I guarantee you: this is a problem that we will have to face and we're either going to face it in New York City or we're going to face it here." "These are not monkey bar terrorists out in the desert somewhere planning some very low-level attack. These are sophisticated, command and controlled, seasoned combat veterans who understand the value of terrorism operations external to the region, meaning Europe and the United States. That is about as dangerous a recipe as you can put together," he said. There have been some indications this might be the group's intent. Army Col. Kenneth King, who was the commanding officer of a U.S. detention camp in Iraq, told the Daily Beast recently that when current ISIS head Abu Bakr al-Baghdadi was released in 2009, he said, "I'll see you guys in New York." But Michael Morell, the former acting CIA director and a CBS News analyst on intelligence, national security and counterterrorism issues, predicted it's at least a year before ISIS might pose more of a serious threat to the U.S. The current major threats to the homeland still come from al Qaeda groups in Pakistan and Yemen, he said. But, Morell added, if it looks like the U.S. influence in Iraq is increasing once again, the threat from ISIS could also rise. "That's one of the downsides of U.S. involvement," he told CBS News. "The more we visibly get involved in helping the [Iraqi Prime Minister Nouri al-Maliki] government fight these guys, the more we become a target." Terrorists ultimate targets are airlines- first strike and experience Flintoff 12— (Corey, “Why Do Terrorists So Often Go For Planes?,” NPR, MAY 15, 2012, http://www.npr.org/2012/05/15/152750767/why-do-terrorists-so-often-go-for-planes). WM Ever since the Sept. 11 attacks, airports have probably been the most heavily guarded sites when it comes to preventing terrorist attacks. And yet the most recent terrorism plot in Yemen involved an attempt to blow up a U.S. airliner with a bomber wearing a difficult-to-detect explosive bomb in his underwear, according to U.S. officials. Why do terrorist groups keep trying to defeat the multiple layers of security at airports when there are so many soft targets? For one, a plane heading into the U.S. represents the first available target to strike against a large number of Americans. It doesn't require reaching the U.S. first, and then acquiring a weapon and launching an attack from U.S. soil. Also, terrorist groups have learned from previous attacks on planes. "Terrorists like to do what they know how to do," says terrorism analyst Jessica Stern. But the difficulty of breaching airport security does appear to be generating other approaches. Two Different Types Of Plots Stern says she sees two trends. One involves developing new and more sophisticated techniques for evading security measures and attacking airplanes. The other involves "looking for low-tech ways to attack softer targets," she says. This is a way of encouraging "leaderless resistance," says Stern, the author of Terror in the Name of God. For example, the latest issue of Inspire, the jihadi magazine produced by the Yemen-based group alQaida in the Arabian Peninsula, includes an eight-page feature that encourages readers to start wildfires in Australia and the United States. It recommends that would-be saboteurs in the U.S. study weather patterns in order to determine when vegetation will be dry and winds favorable for a wildfire. It specifically suggests Montana as a good site for practicing pyro-terrorism, because of the residential housing that is in wooded areas. Stern says the aim of terrorism is to frighten the public and push governments into over-reacting — so spectacular, random-seeming attacks like airplane bombings work well. "Terrorists do really aim for what we call symbolic targets," she says. "Terrorism is a form of theater, so they're going to hit targets that will make us maximally afraid, and inflict the maximum amount of humiliation." The structure and goals of terrorism make airplanes the best and only target Kydd and Walter 10— associate professor of political science at the University of Wisconsin and professor of political science at UC San Diego's Graduate School of International Relations and Pacific Studies (Andrew H. and Barbara F., “By focusing on planes, terrorists take a calculated risk,” Los Angeles Times, January 24, 2010, http://articles.latimes.com/2010/jan/24/opinion/la-oe-walter24-2010jan24). WM Targeting civilian aircraft still makes sense, from the terrorists' point of view, for at least five reasons. First, nature is working with them. People don't naturally fly 30,000 feet above the ground at 300 mph; it takes a very special machine. These machines are much more vulnerable than trains or ships. One person can easily carry enough explosives to blow a hole in the side of a pressurized aircraft, which may be enough to bring it down and kill everyone aboard. The same explosive on a train or ship would likely only cause minor damage. Second, the costs of reduced air travel, or slower air travel, are borne by business travelers and those with money -- exactly those people who are most likely to influence policymakers and government decisions. Terrorists aren't attacking for the fun of it; they want to have an impact on government policy, and the way to do that is to target those who have clout. Third, it is difficult for these travelers to switch to another mode of transportation, given the distances involved. Much as the folks at Cunard might wish otherwise, almost no amount of terrorism is going to persuade most people to take a passenger ship across the Atlantic for seven days rather than fly in seven hours. This means that demand for air travel is inelastic; travelers have little option but to bear the costs of increasing security, lost time and risks. Fourth, people are already afraid of flying. Despite statistics showing that flying is safer than driving, people are still more afraid of hurtling through the air in a large aluminum tube than sliding behind the wheel for a trip to the grocery store. It's easy to play on these fears, even with incompetent attacks that fail. Finally, our political system is structured to overreact to attacks on aircraft and to underreact to other kinds of attacks, particularly shooting sprees. In reaction to the "shoe bomber," we now all take off our shoes at security checkpoints. Because of the "underwear bomber," we now may be subject to thorough body scans before boarding a flight. The 2006 plot to blow up seven transatlantic flights out of London cursed us with the inability to bring a bottle of water on board. Security agencies feel duty-bound to do something, and politicians wring their hands about whether they are doing enough. In comparison, there appears to be no limit to the number of fatalities that can be inflicted by automatic weapons fire in the United States without generating a political reaction. Politicians limit themselves to expressions of sorrow for the victims and the families, and then the matter is quietly dropped. One might think this provides an opportunity for Al Qaeda to easily kill large numbers of Americans, but that misses the point of terrorism. Killing large numbers in a way that is quickly forgotten is much less useful than killing a few or even none in a way that causes profound ripples of fear and costly overreactions on the part of the target group. Al Qaeda has no need to organize gun rampages against Americans if the occasional low-budget aircraft attack does the trick. 9/11 style attacks lead to war The psychology of 9/11 attacks makes a public overreact and leads to war Gander 15— (KASHMIRA GANDER, “US overreacted to 9/11 attacks says terror expert and next vicechancellor of the University of Oxford, Louise Richardson,” The Independent, 03 June 2015, http://www.independent.co.uk/news/world/politics/us-overreacted-over-911-says-terror-expert-andnext-vicechancellor-of-the-university-of-oxford-louise-richardson-10295014.html). WM The United States overreacted to the 9/11 attacks on the Twin Towers, according to the incoming vice–chancellor of the University of Oxford. The panic that ensued following the September 11 attacks played a part in the US launching the socalled War on Terror. Louise Richardson, an expert in terrorism, said the US’ response was a symptom of the fact that such attacks are a “new experience” for the country. Speaking at a higher education conference in London, the principal of the University of St Andrews went on to argue that the UK is more resilient when it comes to terrorist attacks, due to the troubles in Northern Ireland. Exploring the psychological impact of terrorism, she went on to argue that random attacks have such an impact on the public because “if nobody is chosen, nobody is safe”, the Daily Mail reported. Professor Richardson went on to tell the audience, according to The Times: “Central to any terrorism campaign should be a resilient population and, I have to say, the British population in the course of the Troubles and violence in Northern Ireland proved really quite resilient. “Far more so than the United States. And the scale of the reaction - I would say over-reaction - in the United States to the 9/11 atrocity was reflective of the fact that it was such a new experience for the United States," she added. An internationally respected scholar and author of the study 'What Terrorist Want: Understanding the Enemy Containing the Threat', Professor Richardson often advises policy makers on the topics of terrorism and security. Professor Richardson will become Oxford’s first female vicechancellor when she adopts the position in January, after she was put forward by a nominating committee led by Oxford’s chancellor, Lord Patten of Barnes. 9/11 attacks eliminate party lines and make the population permit, an even support, invasions Fournier 14— Senior Political Columnist at NJ (Ron, “Would We Rally Behind Obama After the Next 9/11?,” National Journal, August 11, 2014, http://www.nationaljournal.com/white-house/would-werally-behind-obama-after-the-next-9-11-20140811). WM But I can't shake another, darker, question. What if we get hit again with a 9/11-sized attack? More to the point, hypothetically, would a crisis pull us together or drive us apart? It's a morbid question worth asking before the worst happens, because there's reason to worry about the durability of what Lincoln called "the better angels of our nature." What can we learn from the Bush era? Well, th e nation immediately rallied behind the fledgling president (Bush had been in office only about seven months). Members of Congress famously locked arms on the East Front steps of the Capitol and sang "God Bless America ." Bush's approval ratings soared to 90 percent, as he ordered U.S. troops into Afghanistan to defeat the Taliban and hunt for Osama bin Laden. Symbolic 9/11 style attacks reinforce the war on terror mindset that we need to invade any country that harbors terrorists, making interventions inevitable Giannella 12– University of Kent, Political Strategy and Communication (Margherita, “US: did 9/11 attacks provide a moral and legal justification to enter the war against Afghanistan?,” Acadmia, 2012, http://www.academia.edu/2626532/US_did_9_11_attacks_provide_a_moral_and_legal_justification_to _enter_the_war_against_Afghanistan). WM INTRODUCTION The morning of 11 th September 2001, the American soil was subjected to a series of air attacks destined to remain stamped in world people’s memory. Four planes were hijacked to strike the economic and military nerve centers. The first two, American Airlines Flight 11 and United Airlines Flight 175, crashed into the Twin Towers of the World Trade Center complex in New York City; the third one, American Airlines Flight 77, into the Pentagon in Washington D.C. while the last one, United Airlines Flight 93, missed the expected target falling into Pennsylvania. Nearly 3 thousand people died in the attacks. The official governmental version ascribed the attacks to 19 terrorists. In fact, in the first presidential speech released to the Nation on the evening of 9/11, Bush did not clarify who were responsible for the attacks since he mostly centred his speech on the bravery and altruism of 4 American citizens and on the government solidity and strength. Only 9 days after, President Bush, by addressing to a Joint Session of Congress and the American people, would link the 19 hijackers to Al Qaeda and in particular to its leader, Osama bin Laden. Thus, he condemned the Taliban regime accused of sponsoring shelter and supply to terrorists. However, Bush said “ Our war on terror begins with al Qaeda , but it does not end there . It will not end until every terrorist group of global reach has been found, stopped and defeated” . So the logic apparently relies on the assumption that the US could destroy the terrorism and all of Al-Qaeda, which has hundreds of cells throughout the world, by finding and eliminating bin Laden, who resided in Afghanistan even if terrorists appeared to have had their headquarters, funding and religious roots in Saudi Arabia. Therefore, President Bush declared a global war on terror which, by starting from Afghanistan, would have stricken all those countries linked to terrorist cells 1 . However Bush and his government would not ask questions about why the attack occurred, what the terrorists might have wanted or even the ideology which inspired them to kill themselves. Instead, the President simply stated they “hate us because we are free”. Thus , according to Bush, terrorists had struck America because the nation represented freedom. Legitimacy/heg US hubris and inability to execute strategies in an intervention mean the world ignores US regardless of [military/tech/manufacturing] capabilities Cole 13—American academic on the modern Middle East and South Asia. Richard P. Mitchell Collegiate Professor of History at the University of Michigan (Juan, “What we Lost: Top Ten Ways the Iraq War Harmed the US,” Informed Comment, Mar. 18, 2013 http://www.juancole.com/2013/03/what-iraqharmed.html). WM 1. The US invasion and occupation of Iraq harmed the US in bringing into question its basic competency as a world leader. Almost everything the US did in Iraq was a disaster. It could not even get the stated reason for the invasion right, as it turned out there was no nuclear, biological or chemical weapons program. It looked dishonest, bumbling. It went into the war having no plans, and the plans the Bush administration made on the fly were mostly poorly thought-out and doomed to fail. It fell into search and destroy as a tactic for counter-insurgency, with the same results as it had had in Vietnam– it caused resistance to swell . Billions were wasted on reconstruction projects that assumed Iraqi know-how and equipment that they did not have, and which could not therefore be maintained even if they were completed. The US tried to run in English an Arabic-speaking country that had been deliberately isolated and cut off from the world by sanctions, without any basic understanding of Iraqi culture, customs, beliefs or ways of life. The pro-Israel Neoconservatives high in the administration blackballed (as insufficiently pro-Israel) Arabists who volunteered to go help and left the Coalition Provisional Authority blind. Basically, the world is always looking around for a team leader and a consulting group that is known for competence and for getting good results. After World War II, the US was for the most part that country. Being the world’s team leader turns into respect, cooperation and, ultimately, confidence and investment. If the US came to most of the world today with a group project, it likely couldn’t get the time of day from them. The United States is deeply diminished in world counsels. US response to 9/11 attacks undermines all legitimacy and influence regardless of military power Stiglitz 11— Nobel Laureate, Economics professor at Columbia (Joseph Stiglitz, “The U.S. Response to 9/11 Cost Us Far More Than the Attacks Themselves,” Al Jazeera English on alternet, September 6, 2011, http://www.alternet.org/story/152309/the_u.s._response_to_9_11_cost_us_far_more_than_the_attac ks_themselves). WM Ironically, the wars have undermined the United States’ (and the world’s) security, again in ways that Bin Laden could not have imagined. An unpopular war would have made military recruitment difficult in any circumstances. But, as Bush tried to deceive the US about the wars’ costs, he underfunded the troops, refusing even basic expenditures - say, for armoured and mine-resistant vehicles needed to protect American lives, or for adequate health care for returning veterans. A US court recently ruled that veterans’ rights have been violated. (Remarkably, the Obama administration claims that veterans’ right to appeal to the courts should be restricted!) Military overreach has predictably led to nervousness about using military power, and others’ knowledge of this threatens to weaken US security as well. But the United States’ real strength, more than its military and economic power , is its “soft power,” its moral authority . And this , too, was weakened : as the US violated basic human rights like habeas corpus and the right not to be tortured, its longstanding commitment to international law was called into question. In Afghanistan and Iraq, the US and its allies knew that long-term victory required winning hearts and minds. But mistakes in the early years of those wars complicated that already-difficult battle. The wars’ collateral damage has been massive: by some accounts, more than a million Iraqis have died, directly or indirectly, because of the war. According to some studies, at least 137,000 civilians have died violently in Afghanistan and Iraq in the last ten years; among Iraqis alone, there are 1.8m refugees and 1.7m internally displaced people. US interventions lose all legitimacy because they violate international law Cole 13—American academic on the modern Middle East and South Asia. Richard P. Mitchell Collegiate Professor of History at the University of Michigan (Juan, “What we Lost: Top Ten Ways the Iraq War Harmed the US,” Informed Comment, Mar. 18, 2013 http://www.juancole.com/2013/03/what-iraqharmed.html). WM 2. The post-World War II generation wanted to erect an international order that would forever forestall Nazi-like aggression against neighbors on the part of world powers. The Greatest Generation therefore forged a UN charter that forbade aggressive war, allowing hostilities only if a country had been attacked or if the UN Security Council designated a country a danger to world order. Iraq did not attack the US in 2002 or early 2003. The UN Security Council declined to pass a resolution calling for war on Iraq, especially after the ridiculous circus act of then Secretary of State Colin Powell before the UN laying out a self-evidently false and propagandistic case (which provoked gales of laughter in the room). The United States has irrevocably undermined that structure of international law , and any aggressor can now appeal to Bush of 2003 as a precedent. Indian politicians of the right wing Hindu Bharatiya Janata Party instanced the Bush doctrine when they wanted to go to war with Pakistan. (Wiser heads prevailed, given that Pakistan has nuclear warheads). The US has loosed a demon into the world, of the war of choice. Us interventions lead other countries to more aggressively pursue hegemony and challenge US leadership Cole 13—American academic on the modern Middle East and South Asia. Richard P. Mitchell Collegiate Professor of History at the University of Michigan (Juan, “What we Lost: Top Ten Ways the Iraq War Harmed the US,” Informed Comment, Mar. 18, 2013 http://www.juancole.com/2013/03/what-iraqharmed.html). WM 6. The motives of the US in attacking Iraq were presumed by the rest of the world to be getting that country’s petroleum on the world market. That the most powerful country in the world might just fall upon any victim it chose alarmed other nations and provoked their suspicions . China all of a sudden wanted an aircraft carrier group. Those already inclined to see the US as imperialist, like Venezuela’s Hugo Chavez, were were given proof they were right . Iran’s insistence on maintaining a nuclear enrichment program, even a non-military one, certainly has to do with the deterrent effect of nuclear latency (knowing how to quickly throw together a warhead). The Brazilian nuclear submarine program is aimed in part at protecting its natural resources from being summarily looted by Washington. Economy 9/11 induced war lead to trillions of dollars of debt- disproves economic decline theory and proves terror attack turns case Stiglitz 11— Nobel Laureate, Economics professor at Columbia (Joseph Stiglitz, “The U.S. Response to 9/11 Cost Us Far More Than the Attacks Themselves,” Al Jazeera English on alternet, September 6, 2011, http://www.alternet.org/story/152309/the_u.s._response_to_9_11_cost_us_far_more_than_the_attac ks_themselves). WM The September 11, 2001, attacks by al-Qaeda were meant to harm the United States, and they did, but in ways that Osama bin Laden probably never imagined. President George W Bush’s response to the attacks compromised the United States’ basic principles, undermined its economy, and weakened its security. The attack on Afghanistan that followed the 9/11 attacks was understandable, but the subsequent invasion of Iraq was entirely unconnected to al-Qaeda - as much as Bush tried to establish a link. That war of choice quickly became very expensive - orders of magnitude beyond the $60bn claimed at the beginning - as colossal incompetence met dishonest misrepresentation. Indeed, when Linda Bilmes and I calculated the United States' war costs three years ago, the conservative tally was $3- 5tn . Since then, the costs have mounted further . With almost 50 per cent of returning troops eligible to receive some level of disability payment, and more than 600,000 treated so far in veterans’ medical facilities, we now estimate that future disability payments and health-care costs will total $600900bn. But the social costs, reflected in veteran suicides (which have topped 18 per day in recent years) and family breakups, are incalculable. Even if Bush could be forgiven for taking the United States, and much of the rest of the world, to war on false pretenses, and for misrepresenting the cost of the venture, there is no excuse for how he chose to finance it. His was the first war in history paid for entirely on credit. As the US went into battle, with deficits already soaring from his 2001 tax cut, Bush decided to plunge ahead with yet another round of tax “relief” for the wealthy. Today, the US is focused on unemployment and the deficit. Both threats to America’s future can, in no small measure, be traced to the wars in Afghanistan and Iraq. Increased defense spending, together with the Bush tax cuts, is a key reason why the US went from a fiscal surplus of 2 per cent of GDP when Bush was elected to its parlous deficit and debt position today. Direct government spending on those wars so far amounts to roughly $2tn - $17,000 for every US household - with bills yet to be received increasing this amount by more than 50 per cent. Moreover, as Bilmes and I argued in our book The Three Trillion Dollar War, the wars contributed to the United States’ macroeconomic weaknesses, which exacerbated its deficits and debt burden. Then, as now, disruption in the Middle East led to higher oil prices, forcing Americans to spend money on oil imports that they otherwise could have spent buying goods produced in the US. But then the US Federal Reserve hid these weaknesses by engineering a housing bubble that led to a consumption boom. It will take years to overcome the excessive indebtedness and real-estate overhang that resulted. Interventions create costs that increase over time as wounded veterans return Cole 13—American academic on the modern Middle East and South Asia. Richard P. Mitchell Collegiate Professor of History at the University of Michigan (Juan, “What we Lost: Top Ten Ways the Iraq War Harmed the US,” Informed Comment, Mar. 18, 2013 http://www.juancole.com/2013/03/whatiraq-harmed.html). WM 9. The financial cost of the Iraq War to the US will rise over time into the trillions . This cost derives in large part from the need to treat the thousands of Iraq War veterans who were injured by roadside bombs, and who have damaged limbs, spines and/or brains. Some 33,000 vets were injured seriously enough to go to hospital, a number seldom mentioned when the over 4,000 soldiers killed are eulogized. (Dead and wounded contractors are also seldom mentioned). Terrorists are intent on targeting planes, which devastates the economy Phillips 14— (Judson, “PHILLIPS: The next 9/11 is coming,” The Washington Times, May 28, 2014, http://www.washingtontimes.com/news/2014/may/28/phillips-next-911/?page=all). WM What is going to happen next is perfectly predictable. It sounds like the plot of a Tom Clancy novel. In fact, it was the plot of a Tom Clancy novel. Al Qaeda is going to strike at American airliners again because those planes are a symbol of America . Since the mid-90s, airlines have been a coveted terrorist target. In the mid-90s, one of al Qaeda’s first plots was something called “Bojinka” plan. This was to be a coordinated attack on 10 American airliners over the Pacific Ocean. On 9/11, the terrorists used four American passenger jets as their weapons. Since 9/11, there have been multiple other attempts to destroy American aircraft, including the shoe bomber and the underwear bomber. In 2006, there was an attempt to destroy 10 planes over the Atlantic and there was the 2010 attempt to bring down cargo jets. The missiles that are missing are older missiles. While they may be a limited threat to modern combat aircraft, passenger jets are totally vulnerable. Jihadist groups have always looked at targets for their symbolic value as well as their economic value . All terrorists have to do is get half a dozen missiles into the U.S. through the open southern border and launch them at airliners that are either taking off or landing. Even bringing down a single airliner would devastate the American economy. Instantly, air travel would drop to almost zero. Hundreds of thousands of people would be thrown out of work . Boeing would not sell another new airliner for a very long time. The missiles are coming. Because America’s border is not secured and because the Obama regime went into Libya without thinking, it is now only a question when and where. When Americans die in this next spectacular terrorist attack, some will wring their hands and ask, how could this happen? The answer is: Barack Obama is how something like that could happen Anthro Fear of bioterror after symbolic attacks like 9/11 justifies abuses of non-human animals Walker 15— reporter covering technology, national security and foreign affairs (Lauren, “Thousands of Monkeys Made to Suffer Post-9/11: Report,” Newsweek, 7/7/15, http://www.newsweek.com/thousands-monkeys-made-suffer-post-911-351067). WM The boom in biodefense research following 9/11 has caused many monkeys to suffer, BuzzFeed News reports. The research primates—composed primarily of rhesus macaques, long-tailed macaques and African green monkeys—have been exposed to a slew of deadly bacteria and viruses, sometimes without pain relief, in a quest to develop drugs that could combat biological, chemical and radiological terrorist attacks. A week following the September 11, 2001, attacks, two senators and several news media offices received letters containing deadly anthrax spores, which killed five people and caused 17 to become ill. The event led the U.S. government to dedicate billions of dollars to developing drugs and vaccines in the event of mass exposure to harmful agents. Part of the development has included exposing monkeys to plague, anthrax, Ebola, smallpox, nerve agents and lethal amounts of radiation. Some of the experiments, deemed “Column E” by the U.S. Department of Agriculture, include experiments in which animals experience pain or distress, but it’s not fully alleviated by drugs such as painkillers or tranquilizers. In one experiment, long-tailed macaques were made to inhale a lethal amount of anthrax. They were later recorded as having difficulty breathing and were vomiting and losing control of their bowels. Many of the monkeys in the untreated control group were left to die. Other experiments have caused monkeys to collapse, have seizures or be put down to severe illness. These types of experiments have nearly doubled since 2002 and have averaged more than 1,400 a year since 2009 , the BuzzFeed News analysis found. Column E experiments are regulated to keep them rare. To conduct one, an institution must have the experiment reviewed by its animal care committee and must also provide a justification to the U.S. Department of Agriculture in its annual report, as dictated by federal regulations. The nearly 100 justification reports reviewed by BuzzFeed News show that the increase in pain-involved monkey experiments has been driven by biodefense research . In fact, three institutions have led the charge in these types of experiments: the U.S. Army Medical Research Institute of Infectious Diseases, the Lovelace Respiratory Research Institute and the Battelle Memorial Institute. Collectively, these institutes have used more than 6,400 Column E monkeys since 2002. While some argue that this type of testing is needed to ensure that humans have the necessary drugs to combat a biological attack, others are not convinced testing on monkeys is appropriate or reliable. “We should use a bare minimum of primates,” Chandan Guha, a radiation oncologist at the Montefiore Medical Center in New York who sees the merits of some monkey experiments, told Buzzfeed News. Monkeys do not always show the full range of symptoms in humans. But when it comes to Ebola, for instance, they do—monkeys have the same deadly internal and external bleeding after exposure. A vaccine that had been monkey tested was one of two rushed to human clinical trials after the virus spread in West Africa earlier this year. But Thomas Hartung, head of the Center for Alternatives to Animal Testing at Johns Hopkins University, said that 95 percent of the drugs used on humans after promising results in animal testing fail. Until there is a viable alternative, monkeys will remain entangled in the ongoing war on terror . Endless war/K military impacts 9/11 style attacks justify increased human rights abuses and unlimited power to attack any entity in the world Larivé 14— (Maxime H.A., “The making of American foreign policy in the post-9/11 world,” Foreign Policy Association, May 6th, 2014, http://foreignpolicyblogs.com/2014/05/06/the-making-ofamerican-foreign-policy-in-the-post-911-world/) . WM Let’s be honest, foreign policy making has never been democratic. The label of national security has offered governments around the world the power to hide information from their citizens. Aside from this statement, the making of American foreign policy has completely shifted since 9/11. Not only this shift was abrupt and made under intense emotional stress, but it has also created a precedent in the way the U.S. engages in the world. Additionally, American foreign policy has become much more militarized than in the past. A series of recent articles (here and here), documentaries (here and here), and radio show (here) have been produced looking back at the way the U.S. has conducted itself these last 13 years on the international stage. Since 9/11, the U.S. has been fighting “evil” – to adopt a very Bushian expression – with evil. The U.S. has used a wide array of instruments considered by international law as illegal such as: rendition, torture — known as an “enhanced interrogation technique” — use of force against countries without legal jurisdiction, drone strikes in countries wherein the U.S. is not at war, mass snooping on American and world citizens, cover-up operations, and so forth. The “Global War on Terror” has been the longest war in American history. Since 2001, the U.S. has invaded two countries – Iraq and Afghanistan – launched an undisclosed numbers of drone strikes in countries with which the U.S. is not at war – Yemen, Pakistan, and Somalia (here are the numbers of drones strikes as of April 2014) – and all this in complete impunity. The real question is: Has it made America safer? It is a very difficult subject to answer in all impartiality. Members of American intelligence community and other departments of the U.S. government would most likely say yes. Not only, I would tend to answer, not really, but I would also argue that American democracy has progressively been the main collateral damage of this endless war. The starting point in the shifting in decision-making in American foreign policy was the approval of the Authorization for Use of Military Force, of what is known as the AUMF. The famous sentence, as reported by Gregory E. Johnsen and which inspired the Radiolab podcast posted below, that changed it all were these 60 words from the AUMF drafted on Sept. 12, 2001: That the President is authorized to use all necessary and appropriate force against those nations, organization, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2011, or harbored such organizations or persons in order to prevent any future acts of international terrorism against the United States by such nations, organizations or person. In French, we would say that the president has now carte blanche, meaning unlimited power . This sentence taken from AUMF pretty much gives unlimited power to the executive branch without any supervision by the Congress, as it gave it up soon after 9/11. Such legal piece was approved by Congress on Sept. 13, 2001 at the exception of only one elected official, the California Representative Barbara Lee, opposing it. In the excellent podcast of Radiolad, Barbara Lee takes us throughout her reflection process about taking such decision. At the time she was under intense pressure, and was even called unpatriotic, a terrorist, and so forth. Today, she seems like a visionary as she not only understood the consequences of taking swift decisions under stress and emotions, but also foresaw the legal implications embedded in these words. For instance, during a 2013 Senate Armed Service committee hearing chaired by Carl Levin – as reported in the Radiolab podcast – about the use of military force, DOD officials argued in favor of the continued use of the AUMF. Throughout the hearing the officials never named one enemy, but only referred to “associated forces.” Senator Angus King responded to these statements by DOD officials, saying: “you guys have essentially rewritten the Constitution here today.” King’s argument is that the DOD is using the concept of associated forces, not present in the AUMF, in order to justify the use of force against pretty much anyone . The AUMF has in fact changed the entire institutional design of use of force. “The Declaration of War is kind of a dead instrument of national law,” argued Ben Wittes, a senior fellow at the Brookings Institution in the Radiolab podcast. “But the modern incarnation of the Declaration of War is the Authorization for Use of Military Force (AUMF).” Such comments fall under the fact that the list of American enemies and the people that the U.S. is in war against is secret. American citizens do not have and cannot have the information about the enemies. The absolute lack of supervision by one branch of the government over the other will undeniably lead to extreme decisions and situations. The Gulf of Tonkin Resolution is the perfect example, as it led the U.S. to a lengthy and costly war in Vietnam. Additionally, without a clear enemy, it implies that the U.S. could be at war indefinitely . At the distinction with Vietnam, Iraq and Afghanistan, this war seems foreign, remote, distant, and impersonal, making it even more dangerous to American democracy and political system. Other Links Materiality requirement A materiality requirement for a connection to a foreign power wrecks counterterrorism investigations Cordero, 13 – professor of law at Georgetown (Carrie, “Continued Oversight of U.S. Government Surveillance Authorities : Hearing Before the S. Committee on the Judiciary, 113th Cong., December 11, 2013 (Statement by Professor Carrie F. Cordero, Geo. U. L. Center)” http://scholarship.law.georgetown.edu/cong/118 I would next like to highlight four components of S.1599. The first three would, in my view, significantly limit the effectiveness of the U.S. Government to conduct foreign intelligence activities to protect the nation from the national security threats of today, and, tomorrow. The fourth is a brief comment on competing proposals to add an adversarial component to the FISA process. First, sections 101 and 201 would change the legal standards to obtain business records and implement pen register/trap and trace devices by requiring a connection to an agent of a foreign power. The sections also add a “materiality” requirement in addition to relevance. The likely intended effect of these provisions is to eliminate the utility of these provisions for large scale collection, such as the 215 telephony metadata program. But the proposed changes would likely have far more dramatic, and harmful, consequences to more traditional, day-to-day, national security investigations. The standards are currently aligned with investigative authorities in the criminal investigative context, such as subpoenas and pen register/trap and trace surveillance conducted under Title 18. Both of those criminal authorities operate on a relevance standard. By raising the standard to requiring a connection to an agent of a foreign power, these sections would render these investigative techniques nearly useless in the early stages of an investigation, which is precisely when they are most useful. Investigators may never get to determine whether a target rises to the agent of a foreign power standard, if they cannot conduct the less intrusive records request or pen register/trap and trace surveillance as part of an investigation. These changes, if made law, would return us to the days prior to September 11, 2001, when it was harder for an investigator to request records or conduct pen register/trap and trace surveillance in an international terrorism case than it was in an everyday drug or fraud case. Third Party Doctrine: FISA Third Party Doctrine justifies warrantless searches and is key to clarify legal application issues Peikoff, philosophy prof. @ Texas , 14 (Amy L., St. John’s Law Review, “Of Third-Party Bathwater: How to Throw out the Third-Party Doctrine While Preserving Government's Ability to Use Secret Agents,” HeinOnline, p. 355-7)//ES Without the doctrine, criminals could use third-party agents to fully enshroud their criminal enterprises in Fourth Amendment protection. A criminal could plot and execute his entire crime from home knowing that the police could not send in undercover agents, record the fact of his phone calls, or watch any aspect of his Internet usage without first obtaining a warrant. He could use third parties to create a bubble of Fourth Amendment protection around the entirety of his criminal activity.34 With no third-party doctrine, Kerr argues, it would be nearly impossible for the police to gain enough evidence to support a search warrant, particularly when a criminal is clever at substituting private, thirdparty-assisted actions and transactions for those that were once, of necessity, amenable to public viewing.35 The doctrine, therefore, in Kerr's terms, avoids the "substitution effect" and thereby preserves the "technological neutrality" intended by the Court in Katz.36 "Just as the new technologies can bring 'intimate occurrences of the home' out in the open, so can technological change and the use of third parties take transactions that were out in the open and bring them inside."37 If it is right to understand the Fourth Amendment from this perspective of technological neutrality, Kerr argues, then "it must be a two-way street."" So, just as the "reasonable expectation of privacy" test of Katz addresses the problem of technology exposing intimate details of one's life, the third-party doctrine addresses the problem of criminals substituting private, third-party transactions for actions conducted out in the open. Kerr notes that the doctrine thus provides another type of neutrality, in that a criminal enjoys "roughly the same degree of privacy protection regardless of whether [the] criminal commits crimes on his own or uses third parties."39 Kerr's second argument in defense of the third-party doctrine is that it helps to ensure the clarity of Fourth Amendment rules.4 ° The need for clarity, says Kerr, comes from the exclusionary rule's evidence-suppression remedy: The severe costs of the exclusionary rule require ex ante clarity in the rules for when a reasonable expectation of privacy exists. The police need to know when their conduct triggers Fourth Amendment protection. Uncertainty can both overdeter police from acting when no protection exists and can lead them to inadvertently trample on Fourth Amendment rights. 41 The third-party doctrine achieves the necessary clarity, says Kerr, by "guarantee [ing] that once information is present in a location it is treated just like everything else located there."42 So, for example: [A] letter that arrives in the mail, is opened, and sits on the recipient's desk at home ....[It] is treated just like all the other papers on the desk .... [T]he Fourth Amendment rules [that the police] must follow will be set by the usual rules of home searches rather than special rules for each piece of paper defined by the history of each page.43 Third Party Doctrine is used by FISC to justify it’s activities Ombres 15 (Devon, JD from Stetson, “NSA Domestic Surveillance from the Patriot Act to the Freedom Act: The Underlying History, Constitutional Basis, and the Efforts at Reform,” Seton Hall Legislative Journal, HeinOnline, p. 33-4)//ES There is little doubt that the collection of content data, absent probable cause, violates the Fourth Amendment as an unreasonable search.2' However, whether the mass collection of domestic metadata violates the Fourth Amendment is a question that is still being wrestled with due to the historical approval of the Third Party Doctrine ("TPD") arising from the seminal opinion of Smith v. Maryland2 In Smith, a PR was used to assist in a conviction of a burglary. 30 The Supreme Court held that using a PR did not constitute an unreasonable search because individuals are aware that phone companies maintain permanent records of dialed phone numbers, thereby abrogating any expectation of privacy." As Smith has not been overruled, it maintains its standing as a guiding principle under stare decisis and is being utilized, at least in part, as a basis for conducting domestic surveillance as discussed below. The FISC cites directly to the Smith reasoning, in a heavily redacted opinion/order, in noting that there is no reasonable expectation of privacy in the collection of metadata.32 The FISC notes that Congress relaxed requirements to collect "non-content addressing information through [PR] and [TT] devices" through the PATRIOT Act and FISA Amendments and that "such information is not protected by the Fourth Amendment."33 Like phone calls under Smith, the FISC held that email users, due to the same reasoning, also do not have an expectation of privacy. 34 The FISC recognized the need for only a relevance standard, rather than reasonable suspicion, in approving the government's requests for widespread surveillance. Third Party Doctrine: Undercover Informant The third party doctrine allows government use of Undercover Informants Thompson, Legislative Attorney, 14 (Richard M., written for the Congressional Research Service, June 5 2014, “The Fourth Amendment Third-Party Doctrine,” p. 7-8)//ES In a series of five cases throughout the 2 0th century, the Supreme Court assessed the constitutionality of the use of undercover agents or informants under the Fourth Amendment. In On Lee v. United States, the government wired an "undercover agent" with a microphone and sent him into On Lee's laundromat to engage him in incriminating conversation. 49 An agent of the Bureau of Narcotics sat outside with a receiving set to hear the conversation. In the course of these conversations, On Lee made incriminating statements, which the agent later testified to at On Lee's trial. On Lee argued that this evidence was obtained in violation of the Fourth Amendment. In an opinion authored by Justice Jackson, the Court disagreed, noting that On Lee was "talking confidentially and indiscreetly with one he trusted" and that the agent was let into his shop "with the consent, if not implied invitation" of On Lee.5 In a similar case, Lopez v. United States, the defendant attempted to bribe an internal revenue agent, who during some of these conversations was wearing a recording device." At trial, Lopez moved to suppress evidence of the wire recordings as fruits of an unlawful search. Relying on the On Lee decision, the Court rejected this argument on the grounds that the defendant consented to the agent being in his office and "knew full well" that the statements he made to the agent could be used against him.5 2 Further, the Court noted that the listening device was not used to intercept conversations the agent could not have otherwise heard, but "instead, the device was used only to obtain the most reliable evidence possible of a conversation in which the Government's own agent was a participant and which that agent was fully entitled to disclose.,53 In Lewis v. United States, the government sent an undercover federal narcotics agent to the defendant's home several times to purchase marijuana.54 Over the defendant's objections, the agent was permitted to recount the conversations at trial. Upon review, the Supreme Court held that the conversations were not protected under the Fourth Amendment as the defendant had invited the federal agent into his home and that the statements were "willingly" made to the agent. 55 Finally, in Hoffa v. United States, a government informant relayed to federal law enforcement agents the many conversations he had with Jimmy Hoffa about Hoffa's attempt to tamper with a jury.56 Because the informant did not enter Hoffa's hotel room by force, was invited to participate in the conversations by Hoffa, and was not a "surreptitious eavesdropper," the Court concluded that the Fourth Amendment had not been violated. Katz didn’t change the precedent, White said this is still permissible, but overturning the third party doctrine would cause a shift in justified action Thompson, Legislative Attorney, 14 (Richard M., written for the Congressional Research Service, June 5 2014, “The Fourth Amendment Third-Party Doctrine,” p. 9)//ES Note that these cases came before Katz shifted the Fourth Amendment focus from property to privacy. Whether Katz would disturb this line of cases was a matter of "considerable speculation" 62 until the Court decided United States v. White four years later. In White, an undercover informant wearing a radio transmitter engaged the defendant in several incriminating conversations, four of which took place at the informant's house, and several other conversations took place in the defendant's home, a restaurant, and in the informant's car.6 1 The court of appeals in White interpreted Katz as implicitly overruling this line of cases as it was based on a trespass doctrine that was "squarely discarded" in Katz.64 The Supreme Court disagreed, however, and upheld the surreptitious surveillance. The opinion accepted that the trespass rationale could not survive after Katz, but that the undercover informant cases were also supported by a "second and independent ground"-that the informant was not an uninvited eavesdropper, but a party to the conversation who was free to report what he heard to the authorities. 65 For the Court, White had assumed the risk that information he shared with the informant could be shared with the police 66 Third Party Doctrine: Bank Records Third Party doctrine justifies tracking of financial records – Miller decision proves Thompson, Legislative Attorney, 14 (Richard M., written for the Congressional Research Service, June 5 2014, “The Fourth Amendment Third-Party Doctrine,” p. 9-10)//ES In 1976, the Court took up its first maj or third-party doctrine case to deal with transactional documents in Miller v. United States. In that case, agents of the Treasury Department's Alcohol, Tobacco, and Firearms Bureau were investigating Mitch Miller for his participation in an illegal whiskey distillery.69 The agents subpoenaed the presidents of several banks in which Miller had an account to produce all records of accounts including savings, checking accounts, and any loans he may have had. The banks never informed Miller that the subpoenas had been served, but ordered their employees to comply with the subpoenas. At one bank, an agent was shown microfilm of Miller's account and provided copies of "one deposit slip and one or two checks."7 ° At the other bank, the agent was shown similar records and was given copies of "all checks, deposit slips, two financial statements, and three monthly statements.",71 Copies of the checks were later introduced into evidence at Miller's trial. The lower court held that the government had unlawfully circumvented the Fourth Amendment by first requiring the banks to maintain the customer's records for a certain period of time and second by using insufficient legal process to obtain those records from the bank. In a 7-2 ruling, the Supreme Court reversed and held that subpoenaing the bank records without a warrant did not violate the Fourth Amendment. The opinion by Justice Powell discarded the first argument by noting that previous case law held that merely requiring the bank to retain its customers' records did not constitute a Fourth Amendment search.72 That previous case, however, did not resolve whether a subpoena was sufficient to access those documents.73 Miller argued that the bank kept copies of personal records that he gave to the bank for a limited purpose and in which he retained a reasonable expectation of privacy under Katz. The Court, applying language from Katz, noted that "[w]hat a person knowingly exposes to the public ..i.s not a subject of Fourth Amendment protection.' 7 The Court concluded that banking documents were not "confidential communications," but rather negotiable instruments that were required to transact business between the customer and the bank. All of the documents contained information "voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business., 75 As with the undercover agent cases, once documents were shared with the bank, they could then be given to the government without requiring a search warrant. Citing to White, Justice Powell instructed that a bank customer "takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the government., 76 Looking to both this assumption of the risk theory and the secrecy model, the Court then included the following sentence which would come to encapsulate the third-party doctrine: This Court has held repeatedly that the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.7 Third Party Doctrine: Telephone Calls Wiretaps are justified by the third party doctrine – latest precedent Thompson, Legislative Attorney, 14 (Richard M., written for the Congressional Research Service, June 5 2014, “The Fourth Amendment Third-Party Doctrine,” p. 11-2)//ES Several years later, the Court took up the second major third-party doctrine case, Smith v. Maryland, 7 which would have maj or implications for government collection of transactional records, especially those held by third-party companies. In Smith, the police were investigating the robbery of a young woman, who gave the police a description of her assailant and the vehicle seen near the scene of the crime. 79 The police later spotted a man matching the victim's description driving an identical vehicle in her neighborhood, which they traced back to Michael Smith. Upon police request, the telephone company installed a pen register at its central office to record the telephone numbers dialed from Smith's home. The device was installed without a warrant or court order. Through the pen register, the police learned that a call was placed from Smith's home to the victim's phone, which would eventually connect Smith to the robbery. At trial, Smith claimed that any evidence obtained from the pen register violated his Fourth Amendment rights as the police failed to obtain a warrant before installing it. This motion was denied, Smith was later convicted of robbery, and the appeals court affirmed his conviction, holding that the installation of the pen register was not a Fourth Amendment search.80 In line with Justice Harlan's formulation of the Katz privacy test, the Supreme Court asked the following questions: first, whether Smith had a subjective expectation of privacy in the numbers he dialed, and second, whether that expectation was reasonable.8 ' As to the former, the Court "doubt[ed] that people in general entertain any actual expectation of privacy in the numbers they dial . 82 The Court assumed that people, in the main, know and understand that they must convey the dialed numbers to the company to complete the call; that the company has a process of recording those numbers; and that the company actually does record those numbers for various business reasons. It deduced this partially from the fact that phone books inform consumers that the telephone companies "can frequently help in identifying to authorities the origin of unwelcome and untroublesome calls" and that customers see a list of their calls recorded on their monthly phone bills.83 Even if Smith did harbor a subjective expectation of privacy, the Court found that "this expectation is not 'one society is prepared to recognize as 'reasonable.' 84 Justice Blackmun cited to Miller, White, Hoffa, and Lopez for the proposition that "a person has no legitimate expectation of privacy in information that he voluntarily turns over to third parties. 85 Because Smith "voluntarily conveyed" the telephone numbers to the company in the process of making the call, he had "exposed" that information to the company's equipment in the "ordinary course of business" and thus could not reasonably expect privacy in that information. 6 Moreover, the Court found that Smith "assumed the risk" that the telephone company would reveal to the police the numbers he dialed.87 Although Smith was the Court's last significant pronouncement on the parameters of the thirdparty doctrine, the lower federal courts have applied it in various contexts, with a significant number of these cases dealing with the transfer of electronic information. Third Party Doctrine: Metadata The Third Party Doctrine justifies metadata collection through the Smith decision Yoo 14 (John, UC Berkeley law prof, Harvard Journal of Law and Public Policy, “The Legality of the National Security Agency's Bulk Data Surveillance Programs,” HeinOnline, 37(3), p. 916)//ES The NSA's first program, which collects metadata on domestic phone calls, poses the fewest constitutional difficulties. Under existing judicial doctrine, individuals have Fourth Amendment rights in the content of communications, but not in their addressing information.6' Privacy does not extend to the writing on the outside of envelopes deposited in the mail because the sender has voluntarily revealed the addresses to the post office for delivery. 62 An identical principle applies to telecommunications. In Smith v. Maryland, the Supreme Court found calling information, such as the phone number dialed, beyond Fourth Amendment protection because the consumer had voluntarily turned over the information to a third party namely, the phone company-for connection and billing purposes. 63 Under the rubric of Katz v. United States, no one can have an expectation of privacy in records that they have handed over to someone else." Administrative Search Doctrine: FISA Administrative Search Doctrine key to justify FISA surveillance Birkenstock 92 (Gregory E., “The Foreign Intelligence Surveillance Act and Standards of Probable Cause: An Alternative Analysis,” Georgetown Law Journal, 80(3), p. 858-60)//ES Based on the administrative search doctrine, the essential constitutional argument for accepting the diminished probable cause standards of FISA is that the primary purpose of the search is not to gather evidence for criminal prosecutions. 1 4 When the government has a special need for the information, the Fourth Amendment should allow the government more latitude in justifying its need to conduct a search. This is especially true for foreign intelligence, where the emphasis of the FISA search is on gathering information needed to defend against a threat to national security. The use of that information as criminal evidence is merely a legitimate byproduct of the search for foreign intelligence information, much as uncovering of evidence of criminal activity during an administrative search is allowable under Burger. In Camara and See, the Court acknowledged that the Fourth Amendment does protect the individual's privacy even in the context of civil searches.115 According to the Camara Court, administrative searches are reasonable when the government's need for regulatory enforcement outweighs the limited intrusiveness of the noncriminal search.116 As in the "special governmental needs" cases discussed below," 7 the Court attached great significance to the fact that administrative searches are not conducted primarily for penal law enforcement. While FISA searches may often be expected to discover incriminating evidence, FISA's main purpose of gathering information for protection of national security interests,"I rather than prosecuting criminals, supports the analogies suggested in this note. As a preliminary matter, the focus on administrative searches' noncriminal purpose in Camara requires further clarification. That portion of the Camara opinion that relied on the "limited" invasion of privacy resulting from the administrative inspection" 19 is sufficiently ambiguous to obscure the Court's reasoning. The reference may be interpreted in at least two ways: (1) a lesser quantum of evidence is constitutionally required when the goal of the search is not furtherance of criminal prosecution; or (2) a lesser quantum of evidence is constitutionally required when the search is less intensive than that generally permitted in a criminal investigation. Although the Court has never resolved this debate, the former interpretation is a more logical one. In Abel v. United States,' 20 a pre-Camarad ecision, an administrative search was upheld because its purpose was not to search for evidence of crime, even though "a more exhaustive search is hardly to be found in the records of the Supreme Court.' 21 Thus, while FISA searches are necessarily more intrusive than administrative searches, the proposed analogy can still be instructive. Furthermore, while the applicability of Camara's other factors-the history of judicial and popular acceptance and the requirement that the search be the most effective means-are also problematic, the proposed analogy would still provide a superior model of judicial decisionmaking in the national security area than the present deferential approach. Analyzing FISA searches under the administrative search doctrine can illuminate the potential utility of a similar national security jurisprudence. The usefulness of this approach is underscored by the fact that the Senate Judiciary Committee, in considering the wisdom of a lower standard of probable cause, referred to the administrative search doctrine in coming to its conclusion that the FISA probable cause standard was constitutionally acceptable.' 22 By using principles from an analogous area of the law, rather than creating a separate sphere of jurisprudence for foreign intelligence, progress can be made in assessing the wisdom of relaxing the probable cause standards for national security searches. The administrative search doctrine is key to justify FISA activities Birkenstock 92 (Gregory E., “The Foreign Intelligence Surveillance Act and Standards of Probable Cause: An Alternative Analysis,” Georgetown Law Journal, 80(3), p. 865-6)//ES Although the analogy is not a perfect one, the tests developed in the administrative search context are instructive in exploring the legitimacy of FISA searches. For this analysis, the relevant test is that articulated in Camara: to weigh the interests served by the search against the intrusion into privacy that the search entails. 161 The government has a strong interest in gaining the information that FISA surveillance gathers. 162 It is an "elementary truth" that "unless the Government safeguards its own capacity to function and to preserve the security of its people, society itself could become so disordered that all rights and liberties would be endangered."' 63 FISA limits the "foreign intelligence information" that may be sought to information relevant to the nation's ability to protect against an act of war, international terrorism, or clandestine intelligence activities. 164 FISA searches may also seek information that relates to or is necessary to "the national defense or the security of the United States; or... the conduct of the foreign affairs of the United States."' 165 While it is possible to overstate and thus manipulate these interests, they are nonetheless at the very core of the government's constitutional mandate to "provide for the common defense."' 166 The intrusion authorized under a FISA search order is intensive, but in most cases not sufficiently intensive to outweigh the interest supporting the search. Generally, wiretapping is a highly intrusive investigatory technique. 167 But FISA includes several provisions designed to ensure that the intrusion will be no greater than is absolutely necessary. 168 FISA's web of definitions helps to ensure that the search will not be overly intrusive by limiting searches to the most important national security information.169 When intelligence gathering and criminal investigation overlap, however, the courts must ensure that FISA searches are not abused. When this is accomplished, FISA searches represent a legitimate tool to promote national security. While certainly not perfect, the administrative search analogy helps to place FISA searches in their proper constitutional context. The Supreme Court has taken the view that the evidentiary requirement of the Fourth Amendment is not a rigid standard that requires precisely the same quantum of evidence in all cases.170 It is instead a flexible standard, permitting consideration of the public and individual interests as they are reflected in the facts of a particular case.'71 This is an important and meaningful concept, which has proved useful in defining Fourth Amendment limits upon certain "special" enforcement procedures that are unlike the usual arrest and search. Viewed as a part of this framework, FISA surveillance is constitutionally permissible, and courts need not invoke the catch phrase "national security" to uphold such searches. Administrative Search Doctrine necessary to avoid a warrant – allows quick and flexible responses Birkenstock 92 (Gregory E., “The Foreign Intelligence Surveillance Act and Standards of Probable Cause: An Alternative Analysis,” Georgetown Law Journal, 80(3), p. 868)//ES The administrative search doctrine symbolizes the Supreme Court's turn away from the proscriptions of the Fourth Amendment's Warrant Clause toward a more flexible reasonableness analysis.1 87 This note demonstrates that the doctrine serves as an appropriate jurisprudential model for FISA searches. In a variety of contexts, the Court has used a balancing approach to justify even full-scale searches without a warrant, probable cause, or even individualized suspicion, when the governmental need is especially acute. This Part of the note briefly examines the "special governmental needs" cases and further demonstrates how FISA surveillance can be assimilated into modern Fourth Amendment jurisprudence. Administrative search doctrine allows investigations without warrants Birkenstock 92 (Gregory E., “The Foreign Intelligence Surveillance Act and Standards of Probable Cause: An Alternative Analysis,” Georgetown Law Journal, 80(3), p. 869)//ES Thus, where the governmental interest is particularly acute, the Court shuns the specific commands of the Warrant Clause and uses a balancing test under a general reasonableness standard. Significantly, none of these searches involved attempts by the police to locate evidence of crime. In each, the Court referred to the government's special needs as those beyond the normal need for law enforcement. 197 In both the administrative search and special governmental needs cases, then, the Court has been persuaded that probable cause and individualized suspicion are not always Fourth Amendment requirements. In an expanding line of cases, the Court has held that certain governmental interests outweigh individual privacy interests. In each case, the Court has been careful to stress the difference between the search at issue and the traditional criminal search. Administrative Search justifies FISA – Supreme Court precedent Birkenstock 92 (Gregory E., “The Foreign Intelligence Surveillance Act and Standards of Probable Cause: An Alternative Analysis,” Georgetown Law Journal, 80(3), p. 870)//ES In sum, while some have questioned FISA's diminished probable cause standard over the years, an examination of Supreme Court precedent demonstrates that the standard is less problematic than it may first appear. While the courts have uniformly upheld FISA under Fourth Amendment challenges, they have been reluctant to assimilate FISA surveillance into Fourth Amendment doctrine. The administrative search and special governmental needs doctrines provide constitutional justification for the diminished probable cause standard in FISA. By analyzing FISA surveillance in this manner, courts can avoid the pitfall of assigning national security matters to a separate sphere of the law. Administrative Search Doctrine: TSA Administrative search doctrine justifies to TSA security checks Sanford 93 (Don L., Summer 1993, “Airport Security, Terrorism, and the Fourth Amendment: A Look Back and a Step Forward,” Journal of Air Law and Commerce, 58(4), p. 1176-7)//ES A second approach taken to justify airport searches is the administrative search. The Supreme Court has addressed searches conducted for purposes other than criminal law enforcement that might invade areas protected by the Fourth Amendment. In 1967, the Supreme Court enunciated the administrative search doctrine in a pair of companion cases: Camara v. Municipal Court 329 and See v. City of Seattle.130 In Camara, the Court reasoned that an administrative search was permissible under the Fourth Amendment "by balancing the need to search against the invasion which the search entails."1 3 1 In articulating the new administrative search doctrine, the Court redefined the traditional probable cause standard. Individualized suspicion was replaced with a more expansive concept of reasonableness, cast in the form of a balancing test.13 2 This reasonableness "must be as limited in its intrusiveness as is consistent with satisfaction of the administrative need that justifies it.' 33 Administrative searches generally satisfy the Fourth Amendment's reasonableness requirements because the searches are not personal in nature, are not directed toward discovering evidence of a crime, t 34 and thus involve a relatively limited invasion of privacy. '3 5 Airport security screenings have consistently been upheld as a consensual regulatory search to further an administratively directed program whose goal is to ensure air safety. 3 6 In the seminal case of United States v. Davis '3 7 the Ninth Circuit Court of Appeals approved warrantless airport security checks of all passengers and their carry-on luggage as administrative searches. 38 According to the court, administrative searches are constitutionally permissible without a warrant if the intrusion is consistent with satisfying the administrative need. 3 9 A warrantless administrative search is also legitimate when requiring a search warrant would frustrate the governmental purpose behind the search.140 Administrative Search Doctrine is used to justify TSA screenings – case law Israelson 13 (Gregory R., Summer 2013, “Applying the Fourth Amendment’s NationalSecurity Exception to Airport Security and the TSA,” Journal of Air Law and Commerce, 78(3), p. 512-3)//ES As courts turned away from the earlier frameworks, they began to apply the administrative-search exception. In recent years, the administrative-search framework has been the doctrine of choice for courts analyzing Fourth Amendment concerns related to airport security." At the core of the administrative-search exception is a balancing of the government's legitimate interests and the individual's right to be free from government intrusion. Beyond this basic test, however, courts have differed in their application of the administrative-search exception to airport security cases. Most circuits view airport security screening as an "administrative search,"7 which allows for a balancing of "the individual's privacy expectations against the [g]overnment's interests to determine whether it is impractical to require a warrant or some level of individualized suspicion in the particular context."75 In the context of "blanket suspicionless searches," the Supreme Court explained that a reasonable search must be "calibrated to the risk" and referred to airport security as it existed in 1997 as one example of such a search.7' But the Court added the caveat that "where . . . public safety is not genuinely in jeopardy, the Fourth Amendment precludes the suspicionless search, no matter how conveniently arranged."7 7 In sum, determining the constitutionality of a suspicionless checkpoint search requires balancing the "'gravity of the public concerns served by the seizure, the degree to which the seizure advances the public interest, and the severity of the interference with individual liberty.' "78 AT: Turns AT: Overload turn No risk of info overload – NSA is using graph analysis and has a massive storage center. Large data records are key to investigations. Harris 13 (Derrick Harris, Senior writer about technology at Gigaom and Senior Research Analyst at Mesosphere, with a J.D. from the University of Nevada-Las Vegas School of Law, “Here’s how the NSA analyzes all that call data,” Gigaom, 6 June 2013, https://gigaom.com/2013/06/06/heres-how-the-nsa-analyzes-all-that-call-data/, *fc) There are numerous methods the NSA could use to extract some insights from what must be a mindblowing number of phone calls and text messages, but graph analysis is likely the king. As we’ve explained numerous times over the past few months, graph analysis is ideal for identifying connections among pieces of data. It’s what powers social graphs, product recommendations and even some fairly complex medical research. But now it has really come to the fore as a tool for fighting crime (or intruding on civil liberties, however you want to look at it). The NSA is storing all those Verizon (and, presumably, other carrier records) in a massive database system called Accumulo, which it built itself (on top of Hadoop) a few years ago because there weren’t any other options suitable for its scale and requirements around stability or security. The NSA is currently storing tens of petabytes of data in Accumulo. In graph parlance, vertices are the individual data points (e.g., phone numbers or social network users) and edges are the connections among them. In late May, the NSA released a slide presentation detailing how fast fast Accumulo is able to process a 4.4-trillion-node, 70-trillion-edge graph. By way of comparison, the graph behind Facebook’s Graph Search feature contains billions of nodes and trillions of edges. (In the low trillions, from what I understand.) So, yes, the NSA is able to easily analyze the call and text-message records of hundreds of million of mobile subscribers. It’s also building out some massive data center real estate to support all the data it’s collecting. How might a graph analysis work within the NSA? The easy answer, which the government has acknowledged, is to figure out who else is in contact with suspected terrorists. If there’s a strong connection between you and Public Enemy No. 1, the NSA will find out and get to work figuring out who you are. That could be via a search warrant or wiretap authorization, or it could conceivably figure out who someone likely is by using location data. Having such a big database of call records also provides the NSA with an easy way to go back and find out information about someone should their number pop up in a future investigation. Assuming the number is somewhere in their index, agents can track it down and get to work figuring out who it’s related to and from where it has been making calls. AT: HUMINT turn HUMINT can’t fill in – it’s slow, limited to small-ball intelligence and terrorists will adapt. Big data is vital to mapping the entire network with enough warning to prevent attacks Mudd, 13 - Mr. Mudd was deputy director of the CIA Counterterrorist Center, 2003-05, and senior intelligence adviser at the FBI, 2009-10. He is now director of Global Risk at SouthernSun Asset Management (Philip, “Mapping Terror Networks: Why Metadata Matters” Wall Street Journal, 12/29, http://www.wsj.com/articles/SB10001424052702304367204579270472690053740 We met every afternoon in the CIA director's conference room at 5. At the FBI director's conference room, we met every morning shortly after 7. At both agencies, the questions were similar: How best can we clarify the blurry picture of an emerging terror conspiracy overseas or in the United States? How can we identify the key players and the broader network of fundraisers, radicalizers, travel facilitators and others quickly enough so they can't succeed? And how do we ensure that we've mapped the network enough to dismantle—and not merely disrupt— it? The only way to understand why the NSA collects and needs access to vast amounts of telephone metadata is to keep these questions in mind, especially the last. In ruling on Friday that the data collection is lawful, U.S. District Court Judge William H. Pauley III expressed it well: "The government needs a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data." Mapping a network of people is simple in concept but complex in practice: find the key operators, and then find the support group. The challenge isn't limited to counterterrorism. Any group—from organized-crime enterprises to gangs, drug cartels, or human traffickers—consists of a team of people who interact and are organized for a particular purpose. If an analyst maps that network well enough, then a series of arrests or lethal operations can destroy it. Map a network poorly, however, and you may miss peripheral players who will recreate a conspiracy after the core conspirators are arrested. The goal is to eliminate the entire spiderweb of a conspiracy; cutting off a piece, like the arm of a starfish, is a poor second choice. The starfish's arm regenerates. Think of the range of linkages you might find among individuals in these networks. Money, phone calls, email exchanges, travel, social media, chat rooms—the modes constantly expand. How many linkages could a security service monitor electronically even two decades ago? Very few: Many of today's means of communication and interaction didn't exist. A security service can also use human surveillance teams on the ground to map a network. This is more familiar and comforting, and it might sound less intrusive than the digital mapping programs run by NSA computers. But human surveillance operations are slow, inefficient and costly. And they have a higher risk of missing members of the network. The fastest, most efficient solution to mapping a network of conspirators lies in following digital connections among people. And as digital trails expand, digital network mapping will increase in value. There is a healthy debate about how far U.S. security services should delve into our digital trails, but emotions too often overcome common sense. Every week I hear someone comment on whether the government is listening to their conversations—as if there's some huge complex of government employees in a mythical Area 51, listening to other Americans. The debates about government intelligence collection should be clearer about distinguishing between what the government collects and what it does with it. They may be collecting my phone number; what I'd worry more about is what they do with what they collect. For an ongoing investigation, the data might seem relatively straightforward: link cellphones, email contacts, financial transactions, travel and visa information, add in whatever else you can find, and sort through the data using modern network analysis tools. Bingo! Within a day, you can have the beginnings of an understanding of a complex network that might take old-school investigators weeks or more to piece together. Even so, an analyst has to ask other questions. Where did the conspirators travel a year ago? Five years ago? Who did they live with? Who did they sit next to on an airplane? Who gave them money? And a thousand other questions. Investigators need an historical pool of data, in other words, that they can access only when they have information that starts with a known or suspected conspirator in the middle of a spiderweb they don't fully understand. Meanwhile, time pressures lurk: If you're late by a day, you lose. In the post-9/11 world, the harder debate and more difficult questions center on pre-emptive intelligence—potentially lethal unknowns. Consider Minnesota, with its significant Somali expatriate population. Should analysts look for youths who buy one-way cash tickets to a country neighboring Somalia? What if they've accessed extremist websites? Would that combination of digital signals—none of which is an illegal act—be sufficient to initiate an investigation? And if there are circumstances that would result in preventive investigations, how can we conduct them if we don't have access to historical data in real time? There are few certainties in this debate. But we do know that our digital trails will grow as more of our lives appear in bits and bytes, in records held by tomorrow's Amazons and Facebooks. And we know that to piece together networks, law enforcement and intelligence will use these data streams and need historical data to do so. Intelligence analysts will look for more clarity on how policy makers and the public want to balance the ability to discern troubling patterns in private citizens' data and the national interest in ensuring that America remains a land of personal freedom where privacy is respected. But given the threats the country faces, mapping digital interactions among people will become ever more critical to understanding terrorists, criminals and foreign spies. These tools and access to historical data are essential to mapping how bad guys operate. The trick won't be choosing privacy over security but in balancing the two. Risk-averse politics mean a HUMINT shift won’t solve Harman, 15 - Director, President and CEO, Wilson Center, member of the Defense Policy Board, the State Department Foreign Policy Board, and the Homeland Security Advisory Committee. (Jane, “Disrupting the Intelligence Community” Foreign Affairs, March/April, https://www.foreignaffairs.com/articles/united-states/2015-03-01/disrupting-intelligence-community Another factor making human intelligence gathering a harder game to play is the broader American political culture. Developing informants (let alone embedding assets) within terrorist groups is a dicey proposition. And regardless of their personal courage or willingness to serve, intelligence officers must now operate in a political climate that discourages risk taking, because the American public reacts so strongly to U.S. casualties—something the fallout from the 2012 attack on the U.S. compound in Benghazi, Libya, which killed two Foreign Service officers and two security personnel, made clear. Of course, such political constraints and risk aversion affect the U.S. military, too. This is partly why many U.S. policymakers are cool to the idea of putting boots on the ground in the fight against ISIS. The irony is that an effective air war relies on precise targeting, which requires good intelligence collected on the ground, which itself exposes U.S. personnel to the sorts of risks an air war is supposed to avoid. A combined approach to intelligence is best – neglecting any one component increases the risk of systemwide failure Sims, 7 - Professorial Lecturer at Johns Hopkins University School of Advanced International Studies; former intelligence analyst for the State Department and the Defense Intelligence Agency (Jennifer Sims (2007) Intelligence to counter terror: The importance of all-source fusion, Intelligence and National Security, 22:1, 38-56, DOI: 10.1080/02684520701200772 Traditionally, US intelligence has used three types of collection to target opponents: technical intelligence (TECHINT), human intelligence (HUMINT) and open source or unclassified intelligence (OSINT). Technical intelligence includes the collection of imagery, intercepted communications, electronic signals emitted by equipment, engineering data from captured electronics or weapons systems, and data from equipment or materials in the environment that leave signatures of their presence, such as radiation, effluent plumes and noise, that trained analysts can discern using existing data as reference.8 The productivity of any of these collectors against a particular target will depend on that collector’s access to the target’s most vulnerable point. For example, if a network of spies uses wireless radios, picking up their electronic emissions (TECHINT) will be an effective way to find them; if they use couriers, human agents secretly opening the letters and packages (HUMINT) is likely to work best; if the adversary believes he is unobserved, collecting the names of those he visits from a phone book or the sites he visits while traveling as an ostensible tourist (OSINT) would be useful. In any case, the best intelligence is obtained when the capabilities of all these collectors are quickly combined. Just as newspaper editors like to see multiple sources corroborating articles even from their best reporters, directors of national intelligence have greater confidence in intelligence that comes from multiple collectors. Better than simply hearing that Osama Bin Laden has been sighted on a road in Pakistan would be seeing imagery of his convoy and receiving intercepts from his communications that each independently confirm the initial report.9 As long as an opponent runs reasonably complex operations, some collectors will work best against certain aspects of those operations, while others will work best against the rest. Thus ‘all source’ collection can yield many pieces of a puzzle that analysts can then assemble, jumble up, and reassemble as the adversary moves, reacts to countermoves, and moves again. Beyond corroboration, however, is the concept of collection ‘boosting’ in which the productivity of one collector depends on input from others.10 The most obvious example of boosting within a single discipline is ‘direction finding’ (DFing), which may involve the use of multiple antennae to triangulate on a signal so that it can not only be identified, but also geo-located with some degree of precision.11 During World War II, the SS paired up with the Gestapo and used direction-finding to locate the wireless radios used by a network of Stalin’s spies in Europe. To their great chagrin, these radios were found in Berlin – some next to the most sensitive government ministries.12 Of course, boosting also works among collection disciplines, such as the use of spies (HUMINT) to steal the codes of adversaries so that analysts working on intercepted communications (TECHINT) can overcome the encryption methods and read the content of the messages.13 In fact, the more tightly integrated collectors are into the decisionmaking process the more likely an adversary’s spoofing of a collector will work to deflect or deceive one’s own decision-makers. Since securing collectors can be a costly and seemingly never-ending endeavor, one good way to compensate for inevitable vulnerabilities is to ensure collection is ‘constructively redundant’ – that is, sufficiently all-source that one collector’s vulnerability to spoofing will not lead to misperception or miscalculation. This kind of constructively redundant all-source collection was a lynchpin of the allied strategy to defeat Hitler during World War II; it was employed, for example, to determine whether covert and clandestine collection operations had been compromised and, specifically, in the running of the famous British counterintelligence operation known as Double Cross.14 But the history of Double Cross also alerts us to the inherent dangers of redundant collection systems: since collectors improve the reliability of each other’s products by offering independent corroboration, they depend on good systemwide counterintelligence so an adversary cannot defeat or spoof one of them and thus sow ambiguity, uncertainty and confusion throughout an interlaced collection system. If systemic counterintelligence is weak, collectors have good reason not to share their ‘take’ lest it become tainted. Poor counterintelligence can lead to system-wide failure even when the majority of collection endeavors are robust and productive.15 In some respects, then, the business of all-source data fusion for countering terrorism follows what has been done in a traditional sense against other intelligence targets. What makes the counterterrorism a particularly challenging endeavor is the terrorists’ objective of committing stealthy crime – often on the victim’s home soil. This means that law enforcement information, including information on US residents or citizens living in close proximity to the terrorists, may be important intelligence information that needs to be shared with decision-makers at the federal level working to thwart terrorist activities on a nationwide scale. Law enforcement agents, dedicated to preserving the information for the purposes of arrest and prosecution, realize the need to pass the information over to these officials but do not always know the best and most secure ways to do so. At times, in fact, the most important decisions must be made very quickly by state and local officials if they are to prevent an impending attack. In these cases, circulating information to Washington for recycling into intelligence products could delay action rather than assist it. The problem thus becomes the very nontraditional one of fusing all-source intelligence for a cop on the beat. AT: Allied cooperation turn Intelligence cooperation remains high regardless of relations Butler, 14 - Vice President of Government Strategies, IO, a privately-held data center, builder and provider. And he's also an Adjunct Fellow at the Center for New America Security, previously the First Deputy Assistant Secretary of Defense for Cyber Policy at the Pentagon (Bob, “THE INTERNATIONAL IMPLICATIONS OF THE NATIONAL SECURITY AGENCY LEAKS” 6/4) MR. BUTLER: Sure. I'm going to talk briefly about defense and then I'm going to spend most of my time, based on where I sit today, talking about tech; an industry from a global datacenter perspective. Within defense, though, I think in light of the Snowden revelations I think Cam's explanation of a kind of a aircraft accident or a car accident, kind of, proceeding slowly, holds true. There is a sense -- there was a sense of awkwardness, and a lot -- I think a lot of folks just watching to see how the United States was going to deal with it. At the same time, in these -- when these unfortunate situations happen, National Security and Defense dialogue trumps, so with coalition partners close allies, the conversation continues and it continues to grow. I think the other dimension is, you have two sides of a discussion, is above-the-table political discussion that’s going on, and then there's a discussion within the defense and intelligence community. And again, from the substance of national interest, not only U.S. national interest, but foreign national interest, there is -- you know, we built alliances, coalitions and relationships based on dialogue. Mutual self interest means those relationships are resilient Jones, 14 - Senior Fellow and Director, Project on International Strategy and Order The Brookings Institution (Bruce, “THE INTERNATIONAL IMPLICATIONS OF THE NATIONAL SECURITY AGENCY LEAKS” 6/4) MR. JONES: Well, having been fairly response, let me be slightly more upbeat in this, because if I look out over several years, I'm -- and even a shorter term that I'm more inclined to -- your last point about, there's an old news phenomenal now, or at least there can be. It's well-timed, there's about to be Brazilian elections, and there just been Indian elections, when you look at the swing states and some of the other actors who are in this, they are not U.S. allies, but they are not adversaries so kind of friend -neither friend nor foe country. I think you’ve seen relatively quickly now, a sense of, look, it's just too costly to sustain tension with the United States, so let's find ways to move past this. And elections are helpful, either brining in new actors or by sort of demarcating we can say, well that was that phase, and now we'll move on. Harold talked about that in the Brazilian context, I think we'll see that in the Indian context, a sense of, okay, that was that, let's move, let's move onwards. And I think the kind of, used phrase, mutual self-interests, but when you look at these actors and what they are looking at in big-picture terms with China, with Russia, with the frame of different regimes, and they look at the United States, the mutual self-interest is pretty rapidly putting this one back in a box at a very strategic level at least. Overall US-EU cooperation is high Archick, 14 - Specialist in European Affairs at the Congressional Research Service (Kristin, “U.S.-EU Cooperation Against Terrorism” 12/1, https://www.fas.org/sgp/crs/row/RS22030.pdf U.S.-EU cooperation against terrorism has led to a new dynamic in U.S.-EU relations by fostering dialogue on law enforcement and homeland security issues previously reserved for bilateral discussions with individual EU member states. Despite some frictions, most U.S. policy makers and analysts view the developing partnership with the EU in these areas as positive. Like its predecessor, the Obama Administration has supported U.S. cooperation with the EU in the fields of counterterrorism, border controls, and transport security. At the November 2009 U.S.-EU Summit in Washington, DC, the two sides reaffirmed their commitment to work together to combat terrorism and enhance cooperation in the broader JHA field. In June 2010, the United States and the EU adopted a “Declaration on Counterterrorism” aimed at deepening the already close U.S.-EU relationship and highlighting the commitment of both sides to combat terrorism within the rule of law. In June 2011, President Obama’s National Strategy for Counterterrorism asserted that in addition to working with European allies bilaterally, “the United States will continue to partner with the European Parliament and European Union to maintain and advance CT efforts that provide mutual security and protection to citizens of all nations while also upholding individual rights.” The EU has also been a key U.S. partner in the 30-member Global Counterterrorism Forum, founded in September 2011 as a multilateral body aimed at mobilizing resources and expertise to counter violent extremism, strengthen criminal justice and rule of law capacities, and enhance international counterterrorism cooperation.12 Recently, U.S. and EU officials have been discussing ways to combat the foreign fighter phenomenon given increasing concerns that both European and American Muslims are being recruited to fight with Islamist groups in Syria and Iraq. U.S. policy makers, including some Members of Congress, have expressed worries in particular about such foreign fighters in light of short-term visa-free travel arrangements between the United States and most EU countries. In early July 2014, U.S. Attorney General Eric Holder asserted, “We have a mutual and compelling interest in developing shared strategies for confronting the influx of U.S. and European-born violent extremists in Syria. And because our citizens can freely travel, visa-free ... the problem of fighters in Syria returning to any of our countries is a problem for all of our countries.”13 In September 2014, the White House noted that U.S. officials from the Department of Justice and the Department of Homeland Security are “working closely” with EU counterparts to “address a wide range of measures focused on enhancing counterradicalization, border security, aviation security, and information sharing” to address potential threats posed by foreign fighters.14 Allied cooperation is inevitable – US surveillance diplomacy Keiber 15 (Jason, PhD in Political Science, subfield of International Relations from Ohio State University, “Surveillance Hegemony,” http://library.queensu.ca/ojs/index.php/surveillance-andsociety/article/viewFile/snowden_hegemony/snowden_hege, Surveillance and Society, Volume 13, Number 2, 2015, silbs) << Surveillance Hegemony: Power, Norms and Institutions The extraordinary material surveillance capabilities of the US is perhaps most easily “measured” by its exorbitant funding. Nearly a third of the US’s $52.6 billion intelligence budget is dedicated to fighting terrorism (Gellman and Miller 2013). 4 The NSA in particular gets one fifth of the overall budget. This money sustains a talented workforce and produces cutting edge surveillance techniques. These capabilities are often put to use covertly and unilaterally. The US, however, can also influence others to participate in its broader, strategic surveillance efforts. One of the more striking examples of secret cooperation is the recently disclosed RAMPART-A program in which over a dozen countries allow the US to install equipment to “congested” cables so that the US can intercept phone and internet traffic (Gallagher 2014). With some caveats, both the US and the host country reportedly get access to the fruits of that surveillance. In general there are 37 states that are “approved SIGINT partners” (Greenwald 2014). This highlights the fact that other states accept (to varying degrees) core premises of how surveillance should work on an international scale. This acceptance, in turn, rests on a broader set of norms that emphasize the threat of terrorism and the necessity of counterterrorism measures. On the normative side of the ledger, a modicum of international surveillance in the form of information sharing has become not just tolerated, but held up as a responsibility states owe each other. Finally there is an array of international institutions that support surveillance activities. The US has been able to use its influential position within these institutions—the UN in particular—to establish an array of information sharing practices, all of which benefit US surveillance goals. Anti-terrorism norms existed prior to 9/11, but the attacks on that day in 2001 vaulted anti-terrorism business to the top of the agenda. Terrorism moved from a threat to the predominant threat. Pre-9/11 norms began emerging as early as the end of the 19th century as a response to anarchism (Jensen 2013), but developed more thoroughly in the 1970s (see Rapoport 2002 for more on the international dimensions of terrorism over time). The general emphasis was that states should refrain from supporting international terrorism. After 9/11 this changed into a norm urging states to actively intervene to stop international terrorism. This requires shoring up their own surveillance capacity at home and sharing information with others abroad. >> Surveillance diplomacy and assistance to other states proves it’s inevitable Keiber 15 (Jason, PhD in Political Science, subfield of International Relations from Ohio State University, “Surveillance Hegemony,” http://library.queensu.ca/ojs/index.php/surveillance-andsociety/article/viewFile/snowden_hegemony/snowden_hege, Surveillance and Society, Volume 13, Number 2, 2015, silbs) The hegemonic position of the US is evident in its CT strategies. First, the US offers carrots to “weak” states, promising to “strengthen the capacity of such War on Terror partners to reclaim full control of their territory through effective police, border, and other security forces as well as functioning systems of justice” (The White House 2006: 16). Only a powerful state could offer (and sometimes foist upon other states) such assistance. Second, over time the US shifts from unilateral bluster (which is implicitly backed by direct coercion) to a more international approach (which relies on US diplomatic strengths and advantages in international fora). In the 2006 CT strategy, the language of “willing and able” states persists, but the stark language from 2003 is absent. Instead, for those states “reluctant to fulfill their sovereign responsibilities to combat terrorist-related activities within their borders” the US would lean on diplomacy and the rest of “the international community to persuade [these] states to meet their obligations to combat terrorism and deny safe haven under U.N. Security Council Resolution 1373” (The White House 2006: 16). This is the approach of a hegemon relying on less coercive modes of influence. There are two watchwords throughout these documents—capacity and partnership. Both reflect US hegemony, and both find increasing use in the subsequent CT national strategies. State “capacity” is used twice in 2003, nine times in 2006, and 17 times in 2011 (The White House 2011). References to “partnerships” occurred 25, 41, and 59 times in the respective years. The US sees its CT relationship with other “willing” states as that of a partnership. Partnerships with “able” states are exercised through more joint efforts. In its partnerships with weaker states the US would help build their capacity to fight terrorism—a capacity that includes surveillance. The expectation is that the US approach to surveillance would be dominated by cooperative efforts with more capable states and assistance for weaker states to shore up their domestic surveillance capability. AT: Going dark / encryption NSA will circumvent encryption – they’ll use Network Exploitation Corera July 15th (Gordon Corera is Security Correspondent for BBC News, major documentaries for the BBC on the NSA, He is the author of the THE ART OF BETRAYAL: LIFE AND DEATH IN THE BRITISH SECRET SERVICE and SHOPPING FOR BOMBS: THE RISE AND FALL OF THE AQ KHAN NETWORK. In 2014 he was named Information Security Journalist of the Year at the BT INFORMATION SECURITY AND JOURNALISM AWARDS, “GCHQ WILL CIRCUMVENT ENCRYPTION NO MATTER WHAT. HERE'S HOW”, Wired, http://www.wired.co.uk/news/archive/2015-07/15/how-spies-will-circumvent-encryption-anyway, TMP) On both sides of the Atlantic the battle over encryption is hotting up , with the FBI continuing to press its case for access and the British government making noises about its fears of what an encrypted future might mean. The talk is of how ubiquitous encryption will lead to spies and law enforcement "going dark". ¶ In recent years, the state could compel national telecoms providers to give them access to data traffic, which the spies could then read. But those companies are seeing more and more of what passes through their pipes encrypted by service providers. And since Edward Snowden revealed the extent of government surveillance, those providers and other tech companies have come to see offering privacy as a selling point to their customers. But if end-to-end encryption becomes increasingly ubiquitous, is it the end of the line for the spies? History suggests not. ¶ When encryption first became available to the public in the 70s, thanks to the development of public key cryptography, one of its inventors Whit Diffie had a conversation with Arthur Levenson, a senior figure at US spy agency, the NSA. Diffie told Levenson he thought signals intelligence was finished. Levenson was less sure. "Whit, we've heard these arguments before," Levenson (whose experience stretched back to Bletchley Park) replied. Forty years on, as Diffie recalled the conversation with me, he shook his head with a rueful smile. "I was clearly mistaken," he says. When it comes to signals intelligence, "the sources are fragile, but the phenomenon is robust" as Diffie remembers one official telling him.¶ One of the things that became clear to me while writing a book on the history of computers and spies, is that the talk of going dark is not new and the smartest spies know they can adapt. Signals intelligence is an inherently insecure business in which the tiniest change can instantly dry up a valuable stream of intelligence.¶ When Nazi Germany upgraded its Enigma machine as the second world war started, the head of the Government Code and Cypher School (soon to become GCHQ) said it would be "a waste of time and public money" to even try to crack the new codes. But Alan Turing and others took up the challenge, and proved them wrong. As the Cold War started, Soviet codes proved near impossible to break. But the spies instead carried out massive traffic analysis on the externals of communications to extract useful intelligence. By establishing what normal patterns of Soviet military communications were, GCHQ and NSA would look for any change -this might be an indicator of troops on the move, and potentially war. This was the real -- and secret -birth of today's buzz word of "big data". Finally, when fibre-optic cables spread in the 90s, the spies again thought their satellite-based collection model was over, but they adapted (as Edward Snowden soon revealed). The point about end-to-end encryption is that there is still an endpoint where the message is clear and readable. And so the spies at GCHQ and NSA will likely shift towards greater exploiting of target endpoints by what they call Computer Network Exploitation -- what everyone else calls hacking . This may also be done on a much larger scale than in the past , with references in some recent reports to something called "bulk" computer network exploitation. There are indications from the Snowden leaks that the US may be able to pre-install large numbers of implants in computers, ready to be activated. Spies will also do what they have done in the past by looking for weaknesses in encryption protocols (as they discovered with Enigma machines) and for any human failings in implementation. These may offer the chink in the armour which clever mathematicians and machines can together work on , as happened again at Bletchley. ¶ Other forms of surveillance may also play a role -- after all, a covertly placed camera above your PC can catch you type in your password and outwit the very best forms of encryption. This kind of activity needs to be authorised if the state wants to do it, however, and new laws planned for the UK are expected to overhaul the entire surveillance system to make it clearer what can and cannot be done ,and who should sign it off (perhaps soon a judge, rather than a minister).¶ One of Whit Diffie's reflections about why he was mistaken back in the 70s is that, while much of the emphasis is on what proportion of traffic the state can read, there is another part of the equation for signals intelligence. And that is the overall volume of communications that are out there. The trend over the years has been for almost exponential growth and all the signs are that this will continue as we connect up more and more internet of things devices. And not everything will be properly encrypted . In other words, even if a smaller proportion of the communications is readable, there is still more out there overall .¶ The connected devices in our household, like our fridges and those that we wear and carry, like our watches, are likely to be potentially highly revealing sources of intelligence. The shift towards encryption may also increase the pressure to carry out traffic analysis and extract meaning from metadata rather than the unreadable content. More will also be made of open source forms of intelligence (information searchable from the web and social media like Twitter which might reveal connections, links or locations) -- this is already proving increasingly valuable.¶ The smartest spies know encryption is coming -- and that they risk being on the wrong side of the argument if they oppose it, as the public increasingly understands its value in protecting their data from a range of malevolent actors like criminals and foreign hackers. The spread may mean spies have a lean period as existing intelligence flows do, in fact, go dark. But history suggests that if they are as smart in the future as they have been in the past, then they will find new ways to do their job. We can crack encryptions now, “Going Dark” not an issue – local information, metadata, and new databases are happening now Swire July 15th (Peter Swire is the Huang professor of law and ethics at the Georgia Institute of Technology, senior counsel with Alston & Bird LLP, and a cyber-fellow with New America, Slate Magazine, “The Golden Age of Surveillance”, http://www.slate.com/articles/technology/future_tense/2015/07/encryption_back_doors_aren_t_nece ssary_we_re_already_in_a_golden_age_of.html, TMP) In recent months, law enforcement, led by FBI Director James Comey, has waged war against the “going dark” problem—criminals using secure communications technologies, particularly encryption , to evade justice. Its solution to this problem is to encourage or require technology companies to build in back doors to allow the government to circumvent, say, encryption on your iPhone. But in reality, we are currently in a golden age of surveillance . The “going dark” argument should not be used as a reason to support back doors or other special access by law enforcement to encrypted communications.¶ Last Wednesday I had the privilege of testifying before the Senate Judiciary Committee on the balance between public safety and encryption. I have been researching and writing on encryption for two decades, including serving on President Obama’s Review Group on Intelligence and Communications Technology. My testimony stressed three arguments¶ First, I agree that law there are indeed specific ways that enforcement and national security agencies lose specific previous capabilities due to changing encryption technology. These specific losses, however, are more than offset by massive gains , including: (1) location information; (2) information about contacts and confederates; and (3) an array of new databases that create digital dossiers about individuals’ lives.¶ The adoption in the past 20 years of text messaging, an area highlighted by law enforcement as an example of “going dark,” specifically shows enormous gains to law enforcement. Although relatively few text messages were sent 20 years ago, by 2010 the number exceeded 6 trillion texts per year. For the predominant share of those messages, the content is available from the provider. Even for the subset where the content is encrypted , law enforcement can gain access to the metadata.¶ Being able to access texts and other metadata is enormously helpful in mapping the social graphs of suspects. Before we all communicated online, most of our social interactions (except our phone calls) left no records, and the content of communications left no trace unless law enforcement happened to have an active wiretap on a phone call. Today, however, metadata leaves traces of every electronic communication a suspect has , showing whom they speak to, how often, how long, and from where. Identifying these other confederates gives law enforcement the opportunity to use a number of other tools to access encrypted content, ranging from confidential informants, to surveillance on the coconspirators, to offering immunity to one participant to gain access to the content of communications with the others.¶ Law enforcement has expressed particular concern about encrypted text messaging services, such as WhatsApp. For text messages, it might be tempting to say that law enforcement could call the glass half empty (some texts are encrypted) or half full (some texts are in the clear). With more than 6 trillion messages filling the cup, though, it takes chutzpah to say the glass is empty. Text messages are a prime example of a golden age of surveillance, and not of going dark.¶ Second , government-mandated vulnerabilities would threaten severe harm to cybersecurity, privacy, human rights, and U.S. technological leadership while not preventing effective encryption by adversaries . As occurred in the 1990s, a diverse coalition of cybersecurity experts, technology companies, privacy experts, human rights activists, and others has expressed vociferous and united opposition to government-mandated encryption vulnerabilities. These concerns include:¶ Technology companies, even before Edward Snowden, had multiple reasons to deploy strong encryption to enhance cybersecurity and customer trust . The ongoing development of encryption should thus not be seen primarily as a short-term response to Snowden’s revelations.¶ Overwhelming technical problems and costs result from mandates to create vulnerabilities in encryption.¶ U.S. government support for encryption vulnerabilities increases cybersecurity problems in the “least trusted countries” and globally, and undermines U.S. human rights policies. The United States should be a strong example for cybersecurity and human rights , rather than an excuse used by repressive regimes to surveil U.S.-based businesses and individuals and clamp down on political dissent.¶ Mandated vulnerabilities are bad industrial policy — they threaten U.S. technological leadership without preventing bad actors from using strong encryption.¶ An impressive new technical study by a group of experts was released on July 6 just before the hearing, titled “Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications.” The new study highlights three general problems. Providing mandated access “would force a U-turn from the best practices now being deployed to make the Internet more secure.” Furthermore, building in exceptional access would substantially increase system complexity, “making security testing difficult and less effective.” Finally, exceptional access would create concentrated targets for bad actors: “Recent attacks on the United States Government Office of Personnel Management show how much harm can arise when many organizations rely on a single institution that itself has security vulnerabilities.”¶ One might perhaps wonder whether the technical experts are stretching a point by making such definitive statements. Based on my two decades of work on these issues, the technical experts say the same things in private as are written in blue ribbon reports. The passion that the most eminent technical experts show here is due to their conviction based on hard-fought experience, and not a lobbying ploy.¶ Third , the Review Group on I ntelligence and C ommunications T echnology report, released in December 2013, unanimously and clearly recommended that the U.S. government vigorously encourage the use of strong encryption, stating:¶ We recommend that, regarding encryption, the US Government should:¶ (1) fully support and not undermine efforts to create encryption standards;¶ (2) not in any way subvert, undermine, weaken, or make vulnerable generally available commercial software; and¶ (3) increase the use of encryption and urge US companies to do so, in order to better protect data in transit, at rest, in the cloud, and in other storage.¶ With full awareness of the “going dark” concerns, we sharply criticized any attempt to introduce vulnerabilities into commercially available products and services, and found that even temporary vulnerabilities should be authorized only after administrationwide scrutiny. Based on the topsecret briefings and our experience, we found these policies would best fight cybercrime, improve cybersecurity, build trust in the global communications infrastructure, and promote national security.¶ At heart, providing access exceptions for U.S. law enforcement and intelligence agencies will be harmful, rather than helpful, to national security. The inability to directly access the content of a small fraction of these communications does not warrant the subsequent damage that would result to privacy and to U.S. economic, diplomatic, and security interests.¶ Special thanks to Justin Hemmings for assistance with this project.¶ This article is part of Future Tense, a collaboration among Arizona State University, New America, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter. Impacts 1nc – domestic hate groups Radical right lone wolf terrorism increasing now – surveillance is key to thwart attacks. SPLC 2/12 (Nonprofit legal advocacy and civil rights organization, “SPLC Report: ‘Lone Wolf’ Domestic Terrorism on the Rise,” Southern Poverty Law Center, 12 February 2015, http://www.splcenter.org/get-informed/news/splc-report-lone-wolf-domestic-terrorism-on-the-rise, *fc) As the White House prepares to host a major summit examining the threat of violent extremism next week, a Southern Poverty Law Center study of domestic terrorism released today finds that the vast majority of this violence is coming from “lone wolves” or “leaderless resistance” groups composed of no more than two people. The report – Age of the Wolf: A Study of the Rise of Lone Wolf and Leaderless Resistance Terrorism (download a PDF of the report)– examines more than 60 domestic terror incidents. Almost threequarters of the incidents were carried out, or planned, by a lone wolf, a single person acting without accomplices. Ninety percent of the incidents were the work of no more than two persons. The study, which included violence from both the radical right and homegrown jihadists, also found that a domestic terrorist attack or foiled attack occurred, on average, every 34 days. It covered a period between April 1, 2009 and Feb. 1, 2015, and was based on records maintained by Indiana State University and the University of Maryland’s Global Terrorism Database, along with the SPLC’s own roster of apparent domestic terror incidents. “ Our study clearly shows the urgent need for federal agencies to reinvigorate their work studying and analyzing the radical right ,” said Mark Potok, SPLC senior fellow and editor of the report. “And it’s important to recognize the trend away from organized groups committing acts of domestic terror. As Timothy McVeigh demonstrated with the Oklahoma City bombing, lone wolves and small cells of domestic terrorists can create massive carnage. ” The White House will hold a summit on Feb. 18 to examine the cycle of radicalization that spawns such extremists, but there is a danger, in the wake of the Charlie Hebdo attacks in France, that Islamist terror will become the focus. While jihadism is a deadly serious concern, the report shows that authorities should not focus on it to the exclusion of other threats. A timeline included with the report details a lengthy list of deadly attacks and plots across the country. They include a 2014 rampage in Nevada by a husband and wife with anti-government views that left two police officers and another man dead, a 2012 attack on a Wisconsin Sikh temple by a long-time neo-Nazi that killed six victims, and a 2010 attack that left an Internal Revenue Service (IRS) manager dead after a man who had attended radical anti-tax group meetings crashed his single-engine plane into an IRS office in Austin, Texas. “The lone wolf’s chief asset is that no one else knows of his violent plans, which makes them exceedingly difficult to disrupt,” Potok said. “It is imperative that authorities, including those gathering at the White House next week, take this threat seriously. Anything less would be an invitation to disaster.” They’ll use WMD Blair 14 (Charles P. Blair, Senior Fellow on State and Non-State Threats for the Federation of American Scientists who teaches classes on terrorism and WMD technology at John Hopkins University and George Mason University, “Looking clearly at right-wing terrorism,” Bulletin of the Atomic Scientists, 9 June 2014, http://thebulletin.org/looking-clearly-right-wing-terrorism7232, *fc) Five years ago the US Department of Homeland Security’s Homeland Environment Threat Analysis Division released an assessment of US far-right extremism. Initially intended for law enforcement and intelligence agencies only, the report—“Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment”—was almost immediately leaked. The report warned that small cells practicing “leaderless resistance” and “white supremacist lone wolves [posed] the most significant domestic terrorist threat.” Significantly, it highlighted the likelihood of expanded attempts by far-right extremists “to recruit and radicalize returning veterans in order to boost their violent capabilities.” Overall, the report warned of trends similar to “the 1990s when rightwing extremism experienced a resurgence.” That far-right extremist rally reached a violent crescendo with the bombing of the Alfred P. Murrah federal building in Oklahoma City on April 19, 1995. Reflecting on the past five years, a leading far-right extremism expert I recently interviewed described the homeland security report as “prophetic.” Mark Pitcavage, the Anti-Defamation League’s director of investigative research, explained that most of the warnings in the 2009 report have become realities. Yet at the time of its release, the document was derided by many inside and outside of government as “ridiculous [and] deeply offensive,” an “inconceivable” assault on US veterans, and, in general, “a piece of crap.” Buckling under political pressure from conservatives, homeland security rapidly repressed the report. Promptly removed from department's website, the tabooed document also disappeared from the computer systems of state and local law enforcement divisions as well as federal intelligence agencies. The homeland security unit responsible for the report was virtually muzzled. The report essentially fell into obscurity. The report’s demise was an unfortunate loss for all levels of law enforcement. Since its release, credible plots and attacks by violent extremists have surged. As the report forewarned, responsibility for the vast majority of these events lies with far-right individual extremists and extreme groups. Moreover, veteran and active-duty military personnel, when compared to the general population, were disproportionally involved in far-right extremist incidents. In just the first two months following the report, significant attacks occurred via the hands of major components of far-right extremism. For example, in May 2009, a “soldier” in the Christian terrorist anti-abortion network Army of God assassinated Kansas late-term abortion provider George Tiller. One day earlier, members of an antiimmigrant vigilante group—the Minutemen American Defense—invaded the home of an Arizona Latino and his 9-year-old daughter. Both were killed as part of a plan aimed at securing money to fund the group’s anti-immigrant terrorist operations. Less than two weeks later an octogenarian white supremacist shot and killed a security guard at the US Holocaust Memorial Museum. Reflecting the conspiracy theories adhered to by many white supremacists, hand-written notes found in his car read, “The Holocaust is a lie… Obama was created by Jews… Jews captured America’s money. Jews control the mass media.” In the five years following the report’s release, far-right extremists have also plotted against and, at times, successfully attacked a wide-range of additional targets, including government buildings and leaders, law enforcement personnel, polling stations, courthouses and judges, a Martin Luther King Jr. Day parade, anti-racist gatherings, a Mexican consulate, synagogues and other Jewish institutions, mosques, a Sikh temple, African-Americans and other minorities, and interracial couples and families. Despite this grim record—amid a political environment that often discounts warnings of far-right extremist threats and terrorism—the Department of Homeland Security remains reluctant to address the growing threat. One of the 2009 report’s primary authors noted that since “our report was leaked, DHS has not released a single report of its own on this topic. Not anything dealing with non-Islamic domestic extremism—whether it's anti-abortion extremists, white supremacists … the whole gamut.” Only very recently have reports been released by the unit in question; the few that address far-right extremism do so parsimoniously and with clear caution. Far-right terrorism in the US is more common than other types of violent radicalism. A recent study by the New America Foundation found that since 9/11, far-right extremists “have killed more people in the United States than have extremists motivated by al Qaeda's ideology.” And perhaps most important, far-right terrorists are more prone to seek unconventional weapons—that is, weapons that might generate mass casualties or mass disruption . The study found that while no “jihadists indicted or convicted in the United States” had obtained or employed chemical or biological warfare agents, 13 individuals motivated by far-right extremist ideology, “acquired or used chemical or biological weapons or their precursor materials.” In the recent past, far-right extremists have also plotted the use of radiological weapons. The threat of major acts of far-right terrorism—perhaps aided by people with military training—is real. It should not be exaggerated, but neither should it be suppressed for political or ideological reasons. Hate group terrorism increasing Right-wing terrorism on the rise – DHS report Perez and Bruer 15 (Evan Perez and Wes Bruer are staff writers for CNN. "DHS intelligence report warns of domestic right-wing terror threat," Feb 20, 2015. www.cnn.com/2015/02/19/politics/terror-threathomeland-security/) jsk Washington (CNN) They're carrying out sporadic terror attacks on police, have threatened attacks on government buildings and reject government authority. A new intelligence assessment, circulated by the Department of Homeland Security this month and reviewed by CNN, focuses on the domestic terror threat from right-wing sovereign citizen extremists and comes as the Obama administration holds a White House conference to focus efforts to fight violent extremism. Some federal and local law enforcement groups view the domestic terror threat from sovereign citizen groups as equal to -- and in some cases greater than -- the threat from foreign Islamic terror groups, such as ISIS, that garner more public attention. The Homeland Security report, produced in coordination with the FBI, counts 24 violent sovereign citizen-related attacks across the U.S. since 2010. The government says these are extremists who believe that they can ignore laws and that their individual rights are under attack in routine daily instances such as a traffic stop or being required to obey a court order. They've lashed out against authority in incidents such as one in 2012, in which a father and son were accused of engaging in a shootout with police in Louisiana, in a confrontation that began with an officer pulling them over for a traffic violation. Two officers were killed and several others wounded in the confrontation. The men were sovereign citizen extremists who claimed police had no authority over them. Among the findings from the Homeland Security intelligence assessment: "(Sovereign citizen) violence during 2015 will occur most frequently during routine law enforcement encounters at a suspect's home, during enforcement stops and at government offices." DHS has documented examples of violence by sovereign citizen extremists since 2010. They range from incidents that occurred in the home and at traffic stops to attacks on government buildings. The report adds that "law enforcement officers will remain the primary target of (sovereign citizen) violence over the next year due to their role in physically enforcing laws and regulations." The White House has fended off criticism in recent days for its reluctance to say the words "Islamist extremism," even as the conference this week almost entirely focused on helping imams and community groups to counteract the lure of groups like ISIS. Absent from the White House conference is any focus on the domestic terror threat posed by sovereign citizens, militias and other anti-government terrorists that have carried out multiple attacks in recent years. An administration official says the White House is focused on the threat from all terrorists, including from sovereign citizen and other domestic groups. "I don't think it's fair to say the (White House) conference didn't address this at all," the official said, adding that President Barack Obama addressed the need to combat "violent ideologies" of all types. An official at the Justice Department, which is leading the administration's counter-radicalization effort, says many of the tactics aimed at thwarting radical Islamic recruitment of young people can also be used to fight anti-government extremist groups. While groups like ISIS and al Qaeda garner the most attention, for many local cops, the danger is closer to home. A survey last year of state and local law enforcement officers listed sovereign citizen terrorists, ahead of foreign Islamists, and domestic militia groups as the top domestic terror threat. The survey was part of a study produced by the University of Maryland's National Consortium for the Study of Terrorism and Responses to Terrorism. In 2013, a man who held anti-government views carried out a shooting attack on three Transportation Security Administration employees at Los Angeles International Airport, killing one TSA officer. Last year, a couple killed two police officers and a bystander at a Las Vegas Walmart store. Officers inspect a car outside Los Angeles International Airport in 2013 after three TSA employees were shot. Mark Potok, senior fellow at the Southern Poverty Law Center, said that by some estimates, there are as many as 300,000 people involved in some way with sovereign citizen extremism. Perhaps 100,000 people form a core of the movement, he said. The federal government's focus on the domestic groups waxes and wanes, Potok said, in part because the threat from foreign groups like al Qaeda and its affiliates. Potok says sovereign citizen groups have attracted support because of poor economic conditions. Some groups travel the country pitching their ideology as a way to help homeowners escape foreclosure or get out of debt, by simply ignoring the courts and bankruptcy law. Right-wing extremism increasing – military veterans are expanding movements. Blair 14 (Charles P. Blair, Senior Fellow on State and Non-State Threats for the Federation of American Scientists who teaches classes on terrorism and WMD technology at John Hopkins University and George Mason University, “Looking clearly at right-wing terrorism,” Bulletin of the Atomic Scientists, 9 June 2014, http://thebulletin.org/looking-clearly-right-wing-terrorism7232, *fc) The military and the far right. Throughout the history of US far-right extremism, many of its most influential and infamous members have had ties to the military. A small sampling includes the former Confederate soldiers who founded the Ku Klux Klan in 1866; its first leader was a former Confederate general, Nathan Bedford Forest. The highly influential Willis Carto served in World War II before a 50 year career with far-right extremism that encompassed, according to the Anti-Defamation League, “nearly every significant far-right movement in the country, from neo-Nazism to militias, segregationism to Holocaust denial.” An aide to General McArthur, William Potter Gale, oversaw guerilla resistance in the Philippines during World War II before helping establish the racist, anti-Semitic, and apocalyptic Christian Identity movement and the virulently anti-federal government umbrella organization Posse Comitatus. The North Dakota Posse leader Gordon Kahl, who died in a 1983 shootout with federal agents, and whom many far-right extremists consider to be the Posse's greatest martyr, earned two purple hearts as an aircraft gunner in World War II. Aryan Nations founder Richard Butler served in World War II. The trend has continued in more recent years: Neo-Nazi Louis Beam was a Vietnam veteran. The founder of one of the leading racist groups of its time, White Aryan Resistance, Tom Metzger, spent the early 1960s in the US Army. Metzger is often credited with being the “godfather” of the racist skinhead scene. Timothy McVeigh, whose actions during Operation Desert Storm merited him the Bronze Star, later killed 168 people, including 19 children in the 1995 Oklahoma City truck bombing; his accomplice, Terry Nichols, was also a veteran. Army of God adherent and Centennial Olympic Park and abortion clinic bomber Eric Rudolf was an Army veteran. In August 2012, Army veteran Wade Michael Page killed six people in a racially motived shooting rampage at a Wisconsin Sikh temple. Radicalized during his time at Ft. Bragg, Page told an interviewer, “If you don’t go in the military a racist, you’re sure to leave as one.” To be clear, the homeland security department's 2009 report on far-right extremism did not denigrate US military personnel or exaggerate their past or potential for terrorism. Many studies and reports demonstrate that veteran and active-duty US military personnel account for only a miniscule part of farright extremist plots and attacks. But the percentage of individuals and members in far-right groups with military experience is larger than the corresponding percentage of those with military experience in the population at large. And in a 2008 study, the FBI reported that veteran and active duty military personnel “frequently occupy leadership roles within extremist groups …[T]he military training veterans bring to the movement and their potential to pass this training on to others can increase the ability of lone offenders to carry out violence from the movement’s fringes.” The veterans issue precipitated a political backlash against the 2009 report on far-right extremists’ potential for terrorist acts. In one of many examples of the backlash, US Rep. Lamar Smith (R-Texas) argued that in contrast to the 2009 report, an earlier homeland security report had identified “actual” extremists and terrorists, “like the Earth Liberation Front and the Animal Liberation Front.” Congressional leaders would be wise to exclude politics from their assessments of Department of Homeland Security reports. As a matter of documented fact, far-right extremists appear to pose the greatest existing terrorist threat to the United States. The danger manifest by extremist terrorism is not a linear one; as Potok observed, it ebbs and flows. But one thing is certain: Events can catapult a red-hot movement into a white-hot violent crisis. Far-right extremist leaders literally declared war on the federal government after the horribly botched events at Ruby Ridge, Idaho in 1992 and, a year later, the disastrous siege of the Branch Davidian compound in Waco, Texas. Two years to the day after the latter incident, Timothy McVeigh unleashed his bomb in Oklahoma City. The recent Nevada standoff between rancher Cliven Bundy and federal authorities is in one sense just a continuation of Sagebrush Rebellion behavior that has come and gone in the Mountain West for decades. It also offers a window into the thinking of a group of far-right “patriots,” and an opportunity to ponder how governmental miscalculation might inflame others, at distant times and places. The nation faces many threats; one of them is far-right extremism and its propensity for violence. Suppressing discussion of that threat will not lessen it. White supremacist terrorist plots are rising – they’re backlashing against changing racial demographics. Nevins 1/16 (Sean Nevins, Staff writer for MintPress with an M.A. from Lund University, “White Supremacy And Homegrown Terrorism Pose A Growing Threat In The US,” MintPress, 16 January 2015, http://www.mintpressnews.com/white-supremacy-homegrownterrorism-pose-growing-threat-us/201258/, *fc) Colorado is currently home to 17 hate groups, according to the SPLC’s Hate Map. These include the Loyal White Knights of the Ku Klux Klan and The Creativity Movement — both white supremacist organizations. However, Beirich told MintPress, “There’s nothing off the top of my head that says, ‘Oh, Colorado would be a logical place for something like this.’” “That said, NAACP offices have been targeted in various parts of the country, so why not Colorado?” Since the 1995 Oklahoma City bombing, in which 168 people were killed in a plot engineered by rightwing extremists Timothy McVeigh and Terry Nichols, there have been 110 terrorist plots and raciallymotivated rampages in the United States by the radical right, usually white supremacists. One of the most recent manifestations of extreme violence motivated by white supremacy and antiSemitism was last year’s shooting at the Overland Park Jewish Community Center in Kansas, which claimed the lives of three people. The alleged killer was Frazier Glenn Miller, Jr., 74, who had spent time in prison in the 1980s for planning to kill Morris Dees, the founder of the SPLC. Miller is the founder of the White Patriot Party and the Carolina Knights of the Ku Klux Klan. There are currently 939 active hate groups in the U.S. In 2000, there were 602. The numbers are rising and “over 50 percent of them are white supremacist ,” said Beirich. The number of hate groups generally correlates with the population, according to Mark Potok, a senior fellow at the SPLC. Potok told Business Insider last year that two groups people should watch are the American Freedom Party, which is anti-immigrant and has moulded itself into a political party contesting elections, and Crew 41, a skinhead gang. A couple that reportedly belongs to Crew 41 were sentenced to life imprisonment in March for plotting and carrying out the murder of a registered sex offender and his wife. Vice News recently published a documentary, “The Ku Klux Klan Is Boosting Its Numbers by Recruiting Veterans,” in which reporter Rocco Castoro goes to Mississippi and speaks with KKK members. In one conversation, Steve Howard, the former Imperial Wizard of the North Mississippi White Knights, says, “I believe that white people need to have their own country, just like I believe that blacks need to have their own country here in America, but it’s going to take all out war to obtain it.” The 2000 U.S. Census has been one of the most important factors in the rise of hateful extremists, Beirich explained. It showed that by the year 2042 white people would be a minority in the U.S. Those figures sparked a growth in hate groups, she said, noting that white supremacists likely became nervous about the country becoming less white and more diverse. “Obviously, the rise in the number of hate groups is a reflection of a backlash in this country against changing demographics ,” she said. She concluded that racism and the rise of white supremacist groups in the country should be a cause for concern among citizens and law enforcement. “This white supremacy is an ideology that should have been put to bed with the Civil Rights Act, or the Civil War for God’s sake, right!” she said. “The fact that this country’s been white supremacist for most of its existence, until the mid-60s, means that we don’t want to go back to that where people are oppressed because of the color of their skin.” Police consensus that right-wing threat is growing – more likely than other terrorism Kurzman and Schanzer 15 (Charles Kurzman teaches sociology at University of North Carolina Chapel Hill. David Schanzer is director of the Triangle Center on Terrorism and Homeland Security at Duke. "The Growing Right-Wing Terror Threat," June 16, 2015. www.nytimes.com/2015/06/16/opinion/the-otherterror-threat.html?_r=0) jsk But headlines can mislead. The main terrorist threat in the United States is not from violent Muslim extremists, but from right-wing extremists. Just ask the police. In a survey we conducted with the Police Executive Research Forum last year of 382 law enforcement agencies, 74 percent reported anti-government extremism as one of the top three terrorist threats in their jurisdiction; 39 percent listed extremism connected with Al Qaeda or like-minded terrorist organizations. And only 3 percent identified the threat from Muslim extremists as severe, compared with 7 percent for anti-government and other forms of extremism. The self-proclaimed Islamic State's efforts to radicalize American Muslims, which began just after the survey ended, may have increased threat perceptions somewhat, but not by much, as we found in follow-up interviews over the past year with counterterrorism specialists at 19 law enforcement agencies. These officers, selected from urban and rural areas around the country, said that radicalization from the Middle East was a concern, but not as dangerous as radicalization among right-wing extremists. An officer from a large metropolitan area said that "militias, neo-Nazis and sovereign citizens" are the biggest threat we face in regard to extremism. One officer explained that he ranked the right-wing threat higher because "it is an emerging threat that we don't have as good of a grip on, even with our intelligence unit, as we do with the Al Shabab/Al Qaeda issue, which we have been dealing with for some time." An officer on the West Coast explained that the "sovereign citizen" anti-government threat has "really taken off," whereas terrorism by American Muslim is something "we just haven't experienced yet." Last year, for example, a man who identified with the sovereign citizen movement — which claims not to recognize the authority of federal or local government — attacked a courthouse in Forsyth County, Ga., firing an assault rifle at police officers and trying to cover his approach with tear gas and smoke grenades. The suspect was killed by the police, who returned fire. In Nevada, anti-government militants reportedly walked up to and shot two police officers at a restaurant, then placed a "Don't tread on me" flag on their bodies. An anti-government extremist in Pennsylvania was arrested on suspicion of slut gin two state troopers, killing one of them, before leading authorities on a 48-day manhunt. A right-wing militant in Texas declared a "revolution" and was arrested on suspicion of attempting to rob an armored car in order to buy weapons and explosives and attack law enforcement. These individuals on the fringes of right-wing politics increasingly worry law enforcement officials. Law enforcement agencies around the country are training their officers to recognize signs of antigovernment extremism and to exercise caution during routine traffic stops, criminal investigations and other interactions with potential extremists. "The threat is real," says the handout from one training program sponsored by the Department of Justice. Since 2000, the handout notes, 25 law enforcement officers have been killed by right-wing extremists, who share a "fear that government will confiscate firearms" and a "belief in the approaching collapse of government and the economy." Despite public anxiety about extremists inspired by Al Qaeda and the Islamic State, the number of violent plots by such individuals has remained very low. Since 9/11, an average of nine American Muslims per year have been involved in an average of six terrorism-related plots against targets in the United States. Most were disrupted, but the 20 plots that were carried out accounted for co fatalities over the past 13 and a half years. In contrast, right-wing extremists averaged 337 attacks per year in the decade after 9/11, causing a total of 254 fatalities, according to a study by Arie Perliger, a professor at the United States Military Academy's Combating Terrorism Center. The toll has increased since the study was released in 2012. Other data sets, using different definitions of political violence, tell comparable stories. The Global Terrorism Database maintained by the Start Center at the University of Maryland includes 65 attacks in the United States associated with right-wing ideologies and 24 by Muslim extremists since 9/11. The International Security Program at the New America Foundation identifies 39 fatalities from "non jihadist" homegrown extremists and 26 fatalities from "jihadist" extremists. Meanwhile, terrorism of all forms has accounted for a tiny proportion of violence in America. There have been more than 21S.000 murders in the United States since 9/11. For every person killed by Muslim extremists, there have been 4,300 homicides from other threats. Public debates on terrorism focus intensely on Muslims. But this focus does not square with the low number of plots in the United States by Muslims, and it does a disservice to a minority group that suffers from increasingly hostile public opinion. As state and local police agencies remind us, right-wing, antigovernment extremism is the leading source of ideological violence in America. Lone wolves uniquely likely – military radicalization Kennard 15 (Matt Kennard is a fellow at the Centre for Investigative Journalism in London. "American ISIS: The Domestic Terrorist Fallout of the Iraq War," Feb 13, 2015. www.vice.com/read/american-isis-the-domestic-terrorist-fallout-of-the-iraq-war-213) jsk Just weeks before the hardcover edition of Irregular Army came out in September 2012, a neo-Nazi US Army veteran walked into a Sikh temple in Oak Creek, Wisconsin, and shot dead six worshippers. A topic that had never managed to hold the interest of the American media during the War on Terror—the extremists being trained by the country's military—suddenly moved front and center. Many Americans wondered how this white supremacist could have survived in the military for so long; surely something must have gone wrong. But the Wisconsin shooter, Wade Michael Page, was merely one of many far-right radicals who have used the US military over the past two decades to gain access to the highest-grade weaponry in the world, alongside attendant training. The Springfield semiautomatic 9mm handgun used by Page in Oak Creek was, for instance, very similar to the Beretta M9, the civilian version of the pistol issued by the US military. And neo-Nazi veterans, like Page, were explicit about wanting to use their new military skills in the coming race war they hoped would ignite in the US. Page's heavy-metal white-power band, called End Apathy, was itself a call to arms. According to a 2010 interview he gave to a white supremacist website, he wanted to "figure out how to end people's apathetic ways"; the band was meant to "be the start towards moving forward." As details emerged, they seemed to confirm what I had written in this book. The most shocking part of Page's story was that he was completely open about his neo-Nazi views while serving in the army during the 1990s, a decade before the War on Terror. Page was no army private either—he was assigned to the esteemed psychological operations ("psyops") branch. But despite this senior status, the independent American military newspaper Stars and Stripes wrote in the aftermath of the shooting that Page was "steeped in white supremacy during his army days and spouted his racist views on the job as a soldier." Page served from 1992 to 1998. The latter part of this period putatively witnessed the US military taking a strong stand against white supremacism within the ranks after neo-Nazi active-duty paratrooper James Burmeister murdered an African American couple near Fort Bragg, North Carolina, in 1995. Page's story actually bore an uncanny resemblance to that of one of the main characters in Irregular Army: Forrest Fogarty, the War on Terror veteran I spent time with in Tampa, Florida. Like Page, Fogarty was a neo-Nazi; like Page, he was a member of the Hammerskins, the most violent skinhead group in the US; like Page, he served in the US military (in Fogarty's case in Iraq from 2004 to 2005); and like Page, Fogarty was the lead singer in a neo-Nazi rock band. Fogarty had in fact signed up to the US army, complete with racist tattoos, in 1997, around the same time Page was denied reenlistment for alcoholism (not neo-Nazism). In fact, as I looked into the history of Page I even came across images of him playing his racist rock with Fogarty himself: they performed in the same band at neo-Nazi concerts. The US military, it would seem, has a penchant for Nazi rockers. The media ate up the Pentagon's reflexive lies during the fallout from the massacre. When Al Jazeera interviewed me, they asked the Pentagon for clarification of their policy on extremists. A spokesman told them that "participation in extremist activities has never been tolerated." The media interest endured for a couple of weeks, then the silence returned. But over the subsequent two years, the threats I warned about in the book played out with frightening regularity. Many of the predictions of "blowback" from a decade (and more) of unchecked extremist and criminal infiltration were coming true. Not long after the Sikh Temple massacre, an anti-government militia of active-duty soldiers at Fort Stewart—where Fogarty had been based—was discovered. This heavily armed group had already murdered an active-duty soldier and his wife and was planning to assassinate President Barack Obama. According to prosecutors, the soldiers had spent nearly $90,000 on guns and bomb components. Not long after this cell was discovered, a Missouri National Guardsman admitted to helping train a white supremacist group, American Front, whose members were preparing for a domestic race war. These extremists, court documents detailed, were alleged to have committed hate crimes alongside paramilitary training in "furtherance of a civil disorder." The steady beat of tragedies kept coming. In April 2014, an Army veteran and "grand dragon" of the Carolina Knights of the Ku Klux Klan, Frazier Glenn Miller, killed three people at two Jewish centers in a suburb of Kansas City. Miller had retired from the Army in the 1990s as a master sergeant after 20 years of active duty, including two tours in Vietnam and 13 years as a member of the elite Green Berets. These cases were particularly scary because they showed the long lineage of this problem. In the book I had focused on the War on Terror years because in that period even the light regulations that were in place were lit up in flames, but Page and Miller demonstrated the long incubation period allowed for these errant extremist veterans to turn into cold-blooded murderers. Over the next two decades, US society will doubtless endure other versions of these massacres—involving veterans from Iraq and Afghanistan this time round. The scars from these wars are long, deep and may be impossible to salve. The US military has refused to take seriously the dangers posed by the radicals in its service—and its own soldiers, alongside the population they are meant to defend, are paying a heavy price. Many more ticking time bombs—unlike Miller and Page, not yet detonated—are now settling back home after a decade of hard combat training. But it was not just white supremacist soldiers and veterans who were proving dangerous. Many of the other problems outlined in the book—from the US military's failure to deal with post-traumatic stress disorder (PTSD) or the economic hardship of the veteran community—were coming back to bite the US populace. In Wade Page's case, for example, it was a confluence of factors that turned him into a murderer. Like many veterans, his house had been foreclosed on in the aftermath of the financial crisis. This toxic mix involving PTSD, extremism, the financial crisis and its tragic aftermath was a recurrent theme. In May 2014, Marine Corps Sgt. Andrew Tahmooressi, who had served in Afghanistan and was being treated for PTSD in a VA hospital, was arrested in Mexico with a huge cache of heavy weaponry. If Mexican police hadn't picked him up, who knows what carnage he could have caused south of the border with his training, weapons skills and troubled psyche—all courtesy of the US military. Domestic terrorism is increasing – people are influenced by jihadism – law enforcement is key to stop attacks. Smith and Beall 1/17 (Carrie Blackmore Smith, Reporter at the Cincinnati Enquirer with a B.A. in Journalism from Bowling Green State University, Joel Beall, Writer at the Cincinnati Enquirer, “Number of homegrown terrorists is rising,” USA Today, 17 January 2015, http://www.usatoday.com/story/news/nation/2015/01/17/number-of-homegrown-terrorists-isrising/21940159/, *fc) CINCINNATI — We are far from knowing the outcome of the case against Christopher Cornell, the young local man accused of plotting an attack on the U.S. Capitol, but if he is convicted, he would be added to a growing list of homegrown jihadist terrorists. From Sept. 11, 2001, to January 2014, there were 74 known terrorist plots perpetrated by Americans, lawful U.S. residents or visitors largely radicalized here in the United States, according to the most recent data reported by the Congressional Research Service. Five of those plots were carried out before law enforcement was able to intervene. Fifty-three of the cases – almost 72 percent – happened after April 2009. That's a 152 percent increase over that time period – and constitutes a spike, according to the report by the service, an agency that works exclusively for the U.S. Congress, providing policy and legal analysis to committees and members of the House and Senate. "It may be too early to tell how sustained this uptick is," the report reads. "Regardless, the apparent spike in such activity after April 2009 suggests that ideologies supporting violent jihad continue to influence some Americans – even if a tiny minority." Right-wing extremists are rising threats towards racial and religious minorities – dangers are underestimated and higher than those posed by jihadists. Shane 6/24 (Scott Shane, Journalist reporting about the U.S. intelligence community at the New York Times with a B.A. in English from Williams, “Homegrown Extremists Tied to Deadlier Toll Than Jihadists in U.S. Since 9/11,” New York Times, 24 June 2015, http://www.nytimes.com/2015/06/25/us/tally-of-attacks-in-us-challenges-perceptions-of-top-terrorthreat.html?_r=0, *fc) WASHINGTON — In the 14 years since Al Qaeda carried out attacks on New York and the Pentagon, extremists have regularly executed smaller lethal assaults in the United States, explaining their motives in online manifestoes or social media rants. But the breakdown of extremist ideologies behind those attacks may come as a surprise. Since Sept. 11, 2001, nearly twice as many people have been killed by white supremacists, antigovernment fanatics and other non-Muslim extremists than by radical Muslims: 48 have been killed by extremists who are not Muslim, including the recent mass killing in Charleston, S.C., compared with 26 by self-proclaimed jihadists, according to a count by New America, a Washington research center. The slaying of nine African-Americans in a Charleston church last week, with an avowed white supremacist charged with their murders, was a particularly savage case. But it is only the latest in a string of lethal attacks by people espousing racial hatred , hostility to government and theories such as those of the “sovereign citizen” movement, which denies the legitimacy of most statutory law. The assaults have taken the lives of police officers, members of racial or religious minorities and random civilians. Non-Muslim extremists have carried out 19 such attacks since Sept. 11, according to the latest count, compiled by David Sterman, a New America program associate, and overseen by Peter Bergen, a terrorism expert. By comparison, seven lethal attacks by Islamic militants have taken place in the same period. If such numbers are new to the public, they are familiar to police officers. A survey to be published this week asked 382 police and sheriff’s departments nationwide to rank the three biggest threats from violent extremism in their jurisdiction. About 74 percent listed antigovernment violence, while 39 percent listed “Al Qaeda-inspired” violence, according to the researchers, Charles Kurzman of the University of North Carolina and David Schanzer of Duke University. “Law enforcement agencies around the country have told us the threat from Muslim extremists is not as great as the threat from right-wing extremists,” said Dr. Kurzman, whose study is to be published by the Triangle Center on Terrorism and Homeland Security and the Police Executive Research Forum. John G. Horgan, who studies terrorism at the University of Massachusetts, Lowell, said the mismatch between public perceptions and actual cases had become steadily more obvious to scholars. “There’s an acceptance now of the idea that the threat from jihadi terrorism in the United States has been overblown,” Dr. Horgan said. “And there’s a belief that the threat of right-wing, antigovernment violence has been underestimated. ” Hate groups - WMD impact Domestic terrorists have a high risk of using dirty bombs – there are thousands of nuclear sites in the U.S. Barrie 13 (Allison Barrie, Defense academic and front page columnist for Fox News and Military, “Dirty bomb material secured at site in Philadelphia, thousands of sites remain in U.S.,” Fox, 15 March 2013, http://www.foxnews.com/tech/2013/03/15/dirty-bomb-materialsecured-at-site-in-philadelphia/, *fc) Raw, radiological material that terrorists could use to build a dirty bomb was secured in a Philadelphia school this week. On March 11, the U.S. National Nuclear Security Administration (a semiautonomous branch of the Energy Department) and Philadelphia’s Temple University announced they had secured a device containing cesium 137 -- one of more than two dozen such elements used in medicine and industry that could be turned into a dirty bomb. “This operation is part of NNSA’s broad strategy to keep dangerous nuclear and radiological material safe and secure by enhancing our nation’s security,” NNSA deputy administrator Anne Harrington said. A terrorist dirty bomb attack using domestic radioactive sources bomb may seem preposterous, yet the NNSA has identified more than 2,700 vulnerable buildings with high-priority radiological material in the United States alone. As of Feb. 28, 2011, only 251 of these buildings had completed NNSA security enhancements. The agency hopes the rest will do so by 2025 -- leaving another 12 years of vulnerability to theft and misuse. Dirty bombs are far easier to construct than nuclear bombs and do not use fissile material such as enriched uranium or plutonium. Extracting plutonium requires a reactor and enriching uranium is no easy task. Dirty bombs (security forces all them “radiation dispersal devices”) use conventional explosives such as car bombs to scatter radioactive materials through a densely populated area. The physical damage is limited and the threat of dying from radiation exposure very small with such a device. But a dirty bomb would cause extensive economic damage and social upheaval while instilling panic and fear in civilians. Philadelphia, New York City, and around the country In this case, the material came from a medical research irradiator that was removed from Temple University’s Old Medical School Building and transported to a secure location, where it will be prepared for disposal at a federal facility. The device had been used in medical research for two decades. The cesium-137 left within it would have been an attractive target. Prior to this decommissioning, Temple University had worked with the NNSA to install security enhancements in all their facilities with high-activity radiological materials. The city of Philadelphia has collaborated with the agency as well to secure 28 buildings with high-activity radiological materials since 2005. Just over two years ago, another terrorist treasure trove was recovered from a warehouse a mere 25 miles outside of Manhattan. On January 2010, the NNSA secured of high-activity radioactive devices containing enough cesium-137 to make a bomb. "Properly disposing of more than 3,000 curies of Cesium eliminates the threat this material poses if lost or stolen and used in a dirty bomb," NNSA administrator Thomas P. D'Agostino said at the time. The agency has recovered and secured more than 31,000 disused and surplus radioactive sealed sources within the United States, eliminating more than a million curies of what is essentially radiological catnip for terrorists. Each year, thousands of sources become disused and unwanted in the United States. There are regulatory requirements for in-place secure storage, and the Global Threat Reduction Initiative also helps to remove these sources for permanent and safe disposal. Yet thousands more civilian sites use radiological materials for commercial, medical and research applications. Domestic extremists use WMD’s to express political beliefs – they already have CBRN materials. GSN 12 (Global Security Newswire, International group dedicated to eliminating nuclear weapons, “Data Points to Home-Grown WMD Terror Threats in U.S.: Experts,” 8 August 2012, http://www.nti.org/gsn/article/data-points-home-grown-wmd-terror-threats-experts/, *fc) Two national security experts said in a Wednesday analysis on the CNN website that information collected since Sept. 11, 2011, suggests that home-grown U.S. militants pose a greater threat to acquire and use WMD materials than foreign terrorists (see GSN, June 22). "After 9/11, there was great concern that al-Qaida or an allied group would launch a terrorist attack involving chemical, biological, radiological or nuclear (CBRN) weapons. But in the past decade, there is no evidence that jihadist extremists in the United States have acquired or attempted to acquire material to construct CBRN weapons," according to Peter Bergen and Jennifer Rowland, both of the Washingtonbased New America Foundation. "By contrast, 11 right-wing and left-wing extremists have managed to acquire CBRN material that they planned to use against the public, government employees or both ," they added in the piece that cited figures from database established by their organization. Those figures do not account for a late 2011 case in which four Georgia militia members -- three of them senior citizens -- allegedly planned to manufacture ricin toxin as part of a plot against the government. A table posted on the organization's website lists 15 identified individuals and one unknown person -- all cited as "non-jihadist" who have obtained or sought to acquire anthrax, ricin, cyanide or the nerve agent sarin. The most famous case is that of Bruce Ivins, the military researcher identified by the Justice Department as the perpetrator of the 2001 anthrax attacks (see GSN, Oct. 17, 2011). The analysis was posted in the wake of a Sunday incident in which a man connected to the U.S. white supremacist movement killed six Sikhs in Wisconsin before reportedly fatally shooting himself during a confrontation with police. "Right-wing extremist individuals over the past decade in the United States were as likely to use violence as a means to express their political or social beliefs as those motivated by Osama bin Laden's ideology," according to Bergen and Rowland. "Even more worryingly, during the same time period, right-wing and left-wing extremist groups and individuals have been far more likely to acquire toxins and to assemble the makings of radiological weapons than al-Qaida sympathizers" (Bergen/Rowland, CNN, Aug. 7). Right-wing extremists have chemical and biological weapons. Government surveillance is key to prevent attacks. Muwakkil 4 (Salim Muwakkil, Senior editor at In These Times and op-ed columnist for the Chicago Tribune with a focus on African American issues, Middle East politics, and U.S. foreign policy, “Homegrown Terrorists,” In These Times, 17 February 2004, http://inthesetimes.com/article/513/homegrown_terrorists, *fc) Experts also believe that an individual or a domestic terrorist group was responsible for the anthrax attack of 2001 that killed five and injured 17. But in the wake of 9/11, we have tended to discount the danger of domestic terror. That may be a deadly mistake. Right-wing extremists long have shown an interest in using chemical and biological weapons . Jessica Stern, formerly with the National Security Council, said in 2002 that they are “obsessed” with biological agents and have been trying to perfect their use for years. The literature of the racist right is rife with references to biological agents, and authorities have evidence that many groups are actively trying to procure or produce these agents. The Feds were first put on notice about these efforts in 1972, when a Chicago-based white-supremacist group called the Order of the Rising Sun created as much as 40 kilograms of typhoid bacteria culture with the intent to contaminate water supplies in large Midwestern cities. The group’s goal was to eliminate “inferior” populations. Since that time, investigators have uncovered a number of right-wing bioweapons plots. Among the most prominent cases was the 1995 conviction of Douglas Baker and Leroy Wheeler, members of the Minnesota Patriots Council, for planning to assassinate government officials with ricin. These two were the first people convicted under the Biological Weapons and Anti-Terrorism Act of 1989. In 1998 the Feds arrested Larry Wayne Harris in Ohio for threatening to use biological weapons on U.S. officials. Harris, an activist with ties to the Christian Identity Church and Aryan Nations, was apprehended with three vials of the bacterium that causes plague. Identity teaches that Jews are the literal children of Satan, and people of color are subhuman “mud people.” The Army of God, a shadowy band of Christian terrorists, has a long history of terrorizing women’s health clinics, claiming responsibility for several bombings and praising individuals who have killed abortion providers. Shortly after 9/11, more than 250 health clinics and more than 200 abortion rights groups received letters signed by the Army of God containing a white, powdery substance falsely claimed to be anthrax. The latest example of this right-wing obsession was the arrest and conviction in November of three people involved in a plot to explode a cyanide bomb capable of killing thousands of people. The conspirators, William Krar and Judith Bruey, both of Tyler, Texas, and Edward Feltus, a member of a right-wing paramilitary group called the New Jersey Militia, were caught last May with forged identity passes to the United Nations and the Pentagon and a variety of racist and anti-government pamphlets— including The Turner Diaries, the book that reportedly inspired Oklahoma City bomber Timothy McVeigh. When investigators searched a storeroom rented by Krar and Bruey, they seized a cyanide bomb, chemicals and components for additional biological weapons, half a million rounds of ammunition, 65 pipe bombs and briefcases that could be detonated by remote control. According to the CBS affiliate in Dallas-Fort Worth, the station that broke the story, the case sparked one of the most extensive probes of domestic terrorism since the Oklahoma City bombing. “It was clearly one of the most lethal arsenals associated with the U.S. paramilitary right in the past 20 years,” Daniel Levitas told the U.K.-based Guardian. Levitas is author of The Terrorist Next Door: The Militia Movement and the Radical Right and is one the nation’s foremost experts on right-wing extremism. In a December 13, 2003, column in the New York Times, Levitas wrote: “Americans should question whether the Justice Department is making America’s far-right fanatics a serious priority. … It is also worrisome that the discovery of lethal chemicals in President Bush’s home state was not deemed occasion for a high-profile announcement by Attorney General John Ashcroft … trumpeting the arrest of Mr. Krar and his compatriots.” Unless you live in East Texas, you’ve probably heard nothing about this investigation. The growing presence and deadly intentions of these homegrown hate groups remind us that our own faith-based terrorists may be more lethal a threat than color-coded Islamists. Coop between domestic gangs and foreign groups makes dirty bombs likely Dones et al 13 (Darell Dones, PhD, Christian Bolden, PhD, Michael Buerger, PhD, Futures Working Group White Paper Series. Nov 2013: "Terrorism, Gangs, and Weapons of Mass Destruction." futuresworkinggroup.cos.ucf.edu/Terrorism.pdf) jsk Weapons of Mass Destruction The category of WMDs, while often associated with nuclear weapons, also includes “dirty bombs,” defined as conventional explosives that spread radioactive material over a wide area; biological and chemical weapons; and any destructive device, such as a bomb, grenade, missile, rocket, mine, etc. Though law enforcement still considers the possibility of a “dirty bomb” attack viable, stringent controls are in place over most existing stocks of weapons-grade radioactive material, and the difficulties of moving vulnerable stocks over long distances without 11 detection are considerable. However, biological and chemical stocks exist naturally and have legitimate uses in the U.S., and conventional destructive devices can be obtained with relative ease. For those reasons, the WMD portion of this discussion focuses primarily on the most accessible, and thus most likely, weapons to be deployed. These weapons may be either improvised destructive devices that utilize conventional explosive materials or other chemical or biological agents that are repurposed for use as a weapon. For instance, in August 2011, The New York Times reported on efforts by Yemen-based al Qaeda cells to acquire castor beans to manufacture and deploy the nerve agent ricin. The article quoted a State Department official reporting the effort “continues to demonstrate [al Qaeda’s] growing ambitions and strong desire to carry out attacks outside its region” (Schmidt & Shanker, 2011). Similar plans were thwarted by British and French operatives in London in 2003. Furthermore, the unrelated Aum Shinrikyo sarin gas attack on the Tokyo subway in 1995 serves as a vivid reminder of what is possible if these agents are utilized as weapons. Each of these examples illustrates reported cases involving the attempted use of weapons of mass destruction. Other scenarios are, of course, possible, some potentially involving gangs or gang members. The likelihood of such events occurring, however, is subject to on-going debate. The Terrorists–Gangs Nexus The question of whether or not terrorists might reach out to U.S. street gangs to perform acts in facilitation of a WMD attack on U.S. soil is an exercise in futures thinking. Sufficient data will be presented to consider such a possible future event, but whether it is likely to occur depends on the interpretation of ambiguous evidence. For example, prior to the events of September 11, 2001, few would have given credence to the possibility that a small group of terrorists would successfully skyjack four jetliners in American air space for suicide missions 12 against symbolic American targets. Consider also a claim in 2005 made by El Salvador President Antonio Saca and Honduran Security Minister Oscar Alvarez that al Qaeda and MS-13 members were meeting to form an alliance. While these claims were later determined to be trumped up for political advantage rather than having any actual truth, the possibility and implications of such an alliance in the future began to be considered (see Barnes, 2007). At present, no solid evidence documenting a terrorist-gangs nexus exists. The expert panelists clearly agreed on the possibility of the inter-related connections emerging but were less clear on the plausibility of it happening. The following section is an examination of the potential scenarios, possible reasons the scenarios have not taken place to date, and steps that can forestall or prevent these situations from happening. The questions focus specifically on the Crips, Gangster Disciples, and MS-13 street gangs, but it is not too far of a stretch to extrapolate the data to include other street gangs as well. The fact that a WMD incident involving a terrorists-gangs collaboration has not been reported to have occurred does not mean that it cannot. Nor does the fact such an incident could happen mean it will. However, the possibility demands some attention from both law enforcement and other national security and public safety agencies, including the Department of Justice (DOJ) and the Department of Homeland Security (DHS). The terrorists-gangs nexus is not entirely speculative, as some anecdotal evidence exists. There have been several antecedent attempts at creating exactly such a relationship, though each one has qualifying or mitigating circumstances. The research data and the limited existing examples reveal that the possibilities may not be straightforward, but rather complex in nature. As such, a number of general and specific questions arise when examining this complex relationship. The next section will present these questions and provide some general evidence pointing toward some potential answers. Empirics prove right wing terrorists are willing and capable to carry out largescale attacks de Armond 99 (Paul de Armond is a scholar for the Public Good Project. "Right Wing Terrorism and Weapons of Mass Destruction," Public Good Project 1999. www.publicgood.org/reports/wmdbrief.pdf) jsk Weapons of mass destruction (WMD) have been a constant theme in right-wing terrorist rhetoric for decades. The Turner Diaries, a novel which has repeatedly served as a strategy manual of domestic terrorists, was published in May, 1978. It is now in its seventh printing and there are roughly 200,000 copies in circulation. Domestic right-wing terrorists are and have been the most active, violent and deadly terrorist threat to American lives and property. Mortality due to domestic terrorist actions in the previous decade numbered in the hundreds. That figure roughly doubled this decade. The next decade may see casualties measured in thousands. The seizure of a 30-gallon drum of sodium cyanide at The Covenant, The Sword and The Arm of the Lord in April 1985 provided clear evidence of WMD intentions and capabilities by domestic right-wing groups. Since that time, there have been incidents involving most of the categories of WMD: large-scale explosives, chemical, biological and nuclear materials. Right-wing terrorists are innovators and early adopters of new techniques and tactics. They are quite skilled at low-tech operations and have been constrained by lack of resources. The Oklahoma City bombing was done for the price of two used cars. If Timothy McVeigh and his collaborators had been able to obtain more resources, the bomb would have been bigger. The goal of the most violent domestic terrorists is to bring about the battle of Armageddon -- in the most literal and concrete sense. Right-wing groups are likely to use biological weapons – ideology Stern 99 (Jessica Stern, Council on Foreign Relations, Washington, D.C., USA. Harvard Kennedy School of Government. The Prospect of Domestic Bioterrorism, Emerging Infectious Diseases. http://www.hks.harvard.edu/fs/jstern/Stern_EID_The%20Prospect%20of%20Domestic%20Bioterrorism.doc) jsk A small but growing number of domestic terrorists could attempt to use biological weapons in the belief that doing so would advance their goals. The most likely are religious and extreme right-wing groups and groups seeking revenge who view secular rulers and the law they uphold as illegitimate. They are unconstrained by fear of government or public backlash, since their actions are carried out to please God and themselves, not to impress a secular constituency. Frequently, they do not claim credit for their attacks since their ultimate objective is to create so much fear and chaos that the government's legitimacy is destroyed. Their victims are often viewed as subhuman since they are outside the group's religion or race. Religiously motivated groups are increasing. Of 11 international terrorist groups identified by the Rand Corporation in 1968, none were classified as religiously motivated. By 1994, a third of the 49 international groups recorded in the Rand-St. Andrews Chronology were classified as religious.22 Religious groups are not only becoming more common; they are also more violent than secular groups. In 1995, religious groups committed only 25% of the international incidents but caused 58% of the deaths.23 Identity Christians believe that the Book of Revelation is to be taken literally as a description of future events. Many evangelical Protestants believe in a doctrine of rapture: that the saved will be lifted off the earth to escape the apocalypse that will precede the Second Coming of Christ. Followers of Christian Identity (and some other millenarian sects), however, expect to be present during the apocalypse.24 Because of this belief, some followers of Christian Identity believe they need to be prepared with every available weapon to ensure their survival. Organizational pressures could induce some groups to commit extreme acts of violence. Followers tend to be more interested in violence for its own sake than in the group's purported goals, making them less inhibited by moral or political constraints than the leaders. Leaders may have difficulty designing command and control procedures that work. Offshoots of established groups may be particularly dangerous. Groups may also become most violent when the state is closing in on them, potentially posing difficulties for those fighting terrorism. Another factor is the nature of the leader. Charismatic leaders who isolate their followers from the rest of society often instill extreme paranoia among their followers. Such groups can be susceptible to extreme acts of violence. Asked who he thought the most likely domestic perpetrators of biological terrorism were, John Trochman, a leader of the Montana Militia, said that extremist offshoots of Identity Christian groups are possible candidates, as are disaffected military officers.25 Some antigovernment groups are attempting to recruit inside the U.S. military.26 William Pierce also foresees the use of biological weapons by antigovernment groups. "People disaffected by the government include not only the kind of people capable of making pipe bombs. Bioweapons are more accessible than are nuclear weapons."27 Turns Islamophobia Extremists plot attacks to blame Muslims. Obeidallah 3/26 (Dean Obeidallah, Columnist for The Daily Beast and graduate from the Fordham University School of Law, “‘Patriot’ Terrorist Frames Muslims With Quran Bomb,” The Daily Beast, 26 March 2015, http://www.thedailybeast.com/articles/2015/03/26/patriot-terrorist-frames-muslims-with-quranbomb.html, *fc) But these people all pale in comparison to Michael Sibley. You see, Sibley wasn’t content to just giving us the same old right-wing crap like Muslims wants to impose Islamic law so say goodbye to bacon cheeseburgers and whiskey and say hello to lamb kebobs and strong coffee served in small cups. Nope, this self-described “patriot” planted a bomb at a national park in Georgia in the hopes that the public would think a Muslim did it. And yes, I know most haven’t heard about this incident. There’s not even a need to mention how different the media coverage would be have been if the bomber had actually been Muslim. I already detailed that scenario earlier this week in my article about a non-Muslim man that attacked federal officers at a U.S. airport with poison spray and a machete while carrying six homemade bombs in a duffel bag. Sibley, who is 67 years old and lives in Roswell, Georgia, told FBI officers that he planted this bomb because in his view, “no one was paying attention to what was going on the world.” Apparently as a “patriot” he was going to maim or even kill his fellow Americans to wake them up to the threat facing America. And what is this “threat” Sibley speaks of? Well, it’s pretty clear he’s talking Muslims. You see, according to the federal complaint, Sibley put some Muslim memorabilia in the backpack along with two “improvised explosive devices” (IEDs) he crafted. First, he placed a copy of the Quran in the backpack. (Apparently in Sibley’s mind a radical Muslim would blow up the faith’s holy book.) Plus he included a book titled “The Rape of Kuwait, which consists of the stories of people who suffered at the hands of Saddam Hussein when his forces invaded Kuwait in 1990. Sibley also wrote the name “Mina Khodari” in the backpack as the owner. Why? Well, he told the FBI agents that the name sounded “foreign.” That’s “foreign,” the same code word used by Republican legislators when they mean “sharia law” in their legislation to ban Islamic law from being imposed in America. (They learned that if they try to ban “Islamic law” it will be struck down by the courts as being unconstitutional because it favors one religion over another, so they use “foreign” to mean Islamic law.) I’m almost certain Sibley knew that “Mina Khodari” was a Middle Eastern-sounding name. A quick Google search would tell you that “Mina” is a common Arabic first name and “Khodari” is a well-known name in Saudi Arabia. Considering Sibley told the FBI that he learned how to make the bomb from the Internet, it’s not a stretch to think that he had the capacity to look up these names too. Finally, Sibley added a map circling the Jewish Community Center of Atlanta and info for other “soft targets” like the Atlanta commuter train system. Apparently he believed these places would be likely targets of Muslim extremists. Surveil hate groups CP Current counterterrorism efforts aren’t enough – more surveillance is key to confront right-wing extremists. Potok 4/17 (Mark Potok, Senior fellow at the Southern Poverty Law Center and editorin-chief of the Intelligence Report with a B.A. in Political Science from the University of Chicago, Don’t Ignore The Homegrown Terror Threat, Politico, 17 April 2015, http://www.politico.com/magazine/story/2015/04/oklahoma-city-bombing-20th-anniversary117059.html#.VawTGPlViko, *fc) On Wednesday night, a man named Dylann Storm Roof allegedly entered a black church in Charleston, South Carolina, during a prayer meeting. There he reportedly sat quietly for almost an hour, before opening fire with a pistol and killing nine people. He has since been captured. When a mass shooting happens, people naturally wonder about the motivation. What we know so far is that Roof made overtly racist remarks to his friends; boasted a Facebook profile picture that showed him wearing the flags of white supremacist African states; and allegedly told one of the victims, "You rape our women and you’re taking over our country. And you have to go." It seems a safe bet that racism was a likely motive in the Charleston shooting. Until we know more about the gunman, it's impossible to get more specific than that. What can be said, however, is that the attack is congruous with America's history of white supremacy and right-wing extremism, a real domestic threat that far outstrips that of Islamist terrorism. If terror is the mortal threat it has long been trumped up to be, then we must conclude that our whole political and law enforcement apparatus has been pointed in the wrong direction. First, this should be emphasized: Random murders of black civilians are not some historical aberration. On the contrary, they were the very foundation of the political system in the American South for something like 90 years. Segregation and Jim Crow did not just mean separate drinking fountains, but a system of racial subordination in which blacks were controlled through fear of psychotic violence. This shooting spree is the worst single incident in many years — but it doesn't hold a candle to the Colfax Massacre. If he had done it in 1890, the Charleston gunman probably wouldn't have even been arrested. That ugly history has not been confronted in a remotely honest way. Right now, the flag of treason, chattel slavery, and apartheid flies over a Civil War memorial on the grounds of the South Carolina statehouse. In 2014, South Carolina Gov. Nikki Haley defended this placement, noting that she had heard no complaints from local CEOs. That brings me to right-wing militant activity , which also has not been confronted. In 2009, the Department of Homeland Security finished a report on right-wing extremism, started during the Bush years. It argued that the election of the first black president, the Great Recession, and veterans having trouble adjusting to civilian life (Timothy McVeigh was a veteran of Desert Storm), and other factors might lead to a spate of terrorist attacks, similar to what happened in the 1990s. It was mainly a cautionary note, proposing little aside from increased watchfulness and naming no specific threats. Nevertheless, the backlash from conservatives was immediate and fierce. Pundits like Rush Limbaugh and Michelle Malkin spun it as indicting all veterans and conservatives. DHS Secretary Janet Napolitano eventually withdrew the report, and apologized repeatedly. Six years later, how have things turned out? Since 9/11, an average of nine American Muslims per year have been involved in an average of six terrorism-related plots against targets in the United States. Most were disrupted, but the 20 plots that were carried out accounted for 50 fatalities over the past 13 and a half years. In contrast, right-wing extremists averaged 337 attacks per year in the decade after 9/11, causing a total of 254 fatalities, according to a study by Arie Perliger, a professor at the United States Military Academy’s Combating Terrorism Center. The toll has increased since the study was released in 2012. [The New York Times] Those few Islamist plots — a great many of which were basically created wholesale by the FBI — are presented as justification for tremendous effort on the part of law enforcement and the military. They assassinate American Muslims overseas. They deluge American mosques with infiltrators and spies. They keep innocent people in Guantanamo Bay for year after year. Since 9/11, right-wing terrorists have killed more than five times as many people as Islamist ones. Yet a short study warning to keep a watchful attitude towards the former is met with enraged hostility. It reveals both the small actual danger of Islamist terrorism, and the utterly ridiculous and hypocritical way in which anti-terrorism resources are allocated. Domestic terrorism threats are high and current government surveillance isn’t sufficient. Perez and Bruer 2/20 (Evan Perez, CNN Justice Reporter, Wes Bruer, Criminal Justice Producer at CNN with a B.A. in Political Science from the University of Georgia, “DHS intelligence report warns of domestic right-wing terror threat, CNN, 20 February 2015, http://www.cnn.com/2015/02/19/politics/terror-threat-homeland-security/, *fc) Washington (CNN) They're carrying out sporadic terror attacks on police, have threatened attacks on government buildings and reject government authority. A new intelligence assessment, circulated by the Department of Homeland Security this month and reviewed by CNN, focuses on the domestic terror threat from right-wing sovereign citizen extremists and comes as the Obama administration holds a White House conference to focus efforts to fight violent extremism. Some federal and local law enforcement groups view the domestic terror threat from sovereign citizen groups as equal to -- and in some cases greater than -- the threat from foreign Islamic terror groups, such as ISIS, that garner more public attention. The Homeland Security report, produced in coordination with the FBI, counts 24 violent sovereign citizen-related attacks across the U.S. since 2010. ISIS burned up to 40 people alive in Iraq, official says The government says these are extremists who believe that they can ignore laws and that their individual rights are under attack in routine daily instances such as a traffic stop or being required to obey a court order. They've lashed out against authority in incidents such as one in 2012, in which a father and son were accused of engaging in a shootout with police in Louisiana, in a confrontation that began with an officer pulling them over for a traffic violation. Two officers were killed and several others wounded in the confrontation. The men were sovereign citizen extremists who claimed police had no authority over them. Among the findings from the Homeland Security intelligence assessment: "(Sovereign citizen) violence during 2015 will occur most frequently during routine law enforcement encounters at a suspect's home, during enforcement stops and at government offices." The report adds that "law enforcement officers will remain the primary target of (sovereign citizen) violence over the next year due to their role in physically enforcing laws and regulations." The White House has fended off criticism in recent days for its reluctance to say the words "Islamist extremism," even as the conference this week almost entirely focused on helping imams and community groups to counteract the lure of groups like ISIS. Absent from the White House conference is any focus on the domestic terror threat posed by sovereign citizens, militias and other anti-government terrorists that have carried out multiple attacks in recent years. An administration official says the White House is focused on the threat from all terrorists, including from sovereign citizen and other domestic groups. "I don't think it's fair to say the (White House) conference didn't address this at all," the official said, adding that President Barack Obama addressed the need to combat "violent ideologies" of all types. An official at the Justice Department, which is leading the administration's counter-radicalization effort, says many of the tactics aimed at thwarting radical Islamic recruitment of young people can also be used to fight anti-government extremist groups. While groups like ISIS and al Qaeda garner the most attention, for many local cops, the danger is closer to home. Lone wolves are getting CBRN weapons because surveillance experts aren’t paying attention to them. Akbar 11 (Malik Siraj Akbar, Journalist, Vice President at the Harvard Kennedy School of Government, and Web Editor of Harvard’s student magazine, “Lone wolves and homegrown terrorists: Experts warn of a growing threat from unusual sources,” Center for Public Integrity, 16 September 2011, Updated 19 May 2014, http://www.publicintegrity.org/2011/09/16/6539/lone-wolves-and-home-grown-terrorists-expertswarn-growing-threat-unusual-sources, *fc) As the United States commemorated the 10th anniversary of the 9/11 attacks, terrorism experts stepped up warnings that authorities must look beyond the usual sources of terror, to the lone wolves stirring with anger and seeking out big-impact weapons. Isolated and underestimated, lone wolves might go unnoticed even as they try to get chemical, biological, radiological and nuclear weapons – collectively known as CBRN – that can spread terror and spark psychological chaos. Anders Breivik is the latest of the lone wolves and a point of concern among terrorism experts. His devastating attack in Norway in July spurred researchers to mine his 1,500-page treatise in search of evidence that unconventional, free-agent terrorists may now have greater potential to inflict damage and ignite panic. Breivik’s manifesto was more than just the ramblings of a lone nut. “Dismissing Breivik’s “[weapons of mass destruction] idea” as unrealistic is dangerous and overlooks important nuances that give his warnings about greater weapons added validity. Moreover, his writings might spur other extremists, according to a little-noticed report from the Washington, D.C.-based Federation of American Scientists. Acknowledging the threat U.S. Homeland Security Secretary Janet Napolitano, in an interview on ABC News last week, said one of the biggest challenges she had seen as DHS secretary, “is movement toward the home-grown violent extremist. The person who, for whatever reason, decides to attack his fellow citizens, She warned citizens to be vigilant of “the lone actor that we may not know about, who may already be in the United States and so it requires us to be vigilant and the public be vigilant.” Adding to that official urgency is a sense among terrorism experts that the path to destructive weapons is easier. “ It is not that difficult to acquire radiological materials. There are different ways people would disseminate them. The most likely way is to mixing them into conventional explosive devices to cause further damage,” said Dr. Jeffrey M. Bale, of the Graduate School of International Policy and Management at the Monterey Institute of International Studies (MIIS). Right wing terror uniquely likely – decreased surveillance Smith 11 (R. Jeffrey Smith is a reporter at the Washington Post and was awarded the Pulitzer Prize for Investigative Reporting in 2006. Washington Post: "Homeland Security Department curtails home-grown terror analysis," June 7 2011. www.washingtonpost.com/politics/homeland-security-department-curtails-home-grown-terror-analysis/2011/06/02/AGQEaDLH_story.html) jsk The Department of Homeland Security has stepped back for the past two years from conducting its own intelligence and analysis of home-grown extremism, according to current and former department officials, even though law enforcement and civil rights experts have warned of rising extremist threats. The department has cut the number of personnel studying domestic terrorism unrelated to Islam, canceled numerous state and local law enforcement briefings, and held up dissemination of nearly a dozen reports on extremist groups, the officials and others said. The decision to reduce the department’s role was provoked by conservative criticism of an intelligence report on “Rightwing Extremism” issued four months into the Obama administration, the officials said. The report warned that the poor economy and Obama’s election could stir “violent radicalization,” but it was pilloried as an attack on conservative ideologies, including opponents of abortion and immigration. In the two years since, the officials said, the analytical unit that produced that report has been effectively eviscerated. Much of its work — including a digest of domestic terror incidents and the distribution of definitions for terms such as “white supremacist” and “Christian Identity” — has been blocked. Multiple current and former law enforcement officials who have regularly viewed DHS analyses said the department had not reported in depth on any domestic extremist groups since 2009. “Strategic bulletins have been minimal, since that incident,” said Mike Sena, an intelligence official in California who presides over the National Fusion Center Association, a group of 72 federally chartered institutions in which state, local and federal officials share sensitive information. “Having analytical staff, to educate line officers on the extremists, is critical.…This is definitely one area” where more effort is warranted by DHS. Similar frustration was expressed in interviews with current and former officials at fusion centers in Missouri, Virginia and Tennessee. Daryl Johnson, formerly the senior domestic terrorism analyst at DHS and a principal author of the disputed report, confirmed in an interview that he left in frustration last year after his office was “gutted” in response to complaints. “Other reports written by DHS about Muslim extremists … got through without any major problems,” Johnson said. “Ours went through endless reviews and edits, and nothing came out.” The threat of Islamic-related terrorism in the United States has by all accounts captured the most attention and resources at DHS since it was formed in 2002. But a study conducted for the department last October concluded that a majority of the 86 major foiled and executed terrorist plots in the United States from 1999 to 2009 were unrelated to al-Qaeda and allied movements. “Do not overlook other types of terrorist groups,” the report warned, noting that five purely domestic groups had considered using weapons of mass destruction in that period. Similar warnings have been issued by the two principal non-government groups that track domestic terrorism: the New York-based Anti-Defamation League and the Alabama-based Southern Poverty Law Center. An annual tally by the latter group of what it calls “Terror From the Right” listed 13 major incidents and arrests last year, nearly double the annual number in previous years; the group also reported the number of hate groups had topped 1,000 in 2010, for the first time in at least two decades. Data analytics CP 1nc – data analytics CP The United States federal government should substantially increase the resources devoted to data analytics technology and personnel at the National Security Agency. Big Data analytics makes existing data collection more effective – enhances its predictive power, decreases group-think and boosts international cooperation for global security Lim, 15 – independent researcher focusing on foreign policy and security in the wider Middle East. He is also senior analyst with the UK-based Open Briefing: The Civil Society Intelligence Agency, and analyst with IHS Jane’s (Kevjn, “Big Data and Strategic Intelligence” Intelligence and National Security, DOI: 10.1080/02684527.2015.1062321 This article began with a description of the Big Data phenomenon, which, characterized by massive volume, variety and velocity, and combined with appropriate analytics capabilities, creates the conditions for a vastly novel epistemic mode concerned with simple correlations rather than deep causation. The article then examined the fit between Big Data analytics and the intelligence cycle, specifically the collection and analysis components, as it relates to strategic events of far-reaching implications. Presupposing the operationalization of Karl Popper’s method, it argues that Big Data eminently suit the existing intelligence methodology in at least three ways: discerning general long-term trends and anomalies; generating hypotheses; and adducing data to refute these same hypotheses. Big Data likewise vastly increase the time spent on analysis and sense-making, whereas at the moment the bulk of the intelligence effort and its resources go towards collection, much of which at any rate is squandered for lack of matching processing and analytical capacity. Real-time parallel processing furthermore collapses the interval required for key intelligence to turn into impactful decisions. The article then provided an example of one area, social media, in which Big Data analytics can complement strategic intelligence. Before concluding, the article proposed conceptually situating Big Data as subtext within a tripartite analytical framework that incorporates traditional subject-matter expertise as context, and game theory as the overarching strategic metatext. The implications of the Big Data-strategic intelligence intersection reach still deeper and further. From a sociological perspective, the emergence of the Big Data phenomenon is a direct correlate of the information supersociety and the crowdcentric century.57 In the intelligence context, Big Data analytics goes hand-in-hand with, and is in some ways contingent upon, the rising importance of open source intelligence (Osint) given that the latter constitutes as much as 95 per cent of all useful intelligence;58 indeed, the primary Big Data tasks sketched out in the chapter on methodological issues are particularly well suited to Osint environments. By the same stroke, the relative importance of secrets to the overall intelligence endeavor has decreased in proportion to the propagation and normalization of information technologies. From the organizational bureaucratic viewpoint, Big Data prompt and necessitate a shift away from the secretive, highly compartmentalized and rigidly hierarchical mold typifying the realm of intelligence and national security, and towards relatively more open modes of intelligence management. These latter may approximate translateral and highly networked structures not entirely unlike social media,59 expanding the space for dissent and minority opinions to be expressed , even while a plurality of intelligence agencies may still be retained to improve overall effectiveness and ‘competitiveness’. Importantly, this encourages greater levels of disclosure and by implication, criticism. For only in the presence of critical feedback can intelligence analysis, like its scientific counterpart, transform into an epistemological edifice capable of adjustment, self-reflexivity and, it follows, progress in the broad sense of the term. Ultimately, the proper trajectory of all that has been discussed hitherto is likely to lead a step closer towards an open society,60 one which increasingly engages with decision-making processes behind matters of national security import, and the debates these give rise to. Dare one look further, even the notion of national security under such conditions may conceivably shift from one based on state-centric insularity to one that strives towards a consensual, participatory, decentralized and, eventually, more sustainable form of global security. 2nc- CP solves The CP matches analytics capability to current data collection – optimizes the use of intelligence Lim, 15 – independent researcher focusing on foreign policy and security in the wider Middle East. He is also senior analyst with the UK-based Open Briefing: The Civil Society Intelligence Agency, and analyst with IHS Jane’s (Kevjn, “Big Data and Strategic Intelligence” Intelligence and National Security, DOI: 10.1080/02684527.2015.1062321 The NSA, for example, which processes no more than five per cent of the Big Data it collects, excels in ‘precision interception for specific purposes . . . [but] is largely worthless when it comes to global situational awareness, anomaly detection, real-time warning, and pattern analysis across all mission areas’. The system, he continues, ‘is designed to throw money at technology for collection, and is not held accountable for failing to process what it collects’.52 This account appears to gel with others regarding the massive ‘firehose’ of data, especially from Imint (satellite, U-2 and UAV imagery) and Sigint (especially foreign language) sources.53 Collection capabilities far outpace analytical capacity. Michael Handel, a pioneer in intelligence studies, argued that strategic surprises, or intelligence failures, are often linked to inefficiencies in analysis and acceptance (of intelligence by policymakers), rather than to collection.54 The Big Data phenomenon has clearly given rise to an unprecedented glut in collection. Nevertheless, as this author contended earlier, an appropriate response exists in a matching analytics capability , again, provided the analyst knows what to focus on. Data analytics are possible – existing NSA collection stopped 300 attacks and the method is replicable in separate experiments Pham 14 (Cassidy, San Jose State University graduate of the School of Library and Information Science, “Effectiveness of Metadata Information and Tools Applied to National Security,” February 27, 2014, University of Nebraska-Lincoln Library Philosophy and Practice, http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=2608&context=libphilprac, silbs) << With this wealth of metadata, and the tools to organize and graphically visualize the information, the IC can apply sophisticated analytics techniques to identify persons of interests and associates. The first experiment is applicable as a national security tool since it efficiently connects contacts, and isolates social groups. This is particularly useful in disassociating contacts that are unaware or uninvolved with the person interest. It is also valuable in finding unknown associates of targets he or she already knows about. The second experiments provide additional contextual information. Naturally, metadata explains the who, what, where and when. It does not explain the why and how. These questions are left for analysts to fill in by using contextual information, such world cloud experiment, to develop a so-called picture. Though the experiments were innately limited in scope, the relative success in the application of metadata shows its effectiveness as a national security tool. As noted in the literature review, metadata tools, such as the XKeyscore are truly invaluable as intelligence gathering tools. According to leaked documents, over 300 terrorists were captured using the XKeyscore (The Guardian, 2013). Also, examples from various case studies, such as the killing of Osama Bid Laden indicate successful use and application of metadata. With the added benefit of the interoperability of these various tools, the IC can lighten the burden and share information. Rather than having one agency find a needle in a haystack—a haystack of infinite size, it is far more efficient and effective to divide the hay into multiple stacks among multiple players. Much of the information and sources are conjecture since they are based on leaked documents. And of course, the government has yet to fully disclose the information on the tools, which exasperates the problem. Nonetheless, declassified documents, journal articles, and metadata tools that are relatively similar to the ones used by the IC, insure legitimacy to the evidence. Overall, the results from the experiments indicate a high success rate since untrained observers were able to analyze the metadata diagrams, and accurately determine social groups and personal backgrounds for most of the participants. Evidence from various sources, such as case studies, journal articles, and leaked government documents further support the effectiveness of metadata as part of a national security platform. As the country, and the rest of the world becomes more dependent on smart devices, social media sites, the internet, and other 21st century necessities, metadata and the associated tools are equally necessary for the IC to effectively face the threats of national security. >> Commercial mining of Big Data proves the CP is possible Crovitz, 15 - former publisher of The Wall Street Journal who also served as executive vice-president of Dow Jones and launched the company's Consumer Media Group (L. Gordon, “The Dumbing Down of U.S. Intelligence” Wall Street Journal, 5/10, http://www.wsj.com/articles/the-dumbing-down-of-u-s-intelligence-1431300323 Lawmakers will decide this month whether to extend the Patriot Act or to water it down. Instead they should update it to maximize both privacy and intelligence. Technology now has the answer, if only politicians will get out of the way. Recent innovations in big data allow staggering amounts of information to be collected and mined. These data deliver correlations based on an individually anonymous basis. This work was originally done to support the chief revenue engine of the Internet, advertising. The technology generates increasingly targeted marketing messages based on individuals’ online activities. The techniques have other applications. Google used them to become better than the Centers for Disease Control at predicting flu outbreaks by monitoring search terms like “flu medicine” by location. Canadian researchers studied thousands of premature babies and identified symptoms that precede fevers. Cities apply predictive policing by mining online data to assign cops where they’re needed. The fast shift to self-driving cars is possible because of data transmitted among vehicles. Small drones share data that keep them from crashing into one another. A Brown University researcher discovered how banks could use metadata about people’s cell phone usage to determine their creditworthiness. The Patriot Act was written in 2001, before any of these advances. It lets the NSA keep anonymous data about who is calling whom for five years, but it isn’t able to apply algorithms to find suspicious patterns. Analysts may examine call logs for suspicious links only if there is a pre-existing “reasonable, articulable suspicion” of terrorism or another threat to national security. There were 170 such searches last year. Big Data analytics can better predict trends than other forms of intelligence Lim, 15 – independent researcher focusing on foreign policy and security in the wider Middle East. He is also senior analyst with the UK-based Open Briefing: The Civil Society Intelligence Agency, and analyst with IHS Jane’s (Kevjn, “Big Data and Strategic Intelligence” Intelligence and National Security, DOI: 10.1080/02684527.2015.1062321 These new forms of value depend on the analyst’s ability to interrogate these datasets, via algorithms, to derive insights informing decision-making.8 Whereas small, representative and hence presumably precise samples once lay at the heart of statistical analysis, Big Data speak to a different methodology and approach altogether; one in which sheer sample size, variety and messiness, backed up by unprecedented storage capabilities, compensate for what they lack in measurement precision.9 The massive sample size creates something of a normalizing effect and enables higher confidence levels in the inferring of trends, anomalies and patterns which might normally escape notice with small datasets, with implications for future predictions. Ultimately, Big Data analytics shift the focus of inquiry from causation to correlations: that is the mere knowledge that something is happening, rather than why it is happening, suffices for the formulation of an adequate response. Big Data analytics substantially increase the predictive value of intelligence Lim, 15 – independent researcher focusing on foreign policy and security in the wider Middle East. He is also senior analyst with the UK-based Open Briefing: The Civil Society Intelligence Agency, and analyst with IHS Jane’s (Kevjn, “Big Data and Strategic Intelligence” Intelligence and National Security, DOI: 10.1080/02684527.2015.1062321 When integrated into the Popperian method, Big Data analytics serves three apposite and crucial tasks (see Figure 3). The first involves the inductive collection of data with the aim of discerning general trends and anomalies. In a sense, this is a variant of applied grounded theory given the emphasis on data ‘speaking for themselves’ as it were, and facilitates the defining of intelligence problems. Indeed, the discernment of general trends and longer-term developments in itself often constitutes a specific type of intelligence estimate.28 Intimately tied in with this aspect is, in some ways, the second and perhaps more important function related to the formulation of intelligence hypotheses, a stage requiring as little inhibition from cognitive bias, and as much imagination and (informed) speculation as possible. That the tragedy of Pearl Harbor occurred, Thomas Schelling noted, exemplified a ‘great national failure to anticipate’ and a ‘poverty of expectations’.29 In another context, he also perceptively identified the ‘tendency in our planning to confuse the unfamiliar with the improbable’.30 The third, following on from the generation of hypotheses, is that Big Data allow the intelligence analyst to cut through the overwhelming morass of supporting facts in order to adduce those with refutative value – the search for that one black swan also being naturally far more defined than for the thousandth white one – and this possibly in real-time , an invaluable advantage in intelligence work. This specific task is ideally complemented by the analytical rigor of ‘devil’s advocates’, whose singular task is to challenge baseline or ‘conventional wisdom’ intelligence estimates with logical, if often far less probable alternatives that require explicit refutal. Woodrow Kuhns has raised the obvious question concerning the situation in which Popperian refutation still fails to eliminate two or more hypotheses.31 Under such cases of ambiguity, greater weight ought to be shifted towards probability and impact assessments as arbiters (see below). The product, even if imperfect, would be the strengthening of hypothetical approximations in the absence of the true intelligence ‘picture’.32 In addition, Big Data can increase, by several orders of magnitude, the time spent on analysis and sensemaking in relation to collection, provided analysts first possess the tools to make effective sense of the data. A report by the Royal United Services Institute noted that the ‘intelligence world already collects more raw data than it can analyse, with perhaps as much as 95 percent of imagery never being viewed by analysts’.33 According to the same report, senior Ministry of Defense officials believe that the UK ‘has reached an inflection point in data deluge.We are now in danger of data asphyxiation and decision paralysis’.34 Such is also certainly the case with the US’ National Security Agency, where Sigint technology far outpaces the organization’s human analytical capabilities.35 Elsewhere, in order to track the movement of seagoing vessels worldwide, the US navy alone collects 200 terabytes of data approximately every 48 hours.36 That more than a small proportion of all that collected data is processed is equally questionable. Finally, used correctly, Big Data analytics, with the aid of effective visualization and presentation tools, can shorten the time required for key intelligence to reach decision-makers. AT: Can’t solve HUMINT Integrating tech into HUMINT solves – even under diminished HUMINT resources Nygaard, 14 – US Army Major; Master’s Thesis for the U.S. Army Command and General Staff College (Richard, “How can Human Intelligence Enhance Collection in an Era of Un-manned Technology and Reduced Personnel?” http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA613494 Human Intelligence can increase its relevancy as a collection discipline by integrating with other collection disciplines, including analysis. Having trained HUMINT collection teams integrated with analysts can help interpret technology-based collection information. By simply having a human element involved with the analysis of technology-based collection, we may be able to offer even more insight, or make that picture worth one thousand and two hundred words. Furthermore, by making reporting more accessible to analysts, commanders, and decision makers, we can increase the chances of painting the clearest picture possible. Decision makers and commanders may not have time to sift through the multitude of intelligence reports available to them, but if we as intelligence professionals give them the ability to access intelligence reporting as easily as accessing a live UAV or drone feed, then we can at least put the information in the right hands. Overreliance on classifications to protect sources and methodology has made HUMINT reporting and techniques difficult to understand. Protection of clandestine sources is vital to ensuring that the flow of information can remain, but not at the expense of restricting the information itself. Reductions in both HUMINT personnel and resources may be inevitable, but are not likely to affect HUMINT’s role in future intelligence collection. A better merging of HUMINT and technology, both in collection and in analysis and dissemination, will produce a clearer picture for commanders and decision makers, offering near immediate feedback, detailed, insightful analysis, and decreased risk to human life. Affirmative Losing war on terror Losing the war on terror now Zenko, 15 - Douglas Dillon fellow with the Center for Preventive Action at the Council on Foreign Relations (Micah, “America’s Virulent, Extremist Counterterrorism Ideology” Foreign Policy, 5/21, http://foreignpolicy.com/2015/05/21/americas-virulent-extremist-counterterrorism-ideologyperpetual-war-islamic-state/ With little awareness of the consequences of this shift in discourse, U.S. counterterrorism ideology has become far more nebulous, less concrete, and gradually more open-ended. The war on terrorism is going poorly: The number, estimated strength, lethality (within countries they operate in, not against Americans), and social media influence of jihadi terrorist groups is growing. Yet, the same toughsounding clichés and wholly implausible objectives are repeated over and over, with no indication of any strategic learning or policy adjustments. If this virulent and extremist — virulent in that it’s poisonous and harmful and that repeatedly espousing it ensures continued strategic failure, and extremist in that it proclaims the most extreme objectives that will never be achieved — U.S. counterterrorism ideology goes unchecked, it will further delude government officials and U.S. citizens into the false belief that the current courses of action are normal and acceptable and require no modification. This latest ideological change is most conspicuous in descriptions of who the United States is at war with. The enemy has always been overly classified and somewhat hidden, but at least there was once a recognized list of discrete groups. Now, the adversary is an undefined and contested category of groups or people allegedly connected with the act of terrorism. If the U.S. government were as imprecise with its bombs as with its descriptions of its terrorist enemies, it would be a war crime. This matters: If you cannot name your opponents, you certainly cannot know them, much less measure progress in defeating them. Consider the nebulous jumble of abstract enemies that officials have pronounced. In February, President Barack Obama said, “We are at war with people who have perverted Islam” and said that the international community must “eradicate this scourge of violent extremism.” Similarly, when attempting to describe the enemy, the chairman of the Joint Chiefs of Staff, Gen. Martin Dempsey, claimed that the United States is in a fight “against the group that has perverted Islam.” In February, National Security Advisor Susan Rice contextualized the U.S. mission as “to cut off violent extremism at the knees.” Earlier that month, she attempted to describe the undefined enemy: “As al Qaeda core has been decimated, we have seen the diffusion of the threat to al Qaeda affiliates, ISIL, local militia[s], and homegrown violent extremists.” Eric Holder, then the attorney general, claimed, also in February, that the United States is simply “combating the threat of violent extremism.” Gen. Lloyd Austin, commander of U.S. Central Command, said the enemy is “ISIL and other violent extremist groups.” Some policymakers have been even vaguer. When asked to define the enemy, Secretary of State John Kerry said, “I call them the enemy of Islam.” Let’s set aside the fact that Kerry is now presuming to interpret what is legitimate faith for 1 billion Muslims. Just who is this enemy precisely? Meanwhile, the Republican presidential candidates are outdoing one another in blurring the enemy and exponentially expanding the number of individuals whom the United States must defeat. Sen. Marco Rubio (R-Fl.) coined the Taken doctrine: “On our strategy on global jihadists and terrorists, I refer them to the movie Taken … Liam Neeson. He had a line, and this is what our strategy should be: ‘We will look for you, we will find you, and we will kill you.’” Less theatrically, Sen. Ted Cruz (R-Texas) merely pledged, “We will stand up and defeat radical Islamic terrorism.” Former Texas Gov. Rick Perry said, “We are in the early years of a struggle with violent Islamic extremists that will last many decades.” Meanwhile, Sen. Rand Paul (R-Ky.), while touting his alleged willingness to name the enemy, called them “radical Islam” and “haters of mankind.” Again, it’s fine, though meaningless, to talk tough, but whom are these threats being made against? The other threatening recent shift in U.S. counterterrorism ideology relates to the end state in the war on terrorism and when this might come about. Although Obama once claimed that this war, “like all wars, must end,” officials and policymakers no longer pretend that the war on terrorism will ever end; nor do they offer any narrative for how this war would end. Rather, they are attempting to normalize the war on terrorism as something all Americans should accept and get used to. As Defense Secretary Ashton Carter admitted, “We need to be thinking about terrorism more generally as a more enduring part of our national security mission.” This shift was crystallized in a remarkable recent observation by CIA Director John Brennan. Three years ago, Brennan, then Obama’s closest counterterrorism advisor, pledged, “We’re not going to rest until al Qaeda the organization is destroyed and is eliminated from areas in Afghanistan, Pakistan, Yemen, Africa, and other areas. We’re determined to do that.” Yet, last month, when asked at Harvard University when the war on terrorism will end, he responded philosophically: “It’s a long war, unfortunately. But it’s been a war that has been in existence for millennia.… So this is going to be something, I think, that we’re always going to have to be vigilant about.” In other words, defeating terrorism is eschatological and eternal. Similarly, Obama and his senior aides have come to repeatedly reframe the war in decades. The new National Security Strategy describes it as “a generational struggle in the aftermath of the 2003 Iraq war and 2011 Arab uprisings, which will redefine the region as well as relationships among communities and between citizens and their governments.” Meanwhile, Dempsey, the most senior uniformed military official, warned of Islamic terrorism: “I think this threat is probably a 30-year issue.” Likewise, on Capitol Hill, this view has become standardized. Rep. Mac Thornberry (R-Texas) said it is a “multigenerational struggle” with “no cheap way to win this fight.” Similarly, Sen. John McCain (R-Ariz.) called it “a generational fight for civilization against brutal enemies.” Rep. Trent Franks (R-Ariz.) went even further than Brennan, noting, “We’ve been fighting this radical Islamist ideology for 1,400 years.” In other words, long before the United States was even established. Forget who the enemy is; who is this “we”? What is most disheartening about this radicalized counterterrorism discourse is that these same officials and policymakers still pretend that these diffuse terrorist threats will be “destroyed,” “defeated,” or “eliminated.” This quite simply will not happen because the United States and its partners keep applying the same strategies and policies while foolishly hoping for a different result. Officials claim that terrorists’ ideology is their “center of gravity,” a term the Pentagon defines as: “The source of power that provides moral or physical strength, freedom of action, or will to act.” Yet, again, because nothing has succeeded at countering that ideology, we are supposed to become accustomed to an endless war against a nondescript concept. The only ideology that the United States can influence or control is its own. Instead, Washington has busied itself conflating local militancy with threats to the homeland, refusing to identify the enemy, proclaiming tough-sounding and implausible strategic objectives, and demonstrating no meaningful learning or adjustments over 13 years. The lack of precision employed when defining America’s adversaries in the war on terrorism and the absence of any end state (combined with those unachievable objectives) comprise a dangerous and extremist set of beliefs for U.S. officials and policymakers to hold. If the war on terrorism is really all about ideology and ideas, then the United States should spend as much time analyzing its own ideology as it does its enemies’. The emerging counterterrorism ideology that Washington is expressing is hazardous, illusory, and sadly unchallenged. Losing the war on terrorism Zenko, 15 - Douglas Dillon fellow with the Center for Preventive Action at the Council on Foreign Relations (Micah, “Terrorism Is Booming Almost Everywhere But in the United States” Foreign Policy, 6/19, https://foreignpolicy.com/2015/06/19/terrorism-is-booming-almost-everywhere-but-in-theunited-states-state-department-report/ On June 19, the U.S. State Department published its Country Reports on Terrorism: 2014 — the department’s annual, congressionally mandated analytical and statistical review of global terrorism. Since the concept of terrorism is open to subjective interpretation and politically motivated misrepresentation, it is important to note that, since 1983, the U.S. government has used the same definition for statistical analytical purposes, which is based in Title 22 of the U.S. Code, Section 2656f(d): (2) the term “terrorism” means premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents… “non-combatant,” which is referred to but not defined in 22 USC 2656f(d)(2), is interpreted to mean, in addition to civilians, military personnel (whether or not armed or on duty) who are not deployed in a war zone or a war-like setting. With that relatively limited definition of terrorism in mind, there are five significant findings that stand out from the latest report. First, the phenomenon of terrorism has significantly worsened, in terms of the number of attacks, their lethality, as well as the size of terrorist organizations. The number of attacks increased 39 percent from 9,707 in 2013 to 13,463 last year. There were 17,891 fatalities in 2013, growing 83 percent to 32,727 in 2014. To give you a fuller sense of how vastly contemporary terrorism has grown, just a little over a dozen years ago, in 2002, only 725 people were killed worldwide. During President Barack Obama’s first full year in office, in 2010, it was 13,186. In other words, terrorist-related deaths grew by more than 4,000 percent from 2002 and by 148 percent from 2010 to 2014. The size of several groups grew in strength, in particular the self-declared Islamic State, which was estimated to include both between 1,000 and 2,000 members in Iraq and a “significant portion” of the 26,000 extremist fighters in Syria in 2013, and grew in strength to between 20,000 and 31,500 fighters in 2014. Boko Haram also expanded from “hundreds to a few thousand” to “several thousand” fighters. In addition, there were 33 new organizations identified as perpetrators of terrorist attacks in 2014, indicating that more groups are forming to employ this deadly tactic. CT fails now Brooks, 15 - law professor at Georgetown University and a Schwartz senior fellow at the New America Foundation (Rosa, “U.S. Counterterrorism Strategy Is the Definition of Insanity” Foreign Policy, 6/24, http://foreignpolicy.com/2015/06/24/u-s-counterterrorism-strategy-is-the-definition-of-insanity/ Show me someone who publicly insists that the United States has an effective counterterrorism strategy, and I’ll show you someone who draws a paycheck from the U.S. government. “This week we have seen success across a broad spectrum,” Pentagon spokesman Col. Steve Warren told reporters on June 16, commenting on the death of Yemeni al Qaeda leader Nasir al-Wuhayshi, reportedly killed as a result of a U.S. drone strike. “Any time a terrorist is removed from the battlefield, is killed or captured, I think the net gain outweighs any potential loss.” Loyalty to your employer is a fine thing, especially in a press spokesman, but outside the ranks of officials in President Barack Obama’s administration, experts are far more dubious about the heavy U.S. reliance on air power and targeted strikes. “The tactical, whack-a-mole approach is not having the desired effect,” my Foreign Policy colleague Micah Zenko told the New York Times. “Not having the desired effect” was a polite circumlocution: As Zenko recently noted for FP, State Department figures show a substantial recent uptick in global terrorism. In 2014, terrorist attacks increased 39 percent over the previous year, while the number of fatalities caused by terrorist attacks went up 83 percent. In Yemen, which the administration inexplicably continues to tout as a counterterrorism “success,” U.S. policy in in shambles. “If you’re looking for logic here, you’re not going to find much,” Stephen Seche, a former U.S. ambassador to Yemen, told the New York Times. In mid-June, the Washington Post reported that “[al]-Qaeda affiliates are significantly expanding their footholds” in both Yemen and Syria. And the Islamic State also continues to gain ground in both countries. Meanwhile, in Libya, it’s “utter chaos,” former U.N. advisor Dirk Vandewalle told the Times: The Islamic State and al Qaeda-linked groups are vying for power, and a recent U.S. drone strike against al Qaeda operative Mokhtar Belmokhtar “shows that we’re still relying on ad hoc measures.” In Iraq, Somalia, and Afghanistan, it’s the same story. The United States continues to rely heavily on airstrikes and targeted killings, while terrorist groups continue to cause mayhem and gain adherents. Even some of those who do get paid by Uncle Sam have grown more openly skeptical of U.S. counterterrorism policy. Capt. Robert Newson, a Navy SEAL who served as director of the Joint Interagency Task Force-Counter Terrorism, told an interviewer at West Point’s Combating Terrorism Center that “drone strikes, manned airstrikes, and special operations raids … buy space and time. But by themselves they are only a delaying action, and everywhere I have been, in Iraq, Afghanistan, Yemen, every military person up and down the chain of command acknowledges this. This ‘CT concept’ — the solution that some people champion where the main or whole effort is drone strikes and special operations raids — is a fantasy.” Like Newson, I haven’t encountered many defenders of U.S. counterterrorism strikes. Last year, I cochaired a Stimson Center commission on U.S. drone policy with retired Gen. John Abizaid. The commission, which included former senior military and intelligence officials from both Obama’s and George W. Bush’s administrations, concluded in June 2014 that “the Obama administration’s heavy reliance on targeted killings as a pillar of US counterterrorism strategy rests on questionable assumptions, and risks increasing instability and escalating conflicts. While tactical strikes may have helped keep the homeland free of major terrorist attacks, existing evidence indicates that both Sunni and Shia Islamic extremist groups have grown in scope, lethality and influence in the broader area of operations in the Middle East, Africa and South Asia.” In dozens of interviews and conversations with national security experts since June 2014, I have yet to find anyone who won’t admit, off the record, that U.S. counterterrorism policy is flailing badly. AT: Empirically NSA stopped attacks NSA isn’t key to stopping terrorist attacks – their empirical examples are wrong and other programs check threats. Cahall et al 14 (Bailey Cahall, Policy Analyst at New America Foundation, David Sterman, Program Associate at New America with an M.A. from Georgetown’s Center for Security Studies, “DO NSA'S BULK SURVEILLANCE PROGRAMS STOP TERRORISTS?,” International Security, 13 January 2014, https://www.newamerica.org/international-security/do-nsas-bulksurveillance-programs-stop-terrorists/, *fc) June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding the extent and nature of the NSA’s surveillance programs. Facing an uproar over the threat such programs posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S. national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward Snowden were published, President Obama defended the NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen. Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from these programs provided the U.S. government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.), chairman of the House Permanent Select Committee on Intelligence, said on the House floor in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real lives.” However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading . An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined. Regular FISA warrants not issued in connection with Section 215 or Section 702, which are the traditional means for investigating foreign persons, were used in at least 48 (21 percent) of the cases we looked at, although it’s unclear whether these warrants played an initiating role or were used at a later point in the investigation. (Click on the link to go to a database of all 225 individuals, complete with additional details about them and the government’s investigations of these cases: http://natsec.newamerica.net/nsa/analysis). Surveillance of American phone metadata has had no discernible impact on preventing acts of terrorism and only the most marginal of impacts on preventing terrorist-related activity, such as fundraising for a terrorist group. Furthermore, our examination of the role of the database of U.S. citizens’ telephone metadata in the single plot the government uses to justify the importance of the program – that of Basaaly Moalin, a San Diego cabdriver who in 2007 and 2008 provided $8,500 to al-Shabaab, al-Qaeda’s affiliate in Somalia – calls into question the necessity of the Section 215 bulk collection program. According to the government, the database of American phone metadata allows intelligence authorities to quickly circumvent the traditional burden of proof associated with criminal warrants, thus allowing them to “connect the dots” faster and prevent future 9/11-scale attacks. Yet in the Moalin case, after using the NSA’s phone database to link a number in Somalia to Moalin, the FBI waited two months to begin an investigation and wiretap his phone. Although it’s unclear why there was a delay between the NSA tip and the FBI wiretapping, court documents show there was a two-month period in which the FBI was not monitoring Moalin’s calls, despite official statements that the bureau had Moalin’s phone number and had identified him. , This undercuts the government’s theory that the database of Americans’ telephone metadata is necessary to expedite the investigative process, since it clearly didn’t expedite the process in the single case the government uses to extol its virtues. Additionally, a careful review of three of the key terrorism cases the government has cited to defend NSA bulk surveillance programs reveals that government officials have exaggerated the role of the NSA in the cases against David Coleman Headley and Najibullah Zazi, and the significance of the threat posed by a notional plot to bomb the New York Stock Exchange. In 28 percent of the cases we reviewed, court records and public reporting do not identify which specific methods initiated the investigation. These cases, involving 62 individuals, may have been initiated by an undercover informant, an undercover officer, a family member tip, other traditional law enforcement methods, CIA- or FBI-generated intelligence, NSA surveillance of some kind, or any number of other methods. In 23 of these 62 cases (37 percent), an informant was used. However, we were unable to determine whether the informant initiated the investigation or was used after the investigation was initiated as a result of the use of some other investigative means. Some of these cases may also be too recent to have developed a public record large enough to identify which investigative tools were used. We have also identified three additional plots that the government has not publicly claimed as NSA successes, but in which court records and public reporting suggest the NSA had a role. However, it is not clear whether any of those three cases involved bulk surveillance programs. Finally, the overall problem for U.S. counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques. This was true for two of the 9/11 hijackers who were known to be in the United States before the attacks on New York and Washington, as well as with the case of Chicago resident David Coleman Headley, who helped plan the 2008 terrorist attacks in Mumbai, and it is the unfortunate pattern we have also seen in several other significant terrorism cases. Overload turn NSA insiders recognize information overload as a serious problem- it undermines counterterror efforts Maass 5/28 (Peter, national security author, fellow at the Shorenstein Center at Harvard and the American Academy in Berlin, “INSIDE NSA, OFFICIALS PRIVATELY CRITICIZE "COLLECT IT ALL" SURVEILLANCE,” https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-itall-surveillance/, May 28, 2015, The Intercept, silbs) << AS MEMBERS OF CONGRESS struggle to agree on which surveillance programs to re-authorize before the Patriot Act expires, they might consider the unusual advice of an intelligence analyst at the National Security Agency who warned about the danger of collecting too much data. Imagine, the analyst wrote in a leaked document, that you are standing in a shopping aisle trying to decide between jam, jelly or fruit spread, which size, sugar-free or not, generic or Smucker’s. It can be paralyzing. “We in the agency are at risk of a similar, collective paralysis in the face of a dizzying array of choices every single day,” the analyst wrote in 2011. “’Analysis paralysis’ isn’t only a cute rhyme. It’s the term for what happens when you spend so much time analyzing a situation that you ultimately stymie any outcome …. It’s what happens in SIGINT [signals intelligence] when we have access to endless possibilities, but we struggle to prioritize, narrow, and exploit the best ones.” The document is one of about a dozen in which NSA intelligence experts express concerns usually heard from the agency’s critics: that the U.S. government’s “collect it all” strategy can undermine the effort to fight terrorism. The documents, provided to The Intercept by NSA whistleblower Edward Snowden, appear to contradict years of statements from senior officials who have claimed that pervasive surveillance of global communications helps the government identify terrorists before they strike or quickly find them after an attack. The Patriot Act, portions of which expire on Sunday, has been used since 2001 to conduct a number of dragnet surveillance programs, including the bulk collection of phone metadata from American companies. But the documents suggest that analysts at the NSA have drowned in data since 9/11, making it more difficult for them to find the real threats. The titles of the documents capture their overall message: “Data Is Not Intelligence,” “The Fallacies Behind the Scenes,” “Cognitive Overflow?” “Summit Fever” and “In Praise of Not Knowing.” Other titles include “Dealing With a ‘Tsunami’ of Intercept” and “Overcome by Overload?” The documents are not uniform in their positions. Some acknowledge the overload problem but say the agency is adjusting well. They do not specifically mention the Patriot Act, just the larger dilemma of cutting through a flood of incoming data. But in an apparent sign of the scale of the problem, the documents confirm that the NSA even has a special category of programs that is called “Coping With Information Overload.” The jam vs. jelly document, titled “Too Many Choices,” started off in a colorful way but ended with a fairly stark warning: “The SIGINT mission is far too vital to unnecessarily expand the haystacks while we search for the needles. Prioritization is key.” >> NSA insiders cite academic literature about the human attention economy and decision making- bulk data harms both Maass 5/28 (Peter, national security author, fellow at the Shorenstein Center at Harvard and the American Academy in Berlin, “INSIDE NSA, OFFICIALS PRIVATELY CRITICIZE "COLLECT IT ALL" SURVEILLANCE,” https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-itall-surveillance/, May 28, 2015, The Intercept, silbs) “We are drowning in information. And yet we know nothing. For sure.” –NSA Intelligence Analyst Many of these documents were written by intelligence analysts who had regular columns distributed on NSANet, the agency’s intranet. One of the columns was called “Signal v. Noise,” another was called “The SIGINT Philosopher.” Two of the documents cite the academic work of Herbert Simon, who won a Nobel Prize for his pioneering research on what’s become known as the attention economy. Simon wrote that consumers and managers have trouble making smart choices because their exposure to more information decreases their ability to understand the information. Both documents mention the same passage from Simon’s essay, Designing Organizations for an Information-Rich World: “In an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.” In addition to consulting Nobel-prize winning work, NSA analysts have turned to easier literature, such as Malcolm Gladwell’s best-selling Blink: The Power of Thinking Without Thinking. The author of a 2011 document referenced Blink and stated, “The key to good decision making is not knowledge. It is understanding. We are swimming in the former. We are desperately lacking in the latter.” The author added, “Gladwell has captured one of the biggest challenges facing SID today. Our costs associated with this information overload are not only financial, such as the need to build data warehouses large enough to store the mountain of data that arrives at our doorstep each day, but also include the more intangible costs of too much data to review, process, translate and report.” Alexander, the NSA director from 2005 to 2014 and chief proponent of the agency’s “collect it all” strategy, vigorously defended the bulk collection programs. “What we have, from my perspective, is a reasonable approach on how we can defend our nation and protect our civil liberties and privacy,” he said at a security conference in Aspen in 2013. He added, “You need the haystack to find the needle.” The same point has been made by other officials, including James Cole, the former deputy attorney general who told a congressional committee in 2013, “If you’re looking for the needle in the haystack, you have to have the entire haystack to look through.” The opposing viewpoint was voiced earlier this month by Snowden, who noted in an interview with the Guardian that the men who committed recent terrorist attacks in France, Canada and Australia were under surveillance—their data was in the haystack yet they weren’t singled out. “It wasn’t the fact that we weren’t watching people or not,” Snowden said. “It was the fact that we were watching people so much that we did not understand what we had. The problem is that when you collect it all, when you monitor everyone, you understand nothing.” In a 2011 interview with SIDtoday, a deputy director in the Signals Intelligence Directorate was asked about “analytic modernization” at the agency. His response, while positive on the NSA’s ability to surmount obstacles, noted that it faced difficulties, including the fact that some targets use encryption and switch phone numbers to avoid detection. He pointed to volume as a particular problem. >> We’re already past the limits on human intelligence- data doesn’t do anything if it can’t be analyzed or used effectively Maass 5/28 (Peter, national security author, fellow at the Shorenstein Center at Harvard and the American Academy in Berlin, “INSIDE NSA, OFFICIALS PRIVATELY CRITICIZE "COLLECT IT ALL" SURVEILLANCE,” https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-itall-surveillance/, May 28, 2015, The Intercept, silbs) << “We live in an Information Age when we have massive reserves of information and don’t have the capability to exploit it,” he stated. “I was told that there are 2 petabytes of data in the SIGINT System at any given time. How much is that? That’s equal to 20 million 4-drawer filing cabinets. How many cabinets per analyst is that? By the end of this year, we’ll have 1 terabyte of data per second coming in. You can’t crank that through the existing processes and be effective.” The documents noted the difficulty of sifting through the ever-growing haystack of data. For instance, a 2011 document titled “ELINT Analysts – Overcome by Overload? Help is Here with IM&S” outlined a half dozen computer tools that “are designed to invert the paradigm where an analyst spends more time searching for data than analyzing it.” Another document, written by an intelligence analyst in 2010, bluntly stated that “we are drowning in information. And yet we know nothing. For sure.” The analyst went on to ask, “Anyone know just how many tools are available at the Agency, alone? Would you know where to go to find out? Anyone ever start a new target…without the first clue where to begin? Did you ever start a project wondering if you were the sole person in the Intelligence Community to work this project? How would you find out?” The analyst, trying to encourage more sharing of tips about the best ways to find data in the haystack, concluded by writing, in boldface, “Don’t let those coming behind you suffer the way you have.” The agency appears to be spending significant sums of money to solve the haystack problem. The document headlined “Dealing With a ‘Tsunami’ of Intercept,” written in 2006 by three NSA officials and previously published by The Intercept, outlined a series of programs to prepare for a near future in which the speed and volume of signals intelligence would explode “almost beyond imagination.” The document referred to a mysterious NSA entity–the “Coping With Information Overload Office.” This appears to be related to an item in the Intelligence Community’s 2013 Budget Justification to Congress, known as the “black budget”—$48.6 million for projects related to “Coping with Information Overload.” The data glut is felt in the NSA’s partner agency in Britain, too. A slideshow entitled “A Short Introduction to SIGINT,” from GCHQ, the British intelligence agency, posed the following question: “How are people supposed to keep on top of all their targets and the new ones when they have far more than [they] could do in a day? How are they supposed to find the needle in the haystack and prioritise what is most important to look at?” The slideshow continued, “Give an analyst three leads, one of which is interesting: they may have time to follow that up. Give them three hundred leads, ten of which are interesting: that’s probably not much use.” These documents tend to shy away from confrontation—they express concern with the status quo but do not blame senior officials or demand an abrupt change of course. They were written by agency staffers who appear to believe in the general mission of the NSA. For instance, the author of a “SIGINT Philosopher” column wrote that if the NSA was a corporation, it could have the following mission statement: “building informed decision makers — so that targets do not suffer our nation’s wrath unless they really deserve it — by exercising deity-like monitoring of the target.” On occasion, however, the veil of bureaucratic deference is lowered. In another “SIGINT Philosopher” column, “Cognitive Overflow?,” the author offered a forthright assessment of the haystack problem and the weakness of proposed solutions: “If an individual brain has finite ‘channel capacity,’ does the vast collective of SID, comprised of thousands of brilliant, yet limited, brains also have a definite ‘channel capacity’? If so, what is it? How do we know when we’ve reached it? What if we’ve already exceeded it? In essence, could SID’s reach exceed its grasp? Can the combined cognitive power of SID connect all the necessary dots to avoid, predict, or advise when the improbable, complex, or unthinkable happens?” The column did not offer an optimistic view. “Take for example the number of tools, clearances, systems, compliances, and administrative requirements we encounter before we even begin to engage in the work of the mission itself,” the column continued. “The mission then involves an ever-expanding set of complex issues, targets, accesses, and capabilities. The ‘cognitive burden,’ so to speak, must at times feel overwhelming to some of us.” The analyst who wrote the column dismissed, politely but firmly, the typical response of senior officials when they are asked in public about their ability to find needles in their expanding haystack. “Surely someone will point out that the burgeoning amalgam of technological advances will aid us in shouldering the burden,” he noted. “However, historically, this scenario doesn’t seem to completely bear out. The onslaught of more computer power—often intended to automate some processes—has in many respects demanded an expansion of our combined ‘channel capacity’ rather than curbing the flow of the information.” >> Information overload allowed for the Boston terror attacks- increasing efficiency is key to stop future attacks Spies 14 (Mike, journalist, “Did NSA-Style Snooping Blind the FBI to Boston’s Bombers? The FBI knew about Tamerlan Tsarnaev in 2011, but information overload meant he was never singled out for attention,” http://www.vocativ.com/usa/nat-sec/fbi-finally-admits-lost-track-boston-marathonbomber/, vocativ, April 13, 2014, silbs) When the bureau received the tip from the Russians in 2011, it opened an investigation—or an “assessment” in FBI parlance—that included at least one in-person interview with Tamerlan, as well as additional interviews with members of his family. Three weeks later, the Boston bureau’s Joint Terrorism Task Force, which brings representatives from the city’s police department and U.S. Customs and Border Patrol into the fold, placed Tamerlan’s name into a database of people suspected of extremism or ties to terrorists. Along with his name, there was also an alert, specifying that the Boston JTTF must be notified should Tamerlan make international travel plans, which would trigger pings upon his departure and return. Later, when Tamerlan traveled to Russia and eventually returned to the United States, the JTTF was notified on both occasions. But what remains so disquieting, a year after the bombings, is the FBI’s decision to ignore the warnings. Recently, FBI spokesman Paul Bresson provided Vocativ with a rare inside look at the agency’s investigation of Tamerlan Tsarnaev, and what went wrong. On June 24, 2011, the bureau, after determining there was nothing suspicious, officially ended its inquiry into Tamerlan. But according to the inspector general for U.S. intelligence agencies, which briefed Congress last week on its latest report concerning the bombings, the FBI didn’t stop there—it continued to pump the Russians for additional information but were apparently ignored. The Russians dispute this claim, but if it is true, it means the FBI was still concerned about Tamerlan, even after the case was officially closed. So then why, only seven months later, on January 22, 2012, when the JTTF received word that Tamerlan was leaving the country for Russia—where he would spend nearly six months in the volatile state of Dagestan, now considered the heart of the Chechen insurgency—did the agency decide he was not worth questioning? “You have to determine irregularities in travel,” says Bresson. “If he’s making constant trips overseas, going to places like Afghanistan and Pakistan—that’s something we’d need to look into. But this was just one time, and it wasn’t out of the ordinary. I mean, just in Boston alone, our JTTF gets tips like this every day. Nothing about Tamerlan’s trip threw up any warning signs.” Kade Crockford, the director of the Technology for Liberty Program at ACLU Massachusetts, believes it should have. Crockford, perhaps the foremost authority on the lingering questions raised by the Boston bombings, sees the FBI’s failure to look into Tamerlan’s journey as part of a larger institutional problem. “Millions of people are listed in government databases as potential terrorist threats,” says Crockford. “The FBI has the legal authority to approach anyone for an interview, at any time. Tamerlan’s case confirms what we have long suspected: The databases are so large that they are practically useless. When everyone is a suspect, no one is a suspect.” “The FBI, originally, was an investigative agency,” says Mike German, a fellow at the Brennan Center for Justice’s Liberty and National Security Program. But since 9/11, the bureau, like many federal agencies, has increasingly refocused its efforts on intelligence gathering as part of the overall counterterrorism agenda. This, German believes, is where the central failing lies. “Just like false alarms dull the response of firefighters, these ‘see something, say something’ leads [result in] only cursory investigations, then they move to the next one,” says German. “The Boston FBI JTTF conducted 1,000 assessments like this one in 2011 alone, which should be evidence of the problem—if you’re doing 1,000 in a year, those are not going to be as thorough as you need them to be. And you’re not going to be treating them as criminal investigations.” One of the allegations against Tamerlan was that he was going to Russia to meet with underground groups. “This violates the laws of the U.S.,” says German. “So it’s difficult to understand why that didn’t raise more alarms.” The FBI’s failings went beyond the years before the bombings; they also extended into the days immediately following the attack. On April 17, 2013, two days after pressure-cooker bombs exploded near the marathon’s finish line, the FBI received an image of both Tamerlan and Dzhokhar Tsarneav. But the FBI was unable to identify the two suspects, despite the fact that the agency had photographs of Tamerlan, who’d been arrested for domestic violence, in its database, and that the U.S. government had spent billions of dollars on facial-recognition software meant for just such purposes. “We attempted to use the facial-recognition technology, but it didn’t work,” admits Bresson. “I’m not sure why.” And what about the agents and police in the area—did they receive the images, too? “It stands to reason that the images were shared with all agencies in the Boston community,” Bresson says. “But we literally had no idea who these guys were.” Hacking encryption turn Encryption cracking opens access to unintended consequences, terrorism, loss of soft power, and stops tech company innovation Weitzner July 7th, (Daniel Weitzner is the Director of the MIT CSAIL Decentralized Information Group and teaches Internet public policy in MIT’s Computer Science Department. His research includes development of accountable systems architectures to enable the Web to be more responsive to policy requirements, former US Deputy Chief Technology Officer for Internet Policy in the White House. led initiatives on privacy, cybersecurity, Internet copyright, and trade policies promoting the free flow of information, “Encryption 'backdoors' will open for criminals as well as governments: experts”, http://www.timeslive.co.za/scitech/2015/07/07/Encryption-backdoors-will-open-for-criminals-as-wellas-governments-experts, TMP) A research report published by the M assachusetts I nstitute of T echnology challenges claims from US and British authorities that such access is the policy response needed to fight crime and terrorism.¶ Providing this kind of access "will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend," said the report by 13 scientists.¶ The paper was released a day after FBI Director James Comey called for public debate on the use of encrypted communications, saying Americans may not realize how radical groups and criminals are using the technology.¶ Comey argued in a blog post that Islamic State militants are among those using encryption to avoid detection.¶ The New York Times, which reported earlier on the study, said Comey was expected to renew a call at a congressional hearing for better access to encrypted communications to avoid "going dark."¶ The computer scientists said, however, that any effort to build in access for law enforcement could be exceedingly complex and lead to "unintended consequences," such as stifling innovation and creating hostility toward new tech products.¶ "The costs would be substantial, the damage to innovation severe, and the consequences to economic growth difficult to predict ," the report said.¶ " The costs to developed countries' soft power and to our moral authority would also be considerable."¶ In the 1990s, there was a similar debate on the "clipper chip" proposal to allow "a trusted third party" to have access to encrypted messages that could be granted under a legal process.¶ The clipper chip idea was abandoned, but the authors said that if it had been widely adopted , "it is doubtful that companies like Facebook and Twitter would even exist."¶ The computer scientists said the idea of special access would create numerous technical and legal challenges, leaving unclear who would have access and who would set standards.¶ "The greatest impediment to exceptional access may be jurisdiction," the report said.¶ "Building in exceptional access would be risky enough even if only one law enforcement agency in the world had it."¶ The British government is considering legislation to compel communications service providers, including US-based corporations, to grant access to British law enforcement agencies.¶ "China has already intimated that it may require exceptional access," the report said.¶ "If a British-based developer deploys a messaging application used by citizens of China, must it provide exceptional access to Chinese law enforcement?"¶ Among the report's authors are Daniel Weitzner, director of the MIT Computer Science and Artificial Intelligence Laboratory, and well-known MIT cryptographer Ronald Rivest. AT: Deterrence by denial Deterrence by denial fails—terrorists’ motives are too complex and will always overcome government tactics. Abrahms 14. (Max, assistant professor of political science at Northeastern University. “Deterring Terrorism: a New Strategy,” New Perspectives on Terrorism. June 2014. Directory of Open Access Journals.)//CB But just because terrorists rejoice from an operationally successful attack, this does not mean they can be deterred with a denial strategy. Denying terrorists from carrying out operationally successful attacks is a losing strategy for two main reasons. First, terrorists are manifestly motivated by numerous goals, some of which do not even require attacks at all.[20] Second, a consensus exists within the policy community that terrorists will always finds ways to mount operations, given sufficient resolve. As Stephen Flynn remarks, terrorism “will be perennially in the offing” because “it is an ongoing hazard, something we will never successfully eliminate.”[21] This is true for several reasons. For terrorists, potential targets include anywhere people gather. As such, very little capability is required for carrying out an attack. In the rare cases where targets are effectively hardened, terrorists simply move on to softer targets. Governments may try to play cat and mouse, but are ultimately constrained in their responses particularly within democracies.[22] In sum, the ease of perpetrating attacks virtually guarantees some form of success though is hardly a requirement for it. For the sake of prediction, scholars tend to model the behaviour of terrorists by attributing to them simple, straightforward incentive structures. In their efforts to achieve parsimony, however, these models are often too reductive. The evidence suggests that terrorists tend to harbour varied, complex, even inconsistent strategic and personal aims. Given the complexity of their objectives, terrorists seemingly derive utility from their actions regardless of how governments respond. The inability of governments to reduce the utility of terrorism seemingly presents an insurmountable challenge for deterring its practitioners. Deterrence by denial fails—terrorists’ motivations are too complex and diverse. Abrahms 14. (Max, assistant professor of political science at Northeastern University. “Deterring Terrorism: a New Strategy,” New Perspectives on Terrorism. June 2014. Directory of Open Access Journals.)//CB Traditional concepts of deterrence try to thwart unwanted behaviour by manipulating adversary incentives. Deterrence-by-punishment threatens to impose costs on the adversary for an undesirable course of action. Deterrence-by-denial seeks to deny him any benefits from it.[1] Clearly, both strategies are based on influencing the adversary by reducing the utility of his actions. Unfortunately, neither approach is likely to succeed since terrorists are generally motivated by such a wide variety of personal and strategic aims that they are liable to derive utility from their actions regardless of how governments respond. Although traditional concepts of deterrence are unlikely to work against terrorists on any systematic basis, the tactic itself may be deterred with an alternative counterterrorism approach. Deterrence-bydelegitimisation focuses less on deterring adversaries themselves than their support constituencies.[2] This less well-known indirect form of deterrence offers superior counterterrorism promise because terrorist supporters are more likely to be motivated by a relatively straightforward incentive structure. Unlike the perpetrators themselves, their supporters are generally driven by one main goal—the desire to coerce government concessions. In recent years, a growing body of academic research has found that terrorism decreases rather than increases the odds of government compliance. In this fundamental sense, the tactic of terrorism is politically counterproductive. The policy community’s primary contribution to deterring terrorism should be to broadcast this finding in a targeted public diplomacy campaign to terrorist supporters. The argument of this article proceeds in three sections. In the first section, an explanation is offered why classic concepts of deterrence are doomed to fail against terrorists. The strategies of deterrence-bypunishment and deterrence-by-denial are based on the unrealistic premise that governments can deter terrorists by simply removing the utility of their violent behaviour. This assumption is faulty not because terrorists are categorically irrational actors, but because they do not employ a uniform, consistent metric of success. Indeed, many terrorists seem to regard their actions as fruitful regardless of how governments choose to respond. The second section argues that most terrorism is deterrable, however, even if its practitioners are not. This section details the burgeoning academic literature on terrorism’s political ineffectiveness and explains how this finding can be exploited to deter terrorist supporters and, by extension, the tactic itself. The conclusion issues an appeal to the policy community—work closer with the academic community on counterterrorism. Only by sharing our knowledge can we hope to deter the terrorism threat. AT: Deterrence by denial - Cyberterror Deterrence techniques fail—actors have diverse motives, and interagency cooperation is a pre-requisite to implementation of effective strategies. Jasper 15. (Scott, lecturer at the Naval Postgraduate School in the Center for Civil-Military Relations and the National Security Affairs department. “Deterring Malicious Behavior in Cyberspace,” Strategic Studies Quarterly. Spring 2015. http://www.au.af.mil/au/ssq/digital/pdf/Spring_2015/jasper.pdf)//CB Deterrence of the wide array of actors in cyberspace is difficult, since deterrence has to work in the mind of the attacker. The point of deter- rence is to add another consideration to the attacker’s calculus.6 Deter- rence instills a belief that a credible threat of unacceptable counteraction exists, that a contemplated action cannot succeed, or that the cost of action outweighs the perceived benefits. Complicated issues, like attribution, legality, liability, privacy, trust, and verification hamper conventional strategies and beg for an alternative ability to influence malicious behavior. The controversial concept of active cyberdefense (proactive actions), which relies on forensic intelligence and automated counter- measures, offers such an alternative and could limit exposure to threats. Before considering each of the four strategies mentioned above, it is instructive to first consider aspects of cyberattack vectors along with current threat-actor strategies. The complexity and severity of acts of cy- ber aggression indicate that implementation of any strategy will require cooperation among all stakeholders in industry, government, and de- fense spheres. A proven method for national cooperation is the compre- hensive approach used in international stabilization and reconstruction operations as witnessed through the North Atlantic Treaty Organization (NATO). DbD fails—the government can’t know cyberterrorists’ motives and it’s empirically disproven. Iasiello 13. (Emillio, chief threat analyst for a global cyber intelligence firm, supporting federal and commercial entities to manage cyber risks, understand their threat environment, and help prioritize their investments against those threats impacting their business or mission. "Is Cyber Deterrence an Illusory Course of Action?." Journal of Strategic Security 7, no. 1. 2013. http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1337&context=jss&seiredir=1&referer=https%3A%2F%2Fscholar.google.com%2Fscholar%3Fq%3D%2522deterrence%2Bby%2Bdenial%2522%26btnG %3D%26hl%3Den%26num%3D20%26as_sdt%3D0%252C23%26sciodt%3D0%252C23%26as_ylo%3D2014%26cites%3D2899554 789194611788%26scipsc%3D1#search=%22deterrence%20by%20denial%22)//CB Another facet challenging a successful deterrence strategy is consistently influencing terrorist behavior. In order to be successful, a direct response deterrent threat must be made conditional on an adversary’s behavior; if individuals and political groups believe that they will be targeted as part of the U.S. war on terror regardless of their actions, they have less incentive to show restraint.34 To date, there have been no publicly observed incidents or evidence where cyber deterrence by denial or punishment has been successfully used to mitigate hostile cyber activity, or influence the actors directing or conducting the activity. TSA ineffective The TSA fails to stop terrorists 95% of the time Costello and Johnson 15— News & Documentary Emmy Award and political and post-Sept. 11 security issues reporter (Tom and M. Alex, “TSA Chief Out After Agents Fail 95 Percent of Airport Breach Tests,” NBC news, June 1, 2015, http://www.nbcnews.com/news/us-news/investigation-breaches-usairports-allowed-weapons-through-n367851). WM The acting head of the Transportation Security Administration was reassigned Monday after an internal investigation by the Department of Homeland Security found security failures at dozens of the nation's busiest airports. The breaches allowed undercover investigators to smuggle weapons, fake explosives and other contraband through numerous checkpoints. Melvin Carraway, an 11-year veteran of the TSA who became acting administrator in January, was immediately reassigned to a DHS program coordinating with local law enforcement agencies, DHS Secretary Jeh Johnson said Monday night. Coast Guard Vice Adm. Pete Neffenger's nomination to be permanent administrator is awaiting Senate confirmation. Upon learning the initial findings of the Office of Inspector General's report, Johnson immediately directed TSA to implement a series of other actions, several of which are now in place, agency officials said. In one case, an alarm sounded, but even during a pat-down, the screening officer failed to detect a fake plastic explosive taped to an undercover agent's back. In all, so-called "Red Teams" of Homeland Security agents posing as passengers were able get weapons past TSA agents in 67 out of 70 tests — a 95 percent failure rate , according to agency officials. "The numbers in these reports never look good out of context, but they are a critical element in the continual evolution of our aviation security," Homeland Security officials said in a statement. This isn't the first time TSA officers have failed to detect fake terrorists and their weapons. "Red Teams" have been probing TSA checkpoints for 13 years, oftentimes successfully getting weapons past airport screeners. However, this time, TSA agents failed to detect almost every single test bomb and gun , aviation experts said. " It's disturbing news . The question is how we can best mitigate that vulnerability in a way that doesn't prohibit the free movement of people and goods," John Pistole, a former TSA administrator, told NBC News. "That's just something that there's no perfect answer for." Meanwhile, terrorism experts stress that the threat levels remain high. "There's a continuing drumbeat of interests by terrorist groups, whether al-Qaeda or al-Qaeda affiliates, to try to bring down a Western — especially a U.S.-bound — aircraft," Pistole said. TSA programs are scientifically proven infective KONSTANTINIDES 15— reporter (Anetta, “How to spot a terrorist: TSA's checklist reveals the behavior they look out for, including a 'strong body odor', 'whistling' and a 'cold penetrating stare',” Daily Mail, 28 March 2015, http://www.dailymail.co.uk/news/article-3015970/TSA-s-SPOT-checklistreveals-behavioral-traits-agents-look-spot-terrorist.html). WM A behavioral checklist that the Transportation Security Administration uses to help identify airport travelers they believe could be potential terrorists has been revealed. The Screening of Passengers by Observation Techniques system, nicknamed SPOT, breaks down body language and demeanor the TSA believes indicates either 'stress' or 'deception'. Mannerisms are assigned points based on their severity and are assessed by trained 'Behavior Detection Officers', who observe passengers as they go through the security checkpoint. Behaviors are given points based on their perceived severity. If you walk through security with a 'face pale from recent shaving of beard' or happen to be yawning or whistling, you can be assigned one point. A strong body odor, sweaty palms and a bobbing Adam's apple can also get you one point, according to the checklist obtained by The Intercept. Having 'widely open eyes' will get you two points, as will showing 'unusual' interest in a security officer's work routine or having 'identical luggage or dress' to an individual who does not seem related to you. Appearing to be in disguise will get you three points. But you can also get points shaved off. If you appear to be a member of a family or part of a married couple, you get two points deducted from your score. Being a female over 55, or a male over 65, gets you a one point reduction. The checklist includes a list of items and behaviors to look out for if a passenger is pulled aside for inspection. 'Suspicious' items range from blueprints to liquids 'in excess of 3.4oz'. Further signs of deception include excessive yawning or perspiration and lacking details about the purpose of one's trip. The SPOT program, which has cost more than $800million since its inception in 2007, was deemed ineffective by both the Department of Homeland Security and the Government Accountability Office last year. The GAO found that there was no scientific evidence to support the SPOT's claim that terrorists can be picked out via 'behavioral indicators', and said the human's ability to 'accurately identify' suspicious behavior is 'slightly better than chance'. The Department of Homeland Security report said that the TSA had not assessed the effectiveness of the SPOT program or designed a 'comprehensive training program' for it. It concluded that the TSA could not 'ensure that passengers at United States airports are screened objectively' with SPOT and did not believe the administration could 'justify the program's expansion'. TSA measures cant identify people flagged as terrorists Gass 15— degree in convergence journalism (Nick, “Report: TSA missed 73 terrorism-flagged airline workers,” Politico, 6/8/15, http://www.politico.com/story/2015/06/tsa-missed-73-terrorism-flaggedairline-workers-report-118738.html). WM The T ransportation S ecurity A dministration failed to identify at least 73 people employed in the airline industry flagged under terrorism-related activity codes , according to a recent report by its inspector general . These people, including employees of major airlines, airport vendors and other employers, were all cleared to access secure airport areas despite being watch-listed. The reason for this, according to the TSA, is in part because the agency “is not authorized to receive all terrorismrelated information under current interagency watchlisting policy.” Rather than conducting criminalhistory and work-authorization checks itself, the TSA generally delegated individual airports to do these tasks, though it had limited oversight. “Thus, TSA lacked assurance that it properly vetted all credential applicants,” the report says. Additionally, thousands of records used to vet these workers had incomplete or inaccurate data, the report says. The agency “risks credentialing and providing unescorted access to secure airport areas for workers with potential to harm the nation’s air transportation system,” it concludes. The latest news comes a week after interim TSA chief Melvin Carraway was reassigned the same day a bombshell report surfaced , finding that officials failed to stop undercover TSA agents from smuggling banned weapons or fake explosives through airport security . No Nuclear Terror No risk of terrorists using dirty bombs – it’s too difficult to get materials and build weapons. Mauroni 10 (Al Mauroni, Director at USAF Center for Unconventional Weapons Studies with a BS in Chemistry from Carnegie Mellon, “Homeland Insecurity: Thinking About CBRN Terrorism,” Homeland Security Affairs, September 2010, https://www.hsaj.org/articles/78, *fc) **Modified for ableist language Radiological terrorism gets people excited because, even though the nature of radiological hazards hasn’t changed in more than six decades, there’s something about radiation that spooks us. The term “dirty bombs” has a sinister sound. But of all the terrorist CBRN hazards, radiological devices (RDD) are certainly not WMD. We have never had an RDD incident to date , and yet so many people like to worry about the loose or available radiological isotopes that could be grabbed up by terrorists. I’m very critical about the approach to addressing radiological terrorism. It’s no surprise that the easiest way to reduce our risk in this area is to secure all the radiological material that industry uses and to place it in one location that could be guarded. Instead, because of NIMBY politics, the decision was made to close down a $9 billion nuclear material repository and to maintain the status quo of storing nuclear material in “temporary” storage near more than 120 nuclear facilities across the nation. The idea of placing radiological monitors at every airport, sea port, and border crossing is, again, a concept that DHS adopted from the DOD. There’s no question that the radiological dosimeters and monitors work when presented with an isotope. It’s just that using these detectors at the thousands of possible entry points, considering the huge and constant flow of personnel and cargo, is a really stressful and expensive operation. We do not have reliable, cheap detectors that can be integrated into the process of screening people and cargo without negatively impacting our economy. Getting past the actual implementation of such a vast network of detectors, let’s look at the real 800pound gorilla in the room. Some people fear that al Qaeda is going to somehow obtain a nuke from Pakistan, disable the safety mechanisms, and transport it to a U.S. city. Some fear that al Qaeda will build a crude nuclear bomb, using technical expertise and material through the global economy. The scenario of a 10-kiloton nuclear blast is what causes people to “lose sleep,” allegedly. And yet, if you examine the facts, it’s not likely at all that this is a credible scenario. I strongly recommend Brian Jenkins’ book Will Terrorists Go Nuclear? 10 and Michael Levi’s book On Nuclear Terrorism 11 for anyone who’s interested in an objective discussion on this topic. In short, nations with nuclear technology or materials need to consider whether the bomb will be traced back to them, and where the bomb might be used. It might not be in the United States, it might be in a neighboring country. The number of people who would need to be engaged to get/build a bomb and move it to the United States, let alone engineer a successful detonation, would make this a complex operation that would be visible [noticeable] to law enforcement and the intelligence community. We have no compelling evidence that any nation has provided a terrorist group with chemical or biological weapons – why on earth would they provide a terrorist group with nuclear weapons? It doesn’t make sense. The “high-altitude EMP blast” scenario is particularly outlandish, suggesting that a terrorist organization would be able to move a ballistic missile to the coast of the United States and set off a megaton nuke 200 miles over the country just to collapse the electronic infrastructure and turn America into a preindustrial society. There are better odds that an asteroid the size of Texas might collide with a major city within the United States. Resiliency is the answer – it would be simple to harden critical infrastructure points and maintain spares to stop this scenario from occurring. The argument here actually masks a separate debate over the continued development of a comprehensive (and very expensive) national missile defense effort. No Bioterror No risk of bioterror – weapons are weak and difficult to build, and other agencies check risks. Mauroni 10 (Al Mauroni, Director at USAF Center for Unconventional Weapons Studies with a BS in Chemistry from Carnegie Mellon, “Homeland Insecurity: Thinking About CBRN Terrorism,” Homeland Security Affairs, September 2010, https://www.hsaj.org/articles/78, *fc) Bioterrorism is the flavor of the year, thanks to a recently-released government report titled “World At Risk” by former senators Bob Graham and Jim Talent. 7 Hollywood and fiction novels have done their best to ensure we all believe that a contagious virus without any cure is being secretly developed in a government lab and will wipe out civilization as we know it. We have a very long history on the treatment of natural diseases, and with the rise of biological warfare the difference between addressing deliberate and natural disease outbreaks gets very blurry. Some people say that, merely because there is greater access to information and technology related to natural biological diseases, there is a corresponding increasing chance of a bioterrorist incident. This isn’t necessarily so. One requires a large amount of biological warfare (BW) agent to successfully cause mass casualties, and these agents can’t be made in a bathtub. You can’t go to Wal-Mart stores to obtain dangerous biological assays or to Home Depot for equipment to grow biological material. Bruce Ivins was successful because he had a full laboratory suite and starter material available to him, plus decades of experience in handling anthrax. 8 But while the dangerous agents are hard to make, the diversity of the biological threat complicates the development of particular solutions. That isn’t to say that we haven’t made a good faith effort. There are at least a dozen top BW threats, but under Project Bioshield, we have vaccines for only two of them. Maybe in another ten years, we’ll have a few more vaccines, but certainly not twelve. For the 270 cities in the United States with a population of more than 100,000, only thirty-odd cities have Project Biowatch detectors. It’s a very expensive project to sustain against a wide variety of potential threats. But this isn’t just a medical issue, although the medics have assumed the spokesperson role. Let’s look at the “whole of government” approach to public health. DHS coordinates the Biowatch effort and the National Biosurveillance Integration Center effort. It’s not a lot of money. DHHS has more than $80 billion a year invested into public health (not including nondiscretionary spending). This includes the work at CDC. The DOD has its Defense Health Program funded at $40 billion a year. This includes all the military hospitals and TRICARE program, in addition to medical surveillance and treatment on the battlefield. The Department of Veterans Affairs department handles the health care of former military and is slightly bigger than the active duty health affairs efforts at $41 billion a year, but that’s not a big surprise. Then there’s the DoD combating WMD community. While two-thirds of its $15 billion annual budget is spent on missile defense and special operations efforts, there are some funds spent on medical countermeasures and responses to biological warfare agent use. And finally, the international community plays a role through numerous non-governmental agencies as well as international health organizations. There are lots of players addressing different aspects of this huge area we call “public health.” By the estimates of the Center for Biosecurity at the University of Pittsburgh, there is roughly $5-6 billion a year spent on “biological defense,” depending on how one defines that project. The FY2011 budget calls for about $6.5 billion. The “whole of government” challenge is managing all these efforts without disrupting anyone’s rice bowl and still keeping cognizant of the bioterrorism threat, in addition to other public health concerns of infectious diseases, drug safety, and other health concerns. CVE fails CVE reinforces Islamaphobia – can’t solve terror Ackerman 2/13 --- Spencer Ackerman is national security editor for Guardian US. A former senior writer for Wired, he won the 2012 National Magazine Award for Digital Reporting (Spencer Ackerman, 213-2015, "Anti-terrorism summit reinforces 'fear and hate' towards Muslims, critics warn," Guardian, http://www.theguardian.com/us-news/2015/feb/13/muslim-anti-terrorism-summit-white-housecritics)//A-Sharma As Barack Obama prepares to host a summit on preventing homegrown terrorism, he faces a backlash from those he says he wants to empower: American Muslim community leaders, who warn that the summit risks stigmatizing and even endangering them. Hanging over the “countering violent extremism” (CVE) summit, to be held Tuesday through Thursday at the White House and State Department, is Wednesday’s brutal murder of three Muslim students in North Carolina. In the wake of the killings, Muslim leaders, some of whom met with Obama recently, say that whatever the summit’s intentions, it will reinforce a message that American Muslims are to be hated and feared, a spark in what they consider to be a powder-keg of Islamophobia in the media and online. The killing of Deah Barakat, 23, his wife Yusor Mohammad Abu-Salha, 21, and her sister Razan Mohammad Abu-Salha, 19, “really underscores how dangerous it is for the US government, including the White House, to focus its countering violent extremism initiatives primarily on American Muslims”, said Farhana Khera, the executive director of civil rights law firm Muslim Advocates. “We’ve long said to the administration, to those in government, that directing the bulk of CVE resources to US Muslims undermines the safety of all of us and endangers US Muslims, because it sends the message our community is to be viewed with fear, suspicion and even hate.” Without community support, the CVE initiative, a favorite of the Obama administration, is in critical danger. The idea behind CVE is to forge closer ties between communities deemed to be at risk of incubating terrorism – though the White House prefers the term “violent extremism” – and law enforcement. First unveiled by the administration in 2010, CVE has attempted to avoid stating that it singles out Muslim communities, but the emphasis in practice from US attorneys and Department of Homeland Security officials, has disproportionately been on them. Similarly, while the administration talks about CVE meaning “comprehensive” government interlocution, to include greater social services, American Muslims see the face of their government to be police, prosecutors and other elements of the security services. “There is a very real concern in American Muslim community that even one of our community members being pulled into violent extremism is too many, but there’s a significant distrust of government-led CVE efforts,” said Corey Saylor of the Council on American Islamic Relations. “That’s because too often in the past you’ve had this hand reached out in friendship while the other is behind their back with handcuffs in it.” The timing of recent government CVE efforts has struck some as suspect as well. In September, the attorney general, Eric Holder, announced new CVE pilot programs in Boston, Los Angeles and Minneapolis to “develop comprehensive local strategies” – shortly after the Islamic State beheadings of American journalists Steven Sotloff and James Foley. The forthcoming summit was delayed last fall without explanation, only to reappear on the White House agenda after the Charlie Hebdo attack in Paris. A US official, speaking on background ahead of the summit, said next week’s CVE summit will also unveil some new initiatives, though the official declined to specify. Obama will speak personally, but the full agenda, including invitees, has yet to be announced. Foreign delegations will attend at the ministerial level, the official confirmed, which has raised concerns from some in civil-rights circles that the US is “asking other governments to do what is, at the least, constitutionally suspect domestically”, said Hina Shamsi of the ACLU, to include greater intelligence gathering on US Muslims outside the bounds of US law. “This is not an intelligence gathering summit, this is not an Interpol summit,” the US official said. Last week, several Muslim community leaders gathered at the White House ahead of the summit, meeting with senior aides Valerie Jarrett and Ben Rhodes, as well as Obama himself. Khera, the director of Muslim Advocates, was in attendance. While ground rules forbade her from discussing what Obama said, she told the Guardian that she called on Obama to address “an uptick in ferocity of anti-Muslim vitriol from everyday Americans”, including “public officials who should know better”, like a state representative in Oklahoma, an Iraq and Afghanistan veteran, who called Islam a “cancer in our nation that needs to be cut out”, Muslim leaders fear tensions, accelerating after the release of the film American Sniper and the Paris attacks, have reached a bloody crescendo with the North Carolina shooting. Though local police have said they believe Craig Steven Hicks killed the three over a parking dispute, the family has rejected that explanation, suspecting an Islamophobic motive. The Muslim Public Affairs Council has launched a campaign for Obama, Holder and congressional leaders to address the killings. The FBI has opened a federal inquiry into the shooting deaths. In a statement on Friday, Obama welcomed the FBI inquiry into the “brutal and outrageous murders” in North Carolina. “No one in the United States of America should ever be targeted because of who they are, what they look like, or how they worship,” the president said, offering his condolences to the families of the slain. Though community leaders have noted that CVE programs do not target white supremacists or call atheist organizations in for dialogue, Ned Price, a spokesman for the National Security Council, said next week’s summit will not single out Muslims. “While the summit will address contemporary challenges, it will not focus on any particular religion, ideology, or political movement and will, instead, seek to draw lessons that are applicable to the full spectrum of violent extremists,” Price said. CVE doesn’t solve for terror – flawed theories of radicalization German 2/19 --- Michael German is a fellow with the Brennan Center for Justice’s Liberty and National Security Program, which seeks to ensure that our government respects human rights and fundamental freedoms in conducting the fight against terrorism. (Michael German, 219-2015, "Counterterrorism Efforts Should Be Based on Facts, Not Flawed Theories," Brennan Center, https://www.brennancenter.org/analysis/counterterrorism-efforts-should-be-based-facts-not-flawed-theories)//A-Sharma This week, the White House held a three-day summit to discuss a recently announced domestic counterterrorism program, dubbed “Countering Violent Extremism” (CVE). These programs, which are slated to launch in Boston, Minneapolis, and Los Angeles in the months ahead, aim to help communities identify violent extremists in the United States. The summit is part of the Administration’s renewed effort to position its outreach programs to Muslim American communities as part of a larger anti-terrorism campaign. But if these programs are anything like past iterations, they are likely to create more problems than they solve. One major problem is that although the 2011 White House CVE strategy recognizes that violent extremists come from many ideological backgrounds, which we saw last year in Las Vegas and Kansas City, the actual programs tend to target only Muslim Americans. This solitary focus tends to stigmatize, rather than empower Muslim communities. I spoke with NYU professor Arun Kundnani, author of The Muslims are Coming! Islamophobia, Extremism, and the Domestic War on Terror, who has studied CVE programs in both Britain and the U.S. He explains how tying outreach programs to an antiterrorism purpose tends to reinforce the perception that the government views Muslim communities primarily as a potential security threat, rather than a constituency government is obligated to serve in a fair and equal manner: The Brennan Center and the American Civil Liberties Union have uncovered ample evidence that the government has previously viewed its community outreach programs to Muslim groups as an opportunity to secretly gather intelligence. A 2014 National Counterterrorism Center document published by The Intercept suggests it plans to use CVE programs to evaluate communities, families, and individuals for their potential to become terrorists. The document, a CVE guide for practitioners and analysts, includes a five-page checklist for police officers, public health workers, educators, and social service departments to rate “risk and resilience factors” of the public they serve on a five-point scale. The risk factors NCTC suggests include whether there was empathic parent-child bonding and whether family members trust each other, experienced loss, or perceive being treated unjustly. Communities are to be rated on whether they face discrimination by or show trust in law enforcement. There’s little evidentiary basis to believe these factors are relevant to whether a person becomes violent, let alone that lay persons could accurately rate them on a fivepoint scale. But it is also ironic that individuals and communities that already face discrimination are considered a higher risk, which could potentially lead to their further targeting for disparate treatment from law enforcement and intelligence agencies. There’s no question that innocent American Muslims have suffered from over-aggressive surveillance, unjustified interference with their religious and political activities, and unnecessary impediments to their travel. Hina Shamsi, Director of the ACLU’s National Security Project, talked to me about the impact this misplaced scrutiny has on Muslim communities: This highlights one glaring disconnect in the government’s CVE strategy. The flawed theories of terrorist radicalization the CVE programs rely on tend to identify individual or community grievances as a primary indicators or drivers of violence. A recent White House CVE strategy memo, however, recognizes that government activities themselves can generate grievances: … We must remember that just as our words and deeds can either fuel or counter violent ideologies abroad, so too can they here at home. Actions and statements that cast suspicion toward entire communities, promote hatred and division, and send messages to certain Americans that they are somehow less American because of their faith or how they look, reinforce violent extremist propaganda and feed the sense of disenchantment and disenfranchisement that may spur violent extremist radicalization. But rather than implement a strategy that evaluates the relative legitimacy of these grievances so the government can take action to mitigate them as appropriate, the government’s CVE programs attempt to suppress this debate by recruiting community leaders willing to promote pro-government messaging. Identifying past discrimination against these communities as one more reason to continue discriminating against them isn’t the answer. Treating terrorism as the spread of an ideological infection within a vulnerable community also allows the government to put aside difficult questions about the role US foreign and national security policies play in generating anti-American grievances, which the Defense Department raised in a 2004 report. Studies supporting government-favored radicalization theories rarely mention U.S. military actions in Muslim countries, lethal drone strikes, torture, or the Guantanamo Bay prison as radicalizing influences, though many terrorists reference them in attempting to justify their actions. The intelligence agencies should be leading the government in fact-based research on national security issues. Peddling debunked radicalization theories that spread unnecessary fear and confusion will only lead to more discrimination and distrust of government. This would be an unfortunate outcome, whether you believe it leads to more terrorism or not. AT: Circumvention No circumvention Goldsmith, 13 - Jack Goldsmith is the Henry L. Shattuck Professor at Harvard Law School, a Senior Fellow at the Hoover Institution at Stanford University, and co-founder of Lawfareblog.com (“Reflections on NSA Oversight, and a Prediction That NSA Authorities (and Oversight, and Transparency) Will Expand” 8/9, http://www.lawfareblog.com/reflections-nsa-oversight-and-prediction-nsa-authorities-andoversight-and-transparency-will-expand These descriptions seem plausible in light of Snowden’s extraordinary leaks, but they raise the question why NSA would do better at preventing abuses of its wiretapping tools than at preventing theft of classified data. Stewart’s answer: Bureaucracies do more of what they’re rewarded for and less of what they’re punished for. So if NSA has been punished more severely for privacy violations than for security violations, it will put a priority on avoiding privacy violations. And that’s exactly what’s happened. The deluge of overlapping and politically charged oversight triggered by a misuse of NSA’s wiretapping tools is far more painful to NSA than a counterintelligence investigation of leaked secrets. Which brings me around to a point I’ve made in testimony (here and here). Contrary to the critics, existing oversight mechanisms — from the FISA court to the Justice Department and the inspectors general — are having a big impact on NSA’s behavior . Arguably, existing oversight mechanisms have already led NSA to protect privacy better than it protects national security. Adding more oversight, as Congress seems inclined to do, will shift NSA’s priorities further in the same direction. At some point, I fear, that will lead to a serious national security failure.