Executive Order (XO) 12333 AFF 1 1AC 2 Inherency XO 12333 violates many different laws and amendments and Obama has done nothing to rectify these problems. By Thor Benson Posted on Jul 23, 2014 [http://www.truthdig.com/report/item/president_obama_needs_to_cancel_executive_order_12333_20140723 Thor Benson is a traveling writer who currently lives in Los Angeles. He has written for Slate, Vice, Fast Company and many others. TH] There’s a chance you’re being watched right now. We’re all too familiar with the bulk collection of cellphone metadata—information on whom you contact and when—that Edward Snowden revealed. However, Executive Order 12333 from 1981 (thanks, President Reagan) allows the NSA to collect the actual content from phone calls and Internet communications if they are amassed from outside U.S. borders. John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights, and Labor, recently wrote about this issue in The Washington Post. The problem with this executive order is that it allows for a wide range of ways the NSA can gather the content of communications from American citizens, as long as the “point of collection” is abroad. I spoke with Sharon Goldberg, an assistant professor in the Computer Science Department at Boston University who recently wrote about Executive Order 12333, and she pointed out that Internet traffic often leaves U.S. borders while you’re still in the United States. Many websites store data abroad, and “traffic on the Internet will take the cheapest path,” she said. That means that even if you’re using your computer in New York City, the data being transmitted could be collected in Brazil and used by the NSA under Executive Order 12333. “We should have the same legal framework [for communication inside and outside the U.S.], regardless of the point of collection, because the flow of traffic on the Internet is not bound to geographic borders,” Goldberg said. Not only that, but she said there are some methods that outsiders, without control of your router, can use to manipulate your Internet traffic to force it to exit U.S. borders. There is no language in the executive order that seems to prevent this. Thus, NSA staffers can wait for your traffic to go elsewhere—or they could conceivably make it happen themselves. Advertisement Besides Internet traffic from inside the U.S., any calls you make while visiting another country could be recorded and stored. Phone network connections for making calls are unlikely to be routed outside the country, but that doesn’t mean you won’t leave the country some day and make a call. Unlike Section 215 of the Patriot Act, the law that allows metadata collection, Executive Order 12333 requires no oversight from other government branches. So the NSA can record any call you make on your trip to Canada as long as it thinks you are a threat of some kind. It does have to get a court order to “individually target” someone, Tye points out in his article, but there are ways of getting around that requirement. As Tye notes: If the contents of a U.S. person’s communications are ‘incidentally’ collected (an NSA term of art) in the course of a lawful overseas foreign intelligence investigation, then Section 2.3(c) of the executive order explicitly authorizes their retention. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. The loopholes in Executive Order 12333 are large enough to sail a ship through. President Obama has the power to make and overturn executive orders unilaterally. He does not need to consult Congress, the NSA or any other government body to end this practice. Obama has proposed several reforms to NSA practices, but he has not mentioned altering or canceling this executive order. He could end it today, and he should. Tracking and recording communications made by American citizens is not only a violation of the Fourth Amendment, which protects against unreasonable search and seizure, but it also violates the First Amendment. If Americans cannot make a phone call abroad or use the Internet anywhere without considering their need to self-censor in case they’re being watched, so much for freedom of speech. These are basic guiding principles of our country, and if Obama will not overturn this executive order, then it is time for the Supreme Court to actually do its job and defend the Constitution (instead of spending time defending corporations). Tye wrote in his Washington Post article that he filed a complaint with the House and Senate intelligence committees and the inspector general of the NSA and nothing was changed. If our president really wants to show us what the “most transparent administration in history” looks like, then he needs to put spying on Americans behind closed doors, and under confounding pretenses, behind us. 3 XO 12333 is used to justify NSA abusive programs. Reform to the NSA won’t occur until XO 12333 is overturned. Farivar, 2014 (Farivar Cyrus - Aug 27,2014, Cyrus is the Senior Business Editor at Ars Technica, and is also a radio producer and author. His first book, The Internet of Elsewhere, was published in April 2011(http://arstechnica.com/tech-policy/2014/08/a-twisted-history-how-a-reagan-era-executiveorder-led-to-mass-spying/1/) One thing sits at the heart of what many consider a surveillance state within the US today. The problem does not begin with political systems that discourage transparency or technologies that can intercept everyday communications without notice. Like everything else in Washington, there’s a legal basis for what many believe is extreme government overreach—in this case, it's Executive Order 12333, issued in 1981. “12333 is used to target foreigners abroad, and collection happens outside the US," whistleblower John Tye, a former State Department official, told Ars recently. "My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known in government circles as "twelve triple three," gives incredible leeway to intelligence agencies sweeping up vast quantities of Americans' data. That data ranges from e-mail content to Facebook messages, from Skype chats to practically anything that passes over the Internet on an incidental basis. In other words, EO 12333 protects the tangential collection of Americans' data even when Americans aren't specifically targeted—otherwise it would be forbidden under the Foreign Intelligence Surveillance Act (FISA) of 1978. In a May 2014 interview with NBC, former NSA contractor Edward Snowden said that he specifically asked his colleagues at the NSA whether an executive order could override existing statutes. (They said it could not.) Snowden’s lawyer, Jesselyn Radack, told Ars that her client was specifically “referring to EO 12333. Thirty-year NSA veteran William Binney told Ars that drastic measures such as the NSA’s Fairview program—described by other intelligence whistleblowers as the NSA’s project to “own the Internet”—are also authorized under EO 12333. “This program was started at least back in 2001 and has expanded to between 80 and 100 tap points on the fiber optic lines in the lower 48 states,” he said by e-mail. “Most of these fiber optic tap points are not on the East or West coast. This means that the primary target of this collection is domestic... Most collection of US domestic communications and data is done under EO 12333, section 2.3 paragraph C in the Upstream program. They claim, near as I can tell, that all domestic collection is incidental. That’s, of course, the vast majority of data.” Specifically, that subsection allows the intelligence community to "collect, retain, or disseminate information concerning United States persons" if that information is "obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics or international terrorism investigation."' Executive orders vary widely. One of the most famous executive orders, the Emancipation Proclamation, freed slaves in the United States under President Abraham Lincoln. A more infamous example came under President Franklin D. Roosevelt, who issued an executive order to intern Japanese-Americans in prison camps in 1942. President Ronald Reagan signed EO 12333 within his first year in office, 1981, largely as a response to the perceived weakening of the American intelligence apparatus by his two immediate predecessors, Presidents Gerald Ford and Jimmy Carter. Later, EO 12333 was amended three times by President George W. Bush between 2003 and 2008. “Reagan did this at every opportunity: with military exercises, challenging the Soviets in their own airspace and waters, across the board. The gloves were coming off,” Melvin Goodman told Ars. Goodman was the CIA's division chief and senior analyst at the Office of Soviet Affairs from 1976 to 1986. He’s now the director of the National Security Project at the Center for International Policy in Washington, DC. Bush's reasons for strengthening EO 12333 were similar. After the United States faced another existential threat in the immediate aftermath of the September 11 attacks, Bush— and later President Barack Obama—used EO 12333 to expand American surveillance power. But if EO 12333 is essentially a reaction, how was mass surveillance handled beforehand? In the 1960s, the American intelligence community turned its spy gear and covert capabilities against its own people by infiltrating and disrupting various civil rights groups (COINTELPRO), by capturing mail and telegrams (Project Shamrock), monitoring the activities of Americans abroad (Operation Chaos), and by intercepting electronic communications of many high-profile Americans (Project Minaret). Such targets included Dr. Martin Luther King Jr., Muhammad Ali, and even antiwar activist and actress Jane Fonda. By 1975, the US Senate’s Church Committee started exposing those programs, and many notable intelligence reforms soon took shape— including FISA and the corresponding Foreign Intelligence Surveillance Court (FISC). Following the intelligence abuses during the Nixon era, new president Gerald Ford set about to change the way the NSA and other intelligence agencies did business. In 1976, President Ford issued Executive Order 11905, which restricted much of this activity and put in rules like these: (b) Restrictions on Collection. Foreign intelligence agencies shall not engage in any of the following activities: (1) Physical surveillance directed against a United States person, unless it is a lawful surveillance conducted pursuant to procedures approved by the head of the foreign intelligence agency and directed against any of the following: (i) A present or former employee of such agency, its present or former contractors or their present or former employees, for the 4 purpose of protecting foreign, intelligence or counterintelligence sources or methods or national security information from unauthorized disclosure; or (ii) a United States person, who is in contact with either such a present or former contractor or employee or with a non-United States person who is the subject of a foreign intelligence or counterintelligence inquiry, but only to the extent necessary to identify such United States person; or (iii) a United States person outside the United States who is reasonably believed to be acting on behalf of a foreign power or engaging in international terrorist or narcotics activities or activities threatening the national security. (2) Electronic surveillance to intercept a communication which is made from, or is intended by the sender to be received in, the United States, or directed against United States persons abroad, except lawful electronic surveillance under procedures approved by the Attorney General; provided, that the Central Intelligence Agency shall not perform electronic surveillance within the United States, except for the purpose of testing equipment under procedures approved by the Attorney General consistent with law. Notably, Ford (and later Carter under Executive Order 12036) made it far more difficult for the US government to monitor its own people. By contrast, today EO 12333 specifically allows for broad “incidental collection” that may include US citizens. More specifically, EO 12333 allows for "information obtained in the course of a lawful foreign intelligence, counterintelligence, international narcotics, or international terrorism investigation.” The push toward this reality started in the early '80s. "It is not so much that new powers were given to the NSA as it was a matter of showing that the NSA would not be addressed as explicitly in 12333, thereby signaling that the NSA would have more elbow room to use its own discretion in moving forward," Loch Johnson, a professor of international affairs at the University of Georgia, told Ars. "This signaling was achieved by removing Carter's more detailed language about that agency. This removal of language indicates a lifting of close attention to the specifics of NSA activities—a subtle grant of permissiveness, not so much in explicit language as in the absence of as many explicit prohibitions." Within months of Reagan’s January 1981 inauguration, his national security team set out to expand the intelligence community’s capabilities. They were well aware of the pushback that may follow. In fact, a March 1981 letter from William Casey, the director of Central Intelligence and the head of the CIA to one of Reagan’s national security advisors, suggests that the Reagan administration was also well aware of the abuses conducted under its predecessors. (Ars obtained this document from Kenneth Mayer, who obtained it from the Ronald Reagan Presidential Library.) Despite this, Reagan advisors ultimately seemed more concerned with the perception of wrongdoing rather than actual wrongdoing. “The absence of clear-cut, Presidentially directed restrictions will, in my judgment, create enormous uncertainty among the operators; it will reopen the wounds of the 1970s in which many intelligence officers thought of themselves as potential Felts and Millers,” Casey wrote. (Mark Felt was the number two at the FBI under Nixon, and more than 20 years later he admitted that he was the famous “Deep Throat” leaker. Miller refers to a top Justice Department lawyer, Herbert Miller, a longtime Nixon ally.) Casey continued: Furthermore, the inevitable media campaign which would ensure under an Order devoid of any guidelines or restrictions, with likely charges that the Intelligence Community or the Administration intends to expand collection concerning the domestic activities of United States persons, will necessarily have an impact on the attitudes of our operators. … Of greater significance, however, is the impact that accusations of CIA intrusive domestic activity, no matter how irrational, will have on the effectiveness of our operators. It seems clear to me that an environment in which the Intelligence Community is under drumfire political attack is not conducive to gaining the cooperation of Americans at home and abroad. He concluded, "I do heartily agree with you, however, that the most significant goal to be accomplished by the promulgation of a new Executive Order is to send a clear signal to the Intelligence Community and to the National that the Reagan Administration supports an aggressive and effective intelligence effort." In another memo from Casey to Edwin Meese, then a presidential advisor (who later became attorney general during Reagan’s second term), Casey refers to the administration's desire to rebuild the intelligence community. “What is not widely understood is that many of the most onerous impediments came from the sheer size and complexity of implementing regulations imposed by the Justice Department during the Ford and Carter years,” Casey wrote. “These caused operatives in the field to throw up their hands and quit trying. The Executive Order is needed as a road map to chart simply what they can and can’t do.” Just two weeks after EO 12333 was signed, William French Smith, the first attorney general under Reagan, gave a speech in Los Angeles making the public case for an expansion of intelligence and surveillance powers. Smith made little reference to the intelligence and surveillance abuses under previous administrations, dismissing them as mere “excesses that could not be condoned.” Instead, the attorney general explained that during the Carter era, Congress set up onerous “procedures governing virtually every aspect of intelligence gathering in the US or affecting US citizens abroad.” These included the pesky House and Senate Select Committees on Intelligence, FISA, and FISC. (In the subsequent decades, of course, FISC has been so secretive that it did not release its first public docket until after the initial Snowden revelations last year.) “In summary, President Reagan inherited an intelligence community that had been demoralized and debilitated by six years of public disclosures, denunciation, and budgetary limitations,” Smith continued. What pushed this administration to reach for more surveillance power? It was largely the threat of international terrorism and Soviet infiltration of the United States. Although Smith does not link the two explicitly in that speech, earlier that year the CIA had been strongly concerned with Soviet support of terrorism based on a May 1981 book called The Terror Network. Casey was so persuaded by this book that two months later he ordered a Special National Intelligence Estimate entitled "Soviet Support for International Terrorism and Revolutionary Violence." But according to Goodman, the book and the government’s own rapid acceptance of the Soviet terrorism theory was entirely fraudulent. In fact, he said, it was black propaganda that the CIA created within the Soviet Union to stir up dissent. Goodman believes there was incidental collection on Americans happening left and right, and at the time it was easy to determine who the government was monitoring even if the name was obscured. “12333 was designed to allow NSA to have greater latitude when they pick up Americans [as part of] targets overseas,” Goodman said. For example, Goodman explained how the NSA targeted foreigners abroad, often in Latin America, as part of the global Soviet threat. In doing so, the NSA would incidentally collect information about, say, an American traveling in El Salvador in October 1981. One high-profile American who was traveling there at that time happened to be Sen. Christopher Dodd (D-CT), now the head of the Motion Picture Association of America. “When I testified against Robert Gates [during confirmation hearings] in 1991, I brought that up, seeing intercepts that referred to American congressmen [and senators],” Goodman continued. “When those details arrived [to the CIA] in a brown manila envelope, they would scratch out the name, but you knew who was traveling at a particular time.” Binney is a more recent NSA veteran, retiring in 2001. He said that such practices continued even during his tenure. “There was a procedure called a ‘series check’ as to what to do with the name, should you redact it, and that depended on who it was and what they were doing and who you were going to tell,” he told Ars. “Those things were done because of incidental mentioning of 5 someone’s name; that was pretty much set up and there was a process to go through. We were well aware of it at the time. I wasn’t in an area where I was too involved in any of that. But the techniques we used to fight the Soviet Union apply today.” Despite using the same legal justification for this incidental collection today, the massive expansion of technological prowess since means that other intelligence veterans like Goodman are more concerned than ever about surveillance overreach. “There would be no comparison to the capabilities of NSA now compared to three decades ago,” he said. “It’s proliferating all the time with their technology as to what they’re able to do.” Ed Loomis, a cryptologist at the NSA from 1964 to October 2001 who later became a whistleblower, told Ars that every year, everyone working in the signals intelligence (SIGINT) division had to read EO 12333, FISA, and US SIGINT Directive 18 (July 1993) as a way to keep refreshed on the laws. Prior to the September 11 attacks, Loomis said the NSA's internal policy was to stay much more in line with FISA and not collect information—incidental or otherwise—on Americans. In fact, Loomis initially wanted to use that same provision of EO 12333 (Section 2.3 paragraph C) on a temporary basis to conduct US-to-foreign and foreign-to-US collection. On September 14, 2001, he was brought into a meeting with NSA lawyers and other lawyers who were never identified—he thinks that one of them may have been David Addington, then-Vice President Dick Cheney's lawyer who crafted and controlled the legal documents drafted in the days after the attacks. "It was the NSA lawyers that responded to that suggestion, and they said that that's not in conformance with FISA," Loomis told Ars. "I wasn't going to argue with them at that point, this was three days after 9/11, the whole world is shocked. Here I'm trying to get them to use something, to use a prevision that Reagan had put in place for extenuating circumstances, and they ignored it." Loomis, Binney, and others were pushing a surveillance program known as ThinThread, which was discontinued weeks before the September 11 attacks. ThinThread supporters claim it had the ability to encrypt US persons' data so that analysts would not know who it was about. Prior to September 11, according to Loomis, the NSA's policy was that the FISA law trumped EO 12333, whereas after, it essentially became the other way around. (This is likely what Snowden was referring to in his internal query regarding the hierarchy of laws.) "If I found a loophole, I wanted to exploit the loophole, which is why I wanted to use 12333 to do US-to-foreign and foreign-to-US. I wanted to push the lawyers as far as they would go," he continued. "My concern was the security of US persons as well as the privacy of US persons. I thought I had a means of protecting their identities through the encryption." Loomis said that in general he does not support domestic surveillance and that he's bothered by how information was shared with the Drug Enforcement Agency, FBI, and perhaps even state police organizations. But, he said, "I trust NSA analysts because I've worked with them for 30 some-odd years and I know that with the exception of those that got fired over the LOVEINT thing that they have their hearts in the right areas. They would not intentionally go in and read US communications for jollies, but they are really dedicated to track foreign parties that are intent on doing us harm. So I trust them. The problem is that when the raw data gets shared with law enforcement communities, I've seen too many situations where they abuse it." And this is where all the NSA veterans Ars spoke with agreed. No matter Reagan’s intent when expanding intelligence abilities, it’s simply a different era these days. New threats combined with better technologies have created an unfortunate situation. “You have these technical capabilities, and they become more expansive, and you do them because you're capable,” Goodman said. “And when you have a threat perception, you usually can justify or rationalize anything you want to do.” Thomas Drake, another well-known NSA veteran turned whistleblower, put it in simpler terms. “12333 is now being used as the ‘legal justification.’" Drake spoke with Ars while on break from his job at the Apple Store in Bethesda, Maryland, just outside Washington, DC. He's held this post since leaving the NSA in 2008 while facing 10 felony counts of illegally taking classified information to his home, making false statements to investigators, and obstructing justice. In June 2011, after famously refusing to take a plea deal, Drake finally gave in. He pled guilty to a single misdemeanor count of exceeding his authorized access to government computers. “It’s not technically law,” he continued. “An executive order is the equivalent of the law, we have a constitutional process by which laws are created in this country. When the details started coming out about the mass surveillance program, the government began to modify it under Bush, but they are using it as the final backstop in their defense: ‘The Program.’ Don’t let 12333 distract you; there’s a much larger authority that they’re desperate to protect." “The Program” that Drake is referring to is the President’s Surveillance Program (PSP), which Ars has reported on previously. In the weeks after the first Snowden documents, a leaked classified draft report by the NSA’s Inspector General was published by The Guardian and The Washington Post. It explored the PSP's beginnings and evolution. “The NSA has carte blanche on foreign intelligence,” Drake said. “They’re hiding behind 12333 to continue the vast collection of metadata and content. I’m just telling you that what’s enabling that is there’s a rule, a thing to understand, the government will never admit something that is still considered classified if it has not been fully disclosed in a way that they have to acknowledge it. As long as there is reasonable doubt, they will hide behind what has been disclosed. What has been disclosed is 12333.” The PSP's legal justification was provided by a still highly classified document that President George W. Bush signed on October 4, 2001, entitled "Authorization for specified electronic surveillance activities during a limited period to detect and prevent acts of terrorism within the United States." The authorization has never been published, but the Office of the Director of National Intelligence (ODNI) unexpectedly acknowledged it as part of a declassification review in December 2013. According to that NSA Inspector General draft leaked in 2013, the NSA itself wasn’t even allowed to see the legal authorization for at least two years. On May 6, 2004, the Office of Legal Counsel within the White House prepared a 74-page memo to the attorney general to outline the legality of 6 “The Program.” The publicly released version has substantial redactions. It does, however, contain this noteworthy section: The President has inherent constitutional authority as Commander in Chief and sole organ for the nation in foreign affairs to conduct warrantless surveillance of enemy forces for intelligence purposes to detect and disrupt armed attacks on the United States. Congress does not have the power to restrict the President's exercise of this authority. The memo also specifically mentions a legal analysis of EO 12333 in a page that is almost entirely redacted According to the December 2013 document from the ODNI, this program is now governed under the FISA Amendments Act of 2008, which remains law. “That’s the problem,” Drake said. "That’s why you can’t have secret laws and secret orders in a constitutional order; it’s anathema. All of this was avoidable. We had the technology and the laws in place. We didn’t have to upend anything. No one has been charged for violating FISA. Those who have tried to expose it were charged with espionage, like me. The government has unchained itself from the constitution.” Earlier this month, the Privacy and Civil Liberties Oversight Board said it would re-examine EO 12333 after all the fanfare. But based on history, overturning an executive order simply isn't a common outcome. Unless done by a subsequent executive order, it's extremely difficult and has rarely happened. So for now, American data remains as accessible as it's ever been. 7 Plan Text The United States Federal Government will amended Executive Order 12333 by removing Section 2.3 sub section i. 8 Solvency Current changes to NSA powers aren’t decreasing domestic spying. XO 12333 must be amended. Gaist, May 2015 (Thomas Gaist 25 May 2015, International Committee of the Fourth International, “NSA spying bill stalls in US Senate” https://www.wsws.org/en/articles/2015/05/25/surv-m25.html) A second attempt to pass emergency legislation extending the spy powers is to proceed on May 31. The Obama administration announced last week that the NSA has begun “winding down” operations associated with Section 215 in anticipation that such efforts will fail. Both the NSA and the White House have refused to offer specifics about the surveillance programs they claim are being closed down. Like the USA Freedom Act itself, the failure of Congress thus far to renew the Patriot Act powers is being hailed, falsely, in some quarters as a major victory for democracy and blow against the illegal mass spying. Wired magazine enthused that expiration of Section 215 would represent an “end to bulk collection of telephone data,” and proclaimed that “the government’s bulk collection of phone records from US telecoms is on hold.” The Guardian announced last week that the failure of Congress thus far to renew Section 215 represents a “wholesale rollback of a wide swath of post-9/11 domestic surveillance.” “The tides are shifting,” a spokesperson for the American Civil Liberties Union said in response to the non-renewal of 215, praising the Senate for “taking a stand against simply rubberstamping provisions of the Patriot Act that have been used to spy on Americans.” A spokesman for Demand Progress hailed the vote as “a victory for democracy over totalitarianism” and for “open government over secret law.” Republican Senator Rand Paul, who waged a muchpublicized 10-hour filibuster Wednesday against renewal of Section 215, tweeted over the weekend that ongoing moves in Congress have the potential to “end illegal NSA spying once and for all.” One barely knows where to begin in countering such absurdities. First of all, the provisions in the USA Freedom Act do not even address the bulk of the pseudo-legal framework that underpins the criminal spying operations. Even if the Patriot Act were repealed completely, this would amount to little more than the purely formal curtailment of one section of the legislative and executive authorizations for mass surveillance programs that began long before the bill’s passage. Solely on the basis of Executive Order 12333, a decree issued by the Reagan administration and updated during subsequent presidencies, US government spies are empowered to collect any and all data from foreign sources that they deem relevant for intelligence and national security purposes. In the age of global communications, when virtually all forms of data are stored simultaneously on servers located on multiple continents, such power to collect data overseas effectively empowers the NSA to collect all data worldwide. In an admission that must raise doubts about the government’s claim that the mass spying is necessary to fight “terrorism,” the Justice Department’s Office of Inspector General issued a report on the use of Internet activity logs, one of the activities authorized under Section 215, and concluded that it was unable to “identify any major case developments that resulted from records obtained through Section 215 orders.” Rather than targeting terrorists, the NSA and FBI are compiling ever-growing databases on the social, political and cultural affiliations of the American people, as part of systematic preparations for mass repression against the population. Washington’s security agencies are collecting virtually every type of data in existence, and analyzing and disseminating the latter throughout the state apparatus through the use of “fusion centers,” as well as direct wholesale transfers of bulk data from the NSA to the FBI and other police agencies. Surveillance technologies are becoming increasingly integrated into covert and paramilitary operations by federal, state and local police agencies. Police agencies down to the local level now routinely deploy StingRays and other surveillance technologies to seize cell phone data in bulk from crowds and cell phone towers. Just last week, new NSA documents leaked by Edward Snowden showed that the spy agency developed malicious hacking and surveillance software designed to download onto smartphones by piggybacking on apps sold by Google and Samsung. By deploying from leading corporate platforms, the NSA’s IRRITANT HORN program can potentially infect tens of millions of devices with spyware that gives the agency unfettered control over the devices and data stored in their memory. Such is the behind-the-scenes reality of the “surveillance reform” touted by promoters of the USA Freedom Act. As the stage-managed wrangling in Congress drags on, the actual spying programs continue to grow in complexity and scale. The stubborn fact, laid bare for all to see through the heroic actions of Snowden and other whistleblowers, is that the US ruling elite is charging ahead as rapidly as possible with plans to expand and develop its mass surveillance programs, as part of an agenda to prepare repression against impending political upheavals. While one cannot be certain of the precise outcome of the theatrics on Capitol Hill, there is no doubt that one or another legal basis will be found or invented to suit the needs 9 of the state. The military-intelligence apparatus now operates as a law unto itself, doing whatever is necessary to expand and defend its own power and interests and those of its masters on Wall Street. Amending XO 12333 to remove Incidental data collection is the only way to safe guard Americans’ privacy. LaChance,2014 (Naomi LaChance July 21, 2014. US News and World Report, “Should Executive Order 12333 Be Repealed?A former State Dept. official believes a Reagan-era order gives intelligence agencies too much leeway.” http://www.usnews.com/opinion/articles/2014/07/21/should-the-reagan-era-nsa-executive-order-12333-be-repealed) A former State Department official has raised awareness about a Reagan-era practice that permits spying on U.S. citizens with little oversight. In an op-ed for the Washington Post, John Napier Tye writes that Executive Order 12333 should raise red flags for Americans concerned about the boundaries of surveillance. "Even after all the reforms President Obama has announced," Tye writes, "some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them." Executive Order 12333 was approved in 1981. It permits government intelligence agencies to monitor certain content without a court order or warrant. Metadata, the digital trail that reveals users' locations and certain actions, may also be monitored. Tye points to a loophole that permits extended reach. When communications are "incidentally" collected, the information is allowed to be kept. This turn of phrase, Tye writes, "places no limits on the volume of communications by U.S. persons that may be collected and retained." Because this order does not demand consent from any party before surveillance, Tye argues that individual companies are responsible for using their own security in order to keep their information private. Unlike fellow whistleblower Edward Snowden, who leaked information about NSA surveillance, Tye has not disclosed classified information. Indeed, Tye's piece may not be a huge revelation to those who closely follow the ins and outs of government monitoring. "Tye's op-ed, unfortunately, only confirms our fears," wrote Alex Abdo, a staff attorney at the American Civil Liberties Union. "We have yet to get a full and clear explanation from the NSA of its various surveillance authorities, particularly as they impact U.S. citizens and residents. Instead, we have received half-answers and artfully crafted denials." Tye filed a complaint with the State Department claiming that Executive Order 12333 violates the Fourth Amendment. He has also voiced concern to both the House and Senate intelligence committees and the inspector general of the National Security Agency. "This act of conscience illuminates yet another path a surveillance whistleblower can take. If more current and former federal officials believe the NSA is in flagrant violation of the Fourth Amendment, they should consider declaring themselves too," wrote Conor Friedersdorf at the Atlantic. "I wonder what he saw but isn't revealing." Sen. Dianne Feinstein, D-Calif., chairman of the Senate Select Committee on Intelligence, said last year that the committee cannot "sufficiently" monitor Executive Order 12333. “I don’t think privacy protections are built into it,” she said. “It’s an executive policy. The executive controls intelligence in the country.” NSA powers will only diminish after XO 12333 is amended. SAVAGE, 2014 (Charlie Savage, August 13 , 2014. The New York Times, “Reagan-Era Order on Surveillance Violates Rights, Says th Departing Aide” http://www.nytimes.com/2014/08/14/us/politics/reagan-era-order-on-surveillance-violates-rights-says-departing-aide.html ) WASHINGTON — After President Obama delivered a speech in January endorsing changes to surveillance policies, including an end to the National Security Agency’s bulk collection of Americans’ domestic calling records, John Napier Tye was disillusioned. A State Department official, Mr. Tye worked on Internet freedom issues and had top secret clearance. He knew the Obama administration had also considered a proposal to impose what an internal White House document, obtained by The New York Times, portrayed as “significant changes” to rules for handling Americans’ data the N.S.A. collects from fiber optic networks abroad. But Mr. Obama said nothing about that in his speech. So in April, as Mr. Tye was leaving the State Department, he filed a whistleblower complaint arguing that the N.S.A.'s practices abroad violated Americans’ Fourth Amendment rights. He also met with staff members for the House and Senate intelligence committees. Last month, he went public with those concerns, which have attracted growing attention. When operating abroad, the N.S.A. can gather and use Americans’ phone calls, emails, text messages and other communications under different — and sometimes more permissive — rules than when it collects them inside the United States. Much about those rules remains murky. The executive branch establishes them behind closed doors and can change them at will, with no involvement from Congress or the secret intelligence court that oversees surveillance on domestic networks. “It’s a problem if one branch of government can collect and store most Americans’ communications, and write rules in secret on how to use them — all without oversight from Congress or any court, and without the consent or even the knowledge of the American people,” Mr. Tye said. “Regardless of the use rules in place today, this system could be abused in the future.” Mr. Tye, 38, is speaking out as Congress considers amending the Foreign Intelligence Surveillance Act, which governs how the N.S.A. operates domestically. The legislation resulted from the uproar over leaks by Edward J. Snowden, a former agency contractor. But the proposed changes would not touch the agency’s abilities 10 overseas, which are authorized by Executive Order 12333, a Reagan era presidential directive. The administration has declassified some rules for handling Americans’ messages gathered under the order, but the scope of that collection and other details about how the messages are used has remained unclear. “The debate over the last year has barely touched on the executive order,” said Jameel Jaffer, an American Civil Liberties Union lawyer. “It’s a black box.” The Times interviewed nearly a dozen current and former officials about 12333 rules for handling American communications, bringing further details to light. The rules are detailed in an accompanying chart. By law, the N.S.A. cannot deliberately intercept an American’s messages without court permission. But it can “incidentally” collect such private communications as a consequence of its foreign surveillance. The volume of incidental collection overseas is uncertain. Officials, speaking on the condition of anonymity because of the delicate nature of the topic, said the N.S.A. had never studied the matter and most likely could not come up with a representative sampling. Mr. Tye called that “willful blindness.” Still, the number of Americans swept up under 12333 could be sizable. As the N.S.A. intercepts content in bulk from satellite transmissions and from overseas fiber optic hubs, Americans’ messages in the mix can be vacuumed up. By contrast, when operating on domestic networks under FISA, the agency may engage only in targeted, not dragnet, collection and storage of content. Congress left the executive branch with a freer hand abroad because it was once rare for Americans’ communications to go overseas. But in the Internet era, that is no longer true. Large email companies like Google and Yahoo have built data centers abroad, where they store backups of their users’ data. Mr. Snowden disclosed that in 2012 the N.S.A., working with its British counterpart, Government Communications Headquarters, penetrated links connecting the companies’ overseas data centers and collected 181.3 million records in 30 days. Mr. Tye was a rebel within the system. Raised in a Boston suburb, he attended Duke University, Oxford as a Rhodes scholar, and Yale Law School. But his elite résumé and conservative appearance belie a history of nonconformity and social mission. At Duke, he avoided fraternities, wore his hair long, became a wilderness enthusiast and created his own major, fusing economics, computer science and mathematics. “I thought I was going to be a scientist,” Mr. Tye said in an interview. “But when I was graduating, I decided I wanted to do things that have more of an impact on real people.” After studying at Oxford, he researched hate groups for the Southern Poverty Law Center before arriving at Yale just as legal issues raised by counterterrorism policies after the Sept. 11, 2001, attacks were crystallizing. He joined a civil liberties litigation clinic. After Yale, he moved to New Orleans, where he represented poor people in housing related problems. In early 2011, he landed a State Department job working on Internet issues. Then came Mr. Snowden’s disclosures. Mr. Tye had a vantage point on administration deliberations about proposed changes. By February, he was planning to leave the government and file a whistleblower complaint. It yielded little. The House Intelligence Committee sent a letter saying it had “reviewed your allegations and has taken the action it deems appropriate in this matter.” The N.S.A. inspector general sent a similar letter, emphasizing that Mr. Tye had acknowledged that he did not know the rules for handling Americans’ messages. Brian Fallon, a Justice Department spokesman, defended the N.S.A.'s practices under the executive order as “respectful of the principles upon which the United States was founded and consistent with U.S. laws, including the Fourth Amendment.” The proposal to increase protections for American messages gathered incidentally under Executive Order 12333 — the quiet rejection of which provoked Mr. Tye — came from a review group Mr. Obama appointed after Mr. Snowden’s leaks. Its report recommended three changes for such messages. First, it said, analysts should purge them from the 12333 storehouse upon detection, unless they have foreign intelligence value or are necessary to prevent bodily harm. A similar rule already exists, but has another major exception: Analysts must send any information about crimes to the Justice Department. The officials would not say how often criminal referrals have resulted. Second, the review group said, prosecutors should not use incidental 12333 intercepts of Americans as direct evidence in criminal proceedings against them. In practice, officials said, the government already avoids doing so, so as not to have to divulge the origins of the evidence in court. But the officials contend that defendants have no right to know if 12333 intercepts provided a tip from which investigators derived other evidence. Third, the review group said, analysts should not search the storehouse for an American’s messages unless a court finds probable involvement with terrorism. Officials said a current rule permits analysts to query for an American’s messages if the attorney general says the person is probably an “agent of a foreign power,” a broader category. Usually, they added, the N.S.A. also gets a court order for prospective surveillance. The only recent exception, one official said, involved a dead suspect. The N.S.A. is also permitted to search the 12333 storehouse using keywords likely to bring up Americans’ messages. Such searches must have “foreign intelligence” purposes, so analysts cannot hunt for ordinary criminal activity. For now, the N.S.A. does not share raw 12333 intercepts with other agencies, like the F.B.I. or the C.I.A., to search for their own purposes. But the administration is drafting new internal guidelines that could permit such sharing, officials said. The administration secretly changed the rules in November 2010 to allow the N.S.A. to analyze Americans’ metadata — information showing who communicates with whom, but not content — gathered under 12333, Mr. Snowden’s leaks showed. The agency may do so without outside permission and for any foreign intelligence purpose, not just counterterrorism. That means there are fewer restrictions on the agency’s use of Americans’ bulk metadata when gathered abroad than when gathered on domestic soil under FISA and court oversight. The N.S.A.'s 12333 power would not diminish under the bill to replace the phone metadata program. Aware of leak prosecutions, Mr. Tye, who now works for a civic activist network, estimates he has spent $13,000 on lawyers to make sure he stays within the lines. He drafted a Washington Post opinion column about 12333 by hand to avoid introducing any classified information on an insecure computer, and submitted it for prepublication government review. But he said he felt compelled to speak out. Because of Mr. Snowden’s disclosures, he said, there is growing awareness that it is now possible for the government to collect a huge share of private communications. The public and Congress, he argued, should decide what the rules for that growing power should be. “We are at an inflection point in human history,” he said. 11 12 Adv 1- Econ A. U.S surveillance is costing American technology companies billions of dollars. Massive changes to NSA powers is key to change perception and increase trust in American Tech companies. Miller 2014 (Claire Cain Miller, she is a writer for the New York Times, “Revelations of N.S.A. Spying Cost U.S. Tech Companies” http://www.nytimes.com/2014/03/22/business/fallout-from-snowden-hurting-bottom-line-of-tech-companies.html?_r=0) Microsoft has lost customers, including the government of Brazil. IBM is spending more than a billion dollars to build data centers overseas to reassure foreign customers that their information is safe from prying eyes in the United States government. And tech companies abroad, from Europe to South America, say they are gaining customers that are shunning United States providers, suspicious because of the revelations by Edward J. Snowden that tied these providers to the National Security Agency’s vast surveillance program. Even as Washington grapples with the diplomatic and political fallout of Mr. Snowden’s leaks, the more urgent issue, companies and analysts say, is economic. Technology executives, including Mark Zuckerberg of Facebook, raised the issue when they went to the White House on Friday for a meeting with President Obama. It is impossible to see now the full economic ramifications of the spying disclosures — in part because most companies are locked in multiyear contracts — but the pieces are beginning to add up as businesses question the trustworthiness of American technology products. The confirmation hearing last week for the new N.S.A. chief, the video appearance of Mr. Snowden at a technology conference in Texas and the drip of new details about government spying have kept attention focused on an issue that many tech executives hoped would go away. Despite the tech companies’ assertions that they provide information on their customers only when required under law — and not knowingly through a back door — the perception that they enabled the spying program has lingered. “It’s clear to every single tech company that this is affecting their bottom line,” said Daniel Castro, a senior analyst at the Information Technology and Innovation Foundation, who predicted that the United States cloud computing industry could lose $35 billion by 2016. Forrester Research, a technology research firm, said the losses could be as high as $180 billion, or 25 percent of industry revenue, based on the size of the cloud computing, web hosting and outsourcing markets and the worst case for damages. The business effect of the disclosures about the N.S.A. is felt most in the daily conversations between tech companies with products to pitch and their wary customers. The topic of surveillance, which rarely came up before, is now “the new normal” in these conversations, as one tech company executive described it. “We’re hearing from customers, especially global enterprise customers, that they care more than ever about where their content is stored and how it is used and secured,” said John E. Frank, deputy general counsel at Microsoft, which has been publicizing that it allows customers to store their data in Microsoft data centers in certain countries. At the same time, Mr. Castro said, companies say they believe the federal government is only making a bad situation worse. “Most of the companies in this space are very frustrated because there hasn’t been any kind of response that’s made it so they can go back to their customers and say, ‘See, this is what’s different now, you can trust us again,’ ” he said. In some cases, that has meant forgoing potential revenue. Though it is hard to quantify missed opportunities, American businesses are being left off some requests for proposals from foreign customers that previously would have included them, said James Staten, a cloud computing analyst at Forrester who has read clients’ requests for proposals. There are German companies, Mr. Staten said, “explicitly not inviting certain American companies to join.” He added, “It’s like, ‘Well, the very best vendor to do this is IBM, and you didn’t invite them.’ ” The result has been a boon for foreign companies. Runbox, a Norwegian email service that markets itself as an alternative to American services like Gmail and says it does not comply with foreign court orders seeking personal information, reported a 34 percent annual increase in customers after news of the N.S.A. surveillance. Brazil and the European Union, which had used American undersea cables for intercontinental communication, last month decided to build their own cables between Brazil and Portugal, and gave the contract to Brazilian and Spanish companies. Brazil also announced plans to abandon Microsoft Outlook for its 13 own email system that uses Brazilian data centers. Mark J. Barrenechea, chief executive of OpenText, Canada’s largest software company, said an antiAmerican attitude took root after the passage of the Patriot Act, the counterterrorism law passed after 9/11 that expanded the government’s surveillance powers. But “the volume of the discussion has risen significantly post Snowden,” he said. For instance, after the N.S.A. surveillance was revealed, one of OpenText’s clients, a global steel manufacturer based in Britain, demanded that its data not cross United States borders. “Issues like privacy are more important than finding the cheapest price,” said Matthias Kunisch, a German software executive who spurned United States cloud computing providers for Deutsche Telekom. “Because of Snowden, our customers have the perception that American companies have connections to the N.S.A.” Security analysts say that ultimately the fallout from Mr. Snowden’s revelations could mimic what happened to Huawei, the Chinese technology and telecommunications company, which was forced to abandon major acquisitions and contracts when American lawmakers claimed that the company’s products contained a backdoor for the People’s Liberation Army of China — even though this claim was never definitively verified. Silicon Valley companies have complained to government officials that federal actions are hurting American technology businesses. But companies fall silent when it comes to specifics about economic harm, whether to avoid frightening shareholders or because it is too early to produce concrete evidence. “The companies need to keep the priority on the government to do something about it, but they don’t have the evidence to go to the government and say billions of dollars are not coming to this country,” Mr. Staten said. Some American companies say the business hit has been minor at most. John T. Chambers, the chief executive of Cisco Systems, said in an interview that the N.S.A. disclosures had not affected Cisco’s sales “in a major way.” Although deals in Europe and Asia have been slower to close, he said, they are still being completed — an experience echoed by several other computing companies. Still, the business blowback can be felt in other ways than lost customers. Security analysts say tech companies have collectively spent millions and possibly billions of dollars adding stateoftheart encryption features to consumer services, like Google search and Microsoft Outlook, and to the cables that link data centers at Google, Yahoo and other companies. IBM said in January that it would spend $1.2 billion to build 15 new data centers, including in London, Hong Kong and Sydney, Australia, to lure foreign customers that are sensitive about the location of their data. Salesforce.com announced similar plans this month. Germany and Brazil, where it was revealed that the N.S.A. spied on government leaders, have been particularly adversarial toward American companies and the government. Lawmakers, including in Germany, are considering legislation that would make it costly or even technically impossible for American tech companies to operate inside their borders. Yet some government officials say laws like this could have a motive other than protecting privacy. Shutting out American companies “means more business for local companies,” Richard A. Clarke, a former White House counterterrorism adviser, said last month. And, If the perception of NSA joint efforts with US tech companies continues their competitive edge will diminish. Timm, 2013 (Trevor Timm, November 2013-Trevor Timm is a co-founder and the executive director of the Freedom of the Press Foundation. He is a journalist, activist, and lawyer who writes a twice weekly column for The Guardian on privacy, free speech, and national security. He has contributed to The Atlantic, Al Jazeera, Foreign Policy, Harvard Law and Policy Review, PBS MediaShift, and Politico.Trevor formerly worked as an activist at the Electronic Frontier Foundation. Before that, he helped the longtime General Counsel of The New York Times, James Goodale, write a book on the Pentagon Papers and the First Amendment. He received his J.D. from New York Law School. “How NSA Mass Surveillance is Hurting the US Economy” https://www.eff.org/deeplinks/2013/11/how-nsa-mass-surveillance-hurting-useconomy) Privacy may not be the only casualty of the National Security Agency’s massive surveillance program. Major sectors of the US economy are reporting financial damage as the recent revelations shake consumer confidence and US trade partners distance themselves from companies that may have been compromised by the NSA or, worse, are secretly collaborating with the spy agency. Member of Congress, especially those who champion America’s competitiveness in the global marketplace, should take note and rein in the NSA now if they want to stem the damage. The Wall Street Journal recently reported that AT&T’s desired acquisition of the European company Vodafone is in danger due to the company’s well-documented involvement in the NSA’s data-collection programs. European officials said the telecommunications giant would face “intense scrutiny” in its bid to purchase a major cell phone carrier. The Journal went on to say: “Resistance to such a deal, voiced by officials in interviews across Europe, suggests the impact of the NSA affair could extend beyond the diplomatic sphere and damage US economic interests in key markets.” In September, analysts at Cisco Systems reported that the fallout “reached another level,” when the National Institute of Standards and Technology (NIST) told companies not to use cryptographic standards that may have been undermined by the NSA’s BULLRUN program. The Cisco analysts said that if cryptography was compromised “it would be a critical blow to trust required across 14 the Internet and the security community.” This forecast was proven true in mid-November, when Cisco reported a 12 percent slump in its sales in the developing world due to the NSA revelations. As the Financial Times reported, new orders fell by 25 percent in Brazil and 30 percent in Russia and Cisco predicts its overall sales could drop by as much 10 percent this quarter. Cisco executives were quoted saying the NSA’s activities have created "a level of uncertainty or concern" that will have a deleterious impact on a wide-range of tech companies. It is hard for civil libertarians to shed tears over AT&T losing business because of NSA spying, considering the company allowed the NSA to directly tap into its fiber optic cables to copy vast amounts of innocent Americans’ Internet traffic. AT&T was also recently revealed as having partnered with both the DEA and the CIA on separate mass surveillance programs. It is also hard to feel sorry for Cisco, which stands accused of helping China spy on dissidents and religious minorities. But the fact that the spying is hurting these major companies is indicative of the size of the problem. This summer, European Parliament’s civil liberties committee was presented with a proposal to require every American website to place surveillance notices to EU citizens in order to force the US government to reverse course: “The users should be made aware that the data may be subject to surveillance (under FISA 702) by the US government for any purpose which furthers US foreign policy. A consent requirement will raise EU citizen awareness and favour growth of services solely within EU jurisdiction. This will thus have economic impact on US business and increase pressure on the US government to reach a settlement.” [emphasis ours] Meanwhile, Telenor, Norway’s largest telecom provider has reportedly halted its plans to move its customers to a US-based cloud provider. Brazil seems to be moving ahead to create its own email service and require US companies locate an office there if they wish to do business with Brazilian customers. Laws like this mean that companies like Google “could be barred from doing business in one of the world’s most significant markets,” according to Google’s director for law enforcement and information security at Google, Richard Selgado. Google has been warning of this as far back as July, when in FISA court documents it argued that the continued secrecy surrounding government surveillance demands would harm its business. Many commentators have been warning about the economic ramifications for months. Princeton technologist Ed Felten, who previously at the Federal Trade Commission, best explained why the NSA revelations could end up hurting US businesses: “This is going to put US companies at a competitive disadvantage, because people will believe that U.S. companies lack the ability to protect their customers—and people will suspect that U.S. companies may feel compelled to lie to their customers about security.” The fallout may worsen. One study released shortly after the first Edward Snowden leaks said the economy would lose $22 to $35 billion in the next three years. Another study by Forrester said the $35 billion estimate was too low and pegged the real loss figure around $180 billion for the US tech industry by 2016. Much of the economic problem stems for the US government’s view that it’s open season when it comes to spying on non-U.S. persons. As Mark Zuckerberg said in September, the government’s position is“don’t worry, we’re not spying on any Americans. Wonderful, that’s really helpful for companies trying to work with people around the world.” Google’s Chief Legal Officer David Drummond echoed this sentiment last week, saying: “The justification has been couched as 'Don't worry. We're only snooping on foreigners.' For a company like ours, where most of our business and most of our users are non-American, that's not very helpful." Members of Congress who care about the US economy should take note: the companies losing their competitive edge due to NSA surveillance are mainstream economic drivers. Just as their constituents are paying attention, so are the customers who vote with their dollars . As Sen. Ron Wyden remarked last month, “If a foreign enemy was doing this much damage to the economy, people would be in the streets with pitchforks.” And, Tech companies are becoming the backbone to the American Economy. Slumps in these sectors create shocks to the entire economy. Rausas Et al, 2011 (Matthieu Pelissie du Rausas, James Manyika, Eric Hazan, Jacques Bughin, Micahel Chui, Remi Said, March 2011, The Internet is big and continues to grow and reach everywhere. The Internet is now used in every country, in every sector, in most companies, and by more than 2bn people and it is still growing. Internet-related consumption and expenditure is now bigger than agriculture or energy, and our research shows that the 15 Internet accounts for, on average, 3.4 percent of GDP in the 13 countries we studied. If Internet consumption and expenditure were a sector, its weight in GDP would be bigger than energy, agriculture, or several other critical industries. The Internet’s total contribution to the GDP is bigger than the GDP of Spain or Canada, and it is growing faster than Brazil. The Internet is still in its infancy, and the weight of the Internet in GDP varies drastically, even among, countries at the same stage of development. While the Internet accounts for around 6 percent of GDP in advance countries such as Sweden and the United Kingdom, in 9 out of 13 countries its contribution is below 4 percent, leaving tremendous room for further Internet development. The Internet is a critical element of growth. Both out macroeconomic approach and our statistical approach shows that, in the mature countries we studied, the Internet accounted for 10 percent of GDP growth over the past 15 years. And its influence is expanding. Over the past five years, the Internet’s contribution to GDP growth in these countries doubled to 21 percent. If we look at all 13 countries in our analysis, the Internet contributed 7 percent of growth over the past 15 years and 11 percent over the past five. This is a reflection of small and medium-sized enterprises (SMEs) receiving a performance boost from the Internet. As part of our research, we surveyed more than 4,800 SMEs in the countries we studied. We found that those with a strong Web presence grew more than twice as quickly as those that had minimal or no presence, an outcome that holds across sectors. In addition, SMEs that took advantage of the Internet reported the share of total revenues that they earned from exports was more than twice as large as that reported by others. They also created more than twice the number of jobs as others. The maturity of the Internet correlates with rising living standards. Leveraging endogenous economic growth theory, we have been able to show that Internet maturity correlates with growth in per capita GDP. Using the results of the correlation, a simulation shows that an increase in Internet maturity similar to the one experienced in mature countries over the past 15 years creates an increase in real GDP per capita of $500 on average during this period. It took the Industrial Revolution of the 19th century 50 years to achieve same results. This shows both the magnitude of the positive impact of the Web at all levels of society and the speed at which it delivers benefits. The Internet is a powerful catalyst for job creation. Some jobs have been destroyed by the emergence of the Internet. However, a detailed analysis of the French economy showed that while the Internet has destroyed 500,000 jobs over the past 15 years, it has created 1.2 million others, a net addition of 700,000 jobs or 2.4 jobs created for every job destroyed. This conclusion is supported by McKinsey’s global SME survey, which found 2.6 jobs were created for every one destroyed. The Internet drives economic modernization. The Internet’s main impact is through the modernization of traditional activities. Although the Internet has resulted in significant value shifts between sectors in the global economy, our research demonstrated that all industries have benefited from the Web. Indeed, in McKinsey’s global SME survey, we found that 75 percent of the economic impact of the Internet arises from traditional companies that don’t define themselves as pure Internet players. The businesses that have seen the greatest value creation have benefits from innovation leading to higher productivity triggered by the Internet. The impact of the Internet goes beyond GDP, generation astonishing consumer surplus. Beyond its impact on GDP, the Internet creates substantial value for users, ranging form €13 ($18) a month per user in Germany to €20 ($28) in the United Kingdom. In total, the consumer surplus generated by the Internet in 2009 ranged from €7 billion ($10 billion) in France to €46 billion ($64 billion) in the United States. The rapidly shifting supply side offers some contrasts. Looking at “supply” of the Internet globally, we find that countries with a strong Internet ecosystem also have a high Internet contribution to GDP. However, the global Internet landscape is shifting rapidly and offer some interesting contrasts: The United States leads the global Internet supply ecosystem. The United States captures more than 30 percent of global Internet revenues and more than 40 percent of net income. Using a proprietary model, the McKinsey Internet Supply Leadership Index, we show that the United States remains the largest player in the internet supply ecosystem. It is the country with the most diverse structure within the global ecosystem among the 13 we analyzed in this research, garnering relatively equal contributions from hardware, software and services and telecommunications. B. Amending XO 12333 denies the NSA ability to subvert tech companies, which is critical to reviving U.S. credibility Schneier 14 Bruce, Chief Technology Officer at Resilient Systems, Fellow at the Berkman Center for Internet & Society at Harvard University, and a board member at Electronic Frontier Foundation. “Saving Privacy,” Boston Review. May 8, 2014 http://www.bostonreview.net/forum/saving-privacy/bruceschneier-response-saving-privacy 16 In addition to turning the Internet into a worldwide surveillance platform, the NSA has surreptitiously weakened the products, protocols, and standards we all use to protect ourselves. By doing so, it has destroyed the trust that underlies the Internet. We need that trust back. Trust is inherently social. It is personal, relative, situational, and fluid. It is not uniquely human, but it is the underpinning of everything we have accomplished as a species. We trust other people, but we also trust organizations and processes. The psychology is complex, but when we trust a technology, we basically believe that it will work as intended. This is how we technologists trusted the security of the Internet. We didn't have any illusions that the Internet was secure, or that governments, criminals, hackers, and others couldn't break into systems and networks if they were sufficiently skilled and motivated. We didn't trust that the programmers were perfect, that the code was bug-free, or even that our crypto math was unbreakable. We knew that Internet security was an arms race, and the attackers had most of the advantages. What we trusted was that the technologies would stand or fall on their own merits. We now know that trust was misplaced. Through cooperation, bribery, threats, and compulsion, the NSA—and the United Kingdom's GCHQ—forced companies to weaken the security of their products and services, then lie about it to their customers. We know of a few examples of this weakening. The NSA convinced Microsoft to make some unknown changes to Skype in order to make eavesdropping on conversations easier. The NSA also inserted a degraded random number generator into a common standard, then worked to get that generator used more widely. I have heard engineers working for the NSA, FBI, and other government agencies delicately talk around the topic of inserting a "backdoor" into security products to allow for government access. One of them told me, "It's like going on a date. Sex is never explicitly mentioned, but you know it's on the table." The NSA's SIGINT Enabling Project has a $250 million annual budget; presumably it has more to show for itself than the fragments that have become public. Reed Hundt calls for the government to support a secure Internet, but given its history of installing backdoors, why would we trust claims that it has turned the page? We also have to assume that other countries have been doing the same things. We have long believed that networking products from the Chinese company Huawei have been backdoored by the Chinese government. Do we trust hardware and software from Russia? France? Israel? Anywhere? This mistrust is poison. Because we don't know, we can't trust any of them. Internet governance was largely left to the benign dictatorship of the United States because everyone more or less believed that we were working for the security of the Internet instead of against it. But now that system is in turmoil. Foreign companies are fleeing US suppliers because they don't trust American firms' security claims. Far worse governments are using these revelations to push for a more isolationist Internet, giving them more control over what their citizens see and say. All so we could eavesdrop better. There is a term in the NSA: "nobus," short for "nobody but us." The NSA believes it can subvert security in such a way that only it can take advantage of that subversion. But that is hubris. There is no way to determine if or when someone else will discover a vulnerability. These subverted systems become part of our infrastructure; the harms to everyone, once the flaws are discovered, far outweigh the benefits to the NSA while they are secret. We can't both weaken the enemy's networks and protect our own. Because we all use the same products, technologies, protocols, and standards, we either allow everyone to spy on everyone, or prevent anyone from spying on anyone. By weakening security, we are weakening it against all attackers. By inserting vulnerabilities, we are making everyone vulnerable. The same vulnerabilities used by intelligence agencies to spy on each other are used by criminals to steal your passwords. It is surveillance versus security, and we all rise and fall together. Security needs to win. The Internet is too important to the world— and trust is too important to the Internet—to squander it like this. We'll never get every power in the world to agree not to subvert the parts of the Internet they control, but we can stop subverting the parts we control. Most of the high-tech companies that make the Internet work are US companies, so our influence is disproportionate. And once we stop subverting, we can credibly devote our resources to detecting and preventing subversion by others. C. Economic Renewal is key ensure a strong economy. American tech companies must remain strong in a competitive market. Without renewal, slow recovery of the economy will occur. Muro Et al., 2015 (Mark Muro, Jonathan Rothwell, Scott Andes, Kenan Fikri, and Siddharth Kulkarni, February 2015, The Brookings Institute, “America’s Advanced Industries, What they are and where they are, and why they matter” http://www.brookings.edu/~/media/Research/Files/Reports/2015/02/03-advancedindustries/final/AdvancedIndustry_ESFinalFeb2lores.pdf?la=en) The need for economic renewal in the United States remains urgent. Years of disappointing job growth and stagnant incomes for the majority of workers have left the nation shaken and frustrated. At the same time, astonishing new technologies—ranging from advanced robotics and “3-D printing” to the “digitization of everything”—are provoking 17 genuine excitement even as they make it hard to see where things are going. Hence this paper: At a critical moment, this report asserts the special importance to America’s future of what the paper calls America’s “advanced industries” sector. Characterized by its deep involvement with technology research and development (R&D) and STEM (science, technology, engineering, and math) workers, the sector encompasses 50 industries ranging from manufacturing industries such as automaking and aerospace to energy industries such as oil and gas extraction to high-tech services such as computer software and computer system design, including for health applications. These industries encompass the nation’s “tech” sector at its broadest and most consequential. Their dynamism is going to be a central component of any future revitalized U.S. economy. As such, these industries encompass the country’s best shot at supporting innovative, inclusive, and sustainable growth. For that reason, this report provides a wide-angle overview of the advanced industry sector that reviews its role in American prosperity, assesses key trends, and maps its metropolitan and global competitive standing before outlining high-level strategies to enhance that. The overview finds that: Advanced industries represent a sizable economic anchor for the U.S. economy and have led the post-recession employment recovery Modest in size, the sector packs a massive economic punch: ● As an employer and source of economic activity the advanced industry sector plays a major role in the U.S. economy. As of 2013, the nation’s 50 advanced industries (see nearby box for selection criteria) employed 12.3 million U.S. workers. That amounts to about 9 percent of total U.S. employment. And yet, even with this modest employment base, U.S. advanced industries produce $2.7 trillion in value added annually—17 percent of all U.S. gross domestic product (GDP). That is more than any other sector, including healthcare, finance, or real estate. At the same time, the sector employs 80 percent of the nation’s engineers; performs 90 percent of private-sector R&D; generates approximately 85 percent of all U.S. patents; and accounts for 60 percent of U.S. exports. Advanced industries also support unusually extensive supply chains and other forms of ancillary economic activity. On a per worker basis, advanced industries purchase $236,000 in goods and services from other businesses annually, compared with $67,000 in purchasing by other industries. This spending sustains and creates more jobs. In fact, 2.2 jobs are created domestically for every new advanced industry job—0.8 locally and 1.4 outside of the region. This means that in addition to the 12.3 million workers employed by advanced industries, another 27.1 million U.S. workers owe their jobs to economic activity supported by advanced industries. Directly and indirectly, then, the sector supports almost 39 million jobs—nearly one-fourth of all U.S. employment. ● In terms of the sector’s growth and change, the total number of jobs in the sector has remained mostly flat since 1980, but its output has soared. From 1980 to 2013 advanced industry output expanded at a rate of 5.4 percent annually—30 percent faster than the economy as a whole. Since the Great Recession, moreover, both employment and output have risen dramatically. The sector has added nearly one million jobs since 2010, with employment and output growth rates 1.9 and 2.3 times higher, respectively, than in the rest of the economy. Advanced services led this post-recession surge and created 65 percent of the new jobs. Computer systems design alone generated 250,000 new jobs. Certain advanced manufacturing industries—especially those involved in transportation equipment— have also added thousands of jobs after decades of losses. Advanced industries also provide high-quality economic opportunities for workers. Workers in advanced industries are extraordinarily productive and generate some $210,000 in annual value added per worker compared with $101,000, on average, outside advanced industries. Because of this, advanced industries compensate their workers handsomely and, in contrast to the rest of the economy, wages are rising sharply. In 2013, the average advanced industries worker earned $90,000 in total compensation, nearly twice as much as the average worker outside of the sector. Over time, absolute earnings in advanced industries grew by 63 percent from 1975 to 2013 after adjusting for inflation. This compares with 17 percent gains outside the sector. Even workers with lower levels of education can earn salaries in advanced industries that far exceed their peers in other industries. In this regard, the sector is in fact accessible: More than half of the sector’s workers possess less than a bachelor’s degree. Advanced industries are present in nearly every U.S. region, but the sector’s geography is uneven: And Slow economic recovery leads to financial crashes. Sumner 12 (Scott Sumner, Scott B. Sumner is the director of the Program on Monetary Policy at the Mercatus Center at George Mason University and an economist who teaches at Bentley University in Waltham, Massachusetts. “Slow Recoveries Cause financial crashes”, http://www.themoneyillusion.com/?p=17115) People often argue that financial crises lead to slow recoveries. But I rarely see people argue the reverse; that slow recoveries cause financial crises. It’s incredibly easy to make the reverse causation argument for the 18 current eurozone crisis, or for the US financial crises during the Great Depression. But what about the US crisis of 2008? There certainly was significant financial stress before the recession began, or indeed even before economists were predicting a recession. So the reverse causality argument is more difficult to make for the US banking turmoil in 2007. But what about the much more severe crisis in late 2008? In that case I think we can easily make a reverse causation argument. Markets correctly began to realize that monetary policy (NGDP growth) was becoming too tight, and that a long slump was getting underway. This reduction in expected future NGDP led to lower current levels of AD, and also lower asset prices. This asset price decline greatly intensified the financial crisis in the fall of 2008. Financial markets are forward-looking. As soon as they recognize that a long slump lies ahead, asset prices will crash. That will often (not always) cause a financial crisis. Ironically the cause of the crisis occurs after the effect, which is why it’s so often misdiagnosed. PS. In one nanosecond a commenter will point out that the cause isn’t really coming after the effect. That’s getting too deep into metaphysics for me. PPS. I see a number of liberal bloggers trying to defend Obama by arguing that recoveries from financial crises are usually slow. I don’t get it. Are they claiming recoveries are slow because of a lack of AD? Yes, but then the problem is insufficient monetary and fiscal stimulus, not financial turmoil. Are they claiming recovery is slow for structural reasons? Maybe, but I thought that was the conservative argument that liberals generally treated with contempt. Can someone help me here? D. Impact- Economic decline causes war – statistics prove Royal 10 [Jedediah, Director of Cooperative Threat Reduction at the U.S. Department of Defense, 2010, “Economic Integration, Economic Signaling and the Problem of Economic Crises,” in Economics of War and Peace: Economic, Legal and Political Perspectives, ed. Goldsmith and Brauer, p. 213-214] Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defense behavior of interdependent states. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow. First, on the systemic level, Pollins (2008) advances Modelski and Thompson’s (1996) work on leadership cycle theory, finding that rhythms in the global economy are associated with the rise and fall of a pre-eminent power and the often bloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as economic crisis could usher in a redistribution of relative power (see also Gilpin, 1981) that leads to uncertainty about power balances, increasing the risk of miscalculation (Fearon, 1995). Alternatively, even a relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to challenge a declining power (Werner, 1999). Seperately, Pollins (1996) also shows that global economic cycles combined with parallel leadership cycles impact the likelihood of conflict among major, medium and small powers, although he suggests that the causes and connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland’s (1996, 2000) theory of trade expectations suggests that ‘future expectation of trade’ is a significant variable in understanding economic conditions and security behavious of states. He argues that interdependent states are likely to gain pacific benefits from trade so long as they have an optimistic view of future trade relations, However, if the expectations of future trade decline, particularly for difficult to replace items such as energy resources, the likelihood for conflict increases, as states will be inclined to use force to gain access to those resources. Crisis could potentially be the trigger for decreased trade expectations either on its own or because it triggers protectionist moves by interdependent states. Third, others have considered the link between economic decline and external armed conflict at a national level. Blomberg and Hess (2002) find a strong correlation between internal conflict and external conflict, particularly during periods of economic downturn. They write, The linkages between internal and external conflict and prosperity are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict, which in turn returns the favor. Moreover, the presence of a recession tends to amplify the extent to which international and external conflict self-reinforce each other. (Blomberg & Hess, 2002. P. 89) Economic decline has been linked with an increase in the likelihood of terrorism (Blomberg, Hess, & Weerapana, 2004), which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the popularity of a sitting government. ‘Diversionary theory’ suggests that, when facing unpopularity arising from economic decline, sitting governments have increase incentives to fabricate external military conflicts to create a ‘rally around the flag’ effect. Wang (1996), DeRouen (1995), and Blomberg, Hess, and Thacker (2006) find supporting evidence showing that economic decline and use of force are at least indirectly correlated. Gelpi (1997), Miller (1999), and Kisangani and Pickering (2009) suggest that the tendency towards diversionary tactics are greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United States, and thus weak Presidential popularity, are statistically linked to an increase in the use of force. In summary, recent economic scholarship positively correlated economic integration with an increase 19 in the frequency of economic crises, whereas political science scholarship links economic decline with external conflict at systemic, dyadic and national levels. This implied connection between integration, crisis and armed conflict has not featured prominently in the economic-security debate and deserves more attention. 20 Adv 2- EU Relations A. The E.U. is halting agreements with the U.S. due to NSA spying. A decrease of U.S. spying is the only way to gain trust back. European Parliament Press Release“12-03-2014 –US NSA: stop mass surveillance now or face consequences”, http://www.europarl.europa.eu/news/en/newsroom/content/20140307IPR38203/html/US-NSA-stop-mass-surveillance-now-or-face-consequencesMEPs-say Parliament's consent to the EU-US trade deal "could be endangered" if blanket mass surveillance by the US National Security Agency (NSA) does not stop, MEPs said on Wednesday, in a resolution wrapping up their sixmonth inquiry into US mass surveillance schemes. The text also calls on the EU to suspend its bank data deal with the US and the “Safe Harbour agreement” on data privacy. The fight against terrorism can never justify secret and illegal mass surveillance, it adds. The resolution, in which MEPs set out their findings and recommendations to boost EU citizens' privacy, was backed by 544 votes to 78, with 60 abstentions. "The Snowden revelations gave us a chance to react. I hope we will turn those reactions into something positive and lasting into the next mandate of this Parliament, a data protection bill of rights that we can all be proud of", said Civil Liberties inquiry rapporteur Claude Moraes (S&D, UK). "This is the only international inquiry into mass surveillance. (...) Even Congress in the United States has not had an inquiry", he added. Parliament's should withhold its consent to the final Transatlantic Trade and Investment Partnership (TTIP) deal with the US unless it fully respects EU fundamental rights, stresses the resolution, adding that data protection should be ruled out of the trade talks. This consent “could be endangered as long as blanket mass surveillance activities and the interception of communications in EU institutions and diplomatic representations are not fully stopped”, notes the text. MEPs also call for the "immediate suspension" of the Safe Harbour privacy principles (voluntary data protection standards for non-EU companies transferring EU citizens’ personal data to the US). These principles “do not provide adequate protection for EU citizens” say MEPs, urging the US to propose new personal data transfer rules that meet EU data protection requirements. The Terrorist Finance Tracking Programme (TFTP) deal should also be suspended until allegations that US authorities have access to EU citizens’ bank data outside the agreement are clarified, insist MEPs. European whistle-blower protection and EU cloud The text also calls for a "European whistle-blower protection programme", which should pay particular attention to the "complexity of whistleblowing in the field of intelligence". EU countries are also asked to consider granting whistleblowers international protection from prosecution. Furthermore, Europe should develop its own clouds and IT solutions, including cybersecurity and encryption technologies, to ensure a high level of data protection, adds the text. The UK, France, Germany, Sweden, the Netherlands and Poland should clarify the allegations of mass surveillance - including potential agreements between intelligence services and telecoms firms on access to and exchange of personal data and access to transatlantic cables - and their compatibility with EU laws, the resolution says. Other EU countries, in particular those participating in the "9-eyes" (UK, Denmark, France and the Netherlands) and "14-eyes" arrangements (those countries plus Germany, Belgium, Italy, Spain and Sweden) are also urged to review their national laws to ensure that their intelligence services are subject to parliamentary and judicial oversight and that they comply with fundamental rights obligations. And, Europe is questioning US commitment to the alliance- reinvigorating relations are key to solve Russian aggression Coffey ’14 (By Luke Coffey —Luke Coffey is Margaret Thatcher Fellow in the Margaret Thatcher Center for Freedom, a division of the Kathryn and Shelby Cullom Davis Institute for International Studies, at The Heritage Foundation., March 2014, http://europe.newsweek.com/junckers-calls-eu-spy-service-hasopened-can-worms-327874 The President needs to get the transatlantic community united over the Ukraine, committed to NATO, supporting genuine free trade, and focused on Afghanistan. Time to Unite over Ukraine Ever since Russia invaded and annexed Crimea, the U.S. and its European This trip will provide an opportunity for the President to demonstrate America’s commitment to transatlantic relations. 21 allies have not been on the same sheet of music regarding how best to deal with Russia. There is a big gap between U.S. and EU sanctions. The U.S. targeted people who at one time or another have been close to Vladimir Putin. In stark contrast, the EU’s larger list of 13 Russians targeted by sanctions (plus eight Crimeans) hits much lower-ranked figures. This demonstrates that the EU cannot move beyond a “lowest common denominator” approach to foreign policy making. There have also been inconsistent messages coming from inside Europe on how to deal with Russia. For example, on one hand, NATO’s Secretary General describes Russia’s annexation of Crimea as the biggest threat to European security since the Cold War. Yet the French continue to sell Moscow warships, and the Spanish allow the Russian navy to use their territories in North Africa. Transatlantic Trade and Investment Partnership (TTIP) In February 2013, President Obama called for a free trade agreement between the U.S. and the EU during his annual State of the Union address. With a number of foreign policy decisions by the Obama Administration leaving Europeans questioning America’s commitment to transatlantic relations, politicians and commentators on both sides of the Atlantic have seized on this announcement as the answer to the transatlantic relationship’s woes. Failure of the trade deal to deliver the expected political and economic results could further damage transatlantic relations. The promotion of economic freedom is a vital part of U.S. foreign and domestic policy. A TTIP that genuinely reduced trade barriers would contribute significantly to this aim. But even though negotiations are still at an early stage, there are reasons to be concerned that TTIP will not promote free trade but instead will build a transatlantic managed market. This would reduce or even eliminate U.S. gains from TTIP and would not promote economic freedom. The U.S. should continue negotiating but be cautious and assess any agreement on its merits. Supporters of economic freedom and limited government should be prepared to support a TTIP that empowers consumers and opens market opportunities for entrepreneurs, but they should not start cheering for TTIP before they confirm that the agreement is not a Trojan horse for increased regulation and the importation of the EU’s managed market into the U.S. Such an agreement would be a bad deal for everyone, especially the U.S. The Upcoming NATO Summit The NATO summit taking place in September in Wales will be particularly important and should be high on the President’s agenda during his visit. This will be the last summit before NATO ends its combat operations in Afghanistan and the first summit since Russia invaded Crimea. Many of the important issues that will be discussed at the summit As NATO redefines its mission in a post–Afghan War world, it will need U.S. leadership. The alliance should make collective defense the underpinning of everything it does. In addition, the will require the U.S. to prepare the groundwork now. U.S. should use the next NATO summit to advance an agenda that keeps NATO focused on the future of Afghanistan, ensures that NATO enlargement is firmly on the agenda, and readies the NATO should focus on preventing nuclear proliferation, defending against cyber attacks, ensuring energy security, combatting terrorism, and establishing a comprehensive missile defense system. It should also get back to training for its Article 5 mission. Remember Afghanistan? One of the most crucial periods of the Afghan campaign will commence in 2015, when Afghans take the lead for their security. The President should also use his visit to drum up financial and military support for Afghanistan after 2015. After NATO-led combat operations end this year, two important issues regarding Afghanistan remain to be resolved: the number of troops in Afghanistan and the funding for the Afghan National Security Forces (ANSF). A major part of the transition strategy in Afghanistan has been training the ANSF to a level where it can meet Afghanistan’s internal security challenges without tens of thousands of NATO troops on the ground. Maintaining the ANSF after 2015 will cost the international community approximately $4.1 billion per year. According to a report by the Government Accountability Office, the international community is still short $1.8 billion for the years 2015–2017 for ANSF funding. NATO should demonstrate that it will stay engaged in Afghanistan after 2014. Do Not Waste This Opportunity President Obama’s visit to Europe could not come at a more important time. With Ukraine, the future of NATO, stability in Afghanistan, and free trade high on the agenda, President Obama should use his trip as an opportunity to show America’s commitment to transatlantic relations. The President should: Show leadership on dealing with Russia. The President should rally America’s European allies around a common approach when dealing with Russia. This will require American leadership. Having a divided transatlantic alliance does no good for Europe’s security and stability. Promote alliance for the challenges of the 21st century. transatlantic free trade. An agreement that reduces trade barriers and empowers individuals over government bureaucrats would be beneficial. Talks that make the U.S. more like another member of the EU would not. Keep NATO focused on territorial defense. NATO’s original mission of territorial defense has not been as important since the Cold War. In light of Russia’s recent Keep Europe focused on Afghanistan. Too much blood and treasure has been spent the past 13 years in Afghanistan for the West to turn its back now. The U.S. needs to drum up financial support for the ANSF and seek concrete troop pledges for the mentoring mission in Afghanistan after 2015. This is no time for NATO to turn its back on the situation there. Strengthen the Alliance Regrettably, the Obama Administration has attached little importance to the transatlantic alliance, and Europe has barely figured in the Administration’s foreign policy. Consequently, Europeans are left questioning America’s commitment to transatlantic relations. A strong transatlantic alliance should be at the heart of U.S. foreign policy. The President should reinvigorate partnerships with America’s key friends and allies in Europe. bellicose behavior, the U.S. should lead the alliance toward refocusing on policies that keep the North Atlantic region safe and secure. 22 And, Russian aggression is happening now due to EU Sanctions. Berzina, May 2015 (Kristine Berzina, May 20 , 2015,German Marshall Fund of the United States, “Russia Strikes Back against th Europe’s Energy Union” http://www.gmfus.org/blog/2015/05/20/russia-strikes-back-against-europe%E2%80%99s-energy-union Kristine Berzina is a Transatlantic Fellow for Energy & Society in the Brussels office of The German Marshall Fund of the United States. BRUSSELS—Europe is starting to play hardball with Russia on energy — and the Kremlin is fighting back. For years, the European Union was highly dependent on Russia’s natural gas and was unable to exert any influence on its supplier since it is the world’s largest energy importer. This spring, the European Commission launched an EU Energy Union to finally bind the 28 countries into a single energy market. The three Baltic States — previously linked only to each other and to Russia — have been instrumental to this new era of EU energy policy. Last December, Lithuania leased a floating liquefied natural gas terminal, and now buys Norwegian natural gas from Statoil that it can share with Latvia and Estonia. Electricity is Lithuania’s other major vulnerability, but with the EU’s support, it will soon complete grid connections to Poland and Sweden. Lithuania also initiated a European Commission investigation of Russia’s state-owned gas company Gazprom in 2011, arguing that it should not have to pay significantly more for natural gas than EU member states further away. Not only did the Commission agree, but last month, it charged Gazprom with hindering competition in eight Central and Eastern European member states. Gazprom could now face up to $10 billion in fines. Russia may be losing its commercial levers over Lithuania’s energy sector, but it is beginning to intervene militarily in the region’s energy sector. In the past few weeks, Russian naval vessels in the Baltic Sea have chased and disrupted ships in Lithuania’s exclusive economic zone that are laying the NordBalt electricity cable, intended to create an integrated Baltic electricity market. These Russian naval actions present a new military threat to energy in Europe. The EU needs to be aware that actions against Russia’s commercial practices may risk escalating conflicts across Europe. Other forms of Russian political interference could also increase. The prospect of greater political maneuvering against vulnerable EU member states — such as Greece — is especially worrisome. Russian President Vladimir Putin has proposed a new pipeline, Turkish Stream, which may deliver gas to Greece as well. The pipeline bypasses Ukraine and is a political tool for the Kremlin. Putin has directly courted Greek Prime Minister Alexis Tsipras, describing the economic benefits of the pipeline just as Greece struggles to repay its debts. Conveniently for Moscow, Turkish Stream could also interfere with the EU’s long-supported Trans-Anatolian pipeline, which is slated to bring gas from Azerbaijan to European markets. The EU and the United States can expect the continuation of such political, military, and economic maneuvering from Moscow on energy issues. In the past, the transatlantic partners have focused largely on gas pipelines rather than on other aspects of the energy sector as levers for Russia’s political influence. But energy security risks are no longer confined to one single area of the energy industry. With a more aggressive European energy policy, threats to energy security may come in the form of military and cyber moves against electricity as well as oil and gas infrastructure. B. The plan is critical to improve relations with the E.U. Landler, 2014 (MARK LANDLER MAY 2, 2014, The New York Times, “Merkel Signals That Tension Persists Over U.S. Spying” , http://www.nytimes.com/2014/05/03/world/europe/merkel-says-gapswith-us-over-surveillance-remain.html?_r=0) WASHINGTON — President Obama tried to mend fences with Chancellor Angela Merkel of Germany on Friday, calling her “one of my closest friends on the world stage.” But Ms. Merkel replied tartly that Germany still had significant differences with the United States over surveillance practices and that it was too soon to return to “business as usual.” The cordial but slightly strained encounter, which played out as the two leaders stood next to each other at a Rose Garden news conference, attested to the lingering scars left by the sensational disclosure last October that the National Security Agency had eavesdropped on Ms. Merkel’s phone calls. It came as the two leaders sought to project a unified front against Russia’s aggression in Ukraine, threatening President Vladimir V. Putin with sweeping new sanctions if Russia disrupted elections in Ukraine later this month, even as they acknowledged that not all European countries were ready to sign on to the most punishing measures. Ms. Merkel, who last fall declared that “spying between friends is simply unacceptable” and that 23 the United States had opened a breach of trust that would have to be repaired, said at the news conference that “we have a few difficulties yet to overcome.” One remaining issue, she said, was the “proportionality” of the surveillance. Mr. Obama, pointing to his administration’s efforts to restore privacy safeguards, even for non­Americans, said, “We have gone a long way in closing some of the gaps, but as Chancellor Merkel said, there are some gaps that need to be worked through.” Nearly a year after the first disclosures about the N.S.A.’s practices at home and abroad, however, the agency is emerging with a mandate to make only modest changes: some new limits on what kind of data it can hold about Americans, and stricter White House oversight of decisions to tap the cellphones of foreign leaders. The Obama administration is now turning its attention to Silicon Valley — the subject of a major White House study released Thursday — and whether the government should intervene to protect and prevent discriminatory behavior. “These are complicated issues,” Mr. Obama said of the debate over surveillance and civil liberties, as he glanced over at Ms. Merkel. “We’re not perfectly aligned yet, but we share the same values, and we share the same concerns.” The depth of their differences, however, was reflected by the failure to reach a broader intelligence­sharing agreement between the United States and Germany. The two sides could not even agree on how the talks had begun, with Mr. Obama disputing that the United States had ever offered Germany a socalled no­spy agreement. “We do not have a blanket no­spy agreement with any country,” he said, adding, “we’re not holding back from doing something with Germany that we somehow do with somebody else.” Months of negotiations to reach an agreement ended unsuccessfully after the two sides could not agree on its scope. According to administration officials, the Germans insisted that the United States not conduct any unsanctioned espionage on German soil, including from its embassy in Berlin, something it has not agreed to with other allies. Ms. Merkel did not address the negotiations directly, but said the debate showed the need for further dialogue between the United States and Germany, not just at the level of governments but also between lawmakers and the German and American people. Even as she highlighted differences with the White House, Ms. Merkel’s government advised against inviting Edward J. Snowden, the renegade former N.S.A. contractor who leaked the information about its surveillance practices, to testify before the German Parliament. A report by a German ministry on Friday said Mr. Snowden’s appearance would cause further damage to the relationship between the United States and Germany. The German officials had solicited an opinion from a Washington law firm suggesting that American authorities could seek to charge members of Parliament for complicity in Mr. Snowden’s publicizing of classified information. Still, for two leaders who had bonded over thorny issues like the European financial crisis, the N.S.A. furor has taken an obvious toll. Ms. Merkel deflected a question about whether the personal trust between her and Mr. Obama had been restored. When Ms. Merkel was asked if she was satisfied with how the White House had responded, Mr. Obama jumped in to answer first, saying he knew how emotional the issue was in Germany. “Angela Merkel is one of my closest friends on the world stage, somebody whose partnership I deeply value,” the president said. “It has pained me to see the degree to which the Snowden disclosures have created strains in the relationship.” In their private meetings on Friday, an American official said, the chemistry between Ms. Merkel and Mr. Obama was still good. They spent most of their time talking about the crisis in Ukraine, where they have emerged as the two leaders marshaling the Western response. Both kept up the pressure on Mr. Putin over Ukraine, setting a new trigger for much broader sanctions against Russian industry. Ms. Merkel noted that these measures would be imposed if Russia disrupted an election in Ukraine planned for May 25. “Should that not be possible to stabilize the situation further, further sanctions will be unavoidable,” she said. “This is something that we don’t want. Mr. Obama was even more emphatic, saying, “The Russian leadership must know that if it continues to destabilize eastern Ukraine and disrupt this month’s presidential election, we will move quickly on additional steps, including further sanctions that will impose greater costs.” While administration officials say Germany and the United States have been united in their response, the Germans have balked at sweeping sanctions on the Russian energy industry because that could reverberate on their fossil fuel­dependent economy. Building European support for industrywide sanctions will be a challenge, Mr. Obama said, because “you’ve got 28 countries, and some are more vulnerable than others to potential Russian retaliation. And we have to take those into account. Not every country is in the same place.” Some experts on Germany said the Ukraine crisis could give Mr. Obama and Ms. Merkel the foundation to rebuild their relationship, reminding them that despite the suspicion generated by the surveillance disclosures, their countries still have much in common. “Despite their enormous differences in background and style, Merkel and Obama share a similar approach to crises — they react cautiously, slowly, and incrementally,” said Jackson Janes, the president of the American Institute for Contemporary German Studies at Johns Hopkins University. “That instinct has been on display again in recent months.” David E. Sanger contributed reporting. C. US EU cooperation on Russia is key to avoid miscalculation and full-scale war Stacey ‘14 – Jeffrey Stacey, Dr. Jeffrey Stacey is currently Senior Visiting Fellow at the Center for Transatlantic Relations at the Paul H. Nitze School for Advanced International Studies at Johns Hopkins University. He joined CTR after serving in the Obama Administration as a State Department official specializing in NATO and EU relations at the Bureau for Conflict Stabilization Operations. At State he founded and managed the International Stabilization and Peacebuilding Initiative (ISPI), which has over 20 government and international organization partners. Dr. Stacey has just joined forces to blog at the Duck of Minerva foreign policy blog. He is the author of "Integrating Europe" by Oxford University Press and is currently working on a follow-up book about how the West should deal with the rise of China. He has been a guest blogger at The Washington Note and Democracy Arsenal, a professor of U.S. foreign policy at Tulane University and Fordham University, a consultant at the Open Society Institute and the U.S. Institute of Peace, and a visiting scholar at George Washington, Georgetown, and the University of California. He received his PhD from Columbia University. , 3-23-14) 24 The U.S. and Europe are going to need to up their game to keep Vladimir Putin’s hands off the rest of Ukraine. Beyond this crisis the West needs a new defense posture, as The U.S. and Russia are not engaged in a new Cold War, but Russia is clearly playing the geopolitical menace du jour. the world just entered a new era of international relations. Just weeks ago numerous observers dubbed the opening of the Winter Olympics in Sochi “Putin’s Triumph,” when it was anything but that. Russia may have barely edged the U.S. in total medals, but the price for Putin’s orderly Olympics was serious repression, severe environmental damage, and seismic corruption. Then But contrary to conventional wisdom, his abject territorial grab of Crimea has less to do with any grand plan on his part—and more to do with western miscalculation and the momentum of reactive decision-making by a country led by officials with a stark inferiority complex. The catalyst for the current crisis came in two parts. First, Europe badly miscalculated by offering Ukraine membership came Ukraine. His reputation already tarnished, Putin seemingly wasted little time in setting off the biggest East-West crisis in decades. in the European Union (EU) and making ensuing moves that forced Putin’s hand by making him choose to keep Ukraine in Russia’s sphere of influence or not. Second, Putin did not decide to embark on his current course until the day after former President Yanukovich fled, specifically when the Ukrainian Parliament stripped him of his powers and scheduled new president elections. But the seeds of this crisis were sewn long before. Putin and his coterie have long been adding up sleights from the West: NATO expansion to Russia’s border, in particular the Kosovo War and the bombing of Serbia without UN Security Council approval, the same for the Iraq War, U.S. involvement in the Ukraine and Georgia revolutions, an intention to install radar stations in Poland and the Czech Republic, and NATO’s coming close to offering both Georgia and Ukraine membership. Russia is not “back” so much as acting out again in its own region of the world. Its 2008 invasion of Georgia, notably, came after the end of the Kosovo War when NATO and Russian troops raced to be the first to occupy a former Yugoslav Army base on the outskirts of Pristina. Russian Foreign Secretary Lavrov at the time flatly stated that the West was forcing Russian to go to war somewhere. After making good on that threat in Georgia, Russia kept Putin has gained Crimea, but he has cost Russia a great deal in both economic and reputational terms, made a mockery of future claims of any imperative for the West to gain approval of the UN Security Council for crisis interventions, and above all lost the rest of Ukraine. Or not? Will Putin seek further Ukrainian territory in the Russian-speaking east? Already Russian troops have seized a petroleum plant across the border in Ukraine proper and Russia placed thousands of troops just over Ukraine’s eastern border for the purposes of “exercises.” Moreover, Putin is displaying enormously risky behavior, for direct altercations could easily spiral into a prolonged battle that with reinforcements could rapidly lead to full-scale war. It is better to deter him from even trying. To do this the U.S. and Europe need to do more than place a small number of jet troops in two breakaway regions of the country that are now considered in international limbo. So after a period of virtual strategic irrelevance, Russia has achieved a Pyrrhic victory. fighters in Eastern Europe and kick Russia out of the G8. Putin views the West as feckless and is likely emboldened by the lack of a robust Western response thus far. Much more costly economic sanctions are necessary, plus stepped up aerial patrols, forward placement of additional ground capabilities, and staging a NATO ground exercise in Poland, in order to establish At present, in conventional deterrence terms, the U.S. and Europe are not credible in the eyes of Putin. The fact credible conventional deterrence. Now that there are indications that part of Moldova–on the other side of Ukraine–may also be in Russia’s sights, this has become an urgent task. that he views the West as feckless and unlikely to intervene indicates that deterrence is low. Western inaction in this case is more likely to lead to a massive Russian action, thus moderate action intended to augment deterrence is necessary to prevent this. The Western preference is to keep the rest of Ukraine intact but not to go to war to ensure this, thus it needs to focus on reestablishing deterrence but it has little time in which to do so. Directly arming Ukraine would likely backfire, but ground movements in exercise form in either Poland or Romania would constitute an appropriately measured but more forceful response. The Bush Administration’s error in not sanctioning Russia’s Georgia invasion is even more glaring in retrospect. Now by openly accusing President Obama of appeasement, the American political right has only reinforced Putin’s perception. Yet in the process it made an unintentional but crucial strategic point: other countries also need to be deterred from territorial takeovers, especially China. The aborted Syrian intervention already harmed Western deterrence, and a meager response to the annexation of Crimea could easily lead to a Chinese occupation of the islands it claims from Japan. The Russia-Ukraine case may not be identical to the China-Japan case, but wouldbe border changers are buoyed by Putin’s getting away with Crimea fairly cost free. Japan is more powerful than Ukraine, but until very recently has been averse to using force and has little experience doing so. Thus, if China does not view the U.S. as credible in conventional deterrence terms, it may be emboldened to occupy the disputed islands despite the US-Japan defense treaty. The lack of action in the Syria and Ukraine cases has degraded this deterrence; it now needs to be reestablished. The fallacy of those advocating a buildup in Asia and drawdown in Europe is now clear. The U.S. commitment to its alliances in both the Asian and European spheres must be sufficient to achieve its simultaneous security interests. But with economic austerity and a decreased defense budget, the U.S. cannot build back up in Europe AND pivot fully to Asia. As a consequence the U.S. needs to rely on partners to a greater extent than in the past. In addition to NATO, the most capable and like-minded bilateral partners are France, the UK, and Germany. Despite reduced defense budgets, they have made their military forces more capable and shown an increased willingness to act even when the U.S. is reluctant to lead. This new “lead nation” model calls for rotating which country spearheads a particular crisis intervention, with the others playing support roles by providing smaller scale but vital assistance. On-the-fly uses of this yet to be fully developed model were on display in the interventions in Libya and Mali, as well as the near intervention in Syria. It is time to put this model fully in place, including in the Pacific theater by partnering with Australia and an increasingly activist Japan under Prime Minister Abe. Meanwhile, this crisis is NATO’s to handle. If the Post-war era after World War II gave way to the Post-Cold War era, that in turn gave way to the Post 9-11 era which has been with us for just over a decade. The new era–call it for now the Era of Incessant Conflict–may not be welcome, but with the Middle East in pieces and the forceful posturing of Russia and China we are going to have to get used to it and make the necessary adjustments. It no doubt is too early to deem this a completely new era of world politics, but there nonetheless is something distinctive about this emerging period of international lawlessness. In the past several years, since the advent of the Arab Awakening or perhaps back to the 2008 Russia-Georgia war, there has been a clear shift–not a sizable power shift, but certainly a notable shift in the ability of the West to influence the behavior of states who are not like-minded. This rise of regional powers, an increased penchant for meddling across borders, and large-scale instability in the Mideast and elsewhere together herald a new period in which western powers rapidly need to recalibrate their capabilities and how they will wield the less effective tools of foreign policy in their hands. Wielding them in concert will increase their utility and effectiveness. But western leaders cannot afford to be led by their increasingly isolationist publics; it is time for them to educate their people about this emerging era, and get on with leading. D.US-Russian war causes extinction PressTV, 13 [Press TV, citing nuclear scientist Ira Helfand, “US-Russia nuclear war to end human race: Study”, http://www.presstv.com/detail/2013/12/10/339285/usrussia-nuclear-war-to-extinct-humanrace/, 12-10-2013, Evan] 25 "With a large war between the United States and Russia, we are talking about the possible -- not certain, but possible -- extinction of the human race,” Helfand, the co-president of International Physicians for the Prevention of Nuclear War, said in a report released on Tuesday. "In this kind of war, biologically there are going to be people surviving somewhere on the planet but the chaos that would result from this will dwarf anything we've ever seen," he added. There are currently more than 17,000 nuclear warheads which have been ignored since the Cold War ended in 1991, according to the study called “Nuclear Famine: Two Billion People at Risk?" Helfand said modern nuclear weapons are far more powerful than the atomic bombs the US used against Japan in 1945 which killed more than 200,000 people. The scientist warned that even a limited nuclear war-- involving just less than 0.5 percent of the world's nuclear arsenal-- would put 2 billion lives at grave risk with more than 20 million people losing their lives within the first week of the explosions. The ecological consequences of a nuclear war would put the survival of the entire planet at risk, according to the study. The firestorms caused by such a war would send approximately 5 million tons of soot into the atmosphere, blocking out sunlight and dropping temperatures across the planet. Helfand painted a scenario where this climate hazard would cause “a nuclear famine” across the world. Hundreds of millions of people would face severe food shortages for years. 26 Adv 3- Safe Harbor A. EU are uncertain about Safe Harbor after NSA revelations Privacy Tracker 13 Privacy Tracker | Aug 2, 2013 US-EU Safe Harbor Under Pressure https://privacyassociation.org/news/a/us-eu-safe-harbor-under-pressure/ TH The European Union (EU) approved the U.S.-EU Safe-Harbor Agreement in 2000. Since that time, Safe Harbor has allowed companies to transfer personal data from the EU to the United States without violating EU data protection laws. EU data protection laws permit transfers of personal data to countries deemed to lack adequate protections for personal data only when those transfers are governed by certain legal mechanisms. One of those mechanisms is Safe Harbor, which was negotiated, with stakeholder input, between EU and U.S. officials who recognized the need for cross-border data transfers despite the EU’s position that the United States does not provide adequate protection for the personal data of EU data subjects. Under Safe Harbor, U.S. organizations certify to the U.S. Department of Commerce that they provide certain protections for personal data. Those protections are designed to ensure that organizations meet EU data protection requirements. Safe Harbor certifications are enforced by the Federal Trade Commission or the Department of Transportation as appropriate. Over four thousand organizations are currently listed on the U.S.-EU Safe Harbor list. These organizations rely on Safe Harbor to authorize transfers of personal data from the EU to the U.S. Recent events, however, have created uncertainty for Safe Harbor and the organizations that depend on it. Early this year, EU parliamentarian Jan-Phillip Albrecht, who is charged with steering the European Commission’s proposed data protection reform package through the EU Parliament, released a report in which he recommended 350 amendments to the Commission’s proposal. Albrecht surprised many by recommending that the EU discontinue the Safe Harbor framework two years after enactment of the data protection reform. Further signs of EU discontent over Safe Harbor came to light after the announcement of the Transatlantic Trade and Investment Partnership (TTIP) negotiations. Those negotiations are aimed at establishing a free trade agreement between the U.S. and the EU. Because of the substantial contribution that data transfers make to international trade, senior U.S. officials wanted cross-border data transfers to be included in TTIP negotiations. The Coalition for Privacy and Free Trade, launched by Hogan Lovells in March of this year, stated in comments to the United States Trade Representative that TTIP offers a unique “opportunity to progress the interoperability of data privacy frameworks in a way that endures.” But not all stakeholders felt that TTIP was an appropriate forum for addressing cross-border data transfers. Germany’s data protection commissioner, for example, blogged that the United States data protection framework is lacking and that the Safe Harbor “cannot compensate for these deficits.” Recent attention to the National Security Agency’s (NSA’s) surveillance operations have made things even tougher for Safe Harbor. The European Parliament has called on the European Commission to conduct a full review of Safe Harbor. Parliament’s resolution notes that some companies involved in NSA’s PRISM surveillance program are certified under Safe Harbor. Parliament claims that PRISM surveillance may have involved a “serious violation” of EU data protection laws, and that the Commission may therefore be obliged to reverse or suspend Safe Harbor. Germany’s data protection commissioners wrote a letter asking German Chancellor Merkel to recommend that the EU suspend Safe Harbor. EU Vice President Viviane Reding announced the European Commission’s plan to conduct a full review of Safe Harbor by the end of this year. Reding, who drafted the Commission’s proposed data reform package, called PRISM a “wake-up call” and said that Safe Harbor “may not be so safe after all.” These claims come a little more than one year after Reding, in a joint release with then U.S. Commerce Secretary John Bryson, reaffirmed the EU’s commitment to Safe Harbor “as a tool to promote transatlantic trade and economic growth.” Criticisms of Safe Harbor and other mechanisms that allow data to be transferred from the EU to the United States have, in many instances, been blind to the nature of government surveillance in EU countries. As Hogan Lovells privacy lead Chris Wolf wrote in a recent Privacy Perspectives blog post, “[I]t is naïve to think that intelligence agencies in European countries do not utilize information collected from phone and Internet companies in their investigations.” And those countries often lack the judicial and legislative oversight protections incorporated into U.S. surveillance laws. Regardless of the relative strengths and weaknesses of the privacy protections in EU and U.S. surveillance laws, however, the outcry over U.S. government surveillance has apparently reenergized EU data protection reform efforts. That could spell trouble for Safe Harbor even though Safe Harbor facilitates substantial and valuable data transfers 27 that have been undisturbed by government access. Moreover, there have been no allegations that the FTC has failed to adequately address EU complaints of perceived Safe Harbor violations. Although the FTC does not publicize filed complaints, complainants may disclose their complaint and whether they have been resolved satisfactorily. In addition, there have been no allegations that the certification/dispute resolution bodies—operated by organizations such as TRUSTe and the BBB—are not working. In spite of Safe Harbor’s success at facilitating cross-border transfers, the mechanism does appear to be in danger. Organizations that have certified under Safe Harbor should closely monitor the EU’s legislative process and the TTIP for indications about Safe Harbor’s future. And they should give careful thought to contingency plans for handling the personal data of EU data subjects. B. Europe wants less U.S. power over Internet for trust improvements for collaboration. The plan is key to those improvements. Faiola, February 12, 2014 Anthony Faiola Washington Post Journalist Bureau chief — Berlin Wash Post “Europe wants less U.S. power over Internet” http://www.washingtonpost.com/world/europe-wants-less-us-power-over-internet/2014/02/12/7e231bde-9409-11e39e13-770265cf4962_story.html TH The European Union’s executive body called Wednesday for new steps to dilute America’s broad influence over the architecture of the Internet, exposing a growing transatlantic rift in the aftermath of revelations about U.S. spying in the region. In a communique presented in Brussels, the European Commission said it would seek a firm timetable to limit U.S. influence over institutions that control the nuts and bolts of the Internet and oversee tasks such as the assignment of .com and .org domain names used to access Web sites. The commission, which effectively acts as a cabinet government of the 28 member states of the E.U., additionally said it would seek other ways to “globalize” key decisions about the expansion of the Internet that are now largely concentrated in the United States. Those include the assignment of names and numbers used to direct Web traffic around the globe. Changes were needed, the commission said, because the world has lost confidence in U.S. stewardship of the Internet after the snooping programs revealed by former National Security Agency contractor Edward Snowden. “Recent revelations of large-scale surveillance have called into question the stewardship of the U.S. when it comes to Internet governance,” the commission said in a statement. The language used by the European Commission illustrates the continuing fallout of the Snowden revelations, which have deeply rattled millions of Europeans. Negative reactions have been particularly strong in Germany, where reports have emerged that U.S. intelligence eavesdropped on the phone calls of Chancellor Angela Merkel and former chancellor Gerhard Schröder. References to the Snowden scandal in the commission statement, however, were perhaps more consequential than the contents of the policy paper itself. The commission has previously stated its desire for more international oversight of Internet governance, and it did not offer any new concrete plans for change. C. Suspending Safe Harbor would result in cloud loss Zaske 1-27 In Germany, data watchdogs will meet this week to debate the future of the Safe Harbor agreement in the post-Snowden world. By Sara Zaske for The German View | January 27, 2015 -- 09:48 GMT (01:48 PST) | Topic: Security http://www.zdnet.com/article/germanys-privacyleaders-gather-to-discuss-suspending-us-safe-harbor/ TH On Wednesday, German data privacy commissioners will meet in Berlin for their annual conference. On the agenda will be discussions on one thing: whether the Safe Harbor agreement between the EU and the US should be scrapped. The meeting will allow the German regulators to voice their ongoing frustration over the lack of reform that followed the recent revelations that the US' surveillance agency, the NSA, was collecting German citizens' data. Safe Harbor is a critical agreement for US-based businesses - and particularly tech companies such as Google, Facebook, and Twitter - as it allows them to legally transfer commercial data from the European Union to the US if they agree to uphold EU citizens' rights over how the data is collected and handled. Even a short suspension of the agreement could mean serious disruption to those US companies' business. For many 28 German officials and politicians, the NSA's ongoing ability to access the data of European citizens held by US companies violates the privacy principles of the agreement - principles that companies can self-certify they uphold. "I, as well as several of my German colleagues, have serious doubts whether the US companies that have self-certified under the agreement can be considered to be in a safe harbor," Alexander Dix, Berlin's commissioner for data and information, told ZDNet. He called the NSA's data monitoring "aggressive" and "disproportionate". Following the NSA spying scandal, there have been many calls across Europe to suspend the Safe Harbor agreement - with some of the loudest calls coming from privacy-conscious Germany. Instead of suspending the agreement, however, in November 2013 the European Commission sent the US a list of 13 reforms it would like to see made to Safe Harbor. The US government has still not fully responded to the request, even though it promised to do so by last summer. The delay is weighing on many privacy regulators like Dix, who believes that if Safe Harbor doesn't provide adequate protection, alternative measures that do should be considered. It's unclear what the full impact of suspending Safe Harbor would be. Not being allowed to transfer data outside the EU would certainly cause major problems for companies like Twitter whose servers are all in the US. For companies that do have European servers, it would affect their back-office business, where local data may be transferred across the Atlantic for processing by algorithms, profiles, fraud detection, and other data services that are part of their day-to-day operations. It would also be fundamentally disruptive to cloud service providers that have datacenters in multiple countries and constantly move data among them. D. Two Impacts to cloud computing Barga, Gannon, and Reed 2011 (Roger Barga, Dennis Gannon, and Daniel Reed, They are Microsoft Researchers, “The Client and the Cloud, Democratizing Research Computing” http://www.computer.org/cms/ComputingNow/homepage/2011/0311/W_IC_ClientandCloud.pdf_) Whether we realize it or not, nearly all of us as consumers experience client plus cloud technology in our daily lives: when we share photos, shop online, download and use applications for mobile phones, or use a search engine. This seemingly invisible technology has changed how we live and work, empowering us with new kinds of information and services, new ways of communicating and collaborating, and unparalleled convenience. This technology has the same potential to transform research, but to date it has been relatively underexplored. Cloud computing allows computation to occur in remote datacenters instead of on a user’s own computer. With the power of the cloud, the easy-to-use tools that scientists and engineers use every day can become infinitely more powerful than they have in the past — accessing and manipulating more data and applying more complex calculations — while still being used in familiar ways. This ability to provide easy access at arbitrary scale has the power to democratize research by making computing power available for the vast majority of researchers using desktop computers today and by fostering collaborative research communities. Client plus cloud technology provides an opportunity to empower researchers in new ways, profoundly changing the nature of research and accelerating engineering and scientific discovery around the world. The Changing Nature of Research Virtually all research has become data-centric. Over the years, researchers in all disciplines have benefited from improved computer performance. Now, low-cost sensors and instruments are amassing petabytes of data from computer-assisted experiments, simulations and other sources. Scientists and engineers are capturing data at a scale previously unimaginable, and this necessitates a sea change in how they extract insight from all that data. Research itself is at an inflection point as a result of this explosive data growth, as well as the growing trend of interdisciplinary research. Scientists and academics are required to access and share large data sets and collaborate with other researchers in many disparate locations. For example, accurately understanding and predicting the long-term effects of a major environmental disaster such as an oil spill requires detailed analysis of ocean chemistry, biology and ecology, and the simulation of complex oceanographic and atmospheric models. Today, an expert in one of those areas often works in just that one discipline and only has access to information relevant to that specific area. But to truly address increasingly complex global issues such as climate change, genetics and personalized medicine, researchers will be expected to 29 develop ever-more-complex simulations and models. To do so, they will need to mine, search and analyze huge sets of data in near-real time and collaborate across disciplines like never before. It’s their ability to extract insight based upon statistics together with their ability to collaborate that will drive a transformative effect. Not only are researchers in many fields confronted by an overwhelming amount of data, they also have an insatiable demand for easy-to-use tools and computing support. One of the great challenges created by relatively inexpensive computing infrastructure over the past 15 years is that we’ve turned generations of researchers into systems administrators. Graduate students, post-doctorates and faculty spend months or years maintaining the computing systems they require to do their research. However, at even the best- funded research organizations, the majority of researchers do not have access to the computing resources they need. Scientists do not want to spend time building and managing computer infrastructure; they would prefer to focus on their science and leverage easy-to-use technology to advance discovery. Universities and research organizations try to supply the computational support needed, but often lack the necessary scale and funding to keep pace with the exponential explosion of demand. The cost to maintain and refresh this computing infrastructure is becoming a larger and larger burden, and the economics are rapidly becoming unsustainable.  The Client Plus Cloud: A Platform for the Democratization of Research Fortunately, the emergence of cloud computing coupled with powerful software on “clients,” such as a local desktop computer, offers a solution to this conundrum. Cloud computing can provide software applications and computing power to users as a service over the Internet via familiar tools. The offsite cloud is constantly managed and upgraded, providing the ability to deliver computational resources on demand — a “pay as you go” strategy with access to virtually unlimited computational capacity. The cost to use 10,000 processors for an hour is the same as using 10 processors for 1,000 hours, but will deliver radically faster analysis to the researcher. Organizations can buy just-in-time services to process data and exploit it, rather than on a perpetual refresh of infrastructure that not only increases the capital costs associated with the computing, but also the energy management and security issues, which are increasingly important constraints. Budgets can be invested in the research and in the acquisition of cloud services rather than in the distributed maintenance of infrastructure, allowing researchers to focus on unsolved questions and discovery, not on computing infrastructure. This will be a transformative shift for the majority of researchers who will be able to tap into the advanced computational power that has only been available to a small portion of the researcher community. Powerful cloud-based data analysis tools will seamlessly connect to and amplify the capabilities of desktop applications that researchers use today, such as extensive spreadsheets, visualization and simulation tools. Data stored in the cloud can be accessible to researchers in many locations from different disciplines who can then build communities around solving complex problems. In Europe, clouds will add a new dimension to the research infrastructure, facilitating the work of researchers using multiple cloud providers and becoming a seamless extension of the highly evolved computational grid. With cloud computing, virtually any researcher can use simple tools to get answers to complex data- intensive questions. For example, a scientist might use a spreadsheet tool to tap into a genomic analysis service running on 600 servers or use a simple script to do data mining across 10,000 fMRI images in minutes. A researcher could access data from remote instruments such as sensors in a rain forest and pull it down to the desktop for visualization and analysis. By extending the capabilities of powerful, easy-to-use PC, Web and mobile applications through on- demand cloud services, the capabilities of the entire research community will be broadened significantly, accelerating the pace of engineering and scientific discovery. The net effect will be the democratization of research capabilities that are now available only to the most elite scientists. i. Genome sequencing is key to solve Anti-Biotic Resistant diseases Koser et al 14 *ABR is anti-biotic resistant *WGS is whole genome sequencing 1 Department of Medicine, University of Cambridge, Cambridge, UK 2Clinical Microbiology and Public Health Laboratory, Public Health England, Cambridge, UK 3Cambridge University Hospitals National Health Service Foundation Trust, Cambridge, UK 4Wellcome Trust Sanger Institute, Wellcome Trust Genome Campus, Hinxton, UK (Claudio, “Whole-genome sequencing to control antimicrobial resistance,” Cell Press, 2014, Elsevier, Accessed April 8, 2015, http://ac.els-cdn.com/S0168952514001140/1-s2.0-S0168952514001140-main.pdf?_tid=b6aec3dc-def8-11e49b5b-00000aab0f6c&acdnat=1428612232_7e13b78f2121498282f37bd79b933b98)//AD WGS has become an essential tool for drug development by enabling the rapid identification of resistance mechanisms, particularly in the context of tuberculosis (TB), which remains a global public health emergency [15,16]. In 2005 the first published use of 454 pyrosequencing (the first second-generation WGS technology) was to identify the F0 subunit ofthe ATP synthase as the target of 30 which subsequently became the first representative of a novel class of anti-TB agents to be approved in 40 years [16,17]. This has enabled researchers to sequence this gene in phylogenetically diverse reference collections to ensure thatitis conserved across Mycobacterium canettii as well as the various lineages and species that comprise the Mycobacterium tuberculosis complex (MTBC), the causative agents ofTB[18]. This represents an important step because drug candidates are usually only tested against a small number of isolates during the early phases of drug development. Similarly, only a limited number of MTBC genotypes are sampled in clinical trials, depending on where these are conducted [19]. As a result, intrinsically resistant strains might be missed, ashas been the case forPA-824, ananti-TB agent in Phase III trials [19–21]. The early elucidation of resistance mechanisms using WGS also has implications for the design of clinical trials. If resistance mechanisms are discovered that only result in marginally increased minimal inhibitory concentrations (MICs) compared with the wild type MIC distributions, more frequent dosing or higher doses could be employed in clinical trials to overcome this level of resistance. Moreover, the discovery of cross-resistance between agents using WGS can influence the choice of antibiotics that are included in novel regimens. TB is always treated with multiple antibiotics to minimise the chance of treatment failure as a result of the emergence of resistance bedaquiline, during treatment [22]. Regimens that contain agents to which a single mutation confers cross-resistance should be avoided if these mutations arise frequently in vivo. WGS has recently highlighted that this may be the case with three Phase II trial regimens that contain bedaquiline and clofazimine because the mutational upregulation of an efflux pump confers cross- it is increasingly being used to distinguish exogenous reinfection from relapse of the primary infection, which is crucial in assessing the efficacy of the drug or regimens under investigation [24,25]. Traditional epidemiological tools do not always provide the necessary resolution for this purpose. This is due to the fact that they only interrogate minute parts of the genome {e.g., multilocus sequence typing (MLST) of Pseudomonas aeruginosa analyses only 0.18% of the genome [26]}. By contrast, WGS interrogates the complete (or near-complete) genetic repertoire of an organism. Therefore, the resolution of WGS is only limited by the rate of evolution of the pathogen and will become the gold standard for clinical trials of new antiTB agents and other infectious diseases associated with recurrent disease [27,28]. resistance to both drugs [23]. In addition to being a tool to design clinical trials, WGS has become an increasingly important tool during clinical trials. Specifically, Drug-resistant diseases cause extinction. Davies 8—Department of Microbiology and Immunology at the University of British Columbia (Julian, “Resistance redux: Infectious diseases, antibiotic resistance and the future of mankind”, EMBO Rep. Jul 2008; 9(Suppl 1): S18–S21, dml) For many years, antibiotic-resistant pathogens have been recognized as one of the main threats to human survival, as some experts predict a return to the pre-antibiotic era. So far, national efforts to exert strict control over the use of antibiotics have had limited success and it is not yet possible to achieve worldwide concerted action to reduce the growing threat of multi-resistant pathogens: there are too many parties involved. Furthermore, the problem has not yet really arrived on the radar screen of many physicians and clinicians, as antimicrobials still work most of the time—apart from the occasional news headline that yet another nasty superbug has emerged in the local hospital. Legislating the use of antibiotics for non-therapeutic applications and curtailing general public access to them is conceivable, but legislating the medical profession is an entirely different matter. In order to meet the growing problem of antibiotic resistance among pathogens, the discovery and development of new antibiotics and alternative treatments for infectious diseases, together with tools for rapid diagnosis that will ensure effective and appropriate use of existing antibiotics, are imperative. How the health services, pharmaceutical industry and academia respond in the coming years will determine the future of treating infectious diseases. This challenge is not to be underestimated: microbes are formidable adversaries and, despite our best efforts, continue to exact a toll on the ii. Key to warming adaptation Pope 10 [ Vicky Pope is the head of climate science advice at the Met Office Hadley Centre, “ How science will shape climate adaptation plans,” 16 September 2010, http://www.guardian.co.uk/environment/cifgreen/2010/sep/16/science-climate-change-adaptation] the demand for information on how climate change will affect our future outstrips the current capability of the science and climate models. My view is that as scientists, we can provide useful information, but we need to be clear about its limitations and strive to improve information for the future. We need to be clear about the uncertainties in our projections while still extracting useful Some would argue that 31 information for practical decision-making. I have been involved in developing climate models for the last 15 years and despite their limitations we are now able to assess the probability of different outcomes for the first time. That means we can quantify the risk of these outcomes happening. These projections – the UK climate projections published in 2009 - are already forming the backbone of adaptation decisions being made in the UK for 50 to 100 years ahead. A project commissioned by the Environment Agency to investigate the impact of climate change on the Thames estuary over the next 100 years concluded that current government predictions for sea level rise are realistic. A major outcome from the scientific analysis was that the worst-case scenarios for high water levels can be significantly reduced - from 4.2m to 2.7m – because we are able to rule out the more extreme sea level rise. As a result, massive investment in a tide-excluding estuary barrage is unlikely to be needed this century. This will be reviewed as more information becomes available, taking a flexible approach to adaptation. The energy industry, working with the Met Office, looked at the likely impact of climate change on its infrastructure. The project found that very few changes in design standards are required, although it did highlight a number of issues. For instance, transformers could suffer higher failure rates and efficiency of some types of thermal power station could be markedly reduced because of increasing temperatures. A particular concern highlighted by this report and reiterated in today's report from the Climate Change Committee - the independent body that advises government on its climate targets - is that little is known about how winds will change in the future - important because of the increasing role of wind power in the UK energy Demand for climate information is increasing, particularly relating to changes in the short to medium term . More still needs to be done to refine the climate projections and make them more usable and accessible. This is especially true if we are to provide reliable projections for the next 10 to 30 years. The necessary science and modelling tools are being developed, and the first tentative results are being produced. We need particularly to look at how we communicate complex and often conflicting results. In order to explain mix. Fortunately many people, from private industry to government, recognise the value of even incomplete information to help make decisions about the future. complex science to a lay audience, scientists and journalists are prone to progressively downplay the complexity. Conversely, in striving to adopt a more scientific approach and include the full range of uncertainty, we often give sceptics an easy route to undermine the science. All too often uncertainty in science offers a convenient excuse for delaying important decisions. However, in the case of climate change there is overwhelming evidence that the climate is changing — in part due to human activities — and that changes will accelerate if emissions continue unabated. Scientists now need to press on in developing the emerging tools that will be used to underpin sensible adaptation decisions which will determine our future. In examining the uncertainty in the science we must take care to not throw away what we do know. Science has established that climate is changing. Warming is inevitable–only adaptation can prevent extinction Romero 8 [Purple, reporter for ABS-CBN news, 05/17/2008, Climate change and human extinction--are you ready to be fossilized? http://www.abs-cbnnews.com/nation/05/16/08/climate-change-and-humanextinction-are-you-ready-be-fossilized Climate change killed the dinosaurs. Will it kill us as well? Will we let it destroy the human race? This was the grim, depressing message that hung in the background of the Climate Change Forum hosted on Friday by the Philippine National Red Cross at the Manila Hotel. "Not one dinosaur is alive today. Maybe someday it will be our fossils that another race will dig up in the future, " said Roger Bracke of the International Federation of Red Cross and Red Crescent Societies, underscoring his point that no less than extinction is faced by the human race, unless we are able to address global warming and climate change in this generation. Bracke, however, countered the pessimistic mood of the day by saying that the human race still has an opportunity to save itself. This more hopeful view was also presented by the four other speakers in the forum. Bracke pointed out that all peoples of the world must be involved in two types of response to the threat of climate change: mitigation and adaptation. "Prevention" is no longer possible , according to Bracke and the other experts at the forum, since climate change is already happening. Last chance The forum's speakers all noted the increasing number and intensity of devastating typhoons--most recently cyclone Nargis in Myanmar, which killed more than 100,000 people--as evidence that the world's climatic and weather conditions are turning deadly because of climate change. They also reminded the audience that deadly typhoons have also hit the Philippines recently, particularly Milenyo and Reming, which left hundreds of thousands of Filipino families homeless. World Wildlife Fund Climate and Energy Program head Naderev Saño this generation the last chance for the human race" to do something and ensure that humanity stays alive in this planet. According to Saño, while most members of our generation will be dead by the time the worst effects of climate change are felt, our children will be the ones to suffer. said that " How will Filipinos survive climate change? Well, first of all, they have to be made aware that climate change is a problem that threatens their lives. The easiest way to do this – as former Consultant for the Secretariats of the UN Convention on Climate Change Dr. Pak Sum Low told abs-cbnews.com/Newsbreak – is to particularize the disasters that it could cause. Talking in the language of destruction, Pak and other experts paint this portrait of a Philippines hit by climate change: increased typhoons in Visayas, drought in Mindanao, destroyed agricultural areas in Pampanga, and higher incidence rates of dengue and malaria. Sañom said that as polar ice caps melt due to global warming, sea levels will rise, endangering coastal and low-lying areas like Manila. He said Manila Bay would experience a sea level increase of 72 meters over 20 years. This means that from Pampanga to Nueva Ecija, farms and fishponds would be in danger of being would be inundated in saltwater. Sañom added that Albay, which has been marked as a vulnerable area to typhoons, would be the top province at risk. Sañom also pointed out that extreme weather conditions arising from climate change, including typhoons and severe droughts, would have social, economic and political consequences: Ruined farmlands and fishponds would hamper crop growth and reduce food sources, typhoons would displace people, cause diseases, and limit actions in education and employment. Thus, Saño said, while environmental protection should remain at the top of the agenda in fighting climate change, solutions to the phenomenon "must also be economic, social, moral and political." Mitigation Joyceline Goco, Climate Change Coordinator of the Environment Management Bureau of the Department of Environment and Natural Resources, focused her lecture on the programs Philippine government is implementing in order to mitigate the effects of climate change. Goco said that the Philippines is already a signatory to global agreements calling for a reduction in the "greenhouse gasses"-mostly carbon dioxide, chloroflourocarbons and methane--that are responsible for trapping heat inside the planet and raising global temperatures. Goco said the DENR, which is tasked to oversee and activate the Clean Development Mechanism, has registered projects which would reduce methane and carbon dioxide. These projects include landfill and electricity generation initiatives. She also said that the government is also looking at alternative fuel sources in order do reduce the country's dependence on the burning of fossil fuels--oil--which are known culprits behind global warming. Bracke however said that mitigation is not enough. "The ongoing debate about mitigation of climate change effects is highly technical. It involves making fundamental changes in the policies of governments, making costly changes in how industry operates. All of this takes time and, frankly, we're not even sure if such mitigation efforts will be successful. In A few nations and communities have already begun adapting their lifestyles to cope with the effects of climate change. In Bangladesh, farmers have switched to raising ducks instead of chickens because the latter easily succumb to weather disturbances and immediate effects, such as floods. In Norway, houses with the meantime, while the debate goes on, the effects of climate change are already happening to us." Adaptation 32 elevated foundations have been constructed to decrease displacement due to typhoons. In the Philippines main body for fighting climate change, the Presidential Task Force on Climate Change, (PTFCC) headed by Department on Energy Sec. Angelo Reyes, has identified emission reduction measures and has looked into what fuel mix could be both environment and economic friendly. The Department of Health has started work with the World Health Organization in strengthening its surveillance mechanisms for health services. , bringing information hatched from PTFCC’s studies down to and crafting an action plan for adaptation with the communities in the remains a challenge. Bracke said that the Red Cross is already at the forefront of efforts to prepare for disasters related to climate change. He pointed out that However barangay level since the Red Cross was founded in 1919, it has already been helping people beset by natural disasters. "The problems resulting from climate change are not new to the Red Cross. The Red Cross has been facing those challenges for a long time. However, the frequency and magnitude of those problems are unprecedented. This is why the Red Cross can no longer face these problems alone," he said. Using a medieval analogy, Bracke said that the Red Cross can no longer be a "knight in shining armor rescuing a damsel in distress" whenever disaster strikes. He said that disaster preparedness in the face of climate change has to involve people at the grassroots level. "The role of the Red Cross in the era of climate change will be less as a direct actor and increase as a trainor and guide to other partners who will help us adapt to climate change and respond to disasters," said Bracke. PNRC chairman and Senator Richard Gordon gave a picture of how the PNRC plans to take climate change response to the grassroots level, through its project, dubbed "Red Cross 143". Gordon explained how Red Cross 143 will train forty-four volunteers from each community at a barangay level. These volunteers will have training in leading communities in disaster response. Red Cross 143 volunteers will rely on information technology like cellular phones to alert the PNRC about disasters in their localities, mobilize people for evacuation, and lead efforts to get health care, emergency supplies, rescue efforts, etc. 33 2AC Extensions 34 Inherency XO 12333 violates the 4th Amendment and it is a threat to U.S Democracy John Napier Tye July 20, 2014 The Washington Post Sunday Every Edition How a Reagan order set the NSA loose OUTLOOK; Pg. B01 TH In March I received a call from the White House counsel's office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact that the disclosure of National Security Agency surveillance prac-tices would have on U.S. Internet freedom policies. The draft stated that "if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process." But the White House counsel's office told me that no, that wasn't true. I was instructed to amend the line, making a gen-eral reference to "our laws and policies," rather than Even after all the reforms President Obama has announced, some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens' data by the NSA has focused largely on Section 215 of the Pa-triot Act, through which the government obtains court orders to compel American telecommunications companies to turn over phone data. But Section 215 is a small part of the picture and does not include the universe of collection and storage of communications by U.S. persons authorized under Executive Order 12333. From 2011 until April of this year, I worked on global Internet freedom policy as a civil servant at the State our intelligence practices. I did. Department. In that capacity, I was cleared to receive top-secret and "sensitive compartmented" information. Based in part on classi-fied facts I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Bulk data collection that occurs inside the United States contains built-in protections for U.S. persons, defined as U.S. citizens, permanent residents and companies. Such collection must be authorized by statute and is subject to oversight from Congress and the Foreign Intelligence Surveillance Court. The statutes set a high bar for that I am prohibited by law from publishing, collecting the content of communications by U.S. persons. For example, Section 215 permits the bulk collection only of U.S. telephone metadata - lists of incoming and outgoing phone numbers - but not audio of the calls. Executive Order 12333 contains no such protections for U.S. persons if the collection occurs outside U.S. borders. Issued by President Ronald Reagan in 1981 to authorize foreign intelligence investigations, 12333 is not a statute and has never been subject to meaningful oversight from Congress or any court. Sen. Dianne Feinstein (D-Calif.), chairman of the Senate Select Committee on Intelligence, has said that the committee has not been able to "sufficiently" oversee activities conducted under 12333. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. Such persons cannot be if the con-tents of a U.S. person's communications are "incidentally" collected (an NSA term of art) in the course of a lawful over-seas foreign intelligence investigation, then Section 2.3(c) of the executive order explicitly authorizes their retention. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of com-munications by individually targeted under 12333 without a court order. However, U.S. persons that may be collected and retained. "Incidental" collection may sound insignificant, but it is a legal loophole that can be stretched very wide. Remember that the NSA is building a data center in Utah five times the size of the U.S. Capitol building, with its own power plant that will reportedly burn $40 million a year in electricity. "Incidental collection" might need its own power plant. A legal regime in which U.S. citizens' data receives different levels of privacy and oversight, depending on whether it is collected inside or outside U.S. borders, may have made sense when most communications by U.S. persons stayed in-side the United States. But today, U.S. communications increasingly travel across U.S. borders - or are stored beyond them. For example, the Google and Yahoo e-mail systems rely on networks of "mirror" servers located throughout the world. An e-mail from New York to New Jersey is likely to wind up on servers in Brazil, Japan and Britain. The same is true for most purely domestic communications. Executive Order 12333 contains nothing to prevent the NSA from collecting and storing all such communications - content as well as metadata - provided that such collection occurs outside the United States in the course of a lawful foreign intelligence investigation. No warrant or court approval is required, and such collection never 35 need be reported to Congress. None of the reforms that Obama announced earlier this year will affect such collection. Without any legal barriers to such collection, U.S. persons must increasingly rely on the affected companies to imple-ment security measures to keep their communications private. The executive order does not require the NSA to notify or obtain consent of a company before collecting its users' data. The attorney general, rather than a court, must approve "minimization procedures" for handling the data of U.S. persons that is collected under 12333, to protect their rights. I do not know the details of those procedures. But the director of national intelligence recently declassified a document (United States Signals Intelligence Directive 18) showing that U.S. agencies may retain such data for five years. Before I left the State Department, I filed a complaint with the department's the current system of collection and storage of communications by U.S. persons under Executive Order 12333 violates the Fourth Amendment, which prohibits unreasonable searches and seizures. I inspector general, arguing that have also brought my complaint to the House and Senate intelligence committees and to the inspector general of the NSA. I am not the first person with knowledge of classified activities to publicly voice concerns about the collection and re-tention of communications by U.S. persons under 12333. The president's own Review Group on Intelligence and Com-munication Technologies, in Recommendation 12 of its public report, addressed the matter. But the review group coded its references in a way that masked the true nature of the problem. At first glance, Recommendation 12 appears to concern Section 702 of the FISA Amendments Act, which authorizes collection inside the United States against foreign targets outside the United States. Although the recommendation does not explicitly mention Executive Order 12333, it does refer to "any other authority." A member of the review group confirmed to me that this reference was written deliberately to include Executive Order 12333. Recommendation 12 urges that all data of U.S. persons incidentally collected under such authorities be immediately purged unless it has foreign intelligence value or is necessary to prevent serious harm. The review group further rec-ommended that a U.S. person's incidentally collected data never be used in criminal proceedings against that person, and that the government refrain from searching communications by U.S. persons unless it obtains a warrant or unless such searching is necessary to prevent serious harm. The White House understood that Recommendation 12 was intended to apply to 12333. That understanding was con-veyed to me verbally by several White House staffers, and was confirmed in an unclassified White House document that I saw during my federal employment and that is now in the possession of several congressional committees. In that document, the White House stated that adoption of Recommendation 12 would require "significant changes" to current practice under Executive Order 12333 and indicated that it had no plans to make such changes. All of this calls into question some recent administration statements. Gen. Keith Alexander, a former NSA director, has said publicly that for years the NSA maintained a U.S. person e-mail metadata program similar to the Section 215 tele-phone metadata program. And he has maintained that the e-mail program was terminated in 2011 because "we thought we could better protect civil liberties and privacy by doing away with it." Note, however, that Alexander never said that the NSA stopped collecting such data - merely that the agency was no longer using the Patriot Act to do so. I suggest that Americans dig deeper. Consider the possibility that Section 215 collection does not represent the outer limits of collection on U.S. persons but rather is a mechanism to backfill that portion of U.S. person data that cannot be collected overseas under 12333. Proposals for replacing Section 215 collection are currently being debated in Congress. We need a similar debate about Executive Order 12333. The order as used today threatens our democracy. There is no good reason that U.S. citizens should receive weaker privacy and oversight protections simply because their communications are collected outside, not inside, our borders. I have never made any unauthorized disclosures of classified information, nor would I ever do so. I fully support keep-ing secret the targets, sources and methods of U.S. intelligence as crucial elements of national security. I was never a disgruntled federal employee; I loved my job at the State Department. I left voluntarily and on good terms to take a job outside of government. A draft of this article was reviewed and cleared by the State Department and the NSA to ensure that it contained no classified material. When I started at the I don't believe that there is any valid interpretation of the Fourth Amendment that could permit the government to collect and store a large portion of U.S. citizens' online communications, without any court or congressional oversight, and without any suspicion of State Department, I took an oath to protect the Constitution of the United States. wrongdoing. Such a legal regime risks abuse in the long run, regardless of whether one trusts the individu-als in office at a particular moment. I am coming forward because I think Americans deserve an honest answer to the simple question: What kind of data is the NSA collecting on millions, or hundreds of millions, of Americans? NSA taps Yahoo, Google and other tech companies to gain access to Americans’ data Barton Gellman; Ashkan Soltani 2013 The Washington Post October 31, Thursday Suburban Edition SECTION: A-SECTION; Pg. A01 TH The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials. By tapping those links, the agency has positioned itself to collect at will from hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot. According to a top-secret accounting dated Jan. 9, 2013, the NSA's acquisitions directorate 36 sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency's headquarters at Fort Meade, Md. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records - including "metadata," which would indicate who sent or received e-mails and when, as well as content such as text, audio and video. The NSA's principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency's British counterpart, the Government Communications Headquarters . From undisclosed interception points, the NSA and the GCHQ are copying entire data flows across fiber-optic cables that carry information among the data cen-ters of the Silicon Valley giants. The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door ac-cess to Google and Yahoo user accounts through a court-approved process. The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American com-panies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies. In a statement, the NSA said it is "focused on discovering and developing intelligence about valid foreign intelligence targets only." "NSA applies Attorney General-approved processes to protect the privacy of U.S. persons - minimizing the likelihood of their information in our targeting, collection, processing, exploitation, retention, and dissemination," it said. In a statement, Google's chief legal officer, David Drummond, said the company has "long been concerned about the possibility of this kind of snooping" and has not provided the government with access to its systems. "We are outraged at the lengths to which the government seems to have gone to intercept data from our private fiber networks, and it underscores the need for urgent reform," he said. A Yahoo spokeswoman said, "We have strict controls in place to protect the security of our data centers, and we have not given access to our data centers to the NSA or to any other government agency." Under PRISM, the NSA gathers huge volumes of online communications records by legally compelling U.S. technolo-gy companies, including Yahoo and Google, to turn over any data that match court-approved search terms. That pro-gram, which was first disclosed by The Washington Post and the Guardian newspaper in Britain, is authorized under Section 702 of the FISA Amendments Act and overseen by the Foreign Intelligence Surveillance Court (FISC). Intercepting communications overseas has clear advantages for the NSA, with looser restrictions and less oversight. NSA documents about the effort refer directly to "full take," "bulk access" and "high volume" operations on Yahoo and Google networks. Such large-scale collection of Internet content would be illegal in the United States, but the operations take place overseas, where the NSA is allowed to presume that anyone using a foreign data link is a foreigner. Outside U.S. territory, statutory restrictions on surveillance seldom apply and the FISC has no jurisdiction. Senate Intel-ligence Committee Chairman Dianne Feinstein (D-Calif.) has acknowledged that Congress conducts little oversight of intelligence-gathering under the presidential authority of Executive Order 12333 , which defines the basic pow-ers and responsibilities of the intelligence agencies. John Schindler, a former NSA chief analyst and frequent defender who teaches at the Naval War College, said it is ob-vious why the agency would prefer to avoid restrictions where it can. "Look, NSA has platoons of lawyers, and their entire job is figuring out how to stay within the law and maximize col-lection by exploiting every loophole," he said. "It's fair to say the rules are less restrictive under Executive Order 12333 than they are under FISA," the Foreign Intelligence Surveillance Act. In a statement, the Office of the Director of National Intelligence denied that it was using executive authority to "get around the limitations" imposed by FISA. The operation to infiltrate data links exploits a fundamental weakness in systems architecture. To guard against data loss and system slowdowns, Google and Yahoo maintain fortresslike data centers across four continents and connect them with thousands of miles of fiber-optic cable. Data move seamlessly around these globe-spanning "cloud" networks, which represent billions of dollars of investment. For the data centers to operate effectively, they synchronize large volumes of information about account holders. Ya-hoo's internal network, for example, sometimes transmits entire e-mail archives - years of messages and attachments - from one data center to another. Tapping the Google and Yahoo clouds allows the NSA to intercept communications in real time and to take "a retro-spective look at target activity," according to one internal NSA document. To obtain free access to data- center traffic, the NSA had to circumvent gold-standard security measures. Google "goes to great lengths to protect the data and intellectual property in these centers," according to one of the company's blog posts, with tightly audited access controls, heat-sensitive cameras, round-the-clock guards and biometric verification of identities. Google and Yahoo also pay for premium data links, designed to be faster, more reliable and more secure. In recent years, both of them are said to have bought or leased thousands of miles of fiber-optic cables for their own exclusive use. They had reason to think, insiders said, that their private, internal networks were safe from prying eyes. In an NSA presentation slide on "Google Cloud Exploitation," however, a sketch shows where the "Public Internet" meets the internal "Google Cloud" where their data reside. In hand-printed 37 letters, the drawing notes that encryption is "added and removed here!" The artist adds a smiley face, a cheeky celebration of victory over Google security. Two engineers with close ties to Google exploded in profanity when they saw the drawing. "I hope you publish this," one of them said. For the MUSCULAR project, the GCHQ directs all intake into a "buffer" that can hold three to five days of traffic be-fore recycling storage space. From the buffer, custom-built NSA tools unpack and decode the special data formats that the two companies use inside their clouds. Then the data are sent through a series of filters to "select" information the NSA wants and "defeat" what it does not. PowerPoint slides about the Google cloud, for example, show that the NSA tries to filter out all data from the company's "Web crawler," which indexes Internet pages. According to the briefing documents, prepared by participants in the MUSCULAR project, collection from inside Ya-hoo and Google has produced important intelligence leads against hostile foreign governments that are specified in the documents. Last month, long before The Post approached Google to discuss the penetration of its cloud, Eric Grosse, vice president for security engineering, said the company is rushing to encrypt the links between its data centers. "It's an arms race," he said then. "We see these government agencies as among the most skilled players in this game." Yahoo has not announced plans to encrypt its data-center links. Because digital communications and cloud storage do not usually adhere to national boundaries, MUSCULAR and a previously disclosed NSA operation to collect Internet address books have amassed content and metadata on a previous-ly unknown scale from U.S. citizens and residents. Those operations have gone undebated in public or in Congress be-cause their existence was classified. The Google and Yahoo operations call attention to an asymmetry in U.S. surveillance law. Although Congress has lifted some restrictions on NSA domestic surveillance on grounds that purely foreign communications sometimes pass over U.S. switches and cables, it has not added restrictions overseas, where American communications or data stores now cross over foreign switches. "Thirty-five years ago, different countries had their own telecommunications infrastructure, so the division between foreign and domestic collection was clear," Sen. Ron Wyden (D-Ore.), a member of the intelligence panel, said in an interview. "Today there's a global communications infrastructure, so there's a greater risk of collecting on Americans when the NSA collects overseas." It is not clear how much data from Americans is collected and how much of that is retained. One weekly report on MUSCULAR says the British operators of the site allow the NSA to contribute 100,000 "selectors," or search terms. That is more than twice the number in use in the PRISM program, but even 100,000 cannot easily account for the mil-lions of records that are said to be sent to Fort Meade each day. In 2011, when the FISC learned that the NSA was using similar methods to collect and analyze data streams - on a much smaller scale - from cables on U.S. territory, Judge John D. Bates ruled that the program was illegal under FISA and inconsistent with the requirements of the Fourth Amendment. Recent Restrictions to 12333 aren’t doing enough Ellen Nakashima 14 The Washington Post December 18, 2014 Thursday Regional Edition Congress sets retention limits on data that U.S. collects abroad SECTION: A-SECTION; Pg. A06 TH A little-noticed provision in the Intelligence Authorization Act passed by Congress last week puts restrictions on spy agencies' ability to keep communications collected overseas, but critics say it does not go far enough to protect Ameri-cans' privacy. The measure marks the first time Congress, in the wake of revelations by former National Security Agency contractor Edward Snowden about widespread government surveillance, has tried to put some limits in an area of espionage gov-erned expressly by executive authority. Section 309 of the legislation, which is headed to President Obama's desk for his signature, specifies that communica-tions that are not gathered through a court order or subpoena shall not be held longer than five years, with some excep-tions. The provision applies to communications collected overseas without court oversight under Executive Order 12333, a Reagan-era directive that spells out surveillance authorities and responsibilities. The executive order covers collection activities that are "reasonably anticipated" to result in gathering of communications to or from a U.S. citizen or resident. Its supporters include Sen. Ron Wyden (D-Ore.) and outgoing Sen. Mark Udall (D-Colo.), intelligence committee members who were highly critical of certain NSA activities revealed by Snowden, such as the bulk collection of data on Americans' phone calls. "While this provision would not place meaningful new restrictions on the NSA, Wyden believes this provision sets a precedent for creating a legislative framework on Executive Order 12333 collection, where there currently is none," his spokesman Keith Chu said. Civil liberties advocates said the measure is a step in the right direction but contains numerous loopholes that put Amer-icans' privacy at risk. It fails to "fully address the underlying problem: The executive branch is collecting vast amounts of U.S. persons' in-formation . . . without congressional authorization 38 or appropriate judicial process," said Neema Guliani, legislative counsel with the American Civil Liberties Union. Under the provision, a spy agency may keep data longer than five years if, for instance, it is determined to be foreign intelligence or counterintelligence; is believed to constitute evidence of a crime; or if none of the parties to the commu-nication is an American or a U.S. resident. It also allows an agency to keep the data if the agency head decides it is nec-essary to protect national security and informs Congress in writing. Some lawmakers said that the rushed nature of the bill, passed by the Senate on Dec. 9 and the House the next day, offered no time for debate over a provision that they contend weakens privacy rights. "The manner in which this language was inserted late in the process, without real notice to most House Members, is indicative of the lengths that supporters of unwarranted surveillance will go to undercut the Fourth Amendment to the Constitution and is a disservice to Congress," Rep. Zoe Lofgren (D-Calif.) said in an e-mail. "If members had the oppor-tunity to adequately review this change in law, I sincerely doubt it would have passed." House members such as Lofgren said the provision places in statute an authority to collect communications that didn't exist before. A Senate Intelligence Committee spokesman said the measure provides no new authority for collection or retention. David Medine, chairman of the Privacy and Civil Liberties Oversight Board, an independent executive branch watch-dog, said that imposing retention limits on communications collected by intelligence agencies is "an important statement by Congress that it has the authority and is willing to step in and legislate in a realm that has largely been governed by the executive branch." He said his view does not necessarily represent those of the board members at large. The board is in the initial stage of an inquiry into activities conducted under Executive Order 12333. X0 12333 sets the guidelines for all NSA actions and it justifies the lack of oversight for their programs. Watkins 2013 (Ali Watkins, November 21, 2013, McClatchy Washington Bureau http://www.mcclatchydc.com/2013/11/21/209167/most-of-nsas-data-collection-authorized.html WASHINGTON — The National Security Agency’s collection of information on Americans’ cellphone and Internet usage reaches far beyond the two programs that have received public attention in recent months, to a presidential order that is older than the Internet itself. Approved by President Ronald Reagan in 1981, Executive Order 12333 (referred to as “twelve-triple-three”) still governs most of what the NSA does. It is a sweeping mandate that outlines the duties and foreign intelligence collection for the nation’s 17 intelligence agencies. It is not governed by Congress, and critics say it has little privacy protection and many loopholes. What changes have been made to it have come through guidelines set by the attorney general or other documents. The result is a web of intelligence law so complicated that it stymies even those tasked with interpreting it. As one former executive official said, “It’s complicated stuff.” Confusing though it may be, the order remains the primary authority under which the country’s intelligence agencies conduct the majority of their operations. Neither the office of Attorney General Eric Holder nor that of Director of National Intelligence James Clapper would comment about 12333. Under its provisions, agencies have the ability to function outside the confines of a warrant or court order, if approved by the attorney general. Its Section 2.5 effectively gives the attorney general the right to authorize intelligence agencies to operate outside the confines of judicial or congressional oversight, so long as it’s in pursuit of foreign intelligence – including collecting information of Americans. “The Attorney General hereby is delegated the power to approve the use for intelligence purposes, within the United States or against a United States person abroad, of any technique for which a warrant would be required,” 12333 reads. Monitoring the actual content of Americans’ communications still requires a warrant under 12333, but metadata – the hidden information about a communication that tells where a person is, who he’s communicating with, even the number of credit cards used in a transaction – can be swept up without congressional or court approval. The impact of 12333 is enormous – and largely unknown. Documents leaked by former NSA contractor Edward Snowden suggest that less than half of the metadata the NSA has collected has been acquired under provisions of the USA Patriot Act and the Foreign Intelligence Surveillance Act, the two laws that have received the most attention for permitting NSA programs. Gen. Keith Alexander, the NSA director, has ratified that impression, saying that the majority of NSA data is collected “solely pursuant to the authorities provided by Executive Order 12333.” At the time the order was written, the nation’s intelligence community was dealing with a shattered reputation after decades of widespread abuses. The 39 Church Committee – a special congressional panel tasked in the 1970s with investigating intelligence abuses – had revealed CIA efforts to cover up the Watergate scandal, the CIA’s opening of Americans’ mail, and the agency’s efforts to assassinate Cuba’s Fidel Castro. Executive Order 12333 was intended to bolster a reeling intelligence community and further define its authority to conduct foreign intelligence gathering. The global telecommunications network didn’t exist, and collecting foreign communications posed little risk for Americans’ data to be swept up in the dragnet. But in the three decades since 12333 was written, global communications have changed dramatically. The order, however, has not. “In 1996, when (12333) was 15 years old, we said, ‘Gee, this probably ought to be revised.’ Now we’re more than 15 years after that,” said John Bellinger, a former legal adviser to the National Security Council during the presidency of George W. Bush. Still, the order hasn’t undergone any major change, “in part, because it’s so difficult and complex to change it,” he said. The National Security Act of 1947 requires that Congress be kept “fully and currently informed” about “significant” intelligence activities. But 12333 activities receive little oversight. The problem, legal experts and lawmakers say, is that only the executive branch – and the intelligence agencies that are part of it – determines what “fully and currently informed” means and what details it needs to share with Congress. “There’s no clear definition,” said House Intelligence Committee member Adam Schiff, D-Calif., who recently sparred with fellow committee members over whether the NSA had briefed the panel on its monitoring of German Chancellor Angela Merkel’s cellphone. “We need to have a bigger discussion of what our mutual understanding is of what we want to be informed of.” Schiff isn’t alone in raising questions about how well informed Congress is kept of activities undertaken under 12333 authorities. Sen. Dianne Feinstein, D-Calif., who chairs the Senate Intelligence Committee, has called for a broad review of what’s taking place under 12333, noting that the order authorizes phone and email metadata collection beyond what the Foreign Intelligence Surveillance Act does. Feinstein has consistently defended the NSA’s collection of domestic cellphone metadata, saying the program under which it is doing so is overseen by both the courts and Congress. But even she has said the 12333 programs skirt similar protections. “The other programs do not (have the same oversight as FISA). And that’s what we need to take a look at,” she said, adding that her committee has not been able to “sufficiently” oversee the programs run under the executive order. “Twelve-triple-three programs are under the executive branch entirely.” Feinstein has also said the order has few, if any, privacy protections. “I don’t think privacy protections are built into it,” she said. “It’s an executive policy. The executive controls intelligence in the country.” Intelligence officials have said that each respective agency’s 12333 collection is governed by supplemental guidelines written by the attorney general and that those guidelines protect Americans’ data. But intelligence officials have admitted that most of those guidelines have not been revisited in decades and that they don’t offer the same protections as the metadata collection programs authorized under the Patriot Act and the Foreign Intelligence Surveillance Act. A glimpse of those classified guidelines emerged at a hearing convened earlier this month of the Privacy and Civil Liberties Oversight Board, which Congress created in 2004 to oversee the government’s expanded intelligence collection operations, but that until that meeting had never held a substantive hearing. Pressing a panel of intelligence community lawyers, board members asked what evidence is required before U.S. intelligence agents are allowed to sift through metadata collected under 12333. They learned that virtually none is required. Jim Dempsey, a member of the board who is the vice president for public policy at the Center for Democracy and Technology, a Washington-based organization encouraging free and open Internet, asked whether it was right that 12333 records can be searched without establishing a “reasonable, articulable suspicion,” the standard needed for searching records collected under the Patriot Act or FISA. The NSA’s deputy general counsel, Rajesh De, acknowledged that that standard might not apply. “I think, yeah,” he said. But he declined to say what rules might apply, referring by using jargon. “I don’t know if we’ve declassified sort of minimization procedures,” he said. “But there are different rules that apply.” Even those rules – whatever they are – can be broken, both intentionally and unintentionally. When they are, there is no requirement that the violation be reported outside the executive branch. According to an internal memo leaked by Snowden and published in August, the NSA saw more than 2,000 compliance violations with its 12333 programs in the span of a year, from March 2011 to March 2012. For comparison, the agency tracked just over 700 violations in the same period in the telephone and Internet metadata collection programs that have received so much attention. The 12333 violations were not reported to the congressional intelligence committees. Intelligence community leaders have been loath to address 12333 issues when testifying before Congress. During a recent House Judiciary Committee hearing into metadata collections, Director of National Intelligence Clapper refused to answer when asked about specific violations. “The subject matter of the hearing was Section 215 and 702,” said Clapper, referring to sections of the Patriot Act and the Foreign Intelligence Surveillance Act, respectively. “And these violations . . . (occurred) under the auspices of Executive Order 12333.” Feinstein has said publicly that she thinks more attention needs to be paid to what takes place under 12333. A bill recently approved by the Senate Intelligence Committee would require increased congressional oversight of 12333, including more detailed reporting of what guidelines govern access to information collected under it and violations of those guidelines. 40 12333 provides a legal loophole to avoid the need for warrants to collect Americans’ data. Nakashima and Soltani 2014 ( Ellen Nakashima and Ashkan Soltani July 23, 2014, The Washington Post, Privacy watchdog’s next target: the least-known but biggest aspect of NSA surveillance. Ellen Nakashima is a national security reporter for The Washington Post. She focuses on issues relating to intelligence, technology and civil liberties.) An independent privacy watchdog agency announced Wednesday that it will turn its focus to the largest and most complex of U.S. electronic surveillance regimes: signals intelligence collection under Executive Order 12333. That highly technical name masks a constellation of complex surveillance activities carried out for foreign intelligence purposes by the National Security Agency under executive authority. But unlike two other major NSA collection programs that have been in the news lately, EO 12333 surveillance is conducted without court oversight and with comparatively little Congressional review. The Privacy and Civil Liberties Oversight Board, an independent executive branch agency, over the last year has taken in­depth looks at the other two NSA programs. It concluded the bulk collection of Americans’ phone call metadata under Section 215 of the Patriot Act was illegal and raised constitutional concerns. By contrast, it found the gathering of call and email content under Section 702 of the Foreign Intelligence Surveillance Act to be lawful, though certain elements pushed “close to the line” of being unconstitutional. Now the board is planning to delve into EO 12333 collection, among other topics. It is not clear, however, how deep or broad its examination will be. “It’s obviously a complex thing to look at 12333,” but "it's something we'll likely be delving into,” said a member of the Privacy and Civil Liberties Oversight Board who requested anonymity in order to speak freely. The board has highlighted 12333 issues in the past. For example, each agency is supposed to have guidelines to carry out the executive order, but some guidelines are three decades old. The board has encouraged the guidelines be updated, the source said. Collection outside the United States has attained new relevance given media reports in the last year about broad NSA surveillance based on documents leaked to journalists by former agency contractor Edward Snowden. “Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215,” said a former State Department official, John Napier Tye, in an oped published Sunday in The Washington Post. Issued in 1981 by President Ronald Reagan, EO 12333 laid out the roles and powers of the various intelligence agencies. It specified that the NSA had control of signals intelligence collection for foreign intelligence and counterintelligence purposes. But the nature and scope of the collection activities have not been clarified for the public. Unlike surveillance inside the United States or which targets U.S. citizens and legal residents, collection under 12333 does not require a warrant. Once upon a time, you could be fairly certain that overseas collection would pick up only foreigners’ phone calls, and that Americans’ communications would stay inside the United States. But today, emails, calls and other communications cross U.S. borders and are often stored beyond them. Companies like Google and Yahoo have “mirror” servers around the world that hold customers’ data. That means Americans’ data are often stored both in the United States and abroad simultaneously, subject to two different legal and oversight regimes. Surveillance on U.S. soil requires court permission and an individual warrant for each target. Surveillance abroad requires a warrant for U.S. persons, but if collection is coming from a data center overseas, large volumes of Americans’ communications may be picked up as “incidental” to collection on a foreign target. “So a lot of ordinary data crosses borders, including domestic communications between Americans,” said Edward W. Felten, a computer science professor at Princeton University. Or as former NSA Deputy Director John C. Inglis has said of the falling away of borders in cyberspace: “There is not an away game. There is not a home game. There is only one game.” With the merging of the home and away games, the question arises as to whether a legal regime that bases privacy protections and oversight largely on geography is sufficient, analysts say. The Post reported last fall, for example, that NSA was collecting 500,000 e­mail account “address books” a day outside the United States from companies such as Yahoo and Google. According to documents obtained from Snowden, the agency was collecting the data through secret arrangements with foreign telecommunications companies or allied intelligence services in control of facilities that direct traffic along the Internet’s main data routes. Although the collection takes place overseas, two senior U.S. intelligence officials acknowledged that it “incidentally” sweeps in the contacts of many Americans, the article said. The Post also reported 41 that the agency in conjunction with Britain’s GCHQ, was collecting data traveling between Google and Yahoo data centers overseas. In Google’s case, that was up to 6 million records a day, according to a slide obtained from Snowden. The firms have since said they are encrypting the data moving between their data centers. EO 12333 collection is not available everywhere in the world, former U.S. officials said. It is not as precise as collection from a U.S. carrier in the United States, which can filter out unwanted communications. Under 12333, the agency is “collector and processor,” said one former U.S. official, who spoke on condition of anonymity to discuss a sensitive topic. “Things go by and you now have to figure out which things are of interest to you.” And those things are “incredibly fractured and packetized.” Tye said before he left the State Department, he filed a complaint collection through its “incidental collection” of Americans’ data, violated the Fourth Amendment’s bar on unreasonable searches and seizures. “Basically 12333 is a legal loophole,” said Tye, who is now legal director at Avaaz, a civil society group working on regional and national issues ranging from corruption and poverty to conflict and climate change. “It allows the NSA to collect all kinds of communications by Americans that the NSA would not be able to collect inside the borders” without a warrant. Inglis said Tye’s description of 12333 as a loophole is “simply wrong, in both fact and spirit.” Said Inglis: “There are with its inspector general, as well as the NSA inspector general, alleging that 12333 no ‘rules free’ zones at NSA and the responsibility to ensure the privacy rights of U.S. persons conveys across all facets of the signals intelligence cycle, from collection to dissemination.” Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society, said 12333 allows “bulk collection” of data or the ingestion of massive amounts of data without a filter for a target’s e­mail address or phone number, for instance. “Both collection and use are far less regulated” than collection inside the United States, she said. “We don't know how or how much information is collected, used, analyzed or shared.” At the same time, she said, “while 12333 greatly affects Americans and regular people from all over the world, the public and Congress are basically in the dark about what the NSA is doing.” NSA Spokeswoman Vanee Vines said that “whether NSA’s activities are conducted under EO 12333 or the Foreign Intelligence Surveillance Act [which governs domestic surveillance], NSA applies attorney general­approved processes to protect the privacy of U.S. persons in the collection, retention and use of foreign intelligence.” She added that President Obama issued additional guidance in January under Presidential Policy Directive 28, which provides that such activities “shall be as tailored as feasible.” The directive specified that “appropriate safeguards be applied to protect the personal information of all individuals, regardless of nationality.” A fundamental unresolved question is this: At what point should these privacy safeguards kick in? At the point the data are swept in by the intelligence agency or when they are plucked out for analysis and sharing with other agencies? Currently, they apply once the data are processed, former officials said. The privacy protections governing 12333 collection are in US Signals Intelligence Directive 18. That NSA policy document, for instance, states that communications to, from or about U.S. persons collected under the authority may be retained for five years, unless the NSA director determines a longer period is required. It also states that they may be kept for a “period sufficient” if they are reasonably believed to become relevant to a current or future foreign intelligence requirement. Or if the information provides evidence of a crime, in which case it may be shared with the relevasnt agency. Such qualifications, privacy advocates have said, amount to “loopholes” that enable the retention of large amounts of U.S. persons’ data. One thing is clear: examining overseas collection under 12333 “is a massive undertaking,” the board source said. But “it is something we have to look at.” 42 Solvency Modifying EO 12333 is a more durable solution than creating oversight committees or amendments to FISA Arnbak and Goldberg 15 Axel Arrnbak, Faculty Researcher at the Institute for Information Law, University of Amsterdam and a Research Affiliate at the Berkman Center for Internet & Society, Harvard University. Sharon Goldberg, Associate Professor of Computer Science, Boston University and a Research Fellow, Sloan Foundation. “LOOPHOLES FOR CIRCUMVENTING THE CONSTITUTION: UNRESTRAINED BULK SURVEILLANCE ON AMERICANS BY COLLECTING NETWORK TRAFFIC ABROAD,” University of Michigan Law School Michigan Telecommunications and Technology Law Review. 21: 317 Spring 2015. Aside from the differences discussed thus far, EO 12333 has a more fundamental difference from FISA: over the next years, all three branches of government could be involved with Patriot Act and FISA reform. For EO 12333, this is hardly the case. International surveillance regulated under EO 12333 is overseen first and foremost by the executive branch. n130 This simple observation has a long tradition in US Constitutional law that gives broad Article II authority to the President when it comes to protecting national security against overseas threats. n131 As Part II will highlight, however, today's technologies challenge the long-standing core concept in US surveillance law that operations conducted abroad will not affect Americans in large numbers. This tension between local law and global technology surfaces in a particularly striking manner with EO 12333, which regulates surveillance operations conducted abroad. This broad Article II constitutional authority can result in a lack of oversight, or checks and balances, between separate branches of government. Even if the Attorney General-approved procedures must be submitted to the US Senate Intelligence Committee, tasked to oversee US intelligence agencies, legal and practical constraints to oversight remain. n132 These constraints [*341] range from the executive branch constructing permanent emergency national security scenarios that obstruct oversight, to Congress being practically barred from oversight via classification to practical constraints that include being forbidden to take notes or bring assistants to briefings. The Committee Chair, Senator Dianne Feinstein, said that EO 12333 "programs are under the executive branch entirely," and have "few, if any, privacy protections." n133 The relative lack of authority for EO 12333 policies in the broader policy arena, beyond the executive branch, might explain why there are still so many redactions in place in USSID 18. In any event, considering the legal loopholes in EO 12333 and the technical means by which they can be exploited, n134 EO 12333 reform is urgent to protect Americans' privacy. Although the PCLOB announced in July 2014 that it will investigate EO 12333 policies, n135 the PCLOB reports directly to the President; technically, the investigation cannot be said to be fully independent because the executive branch controls the prospects of EO 12333 reform as investigated by the PCLOB. Finally, during its annual intelligence community budget negotiations in December, 2014, Congress introduced and approved a new legal provision, all within forty-eight hours. This provision could have deep implications for protections afforded to US persons during surveillance operations conducted abroad. Intelligence Authorization Bill 2014-15 § 309 n136mandates that the Attorney General set a five year retention limit on data collected abroad that involves US persons, thereby codifying similar provisions similar to USSID 18. n137 This provision was introduced shortly before the deadline of the budget negotiations, hardly debated, and approved within forty-eight hours [*342] by both the Senate and the House. n138The bill was then sent to the President, who signed the bill into law shortly thereafter. The wording of § 309 leaves many open questions of interpretation. It has become the subject of considerable controversy and debate amongst lawmakers, the media, and the public. For instance, it is unclear how § 309 relates to FISA§§703 and 704, which afford more robust protections to US persons when data is collected abroad. n139 One plausible explanation could be that the new provision legitimizes an already existing surveillance operation that collects huge amounts of US person data on foreign soil, without approval of the FISA Court.n140 This would be an intelligent move from a compliance perspective. By approving § 309, Congress might have created a statutory basis for further uses of data collected abroad, formerly based on USSID 18 minimization procedures merely approved by the Attorney General. With § 309, diminished legal protections to Americans under USSID 18 minimization procedures could have a chance to become statute, making the legitimacy of programs based on EO 12333 and USSID 18, like MUSCULAR, n141 no longer an issue if a court would find these now disclosed programs should have been based on FISA and reviewed by the FISA Court. The lack of comprehensive legislative debate on § 309 renders it impossible to come to robust conclusions on its implications. At this point, this is merely an issue for further research. But one can criticize the approval both in the House and the Senate of such critical surveillance policy introduced 48 hours before a budgetary deadline, without proper legislative debate to establish the actual meaning of a provision or to express the intent of the legislature. § 309 could go down as a historic moment in surveillance policy. It could entail a significant depression of legal protections afforded to US persons when data is collected abroad. It is also apparently the first time that Congress involved itself directly with data collection and retention usually regulated under EO 12333. Paradoxically, the effect of § 309 might be a legal precedent for more transparently deliberated, better informed and perhaps privacy protective approaches going forward. D. Summary 43 Surveillance programs under EO 12333 might collect startling amounts of sensitive data on both foreigners and Americans. Agents acting under the [*343] authority of EO 12333 and USSID 18 may presume communications are non-American, precisely because their operations are conducted abroad. Such operations are regulated by guidelines adopted almost entirely within the executive branch, without any meaningful congressional or judicial involvement. Generous exemptions, more permissive than under FISA, enable use of information "incidentally" collected on US persons, and critical details remain classified. These concerns remain primarily within the purview of the executive branch. So far, the executive branch has not yet sufficiently addressed these concerns. The lack of checks and balances between three branches of government in this respect is likely exacerbating the situation. Oversight between branches of government and constitutional safeguards can be circumvented by designing surveillance operations in ways that lead to application of the EO 12333regime, instead of FISA. Consequently, regardless of the outcome of Patriot Act and FISA reform, EO 12333 will continue to provide opportunities for largely unrestrained surveillance on Americans from abroad. 44 12333 and 1st/4th Amendments Bill of rights key to democracy Edward White 14 [http://aclj.org/us-constitution/the-bill-of-rights-importance-limited-government Edward White is Senior Counsel with the ACLJ and has been practicing law for more than twenty years. He is a graduate of the University of Notre Dame Law School, where he was a Thomas J. White Center for Law & Government Scholar and managing and student articles editor of the Notre Dame Journal of Law, Ethics & Public Policy. He began his legal career by having the privilege to serve as a law clerk for three judges, gaining experience on a number of state and federal legal matters. White clerked for the Honorable G. Kendall Sharp of the United States District Court for the Middle District of Florida, the Honorable Bobby W. Gunther of the Florida District Court of Appeal for the Fourth District, and the Honorable Daniel A. Manion of the United States Court of Appeals for the Seventh Circuit. After his judicial clerkships, White worked as an associate in a products liability law firm. He then served for five years as an Assistant United States Attorney, handling federal civil and criminal cases at the trial and appellate court levels. Since 2000, White has been specializing in civil rights litigation, representing clients across the country primarily in the areas of free speech, religious freedom, sanctity of human life, and traditional family values. TH] The Bill of Rights illustrates that our Founders understood that for personal freedoms to be broad, the power of the federal government must be limited. Our nation, however, has moved away from its founding principles, especially during recent decades. Our ever-growing federal government is intervening into more and more aspects of our lives, especially through bureaucratic regulations, and is reducing our personal freedoms in the process. Government at all levels is doing more and more things that were once left to private individuals and groups, and the federal government is doing more and more things that were once the province of state and local governments, where greater accountability to the public is often possible. One need only look at the HHS mandate—forcing employers to violate their religious beliefs, under pain of penalty, by paying for and providing abortion pill insurance coverage—to see the harm caused by an overreaching government. The preservation of our liberties is a daily battle, something our Founders understood. The process of scaling back the size and role of government and returning limits to it is a long one. But, since the federal government is supposed to be our servant and not our master, no one should doubt the importance of this endeavor. 45 Courts rule 12333 unconstitutional Previous court rules prove that 12333 is unconstitutional. Bedoya 14 (Alvaro Bedoya, October 9, 2014 Alvaro Bedoya is Executive Director of the Georgetown Center on Privacy and Technology. From 2011 to August 2014, he was chief counsel to the Senate Judiciary Subcommittee on Privacy, Technology and the Law. [Executive Order 12333 and the Golden Number] http://justsecurity.org/16157/executive-order-12333-golden-number/) I recently moderated a debate between Professor Nathan Sales of Syracuse Law, Professor Laura Donohue of Georgetown Law, Bob Litt, general counsel of the Office of the Director of National Intelligence, and John Tye, the former head of the Internet Freedom section at the State Department who left government after filing whistleblower complaints alleging that the NSA’s collection practices abroad were unconstitutional. As a moderator, I had to be neutral. With the panel behind us, I am adding my voice to a growing chorus of people who are highly concerned with the NSA’s collection under Executive Order 12333, the Reagan-era authority that governs the NSA’s signals intelligence collection abroad. To date, the intelligence community has responded to criticisms of 12333 with two principal rebuttals: (1) We cannot target Americans’ electronic communications under these authorities, and (2) To the extent we inevitably collect Americans’ electronic communications through Executive Order 12333, those data are subject to strict minimization requirements. Since Tye’s op-ed, critics have countered that the use of the 12333 data (e.g. for law enforcement purposes) raises significant constitutional concerns. These arguments about the proper scope of minimization are important and valid, but they do not address the core of Tye’s complaint. As he told Ars Technica: “My complaint is not that [the NSA is] using [Executive Order 12333] to target Americans. My complaint is that the volume of incidental collection on US persons is unconstitutional.” Too few people are focusing on the simple question that Tye is challenging us to ask: How many Americans’ communications are caught up in 12333 collection in the first place? That number matters – a lot. It matters from a policy perspective: It may not make sense for Congress to allow a more lax set of collection and minimization standards for 12333 collection if those programs collect as much if not more Americans’ data than FISA collection. The number matters from a democratic perspective: Americans, and their elected officials, cannot reach an informed opinion of these programs if they don’t know how broadly they impact Americans. Most critically, that number matters for the Fourth Amendment. Americans’ Fourth Amendment rights don’t stop at the border. Even where the acquisition of foreign intelligence information abroad is found to fall within the foreign intelligence exception to the warrant requirement, that acquisition must still satisfy the Fourth Amendment’s reasonableness requirement. (See Laura Donohue’s forthcoming Harvard Journal of Law and Policy article on section 702 for an in-depth discussion of the application of the reasonableness requirement abroad.) If an “incidental” collection of an Americans’ data is too substantial, that collection may be rendered unreasonable by that fact alone. As Judge Bates wrote in his October 2011 opinion on section 702 collection: [T]he acquisition of non-target information is not necessarily reasonable under the Fourth Amendment simply because its collection is incidental to the purpose of the search or surveillance. […] There surely are circumstances in which incidental intrusions can be so substantial as to render a search or seizure unreasonable. Bates went on to clarify that an incidental collection of Americans’ data can be particularly problematic for Fourth Amendment purposes if the data are entirely unrelated to the targeted facility. “The distinction is significant and impacts the Fourth Amendment balancing,” he wrote. Based on this reasoning, Judge Bates found that the NSA’s October 2011 proposed targeting and minimization procedures were not consistent with the Fourth Amendment. Judge Bates did not reach this ruling because he discovered that the targeting procedures would result in the discovery of millions, or even hundreds of thousands of Americans’ communications. No, the offending acquisition collected “roughly two to ten thousand discrete wholly domestic communications […] as well as tens of thousands of other communications that are to or from a United States person or a person in the United States but that are neither to, from, nor about a targeted selector.” This bears repeating: Judge Bates found the 702 targeting procedures unconstitutional because they collected tens of thousands of U.S. person communications. We need to know approximately how many Americans’ communications are collected under 12333. That’s the golden number. But we don’t know it. Apparently, neither does the NSA. In a December 2013 Washington Post article on the use of 12333 to collect cellphone location records, the NSA demurred an attempt to estimate how many Americans were swept up in that program: “It’s awkward for us to try to provide any specific numbers,” one intelligence official said in a telephone interview. An NSA spokeswoman who took part in the call cut in to say the agency has no way to calculate such a figure. Yet in that same story, a “senior collection manager, speaking on the condition of anonymity but with permission from the NSA,” appears to have told the Post that “data are often collected from the tens of millions of Americans who travel abroad with their cellphones 46 every year.” In a separate Post story in October 2013 on the use of 12333 to collect address books globally, two U.S. senior intelligence officials told Bart Gellman and Ashkan Soltani that that program sweeps in the contacts of many Americans. “They declined to offer an estimate but did not dispute that the number is likely to be in the millions or tens of millions,” wrote Gellman and Soltani. Behind closed doors, the intelligence community seems to acknowledge a scale of 12333 collection on Americans that far outstrips the collection that Judge Bates found unconstitutional under section 702. In the recent Georgetown Law debate, I asked Bob Litt whether it was acceptable that the intelligence community did not know how many Americans’ communications were caught up in 12333 – since some scale of such collection would render 12333 collection unreasonable and violate the Fourth Amendment. He answered: We can’t give numbers but there is a data point you can use and that is that 702 collection by definition is going to be collection that’s passing through the United States. 12333 collection is not. One can assume that you’re more likely to collect a U.S. person communication under 702 than under 12333 as a result of that. And the courts have found that 702 collection is reasonable in this regard. So while you may not have the exact number, you can extrapolate from that and it suggests that the 12333 collection would be reasonable as well. There are significant gaps in this reasoning. First, while electronic surveillance under 12333 cannot be conducted within the U.S., 12333 has been used to collect bulk records from American companies, many of which store or “mirror” purely domestic communications on international servers. More importantly, Litt’s explanation overlooks the fact that 12333 is a bulk collection authority – while section 702 is not. Yes, 702 data pass through the United States. But at the end of the day, while section 702 collection may seem “bulky,” it is nonetheless an exclusively targeted collection authority. Section 702 can be used only to collect on communications to, from or (controversially) about a specific target. There aren’t an infinite number of targets. In 2013, there were 89,138 of them. Executive Order 12333, by contrast, allows for pure bulk collectionof overseas electronic communications. There is no requirement that electronic surveillance under 12333 be targeted at a particular individual, organization or facility. A recent directive from the President (PPD-28) explains: References to signals intelligence collected in “bulk” mean the authorized collection of large quantities of signals intelligence data which, due to technical or operational considerations, is acquired without the use of discriminants (e.g., specific identifiers, selection terms, etc.). (Emphasis mine.) Indeed, 12333 lets the government conduct any electronic surveillance, so long as it does so from a location abroad, so long as it does not affirmatively target a U.S. person, and so long as it is done for a “foreign intelligence or counterintelligence purpose.” The resultant difference in scale of collection is significant. In his 2011 opinion, Judge Bates stated that NSA acquired over 250 million Internet communications annually under section 702; the Washington Post revealed that a single program under 12333 collected nearly 5 billion cellphone location records every day. This may be a bit of an apples-to-oranges comparison, but it’s an instructive one nonetheless. The untargeted nature and massive scope of 12333 collection strongly suggest that it may be used to collect far more U.S. person communications than are collected under section 702. Moreover, because 12333 allows for bulk collection, it would seem to stand a high chance of capturing Americans’ communications that are, in fact, entirely unrelated to foreign intelligence – precisely the category of protected communications that Judge Bates found so problematic. Curiously, the new report on 12333 from the NSA’s Civil Liberties and Privacy Office explicitly excludes bulk collection from its analysis. It would be great if Judge Bates could ask these questions. But he can’t. The FISC lacks jurisdiction over 12333 collection. And so it is on Congress – and on us – to fill in the gap. For section 702, the sponsors of the USA FREEDOM Act succeeded in adding a modest but nonetheless incrementally positive provision that would require the Director of National Intelligence to either annually disclose an estimate of the number of Americans affected by section 702 programs, or to provide a detailed, public explanation of why he or she cannot provide that figure (see subsection “(e)(4)” of section 603 of the bill). At a bare minimum, a parallel requirement should be added for 12333. More importantly, however, civil liberties-minded technologists must work to develop a rigorous, peer-tested method to determine whether or not the party to a communication is a U.S. person – or, alternatively, if that individual is likely located in the United States. This method could then be used to analyze a statistically representative sample of 12333 data. We need a way to calculate the golden number. As a former staffer who engaged in the lengthy process of developing the USA FREEDOM legislation, I can confirm that this was always a debate that we lost: We would ask the IC to commit to producing an estimate of U.S. person impact for section 702; they would respond that this would be “difficult if not impossible.” Engineers and mathematicians would do well to prove them wrong – and all of us would benefit. 47 Advantage 1 Ext NSA practices are financially hurting American companies. Waterman 2013 (Shaun Waterman, October 9 2013, The Washington Times, “Wyden: NSA eavesdropping is hurting U.S. economy” th http://www.washingtontimes.com/news/2013/oct/9/wyden-nsa-eavesdropping-hurting-us-economy/) Revelations about the National Security Agency’s monitoring of online communications have damaged the U.S. economy so badly that Americans should “be in the street with pitchforks,” according to a senator leading the effort to reform federal surveillance laws. Sen. Ron Wyden, Oregon Democrat, told a day-long conference at the Cato Institute, a libertarian think tank, (said) that U.S. companies trying to do business in the global technology and communications market are hurting because of the revelations that American Internet giants like Microsoft, Google and Facebook have been under court order to cooperate with the NSA to monitor Web traffic. “If a foreign enemy was doing this much damage to the economy, people would be in the streets with pitchforks,” Mr. Wyden said. A recent report from the Information Technology and Innovation Foundation, a nonprofit, public policy think tank, estimated that the U.S. cloud computing industry alone stands to lose up to $35 billion over the next three years as a result of the revelations — and its impact on the reputation and customer relations of U.S. firms. American firms weren’t just given that reputation, “they won it over the years with good customer practices” only to see it swept away by “this overly broad surveillance,” Mr. Wyden said. Analysts say that a particular problem is that many overseas customers now understand that the U.S. Constitution offers them no protection from NSA eavesdropping. “ Companies like Google and Facebook get more than half their revenue from outside the United States,” says Alan B. Davidson, who was head of public policy for Google Inc. for seven years until 2012. “It’s a really big problem.” Mr. Davidson, now a researcher at the Massachusetts Institute of Technology, predicts the NSA revelations will “drive the traffic away” from U.S. companies. China is dropping US tech companies in fear of NSA Backdoors. Whittaker, Feb 2015 (Zack Whittaker writes for ZDNet, CNET and CBS News. ZDNET-Technology news website “It's official: NSA spying is hurting the US tech economy China is backing away from US tech brands for state purchases as NSA revelations continue to make headlines in newspapers all around the world.” http://www.zdnet.com/article/another-reason-to-hate-the-nsa-china-is-backing-away-from-ustech-brands/) China is no longer using high-profile US technology brands for state purchases, amid ongoing revelations about mass surveillance and hacking by the US government. A new report confirmed key brands, including Cisco, Apple, Intel, and McAfee -among others -- have been dropped from the Chinese government's list of authorized brands, a Reuters report said Wednesday. The number of approved foreign technology brands fell by a third, based on an analysis of the procurement list. Less than half of those companies with security products remain on the list. Although a number of reasons were cited, domestic companies were said to offer "more product guarantees" than overseas rivals in the wake of the Edward Snowden leaks. Some reports have attempted to pin a multi-billion dollar figure on the impact of the leaks. In reality, the figure could be incalculable. The report confirms what many US technology companies have been saying for the past year: the activities by the NSA are harming their businesses in crucial growth markets, including China. The Chinese government's procurement list changes coincided with a series of high profile leaks that showed the US government have been on an international mass surveillance spree, as well as hacking expeditions into technology companies, governments, and the personal cellphones of world leaders. Concerned about backdoors implanted by the NSA, those revelations sparked a change in Chinese policy by forcing Western technology companies to hand over their source code for inspection. That led to an outcry in the capital by politicians who in the not-so-distant past accused Chinese companies of doing exactly the same thing. The fear is that as the China-US cybersecurity standoff continues, it's come too late for Silicon Valley companies, which are already suffering financially thanks to the NSA's activities. Microsoft said in January at its fiscal fourth-quarter earnings that China "fell short" of its 48 expectations, which chief executive Satya Nadella described as a "set of geopolitical issues" that the company was working through. He did not elaborate. Most recently, HP said on Tuesday at its fiscal first-quarter earnings call that it had "execution issues" in China thanks to the "tough market" with increasing competition from the local vendors approved by the Chinese government. But one company stands out: Cisco probably suffered the worst of all. Earlier this month at its fiscal second-quarter earnings, the networking giant said it took a 19 percent revenue ding in China, amid claims the NSA was installing backdoors and implants on its routers in transit. China remains a vital core geography for most US technology giants with a global reach. But until some middleground can be reached between the two governments, expect Silicon Valley's struggles in the country to only get worse. NSA will cost tech company billions. BAILEY 2014 (BRANDON BAILEY, AP Writer, October 8, 2014 “Sen. Wyden: NSA tech spying hurts economy” http://www.washingtontimes.com/news/2014/oct/8/sen-wyden-nsa-tech-spying-hurts-economy/ Leading Senate critic of online surveillance wants the government to stop widespread spying on phone calls, texts and emails, saying the “digital dragnet” doesn’t make the country safer, and only hurts the U.S. economy. “When the actions of a foreign government threaten red-white-and-blue jobs, Washington gets up at arms. But, even today, almost no one in Washington is talking about how overly broad surveillance is hurting the U.S. economy,” said Sen. Ron Wyden, D-Ore., in remarks prepared for a Senate Finance Committee event in Palo Alto, California on Wednesday. Wyden convened the roundtable, which also includes Google Inc. Executive Chairman Eric Schmidt and top corporate attorneys from Facebook and Microsoft, to discuss the economic fallout from the surveillance programs revealed last year by former National Security Agency contractor Edward Snowden. Some analysts estimated last year that U.S. tech companies could lose tens of billions of dollars in sales, particularly after European firms began marketing themselves as being more secure than U.S. competitors - or less vulnerable to legal demands from the U.S. government. Sdiminishes growth in tech industries Kehl et al 14 Danielle Kehl, Policy Analyst at New America’s Open Technology Institute (OTI). Kevin Bankston, Policy Director at OTI. Robyn Greene, a Policy Counsel at OTI. Robert Morgus, Research Associate at OTI. “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” New American’s Open Technology Institute Policy Paper. https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf “It is becoming clear that the post-9/11 surveillance apparatus may be at cross-purposes with our high-tech economic growth,” declared Third Way’s Mieke Eoyang and Gabriel Horowitz in December 2013. “The economic consequences [of the recent revelations] could be staggering.”25 A TIME magazine headline projected that “NSA Spying Could Cost U.S. Tech Giants Billions,” predicting losses based on the increased scrutiny that economic titans like Google, Microsoft, Facebook, and Yahoo have faced both at home and abroad since last June.26 The NSA’s actions pose a serious threat to the current value and future stability of the information technology industry, which has been a key driver of economic growth and productivity in the United States in the past decade.27 In this section, we examine how emerging evidence about the NSA’s extensive surveillance apparatus has already hurt and will likely continue to hurt the American tech sector in a number of ways, from dwindling U.S. market share in industries like cloud computing and webhosting to dropping tech sales overseas. The impact of individual users turning away from American companies in favor of foreign alternatives is a concern. However, the major losses will likely result from diminishing confidence in U.S. companies as trustworthy choices for foreign government procurement of products and services and changing behavior in the business-to-business market. Costs to the U.S. Cloud Computing Industry and Related Business Trust in American businesses has taken a significant hit since the initial reports on the PRISM program suggested that the NSA was directly tapping into the servers of nine U.S. companies to obtain customer data for national security investigations.28 The Washington Post’s original story on the program provoked an uproar in the media and prompted the CEOs of several major companies to deny knowledge of or participation in the program.29 The exact nature of the requests made through the PRISM program was later clarified,30 but the public attention on the relationship between American companies and the NSA still created a significant trust gap, especially in industries 49 where users entrust companies to store sensitive personal and commercial data. “Last year’s national security leaks have also had a commercial and financial impact on American technology companies that have provided these records,” noted Representative Bob Goodlatte, a prominent Republican leader and Chairman of the House Judiciary Committee, in May 2014. “They have experienced backlash from both American and foreign consumers and have had their competitive standing in the global marketplace damaged.”31 Given heightened concerns about the NSA’s ability to access data stored by U.S. companies, it is no surprise that American companies offering cloud computing and webhosting services are among those experiencing the most acute economic fallout from NSA surveillance. Within just a few weeks of the first disclosures, reports began to emerge that American cloud computing companies like Dropbox and Amazon Web Services were starting to lose business to overseas competitors.32 The CEO of Artmotion, one of Switzerland’s largest offshore hosting providers, reported in July 2013 that his company had seen a 45 percent jump in revenue since the first leaks,33 an early sign that the country’s perceived neutrality and strong data and privacy protections34 could potentially be turned into a serious competitive advantage.35 Foreign companies are clearly poised to benefit from growing fears about the security ramifications of keeping data in the United States. In a survey of 300 British and Canadian businesses released by PEER 1 in January 2014,36 25 percent of respondents indicated that they were moving data outside of the U.S. as a result of the NSA revelations. An overwhelming number of the companies surveyed indicated that security and data privacy were their top concerns, with 81 percent stating that they “want to know exactly where their data is being hosted.” Seventy percent were even willing to sacrifice performance in order to ensure that their data was protected.37 It appears that little consideration was given over the past decade to the potential economic repercussions if the NSA’s secret programs were revealed.38 This failure was acutely demonstrated by the Obama Administration’s initial focus on reassuring the public that its programs primarily affect non-Americans, even though non-Americans are also heavy users of American companies’ products. Facebook CEO Mark Zuckerberg put a fine point on the issue, saying that the government “blew it” in its response to the scandal. He noted sarcastically: “The government response was, ‘Oh don’t worry, we’re not spying on any Americans.’ Oh, wonderful: that’s really helpful to companies [like Facebook] trying to serve people around the world, and that’s really going to inspire confidence in American internet companies.”39 As Zuckerberg’s comments reflect, certain parts of the American technology industry are particularly vulnerable to international backlash since growth is heavily dependent on foreign markets. For example, the U.S. cloud computing industry has grown from an estimated $46 billion in 2008 to $150 billion in 2014, with nearly 50 percent of worldwide cloud-computing revenues coming from the U.S.40 R Street Institute’s January 2014 policy study concluded that in the next few years, new products and services that rely on cloud computing will become increasingly pervasive. “Cloud computing is also the root of development for the emerging generation of Web-based applications—home security, outpatient care, mobile payment, distance learning, efficient energy use and driverless cars,” writes R Street’s Steven Titch in the study. “And it is a research area where the United States is an undisputed leader.”41 This trajectory may be dramatically altered, however, as a consequence of the NSA’s surveillance programs. Economic forecasts after the Snowden leaks have predicted significant, ongoing losses for the cloud-computing industry in the next few years. An August 2013 study by the Information Technology and Innovation Foundation (ITIF) estimated that revelations about the NSA’s PRISM program could cost the American cloud computing industry $22 to $35 billion over the next three years.42 On the low end, the ITIF projection suggests that U.S. cloud computing providers would lose 10 percent of the foreign market share to European or Asian competitors, totaling in about $21.5 billion in losses; on the high-end, the $35 billion figure represents about 20 percent of the companies’ foreign market share. Because the cloud computing industry is undergoing rapid growth right now—a 2012 Gartner study predicted global spending on cloud computing would increase by 100 percent from 2012 to 2016, compared to a 3 percent overall growth rate in the tech industry as a whole43—vendors in this sector are particularly vulnerable to shifts in the market. Failing to recruit new customers or losing a competitive advantage due to exploitation by rival companies in other countries can quickly lead to a dwindling market share. The ITIF study further notes that “the percentage lost to foreign competitors could go higher if foreign governments enact protectionist trade barriers that effectively cut out U.S. providers,” citing early calls from German data protection authorities to suspend the U.S.-EU Safe Harbor program (which will be discussed at length in the next section).44 As the R Street Policy Study highlights, “Ironically, the NSA turned the competitive edge U.S. companies have in cloud computing into a liability, especially in Europe.”45 In a follow up to the ITIF study, Forrester Research analyst James Staten argued that the think tank’s estimates were low, suggesting that the actual figure could be as high as $180 billion over three years .46 Staten highlighted two additional impacts not considered in the ITIF study. The first is that U.S. customers—not just foreign companies—would also avoid US cloud providers, especially for international and overseas business. The ITIF study predicted that American companies would retain their domestic market share, but Staten argued that the economic blowback from the revelations would be felt at home, too. “You don’t have to be a French company, for example, to be worried about the US government snooping in the data about your French clients,” he wrote.47 Moreover, the analysis highlighted a second and “far more costly” impact: that foreign cloud providers, too, would lose as much as 20 percent of overseas and domestic business because of similar spying programs conducted by other governments. Indeed, the NSA disclosures “have prompted a fundamental re-examination of the role of intelligence services in conducting coordinated cross-border surveillance,” according to a November 2013 report by Privacy International on the “Five Eyes” intelligence partnership between the United States, the United Kingdom, Canada, Australia, and New Zealand.48 Staten predicts that as the surveillance landscape around the world becomes more clear, it could have a serious negative impact on all hosting and outsourcing services, resulting in a 25 percent decline in the overall IT services market, or about $180 billion in losses.49 Internet surveillance hurts growth in technology related industries and limits American economic competitiveness. Kehl et al 14 Danielle Kehl, Policy Analyst at New America’s Open Technology Institute (OTI). Kevin Bankston, Policy Director at OTI. Robyn Greene, a Policy Counsel at OTI. Robert Morgus, Research 50 Associate at OTI. “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity,” New American’s Open Technology Institute Policy Paper. https://www.newamerica.org/downloads/Surveilance_Costs_Final.pdf It is abundantly clear that the NSA surveillance programs are currently having a serious, negative impact on the U.S. economy and threatening the future competitiveness of American technology companies. Not only are U.S. companies losing overseas sales and getting dropped from contracts with foreign companies and governments—they are also watching their competitive advantage in fast-growing industries like cloud computing and webhosting disappear, opening the door for foreign companies who claim to offer “more secure” alternative products to poach their business. Industry efforts to increase transparency and accountability as well as concrete steps to promote better security by adopting encryption and other best practices are positive signs, but U.S. companies cannot solve this problem alone. “It’s not blowing over,” said Microsoft General Counsel Brad Smith at a recent conference. “In June of 2014, it is clear it is getting worse, not better.”98 Without meaningful government reform and better oversight, concerns about the breadth of NSA surveillance could lead to permanent shifts in the global technology market and do lasting damage to the U.S. economy. Economic decline guarantees multiple scenarios for nuclear war and turns every other impact Harris and Burrows 9 - PhD in European History @ Cambridge and Counselor of the US National Intelligence Council AND Member of the National Intelligence Council’s Long Range Analysis Unit (Mathew J. and Jennifer, “Revisiting the Future: Geopolitical Effects of the Financial Crisis,” April, Washington Quarterly, http://www.twq.com/09april/docs/09apr_Burrows.pdf) Of course, the report encompasses more than economics and indeed believes the future is likely to be the result of a number of intersecting and interlocking forces. With so many possible permutations of outcomes, each with ample Revisiting the Future opportunity for unintended consequences, there is a growing sense of insecurity. Even so, history may be more instructive than ever. While we continue to believe that the Great Depression is not likely to be repeated, the lessons to be drawn from that period include the harmful effects on fledgling democracies and multiethnic societies (think Central Europe in 1920s and 1930s) and on the sustainability of multilateral institutions (think League of Nations in the same period). There is no reason to think that this would not be true in the twenty-first as much as in the twentieth century. Fo r that reason, the ways in which the potential for greater conflict could grow would seem to be even more apt in a constantly volatile economic environment as they would be if change would be steadier. In surveying those risks, the report stressed the likelihood that terrorism and nonproliferation will remain priorities even as resource issues move up on the international agenda. Terrorism’s appeal will decline if economic growth continues in the Middle East and youth unemployment is reduced. For those terrorist groups that remain active in 2025, however, the diffusion of technologies and scientific knowledge will place some of the world’s most dangerous capabilities within their reach. Terrorist groups in 2025 will likely be a combination of descendants of long established groups_inheriting organizational structures, command and control processes, and training procedures necessary to conduct sophisticated attacks and newly emergent collections of the angry and disenfranchised that become self-radicalized, particularly in the absence of economic outlets that would become narrower in an economic downturn. The most dangerous casualty of any economically-induced drawdown of U.S. military presence would almost certainly be the Middle East. Although Iran’s acquisition of nuclear weapons is not inevitable, worries about a nuclear-armed Iran could lead states in the region to develop new security arrangements with external powers, acquire additional weapons, and consider pursuing their own nuclear ambitions. It is not clear that the type of stable deterrent relationship that existed between the great powers for most of the Cold War would emerge naturally in the Middle East with a nuclear Iran. Episodes of low intensity conflict and terrorism taking place under a nuclear umbrella could lead to an unintended escalation and broader conflict if clear red lines between those states involved are not well established. The close 51 proximity of potential nuclear rivals combined with underdeveloped surveillance capabilities and mobile dual-capable Iranian missile systems also will produce inherent difficulties in achieving reliable indications and warning of an impending nuclear attack. The lack of strategic depth in neighboring states like Israel, short warning and missile flight times, and uncertainty of Iranian intentions may place more focus on preemption rather than defense, potentially leading to escalating crises. 36 Types of conflict that the world continues to experience, such as over resources, could reemerge, particularly if protectionism grows and there is a resort to neo-mercantilist practices. Perceptions of renewed energy scarcity will drive countries to take actions to assure their future access to energy supplies. In the worst case, this could result in interstate conflicts if government leaders deem assured access to energy resources, for example, to be essential for maintaining domestic stability and the survival of their regime. Even actions short of war, however, will have important geopolitical implications. Maritime security concerns are providing a rationale for naval buildups and modernization efforts, such as China’s and India’s development of blue water naval capabilities. If the fiscal stimulus focus for these countries indeed turns inward, one of the most obvious funding targets may be military. Buildup of regional naval capabilities could lead to increased tensions, rivalries, and counterbalancing moves, but it also will create opportunities for multinational cooperation in protecting critical sea lanes. With water also becoming scarcer in Asia and the Middle East, cooperation to manage changing water resources is likely to be increasingly difficult both within and between states in a more dog-eatdog world. 52 Advantage 2 Ext 53 Relations Bad Now French Anger Over NSA Spying Further Strains Europe-U.S. Relations Williams 6-15 BY LAUREN C. WILLIAMS POSTED ON JUNE 24, 2015 AT 1:06 PM Lauren C. Williams is the tech reporter for ThinkProgress with an affinity for consumer privacy, cybersecurity, tech culture and the intersection of civil liberties and tech policy. Before joining the ThinkProgress team, she wrote about health care policy and regulation for B2B publications, and had a brief stint at The Seattle Times. Lauren is a native Washingtonian and holds a master’s in journalism from the University of Maryland and a bachelor’s of science in dietetics from the University of Delaware. http://thinkprogress.org/world/2015/06/24/3673403/french-anger-nsa-spying-strains-europe-us-relations/ TH New WikiLeaks documents show the U.S. National Security Agency spied on the private communications of three French presidents, angering the French government and adding strain to an already tenuous Europe-American relationship. French news site Mediapart first published the documents Tuesday, which cover NSA activity from 2006 to 2012, and were part of the original WikiLeaks provided by former NSA contractor Edward Snowden. That news quickly drew the ire of French President François Hollande, who called an emergency meeting Wednesday with the U.S. ambassador and government attorneys. “France will not tolerate actions that threaten its security and the protection of its interests,” Hollande said in a statement Wednesday. “These are unacceptable facts that have already been the subject of clarification between the US and France, notably at the end of 2013 when the first revelations were made and during a state visit by the president of the Republic to the United States in February 2014. Commitments were made by the US authorities. They need to be recalled and strictly respected.” The White House has denied the spying allegations, saying via a statement Wednesday: We are not targeting and will not target the communications of President Hollande. Indeed, as we have said previously, we do not conduct any foreign intelligence surveillance activities unless there is a specific and validated national security purpose. This applies to ordinary citizens and world leaders alike. We work closely with France on all matters of international concern, and the French are indispensable partners. Spying on friendly and enemy governments alike isn’t a new occurrence and is widely practiced, the U.S. is generally more brazen about it. German lawmakers accused its own intelligence agencies earlier this year of violating German regulations and gathering information in European targets for the NSA. The new Snowden-derived information comes as trust in U.S. government wanes domestically and overseas. Only a quarter of Americans trust the government always or most of the time, according to a 2014 Pew Research survey. When it comes to foreign relations, only 43 percent are at least fairly confident in how the U.S. handles international matters, Gallup found. This week’s WikiLeaks also follows news that Germany folded its investigation into the NSA’s spying practices after documents surfaced in 2013 indicating the agency spied on Chanecellor Angela Merkel’s personal communications. But public disclosing of what should be clandestine movements fuels international sentiment of American government’s disregard for civilian privacy. “We find it hard to understand or imagine what motivates an ally to spy on allies who are often on the same strategic positions in world affairs,” Stéphane Le Foll, a French government spokesman told iTELE television. Negative global perception of the NSA’s actions could also affect how the U.S. does business overseas. European regulators have already begun investigating tech companies’ potential wrongdoing by participating in NSA surveillance programs. The Court of Justice of the European Union is hearing a case involving Apple, Facebook, Microsoft, and Yahoo, for potential privacy law violations. The decision could seriously damage the U.S.-European relationship by deterring companies from doing business through stricter regulations. 54 Russia War = Bad Russia nuclear war causes extinction Bostrom ‘2 (Nick Bostrom 2, PhD, Faculty of Philosophy, Oxford University, www.nickbostrom.com) A much greater existential risk emerged with the build-up of nuclear arsenals in the US and the USSR. An all-out nuclear war was a possibility with both a substantial probability and with consequences that might have been persistent enough to qualify as global and terminal. There was a real worry among those best acquainted with the information available at the time that a nuclear Armageddon would occur and that it might annihilate our species or permanently destroy human civilization.[4] Russia and the US retain large nuclear arsenals that could be used in a future confrontation, either accidentally or deliberately. There is also a risk that other states may one day build up large nuclear arsenals. Note however that a smaller nuclear exchange, between India and Pakistan for instance, is not an existential risk, since it would not destroy or thwart humankind’s potential permanently. US-Russia war causes global collapse – hair-trigger posturing makes deterrence breakdown inevitable Starr 14 [Steven, Senior Scientist for Physicians for Social Responsibility (www.psr.org) and Director of the Clinical Laboratory Science Program at the University of Missouri. Starr has published in the Bulletin of the Atomic Scientists and the Strategic Arms Reduction (STAR) website of the Moscow Institute of Physics and Technology, June 5, “The Lethality of Nuclear Weapons: Nuclear War has No Winner,” http://www.globalresearch.ca/the-lethality-of-nuclear-weapons-nuclear-war-has-no-winner/5385611/AKG] Nuclear war has no winner. Beginning in 2006, several of the world’s leading climatologists (at Rutgers, UCLA, John Hopkins University, and the University of Colorado-Boulder) published a series of studies that evaluated the long-term environmental consequences of a nuclear war, including baseline scenarios fought with merely 1% of the explosive power in the US and/or Russian launch-ready nuclear arsenals. They concluded that the consequences of even a “small” nuclear war would include catastrophic disruptions of global climate[i] and massive destruction of Earth’s protective ozone layer[ii]. These and more recent studies predict that global agriculture would be so negatively affected by such a war, a global famine would result, which would cause up to 2 billion people to starve to death. [iii] These peer-reviewed studies – which were analyzed by the best scientists in the world and found to be without error – also predict that a war fought with less than half of US or Russian strategic nuclear weapons would destroy the human race.[iv] In other words, a US-Russian nuclear war would create such extreme long-term damage to the global environment that it would leave the Earth uninhabitable for humans and most animal forms of life. A recent article in the Bulletin of the Atomic Scientists, “Self-assured destruction: The climate impacts of nuclear war”,[v] begins by stating: “A nuclear war between Russia and the United States, even after the arsenal reductions planned under New START, could produce a nuclear winter. Hence, an attack by either side could be suicidal, resulting in self-assured destruction.” In 2009, I wrote an article[vi] for the International Commission on Nuclear Non-proliferation and Disarmament that summarizes the findings of these studies. It explains that nuclear firestorms would produce millions of tons of smoke, which would rise above cloud level and form a global stratospheric smoke layer that would rapidly encircle the Earth. The smoke layer would remain for at least a decade, and it would act to destroy the protective ozone layer (vastly increasing the UV-B reaching Earth[vii]) as well as block warming sunlight, thus creating Ice Age weather conditions that would last 10 years or longer. Following a US-Russian nuclear war, temperatures in the central US and Eurasia would fall below freezing every day for one to three years; the intense cold would completely eliminate growing seasons for a decade or longer. No crops could be grown, leading to a famine that would kill most humans and large animal populations. Electromagnetic pulse from highaltitude nuclear detonations would destroy the integrated circuits in all modern electronic devices[viii], including those in commercial nuclear power plants. Every nuclear reactor would almost instantly meltdown; every nuclear spent fuel pool (which contain many times more radioactivity than found in the reactors) would boil-off, releasing 55 vast amounts of long-lived radioactivity. The fallout would make most of the US and Europe uninhabitable. Of course, the survivors of the nuclear war would be starving to death anyway. Once nuclear weapons were introduced into a US-Russian conflict, there would be little chance that a nuclear holocaust could be avoided. Theories of “limited nuclear war” and “nuclear de-escalation” are unrealistic.[ix] In 2002 the Bush administration modified US strategic doctrine from a retaliatory role to permit preemptive nuclear attack; in 2010, the Obama administration made only incremental and miniscule changes to this doctrine, leaving it essentially unchanged. Furthermore, Counterforce doctrine – used by both the US and Russian military – emphasizes the need for preemptive strikes once nuclear war begins. Both sides would be under immense pressure to launch a preemptive nuclear first-strike once military hostilities had commenced, especially if nuclear weapons had already been used on the battlefield. Both the US and Russia each have 400 to 500 launch-ready ballistic missiles armed with a total of at least 1800 strategic nuclear warheads,[xi] which can be launched with only a few minutes warning.[xii] Both the US and Russian Presidents are accompanied 24/7 by military officers carrying a “nuclear briefcase”, which allows them to transmit the permission order to launch in a matter of seconds. 56 AT: Sanctions Curb Aggression Current Sanctions aren’t curbing Russian Aggression. Labott, June 12, 2015 (Elise Labott, CNN, “U.S., Europe ready new sanctions to deter Putin on Ukraine”, http://www.cnn.com/2015/06/12/politics/ukraine-russia-sanctions-us-eu/) The United States and the European Union are finalizing further sanctions against Russia that could be imposed if Moscow takes additional military action in Ukraine, senior U.S. administration officials and European diplomats said Thursday. The sources stressed that no decisions have been made yet to put additional measures in place. This week's renewed fighting triggered a discussion of additional sanctions, they said, but the fighting ended before a decision to act was made. The sources said the potential new measures to be presented to Western leaders range from adding names and companies to the current sanctions to imposing broader penalties on Russia's financial, energy and defense sectors. The point at which Russian military moves would prompt new sanctions is a case of "you know it when you see it," a senior administration official said. "It could be any major assault anywhere across the line of contact. We all know what we are talking about, and we want to be prepared and have stuff ready to go in case we need it." "There is a whole range of different options leaders will have available to respond to any renewed Russian aggression, to which we could respond pretty quickly and vigorously. We are not talking about weeks," the official said. Discussion of additional sanctions comes as the EU is widely expected to renew trade and personal sanctions on Russia over its actions in Ukraine when they expire toward the end of the month. Both the U.S. and EU have linked the lifting of sanctions to implementation of a peace accord hammered out in February by Russia with the leaders of Ukraine, France and Germany in the capital of Belarus. The so-called Minsk Agreement has been repeatedly violated. The U.S. and EU claim that most of those violations were by Russia and the separatists it supports. Some of the fiercest fighting since the agreement came this week, with heavy artillery fire reported near Donetsk. The European parliament passed a resolution calling on EU governments to keep the measures in place after Russian President Vladimir Putin traveled to Italy Wednesday in what many in the West saw as a bid to break European solidarity on the sanctions. "Europe has acted with more unity than most people expected, including Putin himself," one of the senior administration officials said. A European diplomat briefing reporters Thursday noted that this week's violence strengthened European resolve to maintain the current measures. "The concerns that we all began to feel about additional violations and suggestions there were troops and equipment coming across the border from Russia ... all that in fact was quite useful in getting European nations collectively to grasp that now is not the time to start softening the position we are taking on sanctions," the European diplomat said. President Barack Obama said in Austria on Monday that he'd convinced European leaders to maintain the economic sanctions. The extension of sanctions was one of his chief goals at this week's G7 meeting in the Bavarian Alps. Obama said Europe and the United States stand ready to impose new sanctions if violence increases. The sources said that while they prefer not to impose the new sanctions, they hope the knowledge that they are being prepared will deter Putin from taking further action. "It is both preparation and also a degree of credible messaging," the European diplomat briefing reporters said. "One is to make very clear that if there are further acts of aggression that we can move quickly. The other is to let it be known we are serious about being ready to do that as a deterrent." The diplomat stressed, "We would rather not to have to do that, but it needs to be clear that if that is the direction Putin's Russia goes in, that we will react." U.S. officials and European diplomats insist the sanctions are taking a toll on the Russian economy, where the ruble has plummeted in value. But they admit the sanctions have done little to prevent Putin from continuing the campaign in Ukraine or curb aggression by separatists in Eastern Ukraine. In total, more than 6,000 people have died in the fighting in Eastern Ukraine since the conflict began last year, according to the United Nations. 57 EU Relations Key to Ending Russian Aggresion International Co-op is key to decreasing Russian aggression. Ben Wolfgang May 27, 2015- The Washington Times - Wednesday, http://www.washingtontimes.com/news/2015/may/27/joseph-biden-ending-ukraine-war-a-key-t-138637751/?page=all Joseph R. Biden said Wednesday that ending the Russia-Ukraine conflict is a key test of U.S. and European leadership for this generation — but specialists say the vice president laid out no new American strategy for countering Russian aggression, and the Obama administration seems content on staying the course with economic sanctions and continued diplomatic outreach to Moscow. Mr. Biden outlined the challenges facing Ukraine, and Russia’s ongoing hostility in the region, during a speech at the Brookings Institution in Washington. He defended U.S. cooperation with Russian Vladimir Putin on issues such as halting Iran’s nuclear program but at the same time stressed the world community simply cannot allow Moscow to impose its will on eastern Europe. The vice president said it’s up to the U.S., NATO, the European Union and other regional players to act. “There’s a price tag here. What happens in Ukraine and how the West and the world responds has, I think, consequential implications for the nature of international order in the years to come, in particular the bedrock principles of security, territorial integrity and the inviolability of borders,” Mr. Biden said. “President Putin is wagering that he has greater staying power than all the parties I just mentioned have. In Ukraine, he’s betting he can outlast the current pro-reformist European government … President Putin also is trying to scare our allies and partners with the threat of a new and aggressive Russia.” The U.S. and its European allies have responded to Russian aggression in Ukraine with a host of economic sanctions targeted at officials in the Putin regime and specific sectors of the Russian economy. The U.S. also has continued diplomatic communication with Moscow in an attempt to calm tensions in eastern Ukraine, where violence between Ukrainian military forces and pro-Russia rebels has continued despite a cease-fire — known as the Minsk Agreement — between the two sides. More than 6,000 people have been killed since the fighting broke out in April 2014. Secretary of State John F. Kerry recently met with Mr. Putin earlier this month in Russia in an effort to achieve true peace. But the administration so far has resisted sending lethal arms to the Ukrainian military and other steps that many U.S. lawmakers believe are necessary to secure the peace. Mr. Biden seemed to leave the door open to providing lethal aid, calling the issue a “debate worth having.” Still, specialists say Mr. Biden’s speech Wednesday indicated that no major change in the White House’s policy is forthcoming. “He didn’t promise anything new. There are no new goodies for the Ukrainians. I think it was kind of a recapitulation of what our strategy has been. No sign of backing down, but also no announcement that anything else is in the pipeline,” said Jeffrey Mankoff, deputy director of the Russia and Eurasia Program at the Center for Strategic and International Studies. The U.S. and its allies, Mr. Mankoff said, essentially have ceded some ground to Russia. The Crimean Peninsula — which Moscow claims as its own territory following a highly suspicious referendum last year — likely is lost, he added. “Crimea has basically been secured for Russia to the point we’re not even really talking about it,” Mr. Mankoff said. “It’s one of those things we’ve acknowledged is going to be part of the landscape, like other frozen conflicts in that part of the world.” President Obama discussed the situation in Ukraine Tuesday with NATO Secretary-General Jens Stoltenberg during an Oval Office meeting. Public statements by both men also suggested no new plan for dealing with Russia’s actions. “We discussed Crimea, Ukraine, and the importance of the full implementation of the Minsk Agreements. That’s the path to peace, and I urge all parties to fully implement the Minsk Agreements, and Russia to stop supporting the separatists and to rid all its forces from eastern Ukraine,” Mr. Stoltenberg said. Mr. Biden also said the chilly relations between the U.S. and Moscow will not affect efforts to slow Iran’s nuclear program. Russia, along with the U.S., Britain, Germany, France and China, is seeking a deal that would slow Tehran’s nuclear ambitions in exchange for some relief from economic sanctions. “It makes sense to cooperate where there’s a clear mutual interest as long as you’re not being asked to back off,” the vice president said. 58 Hurts Relations NSA programs hurt US relations with allies – Germany, Japan, Brazil, and Great Britain – disbanding gets it back Stokes 7/30 – (Bruce Stokes, director of global economic attitudes in the Pew Research Center’s Global Attitudes Project, former senior transatlantic fellow at the German Marshall Fund, former senior fellow at the Council on Foreign Relations, “Did NSA snooping hurt U.S. image? Not so much”, CNN, July 30, 2014, http://globalpublicsquare.blogs.cnn.com/2014/07/30/did-nsa-snooping-hurt-u-s-image-not-somuch/) Make no mistake about it. Publics around the world aren’t happy about NSA spying. In 37 of 43 nations outside the say American surveillance of ordinary citizens in the respondent’s country is unacceptable. This includes 97 percent in Greece, 94 percent in Brazil and 91 percent in Egypt, Jordan and Tunisia. But it also includes opposition by important U.S. allies: 87 percent of Germans, 85 percent of Japanese and 70 percent of the British.¶ There’s similar public opposition to U.S. spying on the respondent’s national leaders. Majorities in 34 countries find such action by Washington to be offensive. This sentiment is particularly strong in Germany, where the American government allegedly listened in on German Chancellor Angela Merkel’s cellphone conversations. But there are similarly overwhelming objections in Egypt, Jordan, Lebanon, Venezuela, Greece and Brazil.¶ Publics around the world also generally oppose United States that were surveyed recently by the Pew Research Center, majorities Washington’s surveillance of Americans. Majorities in 26 nations say it is wrong. But such opposition is less intense than criticism of U.S. spying on non-Americans, while majorities in the Philippines, Nigeria and Uganda actually back Uncle Sam’s electronic oversight of Americans.¶ Spying on suspected terrorists is another matter. Majorities in 30 countries surveyed voice the view that electronic oversight of alleged terrorists is acceptable. Israelis, Italians and Kenyans are particularly supportive, as are roughly eight-in-ten Russians and Tunisians. Notably, Germans, who are particularly incensed about American spying on both Merkel and on ordinary German citizens, have few qualms about U.S. eavesdropping on alleged terrorists: 70 percent support such efforts.¶ But U.S. spying has tarnished America’s image as a staunch defender of the personal freedoms of its own people, long one of the positive attributes of U.S. soft power.¶ Admiration for America as a defender of such civil liberties has dropped significantly in 22 of 36 nations where there is comparable data for 2013 and 2014. NSA actions have particularly hurt the U.S. reputation in Brazil, where belief that Uncle Sam respects Americans’ freedoms is down 25 percentage points, and in Germany, where it is down 23 points. Drops of 20 points or more are also found in El Salvador, Pakistan, Argentina, Spain and Russia.¶ The NSA kills soft power – perception and credibility jack Migranyan, ‘13 (Andranik Migranyan, director of the Institute for Democracy and Cooperation, professor at the Institute of International Relations in Moscow, former member of the Russian Presidential Council, “Scandals Harm U.S. Soft Power”, The National Interest, July 5, 2013, http://nationalinterest.org/commentary/scandals-harm-us-soft-power-8695) Wang **WE DO NOT ENDORSE ANY USE OFFSIVE RHETORIC** On a practical geopolitical level, the spying scandals have seriously tarnished the reputation of the United States. They have circumscribed its ability to exert soft power; the same influence that made the U.S. model very attractive to the rest of the world. This former lustre is now diminished. The blatant everyday intrusions into the private lives of Americans, and violations of individual rights and liberties by runaway, unaccountable U.S. government agencies, have deprived the United States of its authority to dictate how others must live and what others must do. Washington can no longer lecture others when its very foundational institutions and values are being discredited—or at a minimum, when all is not well “in the state of Denmark.”¶ Perhaps precisely because not all is well, many American politicians seem unable to adequately address the current situation. Instead of asking what isn’t working in the government and how to ensure accountability and transparency in their institutions, they try, in their annoyance, to blame the messenger—as they are doing in Snowden’s case. Some Senators hurried to blame Russia and Ecuador for anti-American behavior, and threatened to punish them should they offer asylum to Snowden.¶ 59 NSA undermines international relations – surveillance problems Bowen 2/10 – (Grant Bowen, Project Manager at BPM LLC, “The Long Term Effects of NSA Revelations”, Journal of High Technology Law, February 10, 2014, http://jhtlblog.wordpress.com/2014/02/10/the-long-term-effects-of-nsa-revelations/) Wang Rolling scandal over National Security agency surveillance, triggered by a mass leak of secrets by Edward Snowden, as well as further revelations of spying on allies, continues to follow President Obama and the U.S. Government. Due to this, various experts are worried of two results: the government is suffering in its relationships with allies and cryptography, which has continuously formed the backbone of U.S. surveillance programs, and simultaneous the public may be damaged by cloud computing surveillance.¶ Primarily, experts are concerned about the extent to which the US can successfully exert “soft power” through political and cultural values, while simultaneously lowering its military presence throughout the world. It was intended that through networks of friends and allies, the U.S. could extend this “soft power” and influence more countries through peace, rather than war-tactics. Maintaining and establishing more alliances through this method will help to mitigate consequences of lessening military might.¶ However, the current surveillance problems do harm to this plan. In order to establish “soft power” in the first place, there has to be a baseline level of trust. The global opinion of America is hardly positive at the moment, though. Coming off a long government shutdown, and repeated surveillance scandals, American status has suffered. If the long-term plan is to carefully manage military decline, while preserving maximum influence, surveillance issues can’t continue. They repeatedly break down the requisite trust in order to successfully follow such a plan.¶ Furthermore, NSA surveillance issues continue to wreak havoc for the American public. Primarily, many organizations have noted access to stored data in the public cloud, even though the U.S. insisted it was only doing so to track suspected terrorist activities overseas. However, both Microsoft’s Office 365 and SharePoint Online experienced NSA surveillance activity (whether they were “accidents” or purposeful is still disputed). Due to the large universe of SharePoint and other online services (think Apple’s iCloud or Google Online Doc Suite), smaller providers, cloud computing services and others are feeling the influence. They are putting their cloud migration plans on hold, or simply terminating those already occurring. In fact, according to one study, nearly 35% of those with plans to migrate to cloud computing are now in a holding pattern.¶ It may need to go without say that there is a question of whether the NSA security “surveillance” tactics raise issues of legality. According to Congress, and the Supreme Court the processes employed by the NSA do not violate the 4th amendment “as long as the government can show that it is relevant to an authorized investigation into known – and, significantly – unknown terrorists who may be in the United States.” Yet, legality, as determined by the government, does not answer the question of what the long-term effects of such surveillance will be. As we have seen already it could affect as much as international political relationships, or simply public and commercial computing access. Lack of trust undermines diplomatic relations Riechmann 13 – (Deb Riechmann, Foreign Affairs reporter at Associated Press , “NSA Spying Threatens U.S. Foreign Policy Efforts”, AP, October 26, 2013, http://www.huffingtonpost.com/2013/10/26/nsa-spying-foreign- policy_n_4166076.html) Wang WASHINGTON -- WASHINGTON (AP) — Secretary of State John Kerry went to Europe to talk about Mideast peace, Syria and Iran. What he got was an earful of outrage over U.S. snooping abroad.¶ President Barack Obama has defended America's surveillance dragnet to leaders of Russia, Mexico, Brazil, France and Germany, but the international anger over the disclosures shows no signs of abating in the short run.¶ Longer term, the revelations by former National Security Agency contractor Edward Snowden about NSA tactics that allegedly include tapping the cellphones of as many as 35 world leaders threaten to undermine U.S. foreign policy in a range of areas.¶ This vacuum-cleaner approach to data collection has rattled allies.¶ "The magnitude of the eavesdropping is what shocked us," former French Foreign Minister Bernard Kouchner said in a radio interview. "Let's be honest, we eavesdrop too. Everyone is listening to everyone else. But we don't have the same means as the United States, which makes us jealous."¶ So where in the world isn't the NSA? That's one big question raised by the disclosures. Whether the tapping of allies is a step too far might be moot.¶ The British ambassador to Lebanon, Tom Fletcher, tweeted this past week: "I work on assumption that 6+ countries tap my phone. Increasingly rare that diplomats say anything sensitive on calls."¶ Diplomatic relations are built on trust. If America's credibility is in question, the U.S. will find it harder to 60 maintain alliances, influence world opinion and maybe even close trade deals.¶ Spying among allies is not new.¶ Madeleine Albright, secretary of state during the Clinton administration, recalled being at the United Nations and having the French ambassador ask her why she said something in a private conversation apparently intercepted by the French.¶ The French government protested revelations this past week that the NSA had collected 70.3 million French-based telephone and electronic message records in a 30day period.¶ Albright says Snowden's disclosures have hurt U.S. policymakers. 61 Impact Modules 62 Asian War Module US EU relations key to solve coming Asian conflicts Timmerman ’14 -- Dr. Martina Timmermann, DAAD/AICGS Research Fellow (Setting the Stage for a U.S.-German Partnership Befitting the Twenty-First Century Author: Martina Timmermann Published: August 6, 2014 Topics: German Foreign and Security Policy, Reconciliation in Europe and Asia Dr. Martina Timmermann was a DAAD/AICGS Research Fellow from July to August 2014. While at AICGS, Dr. Timmermann explored the potential and options for EU/German involvement as a mediator in East Asia In 1998, Dr. Timmermann received her doctorate degree from Ruhr-University Bochum for a study in comparative politics, titled The Power of Collective Thought Patterns: Values, Change and Political Culture in Japan and the United States of America (Leske & Budrich 2000, in German). Her PhD research, which she conducted at Hitotsubashi University in Tokyo from 1993-1994 and at Harvard University’s U.S.-Japan Program and Reischauer Institute in summer 1995, was kindly funded by the Japanese-European Special Exchange Program (SEP), the so-called Takeshita-Initiative. Critical challenges facing the German-American relationship—in Ukraine and Russia, Iraq, Syria, Israel and Palestine, Afghanistan, and several countries in Africa— urgently need solutions. Overcoming them would be easier and mutually beneficial if Germany, the European Union, and the U.S. walked more closely side by side. Such closer cooperation would be beneficial not only to conflicts in and around Europe, but also to a set of conflicts in East Asia that have the potential to exert a major global impact: the conflict between China, Taiwan, Brunei, Vietnam, the Philippines, and Malaysia over the Spratly Islands in the South China Sea and the conflict between China and Japan on the Senkaku Islands in the East China Sea. The United States has been prodded by its allies in Asia-Pacific to serve as a mediator. Several American observers (like Jonathan Pollack[1] or Daniel Sneider[2]) have also argued for U.S. high-level shuttle diplomacy. Giving this a second thought, however, it is obvious that the United States as a direct stakeholder in the region, with its hands tied by its bilateral security treaties with both Japan and the Republic of Korea, could not really fill the role of an independent broker on this matter. China, moreover, has already made clear that it will not accept any American role as a mediator in these conflicts. The U.S. would therefore benefit from involving a trusted and reliable partner, such as the EU, whose reputation for credibility and integrity in peaceful multilateral conflict resolution is well known. Still, although European economic interests would also be affected by conflicts in Asia, and especially when militaries are involved, these conflicts have not advanced to a center stage debate between the U.S. and Europe. Instead, there seems to be a shared perception that conflicts occurring beyond Europe’s doorstep do not require European attention or, Particularly in East Asia, all stakeholders would benefit from stronger U.S.-European cooperation resulting in a more constructive complementing of their experiences and soft and hard policy instruments. from an American perspective, do not require European involvement. This, however, would be a waste of precious political opportunity. Asian wars escalate- cause great power wars Rudd ‘13 (“East Asia is a tinderbox on water” BY KEVIN RUDD | JANUARY 30, 2013 Kevin Rudd is the former prime minister and foreign minister of Australia. He studied a Bachelor of Arts in Asian Studies at the Australian National University, majoring in Chinese language and Chinese history. He worked for the Department of Foreign Affairs from 1981 to 1988, when he became Chief of Staff to Queensland Premier Wayne Goss. After the Goss Government lost office in 1996, Rudd was hired as a Senior China Consultant by the accounting firm KPMG Australia. Rudd was first elected to the House of Representatives for Griffith at the 1998 federal election, joining the Shadow Cabinet in 2001 as Shadow Minister for Foreign Affairs. http://www.foreignpolicy.com/articles/2013/01/30/a_maritime_balkans_of_the_21st_century_east_asia?page=0,1 These are no ordinary times in East Asia. With tensions rising from conflicting territorial claims in the East China and South China seas, the region increasingly resembles a 21st-century maritime redux of the 63 Balkans a century ago -- a tinderbox on water. Nationalist sentiment is surging across the region, reducing the domestic political space for less confrontational approaches. Relations between China and Japan have now fallen to their lowest ebb since diplomatic normalization in 1972, significantly reducing bilateral trade and investment volumes and causing regional governments to monitor developments with growing alarm. Relations between China and Vietnam, and between China and the Philippines, have also deteriorated significantly, while key regional institutions such as the Association of Southeast Asian Nations (ASEAN) have become increasingly polarized. In security terms, the region is more brittle than at any time since the fall of Saigon in 1975. In Beijing, current problems with Tokyo, Hanoi, and Manila are top of mind. They dominate both the official media and the social media, and the latter have become particularly vitriolic. They also dominate discussions between Chinese officials and foreign visitors. The relationship with Japan in particular is front and center in virtually every official conversation as Chinese interlocutors probe what they identify as a profound change in both the tenor of Japanese domestic politics Beijing does not desire armed conflict with Japan over territorial disputes, but nonetheless makes clear that it has its own red lines that cannot be crossed for its own domestic reasons, and that it is prepared for any contingency. Like the Balkans a century ago, riven by overlapping alliances, loyalties, and hatreds, the strategic environment in East Asia is complex. At least six states or political entities are engaged in territorial disputes with China, three of which are close strategic partners of the United States. And there are multiple agencies involved from individual states: In China, for example, the International Crisis Group has calculated that eight different agencies are engaged in the South China Sea alone. Furthermore, these territorial claims -- and the minerals, energy, and marine resources at stake -- are vast. And while the United States remains mostly neutral, the intersection between the narrower interests of claimant states and the broader strategic competition between the United States and China is significant and not automatically containable. Complicating matters, East Asia increasingly finds itself being pulled in radically different directions. On the one hand, the forces of globalization are bringing its and the centrality of China within the Japanese debate. peoples, economies, and countries closer together than at any other time in history, as reflected in intraregional trade, which is now approaching 60 percent of total East Asian trade. On the the idea of armed conflict, which seems contrary to every element of rational self-interest for any nation-state enjoying the benefits of such unprecedented regional economic dynamism, has now become a terrifying, almost normal part of the regional conversation, driven by recent territorial disputes, but animated by deep-rooted cultural and historical resentments. Contemporary East Asia is a tale of these two very different worlds. The most worrying other hand, the forces of primitive, almost atavistic nationalisms are at the same time threatening to pull the region apart. As a result, fault lines run between China and Japan, and between China and Vietnam. In September 2012, the Japanese government purchased from a private owner three islands in the Senkakus, a small chain of islands claimed by both countries (the Chinese call the islands the Diaoyu). This caused China to conclude that Japan, which had exercised de facto administrative control over the islands for most of the last century, was now moving toward a more de jure exercise of sovereignty. In response, Beijing launched a series of what it called "combination punches": economic retaliation, the dispatch of Chinese maritime patrol vessels to the disputed areas, joint combat drills among the branches of its military, and widespread, occasionally violent public protests against Japanese diplomatic and commercial targets across China. As a result, Japanese exports to China contracted rapidly in the fourth quarter of 2012, and because Japan had already become China's largest trading partner, sliding exports alone are likely to be a significant contributive factor in what is projected to be a large contraction in overall Japanese economic growth in the same period. In mid-December, Japan claimed that Chinese aircraft intruded over Japanese airspace above the disputed islands for the first time since 1958. After a subsequent incident, Japan dispatched eight F-15 fighter planes to the islands. While both sides have avoided deploying naval assets, there is a growing concern of creeping militarization as military capabilities are transferred to coast guard-type vessels. While the "static" in Japanese military circles regarding China-related contingency planning has become increasingly audible, Prime Minister Shinzo Abe, who took office in mid-December, has sought to moderate his public language on China, apparently to send a diplomatic message that he wishes to restore stability to the relationship. This was reinforced by a conciliatory letter sent from Abe to Xi Jinping, China's new leader, on Jan. 25 during a visit to Beijing by the leader of New Komeito, the ruling Liberal Democratic Party's coalition partner. This has been publicly and privately welcomed in Beijing, as reflected in Xi's public remarks the following day. Beijing's position is that while it wants Japan to formally recognize the existence of a territorial dispute in order to fortify China's political and legal position on the future of the islands, it also wishes to see the Senkaku/Diaoyu dispute managed in a manner that does not threaten regional security, which would undermine the stability necessary to complete its core task of economic reform and growth. There may therefore be some softening in the China-Japan relationship for the immediate period ahead. But diplomatic and strategic realities appear to remain largely unchanged. The intensity of Abe and Japanese Foreign Minister Fumio Kishida's unprecedented mid-January diplomatic offensive involving visits to seven East Asian states demonstrates that the temperature between Beijing and Tokyo remains high -- just as the late January statement from Tokyo on the establishment of a special Japanese Coast Guard force of 12 enhanced vessels and 600 servicemen specifically dedicated to the Senkaku theater underlines the nature of the challenges lying ahead. The problem is that neither side can afford domestically to be seen as retreating from current positions. China believes that Japan has altered the status quo; Japan believes it has no need to budge because there is no sovereignty issue in the first place. All of this means that both sides remain captive to events on the high seas and in the air -events that could quickly spiral out of control. Asia conflict goes nuclear Dibb ‘1 (emeritus professor of strategic and defence studies at The Australian National University (Paul, Winter. “Strategic Trends: Asia at a Crossroads.” Naval War College Review, Vol. 54, Issue 1. Ebsco.) 64 areas of maximum danger and instability in the world today are in Asia, followed by the Middle East and parts of the former Soviet Union. The strategic situation in Asia is more uncertain and potentially threatening than anywhere in Europe. Unlike in Europe, it is possible to envisage war in Asia involving the major powers: remnants of Cold War ideological confrontation still exist across the Taiwan The Straits and on the Korean Peninsula; India and Pakistan have nuclear weapons and ballistic missiles, and these two countries are more confrontational than at any time since the early 1970s; in Southeast Asia, Indonesia--which is the world's fourth-largest country--faces a highly uncertain future that could lead to its breakup. The Asia-Pacific region spends more on defense (about $150 billion a year) than any other part of the world except the United States and Nato Europe. China and Japan are amongst the top four or five global military spenders. Asia also has more nuclear powers than any other region of the world. Asia's security is at a crossroads: the region could go in the direction of peace and cooperation, or it could slide into confrontation and military conflict. There are positive tendencies, including the resurgence of economic growth and the spread of democracy, which would encourage an optimistic view. But there are a number of negative tendencies that must be of serious concern. There are deep-seated historical, territorial, ideological, and religious the region has no history of successful multilateral security cooperation or arms control. Such multilateral institutions as the Association of Southeast Asian Nations and the ASEAN Regional Forum have shown themselves to be ineffective when confronted with major crises. differences in Asia. Also, 65 ISIS Module US-EU cooperation key to solve ISIS Lang et al. ’14 (Brian Katulis and Hardin Lang are Senior Fellows with the National Security and International Policy team at the Center for American Progress. Vikram Singh is the Vice President for National Security and International Policy. Defeating ISIS: An Integrated Strategy to Advance Middle East Stability Syria SOURCE: AP Members of the Islamic State of Iraq and al-Sham, or ISIS, are seen in Raqqa, Syria. By Brian Katulis, Hardin Lang, and Vikram Singh | September 10, 2014 A transatlantic and allied response to ISIS The September 2014 NATO summit took several steps to energize the transatlantic community to confront ISIS. Nine countries pledged to join U.S. efforts to counter ISIS, but no specific commitments were made. And as evidenced over the past few years in Afghanistan and Libya, follow through on commitments is essential. Further, the United States and its Western partners need to proactively manage the dangers posed by European and American citizens now fighting alongside ISIS. The United States should work with its transatlantic partners and traditional allies to: Enable reliable and capable partners in the region to take the fight directly to ISIS. The United States is providing the greatest support to forces fighting ISIS. NATO and other U.S. allies should together develop a strategy to help the region counter ISIS with technical support and military assistance. This should include specific commitments to provide support to the Iraqi government, Kurdish forces, and third-way opposition alternatives to the Assad regime and ISIS in Syria. Enhance law enforcement and intelligence fusion efforts to identify and counter ISIS and other terrorist fighters holding Western passports. This should build on existing U.S.-European efforts in coordination with the International Criminal Police Organization, or INTERPOL. More than 12,000 foreign fighters are estimated to have flocked to Iraq and Syria. According to intelligence agencies and outside experts, one-quarter of these With an estimated 3,000 individuals, including perhaps 500 each from Britain and France, the dangers of extremists coming home to continue the fight with acts of terrorism cannot be ignored. Western countries should partner with allies in the Middle East and local communities on counter-radicalization efforts. fighters come from Western countries. ISIS triggers World War 3 Corre ’14 (Addam Corre 6-17-14, Inquisitr writer, “World War 3: Forget Ukraine, Iraq Is The Most Likely Flash Point”, Inquisitr, 06/17/2014, http://www.inquisitr.com/1303680/world-war-3-forget-ukraine-iraq-is-the-most-likely-flash-point/ Over the past few months speculation has been rife that the events in Ukraine could trigger the next World War. Numerous articles have proclaimed that to be the most likely scenario. But is ISIS – has created a new situation on the ground which has a far greater potential for setting off a world conflict than Ukraine could ever have. Despite all the it? The actions of the Islamic militant group calling itself ” The Islamic State of Iraq and Syria” – or world posturing and tut-tutting about the Crimea, it is, after all, simply a piece of land whose ownership is disputed. Viewed objectively, given the demographic structure of the area, the Russians have at least an arguable case to justify its annexation. Whether the fears of the local Russian speaking population were real or imagined, it’s now a fait-accompli, and no one is going to do anything to change the situation any time soon. Even that the expansion of Russian interests in other parts of Ukraine have similar elements of justification, which might keep the the situation in the Middle East is completely different. It is far more volatile and dangerous because it is not really a question of land. What the world is witnessing, not diplomats busy for a few months, but are unlikely to include any significant military dimension. But for the first time – and certainly not for the last – is a clash of ideologies within Islam. Some may feel that while they are busy butchering and beheading each other at least they are not a threat to the rest of the world. That is mistaken and shortsighted thinking. With every passing year, the theories of Samuel P. Huntington that people’s cultural and religious identities will be the primary source of conflict in the post-Cold War world, gain even more credence. Huntington’s concept, which he aptly termed “The Clash of Civilizations” was first proposed in 1992. Since then, the world has witnessed with growing horror the expansion of ever increasingly radical Islamic groups in almost every corner of the globe. Islamic militant groups are active in Somalia, Afghanistan, Pakistan, Syria, Nigeria, Kenya, Lebanon, The Palestinian territories, and Gaza, just to list a few. Although Russia nominally crushed the Islamists of Chechnya, remnants of them still manage the odd bombing atrocity in Russia. Islamic activity in China also appears to have been suppressed, but facts from there are almost impossible to verify. But Islamic extremism and terrorism is not confined to countries with mainly Muslim populations. From the attack on the Twin Towers in New York to the London bus bombings to the Madrid train bombings, Islam carried its war to the rest of the world. And the world cleaned up the sites, mourned – and moved on. Some might argue that the U.S., and one or two other countries, tried to do something about those atrocities by invading Iraq, toppling Saddam Hussein, fighting the Taliban in Afghanistan and (eventually) killing their leader, Osama bin-Laden. History will judge whether those actions of ISIS trigger a third world war? It all depends on which group, or groups, the major powers ally themselves with and support diplomatically, financially, or militarily. We are today tactics succeeded or not; currently, the legacy is not looking too good. Why could the witnessing the truth of the adage that adversity makes strange bedfellows. Even a week ago, who could have envisaged a scenario in which the U.S. and Iran could share a mutual interest, and Apart from the fact that Russia, and sometimes China, have an almost knee-jerk reaction against any direction the U.S. might take in the international arena, Israel is the wild card in the possibly support each other in actions against ISIS? 66 pack. If it senses that – for whatever reason – the U.S. and Iran will find themselves allies, it will understand that the U.S. will be constrained in taking further action against Iran regarding its efforts to manufacture a nuclear bomb. Facing such a situation, The Israeli government may feel that he window of opportunity to take military action against Iran is rapidly closing. Although, until now, the prevailing belief has been that Israel could not act alone – and succeed – it could be, and probably is the fact, that Israel will be left with no alternative. Diplomatic efforts to stop the Iranian nuclear program have palpably failed. The danger of such a course of action is that it would almost certainly result in the Islamist factions stopping their mutual bloodletting in order to confront their joint enemy, Israel. From that point, it does not require too much imagination to project what will be the effect of world and regional governments aligning themselves with one side or the other. World War 3 starting in the Middle East as an indirect result of the actions of ISIS is not such a fanciful prediction! Unchecked ISIS causes extinction Brent Budowsky 8/22, LL.M. degree in international financial law from the London School of Economics, former aide to former Sen. Lloyd Bentsen and Bill Alexander, then chief deputy majority whip of the House, “ISIS poses nuclear 9/11 threat”, 2014, http://www.opednews.com/articles/ISIS-poses-nuclear-9-11-th-by-Brent-Budowsky-ISI_Military_Nuclear_insanity_Threat-To-World-Peace140822-911.html After the latest grotesque atrocity by the Islamic State in Iraq and Syria (ISIS), the beheading of an American journalist, American and European policymakers must clearly understand the near certainty that unless it is defeated and ISIS will launch a major terror attack on American or European soil. Analysts estimate that ISIS has amassed a cash hoard of between $400 million and $2 billion. It is highly probable that ISIS will attempt to use some of this money to obtain nuclear, chemical, biological or other weapons of mass death on the international black market or from corrupt officials in nations such as Russia, China, Pakistan or North Korea to use in attacks against New York, Washington, London, Paris, Berlin, Rome, Brussels or other nations it considers infidel enemies. This danger is magnified by the fact that ISIS has recruited nationals of the United States and Europe, who possess American and European passports and are physically indistinguishable from local populations in America and Europe. It is extraordinary that the mass murdering butchery of ISIS is so demented than even al Qaeda is offended. It is alarming that the CIA, destroyed, which launched intelligence operations even against the United States Senate, and the NSA, which launched massive and unprecedented eavesdropping operations, and intelligence services of leading European nations were blind the most barbaric terrorists in modern history had taken over almost a third of Iraq and are on the brink of creating a terrorist super-state that dwarfs al Qaeda's efforts prior to 9/11. I vehemently to the magnitude of the ISIS threat until opposed the misguided Iraq War from the moment it was proposed by former President George W. Bush and have never been a neoconservative, warmonger or super-hawk. But aggressive action against ISIS is urgently needed. ISIS has stated its intention to attack the United States and Europe to advance its evil, messianic and genocidal ideology and ambitions. ISIS has the money to purchase the most deadly weapons in the world, and has recruited American and European traitors with above-average capability to execute an attack. The odds that ISIS can obtain nuclear, chemical, biological or other forms of mass destruction weapons are impossible to ascertain but in a world of vast illegal arms trafficking, with so many corrupt officials in nations possessing arsenals of destruction, the danger is real. The fact that WMD scares prior to the Iraq War ranged from mistaken to deceitful does not mean that the WMD danger does not exist today. It does. I applaud the recent actions taken by President Obama. Obama's airstrikes saved tens of thousands of Yazidis from genocide, took back the Mosul Dam from ISIS and saved countless Iraqis, Kurds and Syrians from slaughter. The airstrikes inflicted material damage to ISIS. The diplomacy of Obama and Secretary of State John Kerry contributed mightily to the replacement of a disastrous Iraqi government by a government can unite Iraqi Sunnis, Shiites and Kurds. The Obama-Kerry initiatives will lead to the creation of a stable Afghan government and avoid the collapse that was possible after the recent controversial Afghan elections. These are real successes. In the current political climate, Obama seems to get credit for nothing, but he deserves great the danger of ISIS pulling off a nuclear, chemical, biological or other mass death 9/11-style attack in a major American or European city is real. Even with dirty or primitive WMD weapons, the casualty totals could be catastrophic. ISIS must be defeated and destroyed. This will not be achieved with "boots on the ground" proxies from Iraqi or credit for some important successes in recent weeks. And yet Kurd forces alone, though Kurdish forces should immediately receive strong military assistance. America should not initiate another massive Iraq ground war. What is needed is a multinational special ops strike force made up of 10,000 troops from NATO nations and possibly Arab League nations. 67 North Korea Module US EU relations are key to solve North Korea and Iran conflict and nuclearization Stivachtis ’10 -- Professor of Poli Sci & Ph.D. in Politics & International Relations from Lancaster University Yannis Stivachtis 10, Director of International Studies Program @ Virginia Polytechnic Institute & State University A. Stivachtis (Professor of Poli Sci & Ph.D. in Politics & International Relations from Lancaster University), THE IMPERATIVE FOR TRANSATLANTIC COOPERATION,” The Research Institute for European and American Studies, 2010, pg. http://www.rieas.gr/research-areas/global-issues/transatlantic-studies/78.html There is no doubt that US-European relations are in a period of transition , and that the stresses and strains of globalization are increasing both the number and the seriousness of the challenges that confront transatlantic relations. The events of 9/11 and the Iraq War have added significantly to these stresses and strains. At the same time, international terrorism, the nuclearization of North Korea and especially Iran, the proliferation of weapons of mass destruction (WMD), the transformation of Russia into a stable and cooperative member of the international community, the growing power of China, the political and economic transformation and integration of the Caucasian and Central Asian states, the integration and stabilization of the Balkan countries, the promotion of peace and stability in the Middle East, poverty, climate change, AIDS and other emergent problems and situations require further cooperation among countries at the regional, global and institutional levels. Therefore, cooperation between the U.S. and Europe is more imperative than ever to deal effectively with these problems. It is fair to say that the challenges of crafting a new relationship between the U.S. and the EU as well as between the U.S. and NATO are more regional than global, but the implications of success or failure will be global. The transatlantic relationship is still in crisis, despite efforts to improve it since the Iraq War. This is not to say that differences between the two sides of the Atlantic did not exist before the war. Actually, post-1945 relations between Europe and the U.S. were fraught with disagreements and never free of crisis since the Suez crisis of 1956. Moreover, despite trans-Atlantic proclamations of solidarity in the aftermath of 9/11, the U.S. and Europe parted ways on issues from global warming and biotechnology to peacekeeping and national missile defense. Questions such as, the future role of NATO and its relationship to the common European Security and Defense policy (ESDP), or what constitutes terrorism and what the rights of captured suspected terrorists are, have been added to the list of US-European disagreements. There are two reasons for concern regarding the transatlantic rift. First, if European leaders conclude that Europe must become counterweight to the U.S., rather than a partner, it will be difficult to engage in the kind of open search for a common ground than an elective partnership requires. Second, there is a risk that public opinion in both the U.S. and Europe will make it difficult even for leaders who want to forge a new relationship to make the necessary accommodations. If both sides would actively work to heal the breach, a new opportunity could be created. A vibrant transatlantic partnership remains a real possibility, but only if both sides make the necessary political commitment. There are strong reasons to believe that the security challenges facing the U.S. and Europe are more shared than divergent. The most dramatic case is terrorism. Closely related is the common interest in halting the spread of weapons of mass destruction and the nuclearization of Iran and North Korea. This commonality of threats is clearly perceived by publics on both sides of the Atlantic. Actually, Americans and Europeans see eye to eye on more issues than one would expect from reading newspapers and magazines. But while elites on both sides of the Atlantic bemoan a largely illusory gap over the use of military force, biotechnology, and global warming, surveys of American and European public opinion highlight sharp differences over global leadership, defense spending, and the Middle East that threaten the future of the last century’s most successful alliance. There are other important, shared interests as well. The transformation of Russia into a stable cooperative member of the international community is a priority both for the U.S. and Europe. They also have an interest in promoting a stable regime in Ukraine. It is necessary for the U.S. and EU to form a united front to meet these challenges because first, there is a risk that dangerous materials related to WMD will fall into the wrong hands; and second, the spread of conflict along those countries’ periphery could destabilize neighboring countries and provide safe havens for terrorists and other international criminal organizations. Likewise, in the Caucasus and Central Asia both sides share a stake in promoting political and economic transformation and integrating these states into larger communities such as the OSCE. This would also minimize the risk of instability spreading and prevent those countries of becoming havens for international terrorists and criminals. Similarly, there is a common interest in integrating the Balkans politically and economically. Dealing with Iran, Iraq, Lebanon, and the Israeli-Palestinian conflict as well as other political issues in the Middle East are also of a great concern for both sides although the U.S. plays a dominant role in the region. Finally, US-European cooperation will be more effective in dealing with the rising power of China through engagement but also containment. The post Iraq War realities have shown that it is no longer simply a question of adapting transatlantic institutions to new realities. The changing structure of relations between the U.S. and Europe implies that a new basis for the relationship must be found if transatlantic cooperation and partnership is to continue. The future course of relations will be determined above all by U.S. policy towards Europe and the Atlantic Alliance. Wise 68 policy can help forge a new, more enduring strategic partnership, through which the two sides of the Atlantic cooperate in meeting the many major challenges and opportunities of the evolving world together. But a policy that takes Europe for granted and routinely ignores or even belittles European concerns, may force Europe to conclude that the costs of continued alliance outweigh its benefits. Unchecked North Korea nuclearization causes nuclear war and extinction Hayes & Hamel-Green ’10 -- Victoria University AND **Executive Director of the Nautilus Institute (Peter and Michael, “-“The Path Not Taken, the Way Still Open: Denuclearizing the Korean Peninsula and Northeast Asia”, 1/5) The consequences of failing to address the proliferation threat posed by the North Korea developments, and related political and economic issues, are serious, not only for the Northeast Asian region but for the whole international community. At worst, there is the possibility of nuclear attack1, whether by intention, miscalculation, or merely accident, leading to the resumption of Korean War hostilities. On the Korean Peninsula itself, key population centres are well within short or medium range missiles. The whole of Japan is likely to come within North Korean missile range. Pyongyang has a population of over 2 million, Seoul (close to the North Korean border) 11 million, and Tokyo over 20 million. Even a limited nuclear exchange would result in a holocaust of unprecedented proportions. But the catastrophe within the region would not be the only outcome. New research indicates that even a limited nuclear war in the region would rearrange our global climate far more quickly than global warming. Westberg draws attention to new studies modelling the effects of even a limited nuclear exchange involving approximately 100 Hiroshima-sized 15 kt bombs2 (by comparison it should be noted that the United States currently deploys warheads in the range 100 to 477 kt, that is, individual warheads equivalent in yield to a range of 6 to 32 Hiroshimas).The studies indicate that the soot from the fires produced would lead to a decrease in global temperature by 1.25 degrees Celsius for a period of 6-8 years.3 In Westberg’s view: That is not global winter, but the nuclear darkness will cause a deeper drop in temperature than at any time during the last 1000 years. The temperature over the continents would decrease substantially more than the global average. A decrease in rainfall over the continents would also follow...The period of nuclear darkness will cause much greater decrease in grain production than 5% and it will continue for many years...hundreds of millions of people will die from hunger...To make matters even worse, such amounts of smoke injected into the stratosphere would cause a huge reduction in the Earth’s protective ozone.4 These, of course, are not the only consequences. Reactors might also be targeted, causing further mayhem and downwind radiation effects, superimposed on a smoking, radiating ruin left by nuclear next-use. Millions of refugees would flee the affected regions. The direct impacts, and the follow-on impacts on the global economy via ecological and food insecurity, could make the present global financial crisis pale by comparison. How the great powers, especially the nuclear weapons states respond to such a crisis, and in particular, whether nuclear weapons are used in response to nuclear first-use, could make or break the global non proliferation and disarmament regimes. There could be many unanticipated impacts on regional and global security relationships5, with subsequent nuclear breakout and geopolitical turbulence, including possible loss-of-control over fissile material or warheads in the chaos of nuclear war, and aftermath chain-reaction affects involving other potential proliferant states. The Korean nuclear proliferation issue is not just a regional threat but a global one that warrants priority consideration from the international community 69 Iran Talks Module US EU relations are key to solve Iran talks Pollard ’14 -- Robert Pollard is a State Department visiting fellow with the Europe Program at the Center for Strategic and International Studies (CSIS)(By Robert A. Pollard MAR 14, 2014 Robert Pollard is a State Department visiting fellow with the Europe Program at the Center for Strategic and International Studies (CSIS) in Washington, D.C.) If the recent crisis in Ukraine has brought home one clear message, it is this: policy unity between the United States and the European Union is absolutely essential. NATO will remain the first place where the United States will turn due to our treaty obligations and our status as a member. Yet the European Union is an increasingly important player in the transatlantic policy discourse, and Washington has been slow to fully recognize it. Therefore, it is very timely and fitting that, for the first time in his presidency, Barack Obama will visit Brussels on March 26 for the U.S.-EU summit. That said, while the EU leadership is eagerly awaiting the meeting, the history of U.S.-EU summits has been long on aspirations and short on achievements. So what can we reasonably expect from this, the first transatlantic summit in over two years? The Unfinished Agenda First, let’s look at the score card from the last summit in Washington. Measured against the official declaration issued at the end of the meeting, the track record is not bad. One major achievement was the decision to set up a High-Level Working Group on Jobs and Growth, which ultimately resulted in the launch of negotiations on the Transatlantic Trade and Investment Partnership (TTIP). It is easy to forget, but at the time, it was not a foregone conclusion that the two sides would go ahead with such a comprehensive free trade agreement, a goal that had eluded decisionmakers for literally decades. One downside: the inauguration of TTIP meant that the preexisting Transatlantic Economic Council was virtually disbanded, meaning that ongoing efforts to cut back costly regulatory barriers to trade and investment were largely put on hold for the duration of the trade talks. Another bright spot was Iran. After the Washington summit, the United States and European Union spearheaded extraordinary international cooperation on sanctions, including a nearly total oil embargo that helped force Tehran to the negotiating table. No one is ready to declare victory, but transatlantic cooperation in this instance showed that economic sanctions can work if the United States and its European allies pull together. Iran prolif causes nuclear war Montgomery ‘11 -- research fellow at the CSBA (Eric Edelman, distinguished fellow at the center for strategic and budgetary assessments, Andrew Krepinevich, President of the CSBA, evan montgomery, research fellow at the CSBA “Why Obama Should Take Out Iran's Nuclear Program,”) Even so, the U.S. government might persist with its existing approach if it believes that the consequences of a nuclear-armed Iran are manageable through a combination of containment and deterrence. In fact, the Obama administration has downplayed the findings of the new IAEA report, suggesting that a change in U.S. policy is unlikely. Yet this view underestimates the challenges that the United States would once Iran acquired nuclear weapons. For example, the Obama administration should not discount the possibility of an Israeli-Iranian nuclear conflict. From the very start, the nuclear balance between these two antagonists would be unstable. Because of the significant disparity in the sizes of their respective arsenals (Iran would have a handful of warheads compared to Israel's estimated 100-200), both sides would have huge confront incentives to strike first in the event of a crisis. Israel would likely believe that it had only a short period during which it could launch a nuclear attack that would wipe out most, if not all, of Iran's weapons and much of its nuclear infrastructure without Tehran being able to retaliate. For absence of early warning systems on both sides and the extremely short flight time for ballistic missiles heading from one country to the other would only heighten the danger. Decision-makers would be under tremendous pressure to act quickly. Beyond regional nuclear war, Tehran's acquisition of these weapons could be a catalyst for additional proliferation throughout its part, Iran might decide to use its arsenal before Israel could destroy it with a preemptive attack. The 70 the Middle East and beyond. Few observers have failed to note that the United States has treated nuclear-armed rogues, such as North Korea, very differently from non-nuclear ones, such as Iraq and Libya. If Iran became a nuclear power and the United States reacted with a policy of containment, nuclear weapons would only be more appealing as the ultimate deterrent to outside intervention. Meanwhile, Iran's rivals for regional dominance, such as Turkey, Egypt, and Saudi Arabia, might seek their own nuclear devices to counterbalance Tehran. The road to acquiring nuclear weapons is generally a long and difficult one, but these nations might have shortcuts. Riyadh, for example, could exploit its close ties to Islamabad -- which has a history of illicit proliferation and a rapidly expanding nuclear arsenal -- to become a nuclear power almost overnight. 71 Generic Terrorism/Prolif Module Cooperation with Europe solves nuclear terror and prolif Stivachtis 10 – Director of International Studies Program @ Virginia Polytechnic Institute & State University [Dr. Yannis. A. Stivachtis (Professor of Poli Sci & Ph.D. in Politics & International Relations from Lancaster University), THE IMPERATIVE FOR TRANSATLANTIC COOPERATION,” The Research Institute for European and American Studies, 2010, pg. http://www.rieas.gr/research-areas/globalissues/transatlantic-studies/78.html] There is no doubt that US-European relations are in a period of transition, and that the stresses and strains of globalization are increasing both the number and the seriousness of the challenges that confront transatlantic relations. The events of 9/11 and the Iraq War have added significantly to these stresses and strains. At the same terrorism, the nuclearization of North Korea and especially Iran, the proliferation of weapons of mass destruction (WMD), the transformation of Russia into a stable and cooperative member of the international community, the growing power of China, the political and economic transformation and integration of the Caucasian and Central Asian states, the integration and stabilization of the Balkan countries, the promotion of peace and stability in the Middle East, poverty, climate change, AIDS and other emergent problems and situations require further cooperation among countries at the regional, global and institutional levels. Therefore, cooperation between the U.S. and Europe is more imperative than ever to deal effectively with these problems. It is fair to say that the challenges of crafting a new relationship between the U.S. and the EU as well as between the U.S. and NATO are more regional than global, but the implications of success or failure will be global. The transatlantic relationship is still in crisis, time, international despite efforts to improve it since the Iraq War. This is not to say that differences between the two sides of the Atlantic did not exist before the war. Actually, post-1945 relations between Europe and the U.S. were fraught with disagreements and never free of crisis since the Suez crisis of 1956. Moreover, despite trans-Atlantic proclamations of solidarity in the aftermath of 9/11, the U.S. and Europe parted ways on issues from global warming and biotechnology to peacekeeping and national missile defense. Questions such as, the future role of NATO and its relationship to the common European Security and Defense policy (ESDP), or what constitutes terrorism and what the rights of captured suspected terrorists are, have been added to the list of US-European disagreements. There are two reasons for concern regarding the transatlantic rift. First, if European leaders conclude that Europe must become counterweight to the U.S., rather than a partner, it will be difficult to engage in the kind of open search for a common ground than an elective partnership requires. Second, there is a risk that public opinion in both the U.S. and Europe will make it difficult even for leaders who want to forge a new relationship to make the necessary accommodations. If both sides would actively work to heal the breach, a new A vibrant transatlantic partnership remains a real possibility, but only if both sides make the necessary political commitment. There are strong reasons to believe that the security challenges facing the U.S. and Europe are more shared opportunity could be created. than divergent. The most dramatic case is terrorism. Closely related is the common interest in halting the spread of weapons of mass destruction and the nuclearization of Iran and North Korea. This commonality of threats is clearly perceived by publics on both sides of the Atlantic. Actually, Americans and Europeans see eye to eye on more issues than one would expect from reading newspapers and magazines. But while elites on both sides of the Atlantic bemoan a largely illusory gap over the use of military force, biotechnology, and global warming, surveys of American and European public opinion highlight sharp differences over global leadership, defense spending, and the Middle East that threaten the future of the last century’s most successful There are other important, shared interests as well. The transformation of Russia into a stable cooperative member of the international community is a priority both for the U.S. and Europe. They also have an interest in promoting a stable regime in Ukraine. It is necessary for the U.S. and EU to form a united front to meet these challenges because first, there is a risk that dangerous materials related to WMD will fall into the wrong hands; and second, the spread of conflict along those countries’ periphery could destabilize neighboring countries and provide safe havens for terrorists and other international criminal organizations. Likewise, in the Caucasus and Central Asia both sides share a stake in promoting political and economic transformation and integrating these states into larger communities such as alliance. the OSCE. This would also minimize the risk of instability spreading and prevent those countries of becoming havens for international terrorists and criminals. Similarly, there is a common interest in integrating the Balkans politically and economically. Dealing with Iran, Iraq, Lebanon, and the Israeli-Palestinian conflict as well as other political issues in the Middle East are also of a great concern for both sides although the U.S. plays a dominant role in the region. Finally, US-European cooperation will be more effective in dealing with the rising power of China through engagement but also containment. The post Iraq War realities have shown that it is no longer simply a question of adapting transatlantic institutions to new realities. The changing structure of relations between the U.S. and Europe implies that a new basis for the relationship must be found if transatlantic cooperation and partnership is to continue. The future course of relations will be determined above all by U.S. policy towards Europe and the Atlantic Alliance. Wise policy can help forge a new, more enduring strategic partnership, through which the two sides of the a policy that takes Europe for granted and routinely ignores or even belittles European concerns, may force Europe to conclude that the costs of continued alliance outweigh its benefits. Atlantic cooperate in meeting the many major challenges and opportunities of the evolving world together. But Nuclear terrorism is highly likely Plame ’14 (Nuclear terrorism: Most immediate and extreme threat to global security 143686 2 By Valerie Plame - 09/26/14 07:00 AM EDT A former career covert CIA operations officer, Plame worked to protect U.S. national security and prevent the proliferation of weapons of mass destruction. She is now a New York Times best-selling author and a leader of the international Global Zero movement for the elimination of all nuclear weapons. 72 Yet this mounting violence and instability pales in comparison to what could be wrought by nucleararmed terrorists. We know that the Islamic State group has the means and motive to attain weapons of mass destruction. They have an appetite for shocking demonstrations and indiscriminate killing, and have already seized low-grade nuclear material from a facility in Mosul. They are acquiring the ability to build radioactive dirty bombs that could cause major health and economic damage. With reports of escalating funding and recruitment of citizens from every continent, and ties to radicals in nuclear weapons-states such as Pakistan, it is increasingly conceivable that weapons-grade materials – or even a ready-made nuclear device – could fall into their hands. If that happens, they would not hesitate to use them – possibly at a cost of hundreds of thousands of lives. There are more than 16,000 nuclear weapons in the world and enough highly-enriched uranium and plutonium to make hundreds of thousands more. We can do our best to prevent isolated incidents in which terrorists buy, build or steal them – but those efforts are stop-gap at best, and we won’t know if we missed something until it’s too late. Nuclear terrorism is all but inevitable unless we work quickly and urgently to secure all nuclear materials and eradicate all nuclear weapons. To eliminate the risk we have to drain the swamp. Terrorism causes full scale nuclear wars Hellman ‘8 (Martin E. Hellman* * Martin E. Hellman is a member of the National Academy of Engineering and Professor Emeritus at Stanford University. His current project applies risk analysis to nuclear deterrence Nuclear proliferation and the specter of nuclear terrorism are creating additional possibilities for triggering a nuclear war. If an American (or Russian) city were devastated by an act of nuclear terrorism, the public outcry for immediate, decisive action would be even stronger than Kennedy had to deal with when the Cuban missiles first became known to the American public. While the action would likely not be directed against Russia, it might be threatening to Russia (e.g., on its borders) or one of its allies and precipitate a crisis that resulted in a full-scale nuclear war. Terrorists with an apocalyptic mindset might even attempt to catalyze a full-scale nuclear war by disguising their act to look like an attack by the U.S. or Russia. Prolif causes extinction- it will be fast and dangerous Kroenig ’12 (Matthew Kroenig: The History of Proliferation Optimism: Does It Have A Future? NPEC asked Council on Foreign Relations Stanton Nuclear Security Fellow and Georgetown University assistant professor of government Matthew Kroenig to review the bidding. His take and bottom line is that such nuclear optimism always was strained, that it remains far less popular out of academe than in and with cause. May 26, 2012 AUTHOR: Matthew Kroenig: Assistant Professor of Government, Georgetown University and Stanton Nuclear Security Fellow, Council on Foreign Relations The History of Proliferation Optimism (PDF) 173.80 KB The History of Proliferation Optimism: Does It Have A Future? Prepared for the Nonproliferation Policy Education Center) The greatest threat posed by the spread of nuclear weapons is nuclear war. The more states in possession of nuclear weapons, the greater the probability that somewhere, someday, there is a catastrophic nuclear war. A nuclear exchange between the two superpowers during the Cold War could have arguably resulted in human extinction and a nuclear exchange between states with smaller nuclear arsenals, such as India and Pakistan, could still result in millions of deaths and casualties, billions of dollars of economic devastation, environmental degradation, and a parade of other horrors. To date, nuclear weapons have only been used in warfare once. In 1945, the United States used one nuclear weapon each on Many analysts point to sixty-five-plus-year tradition of nuclear non-use as evidence that nuclear weapons are unusable, but it would be naïve to think that nuclear weapons will never be used again. After all, analysts in the 1990s argued that worldwide economic downturns like the great depression were a thing of the past, only to be surprised by the dot-com bubble bursting in the later 1990s and the Great Recession of the late Naughts.[53] This author, for one, would be surprised if nuclear weapons are not used in my lifetime. Before reaching a state of MAD, new nuclear states go through a transition period in which they lack a secure-second strike capability. In this context, one or both states might believe that it has an incentive to use nuclear weapons first. For example, if Iran acquires nuclear weapons neither Iran, nor its nuclear-armed rival, Israel, will have a secure, secondHiroshima and Nagasaki, bringing World War II to a close. strike capability. Even though it is believed to have a large arsenal, given its small size and lack of strategic depth, Israel might not be confident that it could absorb a nuclear strike and respond 73 , when it first crosses the nuclear threshold, Tehran will have a small and vulnerable nuclear force. In these pre-MAD situations, there are at least three ways that nuclear war could occur. First, the state with the nuclear advantage might believe it has a splendid first strike capability. In a crisis, Israel might, therefore, decide to launch a preemptive nuclear strike to disarm Iran’s nuclear capabilities and eliminate the threat of nuclear war against Israel. Indeed, this incentive might be further increased by Israel’s aggressive strategic culture that emphasizes preemptive action. Second, the state with a small and vulnerable nuclear arsenal, in this case Iran, might feel use ‘em or loose ‘em pressures. That is, if Tehran believes that Israel might launch a preemptive strike, Iran might decide to strike first rather than risk having its entire nuclear arsenal destroyed. Third, as Thomas Schelling has argued, nuclear war could result due to the reciprocal fear of surprise attack.[54] If there are advantages to with a devastating counterstrike. Similarly, Iran might eventually be able to build a large and survivable nuclear arsenal, but striking first, one state might start a nuclear war in the belief that war is inevitable and that it would be better to go first than to go second. In a future Israeli-Iranian crisis, for example, Israel and Iran might both prefer to avoid a nuclear war, but decide to strike first rather than suffer a devastating first attack from an opponent. Even in a world of MAD, there is a risk of nuclear war. Rational deterrence theory assumes nuclear-armed states are governed by rational leaders that would not intentionally launch a suicidal nuclear war. This assumption appears to have applied to past and current nuclear powers, but there is no guarantee that it will continue to hold in the future. For example, Iran’s theocratic government, despite its inflammatory rhetoric, has followed a fairly pragmatic foreign policy since 1979, but it contains We cannot rule out the possibility that, as nuclear weapons continue to spread, one leader will choose to launch a nuclear war, knowing full well that it could result in self-destruction. One does not need to resort to irrationality, however, to imagine a nuclear leaders who genuinely hold millenarian religious worldviews who could one day ascend to power and have their finger on the nuclear trigger. war under MAD. Nuclear weapons may deter leaders from intentionally launching full-scale wars, but they do not mean the end of international politics. As was discussed above, nucleararmed states still have conflicts of interest and leaders still seek to coerce nuclear-armed adversaries. This leads to the credibility problem that is at the heart of modern deterrence theory: how can you threaten to launch a suicidal nuclear war? Deterrence theorists have devised at least two answers to this question. First, as stated above, leaders can choose to launch a limited nuclear war.[55] This strategy might be especially attractive to states in a position of conventional military inferiority that might have an incentive to escalate a crisis quickly. During the Cold War, the United States was willing to use nuclear weapons first to stop a Soviet invasion of Western Europe given NATO’s conventional inferiority in continental Europe. As Russia’s conventional military power has deteriorated since the end of the Cold War, Moscow has come to rely more heavily on nuclear use in its strategic doctrine. Indeed, Russian strategy calls for the use of nuclear weapons early in a conflict (something that most Western strategists would consider to be escalatory) as a way to de-escalate a crisis. Similarly, Pakistan’s military plans for nuclear use in the event of an invasion from conventionally stronger India. And finally, Chinese generals openly talk about the possibility of nuclear use against a U.S. superpower in a possible East Asia contingency. Second, as was also discussed above leaders can make a “threat that leaves something to chance.”[56] They can initiate a nuclear crisis. By playing these risky games of nuclear brinkmanship, states can increases the risk of nuclear war in an attempt to force a less resolved adversary to back down. Historical crises have not resulted in nuclear war, but many of them, including the 1962 Cuban Missile Crisis, have come close. And scholars have documented historical incidents when accidents could have led to war.[57] When we think about future nuclear crisis dyads, such as India and Pakistan and Iran and Israel, there are fewer sources of stability that existed during the Cold War, meaning that there is a very real risk that a future Middle East crisis could result in a devastating nuclear exchange. Nuclear terrorism. The spread of nuclear weapons also increases the risk of nuclear terrorism.[58] It used to be said that “terrorists want a lot of people watching, not a lot of people dead,” but the terrorist attacks of September 11, 2001 changed expert perceptions of the terrorist threat.[59] September 11th demonstrated that Al Qaeda and other modern terrorist groups are interested in imposing massive casualties and there are few better ways of killing large numbers of civilians than detonating a nuclear weapon in a major metropolitan area. And, while September 11th was one of the greatest tragedies in American history, it would have been much worse had Osama Bin Laden been able to acquire nuclear weapons. Osama Bin Laden declared it a “religious duty” for Al Qaeda to acquire nuclear weapons and radical clerics have issued fatwas declaring it permissible to use nuclear weapons in Jihad against the West.[60] Unlike states, which can be deterred, there is little doubt that if terrorists acquired nuclear weapons, they would use them. Indeed, in recent years, many U.S. politicians and security analysts have agreed that nuclear terrorism poses the greatest threat to U.S. national security.[61] Wanting nuclear weapons and actually possessing them, however, are two different things and many analysts have pointed out the tremendous hurdles that terrorists would have to overcome in order to acquire nuclear weapons.[62] Nevertheless, as nuclear weapons spread, the possibility that they will eventually fall into terrorist hands increases. States could intentionally transfer nuclear weapons, or the fissile material required to build them, to terrorist groups. There are good reasons why a state might be reluctant to transfer nuclear weapons to terrorists, but, as nuclear weapons spread, the possibility that a leader might someday purposely arm a terrorist group with nuclear weapons increases. Some fear, for example, that Iran, with its close ties to Hamas and Hezbollah, might be at a heightened risk of transferring nuclear weapons to terrorists. Moreover, even if no state would ever intentionally transfer nuclear capabilities to terrorists, a new nuclear state, with underdeveloped security procedures, might be vulnerable to theft, allowing terrorist groups or corrupt or ideologically-motivated insiders to transfer dangerous material to terrorists. There is evidence, for example, that representatives from Pakistan’s atomic energy establishment met with Al Qaeda members to discuss a possible nuclear deal.[63] Finally, a nuclear-armed state could collapse, resulting in a breakdown of law and order and a loose nuclear weapons problem. U.S. officials are currently very concerned about what would happen with Pakistan’s nuclear weapons if the government were to fall. As nuclear weapons spread, this problem is only further amplified. Iran is a country with a history of revolutions and a government with a tenuous hold on power. The regime change that Washing has long dreamed about in Tehran could actually become a nightmare if Iran had nuclear weapons and a break down in authority forced us to worry about the fate of Iran’s nuclear arsenal. Regional instability: The spread of nuclear weapons also emboldens nuclear powers contributing to regional instability. States that lack nuclear weapons need to fear direct military attack from other states, but states with nuclear weapons can be confident that they can deter an intentional military attack, giving them an incentive to be more aggressive in the conduct of their foreign policy. In this way, nuclear weapons provide a shield under which states can feel free to engage in lower-level aggression. Indeed, international relations theories about the “stability-instability paradox” maintain that stability at the nuclear level contributes to conventional instability.[64] Historically, we have seen that the spread of nuclear weapons has emboldened their possessors and contributed to regional instability. Recent scholarly analyses have demonstrated that, after controlling for other relevant factors, nuclear-weapon states are more likely to engage in conflict than nonnuclear-weapon states and that this aggressiveness is more pronounced in new nuclear states that have less experience with nuclear diplomacy.[65] Similarly, research on internal decision-making in Pakistan reveals that Pakistani foreign policymakers may have been emboldened by the acquisition of nuclear weapons, which encouraged them to initiate militarized disputes against India.[66] Currently, Iran restrains its foreign policy because it fears a major military retaliation from the United States or Israel, but with nuclear weapons it could feel free to push harder. A nuclear-armed Iran would likely step up support to terrorist and proxy groups and engage in more aggressive coercive diplomacy. With a nuclear-armed Iran increasingly throwing its weight around in the region, we could witness an even more crisis prone Middle East. And in a poly-nuclear Middle East with Israel, Iran, and, in the future, possibly other states, armed with nuclear weapons, any one of those crises could result in a Nuclear proliferation can also lead to regional instability due to preventive strikes against nuclear programs. States often conduct preventive military strikes to prevent adversaries from acquiring nuclear weapons . Historically, the United States attacked German nuclear facilities during World War II, Israel bombed a nuclear reactor in Iraq in 1981, Iraq catastrophic nuclear exchange. bombed Iran’s Bushehr reactors in the Iran-Iraq War in the 1980s and Iran returned the favor against an Iraqi nuclear plant, a U.S.-led international coalition destroyed Iraq’s nuclear infrastructure in the first Gulf War in 1991, and Israel bombed a Syrian nuclear reactor in 2007. These strikes have not led to extensive conflagrations in the past, but we might not be so lucky in the future. At the time of writing in 2012, the United States and Israel were polishing military plans to attack Iran’s nuclear program and some experts maintain that such a strike could very well lead to a wider war in the Middle East. Constrained freedom of action. The spread of nuclear weapons also disadvantages American’s national security by constraining U.S. freedom of action. As the most powerful country on the planet, with the ability to project power to every corner of the globe, the United States has the ability to threaten or protect every other state in 74 the international system. This is a significant source of strategic leverage and maintaining freedom of action is an important objective of U.S. national security policy.[67] As nuclear weapons spread, however, America’s military freedom of action is constrained. The United States can use or credibly threaten to use force against nonnuclear states. The threat of military action against nuclear-armed states is much less credible, however, because nuclear-armed states can deter U.S. military action with the threat of nuclear retaliation. In January of 2012, for example, Iran threatened to close the Strait of Hormuz, a narrow Persian Gulf waterway through which roughly 20% of the world’s oil flows, and the United States issued a counter-threat, declaring that Washington would use force to reopen the Strait. If Iran had had nuclear weapons, however, Washington’s threats would have been much less credible. Would a U.S. President really be willing to risk nuclear war with Iran in order to reopen the Strait? Maybe. But, maybe not. While the United States might not be deterred in every contingency against a nuclear-armed state, it is clear that, at a minimum, the spread of nuclear weapons greatly complicates U.S. decisions to use force. Undermines alliances: The spread of nuclear weapons also complicates U.S. alliance relationships. Washington uses the promise of military protection as a way to cement its alliance structures. U.S. allies depend on America’s protection, giving Washington influence over allied states’ foreign policies. Historically, the United States has offered, and threatened to retract, the security guarantee carrot to prevent allied states from acting contrary to its interests. As nuclear weapons spread, however, alliances held together by promises of military protection are undermined in two ways. First, U.S. allies may doubt the credibility of Washington’s commitments to provide a military defense against nuclear-armed states, leading them to weaken ties with their patron. As Charles de Gaulle famously asked about the U.S. commitment to defend France from the Soviet Union during the Cold War, would Washington be willing to trade New York for Paris? Similarly, if Iran acquires nuclear weapons, U.S. partners in the Middle East, such as Israel and Gulf States, will question Washington’s resolve to defend them from Iran. After all, if the United States proves unwilling to use force to prevent Iran from acquiring nuclear weapons, would it really be willing to fight a war against a nuclear-armed Iran? Qatar, for example, already appears to be hedging its bets, loosening ties to Washington and warming to Tehran. Second, nuclear proliferation could encourage client states to acquire nuclear weapons themselves, giving them greater security independence and making them less dependable allies. According to many scholars, the acquisition of the force de frappe was instrumental in permitting the French Fifth Republic under President Charles de Gualle to pursue a foreign policy path independent from Washington at NATO.[68] Similarly, it is possible that Turkey, Saudi Arabia, and other regional states will acquire independent nuclear capabilities to counter Iran’s Nuclear proliferation poses an additional threat to international peace and security because it causes further proliferation. As former Secretary of State George Schultz once said, “ proliferation begets proliferation .”[69] When one country acquires nuclear weapons, its regional adversaries, feeling threatened by its neighbor’s new nuclear capabilities, are more likely to attempt to acquire nuclear weapons in response. Indeed, the history of nuclear nuclear arsenal, greatly destabilizing an already unstable region and threatening Washington’s ability to influence regional dynamics. Further proliferation. proliferation can be read as a chain reaction of proliferation. The United States acquired nuclear weapons in response to Nazi Germany’s crash nuclear program. The Soviet Union and China acquired nuclear weapons to counter the U.S. nuclear arsenal. The United Kingdom and France went nuclear to protect themselves from the Soviet Union. India’s bomb was meant to counter China and it, in turn, spurred Pakistan to join the nuclear club. Today, we worry that, if Iran acquires nuclear weapons, other Middle Eastern countries, such as Egypt, Iraq, Turkey, and Saudi Arabia, might desire nuclear capabilities, triggering an arms race in a strategically important and volatile region. 75 Advantage 3 Ext 76 Safe Harbor will be removed EU is threatening to remove Safe Harbor Khan, 2013 (James Fontanella-Khan, November 2013 “Brussels considers options to respond to NSA spying scandal”, http://www.ft.com/cms/s/0/6f4bf1a8-470b-11e3-9c1b-00144feabdc0.html) Ever since Edward Snowden, the National Security Agency contractor-turned-whistleblower, revealed that US spies were snooping on European leaders and citizens, the EU has been trying to move beyond rhetoric to mount an effective response. As they weigh their options, policy makers have been forced to balance the demands of privacy advocates and an angry public against industry fears that overly restrictive rules could limit companies’ ability to transfer data across borders and weaken their prospects in the digital economy. On Wednesday, the European Commission is set to take its first substantive steps when it will present fresh proposals to force the US to respect EU citizens personal online information. Here are some of the ideas that have emerged in Brussels and across Europe: The commission will demand that the US do a better job of implementing a data- sharing deal that allows US technology companies to transfer data across borders without European oversight. This “safe harbour” agreement is based on the idea that US companies should be able to bypass EU privacy rules as long as they sign up to a self-reporting scheme that offers equivalent protections. A commission review that will be presented on Wednesday concludes that Washington has improperly forced US companies to hand over European customers’ data. Brussels will warn that unless the US respects EU citizens’ privacy, it will scrap “safe harbour”. Suspending “safe harbour” would be one of the most straightforward ways for the commission to assuage public anger about privacy violations. European parliamentarians have called for cutting off the US’s access to global financial data processed through a Belgian-based group called Swift, which Washington has relied on to track terrorist financing. The European Parliament’s request came after claims that the NSA had illegally tapped information stored by Swift. MEPs argued that this would be easy to do since the commission has the legal authority to suspend the data-sharing agreement at any time. Cecilia Malmström, the EU commissioner for home security, however, will announce on Wednesday that there is no evidence that the agreement has been violated. This means it is unlikely that the EU’s executive arm will push to end an agreement that Washington has characterised as vital for countering terrorism. Germany has floated the idea of forcing the US to agree to tougher data protection safeguards as part of a broader EU-US trade pact that is under discussion. This came after it emerged that Angela Merkel, the German chancellor, was one of 35 international leaders whose mobile phone had been tapped by American spies. But officials in Brussels have ruled out this option amid fears that it could derail negotiations for a pact they desperately want. The European Parliament, which has veto power over the trade agreement, could still vote against a pact that does not include privacy rules. Either way, it could take years before a trade agreement is reached, so this would not be a fast way to address the problem. Privacy advocates say the best way to fend off US snooping attacks remains the enforcement of tough EU data protection rules. The EU is updating rules that have been in place since 1995. New draft legislation prohibits third-country access to EU personal data without the express permission of an EU supervisory authority. This conflicts with US foreign intelligence laws, which empower US authorities to oblige American internet companies such as Google and Facebook to hand over data on people who are not US citizens. EU leaders recently delayed the new legislation until at least 2015, a move that will give Washington ample opportunity to lobby against tougher rules. Neelie Kroes, the EU’s digital agenda commissioner, has said that the NSA scandal should be an incentive for European tech companies to create a homegrown data cloud server business capable of rivalling Google and other American providers. This would have the advantage of creating a storage space for European data outside the jurisdiction of US authorities. Such a move would make it difficult for a US court to order a European company based on EU soil to transfer an individual’s data record, say companies that have cloud servers outside of America. Privately, however, EU officials admit that regardless of where a data server is located there is little they can do to stop the US from illegally hacking into a server. Setting up local data centres could also lead to the Balkanisation of the internet, hindering global communication and challenging the principles that have allowed the internet to grow into an engine of economic prosperity over the past two decades. Viviane Reding, EU Commissioner of Justice, called for the creation of a European spy agency to act as a 77 “counterweight” to the NSA. However, the idea, dismissed as a “political non-runner” by several European officials, is unlikely to address concerns about US intrusions into European citizens’ digital lives. If anything, one official said, it would increase the amount of snooping, not decrease it. Europe scapegoating Safe Harbor over Snowden Leaks Mershon 13 Erin Mershon. she covered technology policy for POLITICO and for Communications Daily. She's covered nearly every aspect of Congress, from its Eagle Scout members to its wonkiest procedural maneuverings, for National Journal, Roll Call, The Huffington Post and PolitiFact. She's a graduate of Kenyon College, where she studied political science and ran the college newspaper. Read more: http://www.politico.com/story/2013/11/us-european-union-safe-harbor-nsa-99495.html#ixzz3eD4QPMNC TH U.S. regulators are urging their European Union counterparts to preserve a more than decade-old data transfer agreement amid mounting European anger over NSA spying. An important but little-known mechanism, the Safe Harbor Framework, lets more than 3,000 companies, including Google and Facebook, process data from European citizens without running afoul of the region’s privacy laws. It has emerged as a friction point between the United States and EU as European officials move to tighten their data protection rules — an effort that has intensified in the wake of revelations about NSA surveillance. Some EU officials, alarmed by reports of the NSA’s work with Internet companies, say Safe Harbor gives U.S. tech firms a way to skirt their more stringent privacy regime. U.S. officials, however, maintain that the Safe Harbor agreement is wellenforced and represents the best way to protect privacy across transatlantic data flows that serve millions of consumers. Compared with alternatives, the mechanism “provides more, not less, privacy protection,” argued Commissioner Julie Brill of the Federal Trade Commission in a speech last week. Safe Harbor was formalized for the legal transfer of data between the U.S. and EU in 2000 after the EU passed a data-protection directive and determined that U.S. standards were “inadequate.” The framework consists of seven principles on topics like notice, choice and data security, broadly modeled on European standards. American firms that want to handle or store European citizens’ data have to self-certify annually with the Department of Commerce that they will abide by the standards. Breaches of that agreement are enforced by the FTC. European regulators ramped up their criticisms of the framework following the first Edward Snowden leaks this summer, pointing out that Safe Harbor specifically provides for exemptions “to the extent necessary to meet national security, public interest or law-enforcement requirements.” European Parliament member Jan Philipp Albrecht, who authored an updated EU data protection regulation that passed out of committee last month, told U.S. officials last week that the agreement inappropriately allows U.S companies to “circumvent” democratically established law. His draft regulation contains a so-called anti-FISA clause that would forbid U.S. companies from complying with government requests for personal data unless expressly approved by EU authorities. Since American companies can’t agree to rules that would require them to ignore lawful U.S. requests for information, the law could effectively undermine U.S.-EU data transfers. Recent NSA revelations should not “distort” discussions about the framework, Brill has argued. Regardless of what mechanism is in place, U.S. as well as EU companies will have to comply with lawful domestic requests related to national security or law enforcement, said Jules Polonetsky, executive director of the Future of Privacy Forum, which is currently drafting a report on the Safe Harbor program. “Europeans seem to be using [Safe Harbor] as a sacrificial lamb to express their frustration with NSA and law enforcement access to data,” he said. “There’s a lot of misunderstanding about Safe Harbor.” If European attempts to suspend Safe Harbor are successful, U.S. companies may have to turn to alternative data transfer methods, such as “model contracts” drafted by EU commissioners or corporate privacy rules that require approval from data protection authorities in each relevant EU country. Both options are more “burdensome” and difficult to use than Safe Harbor, said Jeremy Mittman, an attorney with Proskauer Rose in Los Angeles who has experience drafting Safe Harbor certifications and EU model contracts. None of those mechanisms is subject to FTC enforcement or annual renewal, he said. “One of the things to consider is, if you get rid of Safe Harbor, what are you really achieving?” Mittman said. “Companies are going to be transferring data and they’re going to find ways to do it.” In addition to their critiques of Safe Harbor’s stringency, European regulators and others have attacked the agreement on the grounds that it is poorly enforced. EU officials released two reports critical of the program’s enforcement in 2002 and 2004, and the Australian consulting firm Galexia reported hundreds of Safe Harbor violations in a 2008 report that lambasted both the EU and the U.S. for not taking enforcement more seriously. Indeed, the FTC did not bring its first enforcement under Safe Harbor rules until 2009, and its batch of seven enforcement actions that year targeted companies for falsely advertising their Safe Harbor certification, not for any failures to protect Europeans’ data. Since then, 78 the agency has brought three Safe Harbor enforcement actions against Facebook, Google and MySpace as part of larger privacy-related investigations of the companies. Brill said the FTC hasn’t received many Safe Harbor-related referrals or complaints from Europeans and has instead taken the initiative itself to enforce the framework. Mittman and several other U.S. attorneys versed in Safe Harbor certification said their clients had not received any Safe Harbor-related complaints following successful certification. An FTC spokesman declined to comment on the specific number of complaints the agency has received. FTC Chairwoman Edith Ramirez recently jumped in to defend the agency’s enforcement efforts on Safe Harbor, telling the Trans Atlantic Consumer Dialogue forum in Brussels last week that the agency’s “track record in consumer privacy enforcement is unrivaled among data protection authorities around the world.” The agency has been “vigorously enforcing” a range of laws governing consumer information, she said. Both Brill and Ramirez also hinted that there are more enforcement efforts on the way, without providing details. Safe Harbor is under Attack Polonetsky and Wolf 13 Jules Polonetsky Christopher Wolf December 11, 2013 ”The US-EU Safe Harbor” An Analysis of the Framework’s Effectiveness in Protecting Personal Privacy pg 3-5 http://www.futureofprivacy.org/wp-content/uploads/FPF-Safe-Harbor-Report.pdf TH When the EU and the US originally launched the Safe Harbor, many Europeans criticized the program, considering it to be too lenient, particularly with respect to enforcement.24 Meanwhile, US businesses initially complained that complying with the Safe Harbor was “costly, unworkable and unfair.”25 Despite these and other criticisms,26 the agreement has contributed to increased focus on privacy protection in the US and EU.27 Moreover, the Safe Harbor has become a popular method of compliance with the EU’s privacy requirements.28 Recently, however, revelations about the US National Security Agency (NSA) and its surveillance of EU citizens have resulted in a threat to upset the balance crafted by the Safe Harbor.29 Specifically, leaks by former NSA contractor Edward Snowden have revealed that the NSA accessed private user data within the systems of Google, Facebook, Apple and other Internet giants.30 Snowden’s leaks showed that the NSA had collected search history, the content of emails, file transfers and live chats from millions of Internet users, including EU citizens.31 Some EU officials have seized on the NSA revelations in order to refocus scrutiny on the Safe Harbor. For instance, in August 2013, Viviane Reding, Vice-President of the European Commission (EC), called for a review of the Safe Harbor by year-end, calling the Safe Harbor “a loophole” that “may not be so safe after all.”32 Additionally, Jan Philipp Albrecht, a European Parliament Member, recommended that the EU discontinue the Safe Harbor program unless there is an express re-authorization following a review.33 Jacob Kohnstamm, Chairman of the Article 29 Working Party, reminded EU Member States of their authority to suspend data flows where there is “substantial likelihood” that the Safe Harbor is being violated.34 These criticisms drew in part on reports from independent consulting service Galexia,35 which published a report critical of the Safe Harbor program in 2008 entitled “The US Safe Harbor – Fact or Fiction?”36 Galexia supplemented its study with additional findings presented at a 2013 Civil Liberties, Justice and Home Affairs (LIBE) Committee Inquiry on Electronic Mass Surveillance of EU Citizens.37 In November 2013, the European Commission released a report critical of the Safe Harbor agreement.38 The Commission found that the framework has several shortcomings, including: a) a lack of transparency of privacy policies of Safe Harbor members; b) ineffective application of privacy principles by companies in the US, and c) deficient enforcement by the US.39 As this report will show, these criticisms of the Safe Harbor program are largely unfounded.40 While the Safe Harbor program surely could be strengthened, as is the case with nearly every privacy regime, a close look at the experience that companies have had with the Safe Harbor reveals that the program has been largely successful in achieving its stated twin goals of protecting privacy while promoting international data transfer.41 The success of the Safe Harbor can be seen in three distinct areas. First, the program has grown significantly since its inception, underlying the importance of trans-Atlantic data flows. Second, US companies have increased privacy protections for individuals by making modifications to their privacy practices in order to comply with the Safe Harbor’s requirements. Third, there are strong enforcement mechanisms in place – in the form of both the FTC and third-party dispute resolution providers – to ensure that when individuals complain that a Safe Harbor participant is failing to live up to its obligations, such complaints are satisfactorily addressed. Many critics have unfairly attacked the Safe Harbor based on a misunderstanding of the program and its goals, and many of the recent criticisms reflect a misunderstanding of the relationship between the program and the NSA’s surveillance practices. In fact, suspending the Safe Harbor’s 79 protections would negatively impact both the personal privacy of EU citizens and international trade. The Future of Privacy Forum (FPF) therefore suggests that rather than dismantling the Safe Harbor, the US and EU make specific reforms to the program to increase transparency and enhance efforts on both sides of the Atlantic to police compliance. 80 NSA actions lead to bad rep for Safe Harbor NSA surveillance undermines cloud computing Lomas 13 (Natasha, “NSA Spying Risks Undermining Trust In U.S. Cloud Computing Businesses, Warns Kroes,” Tech Crunch, July 4, 2013, Accessed April 8, 2015, http://techcrunch.com/2013/07/04/spying-bad-for-business/)//AD NSA spying scandal risks undermining trust in U.S. cloud computing businesses, the European Commission’s vice-president, Neelie Kroes, has calls for “clarity and transparency” from the U.S. regarding the scope and nature of its surveillance and access to data on individuals and businesses living and conducting business in Europe in order to avoid a knock-on effect on cloud businesses. Loss of Europeans’ The warned in a speech today. Kroes also reiterated trust could result in “multi-billion euro consequences” for U.S. cloud providers, she added. Kroes was speaking during a press conference held in Estonia, following a meeting of the EC’s cloud computing businesses are at particular risk of fallout from a wide-reaching U.S. government surveillance program because they rely on their customers’ trust to function — trust that the data entrusted to them is stored securely. Kroes said: If businesses or governments think they might be spied on, they will have less reason to trust the cloud, and it will be cloud providers who ultimately miss out. Why would you pay someone else to hold your commercial or other secrets, if you suspect or know they are being shared against your wishes? Front or back door – it doesn’t matter – any smart person doesn’t want the information shared at all. Customers will act rationally, and providers will miss out on a great opportunity. European Cloud Partnership Steering Board, which was held to agree on EU-wide specifications for cloud procurement. In her speech, part of which follows below, she argued that 81 Safe Harbor is Key CONSEQUENCES OF A SUSPENDED SAFE HARBOR Jules Polonetsky Christopher Wolf December 11, 2013 Jules Polonetsky Christopher Wolf December 11, 2013 ”The US-EU Safe Harbor” An Analysis of the Framework’s Effectiveness in Protecting Personal Privacy pg 32-34 http://www.futureofprivacy.org/wp-content/uploads/FPF-Safe-Harbor-Report.pdf TH As described above, some members of the European Parliament are calling for a suspension or curtailing of the Safe Harbor agreement.193 This report has thus far focused on the growth of the Safe Harbor program, the significant amount of work companies have done in achieving compliance, and the measures regulatory bodies and organizations have taken to enforce the rules. However, all of that progress would be lost or severely hampered if the Safe Harbor program were suspended. As described in Section II above, the Safe Harbor has grown significantly in the past three years.194 Note in particular the 613 companies that joined the program just within the last year, presumably in reliance on the assumption the program would continue.195 Many of these companies have expended significant time and resources into joining the Safe Harbor program,196 and that investment would be wasted if the Safe Harbor were suspended or its protections removed. Moreover, if the Safe Harbor were discontinued, the negative impact on both personal privacy and international trade would be serious. First, jettisoning the Safe Harbor would mean removing an important player to enforce privacy protection for EU data subjects – namely, the FTC.197 Second, alternative transfer mechanisms to the Safe Harbor program may not be feasible for all companies. Rather, limiting Safe Harbor protection would only destroy critical US and EU privacy protections. A. Lack Of Comparable Enforcement Regimes The Safe Harbor is unique among the available data protection compliance regimes in that, unlike other data transfer mechanisms, the Safe Harbor gives the FTC authority to police US companies on behalf of EU citizens.198 Dismantling the Safe Harbor and its requirement that companies publicly commit to compliance would result in a significant loss of FTC oversight.199 In such a scenario, the FTC would no longer be able to bring enforcement actions for the benefit of EU citizens, nor would it be able to monitor US companies for their compliance, resulting in less transparency and less protection for individuals.200 Additionally, if the FTC were unable to regulate companies that undermined EU citizen privacy, it would fall on the EU Member States to enforce the EU Data Directive. Suing US companies with no physical presence in the EU could result in jurisdictional chaos.201 Likewise, without the FTC monitoring US companies’ compliance efforts, violations would be much harder to investigate and detect.202 In the alternative, EU Member States could focus their regulatory efforts on EU companies transmitting data to the US. However, this would place an unfair burden on EU companies, who could be held responsible any time a US recipient of personal data committed a violation. EU companies would likely react to this fundamentally unfair regime by either limiting trade with the US, or including broad indemnity provisions into future data transfer agreements, either of which would significantly burden business in both the US and EU. B. Lack Of Feasible Data Transfer Alternatives Suspending the Safe Harbor would force US companies seeking to comply with the EU Data Protection Directive to revert to other compliance methods such as express consent, EU Model Clauses or BCRs.203 While these mechanisms may be adequate to comply with the EU Data Directive,204 not all companies can realistically implement them. i. Problems with mass adoption of express consent The express consent method requires the US company to obtain the express consent of any EU citizen about whom the company wishes to transfer data.205 Relying solely on this method is not practical for many companies. First, larger companies would find it extremely difficult to obtain express user consent on such a large scale. Furthermore, even if consent were obtained, it would not necessarily be enough for compliance: recent opinions by DPAs have held that many instances of consent, particularly by employees, are not “freely given” and therefore invalid.206 Gaining the affirmative, “freely given” consent of all European internet users and employees would be practically impossible; companies would have to significantly scale back their data transfers under this method. ii. Problems with mass adoption of EU Model Clauses EU Model Clauses are model agreements a company can sign to govern its data transfers.207 The major problem with relying on EU Model Clauses for all data transfer from the EU to the US is that such contract privisions fail to provide sufficient flexibility for companies with unique business models. All EU Model Clauses “must be copied verbatim and strictly adhered to,” and any revisions must be individually approved by each European DPA.208 Compared to the Safe Harbor program, EU Model Clauses have particularly inflexible rules with respect to onward 82 transfer of data to third-parties, prohibiting transfers unless the recipient also agrees to the model contractual terms.209 In the context of court orders in e-discovery or litigation, or in the case of data transfers that are necessary to perform a contract, such strict rules would be extremely difficult for a company to comply with.210 Given the wide variety of companies that rely on the Safe Harbor,211 such rigid contractual clauses would stifle trade, prevent innovative uses of data, and, for small businesses in particular, hamper their ability to provide basic operational support for their business. Additionally, EU Model Clauses are inserted into purely private agreements between companies, and are therefore significantly less transparent than privacy policies under the Safe Harbor program. Heightened use of EU Model Clauses would deprive EU regulators of the benefit of transparent documentation found in the Safe Harbor’s requirements. iii. Problems with mass adoption of Binding Corporate Ruels BCRs effectively constitute full-blown privacy programs for a company to follow.212 While BCRs are appropriate for large global organizations with the resources and expertise to develop and enforce them,213 they would not be a workable solution for smaller companies. Binding corporate rules must be legally enforceable, taking into account the legal systems of each country where they may be applied; additionally, all BCRs must be submitted for approval to the DPA in each member state from which data would be transferred.214 Getting all the EU Member States aligned and supportive of a single policy has been described as an “administrative nightmare”;215 if the over 3,000 current Safe Harbor member companies submitted their own BCRs for approval, it would grind the system to a halt. Moreover, BCRs only cover intra-agency data transfers, and do not cover transfers to or from unaffiliated parties (e.g., service providers, business partners, M&A parties).216 As of 2013 there were fewer than 50 companies for which the BCR cooperation procedure was closed.217 While there have been some positive efforts made to streamline the BCRs approval process,218 until such procedures are edified it would make little sense to rely on BCRs over the much more practical Safe Harbor program. 83 Decreasing Spying increase EU Trust Decreasing NSA spying on Europe is only way to work together and regain trust. European Parliament News 14 12-03-2014 -“US NSA: stop mass surveillance now or face consequences”, http://www.europarl.europa.eu/news/en/news-room/content/20140307IPR38203/html/US-NSA-stopmass-surveillance-now-or-face-consequences-MEPs-say Parliament's consent to the EU-US trade deal "could be endangered" if blanket mass surveillance by the US National Security Agency (NSA) does not stop, MEPs said on Wednesday, in a resolution wrapping up their six-month inquiry into US mass surveillance schemes. The text also calls on the EU to suspend its bank data deal with the US and the “Safe Harbour agreement” on data privacy. The fight against terrorism can never justify secret and illegal mass surveillance, it adds. The resolution, in which MEPs set out their findings and recommendations to boost EU citizens' privacy, was backed by 544 votes to 78, with 60 abstentions. "The Snowden revelations gave us a chance to react. I hope we will turn those reactions into something positive and lasting into the next mandate of this Parliament, a data protection bill of rights that we can all be proud of", said Civil Liberties inquiry rapporteur Claude Moraes (S&D, UK). "This is the only international inquiry into mass surveillance. (...) Even Congress in the United States has not had an inquiry", he added. Parliament's should withhold its consent to the final Transatlantic Trade and Investment Partnership (TTIP) deal with the US unless it fully respects EU fundamental rights, stresses the resolution, adding that data protection should be ruled out of the trade talks. This consent “could be endangered as long as blanket mass surveillance activities and the interception of communications in EU institutions and diplomatic representations are not fully stopped”, notes the text. MEPs also call for the "immediate suspension" of the Safe Harbour privacy principles (voluntary data protection standards for non-EU companies transferring EU citizens’ personal data to the US). These principles “do not provide adequate protection for EU citizens” say MEPs, urging the US to propose new personal data transfer rules that meet EU data protection requirements. The Terrorist Finance Tracking Programme (TFTP) deal should also be suspended until allegations that US authorities have access to EU citizens’ bank data outside the agreement are clarified, insist MEPs. European whistle-blower protection and EU cloud The text also calls for a "European whistle-blower protection programme", which should pay particular attention to the "complexity of whistleblowing in the field of intelligence". EU countries are also asked to consider granting whistleblowers international protection from prosecution. Furthermore, Europe should develop its own clouds and IT solutions, including cybersecurity and encryption technologies, to ensure a high level of data protection, adds the text. The UK, France, Germany, Sweden, the Netherlands and Poland should clarify the allegations of mass surveillance - including potential agreements between intelligence services and telecoms firms on access to and exchange of personal data and access to transatlantic cables - and their compatibility with EU laws, the resolution says. Other EU countries, in particular those participating in the "9-eyes" (UK, Denmark, France and the Netherlands) and "14-eyes" arrangements (those countries plus Germany, Belgium, Italy, Spain and Sweden) are also urged to review their national laws to ensure that their intelligence services are subject to parliamentary and judicial oversight and that they comply with fundamental rights obligations. http://europe.newsweek.com/junckers-calls-eu-spy-service-has-opened-can-worms-327874 Lack of Trust with US/Ger Spying Scandal Deutsche Welle 2015 Deutsche Welle (DW) is Germany’s international broadcaster. Peter Limbourg has been Director General since 2013. Around 3,000 employees and freelancers from 60 countries work in DW’s headquarters in Bonn and main studio in Berlin. http://www.dw.com/en/breach-of-trust-germany-reacts-to-nsa-accusations/a-18473332 TH Lack of trust A US official said the leaks were worse than those attributed to Snowden, according to "Bild." "What the German government is now doing is more dangerous than what Snowden did," the official was quoted as saying. But Sensburg said cooperation between the NSA and the BND was "good and positive" overall and that both sides needed each other. Thomas Oppermann, the Social Democratic Party's (SPD) parliamentary chairman, also said that German intelligence would not be able to work effectively without US help. "We cannot and will not afford to terminate cooperation with the American intelligence services," Oppermann told the "Welt am Sonntag" newspaper. Oppermann said 84 a large part of the NSA activities were outsourced to private companies. "I think that is highly problematic." Deadline for the chancellor Pressure is increasing on Merkel as critics accuse her staff of allowing the BND to help the NSA. The Chancellery is responsible for overseeing all German intelligence services. A poll conducted last week found that one in three Germans feels deceived by Merkel. German opposition lawmakers in the parliamentary committee have called on the government to publish the NSA lists, which may include data such as names, telephone numbers or Internet protocol (IP) addresses 85 Adv 3 Impacts 86 Warming Cloud computing key to climate modeling Boyce 10 [Eric, technical writer and user advocate for The Rackspace Cloud, September 14, 2010 http://www.rackspacecloud.com/blog/2010/09/14/the-future-of-cloud-computing-the-big-25-in-thenext-25/] The promise of the cloud isn’t just about gaming and the ability to safely store all those photos that you wish you hadn’t ever taken. Many of the most promising cloud-based applications also require massive computational power. Searching a database of global DNA samples requires abundant, scalable processing power. Modeling protein folding is another example of how compute resources will be used. Protein folding is linked to many diseases including Alzheimer’s and cancer, and analyzing the folding process can lead to new treatments and cures, but it requires enormous compute power. Projects like Folding@home are using distributed computing to tackle these modeling tasks. The cloud will offer a larger, faster, more scalable way to process data and thus benefit any heavy data manipulation task. 6. Is it going to be hot tomorrow? Like protein folding modeling, climate simulation and forecasting requires a large amount of data storage and processing. Recently the German Climate Computing Center (DKRZ) installed a climate calculating supercomputer that is capable of analyzing 60 petabytes of data (roughly 13 million DVD’s) at over 158 teraflops (trillion calculations per second). In the next couple of decades, this level of computing power will be widely available and will exist on remote hardware. Sophisticated climate models combined with never before seen compute power will provide better predictions of climate change and more rapid early warning systems Adaptation solves global wars Werz and Conley 12 - Senior Fellow @American Progress where his work as member of the National Security Team focuses on the nexus of climate change, migration, and security and emerging democracies & Research Associate for National Security and International Policy @ the Center for American Progress [Michael Werz & Laura Conley, “Climate Change, Migration, and Conflict: Addressing complex crisis scenarios in the 21st Century,” Center for American Progress, January 2012] The costs and consequences of climate change on our world will define the 21st century. Even if nations across our planet were to take immediate steps to rein in carbon emissions—an unlikely prospect—a warmer climate is inevitable. As the U.N. Intergovernmental Panel on Climate Change, or IPCC, noted in 2007, human-created “warming of the climate system is unequivocal, as is now evident from observations of increases in global average air and ocean temperatures, widespread melting of snow and ice and rising global average sea level.”1 As these ill effects progress they will have serious implications for U.S. national security interests as well as global stability— extending from the sustainability of coastal military installations to the stability of nations that lack the resources, good governance, and resiliency needed to respond to the many adverse as these effects accelerate, the stress will impact human migration and conflict around the world. It is difficult to fully understand the detailed causes of migration and economic and political instability, but the growing evidence of links between climate change, migration, and conflict raise plenty of reasons for concern. This is why it’s time to start consequences of climate change. And thinking about new and comprehensive answers to multifaceted crisis scenarios brought on or worsened by global climate change. As Achim Steiner, executive director of the U.N. Environment Program, argues, “The question we must continuously ask ourselves in the face of scientific complexity and uncertainty, but also growing evidence of climate change, is at what In the coming decades climate change will increasingly threaten humanity’s shared interests and collective security in many parts of the world, disproportionately affecting the globe’s least developed countries. Climate point precaution, common sense or prudent risk management demands action.”2 change will pose challenging social, political, and strategic questions for the many different multinational, regional, national, and nonprofit organizations dedicated to improving the human condition worldwide. Organizations as different as Amnesty International, the U.S. Agency for International Development, the World Bank, the International Rescue Committee, and the World Recent intelligence reports and war games, including some conducted by the U.S. Department of Defense, conclude that over the next two or three decades, vulnerable regions (particularly sub-Saharan Africa, the Middle East, South and Southeast Asia) will face the prospect of food shortages, water crises, and catastrophic flooding driven by climate change. These developments could demand U.S., European, and international humanitarian relief or military responses, often the delivery vehicle for aid in crisis situations. This Health Organization will all have to tackle directly the myriad effects of climate change. Climate change also poses distinct challenges to U.S. national security. report provides the foundation and overview for a series of papers focusing on the particular challenges posed by the cumulative effects of climate change, migration, and conflict in some of our world’s most complex environments. In the papers following this report, we plan to outline the effects of this nexus in northwest Africa, in India and Bangladesh, in the Andean region of 87 South America, and in China. In this paper we detail that nexus across our planet and offer wide ranging recommendations about how the United States, its allies in the global community, and the community at large can deal with the coming climate-driven crises with comprehensive sustainable security solutions encompassing national security, diplomacy, and economic, social, and environmental development. Here, we briefly summarize our arguments and our conclusions. The nexus The Arab Spring can be at least partly credited to climate change. Rising food prices and efforts by authoritarian regimes to crush political protests were linked first to food and then to political repression—two important motivators in the Arab makeover this past year. To be sure, longstanding economic and social distress and lack of opportunity for so many Arab youth in the Middle East and across North Africa only needed a spark to ignite revolutions across the region. But environmental degradation and the movement of people from rural areas to already overcrowded cities alongside rising food prices enabled the cumulative effects of long-term economic and political failures to sweep across borders with remarkable agility. It does not require much foresight to acknowledge that other effects of climate change will add to the pressure in the decades to come. In particular the cumulative overlays of climate change with human migration driven by environmental crises, political conflict caused by this migration, and competition for more scarce resources will add new dimensions of complexity to existing and future crisis scenarios. It is thus critical to understand how governments plan to answer and No matter what steps the global community takes to mitigate carbon emissions, a warmer climate is inevitable. The effects are already being felt prioritize these new threats from climate change, migration, and conflict. Climate change Climate change alone poses a daunting challenge. today and will intensify as climate change worsens. All of the world’s regions and nations will experience some of the effects of this transformational challenge. Here’s just one case in point: African states are likely to be the most vulnerable to multiple stresses, with up to 250 million people projected to suffer from water and food insecurity and, in low-lying areas, a rising sea level.3 As little as 1 percent of Africa’s land is located in low-lying coastal zones but this land supports 12 percent of its urban population.4 Furthermore, a majority of people in Africa live in lower altitudes—including the Sahel, the area just south of the Sahara—where the worst effects of water scarcity, hotter temperatures, and longer dry seasons are expected to occur.5 These developments may well be exacerbated by the lack of state and regional capacity to manage the effects of climate change. These same dynamics haunt many nations in Asia and the Americas, too, and the implications for developed countries such as the United States and much of Europe will be profound. Migration Migration adds another layer of complexity to the scenario. In the 21st century the world could see substantial numbers of climate migrants—people displaced by either the slow or sudden onset of the effects of climate change. The United Nations’ recent Human Development Report stated that, worldwide, there are already an estimated 700 million internal migrants—those leaving their homes within their own countries—a number that includes people whose migration isrelated to climate change and environmental factors. Overall migration across national borders is already at approximately 214 million people worldwide,6 with estimates of up to 20 million displaced in 2008 alone because of a rising sea level, desertification, and flooding.7 One expert, Oli Brown of the International Institute for Sustainable Development, predicts a tenfold increase in the current number of internally displaced persons and international refugees by 2050.8 It is important to acknowledge that there is no consensus on this estimate. In fact there is major disagreement among experts about how to identify climate as a causal factor in internal and international migration. But even though the root causes of human mobility are not always easy to decipher, the policy challenges posed by that movement are real. A 2009 report by the International Organization for Migration produced in cooperation with the United Nations University and the Climate Change, Environment and Migration Alliance cites numbers that range from “200 million to 1 billion migrants from climate change alone, by 2050,”9 arguing that “environmental drivers of migration are often coupled with economic, social and developmental factors that can accelerate and to a certain extent mask the impact of climate change.” The report also notes that “migration can result from different environmental factors, among them gradual environmental degradation (including desertification, soil and coastal erosion) and climate change is expected to aggravate many existing migratory pressures around the world. Indeed associated extreme weather events resulting in drought, floods, and disease are projected to increase the number of sudden humanitarian crises and disasters in areas least able to cope, such as those already mired in poverty or prone to conflict.11 Conflict This final layer is the most natural disasters (such as earthquakes, floods or tropical storms).”10 (See box on page 15 for a more detailed definition of climate migrants.) Clearly, then, unpredictable, both within nations and transnationally, and will force the United States and the international community to confront climate and migration challenges within an increasingly unstructured local or regional security environment. In contrast to the great power conflicts and the associated proxy wars that marked most of the 20th century, the immediate post- Cold War decades witnessed a diffusion of national security interests and threats. U.S. national security policy is increasingly integrating thinking about nonstate actors and nontraditional sources of conflict and instability, for example in the fight against Al Qaeda and its affiliated groups. Climate change is among these newly visible issues sparking conflict. But because the direct link the potential for the changing climate to induce conflict or exacerbate existing instability in some of the world’s most vulnerable regions is now recognized in national security circles in the United States, although research gaps still exists in many places. The climate-conflict nexus was highlighted with particular effect by the current U.S. administration’s security-planning reviews over the past two years, as well as the Center for Naval Analysis, which termed climate change a “threat multiplier,” indicating that it can exacerbate existing stresses and insecurity.12 The Pentagon’s latest Quadrennial Defense Review also recognized climate change as an “accelerant of instability or conflict,” highlighting the operational challenges that will confront U.S. and partner between conflict and climate change is unclear, awareness of the indirect links has yet to lead to substantial and sustained action to address its security implications. Still militaries amid a rising sea level, growing extreme weather events, and other anticipated effects of climate change.13 The U.S. Department of Defense has even voiced concern for American military installations that may be threatened by a rising sea level.14 There is also well-developed international analysis on these points. The United Kingdom’s 2010 Defense Review, for example, referenced the security aspects of climate change as an evolving challenge for militaries and policymakers. Additionally, in 2010, the Nigerian government referred to climate change as the “greatest environmental and humanitarian challenge facing the country this century,” demonstrating that climate change is no longer seen as solely scientific or environmental, but increasingly as a social and political issue cutting across all aspects of human development.15 As these three threads—climate change, migration, and conflict—interact more intensely, the consequences will be far-reaching and occasionally counterintuitive. It is impossible to predict the outcome of the Arab Spring movement, for example, but the blossoming of democracy in some countries and the demand for it in others is partly an unexpected result of the consequences of climate change on global food prices. On the other hand, the interplay of these factors will drive complex crisis situations in which domestic policy, international policy, humanitarian assistance, and security converge in new ways. Areas of concern Several regional hotspots frequently come up in the international debate on climate change, migration, and conflict. Climate migrants in northwest Africa, for example, are causing communities across the region to respond in different ways, often to the detriment of regional and international security concerns. Political and social instability in the region plays into the hands of organizations such as Al Qaeda in the Islamic Maghreb. And recent developments in Libya, especially the large number of weapons looted from depots after strongman Moammar Qaddafi’s regime fell— which still remain unaccounted for—are a threat to stability across North Africa. Effective solutions need not address all of these issues simultaneously but must recognize the layers of relationships among them. And these solutions must also recognize that these variables will not always intersect in predictable ways. While some migrants may flee floodplains, for example, others may migrate to Bangladesh, already well known for its disastrous floods, faces rising waters in the future due to climate-driven glacial meltdowns in neighboring India. The effects can hardly be over. In December 2008 the National Defense University in Washington, D.C., ran an exercise that explored the impact of a flood that sent hundreds of thousands of refugees into neighboring India. The result: the exercise predicted a new wave of migration would touch off religious conflicts, encourage the spread of contagious them in search of greater opportunities in coastal urban areas.16 88 diseases, and cause vast damage to infrastructure. India itself is not in a position to absorb climate-induced pressures—never mind foreign climate migrants. The country will contribute 22 percent of global population growth and have close to 1.6 billion inhabitants by 2050, causing demographic developments that are sure to spark waves of internal migration across the country. Then there’s the Andean region of South America, where melting glaciers and snowcaps will drive climate, migration, and security concerns. The average rate of glacial melting has doubled over the past few years, according to the World Glacier Monitoring Service.17 Besides Peru, which faces the gravest consequences in Latin America, a number of other Andean countries will be massively affected, including Bolivia, Ecuador, and Colombia. This development will put water security, agricultural production, and power generation at risk—all factors that could prompt people to leave their homes and migrate. The IPCC report argues that the region is especially vulnerable because of its fragile ecosystem .18 Finally, China is now in its fourth decade of ever-growing internal migration, some of it driven in recent years by environmental change. Today, across its vast territory, China continues to experience the full spectrum of climate change related consequences that have the potential to continue to encourage such migration. The Center for a New American Security recently found that the consequences of climate change and continued internal migration in China include “water stress; increased droughts, flooding, or other severe events; increased coastal erosion and saltwater inundation; glacial melt in the Himala as that could affect hundreds of millions; and shifting agricultural zones”—all of which will affect food supplies. 19 Pg. 1-7 89 Disease Cloud computing key to genome sequencing and disease spread Chansanchai 15 (Athima, “Cloud computing contributes to individually tailored medical treatments of the future,” Microsoft News, Feb 2, 2015, Accessed April 8, 2015, http://news.microsoft.com/features/cloud-computing-contributes-to-individually-tailored-medical-treatments-of-the-future/)//AD in a decade – or less – it could be real science. To get to the point where technology can give people access to their genetic profiles, cloud computing plays a pivotal role. By putting resources to analyze genomes in the cloud, researchers can do their work from a variety of devices, collaborate with each other more easily and save time and money. Just a few years ago, sequencing a human genome, for example, used to cost $95 million. Now, it’s $1,000. And by 2020, it may be a matter of pennies. Computing makes it possible to run simulations faster, which leads to more efficient lab work that could produce scientific breakthroughs. Feng and his team at Virginia Tech have developed tools to help other researchers and clinicians in their quests to find cures for cancer, lupus and other diseases. For now, this level of personalized medicine is science fiction. But Feng thinks that 90 Ecosystems Global internet coordination is key to continuing innovation and the global economy Genachowski and Bollinger 13 Julius Genachowski is chairman of the U.S. Federal Communications Commission, First Amendment scholar Lee C. Bollinger is president of Columbia University. Bollinger serves on the board of the Washington Post Company, Foreign Policy, April 16, 2013, "The Plot to Block Internet Freedom", http://www.foreignpolicy.com/articles/2013/04/16/plot_block_internet_freedom?page=full The Internet has created an extraordinary new democratic forum for people around the world to express their opinions. It is revolutionizing global access to information: Today, more than 1 billion people worldwide have access to the Internet, and at current growth rates, 5 billion people -- about 70 percent of the world's population -- will be connected in five years. But this growth trajectory is not inevitable, and threats are mounting to the global spread of an open and truly "worldwide" web. The expansion of the open Internet must be allowed to continue: The mobile and social media revolutions are critical not only for democratic institutions' ability to solve the collective problems of a shrinking world, but also to a dynamic and innovative global economy that depends on financial transparency and the free flow of information. The threats to the open Internet were on stark display at last December's World Conference on International Telecommunications in Dubai, where the United States fought attempts by a number of countries -- including Russia, China, and Saudi Arabia -- to give a U.N. organization, the International Telecommunication Union (ITU), new regulatory authority over the Internet. Ultimately, over the objection of the United States and many others, 89 countries voted to approve a treaty that could strengthen the power of governments to control online content and deter broadband deployment. In Dubai, two deeply worrisome trends came to a head. First, we see that the Arab Spring and similar events have awakened nondemocratic governments to the danger that the Internet poses to their regimes. In Dubai, they pushed for a treaty that would give the ITU's imprimatur to governments' blocking or favoring of online content under the guise of preventing spam and increasing network security. Authoritarian countries' real goal is to legitimize content regulation, opening the door for governments to block any content they do not like, such as political speech. Second, the basic commercial model underlying the open Internet is also under threat. In change the ground rules for payments for transferring Internet content. One species of these proposals is called "sender pays" or "sending party pays." particular, some proposals, like the one made last year by major European network operators, would Since the beginning of the Internet, content creators -- individuals, news outlets, search engines, social media sites -- have been able to make their content available to Internet users without paying a fee to Internet service providers. A sender-pays rule would change that, empowering governments to require Internet content creators to pay a fee to connect with an end user in that country. Sender pays may look merely like a commercial issue, a different way to divide the pie. And proponents of sender pays and similar changes claim they would benefit Internet deployment and Internet users. But the opposite is true: If a country imposed a payment requirement, content creators would be less likely to serve that country. The loss of content would make the Internet less attractive and would lessen demand for the deployment of Internet infrastructure in that country. Repeat the process in a few more countries, and the growth of global connectivity -- as well as its attendant benefits for democracy -- would slow dramatically. So too would the benefits accruing to the global economy. Without continuing improvements in transparency and information sharing, the innovation that springs from new commercial ideas and creative breakthroughs is sure to be severely inhibited. To their credit, American Internet service providers have joined with the broader U.S. technology industry, civil society, and others in opposing these changes. Together, we were able to win the battle in Dubai over sender pays, but we have not yet won the war. Issues affecting global Internet openness, broadband deployment, and free speech will return in upcoming international forums, including an important meeting in Geneva in May, the World Telecommunication/ICT Policy Forum. The massive investment in wired and wireless broadband infrastructure in the United States demonstrates that preserving an open Internet is completely compatible with broadband deployment. According to a recent UBS report, annual wireless capital investment in the United States increased 40 percent from 2009 to 2012, while investment in the rest of the world has barely inched upward. And according to the Information Technology and Innovation Foundation, more fiber-optic cable was laid in the United States in 2011 and 2012 than in any year since 2000, and 15 percent more than in Europe. All 91 Internet users lose something when some countries are cut off from the World Wide Web. Each person who is unable to connect to the Internet diminishes our own access to information. We become less able to understand the world and formulate policies to respond to our shrinking planet. Conversely, we gain a richer understanding of global events as more people connect around the world, and those societies nurturing nascent democracy movements become more familiar with America's traditions of free speech and pluralism. That's why we believe that the Internet should remain free of gatekeepers and that no entity -- public or private -- should be able to pick and choose the information web users can receive. That is a principle the United States adopted in the Federal Communications Commission's 2010 Open Internet Order. And it's why we are deeply concerned about arguments by some in the United States that broadband providers should be able to block, edit, or favor Internet traffic that travels over their networks, or adopt economic models similar to international sender pays. We must preserve the Internet as the most open and robust platform for the free exchange of information ever devised. Keeping the Internet open is perhaps the most important free speech issue of our time. Innovation solves extinction Barker 2k [Brent BARKER, electrical engineer, and manager of corporate communications for the Electric Power Research Institute and former industrial economist and staff author at SRI International and as a commercial research analyst at USX Corporation, 2K “Technology and the Quest for Sustainability,” EPRI Journal, Summer 2000, Vol. 25, p. 8-17] From a social standpoint, accelerating productivity is not an option but rather an imperative for the future. It is necessary in order to provide the wealth for environmental sustainability, to support an aging population in the industrialized world, and to provide an economic ladder for developing nations. The second area of opportunity for technology lies in its potential to help stabilize global population at 10-12 billion sometime in the twenty-first century, possibly as early as 2075. The key is economics. Global communications, from television to movies to the Internet, have brought an image of the comfortable life of the developed world into the homes of the poorest people, firing their own aspirations for a better quality of life, either through economic development in their own country or through emigration to other countries. If we in the developed world can make the basic tools of prosperity--infrastructure, health care, education, and law--more accessible and affordable, recent history suggests that the cultural drivers for producing large families will be tempered, relatively quickly and without coercion. But the task is enormous. The physical prerequisites for prosperity in the global economy are electricity and communications. Today, there are more than 2 billion people living without electricity, or commercial energy in any form, in the very countries where some 5 billion people will be added in the next 50 years. If for no other reason than our enlightened self-interest, we should strive for universal access to electricity, communications, and educational opportunity. We have little choice, because the fate of the developed world is inextricably bound up in the economic and demographic fate of the developing world. A third, related opportunity for technology is in decoupling population growth from land use and, more broadly, decoupling economic growth from natural resource consumption through recycling, end-use efficiency, and industrial ecology. Decoupling population from land use is well under way. According to Grubler, from 1700 to 1850 nearly 2 hectares of land (5 acres) were needed to support every child born in North America, while in the more crowded and cultivated regions of Europe and Asia only 0.5 hectare (1.2 acres) and 0.2 hectare (0.5 acre) were needed, respectively. During the past century, the amount of land Europe and North America experiencing the fastest decreases. Both crossed the "zero threshold" in the past few decades, meaning that no additional land is needed to support additional children and that land requirements will continue to decrease in the future. One can postulate that the pattern of returning land to nature will continue to spread throughout the world, eventually stemming and then reversing the current onslaught on the great rain forests. Time is critical if vast tracts are to be saved from being laid bare, and success will largely depend on how rapidly economic opportunities expand for those now trapped in subsistence and frontier farming. In concept, the potential for returning land to needed per additional child has been dropping in all areas of the world, with nature is enormous. Futurist and scholar Jesse Ausubel of the Rockefeller University calculates that if farmers could lift average grain yields around the world just to the level of today's average U.S. corn grower, one-half of current global cropland--an area the size of the Amazon basin--could be spared. If agriculture is a leading indicator, then the continuous drive to produce more from less will prevail in other parts of the economy Certainly with shrinking agricultural land requirements, water distribution and use around the world can be greatly altered, since nearly two-thirds of water now goes for irrigation. Overall, the technologies of the future will, in 92 the words of Ausubel, be "cleaner, leaner, lighter, and drier"--that is, more efficient and less wasteful of materials and water. They will be much more tightly integrated through microprocessor-based control and will therefore use human and natural resources much more efficiently and productively. Energy intensity, land intensity, and water intensity (and, to a lesser extent, materials intensity) for both manufacturing and agriculture are already heading downward. Only in agriculture are they falling fast enough to offset the surge in population, but, optimistically, advances in science and technology should accelerate the downward trends in other sectors, helping to decouple economic development from environmental impact in the coming century. One positive sign is the fact that recycling rates in North America are now approaching 65% for steel, lead, and copper and 30% for aluminum and paper. A second sign is that economic output is shifting away from resource-intensive products toward knowledge-based, immaterial goods and services. As a result, although the U.S. gross domestic product (GDP) increased 200fold (in real dollars) in the twentieth century, the physical weight of our annual output remains the same as it was in 1900. If anything, this trend will be accelerating. As Kevin Kelly, the editor of Wired magazine, noted, "The creations most in demand from the United States [as exports] have lost 50% of their physical weight per dollar of value in only six years.... Within a generation, two at most, the number of people working in honest-to-goodness manufacturing jobs will be no more than the number of farmers on the land--less than a few percent. Far more than we realize, the network economy is pulling us all in." Even pollution shows clear signs of being decoupled from population and economic growth. Economist Paul Portney notes that, with the exception of greenhouse gases, "in the OECD [Organization for Economic Cooperation and Development] countries, the favorable experience [with pollution control] has been a triumph of technology That is, the ratio of pollution per unit of GDP has fallen fast enough in the developed world to offset the increase in both GDP per capita and the growing number of 'capitas' themselves." The fourth opportunity for science and technology stems from their enormous potential to unlock resources not now available, to reduce human limitations, to create new options for policymakers and businesspeople alike, and to give us new levels of insight into future challenges. Technically resources have little value if we cannot unlock them for practical use. With technology, we are able to bring dormant resources to life. For example, it was only with the development of an electrolytic process late in the nineteenth century that aluminum--the most abundant metal on earth--became commercially available and useful. Chemistry unlocked hydrocarbons. And engineering allowed us to extract and put to diverse use untapped petroleum and gas fields. Over the course of history, technology has made the inaccessible accessible, and resource depletion has been more of a catalyst for change than a longstanding problem. Technology provides us with last-ditch methods (what economists would call substitutions) that allow us to circumvent or leapfrog over crises of our own making. Agricultural technology solved the food crisis of the first half of the nineteenth century. The English "steam crisis" of the 1860s, triggered by the rapid rise of coal-burning steam engines and locomotives, was averted by mechanized mining and the discovery and use of petroleum. The U.S. "timber crisis" that Teddy Roosevelt publicly worried about was circumvented by the use of chemicals that enabled a billion or so railroad ties to last for decades instead of years. The great "manure crisis" of the same era was solved by the automobile, which in a few decades replaced some 25 million horses and freed up 40 million hectares (100 million acres) of farmland, not to mention improving the sanitation and smell of inner cities. Oil discoveries in Texas and then in the Middle East pushed the pending oil crisis of the 1920s into the future. And the energy crisis of the 1970s stimulated the development of new sensing and drilling technology, sparked the advance of non-fossil fuel alternatives, and deepened the penetration of electricity with its fuel flexibility into the global economy Thanks to underground imaging technology, today's known gas resources are an order of magnitude greater than the resources known 20 years ago, and new reserves continue to be discovered. Technology has also greatly extended human limits. It has given each of us a productive capability greater than that of 150 workers in 1800, for example, and has conveniently put the power of hundreds of horses in our garages. In recent decades, it has extended our voice and our reach, allowing us to easily send our words, ideas, images, and money around the world at the speed of light. But global sustainability is not inevitable. In spite of the tremendous promise that technology holds for a sustainable future, there is the potential for all of this to backfire before the job can be done. There are disturbing indications that people sometimes turn in fear and anger on technologies, industries, and institutions that openly foster an ever-faster pace of change. The current opposition to nuclear power genetically altered food, the globalization of the economy and the spread of American culture should give us pause. Technology has always presented a two-edged sword, serving as both cause and effect, solving one problem while creating another that was unintended and often unforeseen. We solved the manure crisis, but automotive smog, congestion, and urban sprawl took its place. We cleaned and transformed the cities with all-electric buildings rising thousands of feet into the sky. But while urban pollution was thereby dramatically reduced, a portion of the pollution was shifted to someone else's sky. Breaking limits "Limits to growth" was a popular theme in the 1970s, and a best-selling book of that name predicted dire consequences for the human race by the end of the century. In fact, we have done much better than those predictions, largely because of a factor the book missed--the potential of new technology to break limits. Repeatedly, human societies have approached seemingly insurmountable barriers only to find the means and tools to break through. This ability has now become a source of optimism, an article of faith, in many parts of the world. Today's perceived limits, however, look and feel different. They are global in nature, multicultural, and larger in scale and complexity than ever before. Nearly 2 billion people in the world are without adequate sanitation, and nearly as many are without access to clean drinking water. AIDS is spreading rapidly in the regions of the world least able to fight it. Atmospheric concentrations of greenhouse gases are more than 30% greater than preindustrial levels and are climbing steadily. Petroleum reserves, expected to be tapped by over a billion automobiles worldwide by 2015, may last only another 50-100 years. And without careful preservation efforts, the biodiversity of the planet could become as threatened in this coming century as it was at the end of the last ice age, when more than 70% of the species of large 93 mammals and other vertebrates in North America disappeared (along with 29% in Europe and 86% in Australia). All these perceived limits require innovation of a scope and intensity surpassing humankind's current commitment. The list of real-world problems that could thwart global sustainability is long and sobering. It includes war, disease, famine, political and religious turmoil, despotism, entrenched poverty, illiteracy, resource depletion, and environmental degradation. Technology can help resolve some of these issues--poverty and disease, resource depletion, and environmental impact, for example--but it offers little recourse for the passions and politics that divide the world. The likelihood is that we will not catch up and overtake the moving target of global sustainability in the coming century, but given the prospects for technology, which have never been brighter, we may come surprisingly close. We should put our technology to work, striving to lift more than 5 billion people out of poverty while preventing irreversible damage to the biosphere and irreversible loss of the earth's natural resources. 94 Spills Cloud Computing Helped to solve Deepwater Horizon King 10 BP: Oil spill response taught cloud and workflow management lessons Separate internal report due out today By Leo King | Computerworld UK | Published 09:20, 08 September 10 http://www.computerworlduk.com/news/it-vendors/bp-oil-spill-response-taught-cloud-and-workflowmanagement-lessons-3238110/ TH But in a separate report filed yesterday with the US drilling regulator, the Bureau of Ocean Energy Management, Regulation and Enforcement, BP said it had learnt a great deal from the equipment and planning tools that were urgently deployed in response to the incident. It said there were key lessons in collaboration and sharing information, in improving processes, and in developing and applying major new IT systems. “The urgency in containing the spill and dealing with its effects has driven innovation in technology, tools, equipment, processes and know-how.” Using cloud computing had been vital in efforts to “rapidly scale collaboration tools”, BP said. “From source to shore, existing systems were evolved and expanded and new ones developed to advance work flow, improve coordination, focus efforts and manage risks,” it said. While BP said it wanted to avoid any future accidents on the same scale, it said that by using these systems now it will have the ability to respond more rapidly “with a clear direction as to personnel, resource and organisational needs”. Access to “timely and reliable information” was essential in improving decision-making and make the response safe, it said. “The Deepwater Horizon responders have been able to take advantage of cutting-edge tools to manage information-sharing inside the Unified Command [response centre],” it said, “and externally, to improve decisionmaking and coordinate complex activities across response and containment, such as simultaneous operations.” In terms of innovation, BP said it was learning how to operate up to 16 robotic submarines simultaneously in order to work on and repair well heads at immense depth. It is also employing “advanced visualisation techniques” to help manage up to 19 surface and submarine vessels in a narrow radius without crashes. 95 2AC Case Answers 96 Attorney General Oversight The Attorney General does not stop the collection of U.S. citizens’ data. Margo Schlanger 15 Intelligence Legalism and the National Security Agency's Civil Liberties Gap. Harvard National Security Journal 6 Harv. Nat'l Sec. J. 112. What has emerged from this E.O. 12,333 process is a number of ICelement-specific "AG Guidelines." Once issued, these are bureaucratically difficult to change. n76 For the NSA, as part of the Department of Defense, the Executive Order 12,333 Attorney General guidelines were signed in 1982 as part of Department of Defense Directive 5240.1-R, and have not since been modified. n77 These are joined by other similarly amendment-resistant documents. At the NSA, such documents include a (now mostly de)classified annex governing NSA's role and procedures n78 ; another document titled U.S. Signals Intelligence Directive 18 (generally referred to as USSID 18), which in turn has its own (de)classified annex and was apparently last updated in 2011; n79 and a formal policy document most recently issued in 2004, with yet another (de)classified annex. n80 Substantively, these documents together function like FISA minimization procedures, although they are laxer in several ways. Procedurally, however, they are very different. For FISA minimization, written justifications and [*132] explanations of each program are filed with the FISA Court and undergird each eventual court approval. Any change in For E.O. 12,333 processes, the AG Guidelines are more freestanding; there is no subsequent formal implementation check. Thus even apart from the greater leeway allowed by the AG Guidelines, compared to FISAapproved minimization procedures, the result is substantially more operational freedom under 12,333 than under FISAIn addition to its requirements of Attorney General-approved processes, Executive Order 12,333 "delegate[s]" to the Attorney General the authority "to approve the use for intelligence purposes, within the United States or against a United States person abroad, of any technique for which a warrant would be required the underlying processes might be material to the Court's approval, and therefore needs to be explained. n81 if undertaken for law enforcement purposes," if the Attorney General finds "probable cause to believe that the technique is directed against a Attorney General operates essentially like a warrant granting magistrate, with operational control of the decision to initiate surveillance. (This foreign power or an agent of a foreign power." n82 Under this provision, the requirement has been largely superseded by FISA Title VII, but it remains operative in some rare situations, and also in emergencies. n83) While there is no judicial involvement, the process is very similar to a judicial one; the same lawyers who prepare FISA applications prepare a similar application for the Attorney General to approve (or reject). n84 97 Neg 98 Case The NSA has legal jurisdiction and guidance to collect data overseas. They protect American Citizens’ data collected via bulk collection. The New Zealand Herald 2013 December 7, Saturday NSA defends global cellphone tracking as legal Newspaper SECTION: NEWS; World – AP TH The National Security Agency on Friday said its tracking of cellphones overseas is legally authorized under a sweeping U.S. presidential order. The distinction means the extraordinary surveillance program is not overseen by a secretive U.S. intelligence court but is regulated by some U.S. lawmakers, Obama administration insiders and inspectors general. Documents obtained from former NSA contractor Edward Snowden showed that the NSA gathers as many as 5 billion records every day about the location data for hundreds of millions of cellphones worldwide by tapping into cables that carry international cellphone traffic. The Washington Post said the collection inadvertently scoops up an unknown amount of U.S. data as well. The NSA said Friday it was not tracking every foreign phone call and said it takes measures to limit how much U.S. data is collected. The NSA has declined to provide any estimates about the number of Americans whose cellphones it has tracked because they were traveling overseas or their data was irrevocably included in information about foreigners" cellphones. "It is not ubiquitous," NSA spokeswoman Vanee Vines said in a statement. "NSA does not know and cannot track the location of every cell phone." Vines said the collection of the global cellphone location data is carried out under the White House order that governs all U.S. espionage, known as Executive Order 12333. That means congressional committees and relevant inspectors general can oversee the program, but the secret court established under the Foreign Intelligence Surveillance Act would not. A frequent justification for the NSA programs by President Barack Obama and top U.S. intelligence officials is that they are overseen by all three branches of government. "The NSA claims its collection is incidental, but there is no question it"s deliberately engaging in the mass collection of cell phone location data that it knows will inevitably sweep up information on a huge number of innocent Americans," said Catherine Crump, American Civil Liberties Union staff attorney, in a statement. "And, all of this is happening without any supervision by a court." The NSA spokeswoman, Vines, said legal restrictions under the intelligence law still apply to the cellphone tracking. When NSA analysts realize they unintentionally collected an American"s information, they would have to separate it when possible or wall it off from the other information, and limit who can access it and how long it is kept. But an intelligence lawyer told the Post that when U.S. cellphone data are collected, the data are not covered by the Fourth Amendment, which protects Americans against unreasonable searches and seizures. "FISA authorization would be required for the intentional collection of domestic metadata," Vines said. "This activity is centered on overseas locations." She said no domestic NSA program gathers such geolocation data. XO 12333 ensures that American’s data is protected and confidential. Safe guards are currently in place. Joel 2014 (Alexander W. Joel is the civil liberties protection officer for the Office of the Director of National Intelligence and reports directly to Director of National Intelligence James R. Clapper http://www.politico.com/magazine/story/2014/08/the-truth-about-executive-order-12333110121.html#ixzz3Zr9NkzSy) In the Aug. 14 issue of the New York Times, reporter Charles Savage describes whistleblower actions taken by former State Department employee John Napier Tye. Tye, who was the section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights, and Labor before stepping down in April, questioned whether the rules governing certain overseas intelligence surveillance activities adequately protect information that intelligence agencies “incidentally collect” about Americans while targeting the communications of foreign nationals overseas. In a Washington Post op-ed on July 18, Tye pointed out that such intelligence collection may be regulated not by the Foreign Intelligence Surveillance Act (FISA), but by Executive Order 12333. That order, updated in 2008 by President George W. Bush, helps govern the activities of the intelligence community. Under EO 12333, intelligence agencies may 99 collect, retain, and disseminate information about Americans “only in accordance with procedures … approved by the Attorney General … after consultation with the Director [of National Intelligence].” Tye noted that he is not familiar with the details of these procedures, but nonetheless said that Americans should be troubled by “the collection and storage of their communications” under the executive order. As the civil liberties protection officer for the director of national intelligence (DNI), I work with intelligence agencies on these procedures, and would like to describe how they safeguard privacy and civil liberties. But first I want to commend Tye for raising his concerns through the processes established for that purpose. Using those processes, he has been able to review his concerns with intelligence oversight bodies as well as with the public, all while continuing to protect classified information. At the outset, remember that FISA, with very limited exceptions, requires the government to seek an individualized court order before it can intentionally target a United States person anywhere in the world to collect the content of his or her communications. The FISA court must be satisfied, based on a probable cause standard, that the United States person target is an agent of a foreign power, or, as appropriate, an officer or employee of a foreign power. But even when the government targets foreign nationals overseas in response to valid foreign intelligence requirements, it will inevitably collect some communications about Americans. As the Privacy and Civil Liberties Oversight Board noted in its examination of Section 702 of FISA, “[t]he collection of communications to and from a target inevitably returns communications in which nontargets are on the other end, some of whom will be U.S. persons.” Indeed, when Congress first enacted FISA in 1978, it required the government to follow what are called “minimization procedures.” These procedures, which must be approved by the FISA court, restrict what the government can do with collected information about U.S. persons (such as for how long that information may be retained, and under what circumstances it may be shared). Similarly, EO 12333 requires procedures to minimize how an agency collects, retains or disseminates U.S. person information. These procedures must be approved by the attorney general, providing an important additional check. The National Security Agency’s procedures are reflected in documents such as United States Signals Intelligence Directive SP0018 (USSID 18), issued in 1993 and updated in 2011. These procedures generally provide that communications may not be retained for more than five years. In addition, NSA personnel may not use U.S. person “selection terms” (such as names, phone numbers or email addresses) to retrieve communications from its collection under EO 12333 without a finding by the attorney general that the U.S. person is an agent of a foreign power (or in other similarly narrow circumstances). And even if the NSA determines that information about an American constitutes foreign intelligence, it routinely uses a generic label like “U.S. Person 1” in intelligence reporting to safeguard the person’s identity. The underlying identity may be provided only in a very limited set of circumstances, such as if it’s necessary to understand the particular foreign intelligence being conveyed. Oversight is extensive and multi-layered. Executive branch oversight is provided internally at the NSA and by both the Department of Defense and the Office of the DNI by agency inspectors general, general counsels, compliance officers and privacy officers (including my office and the NSA’s new Civil Liberties and Privacy Office). The Department of Justice also provides oversight, as do the Privacy and Civil Liberties Oversight Board and the president’s Intelligence Oversight Board. In addition, Congress has the power to oversee, authorize and fund these activities. Many of these protections apply expressly to information about U.S. persons. This is to be expected, in light of our legal framework and the need to ensure that foreign intelligence agencies protect national security without interfering with our democratic processes and our values. But intelligence agencies pursue their missions in a manner that provides important safeguards for all personal information. Indeed, the NSA’s extensive internal compliance system enforces key protections regardless of nationality, as shown by the letter recently issued by the NSA inspector general. That letter reported on the small number of cases over the past decade in which government employees had intentionally violated prohibitions on searching signals intelligence information; in several cases, employees were held accountable for improperly searching for information about foreign nationals. Tye stated that none of President Obama’s recent reforms affect 12333 collection. In fact, the president recently issued Presidential Policy Directive 28 (PPD-28), which covers EO 12333 signals intelligence (SIGINT) collection. It requires that SIGINT activities be as tailored as feasible, limits the use of SIGINT information collected in bulk and directs intelligence agencies to safeguard personal information collected through SIGINT, regardless of nationality. EO 12333 plays an important role in America’s intelligence oversight framework, so that, in the words of the order, agencies execute their missions “in a vigorous, innovative, and responsible manner that is consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded.” I hope the facts above help inform the public discussion on EO 12333. Obamas SIGINT Policy protects Americans’ privacy Michael Jefferson Adams 14 ARTICLE: Jus Extra Bellum: Reconstructing the Ordinary, Realistic Conditions of Peace. 2014 Harvard National Security Journal 5 Harv. Nat'l Sec. J. 377. Commander, Judge Advocate General's Corps, U.S. Navy; Deputy Legal Counsel to the Chairman of the Joint Chiefs of Staff. LL.M., Harvard Law School, 2013; J.D., Georgetown University Law Center, 2002; B.S., United States Naval Academy, 1996. The views expressed herein are those of Commander Adams in his personal capacity and are not necessarily those of the Chairman of the Joint Chiefs of Staff, the U.S. Navy, or the Department of Defense. This Article expands on select points originally made by the author in Six Degrees of Sovereignty: Understanding Sovereignty and Jurisdiction in the Physical, Informational, and Cognitive Dimensions of the Information Environment 12 (May 30, 2013) (unpublished LL.M. long paper, Harvard Law School) (on file with Harvard Law School Library). The 100 author would like to thank the numerous individuals who assisted with this Article and who transformed a rough sketch into what he hopes is a worthy effort. He thanks his family for their love, support, and inspiration. Thanks also to Kenneth Anderson and Benjamin Wittes for allowing him to borrow the phrase "the ordinary, realistic conditions of peace." Finally, this Article is written in appreciation for the men and women who go in harm's way. May it reinforce their lawful actions and offer them room to operate going forward. TH. After considering the Group's conclusions and recommendations, President Obama decided to implement a new SIGINT policy through which he promised to refine SIGINT practices in order to "maintain the trust of the American people, and people around the world." n270 The SIGINT policy recognizes that technology-driven intelligence collection is necessary in an era of transnational activities, digital communications, and persistent threats. It "appl[ies] to signals intelligence activities conducted in order to [*450] collect communications or information about communications . . . . " n271 The policy balances " . . . [U.S] security requirements, but also [U.S.] alliances; [U.S.] trade and investment relationships . . . ; and [the United States'] commitment to privacy and basic liberties." n272 To that end, the policy provides overarching principles of collection, n273 limits bulk collection of SIGINT, n274 changes interagency review processes, n275 creates reporting requirements and general provisions, n276 and alters long-established intelligence practices regarding those who are not "United States persons" pursuant to Executive Order 12333. n277 As the President explained, "The bottom line is that people around the world, regardless of their nationality, should know that the United States is not spying on ordinary people who don't threaten our national security, and that we take their privacy concerns into account in our policies and procedures." n278 Of course, the U.S. intelligence community is not concerned with the conversations of ordinary people. It seeks to identify global threats and trends in order to support the President's obligation to preserve, protect, and defend the United States. Consequently, the SIGINT policy allows for SIGINT collection "where there is a foreign intelligence or counterintelligence purpose . . . ." n279 It also provides a significant caveat to the privacy safeguards of Section Four of PPD-228. Following the model of E.O. 12333, PPD-28 limits "the term 'personal information' . . . [to] the same types of information covered by 'information concerning U.S. [*451] persons' under section 2.3 of Executive Order 12333." n280 Therefore, as a practical matter the SIGINT policy allows the U.S. intelligence community "to collect, retain, or disseminate information concerning [all] persons" n281 so long as the information is: (a) Information that is publicly available or collected with the consent of the person concerned; (b) Information constituting foreign intelligence or counterintelligence . . . ; (c) Information obtained in the course of a lawful foreign intelligence, counterintelligence, international drug or international terrorism investigation; (d) Information needed to protect the safety of any persons or organizations, including those who are targets, victims, or hostages of international terrorist organizations; (e) Information needed to protect foreign intelligence or counterintelligence sources, methods, and activities from unauthorized disclosure. . . . ; (f) Information concerning persons who are reasonably believed to be potential sources or contacts for the purpose of determining their suitability or credibility; (g) Information arising out of a lawful personnel, physical, or communications security investigation; (h) Information acquired by overhead reconnaissance not directed at specific United States persons; (i) Incidentally obtained information that may indicate involvement in activities that may violate Federal, state, local, or foreign laws; and [*452] (j) Information necessary for administrative purposes. n282 In short, the SIGINT policy created privacy safeguards but not at the expense of an extraordinarily wide swath of intelligence activities. In the transnational armed conflict, for example, enemy belligerents and direct participants in hostilities do not enjoy privacy protections--even if U.S. policy extends them to foreign civilians. n283 Moreover, outside of the transnational armed conflict, the U.S. intelligence community retained a great deal of freedom to conduct intelligence activities targeting terrorists and other global threats. n284 The political sensitivities and sensibilities of such operations may undergo greater scrutiny but they remain permissible under international and U.S. domestic law, as well as under the President's new policy. Still, the SIGINT policy change should not be overlooked. It sacrifices some degree of state autonomy in deference to diplomatic and political capital and out of respect for global privacy interests. n285 The policy does not assert that the U.S. government has any less legal right to collect SIGINT. But it might stoke the arguments of those who claim that the United States has no legal right to collect intelligence outside of Afghanistan and those who might go further to assert that American practices must accept privacy as a universal human right that applies globally and trumps the state's right to conduct intelligence. n286 On the other [*453] hand, the policy could better harmonize U.S. and partner intelligence policies or at least aid in bridging some legal divides. Relatedly, even if not expressions of opinio juris, these standards might also play a role in expressing some best practices against which the United States expects its conduct and that of others to be judged. Perhaps this might play a role in helping to explain and justify American practices, while also increasing political and diplomatic pressure on other states that violate them. Past court decisions provide the CIA and the NSA the authority to have warrantless data collection as long as the target is foreign. Multiple cases prove that XO 12333 is constitutional Daniel L. Pines Indiana Law Journal Spring, 2009 101 84 Ind. L.J. 637 Article: The Central Intelligence Agency's "Family Jewels": Legal Then? Legal Now?Assistant General Counsel, Office of General Counsel, Central Intelligence Agency. All statements of fact, opinion, or analysis expressed are those of the author and do not reflect the official positions or views of the Central Intelligence Agency or any other U.S. Government agency. Nothing in the contents should be construed as asserting or implying U.S. Government authentication of information or CIA endorsement of the author's views. This material has been reviewed by the CIA to prevent the disclosure of classified information. The author wishes to thank Robert M. Chesney for his assistance with this Article. TH The Family Jewels describe two CIA operations involving the electronic surveillance of Americans in the United States. In neither operation did the CIA seek or acquire a warrant. In one operation, the CIA listened to radio telephone calls between alleged drug traffickers in the United States and South America. n187 The surveillance ended after four months, when the CIA's General Counsel rendered an opinion that the activity was illegal. n188 A more notorious CIA electronic surveillance operation was Project Mockingbird, which involved tapping the Washington, D.C. telephones of two U.S. newspaper reporters in 1963. n189 The operation was done with the support of the telephone company, n190 and with the apparent knowledge and consent of the Attorney General. n191 The reporters had published extensive news articles that contained highly classified CIA information. n192 The CIA tapped the reporters' phones to identify the sources of that classified information, in order to prevent such leaks from continuing. n193 The operation culminated in the identifi-cation of dozens and dozens of the reporters' sources, including a White House staffer, an Assistant [*660] Attorney General, twenty-one congressional staffers, six Members of Congress, and twelve Senators. n194 The question of whether the United States government is permitted to conduct this type of warrantless electronic surveillance of Americans has been an on-going debate for forty years, and remains unresolved. n195 The tension stems from two competing facets of the United States Constitution. The Fourth Amendment prohibits the United States gov-ernment from searching the property of an American absent a warrant. n196 In juxtaposition is what is referred to as the inherent constitutional authority of the President to engage in foreign affairs. n197 This tension is aided by the fact that the Framers of the Constitution did not, and could not, foresee the concept of electronic surveillance (as there were no tele-phones in 1776, much less a means to tap them), and therefore could not even contemplate the problems such surveil-lance would place on the Fourth Amendment in the area of national security. n198 The Supreme Court first addressed the constitutionality of electronic surveillance in 1967 when it held that warrant-less searches in a domestic criminal context generally were "per se unreasonable under the Fourth Amendment . . . ." n199 However, the Court explicitly demurred as to whether a warrant would be required for electronic surveillance "in a situ-ation involving the national security. . . ." n200 The Court addressed that latter issue in 1972, in analyzing a warrantless wiretap of three individuals accused of conspiring to destroy a CIA office in Michigan. n201 Though the Court found that the actions of the government there violated the Fourth Amendment's requirement of a warrant, it was cautious to indi-cate that its opinion "involves only the domestic aspects of national security. We have not addressed, and express no opinion as to, the issues which may be involved with respect to activities of foreign powers or their agents." n202 [*661] The Supreme Court has yet to address this last issue regarding foreign national security concerns. The Fourth Cir-cuit, however, considered this issue in the well- known case of United States v. Truong Dinh Hung, an espionage case in which Truong and others stood accused of transmitting classified information to representatives of the Socialist Re-public of Vietnam. n203 In investigating the case, and seeking to discover the scope and sources of the espionage, the United States government placed a tap on Truong's phone, and bugged his apartment, with Attorney General approval but without seeking a warrant from a court. n204 The Fourth Circuit upheld the warrantless tap and bug under the Fourth Amendment, noting that thwarting overseas threats requires speed and secrecy; requiring a warrant "would add a procedural hurdle" that would reduce the Presi-dent's ability to act quickly and would risk exposure. n205 The court also recognized that the executive branch possesses "unparalleled expertise" in the arena of foreign affairs, which the courts do not have and should not second- guess. n206 Finally, and most importantly, the court recognized that the executive branch is "constitutionally designated as the pre-eminent authority in foreign affairs" and therefore separation of powers requires the courts "to acknowledge the princi-pal responsibility of the President for foreign affairs and concomitantly for foreign intelligence surveillance." n207 The Truong court, however, placed some limits on warrantless foreign intelligence surveillance. The target of the surveil-lance must be a foreign power, or an agent or collaborator of a foreign power; the surveillance must be primarily for foreign intelligence purposes; and the surveillance must be reasonable. n208 Every other lower court that considered the matter has come to the same conclusion and has upheld the executive branch's ability to conduct warrantless electronic searches in the United States so long as there is Attorney General ap-proval and the purpose of the surveillance is to acquire foreign intelligence information. n209 The [*662] conduct of such warrantless electronic surveillance for this purpose not only precludes any allegation of constitutional violation, but, being based on the constitutional power of the President, also would appear to vitiate any claim that such activities vio-late federal statutes that prohibit warrantless electronic surveillance. n210 The law in this area changed in 1978 with passage of the Foreign Intelligence Surveillance Act (FISA), n211 which was meant to place the constitutional debate on hold. n212 FISA represented a contentious and difficult compromise re-garding the collection of foreign intelligence. n213 The Supreme Court had left the door open regarding warrantless wire-taps for foreign intelligence 102 purposes, and the lower courts had uniformly permitted the government to go through that door. However, the executive branch worried that the Supreme Court might decide to take up the matter and issue a less favorable ruling. n214 Furthermore, numerous lawsuits had been filed challenging warrantless electronic surveillance, and most telephone companies and government agencies were becoming reluctant to engage in such surveillance without a court order. n215 FISA thus sought to balance the public's concern about an unfettered government with the executive branch's need to collect foreign intelligence quickly and in secret. n216 One of FISA's main tenets was the creation of the Foreign Intel-ligence Surveillance Court (FISC), which is a special tribunal comprised of eleven district court judges. n217 FISA author-izes judges on the FISC to issue foreign intelligence warrants if certain [*663] criteria are met. n218 Requests to the FISC must be in writing and under oath, and must be approved by the Attorney General after personal review. n219 For a warrant to issue, the FISC judge must find probable cause to believe that the target is a foreign power or an agent of a foreign power, and that foreign intelligence information is being sought. n220 FISC judges hold hearings in secret and ex parte, and their decisions are usually not published. n221 The Attorney General may still authorize warrantless electronic surveillance, but only in very limited circumstances. n222 Criminal and civil liabilities attach to violations of FISA, and a private right of action exists. n223 Per its terms, FISA is considered the "exclusive means" of engaging in electronic surveillance for foreign intelli-gence purposes. n224 Nonetheless, a recent argument has been made that the restrictions of FISA can be superseded in certain circumstances. Supporters of this position note that portions of FISA contain the provision "unless authorized by statute." n225 Therefore, it has been argued that a statute authorizing the President to engage in wide-ranging activities designed to protect the nation in time of emergency, such as the Authorization for Use of Military Force Resolution (AUMF) enacted in the wake of 9/11, n226 can serve to overcome the restrictions of FISA, including the preclusion of electronic surveillance absent a FISC-ordered warrant. n227 Indeed, this was the legal argument employed by the Bush Administration to validate the National Security Agency's "Terrorist Surveillance Program." n228 Critics of this [*664] argument, who are numerous, assert that the specific restrictions contained in FISA cannot be overcome by a much broader and less specific statute such as the AUMF. n229 An additional, and more fundamental, argument in favor of Presidential primacy in this area asserts that FISA can-not usurp the aforementioned inherent presidential authority over foreign affairs. As Professor Robert Turner, one of the most forceful advocates of this position describes: At the core of exclusive presidential constitutional powers are the conduct of diplomacy, the collection of foreign intelligence, and the supreme command of military forces and conduct of military operations. Into these areas, Congress was not intended by the Founding Fathers to interfere. This was the consistent view of the Federalist Papers and the courts have repeatedly affirmed these principles. n230 Per Professor Turner and others, including the Bush Administration, this authority provides the President with power to engage in warrantless searches, a power that cannot be taken away by Congress through FISA or any other mechanism, as a matter of constitutional law. n231 The FISC Court of Review, in the only opinion it has ever issued, ap-pears to confirm this position. The court, in discussing whether the President has the inherent authority to conduct war-rantless searches to obtain foreign intelligence information, stated: "We take for granted that the President does have that authority and, assuming that is so, FISA could not encroach on the President's constitutional power." n232 However, this assertion is hotly contested. Critics have asserted that the Constitution is not as clear cut as Professor Turner suggests; that the executive branch has acceded to the exclusivity of FISA when President Carter signed FISA into law in 1978; that such accession is further evidenced by the executive branch's continued use of the FISC; and that the proper mechanism for concerns about FISA is to seek a legislative amendment. n233 Congress apparently sought to resolve this issue when it amended FISA in 2008 to, inter alia, expressly provide that FISA "shall be the exclusive means by which electronic surveillance and the interception of domestic wire, oral, or electronic communications may be conducted." n234 However, such legislation does not resolve the underlying constitutional argument. [*665] Finally, it should be noted that EO 12,333 also precludes the CIA from "engag[ing] in electronic surveillance with-in the United States except for the purpose of training, testing, or conducting countermeasures to hostile electronic sur-veillance." n235 However, as noted previously, the limitations of EO 12,333 can be countermanded by presidential di-rective. n236 Overall then, it seems clear that at the time of the Family Jewels in 1973 the CIA could engage in electronic sur-veillance in the United States without a warrant but with Attorney General approval, so long as the purpose was to collect foreign intelligence. n237 It is also possible that the target of the surveillance needed to be a foreign power or an agent of a foreign power, as mandated by some courts. n238 These requirements continue today, with the additional requirement that the Agency likely would need to acquire a warrant from the FISC or at least a presidential directive. n239 103 Adv 1 No set threshold where debt impacts GDP Pescatori 14 [Andrea, Economist at the Research Department of the IMF, former fellow at the Bank of Italy and Economist at the Federal Reserve Bank of Cleveland, Ph.D. in economics (Universitat Pompeu Fabra in Barcelona, Spain), this report was coauthored by Damiano Sandri and John Simon (1st is an economist at the IMF and has an M.A. and PhD in Economics from the Johns Hopkins University + 2nd has a PhD from MIT and is a Senior Economist at the IMF), “Debt and Growth: Is There a Magic Threshold?” WP/14/34, 2014, IMF, http://www.imf.org/external/pubs/ft/wp/2014/wp1434.pdf] Is there a particular threshold in the level government debt above which the medium-term growth prospects are dramatically compromised? The answer to this question is of critical importance given the historically high level of public debt in most advanced economies. Yet there is currently no agreement on the answer and it is the subject of heated academic and political debate. One camp has argued that high levels of debt are associated with particularly large negative effects on growth. For example, an influential series of papers by Reinhart and Rogoff (2010, 2012) argues that there is a threshold effect whereby debt above 90 percent of GDP is associated with dramatically worse growth outcomes. An opposing perspective is advanced by those who dispute the notion that there is a clear debt threshold above which debt sharply reduces growth and raise endogeneity concerns whereby weak growth is the cause of particularly high levels of debt. Thus, according to this view, the priority should be increasing growth rather than reducing debt and, consequently, that much less short-term fiscal austerity is appropriate. This paper makes a contribution to the debate by presenting new empirical evidence based on a different way of analyzing the data and a sizeable dataset. Our methodology is based on the analysis of the relation between debt and growth over longer periods of time that has the potential to attenuate the concerns of reverse causality from growth to debt. Our results do not identify any clear debt threshold above which medium-term growth prospects are dramatically compromised. On the contrary, the association between debt and medium-term growth becomes rather weak at high levels of debt, especially when controlling for the average growth performance of country peers. We also find evidence that the debt trajectory can be just as important, and possibly more important, than the level of debt in understanding future growth prospects. Indeed, countries with high but declining levels of debt have historically grown just as fast as their peers. We also find, however, that high levels of debt are weakly associated with higher output volatility. This suggests that high levels of debt may still be associated with market pressure or fiscal and monetary policy actions that, even if they do not have particularly large negative effects on medium-term growth, destabilize it. 104 Decline Doesn’t Cause War Dense economic linkages make conflict impossible Jervis 11 – Professor of Political Science @ Columbia Robert, Professor in the Department of Political Science and School of International and Public Affairs at Columbia University, December 2011, “Force in Our Times,” Survival, Vol. 25, No. 4, p. 403-425 Even if war is still seen as evil, the security community could be dissolved if severe conflicts of interest were to arise. Could the more peaceful world generate new interests that would bring the members of the community into sharp disputes? 45 A zero-sum sense of status would be one example, perhaps linked to a steep rise in nationalism. More likely would be a worsening of the current economic difficulties, which could itself produce greater nationalism, undermine democracy and bring back old-fashioned beggar-my-neighbor economic policies. While these dangers are real, it is hard to believe that the conflicts could be great enough to lead the members of the community to contemplate fighting each other. It is not so much that economic interdependence has proceeded to the point where it could not be reversed – states that were more internally interdependent than anything seen internationally have fought bloody civil wars. Rather it is that even if the more extreme versions of free trade and economic liberalism become discredited, it is hard to see how without building on a preexisting high level of political conflict leaders and mass opinion would come to believe that their countries could prosper by impoverishing or even attacking others. Is it possible that problems will not only become severe, but that people will entertain the thought that they have to be solved by war? While a pessimist could note that this argument does not appear as outlandish as it did before the financial crisis, an optimist could reply (correctly, in my view) that the very fact that we have seen such a sharp economic down-turn without anyone suggesting that force of arms is the solution shows that even if bad times bring about greater economic conflict, it will not make war thinkable. Empirical studies show no causal relationship between economic decline and war Miller 1 – prof of economics Morris Miller 2001, Professor of Economics, Poverty: A Cause of War?, http://archive.peacemagazine.org/v17n1p08.htm Library shelves are heavy with studies focused on the correlates and causes of war . Some of the leading scholars in that field suggest that we drop the concept of causality, since it can rarely be demonstrated. Nevertheless, it may be helpful to look at the motives of war-prone political leaders and the ways they have gained and maintained power, even to the point of leading their nations to war. Poverty: The Prime Causal Factor? Poverty is most often named as the prime causal factor. Therefore we approach the question by asking whether poverty is characteristic of the nations or groups that have engaged in wars. As we shall see, poverty has never been as significant a factor as one would imagine. Largely this is because of the traits of the poor as a group - particularly their tendency to tolerate their suffering in silence and/or be deterred by the force of repressive regimes. Their voicelessness and powerlessness translate into passivity. Also, because of their illiteracy and ignorance of worldly affairs, the poor become susceptible to the messages of war-bent demagogues and often willing to become cannon fodder. The situations conductive to war involve political repression of dissidents, tight control over media that stir up chauvinism and ethnic prejudices, religious fervor, and sentiments of revenge. The poor succumb to leaders who have the power to create such conditions for their own self-serving purposes. Desperately poor people in poor nations cannot organize wars, which are exceptionally costly. The statistics speak eloquently on this point. In the last 40 years the global arms trade has been about $1500 billion, of which two-thirds were the purchases of developing countries. That is an amount roughly equal to the foreign capital they obtained through official development aid (ODA). Since ODA does not finance arms purchases (except insofar as money that is not spent by a government on aid-financed roads is available for other purposes such as military procurement) financing is also required to control the media and communicate with the populace to convince them to support the war. Large-scale armed conflict is so expensive that governments must resort to exceptional 105 sources, such as drug dealing, diamond smuggling, brigandry, or deal-making with other countries. The reliance on illicit operations is well documented in a recent World Bank report that studied 47 civil wars that took place between 1960 and 1999, the main conclusion of which is that the key factor is the availability of commodities to plunder. For greed to yield war, there must be financial opportunities. Only affluent political leaders and elites can amass such weaponry, diverting funds to the military even when this runs contrary to the interests of the population. In most inter-state wars the antagonists were wealthy enough to build up their armaments and propagandize or repress to gain acceptance for their policies. Economic Crises? Some scholars have argued that it is not poverty, as such, that contributes to the support for armed conflict, but rather some catalyst, such as an economic crisis. However, a study by Minxin Pei and Ariel Adesnik shows that this hypothesis lacks merit. After studying 93 episodes of economic crisis in 22 countries in Latin American and Asia since World War II, they concluded that much of the conventional thinking about the political impact of economic crisis is wrong: "The severity of economic crisis - as measured in terms of inflation and negative growth - bore no relationship to the collapse of regimes ... or (in democratic states, rarely) to an outbreak of violence... In the cases of dictatorships and semidemocracies, the ruling elites responded to crises by increasing repression (thereby using one form of violence to abort another)." Economic decline does not cause war Boehmer 7 – associate prof of poly sci @ UT-El Paso Charles Boehmer, Associate Professor, Dept. of Political Science @ University of Texas at El Paso. “The Effects of Economic Crisis, Domestic Discord, and State Efficacy on the Decision to Initiate Interstate Conflict”. Politics and Policy. Volume 35, Issue 4, Pages 774-809. Wiley InterScience. December 7, 2007. Scholars such as MacFie (1938) and Blainey (1988) have nevertheless questioned the validity of the diversionary thesis. As noted by Levy (1989), this perspective is rarely formulated as a cohesive and comprehensive theory, and there has been little or no knowledge cumulation. Later analyses do not necessarily build on past studies and the discrepancies between inquiries are often difficult to unravel. "Studies have used a variety of research designs, different dependent variables (uses of force, major uses of force, militarized disputes), different estimation techniques, and different data sets covering different time periods and different states" (Bennett and Nordstrom 2000, 39). To these problems, we should add a lack of theoretical precision and incomplete model specification. By a lack of theoretical precision, I am referring to the linkages between economic conditions and domestic strife that remain unclear in some studies (Miller 1995; Russett 1990). Consequently, extant studies are to a degree incommensurate; they offer a step in the right direction but do not provide robust cross-national explanations and tests of economic growth and interstate conflict. Economic decline empirically doesn’t cause great power wars – global integration checks Barnett, senior managing director of Enterra Solutions, 9 [Thomas P.M., August 24, World Politics Review, “The New Rules: Security Remains Stable Amid Financial Crisis,” http://www.worldpoliticsreview.com/articles/4213/the-new-rules-security-remainsstable-amid-financial-crisis, accessed 7-13-13, UR] Can we say that the world has suffered a distinct shift to political radicalism as a result of the economic crisis? ¶ Indeed, no. The world's major economies remain governed by center-left or center-right political factions that remain decidedly friendly to both markets and trade. In the short run, there were attempts across the board to insulate economies from immediate damage (in effect, as much protectionism as allowed under current trade rules), but there was no great slide into "trade wars." Instead, the World Trade Organization is functioning as it was designed to function, and regional efforts toward free-trade agreements have not slowed. ¶ Can we say Islamic radicalism was inflamed by the economic crisis? ¶ If it was, that shift was clearly overwhelmed by the Islamic world's growing disenchantment with the brutality displayed by violent extremist groups such as al-Qaida. 106 And looking forward, austere economic times are just as likely to breed connecting evangelicalism as disconnecting fundamentalism. ¶ At the end of the day, the economic crisis did not prove to be sufficiently frightening to provoke major economies into establishing global regulatory schemes, even as it has sparked a spirited -- and much needed, as I argued last week -discussion of the continuing viability of the U.S. dollar as the world's primary reserve currency. Naturally, plenty of experts and pundits have attached great significance to this debate, seeing in it the beginning of "economic warfare" and the like between "fading" America and "rising" China. And yet, in a world of globally integrated production chains and interconnected financial markets, such "diverging interests" hardly constitute signposts for wars up ahead. Frankly, I don't welcome a world in which America's fiscal profligacy goes undisciplined, so bring it on -please! Causal chains that link economic decline to great power war are factually and empirically untrue Ferguson, Harvard University Laurence A. Tisch History Professor, 6 [Niall, Senior Fellow at the Hoover Institution at Stanford University, September/October 2006, Council on Foreign Relations, Foreign Affairs vol. 85 issue 5, pp. 62-63, “The Next War of the World,” accessed 713-13, UR] Nor can economic crises explain the bloodshed. What may be the most familiar causal chain in modern historiography links the Great Depression to the rise of fascism and the outbreak of World War II. But that simple story leaves too much out. Nazi Germany started the war in Europe only after its economy had recovered. Not all the countries affected by the Great Depression were taken over by fascist regimes, nor did all such regimes start wars of aggression. In fact, no general relationship between economics and conflict is discernible for the century as a whole. Some wars came after periods of growth, others were the causes rather than the consequences of economic catastrophe, and some severe economic crises were not followed by wars.¶ Many trace responsibility for the butchery to extreme ideologies. The Marxist historian Eric Hobsbawm calls the years between 1914 and 1991 "an era of religious wars" but argues that "the most militant and bloodthirsty religions were secular ideologies." At the other end of the political spectrum, the conservative historian Paul Johnson blames the violence on "the rise of moral relativism, the decline of the rise of new ideologies or the decline of old values cannot be regarded as causes of violence in their own right. Extreme belief systems, such as antiSemitism, have existed for most of modern history, but only at certain times and in certain places have they been widely embraced and translated into violence. personal responsibility [and] the repudiation of Judeo-Christian values." But 107 Free Trade Defense Trade conflicts won’t escalate Joseph Nye 96, Dean of the Kennedy School of Government – Harvard University, Washington Quarterly The low likelihood of direct great power clashes does not mean that there will be no tensions between them. Disagreements are likely to continue over regional conflicts, like those that have arisen over how to deal with the conflict in the former Yugoslavia. Efforts to stop the spread of weapons of mass destruction and means of their delivery are another source of friction, as is the case over Russian and Chinese nuclear cooperation with Iran, which the United States steadfastly opposes. The sharing of burdens and responsibilities for maintaining international security and protecting the natural environment are a further subject of debate among the great powers. Furthermore, in contrast to the views of classical Liberals, increased trade and economic interdependence can increase as well as decrease conflict and competition among trading partners. The main point, however, is that such disagreements are very unlikely to escalate to military conflicts. No trade war impact Ian Fletcher 8/29/11 Ian Fletcher is Senior Economist of the Coalition for a Prosperous America, former Research Fellow at the U.S. Business and Industry Council M.A. and B.A. from Columbia and U Chicago, "Avoid Trade War? We're Already In One!" [www.huffingtonpost.com/ian-fletcher/avoid-trade-war-were-alre_b_939967.html] trade war is that, unlike actual shooting war, it has no historical precedent. In fact, there has never been a significant trade war, "significant" in the sense of having done serious economic damage. All history records are minor skirmishes at best.¶ Go ahead. Try and name a trade war. The Great Trade War of 1834? Nope. The Great Trade War of 1921? Nope Again. There isn't one.¶ The standard example free traders give is that America's Smoot-Hawley tariff of 1930 either caused the Great Depression or made it spread around the world. But this canard does not survive serious examination, and has actually been denied by almost every economist who has actually researched the question in depth -- a group ranging from Paul Krugman on the left to Milton Friedman on the right.¶ The Depression's cause was monetary. The curious thing about the concept of The Fed allowed the money supply to balloon during the late 1920s, piling up in the stock market as a bubble. It then panicked, miscalculated, and let it collapse by a third by 1933, depriving the economy of the liquidity it needed to breathe. Trade had nothing to do with it.¶ As for the charge that Smoot caused the Depression to spread worldwide: it was too small a change to have plausibly so large an effect. For a start, it only applied to about one-third of America's trade: about 1.3 percent of our GDP. Our average tariff on dutiable goods went from 44.6 to 53.2 percent -- not a terribly big jump. Tariffs were higher in almost every year from 1821 to 1914. Our tariff went up in 1861, 1864, 1890, and 1922 without producing global depressions, and the recessions of 1873 and 1893 managed to spread worldwide without tariff increases.¶ As the economic historian (and free trader!) William Bernstein puts it in his book A Splendid Exchange: How Trade Shaped the World,¶ Between 1929 and 1932, real GDP fell 17 percent worldwide, and by 26 percent in the United States, but most economic historians now believe that only a miniscule part of that huge loss of both world GDP and the United States' GDP can be ascribed to the tariff wars. .. At the time of SmootHawley's passage, trade volume accounted for only about 9 percent of world economic output. Had all international trade been eliminated, and had no domestic use for the previously exported goods been found, world GDP would have fallen by the same amount -- 9 percent. Between 1930 and 1933, worldwide trade volume fell off by one-third to one-half. Depending on how the falloff is measured, this computes to 3 to 5 percent of world GDP, and these losses were partially made up by more expensive domestic goods. Thus, the damage done could not possibly have exceeded 1 or 2 percent of world GDP -- nowhere near the 17 percent falloff seen during the Great Depression... The inescapable conclusion: contrary to public perception, Smoot-Hawley did not cause, or even significantly deepen, the Great Depression.¶ The oftbandied idea that Smoot-Hawley started a global trade war of endless cycles of tit-for-tat retaliation is also mythical. According to the official State Department report on this very question in 1931:¶ With the exception of discriminations in France, the extent of discrimination against American commerce is very slight...By far the largest number of countries do not discriminate against the commerce of the United States in any way.¶ That is to say, foreign nations did indeed raise their tariffs after the passage of Smoot, but this was a broad-brush response to the Depression itself, aimed at all other foreign nations without distinction, not a retaliation against the U.S. for its tit-for-tat retaliation between trading partners that paralyzes free traders with fear today simply did not happen.¶ "Notorious" Smoot-Hawley is a deliberately fabricated myth, plain and simple. We should not allow this myth to paralyze our policy-making in the present day.¶ There is a basic unresolved paradox at the bottom of the very concept of trade war. If, as free traders insist, free trade is beneficial whether or not one's trading partners reciprocate, then why would any own tariff. The doom-loop of spiraling 108 rational nation start one, no matter how provoked? The only way to explain this is to assume that major national governments like the Chinese and the U.S. -- governments which, whatever bad things they may have done, have managed to hold nuclear weapons for decades without nuking each other over trivial spats -- are not players of realpolitik, but schoolchildren.¶ When the moneymen in Beijing, Tokyo, ponder the financial realpolitik of exaggerated retaliation against the U.S. for any measures we may employ to bring our trade back into balance, they will discover the advantage is with us, not them. Because they are the ones with trade surpluses to lose, not us.¶ So our present position of Berlin, and the other nations currently running trade surpluses against the U.S. start to weakness is, paradoxically, actually a position of strength.¶ Likewise, China can supposedly suddenly stop buying our Treasury Debt if we rock the boat. But this would immediately reduce the value of the trillion or so they already hold -- not to mention destroying, by making their hostility overt, the fragile (and desperately-tended) delusion in the U.S. that America and China are still benign economic "partners" in a winwin economic relationship.¶ At the end of the day, China cannot force us to do anything economically that we don't choose to. America is still a nuclear power. We can -- an irresponsible but not impossible scenario -- repudiate our debt to them (or stop paying the interest) as the ultimate counter-move to anything they might contemplate. More plausibly, we might simply restore the tax on the interest on foreign-held bonds that was repealed in 1984 thanks to Treasury Secretary Donald Regan.¶ Thus a certain amount of back-and-forth token retaliation (and loud squealing) is indeed likely if America starts defending its interests in trade as diligently as our trading partners have been defending theirs, but that's it. The rest of the world engages in these struggles all the time without doing much harm; it will be no different if we join the party. 109 Adv 2 Sanctions aren’t working, The U.S. is shifting towards Hard Power to deal with Russia Lendon, June 23, 2015 (Brad Lendon, CNN http://www.cnn.com/2015/06/23/politics/us-armortanks-europe-russia-ash-carter/ (CNN)The U.S. military will be sending dozens of tanks, Bradley armored fighting vehicles and selfpropelled howitzers to allied countries in the Baltics and Eastern Europe in response to Russian actions in the Ukraine, Defense Secretary Ash Carter said Tuesday. The equipment, enough to arm one combat brigade, will be positioned in Estonia, Lithuania, Latvia, Bulgaria, Romania and Poland, Carter announced at a press conference with U.S. allies in Estonia. Carter said the equipment will be moved around Europe for training and exercises. The U.S. defense chief also said Washington and its NATO allies will be boosting cyber defense efforts. "We must prepare NATO and our allies for cyber challenges, particularly from Russia," Carter said in prepared remarks. Carter's announcement comes during a week-long tour of Europe. "We need to explain to those who doubt the value of our NATO commitments that the security of Europe is vital to everything else we hold dear," Carter said at a press event with his German counterpart Monday. While Carter won't be visiting Russia on this trip, Russian President Vladimir Putin's influence looms over the tour's discussions. "One of [Putin's] stated views is a longing for the past and that's where we have a different perspective on the world and even on Russia's future," he told reporters en route to Germany, in response to a question about whether Putin is a rational actor. "We'd like to see us all moving forward, Europe moving forward, and that does not seem to be his stated perspective." Carter also addressed comments Putin made last week, announcing the addition of 40 intercontinental ballistic missiles to Russia's nuclear arsenal, a move Carter said reflected "posturing" on the Russian leader's part. "Nuclear weapons are not something that should be the subject of loose rhetoric by world leadership," Carter said. "We all understand the gravity of nuclear dangers. We all understand that Russia is a long established nuclear power. There is no need for Vladimir Putin to make that point." Carter's comments are just the latest in an escalating war of words between U.S. and Russian officials. Speaking at the St. Petersburg International Economic Forum on Friday, Putin denied his government is behaving aggressively. "We are not aggressive," Putin said. "We are persistent in pursuing our interests." "The biggest threat on my mind is what's happening with Russia and the activities of Russia," James said during a visit to the Paris Air Show. "It's extremely worrisome on what's going on in the Ukraine." Like what Carter said is planned for the U.S. Army's tanks, U.S. Air Force planes have been rotating through Europe under Operation Atlantic Resolve. Participating in those exercises and rotations have been B-2 and B-52 bombers, F-15Cs and A-10 attack planes. James said the F-22 Raptor, the Pentagon's premier fighter, could join that list. "I could easily see the day -though I couldn't tell you the day exactly -- when the F-22, for example, rotates in is a possibility. I don't see why that couldn't happen in the future," James said, The Army, too, has been active in these exercises. In March, the Army sent a convoy of armored vehicles on an1,100-mile trek from the Baltics through Poland and the Czech Republic to Germany. Analysts said the size of the armor deployment Carter announced Tuesday was showed it was more symbolic than strategic. During the Cold War, the U.S. had the same amount of armor, a brigade, stationed in just one small part of what was then West Germany, said retired Brig. Gen. Mark Kimmit, the former military assistant to the Supreme Allied Commander in Europe. "We are now talking about taking one brigade combat team and splitting it among these six countries. That should hardly be seen as a threat to Russia," Kimmit said. But the symbolism was important, he said. "We're sending a message of assurance to our NATO allies. We have obligations, under the NATO treaty, to defend those countries if attacked. I think those countries in the region are going to be welcoming the positioning of these - this equipment into their countries," Kimmit said. Orysia Lutsevych, an analyst with the Chatham House think tank in London, said the U.S. and its NATO allies should have been making these kind of statement to Moscow sooner. The Obama administration "should have pushed the Kremlin before reaching to the kind of moment of escalation we are having right now," Lutsevych said. "By trying to appease the Kremlin too long, we will be facing with a higher cost every day." E.U. hates the sanctions. It kills their econ and they have to be forced to take actions. Russia Today, 2014 http://rt.com/usa/193044-us-embarrass-eu-sanctions/ America’s leadership had to embarrass Europe to impose economic hits on Russia over the crisis in Ukraine – even though the EU was opposed to such a motion, US Vice President Joe Biden revealed during a speech at Harvard. “We’ve given Putin a simple choice: Respect Ukraine’s sovereignty or face increasing consequences,” 110 Biden told a gathering at the John F. Kennedy Jr. Forum at Harvard University's Institute of Politics on Thursday. The consequences were the sanctions which the EU imposed on Russia, first targeting individual politicians and businessmen deemed responsible for the crisis in Ukraine, then switching to the energy, defense, and economic sectors. “It is true they did not want to do that,” Biden admitted. “It was America’s leadership and the president of the United States insisting, oft times almost having to embarrass Europe to stand up and take economic hits to impose costs,” the US vice president declared. Those costs deemed behind the ruble's historic plunge not only forced America’s ExxonMobil to retreat from Russia’s Arctic shelf, but also provoked counter-measures from Moscow, which suspended certain food imports from the EU. Russia’s counter-sanctions have hit many of the EU’s agricultural states. EU members, particularly those close to Russia, were the most affected by the loss of the Russian market. For instance, the Netherlands – the world’s second-largest exporter of agricultural products – is set to lose 300 million euro annually from canceled business with Russia, as it accounts for roughly 10 percent of Dutch exports of vegetables, fruit, and meat. At the same time, Poland was hit hard by the Kremlin’s sanctions, as its food exports to Russia totaled $1.5 billion in 2013. Spain, a large exporter of oranges to Russia, is estimated to miss out on 337 million euro ($421 million) in food and agriculture sales, while Italy has estimated its losses at nearly 1 billion euro ($1.2 billion). Following pressure from local farmers, a 125 million euro EU Commission Common Agricultural Policy fund was established, from which the growers are expected to get some cash, while Amsterdam is willing to cover the cost of transporting excess produce to eight food banks across Holland. Overall, Moscow’s one-year food embargo against the EU, the US, Norway, Australia, and Canada will block an estimated $9 billion worth of agricultural exports to Russia. With European countries now at a loss with apple and dairy surplus, it is not exactly clear whether EU producers will be able to return to the Russian markets after the one-year ban expires. However, this is no secret to the US, as Assistant Secretary of State Victoria Nuland remarked on Thursday. “Implementing sanctions isn’t easy and many countries are paying a steep price. We know that. But history shows that the cost of inaction and disunity in the face of a determined aggressor will be higher,” Nuland said. Nuland’s reference to necessary action against the “aggressor” might be taken with a grain of salt by the Europeans, as the “F**k the EU” leak is still fresh in their memory. The four-minute video – titled ‘Maidan puppets,’ referring to Independence Square in Ukraine’s capital – was uploaded by an anonymous user to YouTube. Nuland was recorded as saying the notoriously known phrase during a phone call with US Ambassador to Ukraine Geoffrey Pyatt, as the two were seemingly discussing a US-preferred line-up of the Ukrainian government. It apparently referred to Washington’s policy differences with those of the EU on ways of handling the Ukrainian political crisis, with Nuland suggesting to “glue this thing” with the help of the UN and ignore Brussels. The US State Department did not deny the authenticity of the video and stressed that Nuland had apologized for the “reported comments.” The E.U. is still working with the United States, despite NSA spying. Derek E. Mix Analyst in European Affairs 2014 The United States and Europe: Current Issues Derek E. Mix Analyst in European Affairs February 3, 2015 Congressional Research Service pg 16 The United States and Europe: Current Issues Privacy and Surveillance 35 Greg Miller, “Backlash in Berlin over NSA Spying Recedes as Threat from Islamic State Rises,” Washington Post, December 29, 2014. TH https://www.fas.org/sgp/crs/row/RS22163.pdf In 2013, press reports began surfacing about U.S. National Security Agency (NSA) surveillance programs in the United States and Europe created acute tensions in the transatlantic relationship. Among other allegations, the reports asserted that objects of U.S. spying included the EU offices in Washington, DC and the cell phone of German Chancellor Angela Merkel. The information was based on leaked, classified documents obtained from Edward Snowden, a former NSA contractor; and focused on operations allegedly conducted by the NSA and the UK’s Government Communications Headquarters (the UK’s signals intelligence agency). The reports raised serious concerns on both sides of the Atlantic about the extent of U.S. surveillance operations, the degree of involvement by European intelligence services, and the appropriate balance between promoting security and upholding privacy rights and civil liberties. Some observers worry that the allegations have resulted in lasting damage to transatlantic trust, negatively affecting U.S.-European political, security, and economic ties. Many European leaders, EU officials, and European citizens were deeply dismayed by the reports and concerned that such operations could violate European privacy rights and civil liberties and compromise the security of European citizens’ personal data. Criticism has been most pronounced in Germany, where disclosed NSA activities appear to have been broad in scope and the issue of government surveillance of private citizens evokes particularly strong feelings due to the legacy of domestic spying by the Nazi and East German regimes. Many analysts point out that the fallout from the reports could have implications for U.S.- European cooperation on counterterrorism and data privacy by complicating negotiations about renewal of the SWIFT and passenger name record (PNR) agreements (in 2015 and 2019, respectively), as well as the proposed Data Privacy and Protection Agreement. In the European Parliament, the reports exacerbated long-standing objections to the 111 SWIFT and PNR agreements and intensified MEPs’ concerns about U.S. data protection safeguards and access to European citizens’ personal data. In the aftermath of the reports, the European Parliament called for suspension of the U.S.-EU Safe Harbor agreement that allows commercial data exchanges, and there have been suggestions that the purported U.S. surveillance activities may have a wider effect on economic relations, including with regard to negotiations on the proposed TTIP. Other analysts argue that the purported U.S. surveillance operations remain a point of friction but that tensions have proven manageable and do not pose a sustained threat to the overall transatlantic relationship. Those holding this view contend that much of the outrage expressed by European leaders has been for domestic public consumption. They also note that while senior European officials may not have been familiar with the details of U.S. surveillance activities, many were well aware that their own security services conduct various surveillance operations and often work closely with U.S. intelligence services to help prevent terrorist attacks and other serious crimes in Europe. In addition, especially given the potential threat posed by the Islamic State and returning foreign fighters, officials indicate that cooperation between U.S. and European intelligence and security services has continued uninterrupted despite any loss of trust at the political level. 112 No Cooperation EU structurally incapable of cooperation Alan Sked is a professor of international history and a former convener of European studies at the London School of Economics 3/14/2012 (http://www.foreignpolicy.com/articles/2012/03/14/hey_serbia_be_careful_what_you_wish_for?page= full) The trouble, however, is that the EU as a whole is in absolute demographic decline and relative economic and technological decline, and its major policies -- whether the common fisheries and agriculture policies or the euro and monetary union -- have failed. In terms of foreign and security policies, it is an international joke. It spends next to nothing on defense, and even its main contributors in this area, Britain and France, have seen their armed forces so severely cut recently that in the Libyan war, where Europe "took the lead," they were entirely dependent on U.S. logistics and supplies. If the EU boasts of its reliance on "soft power," that is because it has no choice. Its head of foreign affairs, the British baroness Catherine Ashton, has been called "the world's highest-paid female politician," yet she remains anonymous and has no influence on world events whatsoever. Her position sums up everything that is wrong with the EU -- expensive but ineffective. The fundamental problem with the EU, however, is that the people of Europe have no faith in it and do not identify with it. A 2010 Eurobarometer poll found that only 49 percent of EU citizens think their country's EU membership is a "good thing," while only 42 percent trust EU institutions. Meanwhile, those institutions, like the EU's whole ethos, are positively antidemocratic. Its key decision-making bodies -- the European Council, Court of Justice, and European Commission -- are, for all practical purposes, unelected, unaccountable, and removed from the people (commissioners are usually washed-up has-beens whose political careers in their home states have ended in failure). Their decisions are irreversible in national parliaments, and the European Parliament, while vested with powers of co-decision-making with the European Council, is also remote. The Parliament is a glorified debating society -- not a government with an official opposition -- and its parties cannot promise any fundamental policy changes in their election manifestos; indeed, its election outcomes rarely have an impact on the course of EU politics. Its members are unknown and despised as opportunists who merely seek inflated salaries, perks, expenses, and pensions. Voter turnout in the EU's parliamentary elections is low and falling, reflecting the widely held belief among EU citizens that the EU doesn't protect or represent their interests. 113 Cooperation Resilient Cooperation is resilient- shared values, economic ties, and issue specific cooperation McCormick ‘6 (The War on Terror and Contemporary U.S.-European Relations James M. McCormick 1 1 Iowa State University ABSTRACT AU: James M. McCormick TI: The War on Terror and Contemporary U.S.-European Relations SO: Politics & Policy VL: 34 NO: 2 PG: 426-450 YR: 2006 Even if the conceptual gap were to narrow only slightly over U.S. foreign policy generally and terrorism particularly, powerful international and domestic constraints remain, which may motivate both the United States and Europe to close the action gap. In other words, certain existing constraints may actually serve as incentives to close the action gap between these two global actors in the near term. Some of these constraints result from the common ties that already exist, but others are unique to the United States and Europe.First, of course, the United States and Europe are still bound together by a set of underlying common values and beliefs that brought them together during the Cold War after World War II, albeit no longer with the Soviet Union acting as a lone star guiding policy formulation. Those common values and beliefs are hardly empty notions to the vast majority of Europeans and Americans, particularly not to the new European states that have escaped communist rule since the fall of the Berlin Wall. How those values should be advanced will surely remain as a source of disagreement both within and between Europe and America, but those values will undoubtedly continue to serve as incentives for all parties to seek some policy accommodations. Second, Europe and America are fundamentally tied by the significant economic links that serve as the "sticky power" (Mead 2004, 46-53; Mead 2005, 29-36) between them. Indeed, economic ties remain very strong, despite recent political differences and lingering disputes over access to both participants' markets (Drozdiak 2005). Third, the often unspoken levels of cooperation on terrorism—for example, in the areas of law enforcement, intelligence matters, or the tracking of financial matters—remain in place, even in the face of more visible political differences over Iraq and the wider war on terrorism. Moreover, the events of 3/11/04 in Madrid and 7/7/05 in London continue to provide very powerful incentives for this kind of transatlantic cooperation. In this sense, these different kinds of "ties that bind"—and continue to bind—should not be forgotten as important sources of momentum to seek common ground between America and Europe. U.S.-E.U relations resilient – their security interests are aligned and they perceive interdependence Leonard 05 (Mark, executive director of the European Council on Foreign Relations and former director of foreign policy at the Centre for European Reform, Feb 28th. “Why the U.S. Needs the E.U.” Time International, vol. 165 iss. 9, p. 31. Proquest.) For the first time in 50 years, it is the U.S. that needs Europe's help, rather than the other way around. Americans realize that, without European diplomacy, money and soft power, freedom's march would be a lot more halting. In Kiev, Sarajevo, Ankara, Ramallah and even Tehran, the E.U. is having a more constructive impact than the U.S. Yet the E.U.'s transformative power is often confused with weakness. The E.U. doesn't change countries by threatening to invade them. Its biggest threat is not intervention but withdrawal of the hand of friendship and especially the prospect of membership. For countries like Bosnia, Turkey and Ukraine, the only thing worse than having to deal with the Brussels bureaucracy is not getting to deal with it at all. E.U. membership is such a powerful lure that countries will revamp their legal, judicial and political systems just to join. The E.U. and U.S. face similar threats--drug trafficking, large flows of migrants, networks of international criminals and terrorists--but their responses could not be more different. The U.S. has sent troops into neighboring countries more than 15 times over the past 50 years, but many of them--from Haiti to Colombia--have barely changed; they limp from crisis to crisis, often sucking U.S. troops back in. Sometimes, military force is the right--and only--solution. In the Balkans, for example, the U.S., with the backing of the U.N. Security Council, led NATO air strikes to protect the Muslim 114 Europeans have learned the hard way that political and economic engagement can be a more powerful and permanent agent of change. These days in the Balkans, it's the prospect of E.U. membership that's population while Europe fretted. But driving political and social transformation. Beyond the 450 million citizens who are already living in the E.U., there are another 1.3 billion people in about 80 countries linked to the E.U. through trade, finance, foreign investment and aid. Nearly a third of the world's population lives in the Eurosphere, the E.U.'s zone of influence. The E.U.'s secret weapon is the law. The U.S. may have changed the regime in Afghanistan, but the E.U. is changing all of Polish society, from its economic policies to its property laws to its treatment of minorities. Each country that joins the E.U. must absorb 80,000 pages of new laws on everything from gay rights to food safety. Once drawn into the Eurosphere, countries are changed forever--and they never want to get out. The U.S. can impose its will almost anywhere in the world, but when its back is turned, its potency wanes. The elections in Iraq and Afghanistan were only possible because of American intervention, but the Administration's suspicion of international law and multilateral institutions mean that the democratic changes could be difficult to entrench . In the aftermath of the war in Iraq, the Administration has realized it can't change the world on its own. Similarly, the Europeans have learned that it sometimes takes good, old-fashioned U.S. might to get the attention of undemocratic regimes and so prepare the ground for reform. There is a lot the U.S. and the E.U. can do together to rein in the nuclear ambitions of North Korea and Iran, to further cement Turkey's relationship with the West, to combat the threat of terrorism. 115 Fights are Inevitable Fights inevitable and no impact Ahearn, Archick, Belkin 07 Foreign Affairs, Defense, and Trade Division [Raymond Ahearn, Kristin Archick, Paul Belkin “U.S.-European Union Relations and the 2007 Summit” may 14, 2007 http://ftp.fas.org/sgp/crs/row/RS22645.pdf/] The U.S. Congress and successive U.S. administrations have supported the EU project since its inception as a way to foster a stable Europe, democratic states, and strong trading partners. The United States has welcomed EU efforts since the end of the Cold War to expand the political and economic benefits of membership to central and eastern Europe, and supports the EU aspirations of Turkey and the western Balkan states. The United States and the EU share a huge and mutually beneficial economic relationship. Two-way flows of goods, services, and foreign investment now exceed $1.0 trillion on an annual basis, and the total stock of twoway direct investment is over $1.9 trillion. Nevertheless, the U.S.-EU relationship has been challenged in recent years as numerous trade and foreign policy conflicts have emerged. The 2003 crisis over Iraq, which bitterly divided the EU and severely strained U.S.-EU relations, is most notable, but the list of disagreements has been wide and varied. Although Europeans are not monolithic in their views, many EU member states have objected to at least some elements of U.S. policy on issues ranging from the Israeli-Palestinian conflict to U.S. treatment of terrorist detainees to climate change and aircraft subsidies. Since 2003, however, both sides have made efforts to improve relations, and successive U.S.-EU summits have sought to emphasize areas of cooperation and partnership. At the same time, challenges and some tensions remain in the U.S.-EU relationship. 116 No Impact No impact to US/EU relations Daalder 3 (Ivo H., Senior Fellow in Foreign Policy Studies – Brookings Institution, Survival, 45(2), Summer, p. 147) The main consequence of these changes in US and European policy priorities is to make the transatlantic relationship less pivotal to the foreign policy of both actors. For America, Europe is a useful source of support for American actions – a place to seek complementary capabilities and to build ad hoc coalitions of the willing and somewhat able. But Washington views Europe as less central to its main interests and preoccupations than it was during the Cold War. For European countries, America’s protective role has become essentially superfluous with the disappearance of the Soviet threat, while its pacifying presence is no longer warranted, given the advance of European integration. The task of integrating all of Europe into the zone of peace now falls squarely on Europe’s shoulders, with the United States playing at most a supporting role. Even the stabilisation of Europe’s periphery – from the Balkans in the south to Turkey, the Caucuses, and Ukraine in the East – is one where Europeans will increasingly have to take the lead. Their arguments that low relations kills cooperation are complete hype and have no scholarly backings - Peters ‘8 (Dr. Ingo Peters, PhD- Prof. @ Center for Transnational Relations - Freie Universität Berlin, 3/26/2008 [Paper to be presented at the International Studies Association (ISA) Annual Conference, “Cooperation, Conflict and Crisis: The Impact of the Iraq War on European-American Relations) The existing social science literature on transatlantic relations is dominated by policy studies with stark statements on the immediate and long-term quality of the relationship. Pessimists (mostly neorealists) usually stress diverging trends and predict no viable future for transatlantic relations; optimists (mostly ascribing to various forms of liberalism) may also find the relationship to be in trouble but emphasize political mismanagement, which makes for a temporary and resolvable crisis and allows for a more promising future for the overall relationship, that is if the right lessons are learned and applied to future political conflicts. Most of the studies on transatlantic relations, whether written by pessimists or optimists, are, however, underspecified with regard to concepts and yardsticks for systematic qualifications of the transatlantic relationship. The failure to introduce proper yardsticks for evaluation, however, may cast doubt on the viability of the overall analysis.7 Experts have qualified the transatlantic crisis over Iraq as "the greatest trans-Atlantic split since Suez and possibly the deepest EU divide since its establishment,"8 "a turning point in transatlantic relations,"9 and testify that after the Iraq war the transatlantic relationship still "is in a deep crisis,"10 or that "the Western order is experiencing a severe crisis."11 However, the various adjectives used in the above quotes hardly relate to any systematic frame of reference. When do we see a "severe" or a "deep" crisis, and when a "minor, shallow or superficial" one? 117 EU Relations Irrelevant EU relations irrelevant AND collapse causes revival Bergmann 10 Max Bergmann, Center for American Progress Senior Fellow, 3/9/2010, U.S. Neglect May Be Just What the EU Needs, http://www.worldpoliticsreview.com/article.aspx?id=5241 Obama also remains remarkably popular among the European public, and the U.S. and Europe are in sync on a number of tough global issues, most notably Iran. European governments increased their troop contributions to Afghanistan and have accepted detainees from Guantanamo. However, the sense of drift in the transatlantic alliance is undeniable. Europe's complaints in some ways fit the American stereotype of the continent, focusing more often on process and form than on substance. However, the perceived snubs, while not intentional, do reveal a broader strategic truth about transatlantic relations: They just don't matter as much as they used to. Europeans insist that this is because of a shortsighted strategic outlook on the part of a White House that prioritizes rising powers over traditional ones. While there may be some truth to this critique, it is also clear that Europe is not as strategically pivotal in the current global environment. With European security no longer a major concern, Europe's strategic relevance to the U.S. is dependent on its involvement in global affairs. Despite such activism on the part of certain national capitals, individual European states lack the global clout to warrant the same level of attention from the U.S. as they used to. Europe's global engagement as a whole remains limited and disorganized, and as European military capabilities continue to decline, America's attachment to the transatlantic relationship will only lessen further. However, the growing estrangement between the U.S. and Europe may actually be beneficial for relations over the long term. Growing American disinterest in Europe may force a strategic reassessment in European capitals, prompting them to focus more intently on rationalizing and modernizing their defense forces and their broader approach to international affairs. A more coherent and globally involved Europe would, in turn, rekindle the alliance. -- Relations resilient Moravcsik 3 (Andrew, Professor of Government and Director of the European Union Program – Harvard University, July/August, Foreign Affairs, Lexis) Transatlantic optimists are also right when they argue that the recent shifts need not lead inexorably to the collapse of NATO, the UN, or the EU. Historically, they note, transatlantic crises have been cyclical events, arising most often when conservative Republican presidents pursued assertive unilateral military policies. During the Vietnam era and the Reagan administration, as today, European polls recorded 80-95 percent opposition to U.S. intervention, millions of protesters flooded the streets, NATO was deeply split, and European politicians compared the United States to Nazi Germany. Washington went into "opposition" at the UN, where, since 1970, it has vetoed 34 Security Council resolutions on the Middle East alone, each time casting the lone dissent.In the recent crisis, a particularly radical American policy combined with a unique confluence of European domestic pressures -- German Chancellor Gerhard Schrsder's political vulnerability and French President Jacques Chirac's Gaullist skepticism of American power -- to trigger the crisis.Most Europeans -- like most Americans -- rejected the neoconservative claim that a preemptive war against Iraq without multilateral support was necessary or advisable. Sober policy analysis underlay the concerns of the doubters, who felt that the war in Iraq, unlike the one in Afghanistan, was not really connected to the "war on terrorism." Skeptics were also wary of the difficulties and costs likely to attend postwar reconstruction. No surprise, then, that most foreign governments sought to exhaust alternatives to war before moving forward and refused to set the dangerous precedent of spite of these doubts about the Bush administration's policies, however, underlying U.S. and European interests remain strikingly convergent. It is a cliche but nonetheless accurate to assert that the Western relationship rests on shared values: democracy, human rights, open markets, and a measure of social justice. No countries are more likely to agree on basic policy, and to have the power to do something about it. Even regarding a sensitive area such as the Middle East, both sides authorizing an attack simply because the United States requested it. In recognize Israel's right to exist, advocate a Palestinian state, oppose tyrants such as Saddam Hussein, seek oil security, worry about radical Islamism, and fear terrorism and the proliferation of WMD. 118 AT: Spill Over No spill-over Busby 6 (Josh, Assistant Professor of Public Affairs – University of Texas, Austin, “Memo on Reputation, April, http://www.utexas.edu/lbj/faculty/busby/papers.php) Are there any empirical examples of separate reputations that fuse as a result of violations across issue domains? In thinking about the legitimation problems of the U.S. government under the present administration, has the U.S. failure to make and its willingness to break its commitments in multiple arenas had consequences for other arenas? One possibility is that when the George W. Bush administration signaled that the administration was opposed to various multilateral policy initiatives across a range of unrelated substantive domains—climate change (March 2001), small arms (July 2001), anti-ballistic missiles (December 2001), steel tariffs (March 2002), the International Criminal Court (May 2002), among other issues --and would no longer abide by previous commitments, then the segmented reputations may well have fused into a more general impression of the United States that had crossissue consequences. However, evidence of foot-dragging and non-cooperation by U.S. allies is mixed, and may be difficult to link back to non-cooperation on secondary issues like climate change. Given the support offered by America’s allies in Afghanistan and on the war on terror, including covert support for U.S. policy in Iraq, one could argue that these actions have not had major consequences. Denial of use of Turkish territory for the war in Iraq, coupled with opposition by several NATO allies to troop deployments and reconstruction assistance in Iraq, indicate the U.S. may indeed be incurring some higher costs/worse bargains than would have the case had it been a better partner on other issues. It is too soon to make a definitive judgment on this question. Is there something about the current environment that may empower other actors to punish the U.S. more for failure to honor commitments, through foot-dragging on issues the U.S. cares about and for which going it alone is simply not a viable option? The bargaining leverage of other states in an era of interdependence would seem to be improved in some ways. That said, powerful states generally may find it easier to break promises without significant consequences since others may find it too costly to punish the violator or to engage in self-abnegating behavior that denies themselves future benefits because of earlier rounds of defection (Downs and Jones 2002). 119 No Relations Collapse No risk of relations collapse – common foreign policy interests overwhelm minor blips. Ischinger 05 (Wolfgang, former German ambassador to the U.S., Summer. “The U.S. Should Show More Visible Leadership.” European Affairs. http://europeanaffairs.org/current_issue/2005_summer/2005_summer_11.php4) There are not so many differences of substance between U.S. and European foreign policies as often suggested. Despite claims to the contrary by the media, there is a great deal in common between the socalled freedom agenda espoused by President George W. Bush and the aims that the European Union has been pursuing, for example, through the Barcelona process that is intended to spread prosperity and political stability around the Mediterranean basin. We may not use the same words, or even the same methods, but we are in general agreement on the essentials of the issues involved and on the goals to be attained. European objectives may be slightly less ambitious, and less urgently defined, than those of the United States. Now, however, that we have put the dispute over Iraq behind us, there is not really much fundamental difference between declared U.S. policy goals and declared European policy goals, whether in the world at large, the greater Middle East or in Central and Eastern Europe. The European Union’s aim is to create stability by establishing better institutions, supporting civil society and working through democratic procedures. The speech acknowledging the difficulties of nation-building that President Bush gave to the International Republican Institute in May 2005, for instance, could easily have been delivered by a European leader. I wish he had made that speech four years ago, but it is still good news. 120 EU Can’t Solve Europe can’t solve global problems Bacevich, 10 Andrew, Bacevich, Boston University IR and History Professor, March/April 2010, Let Europe Be Europe,"http://www.foreignpolicy.com/articles/2010/02/22/let_europe_be_europe?page=full, 2/28] Europe, however, is another matter. By the dawn of this century, Europeans had long since lost their stomach for battle. The change was not simply political. It was profoundly cultural. The cradle of Western civilization -- and incubator of ambitions that drenched the contemporary age in blood -- had become thoroughly debellicized. As a consequence, however willing they are to spend money updating military museums or maintaining war memorials, present-day Europeans have become altogether stingy when it comes to raising and equipping fighting armies. This pacification of Europe is quite likely to prove irreversible. Yet even if reigniting an affinity for war among the people of, say, Germany and France were possible, why would any sane person even try? Why not allow Europeans to busy themselves with their never-ending European unification project? It keeps them out of mischief. 121 Alt Causes Policy differences make relations collapse inevitable Smyth 08 (Jamie, 10/23, Irish Times, “If Europeans could vote in US election, Obama would win, but then what?,” http://www.irishtimes.com/newspaper/world/2008/1023/1224625124443.html) THE DESIRE for change has been pinpointed by pollsters as the key theme of the US presidential election as public dissatisfaction with George Bush reaches record levels. In Europe this sentiment is felt just as keenly among the public and the political class, who associate Bush with dividing the EU over Iraq, failing to tackle climate change and undermining human rights by promoting rendition and the Guantanamo detention centre. "He is the worst president of the US in living memory," socialist leader Martin Schultz told French President Nicolas Sarkozy at the European Parliament earlier this week. 8 per cent of Germans, 9 per cent of French and 20 per cent of British people told a Gallup poll last year they were in "approval of US leadership". This decline in US popularity has gone hand in hand with a weakening of the traditional transatlantic relationship and a steady loss of influence for the West as China and India gradually emerge as real global powers. "Europeans will cheer the departure of George Bush and see it as an opportunity to rebuild the transatlantic relationship but they should be careful not to have overblown expectations of the new US president," says Hugo Brady, an analyst Schultz is well known for liberal use of hyperbole in his speeches but his views on the Bush administration match perfectly with European public opinion. Just with the London-based think tank, Centre for European Reform. Either Barack Obama or John McCain would offer real prospects for better EU-US relations, although most of the tricky issues dogging transatlantic relations will remain such as Iran and Afghanistan, says Brady. If Europeans had a vote in the US election, Obama would win hands down. In Germany, Britain and France, at least 60 per cent of people prefer him to McCain, according to a recent poll by Gallup. Obama's popularity would provide an immediate boost for the transatlantic relationship, although he may turn out to be a more challenging interlocutor. "Be careful what you wish for," says John Hulsman at the German Council on Foreign Relations. "Obama promises a very different style of governance to Bush. Bush didn't listen to his own Republican Party, never mind the Europeans . . . Obama will consult with Europe before he does things but he will also demand more from his European allies." Alt causes to US-EU Relations Ahearn, Archick, Belkin ‘7 Foreign Affairs, Defense, and Trade Division [Raymond Ahearn, Kristin Archick, Paul Belkin “U.S.-European Union Relations and the 2007 Summit” may 14, 2007 http://ftp.fas.org/sgp/crs/row/RS22645.pdf/] The U.S. Congress and successive U.S. administrations have supported the EU project since its inception as a way to foster a stable Europe, democratic states, and strong trading partners. The United States has welcomed EU efforts since the end of the Cold War to expand the political and economic benefits of membership to central and eastern Europe, and supports the EU aspirations of Turkey and the western Balkan states. The United States and the EU share a huge and mutually beneficial economic relationship. Two-way flows of goods, services, and foreign investment now exceed $1.0 trillion on an annual basis, and the total stock of two-way direct investment is over $1.9 trillion. Nevertheless, the U.S.-EU relationship has been challenged in recent years as numerous trade and foreign policy conflicts have emerged. The 2003 crisis over Iraq, which bitterly divided the EU and severely strained U.S.-EU relations, is most notable, but the list of disagreements has been wide and varied. Although Europeans are not monolithic in their views, many EU member states have objected to at least some elements of U.S. policy on issues ranging from the Israeli-Palestinian conflict to U.S. treatment of terrorist detainees to climate change and aircraft subsidies. Since 2003, however, both sides have made efforts to improve relations, and successive U.S.-EU summits have sought to emphasize areas of cooperation and partnership. At the same time, challenges and some tensions remain in the U.S.-EU relationship. 122 -- Iraq permanently shattered US/EU relations McCormick 7 (John, Political Scientist – University of Miami, The European Superpower, p. 171-172) But whatever happens as a result of the short- and medium-term fallout from Iraq, whatever policies are pursued by George W. Bush's successors, and whatever progress is made (or not made) on mending fences, it is clear that the Alliance will never be the same again. Iraq was just the highest and most visible peak in a mountain range of transatlantic disputes that stretch back to 1945 and beyond, and it was symbolic of a host of broader and deeper problems that interfere with the health of the Alliance. In the eyes of most Europeans, Iraq exemplified the most unfortunate kind of American unilateralism, highlighted the contrasting perceptions that Europeans and Americans now have of global problems and their best solutions, revealed a Europe that is more willing than at any time before to publicly and openly oppose American policy, exposed a seam of public opinion in the United States that is unwilling to tolerate criticism or opposition from Europe, and made many Europeans more aware of their subconscious desire for greater foreign and security policy independence. It also exemplified the problems that can be created when the United States claims to be speaking on behalf of the global community and claims to identify itself with global interests, when in fact there may not always be much correlation between US and non-US interests. US primacy means Europe won’t jeopardize cooperation even if relations are low McCormick ‘6 (The War on Terror and Contemporary U.S.-European Relations James M. McCormick 1 1 Iowa State University ABSTRACT AU: James M. McCormick TI: The War on Terror and Contemporary U.S.-European Relations SO: Politics & Policy VL: 34 NO: 2 PG: 426-450 YR: 2006 In effect, European states and the European Union will be compelled to face the reality of American global power and presence and, in that process, will be likely to accommodate some American policies, even as they may seek to modify them. Senator Biden made the same point more colorfully and more bluntly after visiting Europe in January 2005. At Condoleezza Rice's confirmation hearings, the senior committee Democrat shouted out for the benefit of Europeans, "[g]et over it. Get over it. President Bush is our president for the next four years. So get over it and start to act in your interest, Europe" (U.S. Congress 2005). Empirically proven McCormick ‘6 (The War on Terror and Contemporary U.S.-European Relations James M. McCormick 1 1 Iowa State University ABSTRACT AU: James M. McCormick TI: The War on Terror and Contemporary U.S.-European Relations SO: Politics & Policy VL: 34 NO: 2 PG: 426-450 YR: 2006 Tensions between America and European states are, of course, not new. Recall Henry Kissinger's book, A Troubled Partnership (1965). The issue that he dealt with 40 years ago is the same that confronts us presently. Then, as now, the Atlantic relationship had its troubles, but both parties found a way to make the relationship work. 123 No Escalation No escalation – disagreements remain limited Weitz 11 (Richard, senior fellow at the Hudson Institute and a World Politics Review senior editor 9/27/2011, “Global Insights: Putin not a Game-Changer for U.S.-Russia Ties,” http://www.scribd.com/doc/66579517/Global-Insights-Putin-not-a-Game-Changer-for-U-S-Russia-Ties) Fifth, there will inevitably be areas of conflict between Russia and the United States regardless of who is in the Kremlin. Putin and his entourage can never be happy with having NATO be Europe's most powerful security institution, since Moscow is not a member and cannot become one. Similarly, the Russians will always object to NATO's missile defense efforts since they can neither match them nor join them in any meaningful way. In the case of Iran, Russian officials genuinely perceive less of a threat from Tehran than do most Americans, and Russia has more to lose from a cessation of economic ties with Iran -- as well as from an Iranian-Western reconciliation. On the other hand, these conflicts can be managed, since they will likely remain limited and compartmentalized. Russia and the West do not have fundamentally conflicting vital interests of the kind countries would go to war over. And as the Cold War demonstrated, nuclear weapons are a great pacifier under such conditions. Another novel development is that Russia is much more integrated into the international economy and global society than the Soviet Union was, and Putin's popularity depends heavily on his economic track record. Beyond that, there are objective criteria, such as the smaller size of the Russian population and economy as well as the difficulty of controlling modern means of social communication, that will constrain whoever is in charge of Russia. No nuclear strike Graham 7 (Thomas Graham, senior advisor on Russia in the US National Security Council staff 20022007, 2007, "Russia in Global Affairs” The Dialectics of Strength and Weakness http://eng.globalaffairs.ru/numbers/20/1129.html) An astute historian of Russia, Martin Malia, wrote several years ago that “Russia has at different times been demonized or divinized by Western opinion less because of her real role in Europe than because of the fears and frustrations, or hopes and aspirations, generated within European society by its own domestic problems.” Such is the case today. To be sure, mounting Western concerns about Russia are a consequence of Russian policies that appear to undermine Western interests, but they are also a reflection of declining confidence in our own abilities and the efficacy of our own policies. Ironically, this growing fear and distrust of Russia come at a time when Russia is arguably less threatening to the West, and the United States in particular, than it has been at any time since the end of the Second World War. Russia does not champion a totalitarian ideology intent on our destruction, its military poses no threat to sweep across Europe, its economic growth depends on constructive commercial relations with Europe, and its strategic arsenal – while still capable of annihilating the United States – is under more reliable control than it has been in the past fifteen years and the threat of a strategic strike approaches zero probability. Political gridlock in key Western countries, however, precludes the creativity, risktaking, and subtlety needed to advance our interests on issues over which we are at odds with Russia while laying the basis for more constructive long-term relations with Russia. 124 Won’t go nuclear Manning 00 (Robert A., Senior Fellow and Director of Asian Studies – Council on Foreign Relations, “Abbott and Costello Nuclear Policy”, Washington Times, 3-10, Lexis) We don't want to go any lower because we need these weapons for nuclear deterrence, according to State Department spokesman James Rubin. But how many nukes do we need for deterrence to be credible? China, which President Clinton has talked of as a "strategic partner," has a grand total of 20 - count them - strategic warheads that could hit the United States. Nuclear wannabes like North Korea, Iran, and Iraq would have only a handful if they did manage to succeed in joining the nuclear club. Russia, which has 6,000 strategic warheads, is no longer an adversary. During the Cold War, it was not hard to envision a conventional war in Europe escalating into nuclear conflict. But today it is difficult to spin a plausible scenario in which the U nited S tates and Russia escalate hostilities into a nuclear exchange. Russia has no Warsaw Pact, and not much of a conventional force to speak of. Yet U.S. nuclear planners still base their targeting plans on prospective Russian targets, though no one will say so. 125 No Russia War Domestic problems prevent Russia from being a threat Lieber ‘08 Robert is professor of government and international affairs at Georgetown (World Affairs, “Falling Upwards”, Summer 2008) Farther East, and despite its economic recovery and the restoration of central power under Putin, Russia remains overwhelmingly dependent on the current boom in energy and commodity prices—and correspondingly vulnerable in the event of their decline. The country suffers from pervasive corruption, with a ranking from Transparency International that puts it at 121 among 163 countries in this category. Its population, already less than half that of the U.S. and plagued with alcoholism, chronic violence, a decrepit health-care system, and a male life expectancy of fewer than 60 years of age (lower than that of Bangladesh), shrinks by some half a million people per year. And its army, while bidding for attention and resources, remains weak and in disarray. As The Economist recently summarized Putin’s Russia, it has become one of the most “criminalized, corrupt and bureaucratized countries in the world.” True, the Putin regime plays to its domestic base with strident nationalism and xenophobia. In doing so, it has actively opposed and occasionally subverted American policies on some issues while providing a degree of cooperation on others. Instances of the former include opposition to NATO enlargement and to the stationing of anti-missile systems in Poland and the Czech Republic, the use of oil and gas resources as leverage against neighboring countries, overt and covert pressure against former Soviet Republics, and arms sales to Syria and Iran. Yet Moscow grudgingly collaborates where it has shared concerns, as with North Korea and combating terrorism. Russia presents a problem for the United States, but its erratic behavior, its priorities at home, and its own internal decline put it well short of being a major power challenger. Give a Russia war impact zero probability – politics, military superiority, economic concerns, and nuclear security all check war Graham 7 – National Security Advisor Thomas Graham, senior advisor on Russia in the US National Security Council staff 2002-2007, 9- 2007, “The Dialectics of Strength and Weakness,” Russia in Global Affairs, pg. 19 An astute historian of Russia, Martin Malia, wrote several years ago that “Russia has at different times been demonized or divinized by Western opinion less because of her real role in Europe than because of the fears and frustrations, or hopes and aspirations, generated within European society by its own domestic problems.” Such is the case today. To be sure, mounting Western concerns about Russia are a consequence of Russian policies that appear to undermine Western interests, but they are also a reflection of declining confidence in our own abilities and the efficacy of our own policies. Ironically, this growing fear and distrust of Russia come at a time when Russia is arguably less threatening to the West, and the United States in particular, than it has been at any time since the end of the Second World War. Russia does not champion a totalitarian ideology intent on our destruction, its military poses no threat to sweep across Europe, its economic growth depends on constructive commercial relations with Europe, and its strategic arsenal – while still capable of annihilating the United States – is under more reliable control than it has been in the past fifteen years and the threat of a strategic strike 126 approaches zero probability. Political gridlock in key Western countries, however, precludes the creativity, risk-taking, and subtlety needed to advance our interests on issues over which we are at odds with Russia while laying the basis for more constructive long-term relations with Russia. Not a threat - resource limitations Richard Haas, November-December 2014, “The Unraveling: How to Respond to a Disordered World,” Foreign Affairs, http://www.foreignaffairs.com/articles/142202/richard-n-haass/the-unraveling DOA: 10/30/14 Russia, too, is constrained by interdependence, although less so than China given its energy-concentrated economy and more modest levels of external trade and investment. That means sanctions have a chance of influencing its behavior over time. Putin’s foreign policy may be revanchist, but Russia’s hard- and soft-power resources are both limited. Russia no longer represents anything that appeals to anyone other than ethnic Russians, and as a result, the geopolitical troubles it can cause will remain on Europe’s periphery, without touching the continent’s core. Indeed, the critical elements of Europe’s transformation over the past 70 years — the democratization of Germany, Franco-German reconciliation, economic integration — are so robust that they can reasonably be taken for granted. Europe’s parochialism and military weakness may make the region a poor partner for the United States in global affairs, but the continent itself is no longer a security problem, which is a huge advance on the past. Cold war calculations no longer apply – neither side would consider war Cartwright et al 12 [Gen (Ret) James Cartwright, former Vice Chairman of the Joint Chiefs of Staff; Amb. Richard Burt, former ambassador to Germany and chief negotiator of START; Sen. Chuck Hagel; Amb. Thomas Pickering, former ambassador to the UN; Gen. (Ret.) Jack Sheehan, former Supreme Allied Commander Atlantic for NATO and Commander-in-Chief for the U.S. Atlantic Command; GLOBAL ZERO U.S. NUcLEAR POLicy cOMMiSSiON REPORT, http://orepa.org/wp-content/uploads/2012/05/cartwrightreport.pdf] These illustrative next steps are possible and desirable for five basic reasons. First, mutual nuclear deterrence based on the threat of nuclear retaliation to attack is no longer a cornerstone of the U.S.-Russian security relationship. Security is mainly a state of mind, not a physical condition, and mutual assured destruction (MAD) no longer occupies a central psychological or political space in the U.S.-Russian relationship. To be sure, there remains a physical-technical side of MAD in our relations, but it is increasingly peripheral. Nuclear planning for Cold War-style nuclear conflict between our countries, driven largely by inertia and vested interests left over from the Cold War, functions on the margins using outdated scenarios that are implausible today. There is no conceivable situation in the contemporary world in which it would be in either country’s national security interest to initiate a nuclear attack against the other side. Their current stockpiles (roughly 5,000 nuclear weapons each in their active deployed and reserve arsenals) vastly exceed what is needed to satisfy reasonable requirements of deterrence between the two countries as well as vis-à-vis third countries whose nuclear arsenals pale in comparison quantitatively. 127 No risk of U.S.-Russian war – Russia knows the U.S. is infinitely more powerful and that it couldn’t be a threat. Bandow 08 (Doug, former senior fellow at the Cato Institute and former columnist with Copley News Service, 3/7. “Turning China into the Next Big Enemy.” http://www.antiwar.com/bandow/?articleid=12472) In fact, America remains a military colossus. The Bush administration has proposed spending $515 billion next year on the military; more, adjusted for inflation, than at any time since World War II. The U.S. accounts for roughly half of the world's military outlays. Washington is allied with every major industrialized state except China and Russia. America's avowed enemies are a pitiful few: Burma, Cuba, Syria, Venezuela, Iran, North Korea. The U.S. government could destroy every one of these states with a flick of the president's wrist. Russia has become rather contentious of late, but that hardly makes it an enemy. Moreover, the idea that Moscow could rearm, reconquer the nations that once were part of the Soviet Union or communist satellites, overrun Western Europe, and then attack the U.S. – without anyone in America noticing the threat along the way – is, well, a paranoid fantasy more extreme than the usual science fiction plot. The Leninist Humpty-Dumpty has fallen off the wall and even a bunch of former KGB agents aren't going to be able to put him back together. -- No risk of Russia war Ball 5 (Desmond, Professor – Strategic Defence Studies Centre at Australian National University, “The Probabilities of ‘On the Beach’ Assessing Armageddon Scenarios in the 21st Century, May, http://www.manningclark.org.au/papers/se05_ball.html) The prospects of a nuclear war between the US and Russia must now be deemed fairly remote. There are now no geostrategic issues that warrant nuclear competition and no inclination in either Washington or Moscow to provoke such issues. US and Russian strategic forces have been taken off day-to-day alert and their ICBMs 'detargeted', greatly reducing the possibilities of war by accident, inadvertence or miscalculation. On the other hand, while the US-Russia strategic competition is in abeyance, there are several aspects of current US nuclear weapons policy which are profoundly disturbing. In December 2001 President George W. Bush officially announced that the US was withdrawing from the Anti-Ballistic Missile (ABM) Treaty of 1972, one of the mainstays of strategic nuclear arms control during the Cold War, with effect from June 2002, and was proceeding to develop and deploy an extensive range of both theatre missile defence (TMD) and national missile defence (NMD) systems. The first anti-missile missile in the NMD system, designed initially to defend against limited missile attacks from China and North Korea, was installed at Fort Greely in Alaska in July 2004. The initial system, consisting of 16 interceptor missiles at Fort Greely and four at Vandenberg Air Force in California, is expected to be operational by the end of 2005. The Bush Administration is also considering withdrawal from the Comprehensive Test Ban Treaty (CTBT) and resuming nuclear testing. (The last US nuclear test was on 23 September 1992). In particular, some key Administration officials believe that testing is necessary to develop a 'new generation' of nuclear weapons, including low-yield, 'bunker-busting', earth-penetrating weapons specifically designed to destroy very hard and deeply buried targets (such as underground command and control centres and leadership bunkers). -- Common ties, Russian leadership, and defense spending checks Aron 6 (Leon, Director of Russian Studies – American Enterprise Institute, “The United States and Russia”, 6-29, http://www.aei.org/publications/pubID.24606/pub_detail.asp) Yet the probability of a frontal confrontation and a new Cold War remains very remote for at least three reasons. First, despite the erosion, the countries geopolitical assets are still very weighty, as the bedrock issues of anti-terrorism, nuclear nonproliferation, and energy will continue to force them to seek common ground and at least limited partnership.[17] Second, the restorationist foreign policy notwithstanding, the three basic 128 elements of the 1992-1993 national consensus on the foreign policy and defense doctrine remain largely the same. Russia is to stay a nuclear superpower and the regional superpower, but it seems to have settled for the role of one of the world’s great states, rather than a global superpower engaged in a worldwide competition with the United States. While these desiderata will continue to cause occasional sparring with the United States, they are no longer dedicated to the attainment of goals inimical to the vital interests of the United States and are not likely to ignite a relentless antagonistic struggle to the bitter end. Lastly, despite the muscular rhetoric emanating of late from the Kremlin, unlike the Soviet Union twenty years ago and China today, Russia is not a revisionist power. It does not seek radically to reshape the geopolitical balance of forces in its favor. Moscow may rail at the score, but it is unlikely to endeavor to change the rules of the game. For that, one needs a different ideology and, as a result, a different set of priorities. Yet even in today’s Russia flush with petrodollars, the share of GDP devoted to defense (around 3 percent) is not only at least ten times smaller than in the Soviet Union, but also below the 19921997 average in a Russia that inherited an empty treasury from the Soviet Union and that was, like every revolutionary government, unable to collect taxes. Calculated in purchasing power parity, Russia’s defense expenditures in 2005 ($47.77 billion) were less than one-eleventh of what the U.S. spent ($522 billion). 129 Deterrence Checks Deterrence checks Turner 2 (Admiral Stansfield, Former Director – Central Intelligence Agency, Fletcher Forum of World Affairs, Winter / Spring, 26 Fletcher F. World Aff. 115, Lexis) There are, of course, other centrals question to be considered: Would Russian psychology differ from American and would Russian society be willing to accept large numbers of nuclear detonations on their soil in order to perpetrate a nuclear war against the United States? These are difficult questions to answer. The more pertinent concern, however, is that this is an issue of life or death. No head of state could contemplate plunging the world into nuclear conflict without considering both the mortal threat to his or her citizens, and also the likelihood of his or her own death, underground shelters notwithstanding. The presumption that heads of state prefer to live than to die gives us one benchmark. Another is the Cuban missile crisis, in which both Leonid Khruschev and President Kennedy quite visibly backed away from the prospect of very limited nuclear war. Finally, Russia’s economy, being about the size of Belgium’s, is so small that its leaders would be well aware that recovery, even from a small nuclear attack, would be a very lengthy process. In terms of nuclear detonation threats, the United States must consider Russian deterrence as very close to its own. 130 AT: Bostrum Bostrom concludes US-Russia war won’t cause extinction Bostrom 7 (Nick, Ph.D. Professor of Applied Ethics at Oxford University, and the Director of the Oxford Future of Humanity Institute, “The Future of Humanity”, No specific date 2007, http://www.fhi.ox.ac.uk/__data/assets/pdf_file/0007/10222/future_of_humanity.pdf) Extinction risks constitute an especially severe subset of what could go badly wrong for humanity. There are many possible global catastrophes that would causeimmense worldwide damage, maybe even the collapse of modern civilization, yet fall short of terminating the human species. An all-out nuclear war between Russia and the United States might be an example of a global catastrophe that would be unlikely to result in extinction. A terrible pandemic with high virulence and 100% mortality rate among infected individuals might be another example: if some groups of humans could successfully quarantine themselves before being exposed, human extinction could be avoided even if, say, 95% or more of the world’s population succumbed. What distinguishes extinction and other existential catastrophes is that a comeback is impossible. A non-existential disaster causing the breakdown of global civilization is, from the perspective of humanity as a whole, a potentially recoverable setback: a giant massacre for man, a small misstep for mankind. U.S. - Russia nuclear war will be limited Oelrich 05 - Vice President for Strategic Security programs @ Federation of American Scientists [Ivan Oelrich (Former professor of physics @ Technical University of Munich and Former pre-doctoral Research Associate at Lawrence Livermore National Laboratory),“Missions for Nuclear Weapons after the Cold War,” The Federation of American Scientists, Occasional Paper No. 3, January 2005] What has not happened since the end of the Cold War is a recalibration of our deterrence requirements based on the changes in the stakes. The Cold War analyses of nuclear wars took little regard of what the war might have been about, implicitly assuming it would be about national survival and world leadership. Today the stakes are, overall, much smaller. Indeed, it is nearly impossible to conjure up even hypothetical areas of conflict between the United States and Russia with stakes remotely comparable to those of the Cold War or even a crisis that could rationally justify nuclear weapons. Where the stakes are high–for example, the ongoing tension between Islamic fundamentalism and the West–the role of nuclear retaliation is limited. Pg. 22-23 131 Adv 3 Safe Harbor doesn’t apply to national security or surveillance Polonetsky and Wolf 13 Jules Polonetsky Christopher Wolf December 11, 2013 ”The US-EU Safe Harbor” An Analysis of the Framework’s Effectiveness in Protecting Personal Privacy pg 28 http://www.futureofprivacy.org/wp-content/uploads/FPF-Safe-Harbor-Report.pdf TH Scrutinizing the Safe Harbor over concerns about government access misconstrues the purpose of the Safe Harbor. The Safe Harbor is intended to bring US data practices in line with the EU Data Directive. The Directive does not apply to matters of national security or law enforcement.173 Article 3 of the Directive states: “This Directive shall not apply to the processing of personal data...[with respect to] operations concerning public security, defen[s]e, State security (including the economic well-being of the State when the processing operation relates to State security matters) and the activities of the State in areas of criminal law.” 174 Thus, the Safe Harbor always had been envisioned as protecting the privacy of EU citizens within only the commercial privacy context.175 It should come as no surprise then that the Safe Harbor specifically provides exceptions to the Safe Harbor’s privacy principles “to the extent necessary to meet national security, public interest, or law enforcement requirements.”176 Moreover, eliminating the Safe Harbor will not prevent the US government from accessing EU citizens’ data. US-based companies that are presented with a valid legal order from the US government for information will nonetheless be compelled to provide access to that data regardless of their membership in the Safe Harbor. As a matter of policy, companies are pushing back against overbroad or unnecessary government information requests,177 but most companies will be legally compelled to comply with US laws that authorize government access.178 Companies can and should provide more information to European citizens about their obligation to comply with US government data requests, but the existence of a national security exception does not by itself reflect a failure of the Safe Harbor to achieve its goals. The EC has suggested that any legitimate national security exception be used “only to the extent that it is strictly necessary or proportionate.”179 The Commission has not offered any further guidelines as to what would constitute what is “necessary” or “proportionate,” and none of the regulators that enforce the Safe Harbor, including the FTC, are in a position to determine the scope of this exception. Absent a more comprehensive agreement between the EU and the US regarding government surveillance, the only way to address these concerns would be to prohibit all transfer of data into the US. The damage this would cause to the trans-Atlantic economy would be considerable, and would do little to help EU officials influence US surveillance programs. Limiting the Safe Harbor would therefore be a misplaced effort to address larger questions about the scope of the NSA’s surveillance operations.180 Alt causes to safe Harbor suspension Rich 14 Cynthia Rich is a senior international policy analyst in the Washington office of Morrison & Foerster LLP and was a member of the US government team that negotiated the 2000 US-EU Safe Harbour agreement. January 14 TH http://www.computerweekly.com/opinion/WhyEurope-is-wrong-to-kill-Safe-Harbour Suspending the EU-US Safe Harbour agreement on data protection will do nothing to address surveillance, says international policy analyst Growing public scrutiny and outrage over government mass surveillance are both understandable and legitimate. However, suspending the US-EU Safe Harbour programme on the false pretext that it facilitates National Security Agency (NSA) surveillance is misguided. Conflating national security and commercial trade issues serves the interests of the Safe Harbour’s opponents, who have tried to derail the programme since its inception in 2000. Framing the discussion in this way detracts from the larger and more important public debate that needs to take place in the US and Europe about the appropriate balance between national security interests and the protection of civil liberties and privacy rights. The truth is that all of the mechanisms available under EU law to transfer personal information legally to the US offer no 132 protection against government surveillance. Moreover, shutting out US companies may appeal to market protectionists, but in the end will only disadvantage European consumers. Europe is also conducting mass surveillance Concerns about mass surveillance are not limited to the US. The NSA’s Prism internet surveillance programme has been widely reported, but EU Member States – including France, Germany, the Netherlands, Sweden, and the UK – are conducting similar mass surveillance programmes. A report by the Centre for European Policy Studies, commissioned by the European Parliament's Civil Liberties, Justice and Home Affairs Committee (LIBE), details these extensive surveillance programmes, but tries to minimise their significance by comparing raw budget numbers. Safe Harbour The Safe Harbour requires Safe Harbour-certified companies to protect personal data they receive in accordance with a set of agreed upon privacy principles that can be enforced under US law. When the Safe Harbour agreement was reached in 2000, both the EU and the US hailed the agreement as a way to avert an interruption in data flows that threatened to disrupt transatlantic trade and provide a predictable and less bureaucratic way for European and US companies to share personal information. The Safe Harbour is appealing to US companies because it offers a simpler and less expensive means of complying with European adequacy requirements, which benefit US and European companies, and in particular small and medium enterprises. A more meaningful comparison would be to look at budget-to-GDP ratios which show how comparable these programme budgets are. But even this analysis misses the more salient point – US and European governments all engage in mass surveillance and their activities merit public scrutiny and debate rooted in facts. Threats to Safe Harbour driven by competition, not privacy. This latest flurry of threats to suspend the Safe Harbour immediately is an 11th hour attempt to shore up lagging support for privacy reform. Merging national security and commercial trade issues serves the interests of European companies that have fallen behind their US counterparts. It also responds to the public outrage over government surveillance and gives the public the illusion that there is a quick-fix solution. If the Safe Harbour and the other cross-border mechanisms for transferring data to the US were suspended, it would have no effect on government surveillance; it would, however, give a boost to European companies by hamstringing American competitors. Alternative Mechanisms to Safe Harbor Kelsey Finch 13 Treacherous Waters: What the World Would Look Like Without Safe Harbor Kelsey Finch, CIPP/US Privacy Tracker | Westin Research Center | Oct 22, 2013 https://privacyassociation.org/news/a/treacherous-waters-what-the-world-would-look-like-without-safe-harbor-2/ TH What would the world look like without the Safe Harbor? Even without the Safe Harbor, alternative avenues would exist for U.S. businesses to receive data transfers from the EEA. U.S. businesses ineligible for Safe Harbor, as well as businesses in other countries that have not been deemed “adequate” (e.g., Australia, Russia and Japan), already frequently utilize these mechanisms, which are available under Article 25 of the European Directive. These alternatives would continue to exist under the GDPR, with some mechanisms, namely binding corporate rules, likely gaining more traction. However, the significant cost and effort needed to ensure compliance through these substitutes is what inspired the creation of the Safe Harbor in the first place, and those costs have not abated in the intervening years. Commission adequacy findings: The European Commission has previously approved a small list of nations’ data protection laws as “adequate.” Consequently, commercial data transfers from the EEA to those countries will be unaffected by the Safe Harbor decision. The approved countries are: Andorra, Argentina, Australia, Canada (only organizations subject to the Personal Information Protection and Electronic Documents Act (PIPEDA)), Switzerland, Faeroe Islands, Guernsey, Israel, Isle of Man, Jersey, New Zealand, and Uruguay. DPA authorization: A national DPA may also authorize data transfers on a case-by-case basis if it determines that adequate privacy and security safeguards exist to protect EU citizens’ privacy rights. Standard Contract Clauses: Businesses can utilize one of three sets of standard contractual clauses (SCCs), which codify key privacy principles and have been pre-approved by the European Commission to sanction data flows. SCC Sets I and II apply to transfers from an EEA data controller to a non-EEA data controller; while another model can be used to authorize transfers from an EEA data controller to a data processor in a third country. In all cases, the SCCs must be copied verbatim and strictly adhered to. Additionally, some member states require that such contracts be deposited or presented for review as a formality (although such added restrictions would be abolished under the GDPR passed yesterday by the LIBE committee). Businesses may also rely on custom-made contracts, or revise an SCC term, but those must be individually approved by national 133 DPAs. Binding Corporate Rules: Another option is adopting binding corporate rules (BCRs) for the transfer of personal data across EU borders within a multinational corporation. These codes of conduct effectively constitute full-blown privacy programs, and therefore fit large global organizations with the budget and clout to create and enforce them. The EC stated clearly that BCRs protect intra-group transfers of “closely-knit, highly hierarchically structured multinational companies.” BCRs must also incorporate additional procedural principles, such as audits, complaint processes, transparency requirements, a duty to cooperate with DPAs and certain liability and jurisdiction rules. The current draft of the GDPR would expand the role of BCR as a data transfer mechanism, also explicitly recognizing BCR for data processors. BCRs must be both binding and legally enforceable, taking into account the legal systems of each country where they may be applied. Safe Harbor is not “Safe” Wragge Lawrence Graham & Co 15 Wragge Lawrence Graham & Co is a UK-headquartered international law firm providing a full service to clients worldwide 03 Mar 2015 Rescuing personal data from an uNSAfe Harbor - European data protection regulators start taking things into their own hands http://www.wragge-law.com/insights/rescuing-personal-data-from-an-unsafe-harbor-european-data-protection-regulators-start-taking-things/ TH First and foremost the criticism stresses that the Safe Harbor framework utilizes a self-certification process. U.S. companies can voluntarily self-certify that they will comply with a binding set of principles on an annual basis. Although the arrangement is voluntary, once a company signs up to the Safe Harbor register it assumes various legal obligations which can be enforced by the U.S.' Federal Trade Commission. Concerns over this have been raised on a number of levels, including: In order to self-certify, the respective company merely needs to send a letter to the Federal Trade Commission affirming the compliance without further proof of actual compliance. Dr. Dix and his fellow speakers emphasised that even if U.S. companies would self-certify that they are in compliance with the Safe Harbor framework, there is no subsequent reconfirmation on an annual basis (or at all) beyond the initial confirmation. Additionally, U.S. companies would not protect personal data to the same extent that European companies do, even if they have confirmed they do via a self-certification. Moreover, the Federal Trade Commission does not verify compliance of the self-certified companies with the Safe Harbor framework or adequately enforce any breaches of non-compliance. The lack of an independent agency - an oversight committee - to safeguard compliance with the Safe Harbor is also regarded as a key issue. Taking into account that the reformation of the rules governing the competencies of the secret services or the limitation of their authority was not fruitful, it is understandable that German authorities have decided to take matters in their own hands when it comes to Safe Harbor. 134 Impacts 135 Squo solves Status quo solves cloud computing Relander 3/27 [Brett, Investment Advisor, 2015, “Cloud-Computing: An industry In Exponential Growth,” http://www.investopedia.com/articles/investing/032715/cloudcomputing-industryexponential-growth.asp] Driving the growth in the cloud industry is the cost savings associated with the ability to outsource the software and hardware necessary for tech services. According to Nasdaq, investments in key strategic areas such as big data analytics, enterprise mobile, security and cloud technology, is expected to increase to more than $40 million by 2018. With cloud-based services expected to increase exponentially in the future, there has never been a better time to invest, but it is important to make sure you do so cautiously. (See article: A Primer On Investing In The Tech Industry.) Cloud infrastructure improving now Columbus 15 1/24/2015 @ 2:57PM Louis, Forbes “Roundup Of Cloud Computing Forecasts And Market Estimates, 2015” . My academic background includes an MBA from Pepperdine University and completion of the Strategic Marketing Management Program at the Stanford University Graduate School of Business. I teach MBA courses in international business, global competitive strategies, international market research, and capstone courses in strategic planning and market research. I've taught at California State University, Fullerton: University of California, Irvine; Marymount University, and Webster University. http://www.forbes.com/sites/louiscolumbus/2015/01/24/roundup-of-cloudcomputing-forecasts-and-market-estimates-2015/ TH A Goldman Sachs study published this month projects that spending on cloud computing infrastructure and platforms will grow at a 30% CAGR from 2013 through 2018 compared with 5% growth for the overall enterprise IT. Centaur Partners and other firms mentioned in this roundup are seeing more enterprise-size deals for cloud computing infrastructure and applications. While each of these consultancies and research firms have varying forecasts for the next few years, all agree that cloud computing adoption is accelerating in enterprises on a global scale. 136 Impact D – Warming Tech and adaptive advances prevent all climate impacts—warming won’t cause war Dr. S. Fred Singer et al 11, Research Fellow at The Independent Institute, Professor Emeritus of Environmental Sciences at the University of Virginia, President of the Science and Environmental Policy Project, a Fellow of the American Association for the Advancement of Science, and a Member of the International Academy of Astronautics; Robert M. Carter, Research Professor at James Cook University (Queensland) and the University of Adelaide (South Australia), palaeontologist, stratigrapher, marine geologist and environmental scientist with more than thirty years professional experience; and Craig D. Idso, founder and chairman of the board of the Center for the Study of Carbon Dioxide and Global Change, member of the American Association for the Advancement of Science, American Geophysical Union, American Meteorological Society, Arizona-Nevada Academy of Sciences, and Association of American Geographers, et al, 2011, “Climate Change Reconsidered: 2011 Interim Report,” online: http://www.nipccreport.org/reports/2011/pdf/FrontMatter.pdf Decades-long empirical trends of climate-sensitive measures of human well-being, including the percent of developing world population suffering from chronic hunger, poverty rates, and deaths due to extreme weather events, reveal dramatic improvement during the twentieth century, notwithstanding the historic increase in atmospheric CO2 concentrations. The magnitude of the impacts of climate change on human well-being depends on society's adaptability (adaptive capacity), which is determined by, among other things, the wealth and human resources society can access in order to obtain, install, operate, and maintain technologies necessary to cope with or take advantage of climate change impacts. The IPCC systematically underestimates adaptive capacity by failing to take into account the greater wealth and technological advances that will be present at the time for which impacts are to be estimated. Even accepting the IPCC's and Stern Review's worst-case scenarios, and assuming a compounded annual growth rate of per-capita GDP of only 0.7 percent, reveals that net GDP per capita in developing countries in 2100 would be double the 2006 level of the U.S. and triple that level in 2200. Thus, even developing countries' future ability to cope with climate change would be much better than that of the U.S. today. The IPCC's embrace of biofuels as a way to reduce greenhouse gas emissions was premature, as many researchers have found "even the best biofuels have the potential to damage the poor, the climate, and biodiversity" (Delucchi, 2010). Biofuel production consumes nearly as much energy as it generates, competes with food crops and wildlife for land, and is unlikely to ever meet more than a small fraction of the world's demand for fuels. The notion that global warming might cause war and social unrest is not only wrong, but even backwards - that is, global cooling has led to wars and social unrest in the past, whereas global warming has coincided with periods of peace, prosperity, and social stability. No global action – too many conflicts – empirics prove Daily Mirror 6 – 18 – 14 (“Global warming continues to be a serious global issue,” 6-18-14, http://www.dailymirror.lk/business/features/48574-global-warming-continues-to-be-a-serious-globalissue.html) But the decline of emissions in the developed countries is more than matched by continued growth in developing countries like China and India, the new figures show. Coal, the dirtiest and most carbon-intensive fossil fuel, is growing fastest, with coal-related emissions leaping more than 5 percent in 2011, compared with the previous year. Emissions continue to grow so rapidly that an international goal of limiting the ultimate warming of the planet to 3.6 degrees, established three years ago, is on the verge of becoming unattainable, said researchers affiliated with the Global Carbon Project, a network of scientists that tracks emissions. Yet, nations around the world, despite a formal treaty pledging to limit warming — and 20 years of negotiations aimed at putting it into effect — have shown little appetite for the kinds of controls required to accomplish that goal. The conflicts and controversies discussed are monotonously familiar: the differing obligations of industrialized and developing nations, the question of who will pay to help poor nations adapt, the urgency of protecting tropical forests and the need to rapidly develop and deploy clean energy technology. 137 Warming tipping points inevitable – too late NPR 9 (1/26, Global Warming Is Irreversible, Study Says, All Things Considered, http://www.npr.org/templates/story/story.php?storyId=99888903) Climate change is essentially irreversible, according to a sobering new scientific study. As carbon dioxide emissions continue to rise, the world will experience more and more long-term environmental disruption. The damage will persist even when, and if, emissions are brought under control, says study author Susan Solomon, who is among the world's top climate scientists . "We're used to thinking about pollution problems as things that we can fix," Solomon says. "Smog, we just cut back and everything will be better later. Or haze, you know, it'll go away pretty quickly." That's the case for some of the gases that contribute to climate change, such as methane and nitrous oxide. But as Solomon and colleagues suggest in a new study published in the Proceedings of the National Academy of Sciences, it is not true for the most abundant greenhouse gas: carbon dioxide. Turning off the carbon dioxide emissions won't stop global warming. "People have imagined that if we stopped emitting carbon dioxide that the climate would go back to normal in 100 years or 200 years. What we're showing here is that's not right. It's essentially an irreversible change that will last for more than a thousand years," Solomon says. This is because the oceans are currently soaking up a lot of the planet's excess heat — and a lot of the carbon dioxide put into the air. The carbon dioxide and heat will eventually start coming out of the ocean. And that will take place for many hundreds of years. Solomon is a scientist with the National Oceanic and Atmospheric Administration . Her new study looked at the consequences of this long-term effect in terms of sea level rise and drought. Even with co2 cuts, can’t prevent warming Times Online 8 5/23, Copenhagen Consensus: global warming, http://www.timesonline.co.uk/tol/news/environment/article3992368.ece DA 7-11-2010 There is unequivocal evidence that humans are changing the planet’s climate. We are already committed to average temperature increases of about 0.6°C, even without further rises in atmospheric carbon dioxide concentration. The world has focused on mitigation — reducing carbon emissions — a close look at the costs and benefits suggests that relying on this alone is a poor approach. Option One: Continuing focus on mitigation Even if mitigation — economic measures like taxes or trading systems — succeeded in capping emissions at 2010 levels, then the world would pump out 55 billion tonnes of carbon emissions in 2100, instead of 67 billion tonnes . It is a difference of 18 per cent: the benefits would remain smaller than 0.5 per cent of the world’s GDP for more than 200 years. These benefits simply are not large enough to make the investment worthwhile. No catastrophic warming – Earth is cooling and any fluctuations are natural, not anthropogenic – prefer long-term predictions backed by empirics and real science Ferrara 14 (Peter, **Graduate of Harvard College and Harvard Law School, senior fellow for entitlement and budget policy @ Heartland, senior fellow at the Social Security Institute, White House Office of Policy Development under President Reagan, Associate Deputy Attorney General of the United States under the first President Bush**, “The Period Of No Global Warming Will Soon Be Longer Than the Period of Actual Global Warming,” 2/24, http://www.forbes.com/sites/peterferrara/2014/02/24/the-period-of-no-global-warming-will-soon-be-longerthan-the-period-of-actual-global-warming/, CMR) If you look at the record of global temperature data, you will find that the late 20th Century period of global warming actually lasted about 20 years, from the late 1970s to the late 1990s. Before that, the globe was dominated by about 30 years of global cooling, giving rise in the 1970s to media discussions of the return of the Little Ice Age (circa 1450 to 1850), or worse. But the record of satellite measurements of global atmospheric temperatures now shows no warming for at least 17 years and 5 months, from September, 1996 to January, 2014, as shown on the accompanying graphic. That is surely 17 years and 6 months now, accounting for February. When the period of no global warming began, the alarmist global warming establishment responded that even several years of temperature data does not establish a climate trend. That takes much longer. But when the period of no global warming gets longer than the period of actual global warming, what is the climate trend then? Even worse for the theory of catastrophic, anthropogenic (human caused), global warming is that during this now extended period of no global warming mankind’s emissions of the carbon dioxide (CO2) that are supposed to be predominant in causing global warming continued to explode, with one third of all CO2 added to the atmosphere since the industrial revolution occurring during this period. The Economist 138 magazine shocked the global warming establishment with an article in March, 2013 that began with this lede: “OVER the past 15 years air temperatures at the Earth’s surface have been flat while greenhouse-gas emissions have continued to soar. The world added roughly 100 billion tonnes of carbon to the atmosphere between 2000 and 2010. That is about a quarter of all the CO2 put there by humanity since 1750.” That one quarter is actually now one third since the industrial revolution, which is now increasingly at stake in this debate. We are not going to be able to power anything remotely like the modern industrial revolution, which is actually straining even now to burst out of the “Progressive” bonds holding it back (at least in America), using the wind sources that powered the Roman economy, plus dancing on sunbeams. Moreover, the now extended trend of no global warming is not turning around any time soon. That increasingly established trend is being produced by long term natural causes. Even rank amateurs among the general public can see that the sun is the dominant influence on the Earth’s temperatures. Even the most politicized scientists know that they cannot deny that solar activity such as sun spot cycles, and variations in solar magnetic fields or in the flux of cosmic rays, have contributed to major climate changes of the past, such as the Little Ice Age, particularly pronounced from roughly 1650 AD to 1850 AD, the Medieval Warm period from about 950 AD to 1250 AD, during which global temperatures were higher than today, and the early 20th century Warming Period from 1910 to 1940 AD. That solar activity, particularly sunspot cycles, is starting to mimic the same patterns that were seen during the Little Ice Age, as I discussed in a previous column. As a result, outside politically correct Western circles, where science today has been Lysenkoized on this issue, there is a burgeoning debate about how long of a cooling trend will result. Britain’s Met Office, an international cheerleading headquarters for global warming hysteria, conceded in December, 2012 that there would be no further warming at least through 2017, which would make 21 years with no global warming. The German Herald reported on March 31, 2013 regarding Russian scientist Dr Habibullo Abdussamatov from the St. Petersburg Pulkovo Astronomical Observatory, “Talking to German media the scientist who first made his prediction in 2005 said that after studying sunspots and their relationship with climate change on Earth, we are now on an ‘unavoidable advance towards a deep temperature drop.’” His colleague Yuri Nagovitsyn is quoted in The Voice of Russia saying, “we could be in for a cooling period that lasts 200-250 years.” Skepticism over the theory of catastrophic anthropogenic global warming is increasingly embraced in China and elsewhere in Asia as well. In addition, every 20 to 30 years, the much colder water near the bottom of the oceans cycles up to the top, where it has a slight cooling effect on global temperatures until the sun warms that water. That warmed water then contributes to slightly warmer global temperatures, until the next churning cycle. Known as the Pacific Decadal Oscillation (PDO) and the Atlantic Multidecadal Oscillation (AMO), these natural causes are also contributing to the stabilized and now temperature trends. The foundation for the establishment argument for global warming are 73 climate models collected by the UN’s IPCC (Intergovernmental Panel on Climate Change). But the problem is that the warming trends projected by these models are all diverging farther and farther from the real world trend of actual temperature observations discussed above, as I showed in a previous column, with another graphic. Because none of these models have been scientifically validated based on past temperature observations, they constitute a very weak scientific argument that does not remotely establish that the “science is settled,” and “global warming is a fact.” The current data discussed above establishes indisputably that global warming is not a fact today. The politicians seeking to browbeat down any continuing even slightly declining natural global public debate are abusing their positions and authority with modern Lysenkoism, meaning “politically correct” science not established by the scientific method, but politically imposed. The science behind all of this is thoroughly explained in the 1200 pages of Climate Change Reconsidered II, authored by 50 top scientists organized into the Nongovernmental International Panel on Climate Change (NIPCC), and published by the Heartland Institute in Chicago. You will want to own this volume if for no other reason than that it says here that future generations of scientists will look back and say this is the moment when we took the political out of the political science of “climate change,” and this is how we did it. Real scientists know that these 50 co-authors are real scientists. That is transparent from the tenor of the report itself. The publication is “double peer reviewed,” in that it discusses thousands of peer reviewed articles published in scientific journals, and is itself peer reviewed. That is in sharp contrast to President Obama’s own EPA, which issued its “endangerment finding” legally authorizing regulation of carbon dioxide (CO2) emissions, without submitting the finding to its own peer review board, as required by federal law. What were they so afraid of if 97% of scientists supposedly agree with them? The conclusion of the report is that the U.N.’s IPCC has exaggerated the amount of global warming likely to occur due to mankind’s emissions of CO2, and the warming that human civilization will cause as a result “is likely to be modest and cause no net harm to the global environment or to human well-being.” The primary, dominant cause of global climate change is natural causes, not human effects, the report concludes. The fundamentals of the argument are that carbon dioxide is not some toxic industrial gas, but a natural, trace gas constituting just 0.038% of the atmosphere, or less than 4/100ths of one percent. The report states, “At the current level of 400 parts per million, we still live in a CO2-starved world. Atmospheric levels (of CO2) 15 times greater existed during the pre-Cambrian period (about 550 million years ago) without known 139 adverse effects,” such as catastrophic global warming. Much was made of the total atmospheric concentration of CO2 growing past 400 parts per million. But one percent of the atmosphere would be 10,000 parts per million. Moreover, human emissions of CO2 are only 4% to 5% of total global emissions, counting natural causes. No anthropogenic warming Spencer ‘10 – climatologist and a Principal Research Scientist for U. of Alabama [Roy W, Ph.D. in meteorology at the University of Wisconsin-Madison in 1981, former Senior Scientist for Climate Studies at NASA’s Marshall Space Flight Center, where he and Dr. John Christy received NASA’s Exceptional Scientific Achievement Medal for their global temperature monitoring work with satellites, “The Great Global Warming Blunder: How Mother Nature Fooled the World's Top Climate Scientists”, pg # below, CMR] IN SCIENCE it only takes only one finding to overturn decades of mainstream belief. Scientific knowledge is not a matter of consensus, as if scientific truth were something to be voted on. It is either true or not true. I have described new and important scientific evidence-some published, some unpublished at this writing—that supports two major conclusions that could end up dismantling the theory of anthropogenic global warming. The first conclusion is that recent satellite measurements of the Earth reveal the climate system to be relatively insensitive to warming influences, such as humanity's greenhouse gas emissions. This insensitivity is the result of more clouds forming in response to warming, thereby reflecting more sunlight back to outer space and reducing that warming. This process, known as negative feedback, is analogous to opening your car window or putting a sun shade over the windshield as the sun begins to heat the car's interior. An insensitive climate system does not particularly care how much we drive suvs or how much coal we burn for electricity. This evidence directly contradicts the net positive feedback exhibited in the computerized climate models tracked by the IPCC. It is well known that positive feedback in these models is what causes them to produce so much warming in response to humanity's greenhouse gas emissions. Without the high climate sensitivity of the models, anthropogenic global warming becomes little more than a minor academic curiosity. 153 The strong negative feedback in the real climate system has not been noticed by previous researchers examining satellite data because- they have not been careful about inferring causation. As is the case in all realms of scientific research, making the measurements is much easier than figuring out what those measurements mean in terms of cause and effect. Climate researchers have neglected to account for clouds causing temperature change (forcing) when they tried to determine how temperature caused clouds to change (feedback). They mixed up cause and effect when analyzing year-to-year variability in clouds and temperature. You might say they were fooled by Mother Nature. Clouds causing temperature to change created the illusion of a sensitive climate system. In order to help you understand this problem, I have used the example that I was given when I asked the experts how they knew that feedbacks in the climate system were positive. It was explained to me that when there is an unusually warm year, researchers have found that there is typically less cloud cover. The researchers assumed that the warming caused the decrease in cloud cover. This would be positive feedback because fewer clouds would let in more sunlight and thereby amplify the warming. But I always wondered: How did they know that it was the warming causing fewer clouds, rather than fewer clouds causing the warming? As we have seen, they didn’t know. And when the larger, contaminating effect of clouds causing temperature change is taken into account, the true signal of negative feedback emerges from the data. I have demonstrated this with a simple climate model by showing that the two directions of causation-forcing and feedback (or cause and effect) have distinctly different signatures both in the satellite data and in a simple model of the climate system. These distinct signatures even show up in the climate models tracked by the IPCC. Probably as a result of the contusion between cause and effect, climate models have been built to be too sensitive, with clouds erroneously amplifying rather than reducing warming in response to increasing atmospheric carbon dioxide concen 154 trations. The models then predict far too much warming when the small warming influence of more man-made greenhouse gases is increased over lime in the models. This ultimately results in pre-dictions of serious lo catastrophic levels of warming for the future, which you then hear about through the news media. While different models predict various levels of warming, all of them exhibit positive feedbacks. The mix-up between cause and effect also explains why feedbacks previously diagnosed from satellite observations of the Earth by other researchers have been so variable. There have been differing levels of contamination of the feedback signal by forcing, depending on what year the satellites were observing the Earth The second major conclusion of this book is closely connected to the first. If the carbon dioxide we produce is not nearly enough to cause significant warming in a climate system dominated by negative feedback, then what caused the warming we have experienced over the last fifty years or more? New satellite measurements indicate that most of the global average temperature variability we have experienced in the last 100 years could have been caused by a natural fluctuation in cloud cover resulting from the Pacific: Decadal Oscillation (PDO). Nine years of our best NASA satellite data, combined with a simple climate model, reveal that the PDO causes cloud changes that might be sufficient to explain most of the major variations in global average temperature since 1900, including 75 percent of the warming trend. Those natural variations in clouds may be regarded as chaos in the climate systemdirect evidence that the Earth is capable of causing its own climate change. Contrary to the claims of the IPCC, global warming or cooling does not require an external forcing mechanism such as more greenhouse gases, or a change in the sun, or a major volcanic eruption. It is simply what the climate system does. The climate system itself can cause its own climate change, 140 supporting the widespread public opinion that global warming might simply be part of a natural cycle. I am not the first to suspect that the PDO might be causing climate change. I just look the issue beyond suspicion, with a quantitative 155 explanation based on both satellite observations and some analysis with a simple climate model. While some might claim that the timing of the PDO and associated changes in cloudiness in recent years is just a coincidence, I can make the same claim for the supposed anthropogenic explanation of global warming: Just because warming in the twentieth century happened during a period of increasing CO2 in the atmosphere doesn't necessarily mean that the increasing CO2 caused the warming. In fact, the PDO explanation for warming actually has a couple of advantages over the CO2 explanation. The first advantage is the fact that variations in cloud cover associated with the PDO actually "predict" the temperature changes that come later. It just so happens that the three PDO changes that occurred in the twentieth century were exactly what would be needed to explain most of the temperature changes that followed: warming until the 1940s, then slight cooling until the 1970s, and then resumed warming through the 1990s. This then answers a question I am sometimes asked: How do I know that the PDO-induced cloud changes caused the temperature changes, and not the other way around? It's because the temperature response comes after the forcing, not before . This PDO source of natural climate change can also explain 75 percent of the warming trend during the twentieth century . Addition of CO2 and other anthropogenic and natural forcings can explain the other 25 percent. This investigation took me only a few days with a desktop computer. In contrast, researchers have been tinkering for many years with various estimates of manmade aerosol (particulate) pollution in their attempts to explain why global warming stopped between 1940 and the late 1970s, even while the PDO explanation for temperature variations during the twentieth century fits like a hand in a glove, the IPPC’s explanation based on aerosol and greenhouse gas pollution had to be wedged in with a crowbar. Another advantage of the natural explanation for global 155 warming is that the mechanism-an energy imbalance of the Karth caused by natural cloud variations-was actually observed by satellite. In contrast, the cooling effects of aerosol pollution and the warming effects of greenhouse gas emissions have remained too small to be measured. They have to be calculated theoretically before being input into climate models. <153-156> though this was a period of rapid increase in our greenhouse gas emissions. So, Reader note – PDO = Pacific Decadal Oscillation 141 Impact D – Disease Diseases won’t cause extinction – burnout or variation York 14 Ian, head of the Influenza Molecular Virology and Vaccines team in the Immunology and Pathogenesis Branch, Influenza Division at the CDC, former assistant professor in immunology/virology/molecular biology (MSU), former RA Professor in antiviral and antitumor immunity (UMass Medical School), Research Fellow (Harvard), Ph.D., Virology (McMaster), M.Sc., Immunology (Guelph), “Why Don't Diseases Completely Wipe Out Species?” 6/4, http://www.quora.com/Why-dont-diseases-completely-wipe-out-species But mostly diseases don't drive species extinct. There are several reasons for that. For one, the most dangerous diseases are those that spread from one individual to another. If the disease is highly lethal, then the population drops, and it becomes less likely that individuals will contact each other during the infectious phase. Highly contagious diseases tend to burn themselves out that way. Probably the main reason is variation. Within the host and the pathogen population there will be a wide range of variants. Some hosts may be naturally resistant. Some pathogens will be less virulent. And either alone or in combination, you end up with infected individuals who survive. We see this in HIV, for example. There is a small fraction of humans who are naturally resistant or altogether immune to HIV, either because of their CCR5 allele or their MHC Class I type. And there are a handful of people who were infected with defective versions of HIV that didn't progress to disease. We can see indications of this sort of thing happening in the past, because our genomes contain many instances of pathogen resistance genes that have spread through the whole population. Those all started off as rare mutations that conferred a strong selection advantage to the carriers, meaning that the specific infectious diseases were serious threats to the species. Antibiotics decay rapidly Lawrence & Silbergeld 08 - Co-principal investigators for the Pew Commission on Industrial Farm Animal Production [Dr. Robert S. Lawrence (Professor of Environmental Health Sciences, Health Policy, and International Health at the Johns Hopkins Bloomberg School of Public Health and Professor of Medicine at the Johns Hopkins School of Medicine) and Dr. Ellen Silbergeld (Professor of Environmental Health Sciences at the Johns Hopkins Bloomberg School of Public Health, Putting Meat on the Table: Industrial Farm Animal Production in America, April 29, 08] Beyond nitrogen and phosphorus, waterborne chemical contaminants associated with ifap facilities include pesticides, heavy metals, and antibiotics and hormones. Pesticides control insect infestations and fungal growth. Heavy metals, especially zinc and copper, are added as micronutrients to the animal diet. Antibiotics are used not only to prevent and treat bacterial infections for animals held in close quarters, but Pharmaceuticals, such as tylosin, a macrolide antibiotic widely used for therapeutics (disease treatment) and growth promotion in swine, beef cattle, and poultry, decays rapidly in the environment but persists in surface waters of agricultural watersheds (Song et al., 2007). Pg .26 New antibiotics solve superbugs RSC 7 (Royal Society of Chemistry, “Unique antibiotic beats superbugs' resistance”, Aug 6, also as growth promoters. http://www.rsc.org/chemistryworld/News/2007/August/06080701.asp) The discovery of how a unique antibiotic kills its targets has uncovered a new way to tackle resistant superbugs. A team of chemists and structural biologists have studied how the natural antibiotic lactivicin interacts with a crucial bacterial protein. Nearly all antibiotics kill bacteria by targeting the penicillin-binding protein (PBP) in the cell wall. But some bacteria's PBPs have mutated into forms that don't bind the drugs, and over-use of antibiotics has meant the development of new antibiotics can't keep up with the bugs' evolution. Lactivicin, discovered in the 1980s by Japanese scientists, was known to hit the PBP target, but unlike all the antibiotics that have been used before the LTV molecule doesn't contain a particular chemical structure: a -lactam ring. The British, French and Belgian team used crystallography to show for the first time how PBPs interact with LTV and a more potent derivative, phenoxyacetyl-LTV (PLTV). They have also demonstrated that pneumococcal bacteria resistant to antibiotics with a -lactam ring have no defence against LTVs. The ability to visualize the LTV-PBP interaction is crucial. The crystal structure highlights pockets in the protein's active site that could be targeted in order to design even better antibiotics. 'We hope that this will help people figure out how to functionalise the molecule to improve its activity,' said the leader of the British group, Christopher Schofield of the University of Oxford. The team report their findings in Nature Chemical Biology this week. 142 Drug breakthroughs solve antibiotic resistance now Knapton 6/21 Sarah Knapton (Citing reports from the science journal Nature) is a reporter for The Telegraph, “Scientists Find The 'Achilles Heel' Of Antibiotic Resistant Bacteria”, 6/21/14, Businessinsider.com, http://www.businessinsider.com/key-to-antibiotic-resistantbacteria-2014-6#ixzz35MfR7juH//OF The global threat of antibiotic resistance could finally be tackled after British scientists discovered a chink in the armour of deadly bacteria. Health experts have warned that within 20 years even routine operations like hip replacements and organ transplants could be deadly because of the risk of infection. But now scientists at the University of East Anglia have discovered how the bug responsible for E-coli and salmonella builds an impenetrable wall to keep out antibiotics. They believe that within a few years they could develop a drug which switches off the wallbuilding mechanism, making the bacteria vulnerable. “It is a very significant breakthrough,” said Professor Changjiang Dong, from the University of East Anglia's (UAE) Norwich Medical School. “This is really important because drug-resistant bacteria is a global health problem. Many current antibiotics are becoming useless, causing hundreds of thousands of deaths each year. “Many bacteria build up an outer defence which is important for their survival and drug resistance. We have found a way to stop that happening. "The number of superbugs are increasing at an unexpected rate. This research provides the platform for urgently-needed new generation drugs." The discovery, reported in Nature journal, could pave the way to a new generation of antibiotic drugs that work by bringing down the defensive wall. Bugs such as MRSA (methicillin resistant Staphylococcus aureus) are becoming increasingly immune to "last resort" antibiotics. If the trend continues the world may see a return to the pre-antibiotic era when even a trivial scratch could prove fatal. At the heart of the breakthrough is the way "gram negative" bacterial cells transport the barrier's molecular "bricks" to the surface of the cell and form a wall. "Gram-negative" bacteria, which include Escherichia coli (E. coli) and the bugs that cause gonorrhea, cholera and Legionnaire's disease, are especially resistant to antibiotics. They can evolve a number of mechanisms to make them immune to drugs, including reducing the permeability of their outer membrane. But if the membrane barrier falls, the bacteria die - whatever other defensive ploys they may have developed. Haohao Dong, another member of the UAE team, said: "The really exciting thing about this research is that new drugs will specifically target the protective barrier around the bacteria, rather than the bacteria itself. "Because new drugs will not need to enter the bacteria itself, we hope that the bacteria will not be able to develop drug resistance in future." The science community and the government said the research was a ‘welcome piece of news’ “We are facing a difficult era in terms of antibiotic resistance; the need for new efficacious drugs to treat infectious disease is clearly an important issue,” said Mark Fielder, Professor of Medical Microbiology at Kingston University and Hon Gen Sec of the Society for Applied Microbiology. “The publication of data from the two groups is a welcome piece of news. Their findings give science an insight into some of the structures that are important in the development of a bacterial membrane. “This could be of great importance as if we fully understand the workings and construction of structures that help bacteria function as effective entities we can hopefully then exploit weaknesses therein and kill the organism.” Prof Brendan Wren, Professor of Microbial Pathogenesis, London School of Hygiene & Tropical Medicine, added: “The studies open new avenues to the design a novel class of antibiotics to disarm and kill pathogenic bacteria." Deputy Chief Medical Officer John Watson said: “Antimicrobial resistance is a hugely important issue facing the world today. “We welcome all efforts in this area and we will follow any further developments with interest.” Diseases won’t cause extinction – burnout or variation York 14 | Ian, head of the Influenza Molecular Virology and Vaccines team in the Immunology and Pathogenesis Branch, Influenza Division at the CDC, former assistant professor in immunology/virology/molecular biology (MSU), former RA Professor in antiviral and antitumor immunity (UMass Medical School), Research Fellow (Harvard), Ph.D., Virology (McMaster), M.Sc., Immunology (Guelph), “Why Don't Diseases Completely Wipe Out Species?” 6/4, http://www.quora.com/Why-dont-diseases-completely-wipe-out-species#THUR diseases don't drive species extinct. There are several reasons for that. For one, the most dangerous diseases are those that spread from one individual to another. If the Highly contagious diseases tend to burn themselves out that way. Probably the main reason is variation. Within the host and the pathogen population there will be a wide range of variants. Some hosts may be naturally resistant. Some pathogens will be less virulent. And either alone or in combination, you end up with infected individuals who survive. We see this in HIV, for example. There is a small fraction of humans who are naturally resistant or altogether immune to HIV, either because of their CCR5 allele or their MHC Class I type. And there are a handful of people who were infected with defective versions of HIV that didn't progress to disease. We can see indications of this sort of thing happening in the past, because our genomes contain But mostly disease is highly lethal, then the population drops, and it becomes less likely that individuals will contact each other during the infectious phase. 143 many instances of pathogen resistance genes that have spread through the whole population. Those all started off as rare mutations that conferred a strong selection advantage to the carriers, meaning that the specific infectious diseases were serious threats to the species. No global pandemics – international actors will contain spread Wayne 14 Alex, syndicated columnist on US health policy, “Global Effort Signed to Halt Spread of Infectious Disease,” Bloomber, 2/13, http://www.bloomberg.com/news/2014-02-13/global-effort-signed-to-halt-spread-of-infectious-disease.html#THUR 25 countries and the World Health Organization to work together on systems to better detect and combat outbreaks of infectious diseases such as H7N9 avian flu and Ebola virus. The Obama administration plans to spend $40 million in 10 countries this year to upgrade laboratories and communications networks so outbreaks can be controlled more quickly, Thomas Frieden, director of the The U.S. won commitments from Centers for Disease Control and Prevention, said today in an interview. President Barack Obama will seek another $45 million next year to expand the program. Infectious diseases account for about 1 in 4 deaths worldwide, according to the U.S. National Institutes of Health. While diseases such as Ebola and Severe Acute Respiratory Syndrome haven’t posed a threat to the U.S., lapses in other countries may allow an outbreak to spread rapidly, Frieden said. “No country can protect itself solely within its borders,” Frieden said. “We’re all only as safe as the weakest link out there. This is an effort to essentially make the U.S. safer and make the world safer, to improve countries’ capacity to better find, stop and prevent health threats.” Frieden and Kathleen Sebelius, the U.S. health secretary, held a videoconference today with the partners in the effort. While no other country made a specific financial all the nations at the conference including China, Russia, France and the U.K. agreed to “accelerate progress and address not just the health sector but include security in health in new ways.” First Consensus “For the first time, really, we have a consensus on not only what are the threats, but what do we have to do to address them,” he said. As an example, Frieden said Turkey’s government agreed to host a WHO office to respond to outbreaks in its region. The agreement will also target emerging infections such as Middle East Respiratory Syndrome. The 10 countries in line for the U.S. investment, commitment today, Frieden said, which will be funded by the CDC and the Department of Defense, weren’t identified. The CDC plans to build on test projects last year in Uganda and Vietnam, where the agency helped the two nations’ health officials improve systems to detect and combat outbreaks of dangerous pathogens that include drug-resistant tuberculosis, Ebola virus and exotic flu strains. In Uganda, CDC officials helped the country’s Ministry of Health upgrade laboratories where tissue samples would be tested in the event of an outbreak, and developed a system for local doctors to report cases of illness by text message, according to an article published in the CDC’s journal Morbidity and Mortality Weekly Report. Uganda now is able to quickly transport tissue samples from rural outbreaks to a high-security lab in the capital, Kampala, by motorcycle courier and overnight mail, Frieden said. A mobile phone network-connected printer then texts lab results back to rural hospitals, he said. “Ultimately every country in the world should have this kind of system,” Frieden said. The $ 40 million, he said, “is certainly enough to make a good start.” Might be too late and the barrier is getting cures approved for market. Oxford 13 | Oxford University Museum of Natural History. The Oxford University Museum of Natural History, is a museum displaying many of the University of Oxford's natural history specimens, located on Parks Road in Oxford, England. They produce learning materials for joint study days – and this one was produced by representatives of The University of Oxford Botanic Garden – “Miracle Cures” – March 12, 2013 – http://www.oum.ox.ac.uk/educate/resource/miracle.pdf Sometimes the biochemical processes needed to create a drug from scratch are too complex to recreate in a cost effective way in the lab. This does not necessarily mean that the discovery leads to a dead end. Probably the most famous of all plant based cancer drugs are those derived from the rosy periwinkle, Catharanthus roseus. In the 1950’s the American pharmaceutical company Eli Lily patented the process of extraction of the active chemicals from the plant. This patent covered the cost of clinical trials and today the drugs, Vincristne and Vinblastin earn Eli Lilly over £75,000,000 annually. This discovery and eventual patenting of the extraction process saved the rosy periwinkle from the brink of extinction. It may be too late for other potential miracle cures. Fewer than 10% of the world plants have been screened for their medicinal properties. The Gran Canaria Group, whose members include major biodiversity conservation organisations and botanic gardens, recently reported that 1 in 4 of Earth's 40,000 plant species are already on the brink of extinction. Environments are changing faster than plants can migrate, and this could cause half of Europe's plant species to be lost in the next 80 years. The figures speak for themselves. The development of new medicines, from discovery to development, is a complex and intriguing process. However this is not the end of the story. New medicines have to be approved before they can be prescribed. This final barrier can sometimes be the most difficult to overcome, particularly if the medicine is derived form a controversial source. Sufferers of conditions such as MS were increasingly resorting to the use of cannabis to treat chronic pain. Although the effectiveness of this treatment was dependent on the highly variable nature of the source, increasing numbers of MS sufferers were ending up in court, and receiving light sentences, or effectively being let off. Concerned that this was bringing the drug laws into disrepute, the government began making positive, if cautious, noises about legalising medicinal cannabis if a pharmaceutical form could be developed. In November 2005 Sativex, derived form the plant Cannabis sativa, was licensed in the UK. Since then there has been a flurry of controversy about its effectiveness from renowned scientists around the world. 144