CMSDL Core Files 2015-2016 2015-2016 CMSDL Core Files Researched by Hanna Nasser, Alix Dahl, David Song and Mike Baxter-Kauf (with contributions from Cydney Edwards, Roman Motley, and Travis Ormsby) Resolved: The United States federal government should substantially curtail its domestic surveillance 1 CMSDL Core Files 2015-2016 Core Files Table of Contents 1/4 *** STINGRAY AFFIRMATIVE 7 STINGRAY AFFIRMATIVE SUMMARY 8 STINGRAY 1AC—PLAN 9 STINGRAY 1AC—HARMS (DEMOCRACY) 10 STINGRAY 1AC—HARMS (RACIAL PROFILING) 12 STINGRAY 1AC—RACIAL PROFILING ADVANTAGE 13 STINGRAY 1AC—SOLVENCY 14 2AC DEMOCRACY EXTENSIONS – ANSWERS TO: “STINGRAY UNDER CHECK NOW” 15 2AC DEMOCRACY ADVANTAGE—STINGRAY VIOLATES 18 2AC DEMOCRACY ADVANTAGE—COPS LIE 20 2AC DEMOCRACY ADVANTAGE—PRIVACY KEY TO DEMOCRACY 21 2AC RACIAL PROFILING ADVANTAGE—STINGRAY PROFILES 22 2AC RACIAL PROFILING ADVANTAGE—IMPACTS 23 2AC EXTENSIONS – SOLVENCY (BANNING STINGRAY SOLVES) 25 2AC SOLVENCY—FCC GOOD 26 2AC ANSWERS TO: FCC CAN’T DECERTIFY 27 2AC ANSWERS TO: TERROR DISADVANTAGE 28 2AC ANSWERS TO CRIME DISADVANTAGE 29 *** STINGRAY NEGATIVE 30 1NC ANSWERS TO: DEMOCRACY ADVANTAGE 31 1NC ANSWERS TO: RACIAL PROFILING ADVANTAGE 32 1NC ANSWERS TO: SOLVENCY 2NC/1NR EXTENSIONS (HARMS – RACIAL PROFILING) – RACIAL PROFILING IS INEVITABLE 2NC/1NR EXTENSIONS TO HARMS (DEMOCRACY) – STINGRAY ABUSES UNDER CHECK NOW 33 34 35 2NC/1NR EXTENSIONS TO: SOLVENCY—GOVERNMENT WILL KEEP DOING SURVEILLANCE 2NC/1NR EXTENSIONS TO: SOLVENCY—FCC FAILS (CIRCUMVENTION) 37 TERROR DISADVANTAGE LINKS 38 *** NATIONAL SECURITY LETTERS AFFIRMATIVE NATIONAL SECURITY LETTERS SUMMARY 36 40 41 2 CMSDL Core Files 2015-2016 NATIONAL SECURITY LETTERS 1AC –PLAN NATIONAL SECURITY LETTERS 1AC – HARMS (PRIVACY) NATIONAL SECURITY LETTERS 1AC – HARMS (PRIVACY) NATIONAL SECURITY LETTERS 1AC – HARMS (RACISM) NATIONAL SECURITY LETTERS 1AC – HARMS (RACISM) NATIONAL SECURITY LETTERS 1AC – SOLVENCY ANSWERS TO: TERRORISM DISADVANTAGE ANSWERS TO: TERRORISM DISADVANTAGE ANSWERS TO: CRIME DISADVANTAGE 2AC EXTENSIONS: PRIVACY 2AC EXTENSIONS: RACISM 2AC EXTENSIONS – SOLVENCY *** NATIONAL SECURITY LETTERS NEGATIVE 42 43 44 45 46 47 48 49 50 51 53 54 55 1NC SOLVENCY 1NC RACISM HARMS 1NC PRIVACY HARMS 1NC PRIVACY HARMS *** DRONE AFFIRMATIVE 56 57 58 59 60 1AC DRONES 1AC - PLAN 2AC HARMS FRONTLINES 2AC CIVIL LIBERTIES EXTENSIONS 61 62 67 68 2AC CIVIL LIBERTIES EXTENSIONS - ANSWERS TO: OBAMA REGULATING DRONES NOW 2AC CIVIL LIBERTIES EXTENSIONS - IMPACT 2AC INNOVATION 2AC SOLVENCY ANSWERS TO: ELECTIONS DISADVANTAGE (DRONES AFFIRMATIVE) *** DRONE NEGATIVE 69 70 71 72 73 75 1NC ADVANTAGE FRONTLINES 1NC CIVIL LIBERTIES FRONTLINE 1NC INNOVATION FRONTLINE 1NC SOLVENCY FRONTLINE 2NC/1NR ADVANTAGE FRONTLINE EXTENSIONS 2NC/1NR CIVIL LIBERTIES 2NC/1NR INNOVATION 2NC/1NR SOLVENCY ADVANTAGE FRONTLINE EXTENSIONS ANSWERS TO: INHERENCY- EXTENSIONS ANSWERS TO: CIVIL LIBERTIES- IMPACT FRAMING 2NC/1NR ANSWERS TO: SOLVENCY- EXTENSIONS 76 77 78 79 80 81 82 83 84 85 86 87 ***TOPICALITY NEGATIVE 88 1NC VIOLATIONS 89 **FEDERAL GOVERNMENT 1NC DRONE SURVEILLANCE- “FEDERAL GOVERNMENT” VIOLATION 90 91 3 CMSDL Core Files 2015-2016 1NC STINGRAY- “FEDERAL GOVERNMENT” VIOLATION 93 **CURTAIL ≠ ABOLISH 1NC SECURITY LETTERS- CURTAIL ≠ ABOLISH 2NC/1NR TOPICALITY BLOCKS 95 96 97 2NC/1NR- ANSWERS TO: REASONABILITY ***”FEDERAL GOVERNMENT” VIOLATION 2NC/1NR - “FEDERAL GOVERNMENT”- EXTENSIONS 2NC/1NR - “ITS”- EXTENSIONS **2NC/1NR DRONE AFFIRMATIVE 2NC/1NR DRONE AFFIRMATIVE- “FEDERAL GOVERNMENT”- OVERVIEW 2NC/1NR DRONE AFFIRMATIVE- “FEDERAL GOVERNMENT”- VIOLATION **2NC/1NR STINGRAY AFFIRMATIVE 2NC/1NR DRONE AFFIRMATIVE- “FEDERAL GOVERNMENT”- OVERVIEW 2NC/1NR STINGRAY AFFIRMATIVE- “FEDERAL GOVERNMENT”- VIOLATION ***CURTAIL ≠ ABOLISH **2NC/1NR NATIONAL SECURITY LETTERS AFFIRMATIVE 2NC/1NR SECURITY LETTERS- CURTAIL ≠ ABOLISH – OVERVIEW 2NC/1NR SECURITY LETTERS- CURTAIL ≠ ABOLISH – INTERPRETATION EXTENSIONS **TOPICALITY AFFIRMATIVE 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 **2AC BLOCKS 2AC- DRONE AFFIRMATIVE- T “FEDERAL GOVERNMENT” 2AC- STINGRAY AFFIRMATIVE- T “FEDERAL GOVERNMENT” 2AC SECURITY LETTERS 113 114 115 116 CRIME DISADVANTAGE 117 CRIME DA 1NC 118 CRIME DA 1NC CRIME DA 1NC CRIME DA 1NC 2NC/1NR LINK EXTENSIONS: GENERAL 2NC/1NR EXTENSIONS: NATIONAL SECURITY LETTERS LINK 2NC/1NR LINK EXTENSIONS - DRONE SURVEILLANCE 2NC/1NR UNIQUENESS EXTENSIONS – CRIME LOW NOW 2NC/1NR IMPACTS TURNS CASE - SURVEILLANCE 2NC/1NR IMPACTS TURNS CASE – RACISM 2NC/1NR IMPACTS – ECONOMY 2NC/1NR IMPACT – POVERTY/STRUCTURAL VIOLENCE 119 120 121 122 123 125 127 128 129 130 132 CRIME DISADVANTAGE AFFIRMATIVE ANSWERS NON-UNIQUE: CRIME HIGH NOW NO LINK - SURVEILLANCE DOESN’T REDUCE CRIME ANSWERS TO: CRIME HURTS ECONOMY 133 134 135 137 TERRORISM DISADVANTAGE 2NC/1NR EXTENSIONS: NATIONAL SECURITY LETTERS LINK 138 143 LINKS—DRONES 147 4 CMSDL Core Files 2015-2016 2NC/1NR UNIQUENESS—SURVEILLANCE SOLVES TERROR NOW 148 2NC/1NR EXTENSION: IMPACT (NUCLEAR TERRORISM) 150 IMPACT—TURNS THE AFF (RACISM) 151 IMPACT—TURNS THE AFF (CIVIL LIBERTIES) 153 IMPACTS—NUCLEAR TERRORISM CAUSES WAR 155 ANSWERS TO: SURVEILLANCE HASN’T STOPPED ANY ATTACKS 156 ANSWERS TO: BIOTERROR IMPOSSIBLE 157 TERRORISM DA AFFIRMATIVE ANSWERS 159 AFF—ARAB AMERICANS LINK TURN 160 AFF—SURVEILLANCE FAILS/NO LINK 161 AFF—NO IMPACT 163 AFF—LINK TURN: TARGETED SURVEILLANCE 164 AFF—NO LINK 167 **ELECTIONS DISADVANTAGE NEGATIVE 169 1NC HILLARY GOOD **UNIQUENESS- HILLARY GOOD UNIQUENESS- HILLARY GOOD- ANSWERS TO: BERNIE SANDERS 2NC/1NR- UNIQUENESS WALL- HILLARY GOOD **LINKS- HILLARY GOOD LINK WALL- DRONE AFFIRMATIVE LINK WALL- STINGRAY AFFIRMATIVE LINK WALL- SECURITY LETTERS AFFIRMATIVE 2NC/1NR ANSWERS TO: NO LINK – SURVEILLANCE POLICY NOT KEY TO ELECTION 2NC/1NR ANSWER TO: NO LINK – ELECTION TOO FAR OFF 2NC/1NR ANSWER TO: IMPACT TURN – IRAN DEAL **ELECTIONS DISADVANTAGE AFFIRMATIVE 170 173 174 176 178 179 183 184 185 187 188 193 **2AC BLOCKS 2AC HILLARY GOOD- LINK TURN STRATEGY 2AC HILLARY GOOD – IMPACT TURN STRATEGY **A2- HILLARY GOOD- 1AR EXTENSIONS 1AR HILLARY GOOD – NON-UNIQUE: HILLARY LOSES NOW (BERNIE SANDERS) 1AR HILLARY GOOD – NON-UNIQUE: HILLARY LOSES NOW (GENERAL ELECTION) WASHINGTON EXAMINER, 2015 1AR HILLARY GOOD – NO LINK – SURVEILLANCE DOESN’T SWING VOTES 1AR HILLARY GOOD – LINK TURN – SURVEILLANCE REFORM IS POPULAR 1AR HILLARY GOOD – IMPACT TURN – IRAN DEAL BAD **STATES COUNTERPLAN NEGATIVE 1NC STATES COUNTERPLAN 2NC/1NR- STATES COUNTERPLAN- SOLVENCY- OVERVIEW 194 195 199 202 203 205 205 207 208 210 212 213 214 5 CMSDL Core Files 2015-2016 2NC/1NR- STATES COUNTERPLAN- SOLVENCY- DRONE AFF 2NC/1NR- STATES COUNTERPLAN- SOLVENCY- SECURITY LETTERS 2NC/1NR- STATES COUNTERPLAN- SOLVENCY- STINGRAY AFFIRMATIVE 2NC/1NR- STATES COUNTERPLAN- ANSWERS TO: PERMUTATION 2NC/1NR- STATES COUNTERPLAN- ANSWERS TO: FIFTY STATE FIAT BAD **STATES COUNTERPLAN AFFIRMATIVE 215 216 217 218 219 220 2AC- STATES COUNTERPLAN 2AC- STATES COUNTERPLAN- SOLVENCY DEFICIT- DRONE AFFIRMATIVE 2AC- STATES COUNTERPLAN- SOLVENCY DEFICIT- SECURITY LETTERS AFFIRMATIVE 2AC- STATES COUNTERPLAN- SOLVENCY DEFICIT- STINGRAY AFFIRMATIVE **CISA DISADVANTAGE NEGATIVE 221 223 224 225 226 1NC- CISA DISADVANTAGE **UNIQUENESS 2NC/1NR- CISA DISADVANTAGE- UNIQUENESS WALL **LINK 2NC/1NR – CISA DISADVANTAGE- LINK WALL- DRONE AFFIRMATIVE 2NC/1NR- CISA DISADVANTAGE- LINK WALL- STINGRAY AFFIRMATIVE 2NC/1NR- CISA DISADVANTAGE- LINK WALL- SECURITY LETTERS **IMPACT 2NC/1NR- CISA DISADVANTAGE- ANSWERS TO: CISA GOOD **CISA DISADVANTAGE AFFIRMATIVE 2AC- CISA DISADVANTAGE- LINK TURN STRATEGY 2AC- CISA DISADVANTAGE- IMPACT TURN STRATEGY 2AC- CISA DISADVANTAGE- DRONE AFFIRMATIVE- NO LINK/LINK TURN 227 230 231 232 233 235 236 237 238 240 241 243 245 6 CMSDL Core Files 2015-2016 *** Stingray Affirmative 7 CMSDL Core Files 2015-2016 Stingray Affirmative Summary The Stingray is an IMSI (International Mobile Subscriber Identity) catcher. That is, it’s a device used for intercepting mobile phone traffic by acting as a fake “cell tower.” The Stingray specifically can use this functionality to: 1. Obtain identifying information about a cell phone that can help facilitate wiretapping. 2. Locate a cell phone user 3. Capture the content of communications like calls and text messages. 4. Block service The use of these devices has been criticized as a breach of privacy, as well as something that it is difficult to hold agencies accountable for. Federal agencies have denied FOIA requests related to the devices because of “nondisclosure agreements” with the corporation that creates them. They are also often used in secret and without obtaining any kind of warrant. 8 CMSDL Core Files 2015-2016 Stingray 1AC—Plan We present the following plan: The FCC should decertify Stingray catcher devices for use in law enforcement. 9 CMSDL Core Files 2015-2016 Stingray 1AC—Harms (Democracy) Contention One is Harms - Stingray devices hurt democracy Law enforcement use StingRay devices, which illegally retrieve cell phone data from thousands of innocent civilians. This violates the Fourth Amendment and endangers democracy. Fakhoury 2012 (Hanni Fakhoury for Electronic Frontier Foundation “StingRays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About” October 22 Online https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy) Beyond the government's conduct in this specific case, there is an even broader danger in law enforcement using these devices to locate suspects regardless of whether they explain the technology to judges: these devices allow the government to conduct broad searches amounting to “general warrants,” the exact type of search the Fourth Amendment was written to prevent. A Stingray—which could potentially be beamed into all the houses in one neighborhood looking for a particular signal—is the digital version of the pre-Revolutionary war practice of British soldiers going door-to-door, searching Americans’ homes without rationale or suspicion, let alone judicial approval. The Fourth Amendment was enacted to prevent these general fishing expeditions . As the Supreme Court has explained, a warrant requires probable cause for all places searched, and is supposed to detail the scope of the search to ensure “nothing is left to the discretion of the officer executing the warrant”.But if uninformed courts approve the unregulated use of Stingrays, they are essentially allowing the government to enter into the home via a cellular signal at law enforcement’s discretion and rummage at will without any supervision. The government can’t simply use technology to upend centuries of Constitutional law to conduct a search they would be prevented from doing physically.Stingrays Collect Data on Hundreds of Innocent PeopleAnd when police use a Stingray, it’s not just the suspects’ phone information the device sucks up, but all the innocent people around such suspect as well. Some devices have a range of “several kilometers,” meaning potentially thousands of people could have their privacy violated despite not being suspected of any crime. This is another fact the government didn’t fully explain to the magistrate judge in Rigmaiden.The government now claims it protected privacy by deleting all third-party data on its own after it collected it. But the government’s unilateral decision to binge and purge comes with its own consequences. Now there’s no way to know what exactly the government obtained when it used the device.Had the government told the court what it really was planning on doing and the amount of information it would obtain, the court may have exercised its constitutional role of ensuring the government narrowed its search. After all, it was for the court, not the government, to decide how best to balance the government’s need for information with third-party privacy, and any suspect’s future interest in access to potentially exculpatory information. Constitutional violations like StingRay will create an unstoppable police state if they are not stopped. Whitehead 2012 (John Whitehead for The Rutherford Institute “The Corporate Surveillance State: How the Thought Police Use Your Cell Phone to Track Your Every Move” Online https://www.rutherford.org/publications_resources/john_whiteheads_commentary/the_corporate_surveillance_state_how_the_thought_police_use_your_cell_) Advanced technology now provides government agents and police officers with the ability to track our every move. The surveillance state is our new society. It is here, and it is spying on you, your family and your friends every day. Worse yet, those in control are using life’s little conveniences, namely cell phones, to do much of the spying. And worst of all, the corporations who produce these little conveniences are happy to hand your personal information over to the police so long as their profit margins increase. To put it simply, the corporate-surveillance state is in full effect, and there is nowhere to hide.Using the data transferred from, received by, and stored in your cell phone, police are now able to track your every move. Your texts, web browsing, and geographic location are all up for grabs. Using “stingray” devices, often housed in mobile surveillance vans, federal agents track the cell phones of unsuspecting people. By triangulating the source of a cell phone signal, agents are able to track down the whereabouts of the person holding it. These surveillance sweeps target all cell phone signals, not just those of criminal suspects. Examples of extralegal police surveillance in the years since 9/11 are numerous, from the NSA’s warrantless wiretapping program to the NYPD’s spy network that targeted Muslims in the New York area.Unfortunately, the now widespread tactic of spying on people via their cell phones resides in a legal grey area, which has allowed police agencies to take drastic steps to record the daily activity of all Americans. Whereas cell phone tracking once fell only in the purview of federal agents, local police departments, big and small, are beginning to engage in cell phone tracking with little to no oversight. Small police agencies are shelling out upwards of $244,000 to get the technology necessary to track cell phones. And as you might expect, most police departments have attempted to keep knowledge of their cell phone tracking programs secret, fearing (as they should) a public backlash.Federal courts are divided on the issue, some saying that a warrant is necessary before executing a cell phone search. However, the United States Court of Appeals for the Sixth Circuit recently ruled that tracking the location of a cell phone without a warrant is legal and, thus, not a violation of the Fourth Amendment. This lack of concern for the Fourth Amendment—which requires reasonable suspicion that you’re up to something illegal before the police conduct surveillance on you—is widely shared among the federal and state courts. In fact, courts issue tens of thousands of cell tracking orders a year, allowing police agencies to accurately pinpoint people’s locations within meters. Unless they’re charged with a crime, most people remain 10 CMSDL Core Files 2015-2016 unaware that their cell data has been tracked.[…]On the rare occasion that a telecom corporation resists a police effort to spy on a particular cell phone customer, there are methods by which companies are coerced to comply with the data requests. Telecoms are frequently harassed by the FBI with National Security Letters (NSL), which are demands for user information without warrant or judicial oversight. These include a gag order, which prevents the recipient from discussing the demand with others, including the media. Roughly 300,000 of these NSLs have been sent out since 2000, implying a massive spying effort on the part of the federal government. One telecom is currently in a battle with the federal government over an NSL demanding user data. The telecom refused to abide by the NSL, and in response the federal government has sued the telecom, insisting that their refusal jeopardizes national security. The end logic of this is that our private data is actually not private. The federal government claims that knowing our personal information is critical to preserving national security, and thus neither telecoms nor users may resist the sharing of that information.Of course, corporations are just as interested in tracking people’s daily activities as the government. Cell phone companies and the software companies that create applications for their devices track your personal information so that they can market their services to you. Unfortunately, this leads to mass aggregation of user data which is then used by government agents to spy on and track all cell phone users. For example, Carrier IQ, a software company, and cell phone manufacturers HTC and Samsung are currently in the midst of a classaction lawsuit brought by Android phone users whose phone activities are recorded by a “rootkit,” a piece of software surreptitiously installed on cell phones that records the keystrokes of phone users. The FBI denied a December 2011 FOIA request to determine how the government was utilizing Carrier IQ’s software, as it could have an adverse impact on ongoing investigations. The agency’s refusal suggests that not only is Carrier IQ spying on cell phone users for their corporate purposes, but that federal agents are utilizing the software to conduct their own spying campaigns.Unfortunately, with intelligence gathering and surveillance doing booming business, and corporations rolling out technologies capable of filtering through vast reams of data, tapping into underseas communication cables, and blocking websites for entire countries, life as we know it will only get worse. As journalist Pratap Chatterjee has noted, “[T]hese tools have the potential to make computer cables as dangerous as police batons.” Telecoms hold on to user data, including text messages and Internet browsing history, for months to years at a time. This, of course, has some ominous implications. For example, British researchers have created an algorithm that accurately predicts someone’s future whereabouts at a certain time based upon where she and her friends have been in the past. 11 CMSDL Core Files 2015-2016 Stingray 1AC—Harms (Racial Profiling) Contention Two is Harms – Stingray devices are used for racial profiling The government uses cell phone trackers like StingRay for racial profiling Calabrese and Fulton 2012 (Christopher Calabrese and Sandra Fulton for The Leadership Conference. “Privacy Rights: A 21st Century Update” Online http://www.civilrights.org/monitor/winter-2012/privacy-rights-a-21st.html?referrer=https://www.google.com/) Despite the efforts of civil rights groups, the practice of racial profiling by members of law enforcement at the federal, state, and local levels remains a widespread and pervasive problem affecting African-American, Muslim, Latino, and other communities.In August 2011, an Associated Press report revealed a massive surveillance department established within the New York Police Department (NYPD) after 9/11 to monitor Muslim neighborhoods and infiltrate their community organizations. According to officials involved, undercover officers were sent to investigate all parts of daily life in these communities including bookstores, bars, Internet cafes, and clubs looking for “hot spots” of “radicalization.” As part of a largely secret police program, they spied on and recorded the lives of innocent Americans without any evidence of wrongdoing.The NYPD has long viewed the Internet as dangerous territory. In a 2009 report it said:“The Internet plays an important role during the radicalization process…. The Internet becomes a virtual ’echo chamber’ – acting as a radicalization accelerant while creating the path for the ultimate stage of Jihadization. In the Jihadization phase, people challenge and encourage each other’s move to action. The Internet (sic) is now a tactical resource for obtaining instructions on constructing weapons, gathering information on potential targets, and providing spiritual justification for an attack.”It’s not known whether NYPD’s efforts to track Muslims involved government surveillance under ECPA because of the secrecy of the program. Assuming ECPA applied, however, there is no question that the outdated nature of ECPA’s protections would have allowed these activities to proceed with little transparency and judicial oversight.Additionally, recent studies have shown that minority communities use smart phones at a significantly higher rate than the rest of the population. At the same time, the sensitive information stored in these phones has become a hot commodity for law enforcement investigations. In just one year, Sprint Nextel provided law enforcement agencies with the specific whereabouts of its customer more than 8 million times without requiring a warrant or probable cause. The company even set up a website for law enforcement agents so they could access these records from the comfort of their desks. “The tool has just really caught on fire with law enforcement ,” said Paul Taylor, Sprint’s manager of electronic surveillance, in 2009. The fact that Sprint needs to employ a person with the title “manager of electronic surveillance” may go a long way toward explaining why ECPA needs updating.[…]ConclusionThe Founding Fathers recognized that participants in a democracy need privacy for their “persons, houses, papers, and effects.” That remains as true today as ever. But privacy laws have not kept up as technology has changed the way Americans hold their personal information. Outdated laws allow law enforcement to circumvent the right to privacy, probe personal communications and track an individual’s whereabouts without any evidence of wrongdoing. In many circumstances, such a weak statutory scheme has a disproportionate impact on racial minorities and people who may hold unpopular beliefs. Updating privacy laws to require a warrant for access to sensitive personal information will ensure that police are following proper investigative guidelines and help to guard against profiling. It’s important to update ECPA in order to maintain the robust privacy protections all Americans expect and deserve. 12 CMSDL Core Files 2015-2016 Stingray 1AC—Racial Profiling Advantage Racial profiling destroys community and national security, wastes law enforcement resources, damages minority communities, and ruins counterterrorism efforts. Calabrese and Fulton 2012 (Christopher Calabrese and Sandra Fulton for The Leadership Conference. “Privacy Rights: A 21st Century Update” Online http://www.civilrights.org/monitor/winter-2012/privacy-rights-a-21st.html?referrer=https://www.google.com/) Racial profiling forces individuals who have engaged in no wrongdoing to endure the burdens of law enforcement in order to prove their innocence. For each criminal, terrorist, or undocumented immigrant apprehended through racial profiling, many more lawabiding minorities are treated through profiling as if they are criminals, terrorists, or undocumented immigrants.[…] Texas State Judge Gillberto Hinajosa, the subject of immigration-related profiling on many occasions, has stated that Southern Texas "feels like occupied territory … It does not feel like we're in the United States of America."116 Such alienation is a common consequence of being profiled. Exposure to racial profiling has behavioral as well as emotional consequences. Many minorities who are entirely innocent of any wrongdoing choose to drive in certain automobiles and on certain routes, or to dress in certain clothes, to avoid drawing the attention of police who might otherwise profile and stop them. 117 Or they choose to live in areas where they will not stand out as much, thereby reinforcing patterns of residential segregation.118An example of behavioral changes in an effort to avoid racial profiling in the counterterrorism context is provided by Khaled Saffuri. Saffuri, a Lebanese man living in Great Falls, Virginia, has said that he shaves closely and wears a suit when he flies, then remains silent during flights and avoids using the aircraft's bathroom. Sometimes he avoids flying altogether in favor of long drives to his destination.119Defenders of racial profiling argue that profiling is necessary and useful in the effort by law enforcement authorities to fight street-crime, combat terrorism, and enforce the nation's immigration laws. The opposite is true: racial profiling is in all contexts a flawed law enforcement tactic that may increase the number of people who are brought through the legal system, but that actually decreases the hit rate for catching criminals, terrorists, or undocumented immigrants. There are two primary reasons for this.To begin with, racial profiling is a tactic that diverts and misuses precious law enforcement resources. This became clear in 1998 when the U.S. Customs Service responded to a series of discrimination complaints by eliminating the use of race in its investigations and focusing solely on suspect behavior. A study found that this policy shift led to an almost 300 percent increase in the discovery of contraband or illegal activity.120Consider the inefficient allocation of scarce police resources in New Jersey when, as described in Chapter III (C) of this report local law enforcement authorities stopped tens of thousands of Hispanic motorists, pedestrians, passengers, and others in a six-month period. Just 1,417 of the tens of thousands stopped were ultimately charged with immigration offenses by the federal government.121Or, consider the April 2008 assault by more than 100 Maricopa County, Arizona deputies, a volunteer posse, and a helicopter on a small town of 6,000 Yaqui Indians and Hispanics outside of Phoenix, as described in Chapter III (C) above. After terrorizing the residents for two days, stopping residents and chasing them into their homes to conduct the use of racial profiling— and the focus on the many Arabs, Muslims, Sikhs, and other South Asians who pose no threat to national security—diverts law enforcement resources away from investigations of individuals who have been linked to terrorist activity by specific and credible evidence.A background checks, Sheriff Joe Arpaio's operation resulted in the arrest of just nine undocumented immigrants.122Turning to the counterterrorism context, memorandum circulated to U.S. law enforcement agents worldwide by a group of senior law enforcement officials in October 2002 makes clear that race is an ineffective measure of an individual's terrorist intentions. The memorandum, entitled "Assessing Behaviors," emphasized that focusing on the racial characteristics of individuals was a waste of law enforcement resources and might cause law enforcement officials to ignore suspicious behavior, past or present, by someone who did not fit a racial profile.123 One of the authors of the report noted: "Fundamentally, believing that you can achieve safety by looking at characteristics instead of behaviors is silly. If your goal is preventing attacks … you want your eyes and ears looking for preattack behaviors, not characteristics."124In sum, ending racial profiling will result in the more efficient deployment of law enforcement resources. As David Harris, a professor of law at the University of Pittsburgh Law School and a recognized expert on racial profiling, explained in his June 2010 testimony before the Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the U.S. House of Representatives Judiciary Committee:[…]An additional reason why racial profiling is not an effective law enforcement tactic is that it destroys the relationship between local law enforcement authorities and the communities that they serve. This is particularly true with regard to the enforcement of federal immigration laws by local police under the 287(g) program and other ICE ACCESS programs.When local police function as rogue immigration agents, fear—as opposed to trust—is created in Hispanic and other immigrant communities. U.S. born children with parents who are either U.S. citizens or lawful residents may avoid coming in contact with police or other public officials (including school officials) out of concern that they, their parents, or family members will be targeted by local law enforcement authorities for a check of their immigration status. Victims of domestic violence who are immigrants may fear interacting with the police because of their immigration status, or the status of their families, or even their abusers, and the consequences of that fear can leave them Respect and trust between law enforcement authorities and immigrant communities are essential to successful police work. Racial profiling has a destructive impact on minority communities. How many community in dangerous and violent situations. members will step up to be "Good Samaritans" and report crimes or accidents, or offer help to a victim until the police arrive, if the risk of doing the good deed is an interaction with a police officer that may result in a background check or challenge to immigration status? Perversely, the ultimate result of racial profiling in minority communities is precisely the opposite of the goal of effective local law enforcement. It is for this reason that many police executives and police organizations have expressed concern that the enforcement of the immigration laws by local law enforcement authorities has a 6 The use of racial profiling in the counterterrorism context—as in the immigration context— alienates the very people that federal authorities have deemed instrumental in the anti-terrorism fight. Arab and Muslim "negative overall impact on public safety."12 communities may yield useful information to those fighting terrorism. Arabs and Arab Americans also offer the government an important source of Arabic speakers and translators. The singling out of Arabs and Muslims for investigation regardless of whether any credible evidence links them to terrorism simply alienates these individuals and compromises the anti-terrorism effort. In particular, to the extent that federal authorities use the anti-terrorism effort as a pretext for detaining or deporting immigration law violators, individuals who might have information that is useful in the fight against terrorism may be reluctant to come forward. For a special registration program such as NSEERS, those individuals will choose not to register, thereby defeating the very purpose of the program.127 13 CMSDL Core Files 2015-2016 Stingray 1AC—Solvency Contention Three is Solvency: The FCC Can Withdraw the Authority for Police to Employ Stingray Technology Benson 2014 (Thor Benson, freelance writer. THE ATLANTIC “The Briefcases that Imitate Cell Phone Towers” http://www.theatlantic.com/technology/archive/2014/09/the-briefcases-that-imitate-cell-phone-towers/380678/ The ACLU, on the other hand, wants to know if local police departments are using Stingrays to monitor citizens in a way that they feel should not be allowed. “At the the FCC should be reevaluating these grants of authority to Harris to make sure that they're actually appropriate, in light of the actual effect,” Wessler told me. If the FCC investigated this possibility and found they were mislead in how the Stingray would be used by police, they could revoke the authorization for police departments using such technology. Whether it very least, be the crimes against minorities committed by police departments, the unprecedented militarization of the police in the past decade or the police acting as appendages of the NSA, it's becoming clear that policies of police forces in the United States are broken. The ACLU and human rights groups around the country are pleading for more information on what these authorities are doing in their day-to-day work, but they are forced to file information requests that only result in being given parts of the greater picture. Instead of a few emails between Harris and the FCC, the ACLU wants a copy of the actual application that was sent. But for now, they are limited to what the government is willing to give them—a string of emails between Harris employees and the FCC regulators who reviewed Harris's application. And from what they can tell based on those emails, today’s use of Stingrays lies in sharp contrast with how they were approved. 14 CMSDL Core Files 2015-2016 2AC Democracy Extensions – Answers to: “Stingray Under Check Now” New Stingray reforms have multiple loopholes and don’t apply to federal agents Mint Press News, 2015 (http://www.mintpressnews.com/justice-departments-new-stingray-surveillance-policy-hasmajor-loophole/209338/, Sept 8) The new policy [PDF] states “law enforcement agencies must now obtain a search warrant supported by probable cause.” It proceeds to outline two exceptions: (1) “exigent circumstances” and (2) “exceptional circumstances where the law does not require a warrant.” The very existence of this categorical exception seems to entirely undermine the stated intention of the policy. Several examples of “exigent circumstances” are outlined as justifications for not getting a warrant—to protect human life or avert serious injury, to prevent imminent destruction destruction of evidence, to pursue a fleeing felon, to prevent the escape of a suspect or convicted fugitive. These are standard examples of situations, which have typically given law enforcement the authority to waive warrant requirements. Yet, in privacy law, there is no “exceptional circumstances where the law does not require a warrant” category of accepted exemptions to the Fourth Amendment. As the policy outlines, “There may also be other circumstances in which, although exigent circumstances do not exist, the law does not require a search warrant and circumstances make obtaining a search warrant impracticable.” The Justice Department claims “such cases” will be “very limited” but does not bother to provide a single example of a situation where human life would not be in danger, a fugitive would not be on the loose, evidence would be near destruction, but law enforcement would be in circumstances that would make not getting a warrant acceptable. Essentially, the Justice Department seeks to establish a “We Won’t Get a Warrant If We Don’t Feel Like It” loophole in government policy. Nate Freed Wessler, staff attorney for the American Civil Liberties Union, asserted, “The guidance leaves the door open to warrantless use of Stingrays in undefined ‘exceptional circumstances,’ while permitting retention of innocent bystander data for up to 30 days in certain cases.” “The second exception listed in today’s policy for undefined ‘exceptional circumstances’ is potentially problematic,” EFF stated. “We have no idea what that means, so we’re waiting to see if and how the exception will be used.” Another problem with the new policy is that it does not apply to federal agents, who use Stingray surveillance in “national security” investigations. The policy applies only to state and local law enforcement agencies, which have partnered with federal agencies which are part of the Justice Department. State and local law enforcement could choose not to be partners and continue to follow their own rules for Stingray surveillance. It also is a policy, not law, which according to EFF means people have their privacy violated cannot seek a remedy if law enforcement abuses these guidelines. Recent Department of Justice Stingray reforms don’t go nearly far enough US News and World Report, 2015 http://www.usnews.com/news/articles/2015/09/04/police-use-of-stingrays-that-gobble-phone-dataunaffected-by-new-federal-warrant-rule, Sept 4 The Justice Department is reining in federal agents’ use of cell-site simulators that collect in bulk information on cellphone users in a specific geographic area, but privacy advocates aren't satisfied with initial steps toward shielding location data of innocent Americans from warrantless collection. Federal and local officials' use of the devices, the best-known being Stingrays made by Harris Corp., is cloaked in secrecy, but appears often done without warrants and at times is concealed from courts, with police citing nondisclosure agreements they signed with the FBI. Now, the Justice Department announced Thursday, its employees and agents working under its umbrella in agencies such as the FBI, the U.S. Marshals Service and Drug Enforcement Agency, must generally get a warrant to use cell-site simulators. 15 CMSDL Core Files 2015-2016 But the policy, which retains loopholes for exigent circumstances such as "hot pursuit of a fleeing felon" or to spare someone from death or serious injury and for "very limited" exceptional circumstances, isn’t as far-reaching as privacy advocates would like, and it doesn’t affect local law enforcement agencies when they are not working with federal authorities. Department of Justice Stingray reforms have limited power – we need the Aff plan US News and World Report, 2015 http://www.usnews.com/news/articles/2015/09/04/police-use-of-stingrays-that-gobble-phone-dataunaffected-by-new-federal-warrant-rule, Sept 4 American Civil Liberties Union attorney Nathan Freed Wessler, one of the most prominent advocates of privacy protections against Stingray use, says the effect of the new policy on state and local authorities appears limited. “Disturbingly," he said in a statement, "the policy does not apply to other federal agencies or the many state and local police departments that have received federal funds to purchase these devices." Justice Department spokesman Patrick Rodenbush confirms the rules do no constrain law enforcement when they are not working with the department's authorities Recent Department of Justice policies on StingRay devices allow exceptions and don’t stop their use Ars Technica, 2015 http://arstechnica.com/tech-policy/2015/09/fbi-dea-and-others-will-now-have-to-get-a-warrant-touse-stingrays/, September 3 Civil liberties advocates generally applauded the DOJ’s move, but felt that more could be done. "It’s a welcome and overdue first step, but it is just a first step," Linda Lye, an attorney with the American Civil Liberties Union (ACLU) of Northern California, told Ars. "It doesn’t cover non-DOJ entities and it doesn’t cover the locals." Earlier this year Washington State joined Virginia, Minnesota and Utah in imposing a warrant requirement at the state level. She also pointed out that the new policy grants a non-warrant exception for well-understood "exigent circumstances"—a situation Ars detailed recently—it also creates a new category of "exceptional circumstances." As the document states: There may also be other circumstances in which, although exigent circumstances do not exist, the law does not require a search warrant and circumstances make obtaining a search warrant impracticable. In such cases, which we expect to be very limited, agents must first obtain approval from executive-level personnel at the agency's headquarters and the relevant U.S. Attorney, and then from a Criminal Division [Deputy Assistant Attorney General]. The Criminal Division shall keep track of the number of times the use of a cell-site simulator is approved under this subsection, as well as the circumstances underlying each such use. The Department of Homeland Security (DHS), for example, would be able to continue using stingrays absent a warrant for now. However, Yates told reporters that DHS was working on its own policy, which is likely to be similar. Nathan Freed Wessler, an ACLU attorney, noted that the new policy also does not include any sort of mandate that the states change their practices through its grant-issuing power. In many cases, state and local law enforcement obtain the surveillance tools through federal grant money. "One thing that DOJ would have in its power to do, and DHS could do this, is to tie its grant funding to this policy," he said. Warrantless Stingray surveillance is becoming more common in the status quo 16 CMSDL Core Files 2015-2016 Klonick 2014 (Kate Klonik, lawyer and writer, currently a resident fellow at Yale Law School’s Information Society Project, http://www.slate.com/articles/technology/future_tense/2014/11/stingrays_imsi_catchers_how_local_law_enforcement_uses_an_invasive_surveillance.html) One of the tools making it possible for Chief Wiggum to gather all your deets is known colloquially as a Stingray, a portable gadget about the size of a box of doughnuts. They’re also known as “cell-site simulators,” because, well, that’s exactly what they do: A Stingray mimics a cellphone tower and forces all nearby mobile phones or devices to connect to it. Every phone that connects to the Stingray reports its number, GPS location, and the numbers of all outgoing calls and texts. That’s every location and outgoing call and text log of every phone within a certain radius—up to several kilometers—of the Stingray, and that’s all without a warrant. It’s probably not a huge surprise to most people in America today that the federal government has incredible surveillance technology that it uses occasionally on its own citizens. (Hi, NSA!) But polling shows that only 27 percent of people think that this technology is focused on them, and even if not, half of Americans surveyed say that there might be a margin of federal surveillance they’re willing to endure in the name of homeland security or fighting terrorism. But that logic is a much harder sell when it local police, who have been acquiring Stingrays in increasing numbers. At least 46 state and local police departments, from Sunrise, Florida, to Hennepin, Minnesota, have gotten cell-site simulators, which range widely in price from $16,000 to more than $125,000 a pop. And like the federal government, local police are using this technology without any judicial oversight. That means Barney Fife—or, if you’re looking for a more sinister example, think Denzel in Training Day—can walk into your neighborhood with a Stingray, fire it up, and collect all the numbers, GPS, and call logs of every cellphone in the area. If they’re looking for a specific number (hopefully, it’s not you), they can also use a Stingray to trick your phone into being a personal GPS tracker and then use that warrantless cellphone tracking to enter your home and arrest you—again without a warrant. comes to 17 CMSDL Core Files 2015-2016 2AC Democracy Advantage—Stingray Violates StingRay capture data in an intrusive and unconstitutional manner; they should be banned for violating the Fourth Amendment. ACLU 2014 (“StingRays: The Most Common Surveillance Tool the Government Won’t Tell You About” Online https://www.aclunc.org/sites/default/files/StingRays_The_Most_Common_Surveillance_Tool_the_Govt_Won%27t_Tell_You_About.pdf) Federal and state law enforcement entities across the country are using a powerful cell phone surveillance tool commonly referred to as a “StingRay.” These devices are capable of locating a cell phone with extraordinary precision, but to do so they operate in dragnet fashion, scooping up information from a target device, as well as other wireless devices in the vicinity. In addition, these devices can be configured to capture the content of voice and data communications. Although the federal government has been using these devices since at least 1995, and use by state and local governments is quite widespread, there are only a handful of opinions addressing their use. At this juncture, few criminal defense attorneys are aware of these highly intrusive but extremely common surveillance tools. This is entirely understandable because the federal government has a policy of not disclosing information about this device. The government appears to be withholding information from criminal defendants. It even appears to be providing misleading information and making material omissions to judicial officers when it seeks purported court authorization to use this device – inaccurately referring to it as a “confidential source” or calling it a different kind of device (like a pen register), and failing to alert courts to constitutionally material facts about the technology, such as the full breadth of information it obtains from a suspect and its impact on third parties. As a result, courts are probably not aware that they are authorizing use of this device and have not had an opportunity to rule on its legality, except in very rare instances. The secrecy surrounding these devices is deeply troubling because this technology raises grave constitutional questions. There is a compelling argument that StingRays should never be used. Because they operate in dragnet fashion, they engage in the electronic equivalent of the “general searches” prohibited by the Fourth Amendment. But at a minimum, law enforcement should obtain a warrant. Even in those instances when law enforcement obtains a warrant, however, there are likely strong arguments that the warrant is invalid. StingRay technology violates Fourth Amendment rights Infosec 2014 (Infosec Technology Institute “StingRay Technology: How the Government Tracks Cellular Devices” Online http://resources.infosecinstitute.com/stingray-technology-government-tracks-cellular-devices/) StingRay technology raises serious privacy concerns because of the indiscriminate way it targets cellular devices in a specific area. The dragnet way in which StingRay operates appears to be in contrast with the principle of various laws worldwide. Government and law enforcement shouldn’t be able to access citizen’s private information without proving to a court order that must be issued to support investigation activities.In the US, for example, the Fourth Amendment stands for the basic principle that the US government cannot conduct a massive surveillance operation, also indicated as “general searches”. The Supreme Court recently reiterated that principle in a case involving cell phone surveillance, and confirmed that law enforcement need a warrant to analyze data on the suspect’s cellphone.Organizations for the defense of civil liberties ask governments to provide warrants to use surveillance technologies like StingRay. The warrant still represents a reasonable mechanism for ensuring the right balance between the citizen’s privacy and law enforcement needs.Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center (EPIC) highlighted the risks related to the indiscriminate collection of a so large amount of cellular data.“I don’t think that these devices should never be used, but at the same time, you should clearly be getting a warrant,” said Alan Butler of EPIC.Unfortunately, cases such as the one disclosed in this post suggest that governments specific activities, but law are using StingRay equipment in secrecy. In some cases, a court order is issued for enforcement arbitrarily extends the use of technology in other contexts that may be menacing to citizens’ privacy. Stingray surveillance violates Americans’ 4th Amendment privacy rights Fakhoury 2012 (Hanni Fakhoury for Electronic Frontier Foundation “StingRays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About” October 22 Online https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy) Beyond the government's conduct in this specific case, there is an even broader danger in law enforcement using these devices to locate suspects regardless of whether they explain the technology to judges: these devices allow the government to conduct broad searches amounting to “general warrants,” the exact type of search the Fourth Amendment was written to prevent. A Stingray—which could potentially be beamed into all the houses in one neighborhood looking for a particular signal —is the digital version of the pre18 CMSDL Core Files 2015-2016 Revolutionary war practice of British soldiers going door-to-door, searching Americans’ homes without rationale or suspicion, let alone judicial approval. The Fourth Amendment was enacted to prevent these general fishing expeditions. As the Supreme Court has explained, a warrant requires probable cause for all places searched, and is supposed to detail the scope of the search to ensure “nothing is left to the discretion of the officer executing the warrant”.But if uninformed courts approve the unregulated use of Stingrays, they are essentially allowing the government to enter into the home via a cellular signal at law enforcement’s discretion and rummage at will without any supervision. The government can’t simply use technology to upend centuries of Constitutional law to conduct a search they would be prevented from doing physically.Stingrays Collect Data on Hundreds of Innocent PeopleAnd when police use a Stingray, it’s not just the suspects’ phone information the device sucks up, but all the innocent people around such suspect as well. Some devices have a range of “several kilometers,” meaning potentially thousands of people could have their privacy violated despite not being suspected of any crime. 19 CMSDL Core Files 2015-2016 2AC Democracy Advantage—Cops Lie Cops purposefully mislead courts about their use of Stingray surveillance Pell & Soghoian 2014 (Stephanie K. Pell and Christopher Soghoian, “YOUR SECRET STINGRAY’S NO SECRET ANYMORE: THE VANISHING GOVERNMENT MONOPOLY OVER CELL PHONE SURVEILLANCE AND ITS IMPACT ON NATIONAL SECURITY AND CONSUMER PRIVACY, Harvard Journal of Law & Technology, http://jolt.law.harvard.edu/articles/pdf/v28/28HarvJLTech1.pdf) Despite the fact that U.S. government agencies have used cellular surveillance devices for more than twenty years , the 2012 Judge Owsley opinion is one of only two known published magistrate opinions to address law enforcement use of this technology. There are several possible reasons for this dearth of judicial analysis, but one of the most troubling possibilities may be a lack of knowledge on the part of magistrate judges about the specific surveillance technique(s) they are authorizing, due to a lack of candidly presented explanatory information in the government’s applications. In one set of DOJ emails obtained by the American Civil Liberties Union (“ACLU”) through a Freedom of Information Act request, for example, a federal prosecutor in Northern California noted that “many agents are still using [cellular surveillance technology with a] pen register application [that] does not make [the use of that technology] explicit.” Similarly, at a conference at Yale Law School in 2013, Judge Owsley indicated that federal agents may frequently obfuscate the planned use of a StingRay in authorization requests: “I may have seen them before and not realized what it was, because what they do is present an application that looks essentially like a pen register application . . . . So any magistrate judge that is typically In Tacoma, Washington, the local police have used StingRay surveillance devices since 2009 and insist that they only do so with approval from a judge. When asked about the police department’s statements in 2014, however, the presiding judge of the local Superior Court told a reporter that the StingRay equipment had not been mentioned in any warrant applications that he has seen. He also revealed that other judges in his court were similarly surprised to hear that the Tacoma police were using the technology, stating that “[the judges] had never heard of it.” That prosecutors have not made this information clear to judges often appears to be an intentional action. In the Rigmaiden case, for example, prosecutors conceded looking at a lot of pen register applications and not paying a lot of attention to the details may be signing an application that is authorizing a Sting[R]ay.” that the government had not made a “full disclosure to the magistrate judge [who issued the original order authorizing the surveillance] with respect to the nature and operation of the [StingRay] device [used to locate Rigmaiden].” The reason for that lack of candor, the DOJ later told the court, was “because of the sensitive nature of the device in terms of concerns out of the disclosure to third parties.” Likewise, two notable events in Florida suggest an intentional effort by local law enforcement in that state to protect details about the use and functions of cellular surveillance technology. In a 2008 state case, police in Tallahassee used a StingRay to locate a victim’s stolen phone in the defendant’s apartment. The police later revealed that they “did not want to obtain a search warrant because they did not want to reveal information about the technology they used to track the cell phone signal.” In addition, an investigator with the technical operations unit of the Tallahassee Police Department testified: “[W]e prefer that alternate legal methods be used, so that we do not have to rely upon the equipment to establish probable In Sarasota, police have enacted a policy of describing StingRay derived intelligence in depositions and reports as “‘information from a confidential source regarding the location of the suspect . . . .’” According to emails obtained by the ACLU, this policy, which was requested by the U.S. Marshals, is intended to shield information about the StingRay “so that [law enforcement] may continue to utilize this technology without the knowledge of the criminal element.” Even if the aim of this policy is to keep the general public in the dark, by including misleading information in court documents, the police are also preventing the courts from having a true understanding of the electronic surveillance that is being conducted under their watch. cause, [in order to avoid] reveal[ing] the nature [of the surveillance] and methods [used].” 20 CMSDL Core Files 2015-2016 2AC Democracy Advantage—Privacy Key to Democracy Stingrays destroy the privacy rights that are a necessary ingredient of effective democracy McFarland, 2012 (Michael McFarland, S.J., a computer scientist with extensive liberal arts teaching experience and a special interest in the intersection of technology and ethics, served as the 31st president of the College of the Holy Cross. http://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/why-care-about-privacy.html) privacy, as protection from excessive scrutiny, is necessary if individuals are to be free to be themselves. Everyone needs some room to break social norms, to engage in small "permissible deviations" that help define a person's individuality. People need to be able to think outrageous thoughts, make scandalous statements and pick their noses once in a while. They need to be able to behave in ways that are not dictated to them by the surrounding society. If every appearance, action, word and thought of theirs is captured and posted on a social network visible to the rest of the world, they lose that freedom to be themselves. As Brian Stelter wrote in the New York Times on the loss of anonymity in Therefore today's online world, "The collective intelligence of the Internet's two billion users, and the digital fingerprints that so many users leave on Web sites, combine to make it more and more likely that every embarrassing video, every intimate photo, and every indelicate e-mail is attributed to its source, whether that source wants it to be or not. This intelligence makes the public sphere more public than ever before and sometimes forces personal lives into public view." 12 This ability to develop one's unique individuality is especially important in a democracy, which values and depends on creativity, nonconformism and the free interchange of diverse ideas. That is where a democracy gets its vitality. Thus, as Westin has observed, "Just as a social balance favoring disclosure and surveillance over privacy is a functional necessity for totalitarian systems, so a balance that ensures strong citadels of individual and group privacy and limits both disclosure and surveillance is a prerequisite for liberal democratic societies. The democratic society relies on publicity as a control over government, and on privacy as a shield for group and individual life." When Brandeis and Warren wrote their seminal article on privacy over one hundred years ago, their primary concern was with the social pressure caused by excessive exposure to public scrutiny of the private affairs of individuals. The problem for them was the popular press, which represented the "monolithic, impersonal and value-free forces of modern society," 14 undermining the traditional values of rural society, which had been nurtured and protected by local institutions such as family, church and other associations. The exposure of the affairs of the well-bred to the curiosity of the masses, Brandeis and Warren feared, had a leveling effect which undermined what was noble and virtuous in society, replacing it with the base and the trivial. Even apparently harmless gossip, when widely and persistently circulated, is potent for evil. It both belittles and perverts. It belittles by inverting the relative importance of things, thus dwarfing the thoughts and aspirations of a people. When personal gossip attains the dignity of print, and crowds the space available for matters of real interest to the community, what wonder that the ignorant and thoughtless mistake its relative importance.... Triviality destroys at once robustness of thought and delicacy of feeling. No enthusiasm can flourish, no generous impulse can survive under its blighting influence. For Brandeis and Warren, privacy was a means of protecting the freedom of the virtuous to maintain their values against the corrupting influence of the mass media that catered to people's basest instincts. Although the degrading effect of the mass media is still a problem, today a more serious threat to freedom comes from governments and other large institutions. Over the last century, governments have developed sophisticated methods of surveillance as a means of controlling their subjects. 21 CMSDL Core Files 2015-2016 2AC Racial Profiling Advantage—Stingray Profiles Modern surveillance, including StingRay, is used to discriminate against and segregate minorities and repress dissidence. It is a part of a larger structure of racial injustice in America, and must be fought against. Cyril 2015 (Malika Amala Cyril for The Progressive. “Black America’s State of Surveillance” Online http://www.progressive.org/news/2015/03/188074/blackamericas-state-surveillance) It’s time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance. We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass.In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent.The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime. […] In a racially discriminatory criminal justice system, surveillance technologies reproduce injustice. Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander calls the “New Jim Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms, and conditions of confinement that operate more as a system of social control by racial hierarchy than as crime prevention or punishment. In New York City, the predictive policing approach in use is “Broken Windows.” This approach to policing places an undue focus on quality of life crimes— like selling loose cigarettes, the kind of offense for which Eric Garner was choked to death. Without oversight, accountability, transparency, or rights, predictive policing is just high-tech racial profiling— indiscriminate data collection that drives discriminatory policing practices. As local law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to listen in on specific conversations on and offline; to observe daily movements of individuals and groups; and to observe data trends. Police departments like Bratton’s aim to use sophisticated technologies to do all three.They will use technologies like license plate readers, which the Electronic Frontier Foundation found to be disproportionately used in communities of color and communities in the process of being gentrified. They will use facial recognition, biometric scanning software, which the FBI has now rolled out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body and dashboard cameras, which have been touted as an effective step toward accountability based on the results of one study, yet storage and archiving procedures, among many They will use Stingray cellphone interceptors. According to the ACLU, Stingray technology is an invasive cellphone surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information. When used to track a suspect’s cellphone, they also gather information about the phones of countless bystanders who happen to be nearby.The same is true of domestic drones, which are in increasing use by U.S. law enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone manufacturers are considering arming these remote-controlled aircraft with weapons like rubber bullets, tasers, and tear gas.They will use fusion centers. Originally designed to increase interagency collaboration for the purposes of counterterrorism, these have instead become the local arm of the intelligence community. According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse for increasingly used “suspicious activity reports”—described as “official documentation of observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity.” These reports and other collected data are often stored in massive databases like e-Verify and Prism. As anybody who’s ever dealt with gang databases knows, it’s other issues, remain unclear. almost impossible to get off a federal or state database, even when the data collected is incorrect or no longer true.Predictive policing doesn’t just lead to racial and religious profiling—it relies on it. Just as stop and frisk legitimized an initial, unwarranted contact between police and people of color, almost 90 percent of whom turn out to be innocent of any crime, suspicious activities reporting and the dragnet approach of fusion centers target communities of color. One review of such reports collected in Los Angeles shows approximately 75 percent were of people of color.This is the future of policing in America, and it should terrify you as much as it terrifies me. Unfortunately, it probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially those reporting on the issue in the media or advocating in the halls of power.One of the most terrifying aspects of high-tech surveillance is the invisibility of those it disproportionately impacts.The NSA and FBI have engaged local law enforcement agencies and electronic surveillance technologies to spy on Muslims living in the United States. […].But by far, the widest net is cast over black communities. Black people alone represent 40 percent of those incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as evidence of greater criminality, a 2012 study confirms that black defendants are at least 30 percent more likely to be imprisoned than whites for the same crime.This is not a broken system, it is a system working perfectly as intended, to the detriment of all. The NSA could not have spied on millions of cellphones if it were not already spying on black people, Muslims, and migrants.As surveillance technologies are increasingly adopted and integrated by law enforcement agencies today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in the context of structural racism.Reporters love to tell the technology story. For some, it’s a sexier read. To me, freedom from repression and racism is far sexier than the newest gadget used to reinforce racial hierarchy. As civil rights protections catch up with the technological terrain, reporting needs to catch up, too. Many journalists still focus their reporting on the technological trends and not the racial hierarchies that these trends are enforcing. Martin Luther King Jr. once said, “Everything we see is a shadow cast by that which we do not see.” Journalists have an obligation to tell the stories that are hidden from view.We are living in an incredible time, when migrant activists have blocked deportation buses, and a movement for black lives has emerged, and when women, queer, and trans experiences have been placed right at the center. The decentralized power of the Internet makes that possible.But the Internet also makes possible the high-tech surveillance that threatens to drive structural racism in the twenty-first century. We can help black lives matter by ensuring that technology is not used to cement a racial hierarchy that leaves too many people like me dead or in jail. Our communities need partners, not gatekeepers. 22 CMSDL Core Files 2015-2016 2AC Racial Profiling Advantage—Impacts We have a moral obligation to stop racial profiling- it is dehumanizing and prevents justice from being served. U.S. DOJ 2003 (Department of Justice “Fact Sheet on Racial Profiling” Online http://www.justice.gov/archive/opa/pr/2003/June/racial_profiling_fact_sheet.pdf) Racial profiling sends the dehumanizing message to our citizens that they are judged by the color of their skin and harms the criminal justice system by eviscerating the trust that is necessary if law enforcement is to effectively protect our communities.America Has a Moral Obligation to Prohibit Racial Profiling. Race-based assumptions in law enforcement perpetuate negative racial stereotypes that are harmful to our diverse democracy, and materially impair our efforts to maintain a fair and just society. As Attorney General John Ashcroft said, racial profiling creates a "lose-lose" situation because it destroys the potential for underlying trust that "should support the administration of justice as a societal objective, not just as a law enforcement objective." The Overwhelming Majority of Federal Law Enforcement Officers Perform Their Jobs with Dedication, Fairness and Honor, But Any Instance of Racial Profiling by a Few Damages Our Criminal Justice System. The vast majority of federal law enforcement officers are hard-working public servants who perform a dangerous job with dedication,fairness and honor. However, when law enforcement practices are perceived to be biased or unfair, the general public, and especially minority communities, are less willing to trust and confide in officers, report crimes, be witnesses at trials, or serve on juries. Racial Profiling Is Discrimination, and It Taints the Entire Criminal Justice System.Racial profiling rests on the erroneous assumption that any particular individual of one race or ethnicity is more likely to engage in misconduct than any particular individual of other races orethnicities. Racial profiling destroys community trust in police, which is essential to public safety. Natarajan 2014 (Ranjana Natarajan for Washington Post “Racial Profiling Has Destroyed Public Trust In Police” Online http://www.washingtonpost.com/posteverything/wp/2014/12/15/racial-profiling-has-destroyed-public-trust-in-police-cops-are-exploiting-our-weak-lawsagainst-it/) Profiling undermines public safety and strains police-community trust. When law enforcement officers target residents based on race, religion or national origin rather than behavior, crimefighting is less effective and community distrust of police grows. A study of the Los Angeles Police Departmentshowed that minority communities that had been unfairly targeted in the past continue to experience greater mistrust and fear of police officers. To root out this ineffective tactic that undermines public confidence, we need stronger policies against racial profiling at all levels — from local to federal — as well as more effective training and oversight of police officers, and systems of accountability. Racism makes all forms of violence inevitable. National Security Letters are only one part of a racist justice system, but we must reject anything that contributes to racism Memmi 2k MEMMI Professor Emeritus of Sociology @ Unv. Of Paris Albert-; RACISM, translated by Steve Martinot, pp.163-165 The struggle against racism will be long, difficult, without intermission, without remission, probably never achieved, yet for this very reason, it is a struggle to be undertaken without surcease and without concessions. One cannot be indulgent toward racism. One cannot even let the monster in the house, especially not in a mask. To give it merely a foothold means to augment the bestial part in us and in other people which is to diminish what is human. To accept the racist universe to the slightest degree is to endorse fear, injustice, and violence. It is to accept the persistence of the dark history in which we still largely live. It is to agree that the outsider will always be a possible victim (and which [person] man is not [themself] himself an outsider relative to someone else?). Racism illustrates in sum, the inevitable negativity of the condition of the dominated; that is it illuminates in a certain sense the entire human condition. The anti-racist struggle, difficult though it is, and always in question, is nevertheless one of the prologues to the ultimate passage from animality to humanity. In that sense, we cannot fail to rise to the racist challenge. However, it remains true that one’s moral conduct only emerges from a choice: one has to want it. It is a choice among other choices, and always debatable in its foundations and its consequences. Let us say, broadly speaking, that the choice to conduct oneself morally is the condition for the establishment of a human order for which racism is the very negation. This is almost a redundancy. One cannot found a moral order, let alone a legislative order, on racism because racism signifies the exclusion of the other and his or her subjection to violence and domination. From an ethical point of view, if one can deploy a little religious language, racism is “the truly capital sin.”fn22 It is not an accident that almost all of humanity’s spiritual traditions counsel respect for the weak, for orphans, widows, or strangers. It is not just a question of theoretical counsel respect for the weak, for orphans, widows or strangers. It is not just a question of theoretical morality and disinterested commandments. Such unanimity in the safeguarding of the other suggests the real utility of such sentiments. All things considered, we have an interest in banishing injustice, because injustice engenders violence and death. Of course, this is debatable. There are those who think that if one is strong enough, the assault on and oppression of others is permissible. But no one is ever sure of remaining the strongest. One day, perhaps, the roles will be reversed. All unjust society contains within itself the seeds of its own death. It is probably smarter to treat others with respect so that they treat you with respect. “Recall,” says the bible, “that you were once a stranger in Egypt,” which means both 23 CMSDL Core Files 2015-2016 that you ought to respect the stranger because you were a stranger yourself and that you risk becoming once again someday . It is an ethical and a practical appeal – indeed, it is a contract, however implicit it might be. In short, the refusal of racism is the condition for all theoretical and practical morality. Because, in the end, the ethical choice commands the political choice. A just society must be a society accepted by all. If this contractual principle is not accepted, then only conflict, violence, and destruction will be our lot. If it is accepted, we can hope someday to live in peace. True, it is a wager, but the stakes are irresistible. 24 CMSDL Core Files 2015-2016 2AC Extensions – Solvency (Banning StingRay Solves) Federal law enforcement agencies use StingRay to search and seize cell phone data without court oversight. This type of surveillance is very intrusive, and unless we intervene, the government will continue to violate our rights. ACLU 2014 (“StingRays: The Most Common Surveillance Tool the Government Won’t Tell You About” Online https://www.aclunc.org/sites/default/files/StingRays_The_Most_Common_Surveillance_Tool_the_Govt_Won%27t_Tell_You_About.pdf) Federal, state, and local law enforcement agencies have been using IMSI catchers to engage in dragnet searches and seizures of information from cell phones without disclosing this use to the courts or criminal defendants. By shrouding this technology in secrecy, the government has succeeded in deploying a highly intrusive form of surveillance . In cases where the government may have used an IMSI catcher, vigorous advocacy is necessary to obtain full discovery and suppression of tainted evidence. Unless criminal defense attorneys pursue these issues aggressively, the government will continue to write its own rules for conducting surveillance, without the benefit of court oversight or an adversarial process. 25 CMSDL Core Files 2015-2016 2AC Solvency—FCC Good The FCC has technical expertise in regulating telecommunications networks to protect privacy Genachowski 2011 (Julius Genachowski, FCC commissioner. Testimony: INTERNET PRIVACY: THE VIEWS OF THE FTC, THE FCC, AND NTIA JOINT HEARING BEFORE THE SUBCOMMITTEE ON COMMERCE, MANUFACTURING, AND TRADE AND THE SUBCOMMITTEE ON COMMUNICATIONS AND TECHNOLOGY OF THE COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES, 7/14/11. http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg72908/pdf/CHRG112hhrg72908.pdf) technology can and must be part of the solution. I continue to encourage industry to take this very seriously, to use its expertise to as the government’s expert agency on broadband and communications networks with a long history of taking commonsense steps to protect consumer privacy, the FCC has an important role to play going forward. Our network-focused privacy and data security rules are settled and legally tested. Now, empower consumers, provide transparency, and protect data. And FCC Chair Tom Wheeler is willing to defy the interests of the industries the FCC regulates Reardon 2015 (Marguerite Reardon, CNET News reporter, “Net Fix: Why FCC's Wheeler is 'defying the greatest lobbyists in the world', http://www.cnet.com/news/why-fccs-wheeler-is-defying-the-greatest-lobbyists-in-the-world/) Net neutrality advocates, initially wary of Wheeler because of his past association with the industries he regulates, now applaud his leadership. Reed Hastings, CEO of the Netflix video-streaming service, likens Wheeler's stance to the one taken by business mogul Joseph Kennedy Sr. in 1934, when he was tasked with regulating Wall Street for the first time as chairman of the newly formed Securities and Exchange Commission. "Chairman Wheeler is on the edge of making history by defying the greatest lobbyists in the world -- from the telco and cable industry -- to secure an open and fast Internet for all Americans," Hastings said. "You have to go back to Joseph Kennedy Sr. running the SEC to find as surprising and courageous an example of policy leadership given the person's prior background." The once-powerful advocate for the cable and wireless companies has rocked his former employers on their heels. 26 CMSDL Core Files 2015-2016 2AC Answers to: FCC Can’t Decertify They have everything they need—corporate lies in emails give FCC ability to decertify Ars Technica, 2014 “New e-mail shows “stingray” maker may have lied to FCC back in 2010,” September 17th, 2014 (http://arstechnica.com/tech-policy/2014/09/new-e-mail-shows-stingray-maker-may-have-lied-to-fcc-back-in-2010/) A newly published e-mail from 2010 shows that Harris Corporation, one of the best-known makers of cellular surveillance systems, told the Federal Communications Commission (FCC) that its purpose "is only to provide state/local law enforcement officials with authority to utilize this equipment in emergency situations." That e-mail was among 27 pages of e-mails that were part of the company’s application to get FCC authorization to sell the device in the United States. Neither the FCC nor Harris Corporation immediately responded to Ars’ request for comment, and Harris traditionally stays mum on its operations. "We do not comment on solutions we may or may not provide to classified Department of Defense or law enforcement agencies," Jim Burke, a spokesman for Harris, told Ars last month. If Harris has misrepresented how the devices are used as part of law enforcement operations, then it would mark another controversial moment in the company's shrouded history. In recent months, more information has come out about how stingrays have been used in violent crime investigations, including instances where cops have lied to courts about the use of such technology. Relatively little is known about how stingrays are precisely used by law enforcement agencies nationwide, although documents have surfaced showing how they have been purchased and used in some limited instances. Last year, Ars reported on leaked documents showing the existence of a body-worn stingray. In 2010, Kristin Paget famously demonstrated a homemade device built for just $1,500. Fightin' words In a five-page letter by the American Civil Liberties Union (ACLU) to FCC Chairman Tom Wheeler, the group indicated that Harris has not been totally honest with the agency as to how the then "Sting Fish," and presumably subsequent devices like the newer StingRay, TriggerFish, and HailStorm, were to be used by American law enforcement. While StingRay is a trademark of Harris, stingray has come to be known as the generic term that describes all such devices. "Contrary to Harris’ claim, we now know—and Harris should have also been well-aware at the time— that state and local law enforcement agencies were using devices in the StingRay line of surveillance products for purposes other than emergency situations long before 2010, and continued to do so after," the letter states. "To the extent the Commission relied on this representation in the authorization and licensing process, its reliance is misplaced since the representation is clearly inaccurate." 27 CMSDL Core Files 2015-2016 2AC Answers to: Terror Disadvantage Most terrorist plots are foiled by traditional law enforcement methods, not cell phone tracking. Bergen and Sterman 2013 (Peter Bergen and David Sterman for CNN “Did NSA Spying Prevent ‘Dozens’ of Terrorist Attacks?” Online http://www.cnn.com/2013/06/17/opinion/bergen-nsa-spying/) On Thursday, Sens. Ron Wyden and Mark Udall, Democrats who both serve on the Senate Select Committee on Intelligence and have access to the nation's most sensitive secrets, released a statement contradicting this assertion. "Gen. Alexander's testimony yesterday suggested that the NSA's bulk phone records collection program helped thwart 'dozens' of terrorist attacks, but all of the plots that he mentioned appear to have been identified using other collection methods," the two senators said.Indeed, a survey of court documents and media accounts of all the jihadist terrorist plots in the United States since 9/11 by the New America Foundation shows that traditional law enforcement methods have overwhelmingly played the most significant role in foiling terrorist attacks .This suggests that the NSA surveillance programs are wide-ranging fishing expeditions with little to show for them .Alexander promised during his congressional testimony that during this coming week more information would be forthcoming about how the NSA surveillance programs have prevented many attacks.A U.S. intelligence document provided to CNN by a congressional source over the weekend asserts that the dragnetof U.S. phone data and Internet information from overseas users "has contributed to the disruption of dozens of potential terrorist plots surveillance yielded little of major value to prevent numerous attacks in the United States, but government officials may be able to point to here in the homeland and in more than 20 countries around the world."The public record, which is quite rich when it comes to jihadist terrorism cases, suggests that the NSA a number of attacks that were averted overseas.That may not do much to dampen down the political firestorm that has gathered around the NSA surveillance programs. After all, these have been justified because they have supposedly helped to keep Americans safe at home.Homegrown jihadist extremists have mounted 42 plots to conduct attacks within the United States since 2001 . Of those plots, nine involved an actual terrorist act that was not prevented by any type of government action, such as the failed attempt by Faisal Shahzad to blow up a car bomb in Times Square on May 1, 2010.Of the remaining 33 plots, the public record shows that at least 29 were uncovered by traditional law enforcement methods, such as the use of informants, reliance on community tips about suspicious activity and other standard policing practices. Mass data collection like what StingRay is capable of does not keep us safe Levinson-Waldman 2013 (Rachel Levinson-Waldman for New Republic “Against Our Values – And Bad at Keeping Us Safe” Online http://www.newrepublic.com/article/113416/nsa-spying-scandal-data-mining-isnt-good-keeping-us-safe)There are, needless to say, significant privacy and civilliberties concerns here. But there’s another major problem, too: This kind of dragnet-style data capture simply doesn’t keep us safe.First, intelligence and law enforcement agencies are increasingly drowning in data; the more that comes in, the harder it is to stay afloat. Most recently, the failure of the intelligence community to intercept the 2009 “underwear bomber” was blamed in large part on a surfeit of information: according to an official White House review, a significant amount of critical information was “embedded in a large volume of other data.” Similarly, the independent investigation of the alleged shootings by U.S. Army Major Nidal Hasan at Fort Hood concluded that the “crushing volume” of information was one of the factors that hampered the FBI’s analysis before the attack.Multiple security officials have echoed this assessment. As one veteran CIA agenttold The Washington Post in 2010, “The problem is that the system is clogged with information. Most of it isn't of interest, but people are afraid not to put it in.” A former Department of Homeland Security official told a Senate subcommittee that there was “a lot of data clogging the system with no value.” Even former Defense Secretary Robert Gates acknowledged that “we’ve built tremendous capability, but do we have more than we need?” And the NSA itself was brought to a grinding halt before 9/11 by the “torrent of data” pouring into the system, leaving the agency “brain-dead” for half a week and “[unable] to process information,” as its then-director Gen. Michael Hayden publicly acknowledged. Big data collection and mass surveillance will only make it harder for us to prevent crime and other disasters; it is near impossible for law enforcement to effectively sort through the data. WashingtonsBlog 2015 (“NSA Admits It Collects Too Much Information to Stop Terrorist Attacks” Online http://www.washingtonsblog.com/2015/05/nsaadmits-it-collects-too-much-info-to-stop-terror-attacks.html) Top security experts agree that mass surveillance is ineffective … and actually makes us MORE vulnerable to terrorism.For example, the former head of the NSA’s global intelligence gathering operations – Bill Binney – says that the mass surveillance INTERFERES with the government’s ability to catch bad guys, and that the government failed to stop 9/11, the Boston Bombing, the Texas shootings and other terror attacks is because it was overwhelmed with data from mass surveillance on Americans.Binney told Washington’s Blog:A good deal of the Too much data and too many people for the 10-20 thousand analysts to follow. Simple as that. Especially when they make word match pulls (like Google) and get dumps of data selected from close to 4 billion people.This is failure is, in my opinion, due to bulk data. So, I am calling all these attacks a result of “Data bulk failure.” the same problem NSA had before 9/11. They had data that could have prevented 9/11 but did not know they had it in their data bases. This back then when the bulk collection was not going on. Now the problem is orders of magnitude greater. Result, it’s harder to succeed.Expect more of the same from our deluded government that thinks more data improves possibilities of success. All this bulk data collection and storage does give law enforcement a great capability to retroactively analyze anyone they want. But, of course,that data cannot be used in court since it was not acquired with a warrant.Binney and other high-level NSA whistleblowers noted last year:On December 26, for example, The Wall Street Journal published a lengthy front-page article, quoting NSA’s former Senior Technical Director William Binney (undersigned) and former chief of NSA’s SIGINT Automation Research Center Edward Loomis (undersigned) warning that NSA is drowning in useless data lacking adequate privacy provisions, to the point where it cannot conduct effective terrorist-related surveillance and analysis.A recently disclosed internal NSA briefing document corroborates the drowning, with the embarrassing admission, in bureaucratize, that NSA collection has been “outpacing” NSA’s ability to ingest, process, and store data – let alone analyze the take.Indeed, the pro-spying NSA chief and NSA technicians admitted that the NSA was drowning in too much data 3 months before 9/11:In an interview, Air Force Lt. Gen. Michael Hayden, the NSA’s the sheer volume and variety of today’s communications means “there’s simply too much out there, and it’s too hard to understand. director … suggested that access isn’t the problem. Rather, he said, 28 CMSDL Core Files 2015-2016 2AC Answers to Crime Disadvantage Not only are they used to spy on innocent civilians, StingRay devices allow actual criminals to walk free- law enforcement has been releasing criminals to avoid disclosing secrets about StingRay because of non-disclosure agreements. Banning StingRay devices would allow law enforcement to do their jobs without compromising citizen privacy or safety. Upriser 2014 (“FBI Lets Criminals Walk to Avoid Revealing This Secret Cell Phone Spying System Used by All Police” Online http://upriser.com/posts/the-fbichoosing-to-let-criminals-free-rather-than-reveal-stingray-secrets) FBI just let another criminal walk rather than give details of their cell phone spying system "Stingray " -- a system is used by local police, shockingly to locate and spy on criminal suspects all over the United States. However, they would apparently rather let suspects go free than reveal in court the details of the high tech tracker. This device, called a "Stingray," tricks cell phones into revealing their locations. Closely guarded details about how police Stingrays operate have been threatened this week by a judge's court order. The federal government has been using these devices since at least 1995. Judge Patrick H. NeMoyer in Buffalo, New York, described a 2012 deal between the FBI and the Erie County Sheriff's Office in his court order Tuesday. The judge, who reviewed the deal, said the FBI instructed the police to drop criminal charges instead of revealing "any information concerning the cell site simulator or its use." Erie police had long tried to keep that contract secret, but the judge rejected that idea and ordered that details of the Stingrays be made public. "If that is not an instruction that affects the public, nothing is," NeMoyer wrote. The judge's order also noted that Erie police had used Stingrays to track down several criminal suspects, a suicidal person and four missing people, including an 87-year-old with dementia. Police spokesman Scott Zylka said they're now working with the FBI to appeal the judge's decision and keep the FBI agreement secret. ACLU is demanding details about Stingray use under public records laws. Few people know Stingrays even exist — or that federal agents and police across the country are increasingly using them to arrest people. It's a small device that mimics a cell phone tower, duping nearby cell phones into connecting to it rather than a real phone company tower. There's a growing privacy concern because while police use the Stingrays to track down an individual, they can potentially grab text messages and phone call data on thousands of innocent people. In November, we learned that federal agents regularly fly planes nationwide that spy on Americans' phone calls. We also know police in at least 20 states use Stingrays, according to public records obtained by the American Civil Liberties Union. But everything else is a mystery because police agencies have non-disclosure agreements with the maker of Stingrays: the Harris Corporation based in Melbourne, Florida. They also have similar hush-hush contracts with the FBI. There have been several examples of prosecutors dropping charges to keep quiet about Stingrays. Late last year, Tallahassee police gave a sweet plea deal to a pot dealer who robbed someone with a BB gun. A felony charge with a four-year prison sentence became a misdemeanor with six-months' probation because his defense attorney discovered police used a Stingray to locate him. Hanni Fakhoury, an attorney with the pro-privacy Electronic Frontier Foundation, said Tuesday's court order was the first time it became clear that the use of Stingrays is a nationwide tactic. "We've long suspected that's the policy, but now we know," he said. "It's crazy on a billion legal levels." The lead ACLU attorney on this case, Mariko Hirose, described Stingrays as military grade equipment that has no place being used on unsuspecting American citizens. She also said that the FBI's tactic to stay quiet about Stingrays makes little sense. Erie County spent more than $350,000 to buy two Stingray devices and related training and equipment. "Why are municipalities spending so much money when they might have to drop the charges in the name of secrecy?" she asked. All of this raises the interesting question of won't all criminal lawyers now demand Stingray records on their client as a matter of course? The ACLU put out a pamphlet for defense attorneys for exactly this reason. It seems that if the authorities are obtaining their evidence illegally, then it should be challenged. Another very interesting detail about StingRays also recently came to light. Stingrays make it temporarily impossible for anyone nearby to make a cell phone call. “Its use has the potential to intermittently disrupt cellular service to a small fraction of Sprint's wireless customers within its immediate vicinity,” FBI Special Agent Michael Scimeca wrote in his explanation about the StingRay's capability to a judge. “Any potential service disruption will be brief and minimized by reasonably limiting the scope and duration of the use of the Mobile Equipment.” Until now, authorities have maintained that the StingRay doesn't intercept 911 emergency calls. Yet this disclosure raises the notion that the StingRay prohibits other emergency calls in favor of investigations ranging from murder to minor theft. Additionally, the surveillance device also jams 3G and 4G networks. “Depending on how long the jamming is taking place, there's going to be disruption,” ACLU chief technologist Chris Soghoian told Wired magazine. “When your phone goes down to 2G, your data just goes to hell. So at the very least you will have disruption of Internet connectivity. And if and when the phones are using the StingRay as their only tower, there will likely be an inability to receive or make calls.” 29 CMSDL Core Files 2015-2016 *** Stingray Negative 30 CMSDL Core Files 2015-2016 1NC ANSWERS TO: Democracy Advantage Our rights are not at risk. Department of Justice now requires warrants for use of Stingray devices Ars Technica, 2015 http://arstechnica.com/tech-policy/2015/09/fbi-dea-and-others-will-now-have-to-get-a-warrant-touse-stingrays/, September 3 The Department of Justice (DOJ) announced sweeping new rules Thursday concerning the use of cellsite simulators, often called stingrays, mandating that federal agents must now obtain a warrant in most circumstances. The policy, which takes effect immediately, applies to its agencies, including the FBI, the Bureau of Alcohol, Tobacco and Firearms (ATF), the Drug Enforcement Administration, and the United States Marshals Service, among others. "Cell-site simulator technology has been instrumental in aiding law enforcement in a broad array of investigations, including kidnappings, fugitive investigations and complicated narcotics cases," Deputy Attorney General Sally Quillian Yates said in a statement. "This new policy ensures our protocols for this technology are consistent, well-managed and respectful of individuals’ privacy and civil liberties." The move comes after federal agencies, most notably the FBI, have tried to tightly control information about stingrays for years. The FBI and the Harris Corporation, one of the primary manufacturers of the devices, have refused to answer specifics questions from Ars. Not only can stingrays be used to determine location by spoofing a cell tower, but they can also be used to intercept calls and text messages. Once deployed, the devices intercept data from a target phone as well as information from other phones within the vicinity. For years, federal and local law enforcement have tried to keep their existence a secret while simultaneously upgrading their capabilities. Over the last year, as the devices have come under increased scrutiny, new information about the secretive devices has come to light. Ars has previously reported that while stingrays have been used at the local level for serious violent crimes, they have also been used to investigate ATM robberies, and 911 hangups. In 2015, federal authorities have shown a willingness to open up a little about the technology, although the FBI declared in January that it has a right to use the devices in public without a warrant. Moving forward In addition to imposing a new warrant requirement, the new seven-page document also requires that DOJ officials are to delete data of non-target phones that is collected by accident, and annually report how often stingrays are used. Stingray devices aren’t a serious threat to innocent people because they release non-target devices Zetter, 2015 (Kim Zetter, award-winning senior staff reporter at Wired covering cybercrime, privacy, and security http://www.wired.com/2015/03/feds-admitstingrays-can-disrupt-cell-service-bystanders/) Although Scimeca disclosed to the magistrate that the equipment could disrupt phone service, he didn’t elaborate about how the disruption might occur. Experts once the stingray obtains the unique ID of a device, it releases it so that it can connect to a legitimate cell tower, allowing data and voice calls to go through. suspect it has something to do with the “catch-and-release” way stingrays work. For example, “As each phone tries to connect, [the stingray] will say, ‘I’m really busy right now so go use a different tower. So rather than catching the phone, it will release it,” says Chris Soghoian, chief technologist for the ACLU. “The moment it tries to connect, [the stingray] can reject every single phone” that is not the target phone. 31 CMSDL Core Files 2015-2016 1NC ANSWERS TO: Racial Profiling Advantage Racist surveillance by the government and corporations is inevitable and has happened throughout our history – people of color don’t trust or want the privacy rights the affirmative talks about Cyril ’15 Cyril, Malkia A.- Malkia Amala Cyril is founder and executive director of the Center for Media Justice (CMJ) and co-founder of the Media Action Grassroots Network, a national network of 175 organizations working to ensure media access, rights, and representation for marginalized communities. April 15 2015 “Black America’s State of Surveillance” http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance. July 7, 2015 Today, media reporting on government surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to laws that deputized white civilians as enforcers of Jim Crow, black people and other people of color have lived for centuries with surveillance practices aimed at maintaining a racial hierarchy. It’s time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance. We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass. In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime. For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. National security is more important to democracy than personal privacy; getting rid of National Security Letters would be getting rid of an important tool for fighting terrorism. Debatewise No Date (“Privacy vs. Security: Yes Points” Online http://debatewise.org/debates/3040-privacy-vs-security/#) The most important job of government is to “secure the general welfare” of its citizens. Security is a common good that is promised to all Americans, and it must outweigh any personal concerns about privacy. The word “privacy” is not found in the US Constitution so it cannot be claimed as a fundamental right. Surveillance is the secret watching of suspects’ private activities. In the past this usually involved following people, or going through their trash. These days it is mostly electronic, with the police and intelligence agencies listening into private phone conversations or reading emails (wiretapping). Surveillance can also involve looking at bank account details to see where money comes and goes. All these are vital tools for tracking the actions of terrorists when they are planning attacks. The government cannot stand by and wait until criminal acts are carried out: it must stop attacks before they happen. 32 CMSDL Core Files 2015-2016 1NC Answers to: Solvency No solvency – the Federal Communications Commission has no authority over Stingray devices Law 360, 2015 “FCC Says It Doesn't Control 'StingRay' Cellphone Tracking,” April 29th, 2015 (http://www.law360.com/articles/649460/fcc-says-it-doesn-t-control-stingray-cellphone-tracking) In a letter released by the U.S.Federal Communications Commission on Tuesday, Chairman Tom Wheeler told a U.S. senator that the agency has essentially no authority over state and local law enforcement agencies’ use of cellphone tracking devices known as “StingRays.” Wheeler’s response to an inquiry by Sen. Bill Nelson, D-Fla., confirmed that the FCC’s certification of the devices manufactured by Harris Corp. was contingent upon the conditions that they only be sold to law enforcement officials and that state and local agencies must coordinate their use of StingRays and other “International Mobile Subscriber Identity catchers” with the FBI, but revealed the limitations of the FCC’s involvement. “The commission has no information about the extent to which or conditions under which law enforcement has obtained authority to use the devices,” Wheeler said. In February, Nelson pointed to a Washington Post article that detailed local police departments’ use of StingRays to collect data on phone calls, and asked the FCC to clarify its certification process and oversight of the devices . Banning Stingray devices won’t work. The people who would enforce the ban don’t know enough about technology to effectively keep them from operating. Assange et. al, 2012 (Julian, editor-in-chief of WikiLeaks. Andy Muller-Maguhn, specialist on computers, telecommunications, and surveillance. Jacob Appelbaum, computer security researcher. Jeremie Zimmerman, co-founder and spokesperson for the citizen advocacy group La Quadrature du Net. Conversation in the book “Cypherpunks: Freedom and the Future of the Internet,” chapter titled “The Militarization of Cyberspace”) democratic states within Europe are massively buying machines that allow them to act exactly outside the law in regard to interception because they don’t need a court decision, they can just switch it on and do it, and this technology can’t be controlled. JULIAN: But are there two approaches to dealing with mass state surveillance: the laws of physics; and the laws of man? One is to use the laws of physics by actually building devices that prevent interception. The other is to enact democratic controls through the law to make sure people must have warrants and so on and to try to gain some regulatory accountability. But strategic interception cannot be a part of that, cannot be meaningfully constrained by regulation. Strategic interception is about intercepting everyone regardless of whether they are innocent or guilty. We must remember that it is the core of the Establishment carrying such surveillance. There will always be a lack of political will to expose state spying. And the technology is inherently so complex, and its use in practice so secret that there cannot be meaningful democratic oversight. ANDY: Or you spy on your own parliament. JULIAN: But those are excuses— the mafia and foreign intelligence— they are excuses that people will accept to erect such a system. JACOB: The Four Horsemen of the Info-pocalypse: child pornography, terrorism, money laundering, and The War on Some Drugs. JULIAN: Once you have erected this surveillance, given that it is complex, given that it is designed to operate in secret, isn’t it true that it cannot be regulated with policy? I think that except for very small nations like Iceland, unless there are revolutionary conditions it is simply not It is just not going to happen. It is too cheap and too easy to get around political accountability and to actually perform interception. The Swedes got through an interception bill in 2008, known as the FRA-lagen possible to control mass interception with legislation and policy. which meant the Swedish signals intelligence agency the FRA could legally intercept all communication travelling through the country in bulk, and ship it off to the United States, with some caveats. 48 Now how can you enforce those caveats once you’ve set up the interception system and the organization doing it is a secret spy agency? It’s impossible. And in fact cases have come out showing that the FRA had on a variety of occasions broken the law previously. Many countries simply do it off-law with no legislative cover at all. So we’re sort of lucky if, like in the Swedish example, they decided that for their own protection from prosecution they want to go legal by changing the law. And that’s the case for most countries— there is bulk interception occurring, and when there is a legislative proposal it is to protect the ass of those who are doing it. This technology is very complex; for example in the debate in Australia and the UK about proposed legislation to intercept all metadata, most people do not understand the value of metadata or even the word itself. 49 Intercepting all metadata means you have to build a system that physically intercepts all data and then throws everything but the metadata away. But such a system cannot be trusted. There’s no way to determine whether it is in fact intercepting and storing all data without having highly skilled engineers with authorization to go in and check out precisely what is going on, and there’s no political will to grant access. The problem is getting worse because complexity and secrecy are a toxic mix. Hidden by complexity. Hidden by secrecy. Unaccountability is built-in. It is a feature. It is dangerous by design. 33 CMSDL Core Files 2015-2016 2NC/1NR Extensions (Harms – Racial Profiling) – Racial Profiling is Inevitable Racial profiling is subconscious. The plan does nothing to address the cause, so it will continue even if the plan is in effect Stone 2010 (associate professor of social psychology at the University of Arizona, “Racist, prejudiced attitudes seep from our subconscious”, Arizona Daily Star http://tucson.com/news/opinion/racist-prejudiced-attitudes-seep-from-our-subconscious/article_dd243e21-c99a-55af-851b-ba004f549c91.html) The problem is that stereotyping, prejudice and discrimination are not entirely conscious and under our control. Research shows that people tend to use race and ethnicity when they interact with others without knowing it, and this leads to subconscious forms of racial and ethnic bias. There was a time in America when stereotyping, prejudice and discrimination against racial and ethnic minorities were conscious, deliberate and widely accepted. The Jim Crow laws that once characterized race relations promoted prejudice and discrimination in many of its most harmful forms. The Civil Rights Act ushered in new laws against institutionalized discrimination, and with them, new norms among Americans against expressing blatant hatred based on race and ethnicity. Today, Americans simply do not condone or tolerate racism or other forms of bias. Cities and organizations are boycotting Arizona because they believe that SB 1070 reintroduces explicit and deliberate forms of racism. Supporters of SB 1070 strongly deny this and vehemently claim that they are not racist. Supporters of SB 1070 live and work with people of Mexican, Hispanic or Latino descent every day. How can people be racist when they interact daily across racial and ethnic boundaries? Whereas the conscious rejection of racism is critical to maintaining the tight intergroup fabric of our community, it does not keep racial or ethnic biases from happening. Over the last decade, social psychologists have discovered that people who explicitly reject racism can also hold subconscious negative attitudes and stereotypes about racial and ethnic minorities. When these thoughts and feelings operate outside of awareness, people can express hate and discriminate without realizing it. Our brain has a leaky seal that drips hints of dislike when we interact with people who are racially or ethnically different from us. Many subconscious acts of discrimination are subtle, like avoiding eye contact when talking to someone, or avoiding physical contact like a handshake or placing money into a cashier's hand. In its worst form, subconscious bias leads people to refuse to let someone use the bathroom, make someone wait in line while helping other customers or dismiss an application for a job. Subconscious racial and ethnic biases also cause people to mistakenly decide that the tool or wallet in the hand of a minority individual is a gun. When playing a shooter-style video game, people are more likely to accidently shoot an unarmed black person than a white person. Some of these studies have been done with police officers who are trained to avoid making such mistakes because of racial profiling. 34 CMSDL Core Files 2015-2016 2NC/1NR Extensions to Harms (Democracy) – Stingray Abuses Under Check Now The plan is not needed because the FBI is already starting to address possible Stingray abuses Barrett 2015 (Devlin Barrett is a staff reporter for the Wall Street Journal http://www.wsj.com/article_email/u-s-will-change-stance-on-secret-phone-tracking1430696796-lMyQjAxMTI1NDA0MzEwNjMzWj) The Justice Department will start revealing more about the government’s use of secret cellphone tracking devices and has launched a wide-ranging review into how law-enforcement agencies deploy the technology, according to Justice officials. In recent months, the Federal Bureau of Investigation has begun getting search warrants from judges to use the devices, which hunt criminal suspects by locating their cellphones, the officials said. For years, FBI agents didn’t get warrants to use the tracking devices. Senior officials have also decided they must be more forthcoming about how and why the devices are used—although there isn’t yet agreement within the Justice Department about how much to reveal or how quickly. The plan is not needed because courts are already starting to address possible Stingray abuses Supreme Court of Florida 2014 (Written decision in Shawn Alvin Tracey v. State of Florida, 10/16/14, pages 44-45. http://www.floridasupremecourt.org/decisions/2014/sc11-2254.pdf For all the foregoing reasons, we conclude that Tracey had a subjective expectation of privacy in the location signals transmitted solely to enable the private and personal use of his cell phone, even on public roads, and that he did not voluntarily convey that information to the service provider for any purpose other than to enable use of his cell phone for its intended purpose. We arrive at this conclusion in part by engaging in the “normative inquiry” envisioned in Smith. See Smith, 442 U.S. at 740 n.5. There, the Supreme Court cautioned that where an individual’s subjective expectations have been “conditioned” by influences alien to the well-recognized Fourth Amendment freedoms, a normative inquiry may be necessary to align the individual’s expectations with the protections guaranteed in the Fourth Amendment. Moreover, we conclude that such a subjective expectation of privacy of location as signaled by one’s cell phone—even on public roads—is an expectation of privacy that society is now prepared to recognize as objectively reasonable under the Katz “reasonable expectation of privacy” test. See Katz, 389 U.S. at 361 (Harlan, J., concurring) (establishing the two-pronged “reasonable expectation of privacy” test). Therefore, we hold that regardless of Tracey’s location on public roads, the use of his cell site location information emanating from his cell phone in order to track him in real time was a search within the purview of the Fourth Amendment for which probable cause was required. Because probable cause did not support the search in this case, and no warrant based on probable cause authorized the use of Tracey’s real time cell site location information to track him, the evidence obtained as a result of that search was subject to suppression. States are Doing the Plan Now Ars Technica, 2015 “FBI says search warrants not needed to use “stingrays” in public places,” January 5th, 2015 (http://arstechnica.com/tech-policy/2015/01/fbi-says-search-warrants-not-needed-to-use-stringrays-in-public-places/) Hanni Fakhoury, an attorney for the Electronic Frontier Foundation, said some states and judges are pushing back against stingrays. "In Tacoma, judges now require police (to) specifically note they plan to use an IMSI catcher and promise not to store data collected from people who are not investigation targets," he said. "The Floridaand Massachusetts state supreme courts ruled warrants were necessary for real-time cell phone tracking. Nine states—Colorado, Illinois, Indiana, Maryland, Minnesota, Tennessee, Utah, Virginia, andWisconsin—passed laws specifically requiring police to use a warrant to track a cell phone in real time." 35 CMSDL Core Files 2015-2016 2NC/1NR Extensions TO: Solvency—Government will keep doing surveillance You can’t challenge the surveillance state, it works hard to protect itself Stanley 2013 (Jay Stanley, Senior Policy Analyst, Speech, Privacy & Technology Project, “How to Think About the National Security State,” American Civil Liberties Union, Free Future, 9—5—13, www.aclu.org/blog/how-think-about-national-security-state) 2) Perpetuation, protection, and expansion of self Like all life forms, bureaucracies seek to perpetuate themselves, and just as species seek to spread their genes, bureaucracies seek to expand their budgets, payrolls, powers, and domain, as political scientists have long noted. The FBI and NSA push for new surveillance powers such as the Patriot Act and the FISA Amendments Act. TSA seeks to expand its airport role into other areas of American life. Agencies relentlessly overdramatize the threat of cybersecurity in order to grab more power and By the same token, bureaucracies will generally do whatever it takes to protect their core interests and will rarely if ever be seen sacrificing themselves. Not for principle, or truth, or justice, or morality. bigger budgets. 36 CMSDL Core Files 2015-2016 2NC/1NR Extensions TO: Solvency—FCC Fails (Circumvention) The FCC will make it easy to get around the plan because they can’t say no to the wireless industry Alster 2015 (Norm Alster, Journalism Fellow with the Investigative Journalism Project at the Harvard University Center for Ethics. “Captured Agency How the Federal Communications Commission Is Dominated by the Industries It Presumably Regulates” http://ethics.harvard.edu/files/center-forethics/files/capturedagency_alster.pdf) Renee Sharp seemed proud to discuss her spring 2014 meeting with the Federal Communications Commission. As research director for the non-profit Environmental Working Group, Sharp doesn‘t get many chances to visit with the FCC. But on this occasion she was able to express her concerns that lax FCC standards on radiation from wireless technologies were especially hazardous for children. The FCC, however, should have little trouble dismissing those concerns. Arguing that current standards are more than sufficient and that children are at no elevated risk from microwave radiation, wireless industry lobbyists don‘t generally have to set up appointments months in advance. They are at the FCC‘s door night and day. Indeed, a former executive with the Cellular Telecommunications Industry Association (CTIA), the industry‘s main lobbying group, has boasted that the CTIA meets with FCC officials ―500 times a year.‖1 Sharp does not seem surprised. ―There‘s no question that the government has been under the influence of industry. The FCC is a captured agency ,‖ she said.2 Captured agency. That‘s a term that comes up time and time again with the FCC. Captured agencies are essentially controlled by the industries they are supposed to regulate. A detailed look at FCC actions—and non-actions—shows that over the years the FCC has granted the wireless industry pretty much what it has wanted. Until very recently it has also granted cable what it wants. More broadly, the FCC has again and again echoed the lobbying points of major technology interests. 37 CMSDL Core Files 2015-2016 Terror Disadvantage Links StingRay type surveillance is necessary. Banning it will destroy our ability to fight terrorism and protect our citizens. Sulmasy 2013 (Glenn Sulmasy 2013 for CNN “Why We Need Government Surveillance” Online http://www.cnn.com/2013/06/10/opinion/sulmasy-nsasnowden/) The current threat by al Qaeda and jihadists is one that requires aggressive intelligence collection and efforts . One has to look no further than the disruption of the New York City subway bombers (the one being touted by DNI Clapper) or the Boston Marathon bombers to know that the war on al Qaeda is coming home to us, to our citizens, to our students, to our streets and our subways.This 21st century war is different and requires new ways and methods of gathering information. As technology has increased, so has our ability to gather valuable, often actionable, intelligence. However, the move toward "home-grown" terror will necessarily require, by accident or purposefully, collections of U.S. citizens' conversations with potential overseas persons of interest.An open society, such as the United States, ironically needs to use this technology to protect itself. This truth is naturally uncomfortable for a country with a Constitution that prevents the federal government from conducting "unreasonable searches and seizures." American historical resistance towards such activities is a bedrock of our laws, policies and police procedures.But what might have been reasonable 10 years ago is not the same any longer. The constant armed struggle against the jihadists has adjusted our beliefs on what we think our government can, and must, do in order to protect its citizens.However, when we hear of programs such PRISM, or the Department of Justice getting phone records of scores of citizens without any signs of suspicious activities nor indications of probable cause that they might be involved in terrorist related activities, the American demand for privacy naturally emerges to challenge such "trolling" measures or data-mining.The executive branch, although particularly powerful in this arena, must ensure the Congress is kept abreast of activities such as these surveillance programs. The need for enhanced intelligence activities is a necessary part of the war on al Qaeda, but abuse can occur without ensuring the legislative branch has awareness of aggressive tactics such as these.Our Founding Fathers, aware of the need to have an energetic, vibrant executive branch in foreign affairs, still anticipated checks upon the presidency by the legislature. Working together, the two branches can ensure that both legally, and by policy, this is what the citizens desire of their government -- and that leaks such as Snowden's won't have the impact and damage that his leaks are likely to cause.As for Snowden, regardless of how any of us feel about the national security surveillance programs at issue, he must be extradited back to the U.S. for interviews and potential trial -- if for no other reason than to deter others from feeling emboldened to break the law in the same way in the future. Information we get from surveillance is vital to preventing terrorist plots, which are even more complex after 9/11. A ban would weaken our defenses. Hirsh 2013 [Michael Hirsh, chief correspondent, the National Journal, “The Next Bin Laden,” http://www.nationaljournal.com/magazine/the-next-bin-laden20131114, November 14 2013] Ever since the death of Osama bin Laden, President Obama and his senior lieutenants have been telling war-weary Americans that the end of the nation’s longest conflict is within sight. “Core al-Qaida is a shell of its former self,” Obama said in a speech in May. “This war, like all wars, must end.” That was the triumphal tone of last year’s reelection campaign, too.The truth is much grimmer. Intelligence officials and terrorism experts today believe that the death of bin Laden and the decimation of the Qaida “core” in Pakistan only set the stage for a rebirth of al-Qaida as a global threat. Its tactics have morphed into something more insidious and increasingly dangerous as safe havens multiply in war-torn or failed states—at exactly the moment we are talking about curtailing the National Security Agency’s monitoring capability. And the jihadist who many terrorism experts believe is alQaida’s new strategic mastermind, Abu Musab al-Suri (a nom de guerre that means “the Syrian”), has a diametrically different approach that emphasizes quantity over quality. The red-haired, blue-eyed former mechanical engineer was born in Aleppo in 1958 as Mustafa Setmariam Nasar; he has lived in France and Spain. Al-Suri is believed to have helped plan the 2004 train bombings in Madrid and the 2005 bombings in London—and has been called the “Clausewitz” of the new alQaida.Whereas bin Laden preached big dramatic acts directed by him and senior Qaida leaders, al-Suri urges the creation of self-generating cells of lone terrorists or small groups in his 1,600-page Internet manifesto. They are to keep up attacks, like multiplying fleas on a dog that finds itself endlessly distracted—and ultimately dysfunctional. (A classic Western book on guerrilla warfare called The War of the Flea reportedly influenced al-Suri.) The attacks are to culminate, he hopes, in acts using weapons of mass destruction.Recent terrorist attacks against U.S. targets, from the murderous 2009 spree of Army Maj. Nidal Malik Hasan at Fort Hood to the Boston Marathon bombings last year, suggest that al-Suri’s philosophy dominates al-Qaida’s newly flattened hierarchy. The late Yemeni-American imam Anwar alAwlaki, who preached this strategy and induced Hasan’s attack, is said to have developed his ideas from al-Suri’s. Meanwhile, with new refuges in North Africa, Syria, and Yemen, jihadists have much more territory from which to hatch plots unmolested.Yet the politics at home are changing as the threat abroad is growing. The revelations dribbled out by fugitive leaker Edward Snowden have outraged members of Congress and world leaders, including those of close allies such as Germany and France. They say they are aghast at American overreach. Writing in Der Spiegel, Snowden justified himself this way: “Instead of causing damage, the usefulness of the new public knowledge for society is now clear, because reforms to politics, supervision, and laws are being suggested.” Thanks to him, Congress will almost certainly rein in the National Security Agency’s data-trolling methods—though it’s not yet clear how much.But the agency’s opponents may not realize that the practice they most hope to stop—its seemingly indiscriminate scouring of phone data and emails—is precisely what intelligence officials say they need to detect the kinds of plots al-Suri favors. For the foreseeable future, al-Suri’s approach will mean more terrorist attacks against more targets—albeit with a much lower level of organization and competence. “It’s harder to track. Future attacks against the homeland will be less sophisticated and less lethal, but there’s just going to be more of them,” says Michael Hayden, the former NSA director who steered the agency after 9/11 toward deep dives into Internet and telephonic data. Adds Mike Rogers, chairman of the House Intelligence Committee, “I think al-Qaida’s capabilities for a strike into the United States are more dangerous and more numerous than before 9/11.” For better or worse, the only hope to track them all is an 38 CMSDL Core Files 2015-2016 exceptionally deep, organized, and free-ranging intelligence apparatus, experts say.Intelligence officials who are well briefed in the technical aspects of NSA surveillance also note that global communications are vastly more complex than they were as recently as 9/11, not just in terms of speed and bandwidth but also in the kinds of digital paths they can take. Messages can travel partly by air and partly by cable, for example, and the NSA must keep up. “If you take the diffuse physical environment [of more failed-state havens] and you layer that with the diffuse communications environment, and then you layer that with the diffuse ideological environment—more lone wolves, for example—that makes for a far more generally dangerous environment,” says a knowledgeable U.S. government official who asked to remain anonymous. All of which means that despite very legitimate questions about whether the National Security Agency is going beyond what the law and Constitution allow, Americans probably need the NSA now more than ever. Without Stingray style surveillance devices, terrorists will be able to remain anonymous Gamma Group 2011 (manufacturer of a Stingray style device. “3G-GSM Tactical Interception and Target Location” https://www.documentcloud.org/documents/810727-772-gamma-group-catalogue-3g-gsm-tactical.html) Cellular networks have created a haven for criminals and terrorists. Over GSM & 3G networks, criminals and terrorist can remain anonymous, able to continue illegal activities on a global scale without fear of action because: ● No Local Registration is required - criminals are able to use pre-paid SIM cards or foreign SIM cards without the need to supply any information ● Post-Paid Subscription Fraud - criminals are easily able to reprogram phones with a fake identity or use stolen phones and SIM cards. Although powerful Strategic/Countrywide surveillance monitoring tools are at the disposal of Law Enforcement Agencies, the ability to monitor specific criminals/targets critically requires having specific target identity data. In the case of cellular networks the fundamental information is the IMSI (unique identifier or serial number of the SIM) and the IMEI (unique identifier or serial number of the handset) The IMSI and IMEI is highly prized data, and to protect users it is not normally transmitted within cellular networks. However, if the data is obtained, then Law Enforcement Agencies have all they need to monitor Target(s). The challenge is how to overcome the protective security messages within cellular networks protecting their subscribers and covertly elicit specific target user data. Fortunately, to assist Law Enforcement Agencies we are able to offer solutions which these challenges. Tactical off-air solutions are available which are able to emulate the cellular network in order to: 1. Indentify & Locate GSM Target(s) Cell-phones can overcome Determine and locate the identity of a Target(s) GSM cell-phone by pretending to be the real network and tricking the phone to register accordingly. This process allows the unique identity of the phone (IMEI) and the SIM card (IMSI) to be covertly captured, and designated a Target to be precisely located. 2. Identify & Locate 3G Target(s) cell-phones Determine and locate the identity of a Target(s) 3G cell-phone by pretending to be the real network and tricking the phone to register accordingly. THis process allows the unique identity of the phone (IMEI) and the SIM card (IMSI) to be covertly captured, and designated Targets to be precisely located. 3. Intercept the Voice and SMS Communication of Designated Targets The communication of Target(s) under surveillance can be captured without their knowledge, including: ● all Voice calls & SMS either made or received by Target(s) ● spoof the identity of Target(s) to falsely send SMS or Voice calls ● divert Calls/SMS so they are not received by the Target(s) the ability to edit all SMS before they are received by the Target(s) 39 CMSDL Core Files 2015-2016 *** National Security Letters Affirmative 40 CMSDL Core Files 2015-2016 National Security Letters Summary National security letters are notices from the government to allow the FBI to gain access to information relevant to national security investigations. By law, they can’t access content (but can access phone records, numbers, etc.). There is a lot of controversy around them because they are used very frequently, and the FBI has been caught misusing them. Also, because there is no court oversight, some people feel that they have a high potential for abuse and are not constitutional. National Security Letters (NSLs) are one way that the government has to find out information about people. How does information about my activities get collected? Many of the things you do in your life involve interacting with a company that keeps a record of what you’ve been up to. Search for things online? The search company keeps track of it. Make a phone call or send a text? Your phone company has a record of it. Buy something at the grocery store? If you use one of those “rewards cards”, the store keeps a record of what you bought. Since so much of your life involves electronic communication, the companies that facilitate those communications have a lot of records about you. Why do these companies collect this information? Companies keep these records partly to provide you with better service, but mostly so they know what kinds of advertisements might work on you. What does the government want with this information? The government might want the information in order to find out if you’ve been doing anything illegal. They might want to know if you’ve been searching for how to build bombs or texting known criminals. Do the companies have to give information about me to the government? Yes. Section 505 of the USA PATRIOT Act allows the FBI to send an NSL to a company and order them to turn their records over to the FBI. Will the company tell me if they turn my information over to the government? Not usually. The law also allows the FBI to issue a “gag order” about the letter. This means that when a person at a company receive a NSL, they can’t tell anyone about it. Not the person whose information is being turned over. Not their coworkers. Not even their family. If they tell anyone about it, they could go to jail. Isn’t an NSL basically the same as a search warrant? NSLs are not like warrants. In order to get a warrant, the FBI would need to convince a judge that they had probable cause to believe a search would reveal evidence of a crime. If the judge is not convinced, the FBI can’t perform the search. NSLs are “administrative subpeonas” that the FBI issues themselves. They don’t need a judge’s permission to send out an NSL and they don’t need to prove to anybody that the search is likely to reveal evidence of a crime. Doesn’t the Constitution require the government to get warrants when they want to search my stuff? The FBI doesn’t need a warrant to get these kinds of records about you because of something called “third party doctrine.” In general, you are only protected from government searches in situations where you have “reasonable expectation of privacy.” In your house, you have such an expectation, so the government almost always needs a warrant to search there. But courts have ruled that you don’t have a reasonable expectation of privacy for records about your activities kept by third parties like Google, Verizon, or Cub. Since you allowed those parties to know information about you, the courts say that you can’t reasonably expect it to be private. 41 CMSDL Core Files 2015-2016 National Security Letters 1AC –Plan We propose the following plan: The United States federal government should ban the use of National Security Letters 42 CMSDL Core Files 2015-2016 National Security Letters 1AC – Harms (Privacy) Contention One: Harms - Privacy National Security Letters are an abuse of power that enables needless mass government surveillance, which violates privacy and threatens democracy Washington Post, 2007 (“My National Security Letter Gag Order” March 23: http://www.washingtonpost.com/wp-dyn/content/article/2007/03/22/AR2007032201882.html/) The Justice Department's inspector general revealed on March 9 that the FBI has been systematically abusing one of the most controversial provisions of the USA Patriot Act: the expanded power to issue "national security letters." It no doubt surprised most Americans to learn that between 2003 and 2005 the FBI issued more than 140,000 specific demands under this provision -- demands issued without a showing of probable cause or prior judicial approval -- to obtain potentially sensitive information about U.S. citizens and residents. It did not, however, come as any surprise to me.Three years ago, I received a national security letter (NSL) in my capacity as the president of a small Internet access and consulting business. The letter ordered me to provide sensitive information about one of my clients. There was no indication that a judge had reviewed or approved the letter, and it turned out that none had. The letter came with a gag provision that prohibited me from telling anyone, including my client, that the FBI was seeking this information. Based on the context of the demand -- a context that the FBI still won't let me discuss publicly -- I suspected that the FBI was abusing its power and that the letter sought information to which the FBI was not entitled. Rather than turn over the information, I contacted lawyers at the American Civil Liberties Union, and in April 2004 I filed a lawsuit challenging the constitutionality of the NSL power. I never released the information the FBI sought, and last November the FBI decided that it no longer needs the information anyway. But the FBI still hasn't abandoned the gag order that prevents me from disclosing my experience and concerns with the law or the national security letter that was served on my company. In fact, the government will return to court in the next few weeks to defend the gag orders that are imposed on recipients of these letters. Living under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case -- including the mere fact that I received an NSL -- from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie.I resent being conscripted as a secret informer for the government and being made to mislead those who are close to me, especially because I have doubts about the legitimacy of the underlying investigation.The inspector general's report makes clear that NSL gag orders have had even more pernicious effects. Without the gag orders issued on recipients of the letters, it is doubtful that the FBI would have been able to abuse the NSL power the way that it did. Some recipients would have spoken out about perceived abuses, and the FBI's actions would have been subject to some degree of public scrutiny. To be sure, not all recipients would have spoken out; the inspector general's report suggests that large telecom companies have been all too willing to share sensitive data with the agency -- in at least one case, a telecom company gave the FBI even more information than it asked for. But some recipients would have called attention to abuses, and some abuse would have been deterred.I found it particularly difficult to be silent about my concerns while Congress was debating the reauthorization of the Patriot Act in 2005 and early 2006. If I hadn't been under a gag order, I would have contacted members of Congress to discuss my experiences and to advocate changes in the law. The inspector general's report confirms that Congress lacked a complete picture of the problem during a critical time: Even though the NSL statute requires the director of the FBI to fully inform members of the House and Senate about all requests issued under the statute, the FBI significantly underrepresented the number of NSL requests in 2003, 2004 and 2005, according to the report.I recognize that there may sometimes be a need for secrecy in certain national security investigations. But I've now been under a broad gag order for three years, and other NSL recipients have been silenced for even longer. At some point -- a point we passed long ago -- the secrecy itself becomes a threat to our democracy. In the wake of the recent revelations, I believe more strongly than ever that the secrecy surrounding the government's use of the national security letters power is unwarranted and dangerous. I hope that Congress will at last recognize the same thing. 43 CMSDL Core Files 2015-2016 National Security Letters 1AC – Harms (Privacy) Without privacy, there is no democracy TruthOut 2013 (“Without Privacy There Can Be No Democracy TruthOut September 24 Online: http://www.truth-out.org/opinion/item/19039-without-privacy-there-can-be-nodemocracy#) The president of Brazil, Dilma Rousseff, spoke this morning at the United Nations and delivered a powerful indictment of spying by the NSA on behalf of the United States. She said, "Without respect for a nation's sovereignty, there is no basis for proper relations among nations," adding that "Brazil knows how to protect itself. Brazil ... does not provide shelter to terrorist groups. We are a democratic country."The Brazilian president is so outraged at American spying, both on her country and on her personal emails and her personal life, that she canceled a state dinner with President Obama. While most Americans see this as a rift between Brazil in the United States over the issue of our spying on them, President Rousseff highlighted the most important point of all elsewhere in her speech this morning.She said, "Without the right of privacy, there is no real freedom of speech or freedom of opinion, and so there is no actual democracy."This is not just true of international relations. It's also true here within the United States.Back before the Kennedy administration largely put an end to it, J Edgar Hoover was infamous in political circles in Washington DC for his spying on and blackmailing of both American politicians and activists like Martin Luther King. He even sent King tapes of an extramarital affair and suggested that King should consider committing suicide.That was a shameful period in American history, and most Americans think it is behind us. But the NSA, other intelligence agencies, and even local police departments have put the practice of spying on average citizens in America on steroids.As Brazil's President points out, without privacy there can be no democracy. Democracy requires opposing voices; it requires a certain level of reasonable political conflict. And it requires that government misdeeds be exposed. That can only be done when whistleblowers and people committing acts of journalism can do so without being spied upon.Perhaps a larger problem is that well over half – some estimates run as high as 70% – of the NSA's budget has been outsourced to private corporations. These private corporations maintain an army of lobbyists in Washington DC who constantly push for more spying and, thus, more money for their clients. With the privatization of intelligence operations, the normal system of checks and balances that would keep government snooping under control has broken down. We need a new Church Commission to investigate the nature and scope of our government spying both on our citizens and on our allies.But even more than that we need to go back to the advice that President Dwight Eisenhower gave us as he left the presidency in 1961. Eisenhower warned about the rise of a military-industrial complex, suggesting that private forces might, in their search for profits, override the protective mechanisms that keep government answerable to its people. dThat military-industrial complex has become the military-industrial-spying-private-prison complex, and it is far greater a threat to democracy then probably was envisioned by Eisenhower. Government is the protector of the commons. Government is of by and for we the people. Government must be answerable to the people. When the functions of government are privatized, all of that breaks down and Government becomes answerable to profit. It's time to reestablish the clear dividing lines between government functions and corporate functions, between the public space and the private space. A critically important place to start that is by ending the privatization within our national investigative and spying agencies. 44 CMSDL Core Files 2015-2016 National Security Letters 1AC – Harms (Racism) Contention 2: Harms - Racism National Security Letters have been part of a larger pattern of racial profiling and subjugation since 9/11, it is almost impossible to prove racial profiling in a surveillance attempt Kleiner 2010 (“Racial Profiling in the Name of National Security: Protecting Minority Travelers Civil Liberties in the Age of Terrorism” Yevgenia S. Kleiner November 1 Online: http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1012&context=twlj Government-sponsored ethnic and racial profiling in the form of computerized and behavioral screening initiatives implemented as a response to 9/11 has led to the subjection of minorities to increased scrutiny and suspicion in American airports. In the name of national security, safety protocols are being enacted in non-uniform ways that disproportionally infringe on minority passengers’ civil liberties and reinforce harmful racial stereotypes. Focusing on the dissonance between basic freedoms guaranteed by the United States Constitution and the security policies implemented by the federal government, this Note argues that the disparity in scrutiny received by minority travelers is counterproductive because it reinforces racism and ethnocentrism as social norms and fails to ensure a consistent level of protection for all passengers. This Note ultimately advocates for a federal government mandate that delineates a universal, race-blind standard for the level of scrutiny (and accompanying procedures) that all passengers should be subjected to while traveling aboard commercial aircraft.[…] The passage of the USA PATRIOT Act signaled the beginning of an era of reduced judicial oversight of surveillance by the federal government.70Although the Fourth Amendment protects against unreasonable searches and seizures and normally requires probable cause forgovernment interference, no convenient provision exists to explicitly define the way the Amendment should be read in light of a potential terrorist threat.71 As a result, the USA PATRIOT Act granted the government wide-sweeping investigative powers by permitting it to obtainwarrants without a demonstration of the truthfulness of its allegations.72 Furthermore, provisions under Section 505 of the USA PATRIOT Actgranted the Department of Justice the freedom to use administrative subpoenas called National Security Letters to obtain records of individuals’electronic communications without judicial oversight.73 This provision essentially means that National Security Letters enable federal officials to obtain information on anyone, because the Act does not require officials to demonstrate probable cause or a compelling need for access to the information.74 It was not until 2003 that Attorney General John Ashcroft finally admitted in a statement before the House Judiciary Committee that the USA PATRIOT Act had lowered the standard of proof for a warrant to something “lower than probable cause,” and that it had enabled federal officials to investigate citizens who were neither spies nor terrorists.75 Unfortunately, this admission did not lessen the burden on wrongfully targeted minorities who wish to assert their constitutional rights: in addition to proving a violation of their Fourth Amendment Due Process rights, individuals alleging a racial profiling claim against the government are required to show that the relevant government agency violated the Equal Protection Clause of the Fourteenth Amendment by complying with a “purposefully discriminatory policy.”76 Not surprisingly, meeting such a high burden of proof is usually difficult, if not impossible since government agencies are reluctant to admit such grievous error.77 45 CMSDL Core Files 2015-2016 National Security Letters 1AC – Harms (Racism) Racism makes all forms of violence inevitable. National Security Letters are only one part of a racist justice system, but we must reject anything that contributes to racism Memmi 2k MEMMI Professor Emeritus of Sociology @ Unv. Of Paris Albert-; RACISM, translated by Steve Martinot, pp.163-165 The struggle against racism will be long, difficult, without intermission, without remission, probably never achieved, yet for this very reason, it is a struggle to be undertaken without surcease and without concessions. One cannot be indulgent toward racism. One cannot even let the monster in the house, especially not in a mask. To give it merely a foothold means to augment the bestial part in us and in other people which is to diminish what is human. To accept the racist universe to the slightest degree is to endorse fear, injustice, and violence. It is to accept the persistence of the dark history in which we still largely live. It is to agree that the outsider will always be a possible victim (and which [person] man is not [themself] himself an outsider relative to someone else?). Racism illustrates in sum, the inevitable negativity of the condition of the dominated; that is it illuminates in a certain sense the entire human condition. The anti-racist struggle, difficult though it is, and always in question, is nevertheless one of the prologues to the ultimate passage from animality to humanity. In that sense, we cannot fail to rise to the racist challenge. However, it remains true that one’s moral conduct only emerges from a choice: one has to want it. It is a choice among other choices, and always debatable in its foundations and its consequences. Let us say, broadly speaking, that the choice to conduct oneself morally is the condition for the establishment of a human order for which racism is the very negation. This is almost a redundancy. One cannot found a moral order, let alone a legislative order, on racism because racism signifies the exclusion of the other and his or her subjection to violence and domination. From an ethical point of view, if one can deploy a little religious language, racism is “the truly capital sin.”fn22 It is not an accident that almost all of humanity’s spiritual traditions counsel respect for the weak, for orphans, widows, or strangers. It is not just a question of theoretical counsel respect for the weak, for orphans, widows or strangers. It is not just a question of theoretical morality and disinterested commandments. Such unanimity in the safeguarding of the other suggests the real utility of such sentiments. All things considered, we have an interest in banishing injustice, because injustice engenders violence and death. Of course, this is debatable. There are those who think that if one is strong enough, the assault on and oppression of others is permissible. But no one is ever sure of remaining the strongest. One day, perhaps, the roles will be reversed. All unjust society contains within itself the seeds of its own death. It is probably smarter to treat others with respect so that they treat you with respect. “Recall,” says the bible, “that you were once a stranger in Egypt,” which means both that you ought to respect the stranger because you were a stranger yourself and that you risk becoming once again someday. It is an ethical and a practical appeal – indeed, it is a contract, however implicit it might be. In short, the refusal of racism is the condition for all theoretical and practical morality. Because, in the end, the ethical choice commands the political choice. A just society must be a society accepted by all. If this contractual principle is not accepted, then only conflict, violence, and destruction will be our lot. If it is accepted, we can hope someday to live in peace. True, it is a wager, but the stakes are irresistible. 46 CMSDL Core Files 2015-2016 National Security Letters 1AC – Solvency Banning national security letters solves immediately – only federal action works Weigant, 2014 (Chris, Huffington Post contributor, http://www.chrisweigant.com/2014/01/16/obama-should-announce-ban-on-national-security-letters) National security letters are nothing short of an abuse of power. Their use has exploded since 9/11, with the total issued now in the hundreds of thousands. National security letters, for those unaware of their definition, are search warrants issued by the executive branch with no signoff from the judicial branch. The F.B.I. can (and does) write out a letter demanding certain information (from an Internet Service Provider, for instance, or a phone company) be turned over to the government. No judge signs off on the order. They cannot be appealed. In fact, up until very recently, they could not even legally be talked about by the recipient. There was a "gag order" clause in the letter which stated that the letter's mere existence was a national secret which could not be disclosed to anyone, forever. This, quite obviously, gives law enforcement officers absolute power over searching anything they felt like, in the sacred name of national security. With no legal recourse whatsoever. That is tyrannic power, folks. In fact, historically, it is no different than the abuses of King Louis XVI which led to the French Revolution. Back then, such orders were called lettres de cachet. But no matter what language you use, such non-judicial seizure orders issued on the sole say-so of the executive power are laughably unconstitutional today. I'm not the only one to make this assertion, either. There have been a number of court cases where federal judges have banned national security letters from being issued, on the grounds that they are indeed blatant affronts to the United States Constitution (the First and Fourth Amendments in particular). The last such judgment was handed down last year, in fact. But somehow, no matter how many times the federal government loses such cases in court, national security letters never seem to quite go away. Just last week, the head of the F.B.I. was arguing against the recommendation that a judge sign off on such search warrants -- which would be a moot point unless the feds were still in the habit of issuing such orders, wouldn't it? Obama's blue-ribbon commission is right. National security letters are nothing short of an abuse of executive power -- one that the Constitution specifically addresses. There's a reason why the Fourth Amendment exists, to put this another way, and a big part of that reason is to forever ban such abuses of power by the executive branch of the government. If the F.B.I. (or any other federal agency) feels it needs to search any records in any national security case, then they should have to present their case to a judge and get it signed off, just like any other court order. Having this check on executive power is a fundamental part of what this country was founded upon. President Obama should say so, tomorrow. He should announce he is issuing an executive order (or rule change or whatever else is necessary) stating that national security letters will no longer be issued without the signature of a judge on the Foreign Intelligence Surveillance Court (who are cleared to handle such national security issues). Even simpler, Obama should just announce a ban on the use of national security letters altogether, and that in their place the F.B.I. and all other federal agencies will be issuing national security search warrants instead. No congressional action should be necessary to achieve this -- Obama should be able to change this with the stroke of a pen. I've been calling for the end to national security letters for a long time now, beginning back when George W. Bush was in office. It's not a partisan issue, for me. I don't care who is in the Oval Office, such letters are a plain abuse of power and should not be allowed in the United States of America. President Obama was forced into creating a commission to study intelligence gathering. His commission recommended doing away with nonjudicial national security letters. Federal judges have pointed out again and again just how blatantly unconstitutional such power is. So there should be nothing stopping Barack Obama -- a former constitutional professor himself -- from announcing tomorrow that national security letters will now all have to be approved by a judge before they can be issued. It is the right thing to do, and the time to make this change is indeed long overdu 47 CMSDL Core Files 2015-2016 Answers to: Terrorism Disadvantage National Security Letters are not necessary for national security- they needlessly violate the privacy of thousands of innocent Americans Sanchez, 2014 (“Can We Do Without National Security Letters?” Julian Sanchez January 9, Online: http://justsecurity.org/5351/national-security-letters/) Former top FBI attorney Michael Woods (Quoted in Eric Lichtblau’sBush’s Law) has summarized the ethos that led to the massive explosion of NSLs issued in the aftermath of the 9/11 attacks:All of a sudden, every lead needed to be looked at. The atmosphere was such that you didn’t want to be the guy who overlooked the next Moussaoui. . . . If you’re telling the FBI people over and over you need to be preemptive, you need to get out there before something happens, you’re pushing people toward a fishing expedition. We heard over and over again, connect the dots, and we were pushing the envelope and doing things that, in the old days, would have seemed beyond the pale.That is certainly an understandable initial reaction, but at this point it seems fair to question whether the use of such an invasive tool is really necessary as a means of checking out every possible lead. When NSL authority was initially expanded, after all, the requirement that records obtained be relevant to an “authorized investigation” was understood to refer to full investigations, predicated on “specific and articulable facts” providing “reasonable grounds” to believe some real national security threat exists. The guidelines were only later, in 2003, altered to allow their use in “preliminary” investigations based on “information or allegations” suggesting a possible threat— and before long, such investigations accounted for the majority of NSLs issued.If the inability to chase down a sufficient number of thin leads had been at the root of the failure to detect the 9/11 plot, this might well be a reasonable response, but the evidence is fairly overwhelming at this point that this was not the case. The problem, rather, was a failure to “connect dots” by sharing information about known threats across agencies, rather than insufficiently promiscuous collection of dots. Needless to say, the vast majority of the thousands of Americans whose information is collected pursuant to NSLs are not, in fact, terrorists—nor, in all likelihood engaged in criminal wrongdoing of any kind. So if the objection is that such large-scale use of NSLs to collect data about Americans is likely to be infeasible when advance approval is required, one good answer might be: Yes, that is the point. Candidate Barack Obama presumably thought so when hedeclared his intention to put an end to the use of “National Security Letters to spy on citizens who are not suspected of a crime.”NSL authorities have already given rise to misuses the Justice Department’s Inspector General characterized as widespread and serious—but the disclosure of the FISC opinions authorizing bulk collection of metadata under Section 215 of the Patriot Act adds further grounds for concern. The “relevance” standard that the FISC construed to permit huge volumes of irrelevant records as a means of sifting through them for a minuscule fraction of relevant ones, after all, is the same standard found in the NSL statutes. The FISC, to be sure, stressed the many extrastatutory safeguards it had imposed on the NSA’s metadata programs in order to limit the invasion of innocent Americans’ privacy, but the presence or absence of those safeguards cannot really bear on the threshold question of whether the records obtained are “relevant.” Would any FBI agent be so bold as to issue an NSL for the records of all subscribers at a major cell carrier? Almost certainly not, at least in the current climate. But with this broad understanding of “relevance” now on the record, and being openly defended by the Justice Department, it is easy to imagine smaller scale fishing expeditions operating on the same theory—perhaps applying to all users of a particular Web site or online service.Finally, it bears noting that the courts may well force the administration’s hand if it does not undertake its own reforms. One court has already held that NSLs, with their presumptive gag orders, violate the First Amendment—though that ruling has been stayed pending appellate review. So it is at least an open question whether they can survive in their current form whether or not the administration is eager for reform. Fortunately, there is little reason to think that intelligence agencies would be hobbled if deprived of a tool relatively little used before the passage of the Patriot Act, or that the use of intrusive methods to “check out” Americans by the tens of thousands is essential to protecting American security.[…]If the NSL gag provisions can be weakened sufficiently to pass First Amendment muster, such a compromise solution might represent the elusive “balance” between privacy interests and the need to quickly evaluate leads in the initial phases of investigations. But the burden should be on the intelligence community to establish that even more limited authority is genuinely necessary. The absence of broad NSL powers prior to the Patriot Act does not appear to have been a major factor in the failure to detect the 9/11 attacks, and the public has not been made aware of any cases where such easy access to sensitive information has enabled the discovery of some plot or terror cell that would otherwise have gone undetected. The claim that the FBI cannot investigate effectively without a tool that has existed in its current form for roughly a decade should be seen as an extraordinary one—demanding equally extraordinary evidence before we accept it. 48 CMSDL Core Files 2015-2016 Answers to: Terrorism Disadvantage National Security Letters are intrusive tools that are not as effective as other, more ethical national security efforts. German and Richardson, 2012 (“National Security Letters: Building Blocks for Investigations or Intrusive Tools?” Michael German and Michelle Richardson for the ABA Journal September 1, Online: http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusive_t/ During the original Patriot Act debates, Attorney General John Ashcroft called librarians opposing the legislation “hysterical,” and now Valerie Caproni and Steven Siegel argue that criticism of NSLs is “hyperbole.” Caproni and Siegel repeat the FBI’s previous assertions that NSLs are “critical tools” in the government’s national security arsenal, but there is no public data to support this statement and, despite Caproni and Siegel’s denials, there is ample evidence that this overbroad authority has been abused, as any unchecked power usually is.The founders designed our constitutional system of government to prevent abuse of power through checks and balances between the branches and robust procedural protections where the government attempts to deprive an individual of his rights. Indeed, the most fully developed processes for the protection of civil rights exists within the criminal justice system, which makes the Caproni-Siegel comparison of NSLs to grand jury subpoenas most misplaced.The grand jury, made up of ordinary citizens, is designed to serve as an independent check on law enforcement authority by protecting people against unfounded charges. As the United States Attorneys’ Manual notes, the grand jury’s which reduces the risk of unnecessary, suspicionless data collection. And in grand jury proceedings, the role of prosecutors—who are bound by the ethical obligations of their profession—is also a curb against law enforcement overreach. None of these protections exist with NSLs or other surveillance tools geared toward intelligence collection rather than criminal prosecution. The FBI has the sole discretion to issue NSLs power is limited by its narrow function of determining whether to bring an indictment for a criminal violation, with virtually no independent oversight. Moreover, a grand jury’s indictment only starts the criminal justice process, after which additional rights attach and affirmative discovery obligations are imposed on the government. The government’s obligation to disclose sources and methods of evidencegathering during trial is likewise a deterrent to improper collection, as the exclusionary rule compels suppression of illegally obtained evidence. The secrecy required in grand jury proceedings is designed to protect the privacy of the witnesses and individuals investigated, not to hide the government conduct from independent oversight and public accountability, as is the case with intelligence tools like NSLs. Victims of NSL abuse have no way of knowing their rights have been violated, and no remedy.The truth is that NSLs are intrusive tools. While the Supreme Court did fail to protect personal data held by third parties in 1976, as Caproni and Siegel point out, Congress then stepped in to protect financial, credit and communications records, which most Americans consider sensitive and private information. The pre-Patriot NSL authorities Caproni and Siegel mention were limited to collecting information about suspected foreign agents or international terrorists. The Patriot Act expansion of NSL authorities allows the collection of data about any American the FBI deems “relevant” to an espionage or terrorism investigation, with no independent review. And given the technological advancements that have occurred since the Supreme Court’s 1976 decision, which now leave vast amounts of personal information unprotected on third-party servers, trusting the government to be judicious with its access to such data through NSLs or other tools is even more misplaced.Caproni and Siegel also note that NSL recipients rarely challenge the government’s demands, which isn’t surprising given that NSLs seek records pertaining to someone other than the recipient. When the entities that hold private information show as little interest in protecting it as the government, everyone should worry. And it’s interesting that in the three cases in which NSL recipients challenged these demands, the government withdrew the NSL requests rather than defend them in court, thereby mooting challenges to the underlying statute and throwing into doubt the government’s justification for making these requests in the first place.Finally, consider the FBI’s continuing minimization of the abuse discovered by the inspector general. The FBI’s own audit found legal violations in 9.43 percent of its NSL files, and the IG later determined that the FBI underreported the number of NSL violations by a factor of three. These figures justify calling the abuse pervasive, and denying their importance only raises further skepticism that Americans can trust government agents with such unfettered power. The IG did indeed say the FBI made strides toward reform in 2008, but concluded that “it is too soon to definitively state whether the new systems and controls developed by the FBI and the department will eliminate fully the problems with the use of NSLs.” 49 CMSDL Core Files 2015-2016 Answers to: Crime Disadvantage The FBI misuses National Security Letters- many are issued, with few prosecutions. A ban would stop the abuse, not increase crime. Fraase 2013 (“National Security Letter Report” Michael Fraase March 11, Online: http://www.farces.com/national-security-letter-report/) A Justice Department reportindicates that the FBI illegally obtained personal information including banking and telephone records on thousands of US citizens. The information was gathered without court subpoena through the use of national security letters, the scope of which was significantly expanded under the Patriot Act. These national security letters, intended to be used only in cases of emergency, were used “without an emergency or even without an investigative case,” according to Dan Eggen and John Solomon’s report in the Washington Post. The national security letters were, in some cases, used retroactively.More than 143,000 requests for information on more than 52,000 individuals were issued from 2003-05, figures much higher than those reported to Congress.Some politicians responded by calling for restrictions on the Patriot Act and have pledged investigatory hearings. Senate Majority Whip Richard Durbin (D-Illinois) has been calling for a review of the Bush administration’s use of national security letters for two years told Eggen and Solomon that the report “confirms the American people’s worst fears about the Patriot Act.” Retraction letters flew across Washington last week as administration representatives sought to correct their sworn testimony that the use of national security letters was well-regulated. National Security Letters are for use only in terrorism or espionage cases; our plan would have little to no effect on non-national security related crime. German and Richardson, 2012 (“National Security Letters: Building Blocks for Investigations or Intrusive Tools?” Michael German and Michelle Richardson for the ABA Journal September 1, Online: http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusive_t/ Many federal agencies use administrative (not court-approved) subpoenas to obtain information relating to their duties—there are more than 300 instances where the law grants such powers. NSLs are a type of administrative subpoena that can be invoked only in terrorism and espionage investigations. They can be issued by the FBI to limited types of third-party records’ custodians, and the custodians are responsible for gathering and producing responsive materials to the FBI. The custodian can object if compliance would be burdensome, and the FBI cannot simply take materials from the custodian. For that reason, NSLs should not be confused with search warrants . Search warrants are issued based on a finding of probable cause by a neutral and detached magistrate; the person on whom a search warrant is served has no option to decline to cooperate, and the entity serving the search warrant is authorized to seize material from the custodians. Moreover, the scope of a search warrant is set by the specific finding of the magistrate and can be quite broad, depending on the underlying facts. In contrast, NSLs have a strictly defined scope that has been set by Congress. 50 CMSDL Core Files 2015-2016 2AC Extensions: Privacy National Security Letters violate the first and fourth amendments; the FBI has ignored Presidential requests to end the use of National Security Letters. Banning gag orders is not enough, we need to put an end to National Security Letters themselves. Froomkin, 2015 (“FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters” The Intercept February 19, Online: https://firstlook.org/theintercept/2015/02/19/fbiflouts-obama-directive-limit-gag-orders-national-security-letters/) Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter.FBI agents can demand that an Internet service provider, telephone company or financial institution turn over its records on any number of people — without any judicial review whatsoever — simply by writing a letter that says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such letters a year; by the latest count, it still issues about 60 a day.The letters look like this:Recipients are legally required to comply — but it doesn’t stop there. They also aren’t allowed to mention the order to anyone , least of all the person whose data is being searched. Ever. That’s because National Security Letters almost always come with eternal gag orders. Here’s that part:That means the NSL process utterly disregards the First Amendment as well.More than a year ago, President Obama announced that he was ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real need for further secrecy.”And on Feb. 3, when the Office of the Director of National Intelligenceannounced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to cap the gag orders:In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close.Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.Despite the use of the word “now” in that first sentence, however, the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when.Media inquiries were greeted with stalling and, finally, a no comment — ostensibly on advice of legal counsel.“There is pending litigation that deals with a lot of the same questions you’re asking, out of the Ninth Circuit,” FBI spokesman Chris Allen told me. “So for now, we’ll just have to decline to comment.”FBI lawyers are working on a court filing for that case, and “it will address” the new policy, he said. He would not say when to expect it.There is indeed a significant case currently before the federal appeals court in San Francisco. Oral arguments were in October. A decision could come any time.But in that case, the Electronic Frontier Foundation (EFF), which is representing two unnamed communications companies that received NSLs, is calling for the entire NSL statute to be thrown out as unconstitutional — not for a tweak to the gag. And it has a March 2013 district court ruling in its favor.“The gag is a prior restraint under the First Amendment, and prior restraints have to meet an extremely high burden,” said Andrew Crocker, a legal fellow at EFF. That means going to court and meeting the burden of proof — not just signing a letter.Or as the Cato Institute’s Julian Sanchez put it, “To have such a low bar for denying persons or companies the right to speak about government orders they have been served with is anathema. And it is not very good for accountability.”In a separate case, a wide range of media companies (including First Look Media, the non-profit digital media venture that produces The Intercept) aresupporting a lawsuit filed by Twitter, demanding the right to say specifically how many NSLs it has received.But simply releasing companies from a gag doesn’t assure the kind of accountability that privacy advocates are saying is required by the Constitution.“What the public has to remember is a NSL is asking for your information, but it’s not asking it from you,” said Michael German, a former FBI agent who is now a fellow with the Brennan Center for Justice. “The vast majority of these things go to the very large telecommunications and financial companies who have a large stake in maintaining a good relationship with the government because they’re heavily regulated entities.”So, German said, “the number of NSLs that would be exposed as a result of the release of the gag order is probably very few. The person whose records are being obtained is the one who should receive some notification.”A time limit on gags going forward also raises the question of whether past gag orders will now be withdrawn. “Obviously there are at this point literally hundreds of thousands of National Security Letters that are more than three years old,” said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back you go, “it becomes increasingly implausible that a significant percentage of those are going to entail some dire national security risk.”The NSL program has a troubled history. The absolute secrecy of the program and resulting lack of accountability led to systemic abuse as documented by repeated inspector-general investigations, including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, requests for information based on First Amendment protected activity, “after-thefact” blanket NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information without any determination that the telephone numbers were relevant to authorized national security investigations The FBI has a history of misusing data tools and covering it up. Federal agents frequently violate privacy rules- 70% since 2002 have involved National Security Letters RTE News, 2007 (“FBI Agents Broke The Rules 1,000 Times” RTE News June 14, Online: http://www.rte.ie/news/2007/0614/90049-fbi/) An internal FBI audit has found the agency violated rules more than 1,000 times while collecting data on US domestic phone calls, e-mails and financial transactions in recent years. The Washington Post reported today that the number of violations uncovered by the audit was far greater than those previously documented in a Justice Department report in March. The vast majority of newly discovered violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorised to collect. The agents retained the information in their files, which mostly concerned suspected terrorist or espionage activities, according to the report . The new 51 CMSDL Core Files 2015-2016 audit covers just 10% of the FBI's national security investigations since 2002, so the actual number of violations in the FBI's domestic surveillance efforts probably number several thousand. Of the more than 1,000 violations uncovered by the new audit, about 700 involved the provision of information by phone companies and other communications firms that exceeded what the FBI's National Security Letters had sought. However, some two dozen of the newly discovered violations involved agents' requests for information that US law did not allow them to have, the audit found. National Security Letters allow the FBI to compel the release of private information such as communications or financial records without getting court authority. Their use has grown since the 11 September 2001 attacks. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information. FBI officials said the audit found no evidence that any agent knowingly or willingly violated the laws or that supervisors encouraged such violations. Mass surveillance is unconstitutional and a threat to democracy The New York Times Editorial Board, 2013 (“Surveillance: A Threat to Democracy” June 11, Online: http://www.nytimes.com/2013/06/12/opinion/surveillance-a-threat-to-democracy.html A new Washington Post-Pew Research Center pollfound that a majority of Americans are untroubled by revelations about the National Security Agency’s dragnet collection of the phone records of millions of citizens, without any individual suspicion and regardless of any connection to a counterterrorism investigation.Perhaps the lack of a broader sense of alarm is not all that surprising when President Obama, Senator Dianne Feinstein, the Democratic chairwoman of the Intelligence Committee, and intelligence officials insist that such surveillance is crucial to the nation’s antiterrorism efforts. But Americans should not be fooled by political leaders putting forward a false choice. The issue is not whether the government should The question is whether the security goals can be achieved by less-intrusive or without trampling on democratic freedoms and basic rights. Far too little has been said on this question by the White House or Congress in their defense of the N.S.A.’s dragnet .The surreptitious collection of “metadata” — every bit of information about every phone call except the word-by-word content of conversations — fundamentally alters the relationship between individuals and their government.Tracking whom Americans are calling, for how long they speak, and from where, vigorously pursue terrorists. sweeping means, can reveal deeply personal information about an individual. Using such data, the government can discover intimate details about a person’s lifestyle and beliefs — political leanings and associations, medical issues, sexual orientation, habits of religious worship, and even marital infidelities. Daniel Solove, a professor at George Washington University Law School and a privacy expert, likens this program to a Seurat painting. A single dot may seem like no big deal, but many together create a nuanced portrait .The effect is to undermine constitutional principles of personal privacy and freedom from constant government monitoring. The American Civil Liberties Union filed a lawsuit on Tuesday, challenging the program’s constitutionality, and it was right to do so.The government’s capacity to build extensive, secret digital dossiers on such a mass at odds with the vision and intention of the nation’s framers who crafted the Fourth Amendment precisely to outlaw indiscriminate searches that cast a wide net to see what can be caught. It also attacks First Amendment values of free speech and association.In a democracy, people are entitled to know what techniques are being used by the government to spy on them, how the records are being held and for how long, who will have access to them, and the safeguards in place to prevent abuse. Only then can they evaluate official claims that the correct balance between fighting terrorism and preserving individual liberty has been struck, and decide if they are willing to accept diminished privacy and liberty. If Americans have been slow to recognize the dangerous overreach of the N.S.A.’s phone scale is totally surveillance, it is largely because they have scant information to judge the government’s conduct.Even if most Americans trust President Obama not to abuse their personal data, no one knows who will occupy the White House or lead intelligence operations in the future. The government’s capacity to assemble, keep and share information on its citizens has grown exponentially since the days when J. Edgar Hoover, as director of the F.B.I., collected terrorist threats need to catch up. 52 CMSDL Core Files 2015-2016 2AC Extensions: Racism Government has a history of infiltrating peaceful groups, mass surveillance is incompatible with human rights and democracy Stallman 2013 (“How Much Surveillance Can Democracy Withstand?” Richard Stallman October 14, Online: http://www.wired.com/2013/10/a-necessary-evil-what-it-takes-fordemocracy-to-survive-surveillance/ The current level of general surveillance in society is incompatible with human rights. To recover our freedom and restore democracy, we must reduce surveillance to the point where it is possible for whistleblowers of all kinds to talk with journalists without being spotted. To do this reliably, we must reduce the surveillance capacity of the systems we use.Using free/libre software, as I’ve advocated for 30 years, is the first step in taking control of our digital lives. We can’t trust non-free software; the NSA uses and even creates security weaknesses in non-free software so as to invade our own computers and routers. Free software gives us control of our own computers, but that won’t protect our privacy once weset foot on the internet.Bipartisan legislation to “curtail the domestic surveillance powers” in the U.S. is being drawn up, but it relies on limiting the government’s use of our virtual dossiers. That won’t suffice to protect whistleblowers if “catching the whistleblower” is grounds for access sufficient to identify him or her. We need to go further.Thanks to Edward Snowden’s disclosures, we know that the current level of general surveillance in society is incompatible with human rights. The repeated harassment and prosecution of dissidents, sources, and journalists provides confirmation. We need to reduce the level of general surveillance, but how far? Where exactly is the maximum tolerable level of surveillance, beyond which it becomes oppressive? That happens when surveillance interferes with the functioning of democracy: when whistleblowers (such as Snowden) are likely to be caught.DON’T AGREE WE NEED TO REDUCE SURVEILLANCE? THEN READ THIS SECTION FIRSTIf whistleblowers don’t dare reveal crimes and lies, we lose the last shred of effective control over our government and institutions. That’s why surveillance that enables the state to find out who has talked with a reporter is too much surveillance — too much for democracy to endure.An unnamed U.S. government official ominously toldjournalists in 2011 that the U.S. would not subpoena reporters because “We know who you’re talking to.” Sometimes journalists’ phone call records are subpoena’d to find this out, but Snowden has shown us that in effect they subpoena all the phone call recordsof everyone in the U.S., all the time.Opposition and dissident activities need to keep secrets from states that are willing to play dirty tricks on them. The ACLU has demonstrated the U.S. government’s systematic practice of infiltrating peaceful dissident groups on the pretext that there might be terrorists among them. The point at which surveillance is too much is the point at which the state can find who spoke to a known journalist or a known dissident.Information, Once Collected, Will Be Misused When people recognize that the level of general surveillance is too high, the first response is to propose limits on access to the accumulated data. That sounds nice, but it won’t fix the problem, not even slightly, even supposing that the government obeys the rules. (The NSA has misled the FISA court, which said it was unable to effectively hold the NSA accountable.) Suspicion of a crime will be grounds for access, so once a whistleblower is accused of “espionage”, finding the “spy” will provide an excuse to access the accumulated material. The state’s surveillance staff will misuse the data for personal reasons too. Some NSA agents used U.S. surveillance systems to track their lovers — past, present, or wished-for — in a practice called “LoveINT.” The NSA says it has caught and punished this a few times; we don’t know how many other times it wasn’t caught. But these events shouldn’t surprise us, because police have long used their access to driver’s license records to track down someone attractive, a practice known as “running a plate for a date.”Surveillance data will always be used for other purposes, even if this is prohibited. Once the data has been accumulated and the state has the possibility of access to it, it may misuse that data in dreadful ways. Total surveillance plus vague law provides an opening for a massive fishing expedition against any desired target. To make journalism and democracy safe, we must limit the accumulation of data that is easily accessible to the state.Robust Protection for Privacy Must Be TechnicalThe Electronic Frontier Foundation and other organizations propose a set of legal principles designed to prevent the abuses ofmassive surveillance. These principles include, crucially, explicit legal protection for whistleblowers; as a consequence, they would be adequate for protecting democratic freedoms — if adopted completely and enforced without exception forever.However, such legal protections are precarious: as recent history shows, they can be repealed (as in the FISA Amendments Act), suspended, or ignored.Meanwhile, demagogues will cite the usual excuses as grounds for total surveillance; any terrorist attack, even one that kills just a handful of people, will give them an opportunity. If limits on access to the data are set aside, it will be as if they had never existed: years worth of dossiers would suddenly become available for misuse by the state and its agents and, if collected by companies, for their private misuse as well. If, however, we stop the collection of dossiers on everyone, those dossiers won’t exist, and there will be no way to compile them retroactively. A new illiberal regime would have to implement surveillance afresh, and it would only collect data starting at that date. As for suspending or momentarily ignoring this law, the idea would hardly make sense. We have a moral obligation to stop racial profiling- it is dehumanizing and prevents justice from being served. U.S. DOJ 2003 (Department of Justice “Fact Sheet on Racial Profiling” Online http://www.justice.gov/archive/opa/pr/2003/June/racial_profiling_fact_sheet.pdf) Racial profiling sends the dehumanizing message to our citizens that they are judged by the color of their skin and harms the criminal justice system by eviscerating the trust that is necessary if law enforcement is to effectively protect our communities.America Has a Moral Obligation to Prohibit Racial Profiling. Race-based assumptions in law enforcement perpetuate negative racial stereotypes that are harmful to our diverse democracy, and materially impair our efforts to maintain a fair and just society. As Attorney General John Ashcroft said, racial profiling creates a "lose-lose" situation because it destroys the potential for underlying trust that "should support the administration of justice as a societal objective, not just as a law enforcement objective." The Overwhelming Majority of Federal Law Enforcement Officers Perform Their Jobs with Dedication, Fairness and Honor, But Any Instance of Racial Profiling by a Few Damages Our Criminal Justice System. The vast majority of federal law enforcement officers are hard-working public servants who perform a dangerous job with dedication,fairness and honor. However, when law enforcement practices are perceived to be biased or unfair, the general public, and especially minority communities, are less willing to trust and confide in officers, report crimes, be witnesses at trials, or serve on juries. Racial Profiling Is Discrimination, and It Taints the Entire Criminal Justice System.Racial profiling rests on the erroneous assumption that any particular individual of one race or ethnicity is more likely to engage in misconduct than any particular individual of other races orethnicities. 53 CMSDL Core Files 2015-2016 2AC Extensions – Solvency Trying to reform National Security Letters doesn’t work. We need to ban them because the FBI can’t be trusted to comply with the law American Bar Association Journal, 2012 (Sept, 1. http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusiv e_t/) There are also demonstrated problems with how the FBI handles data it receives in response to an NSL. Rather than using NSLs as an investigative tool, as Congress clearly intended by only allowing them to be used when the information sought was relevant to an ongoing investigation, the FBI was using NSLs for mass data collection. The Inspector General found FBI agents often carelessly uploaded information produced in response to NSLs into FBI databases without reviewing it to evaluate its importance to the investigation or even to ensure the proper data was received. As a result, information received in error was improperly retained and illegally shared throughout the intelligence community. The Inspector General detailed several incidents where the FBI collected private information regarding innocent people not relevant to any authorized investigation, entered it into FBI case files, and/or uploaded it into FBI databases—simply because the FBI agents requested records for the wrong telephone numbers or for the wrong time periods. In two other incidents, information for individuals not relevant to FBI investigations was uploaded into FBI databases, even though the FBI case agent had written on the face of the documents: “Individual account records not relevant to this matter. New subscriber not related to subject. Don’t upload.” Similarly, agents consistently failed to report or recognize when they received information from NSL recipients that was beyond the scope of the NSL request. Agents self-reported the overproduction of unauthorized information in only four of the 557 instances the Inspector General identified. Congress foresaw some of these information-sharing and accuracy problems. In 2006, it voted to reauthorize other portions of the Patriot Act that were scheduled to expire. That legislation required the attorney general and director of national intelligence to study whether minimization requirements were feasible in the context of NSLs. The report was due in February 2007, and to date there is still no public information confirming that this report was ever sent to Congress, or even written. However, during the Patriot reauthorization efforts of 2009-2011, members of Congress did state that some sort of internal minimization procedures were voluntarily adopted. Without public oversight, the effectiveness of these internal procedures in protecting the rights of innocent Americans remains in doubt. As the NSL saga reveals, internal controls unchecked by independent oversight are insufficient to prevent abuse. 54 CMSDL Core Files 2015-2016 *** National Security Letters Negative 55 CMSDL Core Files 2015-2016 1NC Solvency National Security Letters are very limited in scope and pose very little threat to civilian privacy. Heritage Foundation 2008 (Charles Stimson and Andrew Grossman. March 14. “National Security Letters: Three Important Facts.” Accessed on the web: http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) NSLs are narrowly tailored and subject to more and stronger procedural protections and oversight than ever before.The kind of information that the government may obtain from the use of NSLs is far more limited than many realize. Contrary to popular misconceptions, the government cannot use NSLs to wiretap, to access e-mails, or to conduct any kind of surveillance. Rather, NSLs allow the government to retrieve the sort of mundane business records that, while exposing little or no personal information, are extremely useful in uncovering terrorist activities. These records include lists of financial accounts, some bank records, and telephone subscriber information and toll records. Though some citizens believe that these types of records should be obtained only with a court-issued warrant, the Supreme Court has stated clearly that the Fourth Amendment is not implicated when these types of ordinary business records are shared with the government.[18]The Court has reasoned that when citizens open business accounts and create business records, they hold no reasonable expectation of privacy in the existence of the accounts and records. In many cases, this is intuitive: For example, a major piece of evidence in the trial of Scott Peterson for the murder of his wife was a receipt from the hardware store he visited shortly before the murder to purchase a bag of cement, which prosecutors alleged he used to make anchors to sink his wife's body.[19]This sort of evidence is routinely obtained with little oversight in police and grand jury investigations. Unlike with NSLs, however, obtaining documents in such investigations requires no signoffs from high-level officials who could be held accountable for misuse and no reporting or auditing. Convening grand juries is time-consuming, expensive, and otherwise cumbersome, however, making them unsuitable for national security investigations. They also offer far fewer procedural protections than NSLs. Further, despite the limited scope of information that is retrievable with NSLs, they are actually subject to greater privacy protections, by statute, regulation and practice, than ever before. 56 CMSDL Core Files 2015-2016 1NC Racism Harms Racist surveillance by the government and corporations is inevitable and has happened throughout our history – people of color don’t trust or want the privacy rights the affirmative talks about Cyril ’15 Cyril, Malkia A.- Malkia Amala Cyril is founder and executive director of the Center for Media Justice (CMJ) and co-founder of the Media Action Grassroots Network, a national network of 175 organizations working to ensure media access, rights, and representation for marginalized communities. April 15 2015 “Black America’s State of Surveillance” http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance. July 7, 2015 Today, media reporting on government surveillance is laser-focused on the revelations by Edward Snowden that millions of Americans were being spied on by the NSA. Yet my mother’s visit from the FBI reminds me that, from the slave pass system to laws that deputized white civilians as enforcers of Jim Crow, black people and other people of color have lived for centuries with surveillance practices aimed at maintaining a racial hierarchy. It’s time for journalists to tell a new story that does not start the clock when privileged classes learn they are targets of surveillance. We need to understand that data has historically been overused to repress dissidence, monitor perceived criminality, and perpetually maintain an impoverished underclass. In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people targeted by race but not involved in any crime. For targeted communities, there is little to no expectation of privacy from government or corporate surveillance. Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood. National security is more important to democracy than personal privacy; getting rid of National Security Letters would be getting rid of an important tool for fighting terrorism. Debatewise No Date (“Privacy vs. Security: Yes Points” Online http://debatewise.org/debates/3040-privacy-vs-security/#) The most important job of government is to “secure the general welfare” of its citizens. Security is a common good that is promised to all Americans, and it must outweigh any personal concerns about privacy. The word “privacy” is not found in the US Constitution so it cannot be claimed as a fundamental right. Surveillance is the secret watching of suspects’ private activities. In the past this usually involved following people, or going through their trash. These days it is mostly electronic, with the police and intelligence agencies listening into private phone conversations or reading emails (wiretapping). Surveillance can also involve looking at bank account details to see where money comes and goes. All these are vital tools for tracking the actions of terrorists when they are planning attacks. The government cannot stand by and wait until criminal acts are carried out: it must stop attacks before they happen. 57 CMSDL Core Files 2015-2016 1NC Privacy Harms National Security Letters are rarely abused, consistently reviewed, and necessary for national security. Heritage Foundation 2008 (Charles Stimson and Andrew Grossman. March 14. “National Security Letters: Three Important Facts.” Accessed on the web: http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) National security letters (NSLs) "continue to be important tools in the FBI's national security investigations," according to a major audit of NSL use released yesterday.[1] The audit, commissioned by Congress and undertaken by the Office of the Inspector General (OIG) of the Department of Justice, is meant to uncover any abuses, errors, or shortcomings in the use of NSLs.[2] This year's audit report, issued one year after the first such report, commends the FBI for making "significant progress" in implementing recommendations from the previous report and the FBI leadership for making it a "top priority" to correct mistakes in the use of NSLs.[3]Despite the high praise for ongoing critics will predictably assert that privacy violations from NSLs are widespread and significant. But the two reports, taken together, show otherwise. Though both reports show that the FBI has sometimes struggled to measure up to its own standards in using NSLs, they also reveal that incidents of misuse were infrequent and unintentional and did not involve any criminal misconduct. In many compliance efforts and strong numbers (84 possible violations out of about 50,000 requests) in this year's report, cases, misuse was actually due to third parties supplying information beyond the scope of the NSL request, not to any action by the FBI.Like last year's report, this year's report criticizes the Bureau for failing to follow applicable statutes, guidelines, and internal policies in some cases. The OIG notes, however, that because only one year has passed since the issuance of its first NSL report, it is too early for the FBI's corrective measures made since then to be reflected in the data.[4]While the FBI won praise for its efforts to improve its use of NSLs, the audit notes that Congress has failed to act on a small but significant recommendation from last year's report that would clarify the scope and applicability of NSLs in the telecommunications domain.[5] The Department of Justice submitted draft legislative language in just four months, but Congress has not taken up the matter in the seven months since then.[6]NSLs serve very narrow but important counterterrorism and counterintelligence purposes. As explained below, because of the kinds of information that can be sought with NSLs, they are not searches that trigger Fourth Amendment protections and so do not require a warrant. NSLs are very limited in the amount of information they can request, serve as a highly effective substitute for more invasive intelligence operations, and have a long and largely uncontroversial history. They were used long before 9/11 and have been subject to extensive congressional oversight.Understanding the following three facts about NSLs is key to any informed discussion of their use and propriety 58 CMSDL Core Files 2015-2016 1NC Privacy Harms National Security Letters are so narrow in scope, banning them would not solve anything. Even if we do have privacy issues in the United States, National Security Letters are not the problem. Caproni and Siegel 12 (Valerie Caproni and Steven Siegel for American Bar Association. “National Security Letters: Building Blocks for Investigation or Intrusive Tools?” Online http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusive_t/) Congress first granted the Federal Bureau of Investigation the authority to use National Security Letters in 1986. This authority ensured that the FBI would have the necessary tools to investigate threats to the national security posed by terrorists and spies because Congress had, at the same time, enacted statutory privacy protection to certain classes of records held by third-party businesses. Congress then understood a principle that remains true to this day: To appropriately and efficiently investigate threats to the national security, the FBI needs the ability to gather very basic information about individuals, including information about their finances, where they live and work, and with whom they are in contact, without alerting the targets that it is doing so.The NSL authority is now and always has been quite limited. First, unlike grand jury subpoenas that can be used to collect any nonprivileged document from any person or entity, the FBI can use NSLs only to obtain a very narrow range of information from a very narrow range of third-party businesses: NSLs can be used to obtain transactional information from wire or electronic communications service providers (e.g., telephone companies and Internet service providers); financial institutions (e.g., banks and credit card issuers); and credit reporting agencies. Other documents that can be critical to a national security investigation (e.g., hotel records, employment records) cannot be obtained using an NSL. Second, unlike grand jury subpoenas that can be issued in any sort of criminal case, NSLs can only be used during duly authorized national security investigations . Finally, unlike grand jury subpoenas that can be issued by any assistant U.S. attorney or Department of Justice prosecutor, no matter how junior or inexperienced, NSLs can only be issued with very high-level FBI approval.Although the NSL authority is quite limited, NSLs are nevertheless critical tools that enable FBI investigators to gather the sort of basic information needed as the “building blocks” of national security investigations. It is not an exaggeration to say that virtually every significant national security investigation, whether of an individual suspected of planning to wreak havoc through an act of terrorism or of an individual suspected of spying on the United States for the benefit of a foreign nation, requires the use of NSLs for at least some critical information. 59 CMSDL Core Files 2015-2016 *** Drone Affirmative 60 CMSDL Core Files 2015-2016 1AC 61 CMSDL Core Files 2015-2016 Drones 1AC - Plan We present the following plan: The United States Federal Government should substantially curtail its use of warrantless unpiloted aerial vehicles in the United States 62 CMSDL Core Files 2015-2016 Contention One is Harms - Civil Liberties: The Federal Bureau of Investigation is operating drones in over 30 cities in the status quo- these surveillance operations are conducted without warrants Washington Post 2015 - “FBI behind mysterious surveillance aircraft over US cities”http://www.washingtonpost.com/world/national-security/fbi-behind-mysterious-surveillance-aircraft-over-uscities/2015/06/02/030ce2e2-0959-11e5-951e-8e15090d64ae_story.html, June 2 The FBI is operating a small air force with scores of low-flying planes across the country using video and sometimes cellphone surveillance technology — all hidden behind fictitious companies that are fronts for the government, The Associated Press has learned.¶ The surveillance equipment is generally used without a judge’s approval, and the FBI says the flights are used for specific investigations. The agency says it uses front companies to protect the safety of the pilots and aircraft, shielding their identities from would-be suspects on the ground.¶ In a recent 30-day period, an AP review found, the FBI flew above more than 30 cities in 11 states across the country, including parts of Boston, Chicago, Dallas, Houston, Minneapolis, Phoenix, Seattle, and Southern California. Drones threaten our basic rights- warrantless surveillance is becoming the norm among law enforcement Molko 2013- Robert, “The Drones Are Coming! ¶ WILL THE FOURTH AMENDMENT STOP THEIR ¶ THREAT TO OUR PRIVACY?” http://practicum.brooklaw.edu/sites/default/files/print/pdfs/journals/brooklyn-law-review/volume78/issue-4/blr_v78iv_1.pdf Over the years, courts ¶ have permitted aerial ¶ surveillance from navigable airspace where civilian planes or ¶ helicopters routinely fly,¶ 9¶ although they have prohibited such ¶ surveillance if it occurred from unusually low altitudes.¶ 10¶ Today, however, advances in surveillance and optics technology ¶ have made it possible to detect¶ very small objects from high ¶ altitudes.¶ 11¶ In addition to these advances, stealth technology¶ 12¶ enables drones to hover above us, silently monitoring ¶ everything we do in areas exposed to the sky.¶ 13¶ Drone ¶ technology, when carried to its ¶ extreme, threatens to destroy ¶ whatever vestiges of privacy remain in modern society, even in ¶ areas like a secluded, fenced-i¶ n backyard or private estate. ¶ Many local law enforcement agencies have already ¶ begun implementing these aerial surveillance technologies. For ¶ example, the city of Lancaster,¶ California recently began using ¶ aerial surveillance to monitor the city’s neighborhoods.¶ 14¶ There, ¶ a plane will fly above the city for up to ten hours a day.¶ 15¶ “Drones are [also] being considered by [San Francisco] Bay ¶ Area law enforcement agencies as¶ a cost-cutting way to replace ¶ helicopters . . . and use technology to fight crime and save ¶ lives.”¶ 16¶ Moreover, North Dakota police recently used a drone to ¶ monitor activity on a ranch to determine when its occupants ¶ would be unarmed in order to avoid a violent shootout when apprehending the suspects. 17¶ Police in Gadsden, Alabama, ¶ bought “a lightweight ¶ drone . . . to help in¶ drug investigations.”¶ 18¶ Authorities in Tampa Bay, Florida, considered using drones for ¶ security surveillance at the 2012 Republican National ¶ Convention.¶ 19¶ The Montgomery County Sheriff’s Office in Texas ¶ has even considered arming a drone with rubber bullets and ¶ tear gas.¶ 20¶ These represent only a small sampling of local law ¶ enforcement agencies that have begun to use drones.¶ 21¶ At the same time, two private software companies, ¶ Apple and Google, used aerial surveillance and military-grade ¶ cameras in a race to create detailed, three-dimensional images ¶ of city and residential streets throughout the world.¶ 22¶ These ¶ cameras are so powerful that “they can show objects just four ¶ inches wide” and “potentially see into homes through skylights ¶ and windows.”¶ 23¶ Apple’s rush to outdo Google led to its ¶ catastrophic premature release of three-dimensional visual ¶ flyovers in Apple Maps in September 2012, which it has been ¶ trying to correct ever since. On the legislative side, on February 14, 2012, President ¶ Obama signed into law the FAA Modernization and Reform Act ¶ of 2012.¶ 25¶ This law requires the FAA to expedite the process of ¶ authorizing both public and private use of drones in the ¶ national navigable airspace.¶ 26¶ This statutory mandate will ¶ inevitably reduce our privacy through increased aerial surveillance ¶ of neighborhoods and public places by law enforcement drones, ¶ bringing us ever closer to an Orwellian state.¶ 27¶ Indeed, “[t]he ¶ government has predicted that as many as 30,000 drones will be ¶ flying over U.S. skies by the end of the decade.”¶ 28¶ Some experts ¶ predict that those drones will be¶ used by “journalists, police ¶ departments, disaster rescue te¶ ams, scientists, real estate ¶ agents, and private citizens.”¶ 29 This is the most important impact in the debate- the judge must reject all invasions of liberty Petro 1974 - Professor of Law @ Wake Forest University. University of Toledo Law Review Spring 1974, page. 480 However, one may still insist, echoing Ernest Hemingway—“I believe in only one thing: liberty”. And it is always well to bear in mind David Hume’s observation: “It is seldom that liberty of any kind is lost all at once.” Thus, it is unacceptable to say that the invasion of one aspect of freedom is of no import because there have been invasions of so many other aspects. That road leads to chaos, tyranny, despotism and the end of all human aspiration. Ask Solzhenistyn. Ask Milovan Djilas. In sum, if one believes in freedom as a supreme value and the proper ordering principle for any society aiming to maximize spiritual and material welfare, then every invasion of freedom must be emphatically identified and resisted with undying spirit. 63 CMSDL Core Files 2015-2016 Contention Two is Harms - Innovation: Drone technology is inevitable- the plan ensures that it is used responsibly. This increases public confidence in drones, enabling commercial innovation The National Journal 2013- February 21, “The Backlash Against Drones” http://www.nationaljournal.com/magazine/the-backlash-against-drones-20130221 The Seattle Police Department’s planned demonstration of its small surveillance drones quickly devolved into a noisy protest. Angry residents attending the community meeting in October chanted “No drones!” drowning out officers’ attempts to explain how the unmanned aerial vehicles would support certain criminal investigations, help out during natural disasters, and assist in search-and-rescue operations. Now it’s clear that Seattle’s drones, purchased with federal grants, won’t be flying over the metro area anytime soon. Amid backlash from civil-liberties advocates and citizens worried about government invasion of their privacy, the mayor earlier this month tabled any drone ambitions—for now.¶ Public concerns are not limited to Seattle. Lawmakers in at least 11 states want to restrict the use of drones because of fears they will spy on Americans, and some are pushing to require warrants before the robots collect evidence in investigations. Just this month, the Virginia General Assembly passed a two-year moratorium on drones. The outcry comes after the Electronic Frontier Foundation sued last year for a list of drone applicants within the U.S. When that information went public, staff attorney Jennifer Lynch says, “it really got people up in arms about how drones are being used, and got people to question their city councils and local law-enforcement agencies to ask for appropriate policies to be put in place to regulate drone usage.”¶ Drones change the game: Nearly continuous surveillance could be possible without a physical intrusion such as a property search or an implanted listening device. The flying robots can carry high-powered cameras, even facial-recognition software or thermal imaging to “see” through walls. They can hover, potentially undetected, for hours or days at a time.¶ As of yet, however, there are no laws governing the use of domestic drones when it comes to privacy. Unless Congress or the executive branch moves to regulate the robots’ use before they take to the skies en masse, states will likely continue to try to limit or ban drone use altogether, which could stymie their potential for other, beneficial uses. And failing to enact privacy limits only increases the likelihood of an incident in which the public perceives that the technology is being misused.¶ The Federal Aviation Administration, which is charged with overseeing drone implementation in the U.S., says its focus is “totally on safety,” not privacy worries. “We are concerned about how it’s being used only to the extent it would affect the safety of the operation,” says FAA spokesman Les Dorr. Commercial drones are the lynchpin of U.S. growth and leadership- addressing privacy concerns will reduce bureaucratic pressure and enable innovation Washington Monthly 2015“Why is American Losing the Commercial Drone Wars?” http://www.washingtonmonthly.com/magazine/junejulyaugust_2015/features/why_is_america_losing_the_comm0558 94.php?page=all Commercial drones, then, could be a fundamental technology driving innovation and growth in coming years. As the world’s traditional leader in aviation technology (and, for better or worse, the world’s foremost military drone pioneer), the U.S. ought to command this industry.¶ There’s only one hitch: companies like Airware can’t sell many of their products in the U.S. That’s because the Federal Aviation Administration (FAA) has been slow to write the regulations drone makers need to test and operate in U.S. airspace. This past February, after years of missed deadlines, the FAA finally published a draft version of regulations for small drones—a notice of proposed rulemaking (NPRM), in Washington argot. The finished version of the rule probably won’t be ready until late 2016 or early 2017, according to the Government Accountability Office. Meanwhile, countries such as the UK, France, Switzerland, Australia, New Zealand, and Japan have had rules for testing and using drones on the books for several years—rules significantly less restrictive than those in the FAA’s recent NPRM.¶ As a result, American firms are being lured abroad by the more flexible regulatory frameworks of foreign governments. Google is testing package delivery drone technology in Australia. Amazon is doing the same in Canada. Airware is busy selling its products to drone companies in Australia and Europe. Meanwhile, a company called DJI, based in Shenzhen, China, now dominates the world market for smaller, lower-cost commercial drones.¶ The business press and tech websites are filled with stories slamming the FAA’s tardy and constricted regulations. It seems like a classic example of incompetent federal bureaucracy getting in the way of economic progress . Conservatives certainly see it that way. “The FAA is failing big time,” writes Marc Scribner, a fellow with the Competitive Enterprise Institute, because the agency is “mired in its own bureaucracy.” “The FAA is adopting a hyper-precautionary principle position that is holding back innovation,” Adam Thierer, a fellow at the libertarian Mercatus Center at George Mason University, has written.¶ Of course, there’s good reason to be careful and deliberate when it comes to easing restrictions on commercial drones. Nobody wants unmanned aircraft snooping through bedroom windows or getting sucked into jet engines. Still, conservative critics have a point. Other advanced countries have already found ways to allow this industry to grow, with no notable safety problems so far. Why is the FAA lagging? 64 CMSDL Core Files 2015-2016 Commercial drones are key to agriculture- data collection provides vital information to protect against food shortages Washington Monthly 2015“Why is American Losing the Commercial Drone Wars?” http://www.washingtonmonthly.com/magazine/junejulyaugust_2015/features/why_is_america_losing_the_comm0558 94.php?page=all But perhaps the most important immediate application is agriculture. Drones could “provide detailed scouting information on weed emergence, insect infestations, and potential nutrient shortages,” Jeff Vanderwerff of the American Farm Bureau Federation told the U.S. Senate this spring. This valuable information allows the farmer to catch these threats “before they develop into significant and catastrophic problems.” Down the road, drones could also enable so-called field-based phenotyping. This involves flying drones over test fields and taking images of experimental varieties of crops designed to, say, build more biomass or thrive in the heavy-rains-followed-by-drought conditions that climate change is causing. Plant geneticists would then analyze the data from the drones to see which tweaks they’ve made to the plants’ DNA actually work best under real-life conditions. This, in theory, could dramatically speed up the process and lower the cost of developing new and better crop strains. “Maybe ‘Holy Grail’ is overstating it,” says Sam Fiorello, CEO of the Donald Danforth Plant Science Center in St. Louis, which provides cutting-edge research for AgTech startups, “but it’s a huge advance in plant research.” The prospect of food insecurity alone causes conflict Klare 2013, Michael T., April 22, Author and Professor of Peace and World-Security Studies, Hampshire College, Huffington Post, http://www.huffingtonpost.com/michael-t-klare/resource-scarcity-climate-change_b_3132268.html Start with one simple given: the prospect of future scarcities of vital natural resources, including energy, water, land, food, and critical minerals. This in itself would guarantee social unrest, geopolitical friction, and war. It is important to note that absolute scarcity doesn’t have to be on the horizon in any given resource category for this scenario to kick in. A lack of adequate supplies to meet the needs of a growing, ever more urbanized and industrialized global population is enough. Given the wave of extinctions that scientists are recording, some resources -- particular species of fish, animals, and trees, for example -- will become less abundant in the decades to come, and may even disappear altogether. But key materials for modern civilization like oil, uranium, and copper will simply prove harder and more costly to acquire, leading to supply bottlenecks and periodic shortages. Oil -- the single most important commodity in the international economy -- provides an apt example. Although global oil supplies may actually grow in the coming decades, many experts doubt that they can be expanded sufficiently to meet the needs of a rising global middle class that is, for instance, expected to buy millions of new cars in the near future. In its 2011 World Energy Outlook, the International Energy Agency claimed that an anticipated global oil demand of 104 million barrels per day in 2035 will be satisfied. This, the report suggested, would be thanks in large part to additional supplies of “unconventional oil” (Canadian tar sands, shale oil, and so on), as well as 55 million barrels of new oil from fields “yet to be found” and “yet to be developed.” However, many analysts scoff at this optimistic assessment, arguing that rising production costs (for energy that will be ever more difficult and costly to extract), environmental opposition, warfare, corruption, and other impediments will make it extremely difficult to achieve increases of this magnitude. In other words, even if production manages for a time to top the 2010 level of 87 million barrels per day, the goal of 104 million barrels will never be reached and the world’s major consumers will face virtual, if not absolute, scarcity. Water provides another potent example. On an annual basis, the supply of drinking water provided by natural precipitation remains more or less constant: about 40,000 cubic kilometers. But much of this precipitation lands on Greenland, Antarctica, Siberia, and inner Amazonia where there are very few people, so the supply available to major concentrations of humanity is often surprisingly limited. In many regions with high population levels, water supplies are already relatively sparse. This is especially true of North Africa, Central Asia, and the Middle East, where the demand for water continues to grow as a result of rising populations, urbanization, and the emergence of new water-intensive industries. The result, even when the supply remains constant, is an environment of increasing scarcity. Wherever you look, the picture is roughly the same: supplies of critical resources may be rising or falling, but rarely do they appear to be outpacing demand, producing a sense of widespread and systemic scarcity. However generated, a perception of scarcity -- or imminent scarcity -- regularly leads to anxiety, resentment, hostility, and contentiousness. This pattern is very well understood, and has been evident throughout human history. In his book Constant Battles, for example, Steven LeBlanc, director of collections for Harvard’s Peabody Museum of Archaeology and Ethnology, notes that many ancient civilizations experienced higher levels of warfare when faced with resource shortages brought about by population growth, crop failures, or persistent drought. Jared Diamond, author of the bestseller Collapse, has detected a similar pattern in Mayan civilization and the Anasazi culture of New Mexico’s Chaco Canyon. More recently, concern over adequate food for the home population was a significant factor in Japan’s invasion of Manchuria in 1931 and Germany’s invasions of Poland in 1939 and the Soviet Union in 1941, according to Lizzie Collingham, author of The Taste of War. Although the global supply of most basic commodities has grown enormously since the end of World War II, analysts see the persistence of resource-related conflict in areas where materials remain scarce or there is anxiety about the future reliability of supplies. Many experts believe, for example, that the fighting in Darfur and other war-ravaged areas of North Africa has been driven, at least in part, by competition among desert tribes for access to scarce water supplies, exacerbated in some cases by rising population levels. 65 CMSDL Core Files 2015-2016 Contention Three is Solvency: Requiring warrants for drone surveillance resolves privacy concerns while allowing for drone use in critical national security matters- this no links all disadvantages Congress.gov 2012- “H. R. 5925” https://www.congress.gov/bill/112th-congress/house-bill/5925/text To protect individual privacy against unwarranted governmental intrusion through the use of the unmanned aerial vehicles commonly called drones, and for other purposes. ¶ Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, ¶ SECTION 1. Short title. ¶ This Act may be cited as the “Preserving Freedom from Unwarranted Surveillance Act of 2012”. ¶ SEC. 2. Prohibited use of drones. ¶ Except as provided in section 3, a person or entity acting under the authority of the United States shall not use a drone to gather evidence or other information pertaining to criminal conduct or conduct in violation of a regulation except to the extent authorized in a warrant issued under the procedures described in the Federal Rules of Criminal Procedure. ¶ SEC. 3. Exceptions. ¶ This Act does not prohibit any of the following: ¶ (1) PATROL OF BORDERS.—The use of a drone to patrol national borders to prevent or deter illegal entry of any immigrants or illegal substances. ¶ (2) EXIGENT CIRCUMSTANCES.—The use of a drone by a law enforcement party when exigent circumstances exist. For the purposes of this paragraph, exigent circumstances exist when the law enforcement party possesses reasonable suspicion that under particular circumstances, swift action to prevent imminent danger to life or serious damage to property, or to forestall the imminent escape of a suspect, or destruction of evidence. ¶ (3) HIGH RISK.—The use of a drone to counter a high risk of a terrorist attack by a specific individual or organization, when the Secretary of Homeland Security determines credible intelligence indicates there is such a risk. ¶ SEC. 4. Remedies for violation. ¶ Any aggrieved party may in a civil action obtain all appropriate relief to prevent or remedy a violation of this Act. ¶ SEC. 5. Definitions. ¶ In this Act: ¶ (1) The term “drone” means any powered, aerial vehicle that does not carry a human operator, uses aerodynamic forces to provide vehicle lift, can fly autonomously or be piloted remotely, can be expendable or recoverable, and can carry a lethal or nonlethal payload. ¶ (2) The term “law enforcement party” means a person or entity authorized by law to investigate or prosecute offenses against the United States. 66 CMSDL Core Files 2015-2016 2AC Harms Frontlines 67 CMSDL Core Files 2015-2016 2AC Civil Liberties Extensions 68 CMSDL Core Files 2015-2016 2AC Civil Liberties Extensions - ANSWERS TO: Obama Regulating Drones Now Obama’s directive on drones is too vague and does not fully regulate their use Levin 2015- Alan, Bloomberg, “Obama Drone Policy Gives FBI Leeway on Privacy Decisions” http://www.bloomberg.com/news/articles/2015-02-17/obama-drone-policy-gives-fbi-leeway-to-decide-what-s-private The White House’s attempt to set privacy policies for government agencies using drones doesn’t go far enough for civilliberties advocates in the U.S.¶ President Barack Obama’s directive on how unmanned aircraft may be used to gather information on citizens is too vague and lacks protections such as getting a judge’s permission before using drones for surveillance, said Neema Singh Guliani, legislative counsel for the American Civil Liberties Union.¶ “That’s simply not strong enough, given how invasive drones can be,” Guliani said in an interview.¶ As aviation regulators struggled to find a way to govern the flood of drones in U.S. skies, law enforcement agencies including the FBI began using the new technology before government-wide policies could be written.¶ Obama tried to correct that on Sunday, issuing a directive that sets limits on how unmanned aircraft may be used by federal agencies to gather information on people. While the White House said government drones must be used lawfully and “consistent with the Constitution,” civil-liberties advocates are zeroing in on another phrase in the directive: Gathering information on drones may only be done for an “authorized purpose.”¶ “The guidance is pretty vague and doesn’t act to restrict what law enforcement can use drones for.” Guliani said. Additionally, lack of oversight and accountability to the public means drone use will rise exponentially, altering the very character of American life ACLU 2011- December, American Civil Liberties Union. “Protecting Privacy ¶ From Aerial Surveillance:¶ Recommendations for Government Use of Drone Aircraft” https://www.aclu.org/files/assets/protectingprivacyfromaerialsurveillance.pdf In short, all the pieces appear to be lining up for the eventual introduction of routine aerial surveillance in American life—a development that would profoundly change the character of public ¶ life in the United States.¶ We need a system of rules to ensure that we can enjoy the benefits of this technology without ¶ bringing us a large step closer to a “surveillance society” in which our every move is monitored, ¶ tracked, recorded, and scrutinized by the authorities. In this paper, we outline a set of protections ¶ that we believe would protect Americans’ privacy in the coming world of drones. ¶ Aerial surveillance from manned aircraft has been ¶ with us for decades. One of the first aircraft the Wright ¶ brothers built was a surveillance aircraft, and it was ¶ sold to the U.S. Army. Many common uses of drone ¶ aircraft—search and rescue, fighting wildfires, dangerous tactical police operations—are beneficial. In the 1980s the Supreme Court ruled that the Fourth ¶ Amendment does not categorically prohibit the government from carrying out warrantless aerial surveillance of private property. ¶ But ¶ manned aircraft are expensive to purchase, operate and maintain, and this expense has ¶ always imposed a natural limit on the government’s aerial surveillance capability. Now that surveillance can be carried out by unmanned aircraft, this natural limit is eroding. The prospect of ¶ cheap, small, portable flying video surveillance machines threatens to eradicate existing practical ¶ limits on aerial monitoring and allow for pervasive surveillance, police fishing expeditions, and ¶ abusive use of these tools in a way that could eventually eliminate the privacy Americans have ¶ traditionally enjoyed in their movements and activities. 69 CMSDL Core Files 2015-2016 2AC Civil Liberties Extensions - Impact 1. Extend our Petro evidence- life is not worth living without basic freedoms and a guarantee of privacy. Totalitarianism robs us of our individual worth. This answers their Cummisky evidence. A consequentialist framework presumes that each life being weighed is said to have equal and unique worth, however absent the affirmative, individuals do not have unique worth since the state does not regard the life of its citizens as an end in itself, but a means to national security. 2. Even if there are other instances of invasion of privacy we will win that drones are particularly harmful – our evidence states that routine aerial surveillance will alter the very character of American life since citizens will be perpetually watched. The routine, persistent, and inconspicuous nature of drone technology makes it different from other forms of government intrusion 3. Our evidence does state that FBI surveillance can occur without a warrant because drones can fly overhead without detection they can monitor areas of an individual’s home without explicit permission 4. Privacy rights are key to a meaningful life- it forms the basis of the social contract between individuals and the state Foster 2008- Oxford University Press, Human Rights and Civil Liberties pg. 159 ¶ The right to privacy, or the right to private life, is at the heart of individual freedom and the right to be free from arbitrary state interference. Traditionally, the right to privacy referred to the right to be let alone and the right to enjoy one's individual space, which the state or other individuals should not penetrate. This includes the right to enjoy one's property as well as being free from physical interference and thus allows the individual to enjoy an individual and private existence within a state; although in Niemietz v Germany (1992) 16 EMIR 97 the European Court held that the notion of private life was not restricted to the person’s inner circle, but includes the right to develop and establish relationships with other human beings. The enjoyment of privacy and private life is, therefore, essential in honoring the 'social contract', whereby the state allows the individual basic individual rights irrespective of their allegiance to and dependence on the state. Privacy or private life may also refer to the right of personal autonomy and human dignity, demanding the individual has the right to make choices about the, life, such as whom they marry, whether they should undertake medical treatment, or whether they have the right to die (Pretty v United Kingdom (2002)35 EHRR 1). Equally, the right to private life can be used alongside the right to be free from inhuman or degrading treatment and thus protect a person from attacks on their person or personal dignity (Costello-Roberts United Kingdom (1993) 19 EHRR 112). More specifically, the right to private life, referred to in this context as the light to privacy, includes the right to choose and practice one's sexual orientation free from undue interference or prosuiption by the state, and privacy is often referred to in connection to the right to lit free from press intrusion or the right to withhold, or access, personal information. 70 CMSDL Core Files 2015-2016 2AC Innovation 1. There is an impact to food insecurity- prefer our 1AC evidence states that the prospect alone could cause conflict- as countries feel food insecure they will either stat wars to divert public attention away from food shortages or start them to gain resources 2. Drone innovation is not inevitable- extend our 1AC evidence, the commercial drone industry is still at a beginning stage. To ensure that innovation and investment continues, key privacy concerns must be resolved first 3. The Drone industry is not resilient- our evidence indicates that public opinion forms the basis of all legislation that curtails the use of commercial drones 71 CMSDL Core Files 2015-2016 2AC Solvency 1. Piloted aerial surveillance does not pose the same risks to privacy as drone surveillanceextend our congress.gov evidence, the plan allows for the commercial and civilian uses for drones that their evidence refers to, it merely requires that a warrant be issued if the government wants to conduct specific investigations. 2. The plan is the best compromise between an outright ban of drones and unfettered drone usage. By requiring warrants, the plan shores up U.S. credibility and ensures the protection of key privacy rights while securing the beneficial aspects of drones. 72 CMSDL Core Files 2015-2016 ANSWERS TO: Elections Disadvantage (Drones Affirmative) (NOTE: Use only with LINK TURN strategy, NOT Impact Turn strategy) Link Turn: Concern over drone usage is bipartisan and on the rise Catherine Crump, Jay Stanley, 2-11-2013, "Why Americans Are Saying No to Domestic Drones," Slate Magazine, http://www.slate.com/articles/technology/future_tense/2013/02/domestic_surveillance_drone_bans_are_sweeping_t he_nation.html)//GV In the past year, the American public has begun to pay more and more attention to the issue of domestic surveillance drones. And now, recent events suggest we might be seeing the emergence of a genuine national movement against the use of surveillance drones by law enforcement. With any luck, this may even set the stage for a wider dialogue about the increasingly intrusive technologies that are intended to catch crooks—but that all too often cast an overly broad net. Last week, after an especially raucous city council hearing, the Seattle police department terminated its drones program and agreed to return the purchased equipment to the manufacturer. This came just days after both houses of the Virginia state legislature passed historic bills imposing a two-year moratorium on the use of drones by law enforcement and regulatory agencies in the state. In Florida, a potentially even more significant bill imposing a judicial warrant requirement on police use of drones continued to march toward passage. Similar legislation has been proposed in at least 13 other state legislatures around the country so far. Of all the threats to privacy that we face today, why have drones caught the attention of the American public to such a remarkable degree? One possibility is that there’s something uniquely ominous about a robotic “eye in the sky.” Many privacy invasions are abstract and invisible—data mining, for example, or the profiling of Internet users by online advertisers. Drones, on the other hand, are concrete and real, and the threat requires no explanation. But they are just the most visible example of a host of new surveillance technologies that have the potential to fundamentally alter the balance of power between individuals and the state. Physically tailing a suspect requires teams of police officers working 24/7, but now police can slap GPS devices on a suspect’s car and then sit in the station house tracking his movements on a laptop. Now that the wholesale surveillance of American life is becoming cheap and easy, legal protections are all the more important. The drone issue has also gained momentum because the concern over it is bipartisan. While Democrats get most of the credit for pushing back on national surveillance programs, it was the Republican Party’s 2012 platform that addressed domestic surveillance drones, stating that “we support pending legislation to prevent unwarranted or unreasonable governmental intrusion through the use of aerial surveillance.” The ACLU of Virginia, for instance, teamed up with one of the state’s most conservative lawmakers to introduce a drone regulation bill in the state House of Delegates, while its Senate companion bill was introduced by a progressive. Florida’s drone regulation legislation is being almost entirely pushed by conservatives—and in most states, the legislative efforts we’ve seen so far have been conservative or bipartisan. Privacy issues are always less partisan than many other political questions, but the support for action on drones from both left and right has been remarkable. It’s notable how different all of this is from the way surveillance technologies are normally adopted. There has actually been an opportunity for debate before drones have been widely deployed. We have the Federal Aviation Administration to thank for this state of affairs. At least for now, drones are largely banned by the FAA, which is concerned about the obvious safety issues: We can’t have our skies filled with flying robots colliding with passenger aircraft or plummeting into people’s houses. (This state of affairs will not last: Congress has ordered the FAA to integrate drones into the national airspace by 2015.) What we usually see happen with new law enforcement technologies is that agencies quickly and quietly snap them up, making their deployment a fait accompli before the public even learns of their existence, let alone has a chance to debate their privacy implications or democratically decide upon the correct balance between privacy and police power. At that point, taking privacy into account is an uphill battle because the tax dollars have already been spent and the technology integrated into the department’s approach to crime fighting. With drones, on the other hand, because of the safety and regulatory issues they raise, we have a chance to do it right. The American public and our elected representatives can, for once, get ahead of the deployment curve—we can raise awareness, propose protections, and build support for them before the problems hit us in the face. If done right, this moment of hyperawareness about privacy could become a more permanent state of affairs: Ryan Calo of Stanford’s Center for Internet and Society suggested in a December 2011 paper that because of their “disquieting” nature, drones “could be just the visceral jolt society needs” to spark broader changes in how Americans conceptualize privacy problems. Ultimately, the best solution on drones would be for Congress to pass strong, uniform rules protecting everyone across the nation and putting privacy concerns to rest. For example, law enforcement agents should not make drones general tools of surveillance but should instead utilize them only where they have a specific reason to believe that use of one will turn up evidence of criminal activity. Ideally, those protections would become a model for other, perhaps less vivid but equally intrusive But unless and until Congress acts, state and local resolutions and rules are the best thing Americans can do to protect our privacy from the enormously invasive potential of domestic surveillance drones. The upsurge in local activism around the country is just what’s needed to make this happen. technologies such as cellphone location tracking. Link Turn: Americans hate domestic drone usage Rasmussen Reports, 2-13-2012, "Voters Are Gung-Ho for Use of Drones But Not Over the United States," No Publication, http://www.rasmussenreports.com/public_content/politics/current_events/afghanistan/voters_are_gung_ho_for_use_of_drones_but_not_over_the_united_states)//GV Congress passed legislation last week that will make it easier for U.S. police agencies to use drones for surveillance in this country, but 52% of voters are opposed. Only 30% favor the use of unmanned drones for domestic surveillance. Seventeen percent (17%) are undecided. The United States has used the drones to go after terrorists in Iraq and Afghanistan. Voters' perceptions that the situation in Iraq will get better have fallen to an all-time low. There's similar pessimism about Afghanistan, but voters are still relatively confident that the United States and its allies are winning the war on terror. (Want a free daily e-mail update? If it's in the news, it's in our polls). Rasmussen Reports updates are also available on Twitter or Facebook. The survey of 1,000 Likely Voters was conducted on February 10-11, 2012 by Rasmussen Reports. The margin of sampling error is +/- 3 percentage points with a 95% level of confidence. Field work for all Rasmussen Reports surveys is conducted by Pulse Opinion Research, LLC. See methodology. Sixty-eight percent (68%) of voters say they have followed recent news reports about the United States' use 73 CMSDL Core Files 2015-2016 of unmanned drone aircraft, with 31% who have been following Very Closely. Most voters of any political persuasion are supportive of the use of drones to kill terrorists, but Republicans (88%) are even more enthusiastic than Democrats (65%) and voters not affiliated with either party (74%). A plurality (45%) of Democrats thinks avoiding diplomatic problems with countries like Pakistan is more important than using drones to kill terrorists, but 66% of GOP voters and 45% of unaffiliateds disagree. There's general agreement among the groups, however, that the president can go it alone with drones without seeking Congress' approval. Similarly, all three generally are opposed to the use of drones domestically, but Republicans (45%) are less strongly opposed than Democrats (53%) and unaffiliated voters (59%). 74 CMSDL Core Files 2015-2016 *** Drone Negative 75 CMSDL Core Files 2015-2016 1NC Advantage Frontlines 76 CMSDL Core Files 2015-2016 1NC Civil Liberties FRONTLINE 1. Privacy invasions are inevitable- drone technology is not uniquely harmful Thompson 2013 – Richard, legislative attorney, April, “Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses” Congressional Research Service https://www.fas.org/sgp/crs/natsec/R42701.pdf The crucial question, then, is whether drones have the potential to be significantly more invasive than traditional surveillance technologies such as manned aircraft or low-powered cameras— technologies that have been upheld in previous cases. In this vein, some have asked whetherusing sophisticated digital platforms on a drone is any different from attaching the same instrument to a lamppost or traditional aircraft.108 Take, for example, the tracking of license plates. Currently, many states and municipalities employ automatic license plate readers (ALPRs), which are usually mounted on police vehicles or stationary objects along the streets, to take a snapshot of a license plate as a car drives by, and store this information in a large database for possible later use by law enforcement.109 It is alleged that these devices can be used to track a person’s movements when police aggregate the data from a multitude of ALPR stations.110 A majority of the reviewing federal circuit courts have held that a person has no reasonable expectation of privacy in his license plate number.111 2. No risk of drone abuse - the federal government is increasing oversight of drone use in the status quo Washington Post 2015- “FAA rules might allow thousands of business drones”, Feb 15 http://www.washingtonpost.com/world/national-security/faa-releases-proposed-rules-for-domestic-droneuse/2015/02/15/6787bdce-b51b-11e4-a200-c008a01a6692_story.html While the FAA rules are designed to exploit the economic potential of drones without jeopardizing aviation safety, the order issued Sunday by President Obama is intended to safeguard personal privacy and require the federal government to be more forthcoming about when and where it uses drones to conduct surveillance.¶ All federal agencies, for example, would have to disclose where they conduct drone operations within the United States, as well as their policies for storing and protecting personal information collected from surveillance flights. Agencies would also have to issue an annual report detailing the types of missions they flew in the previous year.¶ The order will have a large impact on the Defense Department and law enforcement agencies such as the FBI and the Department of Homeland Security, which uses drones to patrol the nation’s borders. The FBI has been especially secretive about its drone operations, even ducking lawmakers’ queries about how many it has and how often they are used.¶ “It is a very big deal and a very positive step,” said Lisa Ellman, a former Justice Department official who helped prepare the presidential order and works on drone issues as a lawyer in private practice. The agencies, she said, “understand that even with all the benefits of drones, the American public has concerns — concerns about privacy and concerns about accountability.”¶ In addition, Obama directed the Commerce Department to work with companies and the drone industry to develop a voluntary code of conduct for the private sector regarding surveillance and privacy protections. 77 CMSDL Core Files 2015-2016 1NC Innovation FRONTLINE 1. No impact to food insecurity- several studies prove there is no correlation between a lack of food and conflict Salehyan 2007 – Professor of Political Science – University of North Texas (Idean, “The New Myth About Climate Change”, Foreign Policy, August 13 http://www.foreignpolicy.com/story/cms.php?story_id=3922) First, aside from a few anecdotes, there is little systematic empirical evidence that resource scarcity and changing environmental conditions lead to conflict. In fact, several studies have shown that an abundance of natural resources is more likely to contribute to conflict. Moreover, even as the planet has warmed, the number of civil wars and insurgencies has decreased dramatically. Data collected by researchers at Uppsala University and the International Peace Research Institute, Oslo shows a steep decline in the number of armed conflicts around the world. Between 1989 and 2002, some 100 armed conflicts came to an end, including the wars in Mozambique, Nicaragua, and Cambodia. If global warming causes conflict, we should not be witnessing this downward trend. Furthermore, if famine and drought led to the crisis in Darfur, why have scores of environmental catastrophes failed to set off armed conflict elsewhere? For instance, the U.N. World Food Programme warns that 5 million people in Malawi have been experiencing chronic food shortages for several years. But famine-wracked Malawi has yet to experience a major civil war. Similarly, the Asian tsunami in 2004 killed hundreds of thousands of people, generated millions of environmental refugees, and led to severe shortages of shelter, food, clean water, and electricity. Yet the tsunami, one of the most extreme catastrophes in recent history, did not lead to an outbreak of resource wars. Clearly then, there is much more to armed conflict than resource scarcity and natural disasters. 2. Drone innovation is inevitable- the plan’s boost in not necessary McNeal, 2014 Gregory, professor at Pepperdine University School of Law and a contributor to Forbes. He is an expert in law and public policy with a specific focus on security, technology and crime. Drones and Aerial Surveillance: Considerations For Legislators, November http://www.brookings.edu/~/media/Research/Files/Reports/2014/10/dronesaerial-surveillance-legislators/Drones_Aerial_Surveillance_McNeal_FINAL.pdf?la=en, /Bingham-MB The domestic use of drones by law enforcement is a popular topic following passage of the FAA Modernization and Reform Act of 2012. The act directed that the FAA must integrate unmanned aircraft systems—drones—into the national airspace by September of 2015 . A number of organizations have expressed concern over the possibility that thousands of drones will be crowding the skies, some armed with sophisticated cameras. The ACLU, for example, has been quite vocal in its criticism releasing a report that sets out their concerns over the prospect of intrusive aerial surveillance without proper safeguards. While a robust public debate over the use of domestic drones is warranted, the conclusion that widespread privacy violations are imminent is premature. While the FAA Modernization and Reform Act seeks the integration of unmanned aircraft into U.S. airspace by September 30, 2015, most of the provisions dealing with unmanned aircraft create a broad framework under which the FAA can explore the uses and feasibility of integration of this new technology. The key sections of the law direct the Secretary of Transportation and the Administrator of the FAA to draft plans, standards, and rules to ensure that drone integration proceeds in a safe and legal manner. In short, this is a public process where civil liberties and privacy groups will no doubt have a voice in crafting rules, and that voice seems to be at least as effective as the industry association’s voice. What is left out of the process is what state and local governments will do with the technology, and that is the primary focus of this paper. 78 CMSDL Core Files 2015-2016 1NC Solvency FRONTLINE 1. Turn- the aff’s characterization of drones is overblown- their insistence on regulating drones leaves the most invasive forms of piloted aerial surveillance intact McNeal 2014- Gregory, professor, Pepperdine University, School of Law, “Drones and ¶ Aerial Surveillance: ¶ Considerations For Legislators” Brookings Institute http://www.brookings.edu/~/media/Research/Files/Reports/2014/10/drones-aerial-surveillancelegislators/Drones_Aerial_Surveillance_McNeal_FINAL.pdf?la=en The looming prospect of expanded use of unmanned aerial vehicles, colloquially known as drones, has raised understandable concerns for lawmakers.[1] Those concerns have led some to call for legislation mandating that nearly all uses of drones be prohibited unless the government has first obtained a warrant. Privacy advocates have mounted a lobbying campaign that has succeeded in convincing thirteen states to enact laws regulating the use of drones by law enforcement, with eleven of those thirteen states requiring a warrant before the government may use a drone.[2] The campaigns mounted by privacy advocates oftentimes make a compelling case about the threat of pervasive surveillance, but the legislation is rarely tailored in such a way to prevent the harm that advocates fear. In fact, in every state where legislation was passed, the new laws are focused on the technology (drones) not the harm (pervasive surveillance). In many cases, this technology centric approach creates perverse results, allowing the use of extremely sophisticated pervasive surveillance technologies from manned aircraft, while disallowing benign uses of drones for mundane tasks like accident and crime scene documentation, or monitoring of industrial pollution and other environmental harms. 3. Requiring warrants does not resolve key privacy issues with drones- their 1AC Congress.gov evidence indicates that law enforcement can still use drone technology “in the case of emergencies” this is the status quo policy and it has been abused 79 CMSDL Core Files 2015-2016 2NC/1NR Advantage Frontline Extensions 80 CMSDL Core Files 2015-2016 2NC/1NR Civil Liberties 1. Extend our 1NC Washington Post Evidence, Obama directed the FAA to disclose the locations of drone operations 2. Extend our Thompson evidence, drones are not a unique threat to privacy, automatic license plate readers, and other NSA-type surveillance measures by the USFG are all alternate causalities 3. Obama’s new drone directive addresses many of the civil liberties concerns associated with drone use- the affirmative is unnecessary Forbes 2015- Gregory S. McNeal, contributor “What You Need To Know About The Federal Government's Drone Privacy Rules” http://www.forbes.com/sites/gregorymcneal/2015/02/15/the-drones-are-coming-heres-what-presidentobama-thinks-about-privacy/ The President requires Federal agencies to examine their drone policies prior to the adoption of new drone technology and at least every three years thereafter. The Order notes that drones must only be used in a matter consistent with the Constitution, Federal law, and other applicable regulations and policies. It also reaffirms that individuals have the right to seek access to and amendment of records associated with drone usage.¶ The President created new requirements for the collection of information by drones. The Order requires that agencies only collect information “to the extent that such collection or use is consistent with and relevant to an authorized purpose.” Information collected by drones that is not maintained in a system of records covered by the Privacy Act, shall not be disseminated outside the agency unless dissemination is required by law, or fulfills an authorized purpose and complies with agency requirements. If information collected using drones contains personally identifiable information (PII) that information shall not be retained for more than 180 days unless the retention is determined to be: necessary to an authorized mission of the retaining agency, maintained in a system of records covered by the Privacy Act, or is required to be retained for a longer period by any other applicable law or regulation. The FBI does not undertake long-term, warrantless, surveillance missions- specific, targeted instances do not violate the 4th amendment Washington Times 2013- Stephan Dinan, July 29, “FBI says it doesn’t need warrant to use drones” http://www.washingtontimes.com/news/2013/jul/29/fbi-says-it-doesnt-need-warrant-use-drones/ The FBI has told Congress it does not need to get a warrant to conduct surveillance with drones, in a letter laying out some of the top federal law enforcement agency’s policies for how it uses unmanned aerial vehicles.¶ In a July 19 letter to Sen. Rand Paul, Stephen D. Kelly, assistan t director for the FBI’s congressional liaison office, said the agency has used drones in 10 instances, including twice for “national security” cases and eight times for criminal cases. The FBI authorized the use of drones in three other criminal cases but didn’t deploy them.¶ Then, in a follow-up letter Mr. Paul released Monday, Mr. Kelly said they don’t believe they ever need to obtain a warrant to conduct drone surveillance as long as it’s done within guidelines.¶ He said they take their lead from several Supreme Court cases that don’t deal directly with drones but do cover manned aerial surveillance. In those cases the court ruled that a long as the areas observed were in public view and no law enforcement officer was trespassing, no privacy rights were violated.¶ In one case a concurring opinion by one of the justices said that there could be a problem if an agency were conducting long-term warrantless surveillance of someone in public, because that could constitute an unreasonable search in violation of the Constitution’s Fourth Amendment.¶ “We do not use UAVs to undertake such surveillance,” Mr. Kelly said.¶ Mr. Paul had been holding up the nomination of James B. Comey Jr. to become the new FBI director, using the blockade as a way to try to force the administration to divulge more information on the FBI’s drone surveillance.¶ Current Director Robert S. Mueller III revealed the agency’s use of drones in a congressional hearing earlier this summer. 81 CMSDL Core Files 2015-2016 2NC/1NR Innovation 1. Prefer our Salehyan evidence- there is no correlation between food shortages and conflicthe cites multiple studies that prove a lack of food means countries do not have the resources to wage war 2. Extend our 1NC McNeal evidence- the drone industry is a burgeoning one- lack of public confidence will change the billion dollar potential of the industry for investors 3. Extend our 1NC Thompson evidence- prefer this evidence it makes predictions about what the commercial drone industry will be like in 82 CMSDL Core Files 2015-2016 2NC/1NR Solvency 1. Extend our 1NC McNeal evidence- by focusing on unpiloted surveillance, the affirmative leaves piloted instances of surveillance intact, our evidence indicates that piloted surveillance poses a greater threat to civil liberties 2. Requiring warrants does not solve the affirmative’s internal links- the status quo requires warrants before searches, however, drones can hover over any area undetected, which means surveillance will continue even with warrants. The affirmative only regulates usage without addressing the technology itself. 83 CMSDL Core Files 2015-2016 Advantage Frontline Extensions 84 CMSDL Core Files 2015-2016 ANSWERS TO: Inherency- Extensions Obama’s new drone directive solves the affirmative- it prohibits the use of federal funds for drones that are outside of constitutional bounds Forbes 2015- Gregory S. McNeal, contributor “What You Need To Know About The Federal Government's Drone Privacy Rules” http://www.forbes.com/sites/gregorymcneal/2015/02/15/the-drones-are-coming-heres-what-presidentobama-thinks-about-privacy/ The Executive Order addresses civil liberties mostly by referencing existing laws. Specifically, the Order calls on agencies to ensure they have policies to prohibit collection, use, retention, or dissemination of data in a manner that would violate the First Amendment, or would illegally discriminate based on protected categories like ethnicity, race, gender, etc. It also requires that drone related activities are performed in a manner consistent with the Constitution, applicable laws, Executive Orders, and other Presidential directives. The Order also requires agencies to ensure they have in place a means to receive, investigate, and address privacy, civil rights and civil liberties complaints.¶ Oversight and accountability of Federal drone operations will require creation of new procedures or modification of existing procedures. Agencies will be required to ensure their oversight procedures including audits or assessments, comply with existing policies and regulations. Federal government personnel and contractors who work on drone programs will require rules of conduct and training, and procedures will need to be implemented for reporting suspected cases of misuse or abuse of drone technologies. The FBI uses drones in a very limited capacity and steps are being taken to ensure responsible use Al Jazeera 2013- June 20th “FBI says drones used to monitor people in US” http://www.aljazeera.com/news/americas/2013/06/20136191854968801.html The US uses drones for surveillance in some limited law-enforcement situations, the head of FBI has said, prompting additional debate about the Obama administration's use of domestic surveillance.¶ Robert Mueller's acknowledgement came in response to questions on Wednesday from members of the Senate Judiciary Committee who said they wanted to know more about the federal government's increasing use of unmanned aircraft.¶ "Does the FBI use drones for surveillance on US soil?" Republican Senator Charles Grassley of Iowa asked during a Senate Judiciary Committee hearing.¶ "Yes," Mueller said, adding that the use was in "a very, very minimal way and very seldom".¶ Mueller did not go into detail, but the FBI later released a statement that said unmanned aircraft were used only to watch stationary subjects and to avoid serious risks to law-enforcement agents.¶ The Federal Aviation Administration approves each use, the statement said.¶ "I will tell you that our footprint is very small," Mueller said in his testimony.¶ "We have very few [drones] and of limited use, and we're exploring not only the use but also the necessary guidelines for that use." 85 CMSDL Core Files 2015-2016 ANSWERS TO: Civil Liberties- Impact Framing Consequentialism subsumes their impact framing- even under a deontological framework, one must weigh the costs and benefits of ethical decisions- the judge should adopt this framework when evaluating the round- if we win that our strategy is net-better than the affirmative’s for human flourishing, we should win the debate Spragens 2000 – Assistant Professor Department of Psychology Harvard University (Thomas A., Political Theory and Partisan Politics- "Rationality in Liberal Politics" pg 81-2) My thesis that all three layers/forms of political association are important in a well-ordered liberal democracy also implies the untenability of Rawls's argument that agreement regarding norms of social justice is a possible and sufficient way to overcome the deficiencies of the modus vivendi approach. In the first place, as I have argued in more detail elsewhere, the fundamental unfairness of life and the presence of gratuitous elements in the moral universe make it impossible to settle rationally upon a single set of distributive principles as demonstrably fair (See also, Spragens 1993). Simply put, the problem is that the contingencies of the world ineluctably allocate assets and sufferings quite unfairly. We can cope with and try to compensate for these "natural injustices," but only at the price of introducing other elements of unfairness or compromising other moral values. The other major problem in this context is that real world human beings are not deontologists: their moral intuitions about distributive justice are permeated and influenced by their moral intuitions about the' good. The empirical consequence of these two difficulties is the falsification of Rawls's hermeneutic claims about an overlapping consensus. Rational people of good will with a liberal democratic persuasion will be able to agree that some possible distributive criteria are morally unacceptable. But, as both experience and the literature attest, hopes for a convergence of opinion on definitive principles of distributive justice are chimerical. 86 CMSDL Core Files 2015-2016 2NC/1NR ANSWERS TO: Solvency- Extensions The affirmative does nothing to regulate piloted aerial surveillance- this is more dangerous than drones McNeal 2014- Gregory, professor, Pepperdine University, School of Law, “Drones and ¶ Aerial Surveillance: ¶ Considerations For Legislators” Brookings Institute http://www.brookings.edu/~/media/Research/Files/Reports/2014/10/drones-aerial-surveillancelegislators/Drones_Aerial_Surveillance_McNeal_FINAL.pdf?la=en Privacy advocates contend that with drones, the government will be able to engage in widespread pervasive surveillance because drones are cheaper to operate than their manned counterparts. While drones are cheaper to operate, the drones most law enforcement agencies can afford are currently far less capable than their manned counterparts (oftentimes these drones are small remote controlled helicopters or airplanes, capable of a flight time of less than one hour). The surveillance equipment that can be placed on these drones is also far less intrusive than that which can be mounted to manned aircraft. Moreover, the term “unmanned aircraft” is also misleading as there are no systems currently available to law enforcement that can conduct fully autonomous operations, all systems need an operator for part of the mission. Thus, in almost all instances drones are less capable than manned aerial surveillance platforms, and while the platform is cheaper (but less capable), the personnel costs still remain constant as an officer is required to operate the drone. Granted, there are very sophisticated systems used by the military, but even if law enforcement agencies were able to afford the highly sophisticated multi-million dollar Predator and Reaper systems like those used for surveillance on battlefields, those systems (both the aircraft and the ground control station) are more expensive than manned helicopters, require a ground crew to launch and recover the aircraft, and require both a pilot and a camera operator. In light of these facts, the legislation being pushed by privacy advocates has been explicitly directed at drone technology, not because the technology represents an actual threat to civil liberties, but because someday in the future, the technology may be intrusive.[7] The plan does nothing about commercial drone surveillance Slate 2015- February 2015 “The Rules of the Sky” http://www.slate.com/articles/technology/future_tense/2015/02/faa_small_commercial_drone_rules_don_t_adequate ly_address_privacy_concerns.html But what about privacy? Drones—including small drones, and especially those driven by commercial motives to voraciously gather all kinds of information—can pose significant privacy threats. They see from new vantage points, they are far lower-cost than older aerial technologies, and they can move over boundaries that otherwise protect activity from sight. These are only a few reasons why drones have been predicted to be a “privacy catalyst”—the drivers of robust discussions about the enactment of new privacy regulations.¶ The FAA has very little to say about privacy, which might not be surprising . It is primarily an agency concerned with aircraft safety. When the Electronic Privacy Information Center, a public interest group focused on privacy policy, petitioned the FAA in 2012 to address the threat from drones to privacy and civil liberties, the FAA responded that it “prioritizes its rulemaking projects based on issues that are crucial to the safety of the aviation community and the traveling public.” Similarly, in the required privacy impact assessment that accompanied the FAA’s draft drone rules, the FAA acknowledge privacy concerns over drone operations but pointed elsewhere for legal solutions. 87 CMSDL Core Files 2015-2016 ***Topicality Negative 88 CMSDL Core Files 2015-2016 1NC Violations 89 CMSDL Core Files 2015-2016 **Federal Government 90 CMSDL Core Files 2015-2016 1NC Drone Surveillance- “Federal Government” Violation A. Interpretation1. Federal government is the national government that expresses power Black’s Law Dictionary, 2004 8th Edition, June 1, , pg.716. Federal government. 1. A national government that exercises some degree of control over smaller political units that have surrendered some degree of power in exchange for the right to participate in national politics matters – Also termed (in federal states) central government. 2. the U.S. government – Also termed national government. [Cases: United States -1 C.J.S. United States - - 2-3] 2. “Its” refers to the subject preceding it and means ownership Cambridge Dictionary “Its”, http://dictionary.cambridge.org/dictionary/british/its) Definition belonging to or relating to something that has already been mentioned The dog hurt its paw. Their house has its own swimming pool. The company increased its profits. I prefer the second option - its advantages are simplicity and cheapness. B. Violation- Drones are used primarily by local law enforcement and the federal government has no jurisdiction over its use, which means the affirmative is not curtailing federal government surveillance National Journal 2015- “Few Privacy Limitations Exist on How Police Use Drones” http://www.nationaljournal.com/tech/few-privacy-limitations-exist-on-how-police-use-drones-20150205, Feb 5 As drones become cheaper and more capable, more police departments across the country are asking for and getting federal approval to use them for law enforcement.¶ But the Federal Aviation Administration only takes safety into consideration when it grants a law enforcement agency approval to use drones, leaving privacy protections to legislation—which, depending on the state in question, may or may not exist.¶ Agencies as large as the Michigan State Police and as small as the Grand Forks County [N.D.] Sheriff's Department have received FAA approval to use drones. Most departments use them for missions like search-and-rescue or for photographing a crime scene or an accident site.¶ But unless a law enforcement agency is within one of the 14 states that have passed privacy legislation limiting how police can use drones, there's little in theory keeping it from using a drone for a less innocuous end—such as surveillance without a warrant. "While the federal government retains responsibility for the airspace, under most circumstances a state/local government can impose restrictions on the agencies for which it's responsible," an FAA spokesperson said in an emailed statement.¶ Members in the House and Senate introduced bills in the previous Congress that would have required police everywhere in the country to obtain a warrant before using drones for surveillance, but the bills died at the end of the year. 91 CMSDL Core Files 2015-2016 C. Standards 1. Limits- allowing the affirmative to claim advantages off of non-USFG surveillance practices unlimits the topic; any non-federal surveillance measure from local traffic cameras to license plate readers becomes a viable affirmative- a limited topic is an educational topic- the fewer affirmatives we can focus on, the more in-depth our discussions 2. Negative ground- as long as the affirmative does not have to stick to the USFG, they will find the most miniscule local surveillance action as a means to bypass links to politics Das, elections, national security Das, and other core negative generics. a. There is an education DA to a loss of ground- debating about politics, elections, and national security teaches debaters about vital issues regarding national security D. Prefer competing interpretations- if our definition is net-better for debate, that is, it is more limited and educational then vote negative 92 CMSDL Core Files 2015-2016 1NC Stingray- “Federal Government” Violation A. Interpretation1. Federal government is the national government that expresses power Black’s Law Dictionary, 2004 8th Edition, June 1, , pg.716. Federal government. 1. A national government that exercises some degree of control over smaller political units that have surrendered some degree of power in exchange for the right to participate in national politics matters – Also termed (in federal states) central government. 2. the U.S. government – Also termed national government. [Cases: United States -1 C.J.S. United States - - 2-3] 2. “Its” refers to the subject preceding it and means ownership Cambridge Dictionary “Its”, http://dictionary.cambridge.org/dictionary/british/its) Definition belonging to or relating to something that has already been mentioned The dog hurt its paw. Their house has its own swimming pool. The company increased its profits. I prefer the second option - its advantages are simplicity and cheapness. B. Violation- Stingray technology is not used by the Federal government, only local law enforcement Klonick 2014- Kate, fellow at Yale Law School’s Information Society Project, November 14, “Stingrays: Not Just for Feds!” http://www.slate.com/articles/technology/future_tense/2014/11/stingrays_imsi_catchers_how_local_law_enforcemen t_uses_an_invasive_surveillance.single.html From Ferguson to Senate hearings, the news of local police arming themselves with federal-grade equipment—tanks, riot gear, M16 rifles—has captivated everyone from civil libertarians to lawmakers. But in the national debate surrounding police militarization, the most effective weapons may have been overlooked: Beyond arming themselves like the federal government, local police are also spying on you like the federal government—using sophisticated surveillance technology without warrants.¶ One of the tools making it possible for Chief Wiggum to gather all your deets is known colloquially as a Stingray, a portable gadget about the size of a box of doughnuts. They’re also known as “cell-site simulators,” because, well, that’s exactly what they do: A Stingray mimics a cellphone tower and forces all nearby mobile phones or devices to connect to it. Every phone that connects to the Stingray reports its number, GPS location, and the numbers of all outgoing calls and texts. That’s every location and outgoing call and text log of every phone within a certain radius—up to several kilometers—of the Stingray, and that’s all without a warrant.¶ It’s probably not a huge surprise to most people in America today that the federal government has incredible surveillance technology that it uses occasionally on its own citizens. (Hi, NSA!) But polling shows that only 27 percent of people think that this technology is focused on them, and even if not, half of Americans surveyed say that there might be a margin of federal surveillance they’re willing to endure in the name of homeland security or fighting terrorism.¶ But that logic is a much harder sell when it comes to local police, who have been acquiring Stingrays in increasing numbers. At least 46 state and local police departments, from Sunrise, Florida, to Hennepin, Minnesota, have gotten cell-site simulators, which range widely in price from $16,000 to more than $125,000 a pop. And like the federal government, local police are using this technology without any judicial oversight. That means Barney Fife—or, if you’re looking for a more sinister example, think Denzel in Training Day—can walk into your neighborhood with a Stingray, fire it up, and collect all the numbers, GPS, and call logs of every cellphone in the area. If they’re looking for a specific number (hopefully, it’s not you), they can also use a Stingray to trick your phone into being a personal GPS tracker and then use that warrantless cellphone tracking to enter your home and arrest you— again without a warrant. 93 CMSDL Core Files 2015-2016 C. Standards 1. Limits- allowing the affirmative to claim advantages off of non-USFG surveillance practices unlimits the topic; any non-federal surveillance measure from local traffic cameras to license plate readers becomes a viable affirmative- a limited topic is an educational topic- the fewer affirmatives we can focus on, the more in-depth our discussions 2. Negative ground- as long as the affirmative does not have to stick to the USFG, they will find the most miniscule local surveillance action as a means to bypass links to politics Das, elections, national security Das, and other core negative generics. a. There is an education DA to a loss of ground- debating about politics, elections, and national security teaches debaters about vital issues regarding national security D. Prefer competing interpretations- if our definition is net-better for debate, that is, it is more limited and educational then vote negative 94 CMSDL Core Files 2015-2016 **Curtail ≠ Abolish 95 CMSDL Core Files 2015-2016 1NC Security Letters- Curtail ≠ Abolish A. Interpretation 1. To curtail is to reduce or restrict Oxford English Dictionary http://www.oxforddictionaries.com/us/definition/american_english/curtail Definition of curtail in English:¶ verb¶ [with object]¶ 1Reduce in extent or quantity; impose a restriction on: civil liberties were further curtailed 2. Abolish is to put an end to Oxford English Dictionary http://www.oxforddictionaries.com/us/definition/american_english/abolish Definition of abolish in English: verb [with object] Formally put an end to (a system, practice, or institution): B. The plan does not curtail surveillance, it abolishes the surveillance practice of security letters C. Standards 1. Limits- allowing the affirmative to claim two interpretations of curtail (restrict and abolish) doubles the number of viable affirmatives; a limited topic is an educational topic- the fewer affirmatives we can focus on, the more in-depth our discussions 2. Negative Ground- the negative will not be able to read counterplans that test the affirmative by banning a surveillance practice altogether D. Prefer competing interpretations- if our definition is net-better for debate, that is, it is more limited and educational, then vote negative 96 CMSDL Core Files 2015-2016 2NC/1NR Topicality Blocks 97 CMSDL Core Files 2015-2016 2NC/1NR- ANSWERS TO: Reasonability Reject reasonability 1. It is too vague and encourages judge intervention- what constitutes a “reasonable” level of predictability is too subjective; what one team finds reasonable another might find unreasonable. Also, absent a debate about the specific costs and benefits of words, the judge will be left to decide for themselves whether they think the affirmative is reasonable 2. Topicality is good for debate- under their interpretation we would not debate about the comparative merits of different interpretations in the resolution, this means we lose vital cost- benefit analysis skills 98 CMSDL Core Files 2015-2016 ***”Federal Government” Violation 99 CMSDL Core Files 2015-2016 2NC/1NR - “Federal Government”- Extensions Federal means relating to the national government of the United States Black’s Law Dictionary, 1999 federal, adj. Of or relating to a system of associated governments with a vertical division of governments into national and regional components having different responsibilities; esp., of or relating to the national government of the United States. Federal government is central government PRINCETON UNIVERSITY WORDNET, 1997, p. http://www.dictionary.com/search?q=federal%20government. Federal government. n: a government with strong central powers. 100 CMSDL Core Files 2015-2016 2NC/1NR - “Its”- Extensions ‘Its’ means ownership ownership Glossary of English Grammar Terms, 2005 (http://www.usingenglish.com/glossary/possessive-pronoun.html) Mine, yours, his, hers, its, ours, theirs are the possessive pronouns used to substitute a noun and to show possession or ownership. EG. This is your disk and that's mine. (Mine substitutes the word disk and shows that it belongs to me.) Its means possession Encarta, 2009 (Encarta World English Dictionary, http://encarta.msn.com/encnet/features/dictionary/DictionaryResults.aspx?refid=1861622735) its [ its ] adjective Definition: indicating possession: used to indicate that something belongs or relates to something The park changed its policy. 101 CMSDL Core Files 2015-2016 **2NC/1NR Drone Affirmative 102 CMSDL Core Files 2015-2016 2NC/1NR Drone Affirmative- “Federal Government”- Overview 1. Extend our 1NC Black’s Law and Cambridge Dictionary evidence, the phrase, “The Federal Government should curtail its domestic surveillance”, can only refer to the federal government’s surveillance 2. Extend our violation- drones are used for surveillance by local law enforcement not by federal law enforcement. This puts them in a solvency double bind either: a) they only curtail federal government surveillance, in which case they cannot solve their internal links or b) they curtail both, in which case they are extra topical, extra topicality is a voting issue for predictability and ground- it allows the affirmative to claim advantages based on untopical portions of the plan text 3. Extend our reasons to prefer- by curtailing non-federal government surveillance, the affirmative broadens the scope of the topic, a limited topic is better for our education since we will have in depth discussions on a small number of affirmatives. Also, by having a nonusfg actor, the affirmative does not link to many core negative generics, which are also vital for topic education 4. Prefer a competing interpretations model when evaluating topicality it’s the only objective way to determine what the words in the resolution mean 103 CMSDL Core Files 2015-2016 2NC/1NR Drone Affirmative- “Federal Government”- Violation The affirmative regulates only local law enforcement surveillance NEW YORK TIMES 2013- “Rise of Drones in U.S. Drives Efforts to Limit Police Use” http://www.nytimes.com/2013/02/16/technology/rise-of-drones-in-us-spurs-efforts-to-limituses.html?pagewanted=all&_r=0 For now, drones for civilian use run on relatively small batteries and fly short distances. In principle, various sensors, including cameras, can be attached to them. But there is no consensus in law on how the data collected can be used, shared or stored.¶ State and local government authorities are trying to fill that void. As they do, they are weighing not only the demands of the police and civil libertarians but also tricky legal questions. The law offers citizens the right to take pictures on the street, for instance, just as it protects citizens from unreasonable search.¶ State legislatures have come up with measures that seek to permit certain uses, while reassuring citizens against unwanted snooping.¶ Virginia is furthest along in dealing with the issue. In early February, its state Legislature passed a two-year moratorium on the use of drones in criminal investigations, though it has yet to be reviewed by the governor.¶ In several states, proposals would require the police to obtain a search warrant before collecting evidence with a drone. Here’s more evidence, surveillance drones are used primarily by local law enforcement Washington Times 2012- December 10, “Homeland Security increasingly lending drones to local police” http://www.washingtontimes.com/news/2012/dec/10/homeland-security-increasingly-loaning-drones-to-l/ Since then, the Washington Guardian has confirmed, DHS and its Customs and Border Protection agency have deployed drones — originally bought to guard America’s borders — to assist local law enforcement and other federal agencies on several occasions.¶ The practice is raising questions inside and outside government about whether federal officials may be creating an ad-hoc, loan-a-drone program without formal rules for engagement, privacy protection or taxpayer reimbursements. The drones used by CPB can cost between $15 million and $34 million each to buy, and have hourly operational costs as well.¶ In addition, DHS recently began distributing $4 million in grants to help local law enforcement buy its own, smaller versions of drones, opening a new market for politically connected drone makers as the wars overseas shrink.¶ The double-barreled lending and purchasing have some concerned that federal taxpayers may be subsidizing the militarization of local police forces and creating new threats to average Americans’ privacy. 104 CMSDL Core Files 2015-2016 **2NC/1NR Stingray Affirmative 105 CMSDL Core Files 2015-2016 2NC/1NR Drone Affirmative- “Federal Government”- Overview 1. Extend our 1NC Black’s Law and Cambridge Dictionary evidence, the phrase, “The Federal Government should curtail its domestic surveillance”, can only refer to the federal government’s surveillance 2. Extend our violation- stingrays are used for surveillance by local law enforcement not by federal law enforcement. This puts them in a solvency double bind either: a) they only curtail federal government surveillance, in which case they cannot solve their internal links or b) they curtail both, in which case they are extra topical, extra topicality is a voting issue for predictability and ground- it allows the affirmative to claim advantages based on untopical portions of the plan text 3. Extend our reasons to prefer- by curtailing non-federal government surveillance, the affirmative broadens the scope of the topic, a limited topic is better for our education since we will have in depth discussions on a small number of affirmatives. Also, by having a nonusfg actor, the affirmative does not link to many core negative generics, which are also vital for topic education 4. Prefer a competing interpretations model when evaluating topicality it’s the only objective way to determine what the words in the resolution mean 106 CMSDL Core Files 2015-2016 2NC/1NR Stingray Affirmative- “Federal Government”- Violation Stingray technology is used only by local law enforcement Scientific American 2015 “What Is the Big Secret Surrounding Stingray Surveillance?” http://www.scientificamerican.com/article/what-is-the-big-secret-surrounding-stingray-surveillance/, June 25 Given the amount of mobile phone traffic that cell phone towers transmit, it is no wonder law enforcement agencies target these devices as a rich source of data to aid their investigations. Standard procedure involves getting a court order to obtain phone records from a wireless carrier. When authorities cannot or do not want to go that route, they can set up a simulated cell phone tower—often called a stingray—that surreptitiously gathers information from the suspects in question as well as any other mobile device in the area.¶ These simulated cell sites—which collect international mobile subscriber identity (IMSI), location and other data from mobile phones connecting to them—have become a source of controversy for a number of reasons. National and local law enforcement agencies closely guard details about the technology’s use, with much of what is known about stingrays revealed through court documents and other paperwork made public via Freedom of Information Act (FOIA) requests.¶ One such document recently revealed that the Baltimore Police Department has used a cell site simulator 4,300 times since 2007 and signed a nondisclosure agreement with the FBI that instructed prosecutors to drop cases rather than reveal the department’s use of the stingray. Other records indicate law enforcement agencies have used the technology hundreds of times without a search warrant, instead relying on a much more generic court order known as a pen register and trap and trace order. Last year Harris Corp., the Melbourne, Fla., company that makes the majority of cell site simulators, went so far as to petition the Federal Communications Commission to block a FOIA request for user manuals for some of the company’s products. Local law enforcement use stingray devices ABC 7 NEWS 2014- December 3, “Investigation: Law enforcement use secret 'Stingray' devices to track cell phone signals” http://abc7.com/news/investigation-law-enforcement-use-secret-devices-to-track-cell-phone-signals/421190/ Law enforcement agencies across the U.S. and in Southern California are using a device so secret that agencies are required to sign a non-disclosure agreement before they can buy or use it.¶ The device is commonly referred to as a "Stingray," although several companies manufacture models under various brand names, including "Kingfish" and "Hailstorm."¶ "Local law enforcement can do things now that we used to relegate to the realm of spies and espionage," ABC7 intelligence expert Hal Kempfer tells Eyewitness News.¶ Stingraytype devices trick a target's cell phone into connecting to it by masquerading as the strongest cell phone tower in the area -- one phones think belongs to a phone carrier like Verizon or AT&T.¶ The tracking device pinpoints a cell phone's location down to about three yards and extracts the numbers of all incoming and outgoing calls. 107 CMSDL Core Files 2015-2016 ***Curtail ≠ Abolish 108 CMSDL Core Files 2015-2016 **2NC/1NR National Security Letters Affirmative 109 CMSDL Core Files 2015-2016 2NC/1NR Security Letters- Curtail ≠ Abolish – Overview 1. Extend our 1NC Oxford English Dictionary evidence- “to abolish” and “to curtail” are two different actions- the framers of the resolution, if they had intended for the USFG to ban their surveillance practices rather than curtail it, would have used the term “abolished”. 2. Extend the violation- the plan text calls for the federal government to “ban” security letters which is different from substantially curtailing it 3. Prefer this interpretation of the resolution- it allows the negative to read the ban surveillance counterplan, which is an essential component of negative ground on this topic. Also, the affirmative underlimits the resolution. By claiming affirmatives that both ban and curtail surveillance they essentially double the size of the resolution. A limited resolution is key to in depth education on the topic. 4. Prefer a competing interpretations model when evaluating topicality it’s the only objective way to determine what the words in the resolution mean 110 CMSDL Core Files 2015-2016 2NC/1NR Security Letters- Curtail ≠ Abolish – Interpretation Extensions Curtail means to reduce or limit Merriam Webster Dictionary curtail verb cur·tail \(ˌ)kər-ˈtāl\ : to reduce or limit (something) Abolish means to officially end or stop something Merriam Webster Dictionary abolish verb abol·ish \ə-ˈbä-lish\ : to officially end or stop (something, such as a law) : to completely do away with (something) 111 CMSDL Core Files 2015-2016 **Topicality Affirmative 112 CMSDL Core Files 2015-2016 **2AC Blocks 113 CMSDL Core Files 2015-2016 2AC- Drone Affirmative- T “Federal Government” A. We meet their interpretation- the Federal Government uses drones in the status quo The Guardian 2013- Dan Roberts, “FBI admits to using surveillance drones over US soil” http://www.theguardian.com/world/2013/jun/19/fbi-drones-domestic-surveillance The FBI has admitted it sometimes uses aerial surveillance drones over US soil, and suggested further political debate and legislation to govern their domestic use may be necessary.¶ Speaking in a hearing mainly about telephone data collection, the bureau's director, Robert Mueller, said it used drones to aid its investigations in a "very, very minimal way, very seldom".¶ However, the potential for growing drone use either in the US, or involving US citizens abroad, is an increasingly charged issue in Congress, and the FBI acknowleged there may need to be legal restrictions placed on their use to protect privacy.¶ "It is still in nascent stages but it is worthy of debate and legislation down the road," said Mueller, in response to questions from Hawaii senator Mazie Hirono.¶ Advertisement¶ Hirono said: "I think this is a burgeoning concern for many of us."¶ Dianne Feinstein, who is also chair of the Senate intelligence committee, said the issue of drones worried her far more than telephone and internet surveillance, which she believes are subject to sufficient legal oversight.¶ "Our footprint is very small," Mueller told the Senate judiciary committee. "We have very few and have limited use."¶ He said the FBI was in "the initial stages" of developing privacy guidelines to balance security threats with civil liberty concerns.¶ It is known that drones are used by border control officials and have been used by some local law enforcement authorities and Department of Homeland Security in criminal cases. B. Counter- Interpretation: Its means associated with Oxford Dictionaries Online, No Date (“Its”, http://oxforddictionaries.com/definition/its?view=uk) its Entry from World dictionary Pronunciation:/ɪts/ possessive determiner belonging to or associated with a thing previously mentioned or easily identified: turn the camera on its side he chose the area for its atmosphere C. We meet- the affirmative reduces surveillance that is associated with the federal government D. Prefer our interpretation 1. Ground- most surveillance is undertaken at the local level, by law enforcement, by limiting out these affirmatives, the aff is left defending only a handful of potential federal government reductions 2. Topic education- debating about surveillance by local law enforcement is key to topic education, these debates are the most salient to current events E. Prefer reasonability to competing interpretations- if the affirmative is predictable then we should not lose to their interpretation. Predictability is the best standard for topicality. If the negative can predict that they’d debate a drone affirmative on this topic then that leaves ample time to research case specific strategies and links 114 CMSDL Core Files 2015-2016 2AC- Stingray Affirmative- T “Federal Government” A. We meet their interpretation- the Federal Government uses stingray technology in the status quo ACLU 2014- American Civil Liberties Union, June 27, “STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You” Abouthttps://www.aclunc.org/sites/default/files/StingRays_The_Most_Common_Surveillance_Tool_the_Govt_Won%27 t_Tell_You_About.pdf “STINGRAYS: The Most Common Surveillance Tool the Government Won't Tell You About” Federal and state law enforcement entities across the country are using a powerful cell phone surveillance tool commonly referred to as a “Sting Ray.” These devices are capable of locating a cell phone with extraordinary precision, but to do so they operate in dragnet fashion, scooping up information from a target device, as well as other wireless devices in the vicinity. In addition, these devices can be configured to Although the federal government has been using these devices since at least 1995, and use by state and local governments is quite widespread, there are only a handful of published opinions addressing their use. capture the content of voice and data communications. B. Counter- Interpretation: Its means associated with Oxford Dictionaries Online, No Date (“Its”, http://oxforddictionaries.com/definition/its?view=uk) its Entry from World dictionary Pronunciation:/ɪts/ possessive determiner belonging to or associated with a thing previously mentioned or easily identified: turn the camera on its side he chose the area for its atmosphere C. We meet- the affirmative reduces surveillance that is associated with the federal government D. Prefer our interpretation 1. Ground- most surveillance is undertaken at the local level, by law enforcement, by limiting out these affirmatives, the aff is left defending only a handful of potential federal government reductions 2. Topic education- debating about surveillance by local law enforcement is key to topic education, these debates are the most salient to current events E. Prefer reasonability to competing interpretations- if the affirmative is predictable then we should not lose to their interpretation. Predictability is the best standard for topicality. If the negative can predict that they’d debate a drone affirmative on this topic then that leaves ample time to research case specific strategies and links 115 CMSDL Core Files 2015-2016 2AC Security Letters A. We meet their interpretation- the affirmative curtails the use of the security letters by the USFG B. Counter-interpretation- to curtail is to ban Vocabulary.com http://www.vocabulary.com/dictionary/curtail To curtail something is to slow it down, put restrictions on it, or stop it entirely. If I give up cake, I am curtailing my cake-eating. C. Prefer our interpretation 1. Ground- most advantage internal links are predicated on the government stopping a surveillance action. The literature does not make the distinction between a partial reduction and an outright ban, the negative, leaves the affirmative with very little advantage ground D. Prefer reasonability to competing interpretations- if the affirmative is predictable then we should not lose to their interpretation. Predictability is the best standard for topicality. If the negative can predict that they’d debate a drone affirmative on this topic then that leaves ample time to research case specific strategies and links 116 CMSDL Core Files 2015-2016 Crime Disadvantage 117 CMSDL Core Files 2015-2016 Crime DA 1NC 118 CMSDL Core Files 2015-2016 Crime DA 1NC A. Uniqueness: Long term trends show crime rates dropping significantly Fuchs 2015 (Erin Fuchs, 1-27-2015, "It's Incredible How Much Safer America Has Become Since The 1980s," Business Insider, http://www.businessinsider.com/fbi-crime-report-shows-america-is-still-getting-safer-2015-1) Violent crime and property crime in America both decreased in the first half of 2014, the FBI said in a new preliminary report released Tuesday. The FBI's latest crime statistics reflects a long-term trend. Even though America's local police are more militarized than ever, the crime rate has been steadily falling in the past two decades. In the 1980s property crime and violence were both much more common, spurring politicians to bill themselves as "tough on crime" in order to get elected in America. (Presidential candidate Michael Dukakis famously lost against George H.W. Bush, who ran a tough-on-crime campaign.) These days that tough-on-crime rhetoric isn't as common, and there's a excellent reason why. Crime stats consistently show that the country is getting safer. In 2013, the number of murders in America dropped 4.4% to 14,196 — down signifcantly from its peak of 24,703 in 1991. The drop in homicides is even more obvious when you look at individual cities that once had bad reputations. New York recorded 2,245 homicides at its peak in 1990 but only 328 by 2014. Los Angeles had 2,589 homicides in 1992 but only 254 last year. Washington, D.C., a much smaller city, saw its murder number decline from a peak of 443 homicides in 1992 to only 105 last year. Overall, violent crimes including homicide, rape, aggravated assault, and robbery dropped 38% between 1992 and 2011. The dramatic plunge in violent crime shocked many experts, who predicted America would just get more violent. "Recent declines in rates of violent crime in the United States caught many researchers and policymakers off guard," criminology professor Gary LaFree wrote back in 1999. "These declines were perhaps more surprising in that they came on the heels of dire predictions about the rise of a generation of 'superpredators' who would soon unleash the full force of their destructive capacities on an already crime-weary nation." Crime experts have yet to come up with a unified theory for why America has gotten so much safer. However, one of the more plausible reasons for the falling violent crime rate is that many cities in America have more police per capita than they used to — and those police officers have gotten better at doing their job. An omnibus crime bill passed in 1994 provided funding for 100,000 new police officers in the US as and set aside $6.1 billion for crime prevention programs. In reality, the number of cops on the street only increased by 50,000 to 60,000 in the 1990s, but that was still a bigger increase than in previous decades, according to Levitt's analysis of FBI data. In New York City, which had a particularly sharp drop in violent crime, the police force expanded by 35% in the 1990s. The mere presence of more police officers can obviously be a big crime deterrent. During the 1990s, these police officers has also became more strategic — in part because they began to use computerized systems to track crimes and find out where they should deploy their officers. So-called "hot spot policing" is one of the most effective new strategies, political scientist James Q. Wilson has written in The Wall Street Journal. "The great majority of crimes tend to occur in the same places," Wilson writes. "Put active police resources in those areas instead of telling officers to drive around waiting for 911 calls, and you can bring down crime." One Minneapolisbased study that Wilson cited found that for every minute a police officer spent at a "hot spot" more time passed before another crime was committed in that spot after he left. There are other theories about why violent crime decreased, including that it was because America got its crack epidemic under control and because the US economy grew stronger. Steven Levitt, the economist who wrote the best-seller "Freakonomics," proposed one of the more controversial theories about the crime drop, which was that the legalization of abortion in 1973 was partly responsible. If it weren't for abortion, the theory goes, many unwanted children would have been been grown up to be criminals by the 1990s. An even more bizarre theory ties the rise of lead in the atmosphere to increases in violent crime. Lead emissions rose from the 1940s to the 1960s, while crime rose from the 1960s through the 1980s — when children exposed to lead were becoming adults. In an extensive look at the lead/violence theory, Kevin Drum of Mother Jones cited research that found "even moderately high levels of lead exposure are associated with aggressivity, impulsivity, ADHD, and lower IQ. And right there, you've practically defined the profile of a violent young offender." 119 CMSDL Core Files 2015-2016 Crime DA 1NC B. Link: Surveillance is an irreplaceable tool for preventing crime; efforts to end government surveillance compromise public safety. In truth, surveillance has little potential for abuse compared to the potential for fighting crime. Armstrong 13 (Stuart Armstrong for Aeon “The Strange Benefits of a Total Surveillance State” Online http://aeon.co/magazine/society/the-strangebenefits-of-a-total-surveillance-state/) The first, and most obvious, advantage of mass surveillance is a drastic reduction in crime. Indeed, this is the advantage most often put forward by surveillance proponents today. The evidence as to whether current surveillance achieves this is ambiguous; cameras, for instance, seem to have an effect on property crime, but not on incidences of violence. But today’s world is very different from a panopticon full of automatically analysed surveillance devices that leave few zones of darkness.If calibrated properly, total surveillance might eradicate certain types of crime almost entirely. People respond well to inevitable consequences, especially those that follow swiftly on the heels of their conduct. Few would commit easily monitored crimes such as assault or breaking and entering, if it meant being handcuffed within minutes. This kind of ultra-efficient police capability would require not only sensors capable of recording crimes, but also advanced computer vision and recognition algorithms capable of detecting crimes quickly. There has been some recent progress on such algorithms, with further improvements expected. In theory, they would be able to alert the police in real time, while the crime was still ongoing. Prompt police responses would create nearperfect deterrence, and violent crime would be reduced to a few remaining incidents of overwhelming passion or extreme irrationality.If surveillance recordings were stored for later analysis, other types of crimes could be eradicated as well, because perpetrators would fear later discovery and punishment. We could expect crimes such as low-level corruption to vanish, because bribes would become perilous (to demand or receive) for those who are constantly under watch. We would likely see a similar reduction in police brutality. There might be an initial spike in detected cases of police brutality under a total surveillance regime, as incidents that would previously have gone unnoticed came to light, but then, after a short while, the numbers would tumble. Ubiquitous video recording, mobile and otherwise, has already begun to expose such incidents.On a smaller scale, mass surveillance would combat all kinds of abuses that currently go unreported because the abuser has power over the abused. You see this dynamic in a variety of scenarios, from the dramatic (child abuse) to the more mundane (line managers insisting on illegal, unpaid overtime). Even if the victim is too scared to report the crime, the simple fact that the recordings existed would go a long way towards equalising existing power differentials. There would be the constant risk of some auditor or analyst stumbling on the recording, and once the abused was out of the abuser’s control (grown up, in another job) they could retaliate and complain, proof in hand. The possibility of deferred vengeance would make abuse much less likely to occur in the first place. 120 CMSDL Core Files 2015-2016 Crime DA 1NC C. Impact - Continued surveillance along with a reduction in crime would reduce police brutality, war, and the possibility of a global pandemic. Armstrong 13 (Stuart Armstrong for Aeon http://aeon.co/magazine/society/the-strange-benefits-of-a-total-surveillance-state/) We would likely see a similar reduction in police brutality. There might be an initial spike in detected cases of police brutality under a total surveillance regime, as incidents that would previously have gone unnoticed came to light, but then, after a short while, the numbers would tumble. Ubiquitous video recording, mobile and otherwise, has already begun to expose such incidents.[…]With reduced crime, we could also expect a significant reduction in police work and, by extension, police numbers. Beyond a rapidreaction force tasked with responding to rare crimes of passion, there would be no need to keep a large police force on hand. And there would also be no need for them to enjoy the special rights they do today. Police officers can, on mere suspicion, detain you, search your person, interrogate you, and sometimes enter your home. They can also arrest you on suspicion of vague ‘crimes’ such as ‘loitering with intent’. Our present police force is given these powers because it needs to be able to investigate. Police officers can’t be expected to know who committed what crime, and when, so they need extra powers to be able to figure this out, and still more special powers to protect themselves while they do so. But in a total-surveillance world, there would be no need for humans to have such extensive powers of investigation. For most crimes, guilt or innocence would be obvious and easy to establish from the recordings. The police’s role could be reduced to arresting specific individuals, who have violated specific laws.If all goes well, there might be fewer laws for the police to enforce. Most countries currently have an excess of laws, criminalising all sorts of behaviour. This is only tolerated because of selective enforcement; the laws are enforced very rarely, or only against marginalised groups. But if everyone was suddenly subject to enforcement, there would have to be a mass legal repeal. When spliffs on private yachts are punished as severely as spliffs in the ghetto, you can expect the marijuana legalisation movement to gather steam. When it becomes glaringly obvious that most people simply can’t follow all the rules they’re supposed to, these rules will have to be reformed. In the end, there is a chance that mass surveillance could result in more personal freedom, not less.The military is another arm of state power that is ripe for a surveillance-inspired shrinking. If cross-border surveillance becomes ubiquitous and effective, we could see a reduction in the $1.7 trillion that the world spends on the military each year. Previous attempts to reduce armaments have ultimately been stymied by a lack of reliable verification. Countries can never trust that their enemies aren’t cheating, and that encourages them to cheat themselves. Arms races are also made worse by a psychological phenomenon, whereby each side interprets the actions of the other as a dangerous provocation, while interpreting its own as purely defensive or reactive. With cross-border mass surveillance, countries could check that others are abiding by the rules, and that they weren’t covertly preparing for an attack. If intelligence agencies were to use all the new data to become more sophisticated observers, countries might develop a better understanding of each other. Not in the hand-holding, peace-and-love sense, but in knowing what is a genuine threat and what is bluster or posturing. Freed from fear of surprising new weapons, and surprise attacks, countries could safely shrink their militaries. And with reduced armies, we should be able to expect reduced warfare, continuing the historical trend in conflict reduction since the end of the Second World War.Of course, these considerations pale when compared with the potential for mass surveillance to help prevent global catastrophic risks, and other huge disasters. Pandemics, to name just one example, are among the deadliest dangers facing the human race. The Black Death killed a third of Europe’s population in the 14th century and, in the early 20th century, the Spanish Flu killed off between 50 and 100 million people. In addition, smallpox buried more people than the two world wars combined. There is no reason to think that great pandemics are a thing of the past, and in fact there are reasons to think that another plague could be due soon. There is also the possibility that a pandemic could arise from synthetic biology, the human manipulation of microbes to perform specific tasks. Experts are divided as to the risks involved in this new technology, but they could be tremendous, especially if someone were to release, accidentally or malevolently, infectious agents deliberately engineered for high transmissibility and deadliness.You can imagine how many lives would have been saved had AIDS been sniffed out by epidemiologists more swiftlyMass surveillance could help greatly here, by catching lethal pandemics in their earliest stages, or beforehand, if we were to see one being created artificially. It could also expose lax safety standards or dangerous practices in legitimate organisations. Surveillance could allow for quicker quarantines, and more effective treatment of pandemics. Medicines and doctors could be rushed to exactly the right places, and microquarantines could be instituted. More dramatic measures, such as airport closures, are hard to implement on a large scale, but these quick-response tactics could be implemented narrowly and selectively. Most importantly, those infected could be rapidly informed of their condition, allowing them to seek prompt treatment.With proper procedures and perfect surveillance, we could avoid pandemics altogether. Infections would be quickly isolated and eliminated, and eradication campaigns would be shockingly efficient. Tracking the movements and actions of those who fell ill would make it much easier to research the causes and pathology of diseases. You can imagine how many lives would have been saved had AIDS been sniffed out by epidemiologists more swiftly.Likewise, mass surveillance could prevent the terrorist use of nukes, dirty bombs, or other futuristic weapons. Instead of blanket bans in dangerous research areas, we could allow research to proceed and use surveillance to catch bad actors and bad practices. We might even see an increase in academic freedom. 121 CMSDL Core Files 2015-2016 2NC/1NR Link Extensions: General Domestic surveillance deters crime – Cleveland proves Marie Avilez Catherine Ciriello Christophe Combemale Latif Elam Michelle Kung Emily LaRosa Cameron Low Madison Nagle Rachel Ratzlaff Shriver Colin Shaffer December 10, 2014 CMU Ethics, History, and Public Policy Senior Capstone Project http://www.cmu.edu/hss/ehpp/documents/2014-City-Surveillance-Policy.pdf Security and Social Dimensions of City Surveillance Policy Analysis and Recommendations for Pittsburgh There were many significant, interesting trends identified in the Satisfaction Survey. 56% of “business owners” were dissatisfied with the CPD according to the survey. In response to this, CPD began working with City Council to implement a Wireless Video Surveillance Camera System to install a pilot system of five wireless relays connected with nine cameras surrounding “critical infrastructure in downtown Cleveland.”85 The goal of this system is to support and develop effective preventative and protective measures to deter crime. While this project began in 2008, it significantly expanded in 2011 to reach a total of 19 total cameras and five wireless relays which are directed to the Office of Emergency Management where the data is recorded and stored for up to 30 days. This office is not directly related to a larger function of protecting Clevelanders and visitors from natural disasters or terror attacks, thus making it part of the Department of Homeland Security. It is interesting that a major surveillance/public safety initiative like this is taken out of the hands of CPD, but it makes sense that Homeland Security is controlling the feed. However, CPD Downtown Services Unit has the ability to also monitor the feeds. This ability stems from a partnership between Homeland Security and the various law enforcement offices throughout the country, not only Cleveland, to promote a safer country from terror. It would follow that Pittsburgh would have a relationship with Homeland Security should its efforts with domestic surveillance come to fruition. A second interesting trend dealt with the methodology of asking questions regarding crime and the CPD, but rather has responses. The survey structured questions on crime as whether or not it was a CPD issue or a total community issue. Between 61-69% of respondents stated it was a community issue, not one for which the CPD is solely responsible86. There is some ambiguity here because nothing is mentioned about what exactly the community could/should do. The only mentioned societal tool to help police is called Crimestoppers, which is an anonymous tip line that offers cash rewards for information about crimes. This is not exactly “camera” surveillance, but it is a form of human surveillance that the city uses to help deter crime. There is no information reported about the correlation between the amount of crime reported/taking place before or after the implementation of Crimestoppers. To put this system in a different light, there could be a motive of investigating crime, but that did not come through in the reports compiled. When dealing with neighborhood safety, 84% “totally agreed” that they feel safe in their own neighborhood during the day and 63% feel safe in their own neighborhood at night. In both instances, the strongest dissenting group was the age group 18-24. When dealing with other neighborhoods, 73% “totally agreed” that they feel safe in other neighborhoods during the day while only 40% stated they felt safe in other neighborhoods at night. The strongest dissenting groups were from a particular district and from the number of respondents who were from the economic background earning less than $50k/year87. Again, there is incomplete information on the respondents from this district, (same with the other districts) as well as those earning less than $50k/year. There may be some overlap in this group and there may be non-statistically significant numbers associated with these groups meaning the pool of respondents that fit these particular groups could be underrepresented. While Cleveland’s survey had its defects in terms of clarity, we argue that it lays a solid foundation for Pittsburgh to build on with the hope of better understanding the relationship between city residents and law enforcement so that it can create sound guidelines for surveillance technologies and practice. 122 CMSDL Core Files 2015-2016 2NC/1NR Extensions: National Security Letters Link National Security Letters serve a very important purpose in solving high profile cases, banning them would destroy an important tool in fighting crime. Heritage Foundation 2008 (Charles Stimson and Andrew Grossman. March 14. “National Security Letters: Three Important Facts.” Accessed on the web: http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) Fact No. 2: NSLs help the FBI to "connect the dots" by using the least invasive and most effective means possible. As noted in each of the two OIG reports, NSLs have proven to be invaluable tools in counterterrorism and counterintelligence investigations. According to the FBI, the principal uses of NSLs are to:Establish evidence to support FISA applications for electronic surveillance, physical searches, or pen register/trap and trace orders;Assess communication or financial links between investigative subjects or others;Collect information sufficient to fully develop national security investigations;Generate leads for other field divisions, Joint Terrorism Task Forces, and other federal agencies or to pass to foreign governments;Develop analytical products for distribution within the FBI;Develop information that is provided to law enforcement authorities for use in criminal proceedings;Collect information sufficient to eliminate concerns about investigative subjects and thereby close national security investigations; andCorroborate information derived from other investigative techniques.[12]Information obtained from each type of NSL has allowed investigators to crack cases, especially in the realms of counterterrorism and counterintelligence . A brief examination of the success stories outlined in the OIG reports under each type of NSL proves the point. The following examples, excerpted from the OIG report, show how counterterrorism and counterintelligence investigations are supported through the lawful use of NSLs:[…]As these examples illustrate, NSLs are an extremely effective method of obtaining basic data that are crucial to discovering, monitoring, and undermining terrorist activities. They can also be used to exonerate and are frequently used in place of more invasive methods, such as surveillance, searches, and seizures, that are authorized by law and often applicable. Banning National Security Letters would be banning a harmless, yet vital, tool that the FBI uses in national security investigations. Caproni and Siegel 12 (Valerie Caproni and Steven Siegel for American Bar Association. “National Security Letters: Building Blocks for Investigation or Intrusive Tools?” Online http://www.abajournal.com/magazine/article/national_security_letters_building_blocks_for_investigations_or_intrusive_t/) Second, putting aside the hyperbole about the inherent sensitivity of the information, to consider whether the NSL standard is too low, one must consider whether the standard required in a national security investigation is in sync or out of sync with the standard that exists to get the exact same information in other contexts. The fact is that information obtainable with an NSL is also obtainable with a grand jury subpoena in any criminal investigation and with an administrative subpoena in narcotics investigations. Although such investigations are obviously important, their purpose is to investigate crimes that generally pose far less danger to public safety and the national security than is posed by the targets of national security investigations. The standard for issuance of a grand jury or administrative subpoena is that the information sought must be relevant to the crime being investigated. It would be exceedingly odd public policy to make it harder for investigators who are investigating threats to the national security to get basic transactional data than it is for investigators who are investigating routine federal crimes to get the exact same information. 123 CMSDL Core Files 2015-2016 2NC/1NR Extensions: StingRay Link Banning tools like StingRay only make it harder for to prevent crime Volokh 02 (Eugene Volokh for The Responsive Community “The Benefits of Surveillance” Online http://www2.law.ucla.edu/volokh/camerascomm.htm) But even if there is slippage, it’s important that the potential for abuse is limited and limitable. The danger isn’t the government looking into homes, or tapping private telephone conversations. Rather, it’s that cameras in public places will be abused by officials who want to harass or blackmail their political enemies. There are such rotten apples in government. If you think that there are very many and that law enforcement is fundamentally corrupt, you should oppose any extra tools for the police, because in your perspective the tools would more likely be used for ill than for good, but I don’t take so dim a view. I think that for all its faults, law enforcement is filled mostly with decent people. And more importantly, good law enforcement is vitally necessary to the safety of citizens of all classes and races. Instead of denying potentially useful tools to the police, we should think about what control mechanisms we can set up to make abuse less likely, and we should recognize that some surveillance tools can themselves decrease the risk of government abuse rather than increase it. Cellphone tracking is vital for catching criminal suspects; it was instrumental in catching the Boston bomber Warren 13 (Laura Warren for WRDW News “Cellphone Tracking Used to Catch Boston Bomber, Local Criminals” Online http://www.wrdw.com/home/headlines/Cell-phone-tracking-used-to-catch-Boston-bomber-local-criminals-204180651.html) The whole world watched as police searched for the second suspect in the Boston bombings. A cellphone left behind in a hijacked car helped lead them to Dzhokhar Tsarnaev's hiding spot.Ed Deveau, chief of police in Watertown, says, "We were able to ping that phone and find out it was in Watertown, and it was heading in a certain neighborhood of Watertown."Police can have cellphone companies ping cellphones, allowing them to find out how close to a certain cell tower the phone is. But, now, most phones come with built in GPS technology, making the signal much easier to track.Just last week, local investigators used the same technology to track down a suspect in an Augusta murder.It all started with a shooting that happened at Biltmore Place in south Augusta last Tuesday, killing a mother and injuring her two adult children.Scanner chatter revealed that the police were tracking the suspect, Steve Lawrence Allen, on his cellphone.Scanner traffic: "Download text messages and look at it, that way you'll know whether it's him or not ... download text messages and look at it, that way you'll know whether it's him or not ... Is he making calls or texting from it, or is it a possibility that he's turned it on?"The search ended 100 miles away in Toombs County. But tracking your cellphone brings up privacy issues. On the one hand, it can be a great tool for catching criminals.Lonzo Clark agrees, saying, "It's no big deal because you got nothing to hide. If you not hiding anything, it should all be all right ."Others, like Lauren Smith, say it borders on an invasion of privacy."We need to be careful how we use technology, and there's appropriate ways, and there's problematic ways," Smith said.Benjamin Hutton agrees, saying, "I understand the urgency and the desire to be safe, but I also think in 20 to 30 years, we might look back and say to ourselves, that was kind of a bad idea."It's a sticky issue because just last August, the U.S. Court of Appeals ruled that law enforcement does not need a warrant to track your cellphone, but Congress has been tossing around a bill that would overturn that. 124 CMSDL Core Files 2015-2016 2NC/1NR Link Extensions - Drone Surveillance Drones Used to Combat Crime Chris Francescani, 3-4-2013, Journalist for Reuters, "Domestic drones are already reshaping U.S.crime-fighting," Reuters, http://www.reuters.com/article/2013/03/04/us-usa-drones-lawenforcement-idUSBRE92208W20130304 "But the reality is you'll have a mission like that once or twice a year," he said. "The real utility of unmanned aerial systems is not the sexy stuff. It's the crime scene and accident reconstruction." Miller's department in rural western Colorado has the widest approval to fly drones of any local law enforcement agency in the U.S. Mesa has flown 40 missions in just over three years, "none of them surveillance," said Miller, who crafted the department's drone program and spent a year devising training protocol for fellow deputies before receiving FAA approval. "We can now bring the crime scene right into the jury box, and literally re-enact the crime for jurors," he said. Miller can program the department's GPS-enabled, 3.5-pound DraganflyerX6 quad copter to fly two concentric circles, at two elevations, capturing about 70 photos, for about $25 an hour. Drone Are Effective Crime-Fighting Tools Tina Moore, 5-20-2014, police reporter, "NYPD considering using drones to fight crime," NY Daily News, http://www.nydailynews.com/new-york/nyc-crime/nypd-drones-fight-crime-article-1.1799980 Big brother may be watching and listening more closely than ever — as the NYPD considers using drones and other gizmos to fight crime in the city. Police Commissioner Bill Bratton said the unmanned machines equipped with cameras and tiny microphones could help spy on crime hotspots — like housing projects, where shootings are up about 32% this year. “Myself, I’m supportive of the concept of drones, not only for police but for public safety in general,” Bratton said Tuesday. “It’s something that we actively keep looking at and stay aware of.” Bratton, speaking in front of the City Council’s Public Safety Committee, said the drones could also help the FDNY more quickly determine the extent of a fire. John Miller, the NYPD’s head of intelligence, said cops have been studying flying drones. They’re looking at “what’s on the market, what’s available.” Miller said the NYPD has yet to deploy a drone, but called the technology a potentially valuable weapon against crime. While drones don’t appear to be part of the city’s immediate future, the NYPD has already budgeted $500,000 for a pilot program to test gunshot detectors. Sensors connected to police cameras detect the sound of gunshots and then direct cops to their origin. The NYPD tested the detectors in Brownsville, Brooklyn, in 2011 — but the program never expanded citywide. The expense for the new round of gadgets would have to first be approved by City “They’re extraordinarily effective,” Bratton said. “The mayor is supportive of it as are many members of the Council. ...The best systems are those that you can tie in with your camera systems. You not only get recording of the gunshots but you get the camera activation right away. ” Miller said the gunshot detection system could be tied in with cameras — which could include drones — to give cops a photograph of a shooter. “You could see an application where a drone could be not only a very effective crimefighting tool but could actually show you where the bad guys are going leaving the scene,” he said. Bratton sat on the board of ShotSpotter, a company that makes the detectors, before returning to his post Council and Mayor de Blasio, who has been supportive of the idea of shot detectors in the past. as the city’s top cop in January. He said the bidding process hasn’t begun. Drones Offer Effective Methods to Reduce Crime No Author, 3-26-2014, "Domestic Drones To Enhance U.S. Patrol Procedures," No Publication, http://inpublicsafety.com/2014/03/domestic-drones-to-enhance-u-s-patrol-procedures/ These drones allow the Tijuana police to patrol areas without announcing their presence. They also give police a tactical advantage because drone operators can provide timely and accurate reports to responding patrol officers. Tijuana Chief of Police Alejandro Lares wants to use the patrol drones to prevent crime in his city. Chief Lares has stated that he is not hiding the drones from the public and wants anyone who lives or visits the city to know that they 125 CMSDL Core Files 2015-2016 will be safe because the police are watching day and night with the drones. The drone cameras are capable of nightvision operations so Chief Lares is promising 24/7 drone police patrol coverage when his fleet of drones are fully operational. At this point, they are still experimenting and working out policies and tactics for how best to use the drone platforms for observation and crime prevention. The Tijuana 3D Robotics drones can be programmed to fly a specific pattern or manually flown by a trained operator. Chief Lares stated that one drone is equivalent to 20 police officers patrolling. As the Tijuana experiment continues, early signs indicate that Chief Lares is correct in the fact that his agency is experiencing quicker response times to crimes because of the drone’s capability of offering real-time observation and reporting. Drones Provide an Advanced Method to Provide Crime Michelle Fredrickson, 10-24-2014, Science Communications student at Washington State University, "Drones Add a New Dimension to Crime Scene Investigations," Huffington Post, http://www.huffingtonpost.com/pro-journo/dronesadd-a-new-dimensio_b_6033392.html Anyone who's watched the U.S. TV show "CSI" has probably seen officers carefully measuring the distance between every object in a room, and between every speck of evidence, in order to precisely reproduce the crime scene. Police must ensure they have all the information they need before releasing a crime scene, because there's no going back to it. But now, in some areas, drones are simplifying the process, taking 15 minutes to do what takes hours by hand.In Mesa County, Colorado, the sheriff's department takes a unique approach. A drone shoots 90 photos in a grid, with a programmable amount of overlap in the images, in order to have enough information from enough angles to re-create the scene in 3-D. This conglomeration of photos is called Orthographic Mosaic Imaging, or orthomosaics, said Ben Miller, Mesa County's unmanned aircraft program director at the Sheriff's Office. While taking photos manually to aid in crime scene reconstruction is not a new concept, drones can do many things helicopters can't, and at a fraction of the cost, Miller said."One, you can't get that close to the ground because you'll destroy the crime scene with a helicopter. And two, you can't take 90 photos with a big aircraft--it's just not practical," he said. 126 CMSDL Core Files 2015-2016 2NC/1NR Uniqueness Extensions – Crime Low Now Crime rate at its lowest – multiple warrants solve Feeney 14 (Nolan Feeney, 11-10-2014, "Violent Crime Drops to Lowest Level Since 1978," TIME, http://time.com/3577026/crime-rates-drop-1970s/) LO There were 1.16 million violent crimes in 2013 Violent crime in the U.S. fell 4.4 percent last year to the lowest level in decades, the FBI announced Monday. In 2013, there were 1.16 million violent crimes, the lowest amount since the 1978’s 1.09 million violent crimes, Reuters reports. All types of violent crimes experienced decline last year, with rape dropping 6.3 percent, murder and non-negligent manslaughter dropping 4.4 percent and robbery dropping 2.8 percent. The rate of violent crime is 367.9 crimes for every 100,000 people, which marked a 5.1 percent decline since 2012. The rate has fallen each year since at least 1994. Possible reasons for the decline include the country’s high incarceration rate, an aging population and an increased use of security cameras and cell phone videos capturing incidents. Crime rates dropping significantly Chettiar 2/11 (Inimai M. Chettiar Is The Director Of The Justice Program At New York University Law School’S Brennan Center., 02-11-15, "Locking More People Up is Counterproductive," Atlantic, http://www.theatlantic.com/features/archive/2015/02/the-many-causes-of-americas-decline-in-crime/385364/) LO The Crime Decline The drop in crime stands as one of the more fascinating and remarkable social phenomena of our time. For decades, crime soared. Cities were viewed as unlivable. Politicians competed to run the most lurid campaign ads and sponsor the most punitive laws. Racially tinged “wedge issues” marked American politics from Richard Nixon’s “law and order” campaign of 1968 to the “Willie Horton” ads credited with helping George H.W. Bush win the 1988 election. But over the past 25 years, the tide of crime and violence seemed to simply recede. Crime is about half of what it was at its peak in 1991. Violent crime plummeted 51 percent. Property crime fell 43 percent. Homicides are down 54 percent. In 1985, there were 1,384 murders in New York City. Last year there were 333. The country is an undeniably safer place. Growing urban populations are one positive consequence. During that same period, we saw the birth of mass incarceration in the United States. Since 1990, incarceration nearly doubled, adding 1.1 million people behind bars. Today, our nation has 5 percent of the world’s population and 25 percent of the world’s prison population. The United States is the world’s most prodigious incarcerator. Crime rates continuing to fall Chokshi 14 (Niraj Chokshi, 12-29-2014, "In major cities, murder rates drop precipitously," Washington Post, http://www.washingtonpost.com/blogs/govbeat/wp/2015/01/02/in-major-cities-murder-rates-drop-precipitously/) LO In 1990, at the height of a decade-long crime wave that swept the nation, 2,245 people were murdered in New York City. In 2014, police investigated just 328 homicides in the five boroughs — a precipitous drop of 85 percent that’s being duplicated in major cities across the country. Preliminary figures suggest 2014 will continue a decade-long trend of falling crime rates, especially in major cities once plagued by violent crime. Criminologists say the decrease is linked to several factors, some of which are the product of smart policing, others completely out of authorities’ control. But they also say the lack of a consensus on what’s gone right has them convinced that crime rates could spike once again. “I don’t think anyone has a perfect handle on why violence has declined,” said Harold Pollack, the co-director of the University of Chicago Crime Lab. “So everyone is a bit nervous that things could turn around.” But the numbers are encouraging: Chicago recorded an all-time high of 504 killings in 2012, but just two years later homicides were down to 392, and the overall crime rate has declined to its lowest rate since 1972. Charlotte, N.C., recorded 42 killings last year, the lowest number since Mecklenburg County began keeping records in 1977. Philadelphia’s murder rate has declined from 322 in 2012 to 245 this year. Just 19 slayings were recorded in San Jose, the nation’s 11th-largest city, down from 24 the year before. Even crime-plagued Detroit, which has one of the highest murder rates in the country, is improving: The 304 homicides recorded this year are down from 333 in 2013, the lowest rate since 2010 and the secondlowest number since 1967. In the first half of the year, Phoenix police investigated just 43 homicides, down from 52 in the first half of 2013; final statistics for the Phoenix area haven’t been released yet. Kansas City, Mo., was on pace to reach its lowest rate since 1967, too. Mid-year statistics in Dallas showed the city on pace to record just half the murders of its peak in 2004. Camden, N.J., has seen the number drop by more than 50 percent since 2012. Murders in Columbus, Ohio, hit a six-year low. The Federal Bureau of Investigation and the Bureau of Justice Statistics both collect crime data at the end of each year and issue reports throughout the year. Final statistics for 2014 won’t be available for several months. But the trend lines are clear: The number of violent crimes has declined since 2006, according to the FBI’s Uniform Crime Reporting Program. The number of violent crimes committed per 100,000 people has been dropping even longer, from a high of 758 in 1991 to 367.9 in 2013. The rate hasn’t topped 500 per 100,000 people since 2001. James Alan Fox, a crime statistics expert and professor of criminology, law and public policy at Northeastern University, pointed to four major factors contributing to the falling crime rate across the country: — Long prison sentences, which have lengthened on average since sentencing reform initiatives in many states in the 1990s, have kept more criminals behind bars, albeit at a significant cost to state budgets. — Improved community policing strategies are sending cops to places where crime is more likely to occur, as a prevention method. Technologies like video surveillance and acoustic sensors, which can hear gunshots before residents report a crime, are improving police response, too. — 127 CMSDL Core Files 2015-2016 2NC/1NR Impacts Turns Case - Surveillance Fear of crime spurs local surveillance in other areas – turns case Ali Winston 9-11-2013 The East Bay Express http://www.eastbayexpress.com/oakland/we-are-being-watched/Content?oid=3706988 We Are Being Watched Our fear of another 9/11 resulted in the erosion of our privacy rights. And now our fear of crime is pushing the surveillance state to a whole new level OAKLAND, Calif. (September 11, 2013) -- It's been a dozen years since three jetliners hurtled into the World Trade Center in Lower Manhattan and the Pentagon, leaving 2,996 people dead, injuring 6,000, and setting the stage for more than a decade of American war and occupation in Central Asia and the Middle East. The events on September 11 also resulted in the fundamental alteration of American society: Our international borders are now lined with additional fences, security cameras, and thousands of new Border Patrol agents as drones sweep the skies above. And the National Security Agency -- first under President George W. Bush and now under President Barack Obama -- routinely collects our phone records and emails and monitors our Internet activity. Our government, in short, has increasingly infringed on our privacy rights and our civil liberties as part of the so-called War on Terror. And our nation, scarred by the fear of more terrorist attacks, has allowed it to happen. From Congress' easy passage of the Patriot Act to the mandatory use of biometrics to identify welfare recipients to the storing of arrestees' DNA in dozens of states -- including California -- regardless of whether they were convicted of a crime or not, these changes have penetrated every aspect of our relationship with government. And now many local public agencies -backed by generous funding from the US Department of Homeland Security, an agency established to fight terrorism -- are taking government surveillance to a new level: They're installing high-resolution surveillance cameras on street corners, buying license plate readers to monitor people's movements, and building large "intelligence centers" to collect and analyze data. And they're doing it not to protect residents from the new threats posed by terrorists in the 21st century, but to combat an age-old societal fear: crime. "Since 9/11, we've seen a huge shift with justifications and implementations," said Linda Lye, a staff attorney with the American Civil Liberties Union of Northern California. Lye has emerged as one of the sharpest critics of law enforcement surveillance programs, speaking out against both the Alameda County Sheriff's proposed purchase of drones earlier this year and Oakland's sweeping new surveillance center. "On one hand, we've got the need to fight terrorism, but what we see on the ground is purportedly anti-terrorist strategies being deployed in fairly mundane ways that alter the relationship between the community and the government." For example, there are now dozens of so-called "fusion centers" -- intelligence centers initially set up by Department of Homeland Security for counter-terrorism purposes that are now migrating toward an "all-crimes" focus -- across the country, including in San Francisco, where the Northern California Regional Intelligence Center (NCRIC) is located. Law enforcement agencies around the region feed information to NCRIC through a system called Suspicious Activity Reporting, and each department has at least one "terrorist liaison officer" tasked with delivering potentially actionable information to the fusion center. There is also a strong connection between the expansion of the government's surveillance apparatus and the War on Drugs: NCRIC shares personnel and office space with the Northern California High Intensity Drug Trafficking Area, a federal counter-narcotics effort that brings federal resources -- including aspects of the US military -- to bear on drug trafficking and drug-related crime. The East Bay, long known for its progressive values, is not exempt from this trend. Years of spiraling crime in Oakland have provided the impetus for a rapid expansion of the surveillance and intelligence-gathering capabilities of area law enforcement. This summer's furor in Oakland over the construction of the Domain Awareness Center -- a federally funded, citywide surveillance hub originally intended as an anti-terrorism tool for the Port of Oakland -- is only the most overt manifestation of this trend. Cities as divergent as Piedmont, Richmond, and San Leandro have turned to surveillance systems that were designed originally to fight terrorism in order to deal with the threat -- real or perceived -- of violent crime. At the same time, the rush by local governments to add new ways to keep tabs on citizens is being accompanied by virtually no oversight -- and no laws designed to prevent abuses. The plethora of new surveillance programs is also raising questions about whether our local governments may soon have the ability to monitor our daily movements, using street cameras and license plate readers to track us from the time we leave our homes in the morning to when we return home at night -- and whether such continual surveillance violates our constitutional rights. In addition, at least one high-ranking staffer in the City of Oakland has expressed the desire to use electronic surveillance to monitor political activity. In other words, the privacy rights and civil liberties we've given up since 9/11 to fight the War on Terror are being further eroded in the Fight Against Crime. 128 CMSDL Core Files 2015-2016 2NC/1NR Impacts Turns Case – Racism Crime creates fear and discrimination against minorities and women Theo Lorenc (et al), 2014, London School of Hygiene http://www.ncbi.nlm.nih.gov/books/NBK262852/ Crime, fear of crime and mental health: synthesis of theory and systematic reviews of interventions and qualitative evidence. Public Health Research, No. 2.2 (Chapt 3) Theo Lorenc (et al),1,* Mark Petticrew,1 Margaret Whitehead,2 David Neary,2 Stephen Clayton,2 Kath Wright,3 Hilary Thomson,4 Steven Cummins,5 Amanda Sowden,3 and Adrian Renton6. March 2014 1 Department of Social and Environmental Health Research, London School of Hygiene and Tropical Medicine, London, UK 2 Department of Public Health and Policy, University of Liverpool, Liverpool, UK 3 Centre for Reviews and Dissemination, University of York, York, UK 4 MRC Social and Public Health Sciences Unit (SPHSU), University of Glasgow, Glasgow, UK 5 School of Geography, Queen Mary University of London, London, UK 6 Institute for Health and Human Development, University of East London, London, UK * Corresponding author Third, as suggested earlier, the impacts of fear of crime are highly unequally distributed, and these inequalities tend to closely shadow the existing power relationships within society. The experience of fear of crime as a pervasive factor in one’s day-to-day existence is one that disproportionately affects women, ethnic minorities and people living in material disadvantage. For many people, fear of crime may refer as much to the latent violence that is implicit in discriminatory social structures as to the manifest violence that is measured by crime statistics; the inescapability of such fear, and its symbolic resonance with the marginalisation and devaluation of oppressed groups, may amplify its effect on mental health and well-being. Some scholars individual victimisation and structural inequality.74,75 have utilised the concept of ‘spirit injury’ to encapsulate this link between 129 CMSDL Core Files 2015-2016 2NC/1NR Impacts – Economy Crime increases have a strongly negative effect on growth Eleftherios Goulas & Athina Zervoyianni April 2012 University of Patras (Greece) Econ Department http://www.rcfea.org/RePEc/pdf/wp51_12.pdfWP 12-51 The Rimini Centre for Economic Analysis (RCEA), Italy ECONOMIC GROWTH AND CRIME: DOES UNCERTAINTY MATTER? Although there is a growing body of literature on the link between crime and macroeconomic performance, there is no crosscountry evidence on the impact on economic growth of the crimeuncertainty interaction. Yet, if the growth-uncertainty relationship is negative, as many empirical studies suggest7 , and the uncertainty-crime relationship is positive, then the crime-uncertainty interaction should exert a strong negative impact on economic growth. Our results support this view. We find evidence that increasing crime has no independent negative effect on growth under favorable economic conditions and thus under circumstances of low macroeconomic uncertainty. Higher-than-average macroeconomic uncertainty, however, enhances the adverse impact of crime on growth, making the effect of the crime-uncertainty interaction highly significant and negative. Accordingly, crime appears to be particularly harmful to growth in bad times, that is, when worsening economic conditions make the return to investment less secure. This result has important policy implications. Since the global financial crisis of 2007-2009, the degree of uncertainty surrounding macroeconomic performance in many countries has increased. At the same time, the opportunity cost of engaging in certain types of crime activity, including property crime and drug trafficking, has fallen for a number of individuals who have experienced a reduction in income as a result of the global financial crisis of 2007-2009 and of the recent European debt crisis. So, increased total crime is a possibility. Accordingly, the combined effect of higher-than average macroeconomic uncertainty and possibly higher-than-average crime may well be a further reduction in growth rates in the coming years. Increased crime takes down our economic recovery Eleftherios Goulas & Athina Zervoyianni April 2012 University of Patras (Greece) Econ Department http://www.rcfea.org/RePEc/pdf/wp51_12.pdfWP 12-51 The Rimini Centre for Economic Analysis (RCEA), Italy ECONOMIC GROWTH AND CRIME: DOES UNCERTAINTY MATTER? This paper seeks to add to the existing crime literature by exploring to what extent the degree of macroeconomic uncertainty influences the way that changes in crime impact on growth. For this purpose, we examine how the interaction between accelerations of crime and macroeconomic uncertainty affect per-capita income growth, after controlling for other explanatory variables typically included in growth regressions. We use annual data from 25 countries for the period 1991- 2007 and two alternative measures of uncertainty, based on the that the effect on growth of increased crime is asymmetric: as uncertainty regarding the future prospects of the economy increases, increasing levels of crime become more harmful to growth. In particular, we find that accelerations of crime exert a strong adverse influence on growth when interacted with high levels of macroeconomic uncertainty but have no statistically significant impact on growth when interacted with low macroeconomic uncertainty. This indicates that crime mainly contributes to reducing economic growth in bad times, that is, when worsening economic conditions, and thus higher-than-average uncertainty regarding the future state of the economy and poor business climate, make the return on private investment less secure. By contrast, conditional variance of industrial production and the unconditional variance of a survey-based consumer sentiment indicator. We find in good times, when the perceived degree of macroeconomic uncertainty is low, crime accelerations exert no independent adverse influence on growth. This result has important policy implications. It suggests that viewing crime as an important impediment to growth can be misleading if information regarding the future prospects of the economy is not explicitly taken into account. Enhanced crime results in poverty because businesses cannot strive POVERTY AND CRIME: BREAKING THE VICIOUS CYCLE Poverties.org Published Apr 2011 - Updated Apr 2013 http://www.poverties.org/poverty-and-crime.html (ac: 7-6-15) Poverty and crime have a very "intimate" relationship that has been described by experts from all fields, from sociologists to economists. The UN and the World Bank both rank crime high on the list of obstacles to a country’s development. This means that governments trying to deal with poverty often also have to face the issue of crime as they try to develop their country's economy and society. Crime prevents businesses from thriving by generating instability and uncertainty (at micro and macroeconomic levels). This is true in markets of all sizes, national, regional, municipal and even neighborhood-al (okay the word doesn’t exist). That's why having a business in a ghetto is rarely a good idea. The vicious cycle of poverty and crime International organisations also blame crime – including corruption – for putting at risk Africa's chances of development nowadays. The same goes for Latin America. Crime has this capacity to generate vicious cycles causing unemployment, economic downturns and instability. Poverty and crime combined together leave people with two choices: either take part in criminal activities or try to find legal but quite limited sources of income - when there are any available at all. Unemployment, poverty and crime Starting from the 1970s, studies in the US pointed more and more at the link between unemployment, poverty and crime. After that other connections with income level, time spent at school, quality of neighborhood and education were revealed as well. Fresh research from the UK even indicates that economic cycles may affect variations in property and violent crimes. But most importantly, what reveals the unmistakable connection between 130 CMSDL Core Files 2015-2016 poverty and crime is that they’re both geographically concentrated - in a strikingly consistent way. In other words, where you find poverty is also where you find crime. Of course this doesn't include "softer" crimes such as corruption which causes massive damage to people's lives but in a more indirect type of violence. Violent crime is costly Robert J. Shapiro is the chairman of Sonecon, LLC, a senior fellow of the Georgetown University McDonough School of Business, an advisor to the International Monetary Fund, director of the NDN Globalization Initiative, and chairman of the U.S. Climate Task Force. Kevin A. Hassett is director of economic policy studies and resident scholar at the American Enterprise Institute. The Economic Benefits of Reducing Violent Crime A Case Study of 8 American Cities June 19, 2012 https://www.americanprogress.org/issues/economy/report/2012/06/19/11755/the-economic-benefits-of-reducing-violent-crime/ (ac: 7-6-15) Violent crimes are costly. Murders, rapes, assaults, and robberies impose concrete economic costs on the victims who survive as well as the families of those who lose their lives, in the loss of earnings and their physical and emotional tolls. Violent crimes also impose large costs on communities through lower property values, higher insurance premiums, and reduced investment in high-crime areas. In addition, violent crimes impose significant costs on taxpayers, who bear the financial burden of maintaining the police personnel and operations, courts, jails, and prisons directed toward these crimes and their perpetrators. Fortunately, the incidence of violent crimes in the United States has fallen sharply over the last 20 years. From 1960 to 400 1990 the rates of these crimes rose sharply as did their attendent costs. Over that period murder rates nearly doubled, rates of rape and robbery increased fourfold, and the rate of assault quintupled. Since the early 1990s, however, rates of most violent crimes have been cut nearly in half. (see Figure 1) Surveillance checks crime – the US proves this is essential for economic growth Rohit Choudhry Mar 4 2015 Addl DG in the Punjab Police http://www.tribuneindia.com/news/comment/good-policing-a-must-for-economic-growth/49254.html Good policing a must for economic growth This result has important policy implications for India. Besides boosting the investor confidence, the programmes that directly or indirectly prevent crime can also generate substantial economic benefits by reducing crime-related costs incurred by victims (medical care costs, lost earnings, and property loss/damage), communities, and the criminal justice system which includes state, and central government funds spent on police protection, legal and adjudication services, and correction programmes. Further, there are the opportunity costs associated with the criminal's choice to engage in illegal rather than legal and productive activities and the indirect losses suffered by the victims, including pain and suffering, decreased quality of life, and psychological distress. In the US alone, more than 23 million criminal offences were committed billion in economic losses to the victims and $179 billion in government expenditures on police protection, judicial and legal activities, and corrections. However, the western world has been consistent in its efforts to raise the policing standards. In America, the fall in crime rate began around 1991; in Britain it began around 1995; in France, property related crimes rose until 2001 but it has fallen by a third since. While the sociological in 2007, resulting in approximately $15 changes like the young becoming increasingly sober and well behaved and repopulating the inner cities, economic and other factors like the end of the crack-cocaine epidemic in the 1990s are widely credited with reducing crime. Better policing, which includes both crime prevention and detection measures, have also contributed significantly to this phenomenon. Combination of community policing and intensive targeting of crime "hotspots" with the help of "CompStat'", which is a data-driven model of policing, has transformed the way streets are protected. Technology has improved the effectiveness of detective work too. The advent of mobile-phone call analysis and surveillance, Internet data connectivity, online banking and surveillance cameras have all increased the chances of tracking the digital foot prints and criminals getting caught and punished. The crime and economy correlation would suggest that adequate allocation in budgets for improving the policing could only be considered as prudent and productive spending by the governments. In the US, COPS programme had a strong federal support and the support of the US President, funds to the tune of $9 billion were provided by the federal government to implement the community policing schemes all over the country. Rule of law and economic growth The rule of law indicator measures the extent to which individuals and firms have confidence in and abide by the rules of society; in particular, it measures the functioning and independence of the judiciary, including the police, the protection of property rights, the quality of contract enforcement, as well as the likelihood of crime and violence. Judicial and the police independence are strongly linked to growth as it promotes a stable investment environment. Also, according to one study, the difference between developing economies that observe rule of law and economies that do not, is a more than 3 per cent growth in GDP. Realising the need for an environment of rule of law as an essentiality for economic growth, the Chinese government also has implemented a comprehensive legal system to shift from a system of "rule by man" to "rule by law". The Chinese government stresses on strong terms that police administration and operation must be guided by legislative provisions and has passed numerous laws and regulations in relation to police administration and operation, ushering in a new era of police development in China. CRIMINAL activity can drag the entire economy by discouraging domestic and foreign direct investments, reducing the competitiveness of business organisations, and reallocating resources. It creates uncertainty and inefficiency in the business environment. Thus, law and order is considered an important function for the state to perform and is placed among minimal functions of the state in addressing market failure. In today's globalised world, the increasing flows of economic investment and business traffic between the nations bring into focus the relationship between investment confidence and security and crime, the latter being important in terms of both official crime rates and the fear of crime. Recently, the Government of South Africa, in its green paper on policing acknowledged that high levels of violent crime in South Africa are having a significant negative impact on the country's economy. Rise of violent crimes was costing the country dearly due to loss of productivity and foreign investment. 131 CMSDL Core Files 2015-2016 2NC/1NR Impact – Poverty/Structural Violence Crime causes poverty Lippman, 91. (Theo, author of Spiro Agnew’s America and Editor at the Baltimore Sun. March 30, 1991.) DOA: 7/6/15. BALTIMORE SUN. “Poverty Doesn’t cause crime. Crime Causes Poverty.” Retrieved from: http://articles.baltimoresun.com/1991-03-30/news/1991089022_1_cost-ofcrime-poverty-fight-crime // JW POVERTY DOESN'T cause crime. Crime causes poverty. Therefore, to fight poverty, fight crime. How does crime cause poverty? Suppose your family lives just above the poverty line. A burglar breaks into your house and steals all your clothes. What it costs you to replace them drops you into poverty, since you no longer have the minimum needed for food and shelter. Or suppose you're on your way home from work. A mugger takes your paycheck and beats you up so badly that you have to miss another week's work. Losing two weeks' pay is impoverishing at many levels. In 1988, according to the Department of Justice, "the total estimated cost of crime to victims was $16.6 billion. This estimate includes losses from property theft or damage, cash losses, medical expenses and other costs. The estimate was derived by summing crime victims' estimates of the amount of stolen cash, the value of stolen property, medical expenses and the amount of pay lost from work because of injuries, police-related activities, court-related activities, or time spent repairing or replacing property." Poverty is the deadliest form of structural violence – it is equivalent to an ongoing nuclear war. Gilligan, 96’ [James, Former Director of Mental Health for the Massachusetts Prison System, Violence, p.] // JW In other words, every fifteen years, on the average, as many people die because of relative poverty as would be killed in a nuclear that caused 232 million deaths; and every single year, two to three times as many people die from poverty throughout 132 CMSDL Core Files 2015-2016 Crime Disadvantage Affirmative Answers 133 CMSDL Core Files 2015-2016 Non-unique: Crime High Now 2015 marks the rise of crime rates Gold 6/5 (Ashley Gold, 6-5-2015, "Why has the murder rate in some US cities suddenly spiked?," BBC News, http://www.bbc.com/news/world-us-canada-32995911) LO Murder and violent crime rates have risen in multiple US cities since the beginning of 2015, after falling for two decades. Some have put this down to a so-called Ferguson effect, referring to the protests against perceived police brutality, that sometimes became violent. Could that be true? What do the statistics say? There are no national figures on crime in the US available yet for 2015, but some cities have released their own figures. In New York City, the murder rate has gone up by 20% in 2015 compared with the first few months of 2014. Mayor Bill de Blasio called a special news conference at which he acknowledged the increase, but said it could be contained. He said he had faith in the New York Police Department that they will "turn the tide". In other cities, there are similar increases reported. In Baltimore, murders are up 37% and in Los Angeles, violent crime is up by 27% (although murders are down 2%). In Houston, murders are up nearly 50% so far this year. What is the Ferguson effect? This is a term coined by St Louis Police Chief Sam Dotson, whose police officers had been one of the forces dealing with the summer protests and riots in Ferguson, Missouri, following the fatal shooting of black teenager Michael Brown. He said in November his police officers had been drawing back from everyday enforcement due to fears they could be charged. As a result, he said, the "criminal element is feeling empowered". The phrase was repeated recently by Heather MacDonald, a fellow at the US Manhattan Institute, in a piece for the Wall Street Journal. The Ferguson effect, she said, was taking hold across the country "under the onslaught of anti-cop rhetoric". Multiple police officers Ms MacDonald spoke to told her police morale is at an all-time low and they are now worried about being charged, recorded and assaulted while trying to do their jobs and keep communities safe. "Unless the demonisation of law enforcement ends, the liberating gains in urban safety will be lost," she wrote. Baltimore's police boss, Anthony Batts, said the riots had another effect on crime. Scores of pharmacies had been looted and the surge in the supply of drugs has "thrown off the balance" between gangs in the city, he said. "There's enough narcotics on the streets of Baltimore to keep it intoxicated for a year," he said. Crime rates rising – specifically targeting black and the inner-city poor Wood 6/6 (Chip Wood, 6-6-2015, "Why Crime Rates Are Soaring," The NewAmerican, http://www.thenewamerican.com/reviews/opinion/item/21015-why-crime-rates-are-soaring) LO It’s being called “the Ferguson effect.” It’s the explosion of violent crimes in major U.S. cities, thanks to the ways police have been demoralized — and criminals have been emboldened — in the aftermath of police shootings of supposedly innocent blacks. In Baltimore, there were 43 homicides in the month of May. This is the highest murder rate there in more than 40 years, when the city’s population was almost 50 percent bigger than it is now. This brings the death toll for the year to 116 people, the vast majority of them blacks. Heather Mac Donald, the Thomas W. Smith fellow at the Manhattan Institute, described the situation in a May 29 column, “The New Nationwide Crime Wave.” Her piece carried the subtitle, “The consequences of the ‘Ferguson effect’ are already appearing. The main victims of growing violence will be inner-city poor.” Here’s how her article began: The nation’s two-decades-long crime decline may be over. Gun violence in particular is spiraling upward in cities across America. In Baltimore, the most pressing question every morning is how many people were shot the previous night. Gun violence is up more than 60% compared with this time last year , according to Baltimore police, with 32 shootings over Memorial Day weekend. May has been the most violent month the city has seen in 15 years. But Baltimore isn’t the only major city that has seen crime rates soar. Homicides in Atlanta were up 32 percent in the first five months of the year. In Chicago, which already was contending for the title “Murder Capital of the Country” because of the high death rate there, homicides are up 17 percent so far this year. In New York, homicides are up almost 13 percent. In St. Louis, robberies were up 43 percent during the first four months of this year. During the same period, homicides increased by 25 percent. St. Louis Police Chief Sam Dotson said a major reason for the increase is that “the criminal element is feeling empowered.” Of course it is! What else would you expect to happen when the media are only too eager to portray police as racist killers and when public officials, from city mayors to the president of the United States, are all too willing to play into this false narrative? Remember the demonization of police that occurred after the shooting of Michael Brown in Ferguson, Missouri? Although it was later proved that Brown attacked police officer Darren Wilson and wasn’t standing with his hands up, trying to surrender, the lie that he was doing so led to the slogan “Hands up, don’t shoot” being used by demonstrators all over the country. The mainstream media were only too willing to repeat every dishonest smear against the police. Publicity hound and racist agitator Al Sharpton got massive exposure for every scurrilous attack on the police that he uttered. Who cared what the truth was? The real tragedy here is that it is blacks who are the biggest victims of the soaring crime rates. They’re being raped, robbed, shot and molested by black criminals in increasing numbers. Before this year, violent crimes in America had been declining for the past two decades. Now, crime rates are soaring. As Mac Donald wrote: If these decriminalization and deincarceration policies backfire, the people most harmed will be their supposed beneficiaries: blacks, since they are disproportionately victimized by crime. Right! But will this be enough to get the Democrats who run virtually every big city in America to change their policies or for the mainstream media to expose the lies that help fuel the mayhem? Not a chance. I’m afraid things will only get worse, especially in our inner cities, before they get better — maybe a lot worse. Until next time, keep some powder dry. 134 CMSDL Core Files 2015-2016 No Link - Surveillance doesn’t reduce crime Studies show surveillance doesn’t stop crime Ali Winston 9-11-2013 The East Bay Express http://www.eastbayexpress.com/oakland/we-are-being-watched/Content?oid=3706988 We Are Being Watched Our fear of another 9/11 resulted in the erosion of our privacy rights. And now our fear of crime is pushing the surveillance state to a whole new level The Domain Awareness Center -- Oakland's planned surveillance hub that is being designed to collect data from at least 150 city and port cameras, 40 license plate readers, gunshot detectors, alarm notifications, and intelligent video programs -- is the broadest surveillance project in the region and has attracted the most criticism. Funded entirely through federal grant money and being built on a contract by Science Applications International Corporation (SAIC) -- a defense contractor with a record of making shoddy products; producing cost overruns; and defrauding municipal, federal, and foreign governments -- the surveillance center has also attracted heavy criticism for its lack of privacy or data retention policies, as well as for its plans to incorporate cameras from the Oakland Unified School District, the Oakland Coliseum, and freeways. But expanded electronic surveillance has also garnered widespread support from city residents who are fed up with crime and are willing to trade their privacy rights and civil liberties for the chance of being safer -- much as Americans have done throughout the past decade in the fight against terrorism. "People who probably in a 'normal' or less fearful crime-ridden situation would not think about wanting more cameras, but in the reality of today, I'm getting people saying, 'Can't we get more cameras in these places?'" said Dan Kalb, who represents North Oakland (one of the city's less crime-impacted neighborhoods) on the city council. "They want to be able to walk back from BART to their homes -- four blocks -without fearing having to do it. People are taking cabs from Rockridge BART home. It's a shame that it's gotten to that point." While much of the official rhetoric about the surveillance center has revolved around Oakland's high crime rate, a substantial body of research reveals that video surveillance does not impact violent crime. In London, where there are 4.2 million surveillance cameras, police studies last decade concluded that the expansion of the surveillance state had not resulted in decreased crime. Furthermore, video surveillance by law enforcement raises concerns about racial profiling. In Lansing, Michigan, an independent study of surveillance cameras concluded that black residents were twice as likely to be under continual surveillance than white residents. No data support surveillance deterrence – it doesn’t reduce crime but trades off with more effective approaches Mark Schlosberg August 2007 The California ACLU Affiliates https://www.aclunc.org/docs/criminal_justice/police_practices/under_the_watchful_eye_the_proliferation_of_video_s urveillance_systems_in_california.pdf Under the Watchful Eye The Proliferation of Video Surveillance Systems in California (and Nicole A. Ozer, co author) Even in the face of this evidence, law enforcement and government officials in California continue to claim that cameras deter crime. In San Francisco, for example, the Director of the Mayor’s Office of Criminal Justice admitted, at a public hearing on the proposed expansion of the city’s video surveillance program, that he was unaware of any studies demonstrating the effectiveness of cameras and that there had been no comprehensive study of San Francisco’s system. Yet, he continued to assert that cameras would deter crime.81 Likewise, in Clovis, Police Captain Robert Keyes asserted that cameras contributed to a reduction in crime, despite the fact that “there’s nothing other than anecdotal evidence to support that.”82 The ACLU survey found that no California jurisdiction with video surveillance cameras has conducted a comprehensive evaluation of their effectiveness. As comprehensive studies strongly suggest cameras do not deter crime , the rationale of deterrence falls short of justifying either the cameras’ expense or their intrusion into privacy. Another justification for video surveillance is that its purported ability to capture evidence of criminal activity could potentially increase the success of criminal prosecutions. In London, the role of CCTV cameras in identifying the men involved in the 2005 terrorist attacks has been highly publicized. Cameras undoubtedly capture some evidence of criminal activity, but in the limited studies available, evidence suggests that the impact of video footage on prosecutions may not be as significant as policy-makers expect. First, some evidence suggests that cameras make little difference in the number of crimes actually solved. The Glasgow study cited above, for example, found that “the cameras appeared to have little effect on the clearance rates for crimes and offenses generally. Comparing statistics before and after installation of the cameras, the clear-up rate increased slightly, from 62 to 64 percent. Once these figures were adjusted for general trends, however, the research analysts concluded that the clear-up rate fell from 64 to 60 percent.”83 Second, while some crimes are certainly captured on film, some law enforcement agencies appear to overestimate the degree to which the footage helps law enforcement actually convict criminals. In Maryland, for example, Margaret Burns, a spokesperson for the state attorney’s office, told reporters for the Washington Times that the office has not “found them to be a useful tool to prosecutors . . . they’re good for circumstantial evidence, but it definitely isn’t evidence we find useful to convict somebody of a crime . . . We have not used any footage to resolve a violent-crime case.”84 According to a study by the Maryland state attorney’s office, of the nearly 2,000 arrests made on the basis of video camera footage, the vast majority concluded in an outright dismissal or a conviction for minor crimes. The office is now questioning the large amount of taxpayer money spent on the program. “Do these prosecutorial results support millions of dollars in tax expenditures? There will have to be a public debate about this,” Burns said.85 In Cincinnati, Ohio, police also found cameras to be ineffective. A University of Cincinnati study found that the city’s program, which began in 1998, merely shifted crime beyond the view of the cameras. According to Captain Kimberly Frey, “We’ve never really gotten anything useful from them . . . we’ve never had a successful prosecution . . . we’re trying to use . . . money for other things. Video surveillance costs more than the cameras 135 CMSDL Core Files 2015-2016 alone: The dollars used to buy the system are not spent in a vacuum. Public safety budgets are stretched very thin, especially in many urban areas, so money dedicated to video surveillance often comes at the expense of potentially more effective measures, such as lighting, community policing initiatives, and increased foot patrols. Compare the lack of evidence of video surveillance’s ability to reduce crime with the remarkable results that improved lighting produces. A survey commissioned by the British Home Office looked at 13 lighting studies in Great Britain and the United States and evaluated the cumulative impact. The study found a 20 percent average decrease in crime, with reductions in every area of criminal activity including violent crime. In fact, in two areas “financial savings from reduced crimes greatly exceeded the financial costs of the improved lighting.” The report concluded: Street lighting benefits the whole neighborhood rather than particular individuals or households. It is not a physical barrier to crime, it has no adverse civil liberties implications, and it can increase public safety and effective use of neighborhood streets at night. In short, improved lighting seems to have no negative effects and demonstrated benefits for law-abiding citizens.87 Intensive foot patrols have shown similar results—reductions in crime, including violent crime, of 15 to 20 percent.88 These findings suggest that from a law enforcement and public safety perspective alone, the dedication of scarce resources to video surveillance systems may not only be an inefficient and ineffective use of funds, it may actually be counterproductive. 136 CMSDL Core Files 2015-2016 Answers to: Crime Hurts Economy No clear crime-economy relationship John Roman 9-23-2013 Urban Institute, Justice Policy Center Sr Fellow http://www.citylab.com/work/2013/09/puzzling-relationship-between-crime-and-economy/6982/The Puzzling Relationship Between Crime and the Economy Criminologists say bad economies create more crime; economists say the opposite. But recent data reveals neither explanation is right. Looking at the relationship between GDP and crime back to the earliest reliable crime data from 1960 supports both positions, suggesting there is no relationship between economic growth and crime. In the first part of the series, rising GDP is associated with rapidly increasing crime. In the second part, it is associated with declining crime. In the middle, there is no relationship at all. Most macroeconomic data show the same pattern. Consider consumer confidence data going back to the inception of the University of Michigan Consumer Sentiment data in 1978. Again, the consumer confidence data show no relationship between consumer sentiment and crime rates. That, however, is because the relationship was strongly negative prior to 1992 (meaning more confident consumers=less crime). After 1992, the pattern reverses, and the better the economy, the more crime there is. The bottom line: Crime is episodic and there is no singular effect of the economy on crime. In order to understand and prevent crime, it is therefore necessary to understand what type of period we are in. It’s also necessary to understand what forces are at work locally, rather than focus on the national picture. Next week, I will address that point. The correlation between crime and the economy is not consistent. JOHN ROMAN senior fellow in the Justice Policy Center at the Urban Institute, where he focuses on evaluations of innovative crime-control policies and justice programsSep 24, 2013 The Puzzling Relationship Between Crime and the Economy http://www.citylab.com/work/2013/09/puzzling-relationshipbetween-crime-and-economy/6982/ But as the figures below show, the relationship between crime and the economy is not as obvious as it seems, and focusing on that at the relationship between GDP and crime back to the earliest reliable crime data from 1960 supports both positions, suggesting there is no relationship between economic growth and crime. In the first part of the series, rising GDP is associated with rapidly increasing crime. In the second part, it is associated with declining crime. In the middle, relationship obscures more important predictors. Looking there is no relationship at all. Most macroeconomic data show the same pattern. Consider consumer confidence data going back to the inception of the University of Michigan Consumer Sentiment data in 1978. Again, the consumer confidence data show no relationship between consumer sentiment and crime rates. That, however, is because the relationship was strongly negative prior to 1992 (meaning more confident consumers=less crime). After 1992, the pattern reverses, and the better the economy, the more crime there is. The bottom line: Crime is episodic and there is no singular effect of the economy on crime. In order to understand and prevent crime, it is therefore necessary to understand what type of period we are in. It’s also necessary to understand what forces are at work locally, rather than focus on the national picture. Next week, I will address that point 137 CMSDL Core Files 2015-2016 Terrorism Disadvantage 138 CMSDL Core Files 2015-2016 1NC Terrorism DA A. Uniqueness Counter­terrorism is successful now because of Obama’s tough approach Benen 15 (Steve Benen, American political writer and MSNBC contributor "The scope of Obama’s counter-terrorism successes," MSNBC, www.msnbc.com/rachel-maddow-show/the-scope-obamas-counter-terrorism-successes, accessed 6-19-15] Whenever the political world’s attention turns to matters of national security and terrorism, Republican criticisms of President Obama feature familiar talking points. The president isn’t “aggressive” enough, they say. His approach must be “tougher,” like the policies adopted by the Bush/Cheney administration. Obama’s counter­terrorism policies are so ineffective, the right insists, that the White House won’t even use the specific words – “radical Islamic terrorism” – that Republicans demand to hear. But the gap between GOP rhetoric and national-security reality continues to grow. We learned yesterday, for example, that a U.S. airstrike killed Nasir al­Wuhaysh, al Qaeda’s No. 2 official – and the top guy in al Qaeda in the Arabian Peninsula. As Rachel noted on the show last night, his death is a “huge deal,” especially given the terrorist plots al- Wuhaysh has helped oversee. NBC News had a helpful report yesterday on the frequency with which U.S. strikes have successfully targeted al Qaeda’s top leaders. Since Navy SEALs killed [Osama bin Laden] in 2011, American drone strikes have taken out seven potential candidates to succeed him as the leader of what was once the most­feared terror gang. The targeted attacks started within weeks of bin Laden’s death. Three al Qaeda higher­ups were killed in June, August and September of 2011, followed by another three in late 2012 and early 2013.... Now, the death of 38-year-old Wuhayshi – killed in a strike on Friday – is seen by American intelligence officials as a major blow to al Qaeda, which is struggling with decimated ranks and ideological competition from the Islamic State. I’m reminded of this piece in The Atlantic last fall, when Jeffrey Goldberg, hardly a liberal, wrote, “Obama has become the greatest terrorist hunter in the history of the presidency.” It’s a detail Republicans simply don’t know what to do with, so they ignore it and pretend the president is indifferent to matters of national security, all evidence to the contrary notwithstanding. While GOP officials and candidates continue to insist that what really matters is word-choice, Obama’s counter-terrorism strategy includes so many successes, they no longer generate much attention. Notice, for example, just how little chatter al­Wuhaysh’s death garnered yesterday. 139 CMSDL Core Files 2015-2016 1NC Terrorism DA B. Link: the Perception of Strength in surveillance operations deters terrorism Pittenger 2014 US Rep. Robert Pittenger, chair of Congressional Task Force on Terrorism, “Bipartisan bill on NSA data collection protects both privacy and national security” - Washington Examiner, 6/9/14, http://washingtonexaminer.com/rep.-robert-pittenger-bipartisan-bill-on-nsadata-collection-protects-both-privacy-and-nationalsecurity/article/2549456?custom_click=rss&utm_campaign=Weekly+Standard+Story+Box&utm_source=weeklystandard.com&utm_medium=refer ral This February, I took that question to a meeting of European Ambassadors at the Organization for Security and Cooperation in Europe. During the conference, I asked What role does intelligence data collection three questions: 1. What is the current worldwide terrorist threat? 2. What is America’s role in addressing and mitigating this threat? 3. play in this process, given the multiple platforms for attack including physical assets, cyber, chemical, biological , nuclear and the electric grid? Each ambassador acknowledged the threat was greater today than before 9/11, with al Qaeda and other extreme Islamist terrorists stronger, more sophisticated, and having a dozen or more training camps throughout the Middle East and Africa. As to the role of the United States, they felt our efforts were primary and essential for peace and security around the world. Regarding the intelligence-gathering, their consensus was, “We want privacy, but we must have your intelligence .” As a European foreign minister stated to me, “Without U.S. intelligence, we are blind.” We cannot yield to those loud but misguided voices who view the world as void of the deadly and destructive intentions of unrelenting terrorists. The number of terrorism-related deaths worldwide doubled between 2012 and 2013, jumping from 10,000 to 20,000 in just one year. Now is not the time to stand down. Those who embrace an altruistic worldview should remember that vigilance and strength have deterred our enemies in the past. That same commitment is required today to defeat those who seek to destroy us and our way of life. We must make careful, prudent use of all available technology to counter their sophisticated operations if we are to maintain our freedom and liberties. 140 CMSDL Core Files 2015-2016 1NC Terrorism DA C. Internal Link Information we get from surveillance is vital to preventing terrorist plots, which are even more complex after 9/11. A ban would weaken our defenses. Hirsh 2013 [Michael Hirsh, chief correspondent, the National Journal, “The Next Bin Laden,” http://www.nationaljournal.com/magazine/the-next-bin-laden20131114, November 14 2013] Ever since the death of Osama bin Laden, President Obama and his senior lieutenants have been telling war-weary Americans that the end of the nation’s longest conflict is within sight. “Core al-Qaida is a shell of its former self,” Obama said in a speech in May. “This war, like all wars, must end.” That was the triumphal tone of last year’s reelection campaign, too.The truth is much grimmer. Intelligence officials and terrorism experts today believe that the death of bin Laden and the decimation of the Qaida “core” in Pakistan only set the stage for a rebirth of al-Qaida as a global threat. Its tactics have morphed into something more insidious and increasingly dangerous as safe havens multiply in war-torn or failed states—at exactly the moment we are talking about curtailing the National Security Agency’s monitoring capability. And the jihadist who many terrorism experts believe is al-Qaida’s new strategic mastermind, Abu Musab al-Suri (a nom de guerre that means “the Syrian”), has a diametrically different approach that emphasizes quantity over quality. The red-haired, blue-eyed former mechanical engineer was born in Aleppo in 1958 as Mustafa Setmariam Nasar; he has lived in France and Spain. Al-Suri is believed to have helped plan the 2004 train bombings in Madrid and the 2005 bombings in London—and has been called the “Clausewitz” of the new al-Qaida.Whereas bin Laden preached big dramatic acts directed by him and senior Qaida leaders, al-Suri urges the creation of self-generating cells of lone terrorists or small groups in his 1,600-page Internet manifesto. They are to keep up attacks, like multiplying fleas on a dog that finds itself endlessly distracted—and ultimately dysfunctional. (A classic Western book on guerrilla warfare called The War of the Flea reportedly influenced al-Suri.) The attacks are to culminate, he hopes, in acts using weapons of mass destruction.Recent terrorist attacks against U.S. targets, from the murderous 2009 spree of Army Maj. Nidal Malik Hasan at Fort Hood to the Boston Marathon bombings last year, suggest that al-Suri’s philosophy dominates al-Qaida’s newly flattened hierarchy. The late Yemeni-American imam Anwar al-Awlaki, who preached this strategy and induced Hasan’s attack, is said to have developed his ideas from al-Suri’s. Meanwhile, with new refuges in North Africa, Syria, and Yemen, jihadists have much more territory from which to hatch plots unmolested.Yet the politics at home are changing as the threat abroad is growing. The revelations dribbled out by fugitive leaker Edward Snowden have outraged members of Congress and world leaders, including those of close allies such as Germany and France. They say they are aghast at American overreach. Writing in Der Spiegel, Snowden justified himself this way: “Instead of causing damage, the usefulness of the new public knowledge for society is now clear, because reforms to politics, supervision, and laws are being suggested.” Thanks to him, Congress will almost certainly rein in the National Security Agency’s data-trolling methods—though it’s not yet clear how much.But the agency’s opponents may not realize that the practice they most hope to stop—its seemingly indiscriminate scouring of phone data and emails—is precisely what intelligence officials say they need to detect the kinds of plots al-Suri favors. For the foreseeable future, al-Suri’s approach will mean more terrorist attacks against more targets —albeit with a much lower level of organization and competence. “It’s harder to track. Future attacks against the homeland will be less sophisticated and less lethal, but there’s just going to be more of them,” says Michael Hayden, the former NSA director who steered the agency after 9/11 toward deep dives into Internet and telephonic data. Adds Mike Rogers, chairman of the House Intelligence Committee, “I think al-Qaida’s capabilities for a strike into the United States are more dangerous and more numerous than before 9/11.” For better or worse, the only hope to track them all is an exceptionally deep, organized, and free-ranging intelligence apparatus, experts say.Intelligence officials who are well briefed in the technical aspects of NSA surveillance also note that global communications are vastly more complex than they were as recently as 9/11, not just in terms of speed and bandwidth but also in the kinds of digital paths they can take . Messages can travel partly by air and partly by cable, for example, and the NSA must keep up. “If you take the diffuse physical environment [of more failed-state havens] and you layer that with the diffuse communications environment, and then you layer that with the diffuse ideological environment—more lone wolves, for example—that makes for a far more generally dangerous environment,” says a knowledgeable U.S. government official who asked to remain anonymous.All of which means that despite very legitimate questions about whether the National Security Agency is going beyond what the law and Constitution allow, Americans probably need the NSA now more than ever. 141 CMSDL Core Files 2015-2016 1NC Terrorism DA D. Counter-terrorism is vital- terrorists will go nuclear if we let our guard down. New York Times 2012 (Kenneth Brill and Kenneth Luongo. March 15. “Nuclear Terrorism: A Clear Danger.” Accessed online: http://www.nytimes.com/2012/03/16/opinion/nuclear-terrorism-a-clear-danger.html?_r=0) Terrorists exploit gaps in security. The current global regime for protecting the nuclear materials that terrorists desire for their ultimate weapon is far from seamless. It is based largely on unaccountable, voluntary arrangements that are inconsistent across borders. Its weak links make it dangerous and inadequate to prevent nuclear terrorism.Later this month in Seoul, the more than 50 world leaders who will gather for the second Nuclear Security Summit need to seize the opportunity to start developing an accountable regime to prevent nuclear terrorism. There is a consensus among international leaders that the threat of nuclear terrorism is real, not a Hollywood confection. President Obama, the leaders of 46 other nations, the heads of theInternational Atomic Energy Agency and the United Nations, and numerous experts have called nuclear terrorism one of the most serious threats to global security and stability. It is also preventable with more aggressive action.At least four terrorist groups, including Al Qaeda, have demonstrated interest in using a nuclear device. These groups operate in or near states with histories of questionable nuclear security practices. Terrorists do not need to steal a nuclear weapon. It is quite possible to make an improvised nuclear device from highly enriched uranium or plutonium being used for civilian purposes. And there is a black market in such material. There have been 18 confirmed thefts or loss of weapons-usable nuclear material. In 2011, the Moldovan police broke up part of a smuggling ring attempting to sell highly enriched uranium; one member is thought to remain at large with a kilogram of this material A terrorist nuclear explosion could kill hundreds of thousands, create billions of dollars in damages and undermine the global economy . Former Secretary General Kofi Annan of the United Nations said that an act of nuclear terrorism “would thrust tens of millions of people into dire poverty” and create “a second death toll throughout the developing world. Surely after such an event, global leaders would produce a strong global system to ensure nuclear security. There is no reason to wait for a catastrophe to build such a system.The conventional wisdom is that domestic regulations, U.N. Security Council resolutions, G-8 initiatives, I.A.E.A. activities and other voluntary efforts will prevent nuclear terrorism. But existing global arrangements for nuclear security lack uniformity and coherence.There are no globally agreed standards for effectively securing nuclear material. There is no obligation to follow the voluntary standards that do exist and no institution, not even the I.A.E.A., with a mandate to evaluate nuclear security performance.This patchwork approach provides the appearance of dealing with nuclear security; the reality is there are gaps through which a determined terrorist group could drive one or more nuclear devices.Obama’s initiative in launching the nuclear security summit process in Washington in 2010 helped focus high-level attention on nuclear security issues. Unfortunately, the actions produced by the 2010 Washington Summit and that are planned for the upcoming Seoul Summit are voluntary actions that are useful, but not sufficient to create an effective global nuclear security regime.The world cannot afford to wait for the patchwork of nuclear security arrangements to fail before they are strengthened. Instead, we need a system based on a global framework convention on nuclear security that would fill the gaps in existing voluntary arrangements. This framework convention would commit states to an effective standard of nuclear security practices, incorporate relevant existing international agreements, and give the I.A.E.A. the mandate to support nuclear security by evaluating whether states are meeting their nuclear security obligations and providing assistance to those states that need help in doing so.Nuclear terrorism is a real and present danger for all states, not just a few. Preventing it is an achievable goal. The current focus on nuclear security through voluntary actions, however, is not commensurate with either the risk or consequences of nuclear terrorism. This must be rectified. If the Seoul Nuclear Security Summit makes this a priority, there can be an effective global nuclear security regime in place before this decade ends. 142 CMSDL Core Files 2015-2016 2NC/1NR Extensions: National Security Letters Link National Security Letters serve a very important purpose in countering terrorism and upholding national security Heritage Foundation 2008 (Charles Stimson and Andrew Grossman. March 14. “National Security Letters: Three Important Facts.” Accessed on the web: http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) Fact No. 2: NSLs help the FBI to "connect the dots" by using the least invasive and most effective means possible. As noted in each of the two OIG reports, NSLs have proven to be invaluable tools in counterterrorism and counterintelligence investigations. According to the FBI, the principal uses of NSLs are to:Establish evidence to support FISA applications for electronic surveillance, physical searches, or pen register/trap and trace orders; Assess communication or financial links between investigative subjects or others;Collect information sufficient to fully develop national security investigations;Generate leads for other field divisions, Joint Terrorism Task Forces, and other federal agencies or to pass to foreign governments;Develop analytical products for distribution within the FBI;Develop information that is provided to law enforcement authorities for use in criminal proceedings;Collect information sufficient to eliminate concerns about investigative subjects and thereby close national security investigations; andCorroborate information derived from other investigative techniques.[12]Information obtained from each type of NSL has allowed investigators to crack cases, especially in the realms of counterterrorism and counterintelligence. A brief examination of the success stories outlined in the OIG reports under each type of NSL proves the point. The following examples, excerpted from the OIG report, show how counterterrorism and counterintelligence investigations are supported through the lawful use of NSLs:[…]As these examples illustrate, NSLs are an extremely effective method of obtaining basic data that are crucial to discovering, monitoring, and undermining terrorist activities. They can also be used to exonerate and are frequently used in place of more invasive methods, such as surveillance, searches, and seizures, that are authorized by law and often applicable. National Security Letters are an irreplaceable tool in counterterrorism efforts and the FBI is committed to using them ethically. F.B.I No date (Federal Bureau of Investigation. No date. “Response to DOJ Inspector General’s Report on FBI’s Use of National Security Letters.” Accessed online at http://www.fbi.gov/news/pressrel/press-releases/response-to-doj-inspector-general2019s-report-on-fbi2019s-use-of-national-security-letters) Washington, D.C. – In the post-9/11 world, the National Security Letter (NSL) remains an indispensable investigative tool. NSLs contribute significantly to the FBI’s ability to carry out its national security responsibilities by directly supporting its counterterrorism, counterintelligence, and intelligence missions. NSLs also allow the FBI to obtain information to eliminate concerns about individuals and close down investigations with a high degree of confidence there is no terrorism or adverse intelligence-gathering threat. We are pleased the Inspector General concurs with the FBI concerning the value of the NSL tool.“The Inspector General conducted a fair and objective review of the FBI’s use of a proven and useful investigative tool,” said Director Robert S. Mueller, III, “and his finding of deficiencies in our processes is unacceptable. We strive to exercise our authorities consistent with the privacy protections and civil liberties that we are sworn to uphold. Anything less will not be tolerated. While we’ve already taken some steps to address these shortcomings, I am ordering additional corrective measures to be taken immediately,” Mueller said. Importantly, the OIG found no deliberate or intentional misuse of authorities, whether NSL statutes or Attorney General Guidelines. Nevertheless, the OIG review identified several areas of inadequate auditing and oversight of these vital investigative tools, as well as inappropriate processes, and these are is implementing reforms to the process designed to correct those deficiencies identified – with accountability. Those steps include strengthening internal controls, changing policies and procedures to improve oversight of the NSL approval process, barring certain practices findings of significant concern.As a result, Director Mueller identified in the Inspector General’s report, and ordering an expedited inspection.The FBI will work together with DOJ’s National Security Division and the Privacy and Civil Liberties Office to implement these reforms. Throughout this process, the FBI will continue to work closely with the OIG to gauge progress and consider any additional reforms. 143 CMSDL Core Files 2015-2016 National Security Letters are necessary to keep America safe Heritage Foundation 2008 (Charles Stimson and Andrew Grossman. March 14. “National Security Letters: Three Important Facts.” Accessed on the web: http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) In sum, there are extensive judicial, statutory, regulatory, and institutional protections in place to ensure that NSLs are not misused and do not violate Americans' privacy rights. With the number of NSLs issued every year, it is inevitable that there will be some mistakes; but as the OIG report recognizes, Congress authorized the FBI to use NSLs in counterterrorism and counterintelligence investigations. Both OIG reports related to the FBI's use of NSLs unequivocally state that NSLs are an indispensable tool in national security investigations. Law enforcement officials, working closely with the intelligence community, need the tools contained within those authorized NSLs to keep Americans safe and to prevent future terrorist attacks. the FBI has taken major steps to improve protections and reduce their number.Conclusion 144 CMSDL Core Files 2015-2016 2NC/1NR Extensions: StingRay Link Phone surveillance is necessary; arguments to the contrary ignore the very real threat of a terrorist attack. Walpin 13 (Gerald Walpin for The National Review “We Need NSA Surveillance” Online http://www.nationalreview.com/article/355959/we-need-nsa-surveillance-gerald-walpin) After repeatedly, and correctly, proclaiming that phone and e-mail surveillance by the NSA is both necessary and constitutional, the president has succumbed to left and libertarian pressure: He has proposed installation in NSA of “a full-time civil-liberties and privacy officer” and other mechanisms in “the transparency community.” A “transparency community” within an “intelligence community” is an unworkable oxymoron. Any “civil-liberties and privacy” officer installed in NSA would, to show that he is performing, have to impede intelligence activities — a burden we do not need in our already difficult war on terrorism. Our Constitution’s authors and proponents warned against bowing to the sort of demagoguery that lies behind attacks on the NSA program as an unconstitutional invasion of our rights. The Federalist Papers — the bible of the Constitution’s meaning — warn at the outset (No. 1) of those who invoke supposed rights of the people to oppose the government’s efforts to defeat an enemy seeking to destroy us: “A dangerous ambition more often lurks behind the specious mask of zeal for the rights of the people, than under the forbidding appearance of zeal for the firmness and efficiency of government.” Continuing, “Publius” (probably Alexander Hamilton) explains why: “History will teach us that the former has been found a much more certain road to the introduction of despotism than the latter, and that of those men who have overturned the liberties of republics, the greatest number have begun their career by paying an obsequious court to the people, commencing Demagogues and ending Tyrants.” This warning is repeated: The Government’s “powers” for “the common defense . . . ought to exist without limitation: because it is impossible to foresee or define the extent and variety of national exigencies, or the correspondent extent and variety of the means which may be necessary to satisfy them” (No. 23). Again, our Founding Fathers opposed “every project that is calculated to disarm the government of a single weapon, which in any possible contingency might be usefully employed for the general defense and security ” (No. 36). Abraham Lincoln reiterated that view when attacked for violating constitutional rights by suspending habeas corpus: “Would not the official oath be broken, if the government should be overthrown, when it was believed that disregarding the single law would tend to preserve it?” Our Founders’ and Lincoln’s teaching is even stronger when applied to the NSA: Its surveillance program violates no constitutional provision. It examines only the addressee and sender on e-mails, and telephone numbers called and called from. The Supreme Court has long held that such information is not privacy-protected by the Fourth Amendment. As a former federal prosecutor, I often obtained such evidence, through law-enforcement tools known as pen registers and mail covers. Consider this real-life event: Over weeks, twelve jewelry stores in different locations are robbed, apparently by one group of unidentified robbers. Police obtain from telephone companies cell-phone records to locate any phone(s) used within 30 minutes’ distance of each robbery. Analyzing the data, they identify robbery suspects. No claim of “violation” of constitutional rights would void the suspects’ conviction. No reason to treat better those attempting to destroy this country. That enemy exists, the evidence for it consisting of 3,000 lives lost on 9/11, the Boston Marathon massacre, and even the unsuccessful terrorist attacks on our airplanes and at Times Square. The NSA program is logical. Our intelligence people know phone numbers or area codes used by terrorists in various world locations. Wouldn’t you want our intelligence services to know who in the United States called those numbers and area codes and to examine the information to determine whether those calls were innocent or not? I certainly would. If this program had been applied to identify the Boston bombers, that attack could have been prevented. Apparently recognizing that their constitutional argument on the NSA program itself is meritless, many opponents insist on a slippery slope of imagined horribles. They assert that, while using sender and recipient identities for security purposes is lawful, possessing the content of the messages would enable that to be used too, unconstitutionally — despite NSA’s denial that it has been done, and despite the absence of contrary evidence. That imagined horrible is akin to depriving all soldiers and police officers of their guns because it is conceivable that some power-hungry president or governor could, in the future, employ armed soldiers or police to seize autocratic power. Imagined horribles do not supersede the reality of terrorists seeking to destroy us. 145 CMSDL Core Files 2015-2016 Without Stingray style surveillance devices, terrorists will be able to remain anonymous Gamma Group 11 (manufacturer of a Stingray style device. “3G­GSM Tactical Interception and Target Location” https://www.documentcloud.org/documents/810727-772-gamma-group-catalogue-3g-gsm-tactical.html) Cellular networks have created a haven for criminals and terrorists. Over GSM & 3G networks, criminals and terrorist can remain anonymous, able to continue illegal activities on a global scale without fear of action because: • ● No Local Registration is required - criminals are able to use pre-paid SIM cards or foreign SIM cards without the need to supply any information • ● Post-Paid Subscription Fraud - criminals are easily able to reprogram phones with a fake identity or use stolen phones and SIM cards. Although powerful Strategic/Countrywide surveillance monitoring tools are at the disposal of Law Enforcement Agencies, the ability to monitor specific criminals/targets critically requires having specific target identity data. In the case of cellular networks the fundamental information is the IMSI (unique identifier or serial number of the SIM) and the IMEI (unique identifier or serial number of the handset) The IMSI and IMEI is highly prized data, and to protect users it is not normally transmitted within cellular networks. However, if the data is obtained, then Law Enforcement Agencies have all they need to monitor Target(s). The challenge is how to overcome the protective security messages within cellular networks protecting their subscribers and covertly elicit specific target user data. Fortunately, to assist Law Enforcement Agencies we are able to offer solutions which can overcome these challenges. Tactical off-air solutions are available which are able to emulate the cellular network in order to: 1. Indentify & Locate GSM Target(s) Cell-phones Determine and locate the identity of a Target(s) GSM cell-phone by pretending to be the real network and tricking the phone to register accordingly. This process allows the unique identity of the phone (IMEI) and the SIM card (IMSI) to be covertly captured, and designated a Target to be precisely located. 2. Identify & Locate 3G Target(s) cell-phones Determine and locate the identity of a Target(s) 3G cell-phone by pretending to be the real network and tricking the phone to register accordingly. THis process allows the unique identity of the phone (IMEI) and the SIM card (IMSI) to be covertly captured, and designated Targets to be precisely located. 3. Intercept the Voice and SMS Communication of Designated Targets The communication of Target(s) under surveillance can be captured without their knowledge, including: ● all Voice calls & SMS either made or received by Target(s) ● spoof the identity of Target(s) to falsely send SMS or Voice calls ● divert Calls/SMS so they are not received by the Target(s) the ability to edit all SMS before they are received by the Target(s) 146 CMSDL Core Files 2015-2016 Links—Drones Drones are critical to combat bio- and chemical-terror Koerner 2015 (Matthew R [Duke University School of Law, J.D. expected 2015]; DRONES AND THE FOURTH AMENDMENT: REDEFINING EXPECTATIONS OF PRIVACY; 64 Duke L.J. 1129; kdf) Senator Dianne Feinstein, a staunch advocate of governmental surveillance n1 and Chairman of the 113th Congress's Senate Intelligence Committee, n2 recently found herself, rather ironically, as the target of surveillance. n3 One day at her home, Senator Feinstein walked to the window to check on a protest that was taking place outside. n4 Much to her surprise, a small drone n5 hovered on the other side of the window, only inches away, spying on her. n6 The drone immediately flew away. n7 Senator Feinstein's experience is just one example of drones being used for surveillance within the United States. But her story and others like it n8 have sparked significant controversy over the use of drones for domestic surveillance, which falls within a broader debate [*1131] on privacy and governmental Advocates of robust federal surveillance policies champion governmental surveillance as the only way to prevent terrorist and cyber attacks against the United States . n10 President Barack Obama defended these surveillance programs as ""modest encroachments on privacy'" that "strike the "right balance' between national security and civil liberties." n11 In comparison, privacy advocates envision these surveillance surveillance programs. n9 programs leading to a dystopian, totalitarian government watching over its citizenry - undetected but omnipresent. n12 References to George Orwell's Nineteen drones currently provide many practical benefits and their projected applications seem limitless. n15 Based on their obvious advantage of being unmanned, drones have the capability to conduct missions previously considered too risky, dangerous, or impracticable. These applications are also provided at continuously decreasing costs and with the latest technological sophistication, such as the capability to see through physical obstructions, to detect various chemical and biological agents in the air, to recognize human faces and license plates, and to fly Eighty-Four n13 abound. n14 [*1132] Apart from the surrounding privacy-concerns debate, in strategic, coordinated formations. n16 The plan grounds drones – blocking preventive measures McNeal 2014 (Gregory [prof at Pepperdine University]; Drones and Aerial surveillance: Considerations for Legislators; Nov; www.brookings.edu/research/reports2/2014/11/dronesand-aerial-surveillance; kdf) To counter the threat of surveillance, privacy advocates have focused solely on requiring warrants before the use of drones by law enforcement. Such a mandate oftentimes will result in the grounding of drone technology in circumstances where law enforcement use of drones would be beneficial and largely non-controversial. For example, in light of the Boston Marathon bombing, police may want to fly a drone above a marathon to ensure the safety of the public. Under many bills, police would not be allowed to use a drone unless they had a warrant, premised upon probable cause to believe a crime had been or was about to be committed. This requirement exceeds current Fourth Amendment protections with regard to the reasonableness of observing activities in public places. What this means is that the police would need to put together a warrant application with sufficient facts to That application would need to define with particularity the place to be searched or the persons to be surveilled. All of this would be required to observe people gathered in a public place, merely because the observation was taking place from a drone, rather than from an officer on a rooftop or in a helicopter . In a circumstance like a marathon, this probable cause showing will be difficult for the police to satisfy . After all, if the police knew who in the crowd was a potential bomber, they would arrest those individuals. Rather, a marathon is the type of event where the police would want to use a drone to monitor for unknown attackers, and in the unfortunate event of an attack, use the footage to identify the perpetrators. This is precisely the type of circumstance where the use of drone could be helpful, but unfortunately it has been outlawed in many states. To make matters worse, this type of drone surveillance would pose little to no harms to privacy. A marathon is a highly public event, the event is televised, it takes place on streets where prove to a judge that they had probable cause. there are surveillance cameras and spectators are photographing the event. Moreover, in the states where drones have been banned (unless accompanied by a This technology centric approach has done little to protect privacy, but will certainly harm public safety, depriving law enforcement of a tool that they could use to protect people. warrant), the police have not been prohibited from using any other type of surveillance equipment --- just drones. 147 CMSDL Core Files 2015-2016 2NC/1NR Uniqueness—Surveillance Solves Terror Now US preventing terrorist attacks now due to intelligence McDONOUGH ‘15 DOUG McDONOUGH -managing editor at Plainview Herald. Internally quoting James Olson – who has 31 years as an American spy – “U.S. winning the war on terror” – MyPlainview.com - February 28, 2015 http://www.myplainview.com/news/article_c1881ec4-bf9b-11e4-a9b1-b342ff9491d6.html James Olson is blunt in his assessment. "Make no mistake, our country is at war," he said Thursday while keynoting the annual Plainview Chamber of Commerce banquet. "It's a war on terror, and it will be long, bloody and deadly. But America will win this war because our best young people today are stepping forward in droves." While many of those are putting on uniforms and joining the ranks of the nation's combat forces on the front lines, still more are going in harm's way behind the scenes as counterintelligence operatives. "We are on the front lines in the war on terror," Olson warns. "And we will be hit again, inside our own borders. It will be a weapon of mass destruction, and no region or sector is immune from this attack. The best way to combat this threat is through good intelligence." After spending 31 years as an American spy, The war on terror is on the brink — status quo surveillance solves, but removal of any one part can cause collapse. Hamilton 15 — Lee Hamilton, Professor of Practice and International Law at Indiana University, Director of the Center on Congress at Indiana University, J.D. from DePauw University, 2015 (“To Win the War on Terror, We Must Win the War of Ideas,” Huffington Post, February 20th, accessible online at http://www.huffingtonpost.com/lee-h-hamilton/to-win-thewar-on-terror-_b_6722214.html, accessed on 6-20-15) Clearly then, the unpredictable danger posed by terrorism has not subsided. The fact that terrorism is becoming increasingly decentralized makes dealing with it even more difficult. While ISIS has become the major terrorist group, it is one of many groups engaged in deadly activities, including al-Qaeda. The question now is: Can we roll ISIS back? To do so, we need a more comprehensive approach and a unity of effort that fully engages the president, Congress, our military and intelligence capabilities, and our allies around the world. Without doubt, we have experienced considerable success in the fight against terror. Almost weekly we hear of top terrorist leaders being removed by our drone and other anti-terrorism strikes. Yet somehow the terrorists seem to recover quickly and keep coming. Our attacks, while effective, haven't quite quelled the terrorists' momentum, which is reflected by the numbers of members and new recruits. In 2001, by one estimate, we identified about 300 al-Qaeda members and affiliates worldwide. In 2015, there are more than 30,000 al-Qaeda fighters in Syria alone. We should not forget the successes we've had in the fight against terror. At the same time, surveying the current landscape suggests that the U.S. and its allies need to up their games considerably in dealing with ISIS and other terrorist groups. Upping our game will require that we focus more intently on several critical components of our counterterrorism policy. Among those components is intelligence. Because it can prevent attacks, intelligence is everyone's favorite weapon in the fight against terrorism. Simply put, even the smallest amount of information , combined with other bits of information, can prevent a massive attack . However, gathering meaningful intelligence has 148 CMSDL Core Files 2015-2016 become an increasingly formidable task, since, once again, we're not dealing with a single state. We're faced with a diffuse threat and groups that continue to evolve, spread out and decentralize. ISIS is expanding beyond Syria and Iraq to Libya, Egypt, Algeria and other countries. Widespread Surveillance Programs are Keeping Terror Plots in Check—Massive Attacks Would Have Taken Place Without It Boot ’13 Max Boot is a Senior Fellow in National Security Studies at the Council on Foreign Relations. In 2004, he was named by the World Affairs Councils of America as one of "the 500 most influential people in the United States in the field of foreign policy." In 2007, he won the Eric Breindel Award for Excellence in Opinion Journalism. From 1992 to 1994 he was an editor and writer at the Christian Science Monitor. Boot holds a bachelor's degree in history, with high honors, from the University of California, Berkeley and a master's degree in history from Yale University. Boot has served as an adviser to U.S. commanders in Iraq and Afghanistan. He is the published author of Invisible Armies: An Epic History of Guerrilla Warfare from Ancient Times to the Present. From the article: “Stay calm and let the NSA carry on” - LA Times – June 9th - http://articles.latimes.com/2013/jun/09/opinion/la-oe-boot-nsa-surveillance20130609 After 9/11 there was a expectation of more terror attacks on the U S So far that hasn't happened on the whole we have been a lot safer than most security experts expected. In light of N S A monitoring telephone calls it is worthwhile to ask Why is that? It is certainly not due to any change of heart among our enemies. 50 terror attacks on the American homeland had been foiled since 2001. , widespread many ist nited tates. . We haven't escaped entirely unscathed (see Boston Marathon, bombing of), but , including me, the current controversy over the and emails, ational ecurity gency's of : Radical Islamists still want to kill American infidels. But the vast majority of the time, they fail. The Heritage Foundation estimated last year that ist Some, admittedly, failed through sheer incompetence on the part of the would-be terrorists. For instance, Faisal Shahzad, a Pakistani American jihadist, planted a car bomb in Times Square in 2010 that started smoking before exploding, thereby alerting two New Yorkers who in turn called police, who were able to defuse it. But it would be naive to adduce all of our security more attacks would have succeeded absent the ramped-up counter-terror efforts undertaken by the U.S. intelligence community a large element of the success lies in use of communications intercepts. That is the success to pure serendipity. Surely ism , the military and law enforcement. And intelligence community's its special intelligence — that is, The CIA is notoriously deficient in human intelligence — infiltrating spies into terrorist organizations is hard to do, especially when we have so few spooks who speak Urdu, Arabic, Persian and other relevant languages. But the NSA is the best in the world at intercepting communications. most important technical advantage we have in the battle against fanatical foes who will not hesitate to sacrifice their lives to take ours Which brings us to the monitoring programs Another program provides access to all the emails, videos and other data found on the servers of major Internet firms such as Google these intelligence-gathering activities raise the specter of ordinary American citizens . In fact, there are considerable safeguards built in programs to ensure that doesn't happen The phone-monitoring program does not allow the NSA to listen in on conversations without a court order. All that it can do is to collect information on the time, date and destination of phone calls. . current kerfuffle over two NSA that have been exposed by the Guardian and the Washington Post. One program apparently collects metadata on all telephone calls made in the United States. , Apple and Microsoft. At first blush Big Brother snooping on who might be cheating on their spouses or bad-mouthing the president to both . It should go without saying that it would be pretty useful to know if someone in the U.S. is calling a number in Pakistan or Yemen that is used by a terrorist organizer. As for the Internet-monitoring program, reportedly known as PRISM, it is apparently limited to "non-U.S. persons" who are abroad and thereby enjoy no constitutional protections. These are hardly rogue operations. Both programs were initiated by President George W. Bush and continued by President Obama with the full knowledge and support of Congress and continuing oversight from the federal judiciary. That's It's possible that government But there is no evidence of abuse so far that these programs have been effective in disrupting why the leaders of both the House and Senate intelligence committees, Republicans and Democrats alike, have come to the defense of these activities. programs could be abused and plenty of evidence terror plots. , these — in the lack of successful terrorist attacks — ist , like all — see, for example, the IRS making life tough on tea partiers. Granted there is something inherently creepy about Uncle Sam scooping up so much information about us. But Google, Facebook, Amazon, Twitter, Citibank and other companies know at least as much about us, because they use very similar data-mining programs to track our online movements. They gather that information in order to sell us products, and no one seems to be overly alarmed. The NSA is gathering that information to keep us safe from terrorist attackers. Yet somehow its actions have become a "scandal," to use a term now loosely being tossed around. The real scandal here is that the Guardian and Washington Post are compromising our national security by telling our enemies about our intelligence-gathering capabilities. Their news stories reveal, for example, that only nine Internet companies share information with the NSA. This is a virtual invitation t o terrorists to use other Internet outlets for searches, email, apps and all the rest. No intelligence effort can ever keep us 100% safe, but to stop or scale back the NSA's special intelligence efforts would amount to unilateral disarmament against terror in a war ism that is far from over. 149 CMSDL Core Files 2015-2016 2NC/1NR Extension: Impact (Nuclear Terrorism) Surveillance prevents war and terrorist attacks Armstrong 13 (Stuart Armstrong for Aeon “The Strange Benefits of a Total Surveillance State” Online http://aeon.co/magazine/society/the-strange-benefits-of-a-total-surveillance-state/) The military is another arm of state power that is ripe for a surveillance-inspired shrinking. If cross-border surveillance becomes ubiquitous and effective, we could see a reduction in the $1.7 trillion that the world spends on the military each year. Previous attempts to reduce armaments have ultimately been stymied by a lack of reliable verification. Countries can never trust that their enemies aren’t cheating, and that encourages them to cheat themselves. Arms races are also made worse by a psychological phenomenon, whereby each side interprets the actions of the other as a dangerous provocation, while interpreting its own as purely defensive or reactive. With cross-border mass surveillance, countries could check that others are abiding by the rules, and that they weren’t covertly preparing for an attack. If intelligence agencies were to use all the new data to become more sophisticated observers, countries might develop a better understanding of each other. Not in the hand-holding, peace-and-love sense, but in knowing what is a genuine threat and what is bluster or posturing. Freed from fear of surprising new weapons, and surprise attacks, countries could safely shrink their militaries. And with reduced armies, we should be able to expect reduced warfare , continuing the historical trend in conflict reduction since the end of the Second World War. […]Likewise, mass surveillance could prevent the terrorist use of nukes, dirty bombs, or other futuristic weapons. Instead of blanket bans in dangerous research areas, we could allow research to proceed and use surveillance to catch bad actors and bad practices. We might even see an increase in academic freedom. 150 CMSDL Core Files 2015-2016 Impact—Turns the Aff (Racism) Terror attack spikes racial hate crimes Akram 2002 Et al - SUSAN MUSARRAT AKRAM, Professor and Supervising Attorney - Boston University International Human Rights Clinical Program. “Race, Civil Rights, and Immigration Law after September 11, 2001: The Targeting of Arabs and Muslims.” NYU Annual Survey of American Law 58 (2002), 295-355. http://www.privacysos.org/sites/all/files/akram.pdf Times of crisis are often accompanied by hostility toward minorities in the United States. For Arabs and Muslims, this may be even more problematic, as perpetrators of hate crimes against Arabs and Muslims frequently fail to differentiate among persons based on religion or ethnic origin, from Pakistanis, Indians, Iranians, and Japanese to Muslims, Sikhs and Christian Arabs .89 The widespread perception in the United States is that Arabs and Muslims are identical and eager to wage a holy war against the United States.90 In fact, according to a 1993 report, only 12% of the Muslims in the United States at that time were Arab,91 and Arab Mus-lims are even a minority in the Arab-American community.92 Although there are Muslim “extremists,” the majority of Muslims are “decent, law-abiding, productive citizens.”93 Because of the lack of differentiation between different acts by small groups of Arabs and Muslims often have been followed by generalized hostility toward entire communities of Arabs and Muslims in the United States. For types of Arabs and Muslims, terrorist example, after Lebanese Shi’a gunmen in 1985 highjacked TWA Flight 847 to Beirut, beat an American on the plane to death, and held the remaining passengers hostage for over two weeks,94 violent attacks against persons of Arab and Muslim origin occurred across the United States.95 Islamic centers and Arab-American organizations were vandalized and threatened. A Houston mosque was firebombed. A bomb exploded in the AmericanArab Anti-Discrimination Committee office in Boston, severely injuring two policemen. 96 Later that same year, after terrorists hijacked the Achille Lauro cruise liner and murdered a passenger, a wave of anti-Arab violence swept the country, including the bombing of an American- Arab AntiDiscrimination Committee office that killed its regional executive director.97 History proves terrorism leads to hate crimes and backlash King, 2012 (Ryan D. King is an associate professor of sociology at the State University of New York at Albany in the United States., “Terrorist Attacks and Hate Crimes: Lessons from 9/11”, http://extremisproject.org/2012/12/terrorist-attacks-and-hate-crimes-lessons-from-911/, December 10, 2012, ak.) Yet there is also a story to be told about the aftermath, and among the lessons we learned from 9/11 is that a backlash in the form of hate crime is likely to follow. The murder of Balbir Sodhi was one of many hate crimes perpetrated against Muslims and Arabs, or those who appeared to be of that faith or ethnicity, beginning on September 11th, 2001. According to hate crime statistics provided by the FBI, there were over 1,000 hate crimes with an anti-Muslim or anti-Arab motive during the fourteen-day period beginning on September 11th.* By comparison, fewer than 300 hate crimes with this motivation were reported to the FBI between January 1st and September 10th of that year. If we focus only on anti-Islamic hate crimes (omitting anti-Arab), 60% of the hate crimes that year occurred during that two-week post-9/11 hate crime wave was fueled largely by the emotion of anger and the desire for retribution that pervaded the United States, a fact that should not surprise us. The 20th century is replete with examples of mass violence against minority groups that were ignited by terrorist attacks or assassinations. stretch. The For instance, the Kristallnacht pogrom that took of the lives of many German Jews in November of 1938 followed the assassination of a German diplomat at the hands of a psychologist Brian Lickel and his colleagues refer to this tendency as ‘vicarious retribution’ – a proclivity to punish innocent third parties who in some way resemble the perpetrators of an attack – and this sentiment is often found in the wake of terrorist acts. When my colleagues, Ilir Disha (University at Jewish youth. The Albany and lead author of the study) and James Cavendish (University of South Florida), and I wrote about post-9/11 hate crimes in the United States in the journal Social Problems, we focused on the broader lessons to be learned from the 9/11 case. Our study looked at the pre and post-9/11 hate crimes in detail, breaking down crimes by day and type to answer some fundamental questions. For instance, how long did the post-9/11 hate crime wave last? Were hate crimes more likely to be perpetrated in New York and Washington than places not directly targeted by the terrorists? Were these crimes perpetrated by organized groups? And what, if anything, might be done to stymie hate crime waves in the future? Our results suggest a few patterns. Hate crime waves following terrorist attacks are intense but short in duration With respect to the first issue – the duration of the hate crime wave – our analysis shows that post 9/11 hate crimes took the form of a peak more than a plateau (see Figure below). The crime wave began abruptly on September 11th and reached its highpoint within 48 hours, and the subsequent decline was nearly as rapid. In short, we can expect hate crime waves following terrorist attacks by foreign groups to be immediate and intense, but ultimately short in duration. There is some evidence that hate crime levels never fully returned to pre-9/11 averages, but clearly the initial wave quickly subsided. Attacks are geographically dispersed and victimization risk is associated with target population size We also find that hate crimes increased across the country. That Balbir Sodhi was murdered thousands of miles from the site of the attacks is not anomalous. Anti-Muslim hate crimes increased in Mesa as well as New York; in Chicago as much as in Washington. Among the few demographic characteristics that help sort out where Arabs and Muslims were at higher risk are the size of these respective populations. Intuitively, the raw number of hate crimes was more likely in counties with larger Arab and Muslim populations, largely because of 151 CMSDL Core Files 2015-2016 opportunity; more targets equate to more crimes. Yet if we look at the rate of hate crimes per Arab or Muslim population, our analysis suggests that individual Arabs and Muslims were at higher risk of victimization where they were small in number. Counties with large Arab populations, such as Wayne County in Michigan (largest city is Detroit) experienced more hate crimes than other large counties, but when standardizing this number by the Arab population the rate was far smaller than other counties. From the victim’s perspective we might say there is safety in numbers. Evidence suggests hate crimes were rarely the work of organized hate groups Finally, there is no evidence that a sizeable proportion of hate crime was perpetrated by organized hate groups. According to the Southern Poverty Law the number of anti-Muslim hate groups increased after the attacks of 2001, yet the FBI data and media reports of hate crimes indicate that people like Frank Roque were the more common perpetrator – angry men with a Center, an organization that tracks extremist groups, grievance, but not actively involved with an extremist organization. Two additional points are pertinent to the aftermath of mass terrorism, particularly as it relates to hate crime. First, is the post 9/11 hate crime wave unique? Or should we expect a similar backlash in other settings? In my assessment 9/11 is unique only in its magnitude. We saw a smaller but hardly negligible increase in hate crimes against Muslims following the Oklahoma City Bombing in 1995, for which responsibility was initially attributed to Islamic fundamentalists (it was soon revealed that an American, Timothy McVeigh, was responsible, and the anti-Muslim attacks ceased). As the economist Steven Machin has found in his research, attacks against Muslims also rose sharply following the bombing of the London Underground in July of 2005. A violent wave of anti-Islamic attacks also followed a backlash seems predictable, particularly following lethal attacks in which responsibility is attributed to a specific minority group. Finally, can anything be done to prevent hate crimes deadly attack on a train in India in February of 2002. A against innocent civilians if another terrorist attack occurs? My guess is there is little that local or federal governments could have done to prevent the murder of Mr. Sodhi. However, if the goal is to minimize the intensity of attacks on innocent third parties following a terrorist act, two actions are worth trying. The first is simply disseminating Arabs and Muslims (and Sikhs as well) should take extra precautions during the week following a terrorist attack in clearly at a higher risk of victimization during the week or two after an attack such as 9/11 or July 7. A second action calls on leaders to confront the issue early and publicly. About a week following the 9/11 attacks information to at-risk populations. which Islamist fundamentalists are suspects. They are President Bush gave a speech stating that the true faith of Islam was not about terrorism, and that Muslim Americans should be treated with respect. Whether this speech truly had an effect is beyond the scope of this blog (although hate crimes decreased after the speech), but setting the tone at the top is among the few weapons in the government’s the lessons of 9/11 suggest that the potential for reactionary crime and violence is high, and we should plan accordingly. arsenal. Our first hope is that terrorism does not occur. But if it does, 152 CMSDL Core Files 2015-2016 Impact—Turns the Aff (Civil Liberties) Even an infinitesimal risk of our disad should outweigh the aff – all of their harms assume “potential” surveillance and ignore that another domestic terror attack would decimate the civil liberties that exist now Friedman, 2013 (Thomas L. Friedman became The New York Times foreign affairs Op-Ed columnist in 1995. He joined the paper in 1981, after which he served as the Beirut bureau chief in 1982, Jerusalem bureau chief in 1984, and then in Washington as the diplomatic correspondent in 1989, and later the White House correspondent and economic correspondent. Mr. Friedman was awarded the 1983 Pulitzer Prize for international reporting (from Lebanon) and the 1988 Pulitzer Prize for international reporting (from Israel). He also won the 2002 Pulitzer Prize for commentary. Mr. Friedman is the author of “From Beirut to Jerusalem,” which won the National Book Award in 1989. He has written several other books, including “Hot, Flat and Crowded,” an international best seller. Born in Minneapolis, Mr. Friedman received a B.A. degree in Mediterranean studies from Brandeis University in 1975. In 1978 he received a master’s in modern Middle East studies from Oxford, “Blowing a Whistle”, http://www.nytimes.com/2013/06/12/opinion/friedmanblowing-a-whistle.html, June 12, 2013, ak.) I’m glad I live in a country with people who are vigilant in defending civil liberties. But as I listen to the debate about the disclosure of two government programs designed to track suspected phone and e-mail contacts of terrorists, I do wonder if some of those who unequivocally defend this behaving as if 9/11 never happened — that the only thing we have to fear is government intrusion in our lives, not the intrusion of those who gather in secret cells in Yemen, Afghanistan and Pakistan and plot how to topple our tallest buildings or bring down U.S. airliners with bombs planted inside underwear, tennis shoes or computer printers. Yes, I worry about potential government abuse of privacy from a program designed to prevent another 9/11 — abuse that, so far, does not appear to have happened. But I worry even more about another 9/11. That is, I worry about something that’s already happened once — that was staggeringly costly — and that terrorists aspire to repeat. I worry about that even more, not because I don’t care about civil liberties, but because what I cherish most about America is our open society, and I believe that if there is one more 9/11 — or worse, an attack involving nuclear material — it could lead to the end of disclosure are the open society as we know it . If there were another 9/11, I fear that 99 percent of Americans would tell their members of Congress: “Do whatever you need to do to, privacy be damned, just make sure this does not happen again .” That is what I fear most. That is why I’ll reluctantly, very reluctantly, trade off the government using data mining to look for suspicious patterns in phone numbers called and e-mail addresses — and then have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress — to prevent a day where, out of fear, we give government a license to look at anyone, any email, any phone call, anywhere, anytime. What we don't need is to give up our freedoms just to address levels of paranoia that are, frankly, infantile. So I don’t believe that Edward Snowden, the leaker of all this secret material, is some heroic whistle-blower. No, I believe Snowden is someone who needed a whistle-blower. He needed someone to challenge him with the argument that we don’t live in a world any longer where our government can protect its citizens from real, not imagined, threats without using big data — where we still have an edge — under constant judicial review. It’s not ideal. But if one more 9/11-scale attack gets through, the cost to civil liberties will be so much greater. A hat tip to Andrew Sullivan for linking on his blog to an essay by David Simon, the creator of HBO’s “The Wire.” For me, it cuts right to the core of the issue. “ You would think that the government was listening in to the secrets of 200 million Americans from the reaction and the hyperbole being tossed about,” wrote Simon. “And you would think that rather than a legal court order, which is an inevitable consequence of legislation that we drafted and passed, something illegal had been discovered to the government’s shame. Nope. ... The only thing new here, from a legal standpoint, is the scale on which the F.B.I. and N.S.A. are 153 CMSDL Core Files 2015-2016 apparently attempting to cull anti-terrorism leads from that data. ... I know it’s big and scary that the government wants a database of all phone calls. And it’s scary that they’re paying attention to the Internet. And it’s scary that your cellphones have GPS installed. ... The question is not should the resulting data exist. It does. ... The question is more fundamental: Is government accessing the data for the legitimate public safety needs of the society, or are they accessing it in ways that abuse individual liberties and violate personal privacy — and in a manner that is unsupervised. And to that, The Guardian and those who are wailing jeremiads about this pretend-discovery of U.S. big data collection are noticeably silent. We don’t know of any actual abuse .” We do need to be constantly on guard for abuses. But the fact is, added Simon, that for at least the last two presidencies “this kind of data collection has been a baseline logic of an American anti-terrorism effort that is effectively asked to find the needles before they are planted into haystacks, to prevent even such modest, grass-rooted conspiracies as the Boston Marathon bombing before they occur.” To be sure, secret programs, like the virtually unregulated drone attacks, can lead to real excesses that have to be checked. But here is what is also real, Simon concluded: “ Those planes really did hit those buildings. And that bomb did indeed blow up at the finish line of the Boston Marathon. And we really are in a continuing, low-intensity, high-risk conflict with a diffuse, committed and ideologically motivated enemy. And, for a moment, just imagine how much bloviating would be wafting across our political spectrum if, in the wake of an incident of domestic terrorism, an American president and his administration had failed to take full advantage of the existing telephonic data to do what is possible to find those needles in the haystacks.” And, I’d add, not just bloviating. Imagine how many real restrictions to our beautiful open society we would tolerate if there were another attack on the scale of 9/11 . Pardon me if I blow that whistle. 154 CMSDL Core Files 2015-2016 Impacts—Nuclear Terrorism Causes War Terrorist retaliation causes nuclear war – draws in Russia and China Robert Ayson, Professor of Strategic Studies and Director of the Centre for Strategic Studies: New Zealand at the Victoria University of Wellington, 2010 (“After a Terrorist Nuclear Attack: Envisaging Catalytic Effects,” Studies in Conflict & Terrorism, Volume 33, Issue 7, July, Available Online to Subscribing Institutions via InformaWorld) A terrorist nuclear attack, and even the use of nuclear weapons in response by the country attacked in the first place, would not necessarily represent the worst of the nuclear worlds imaginable. Indeed, there are reasons to wonder whether nuclear terrorism should ever be regarded as belonging in the category of truly existential threats. A contrast can be drawn here with the global catastrophe that would come from a massive nuclear exchange between two or more of the sovereign states that possess these weapons in significant numbers. Even the worst terrorism that the twenty-first century might bring would fade into insignificance alongside considerations of what a general nuclear war would have wrought in the Cold War period. And it must be admitted major nuclear weapons states have hundreds and even thousands of nuclear weapons at their disposal, there is always the possibility of a truly awful nuclear exchange taking place precipitated entirely by state possessors themselves. But these two nuclear worlds—a non-state actor nuclear attack and a catastrophic interstate nuclear exchange—are not necessarily separable. It is just possible that some sort of terrorist attack, and especially an act of nuclear terrorism, could precipitate a chain of events leading to a massive exchange of nuclear weapons between two or more of the states that possess them. In this context, today’s and tomorrow’s terrorist groups might assume the that as long as the place allotted during the early Cold War years to new state possessors of small nuclear arsenals who were seen as raising the risks of a catalytic nuclear war between the superpowers started by third parties. These risks were considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the so-called n+1 problem. t may require a considerable amount of imagination to depict an especially plausible situation where an act of nuclear terrorism could lead to such a massive inter-state nuclear war. For example, in the event of a terrorist nuclear attack on the United States, it might well be wondered just how Russia and/or China could plausibly be brought into the picture, not least because they seem unlikely to be fingered as the most obvious state sponsors or encouragers of terrorist groups. They would seem far too responsible to be involved in supporting that sort of terrorist behavior that could just as easily threaten them as well. Some possibilities, however remote, do suggest themselves. For example, how might the United States react if it was thought or discovered that the fissile material used in the act of nuclear terrorism had come from Russian stocks,40 and if for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that nuclear material to a particular country might not be a case of science fiction given the observation by Michael May et al. that while the debris resulting from a nuclear explosion would be “spread over a wide area in tiny fragments, its radioactivity makes it detectable, identifiable and collectable, and a wealth of information can be obtained from its analysis: the efficiency if the act of a complete surprise, and American officials refused to believe that a terrorist group was fully responsible (or responsible at all) suspicion would shift immediately to state possessors. Ruling out of the explosion, the materials used and, most important … some indication of where the nuclear material came from.”41 Alternatively, nuclear terrorism came as Western ally countries like the United Kingdom and France, and probably Israel and India as well, authorities in Washington North Korea, perhaps Iran if its program continues, and possibly Pakistan. But at what stage would Russia and China be definitely ruled out in this high stakes game of nuclear Cluedo? In particular, if the act of nuclear terrorism occurred against a backdrop of existing tension in Washington’s relations with Russia and/or China, and at a time when threats had already been traded between these major powers, would officials and political leaders not be tempted to assume the worst? Of course, the chances of this occurring would only seem to increase if the United States was already involved in some sort of limited armed conflict with Russia and/or China, or if they were confronting each other from a distance in a proxy war, as unlikely as these developments may seem at the present time. The reverse might well apply too: should a nuclear terrorist attack occur in Russia or China during a period of heightened tension or even limited conflict with the United States, could Moscow and Beijing resist the pressures that might rise domestically to consider the United States as a possible perpetrator or encourager of the attack? Washington’s early response to a terrorist nuclear attack on its own soil might also raise the possibility of an unwanted (and nuclear aided) confrontation with Russia and/or China. For example, in the noise and confusion during the immediate aftermath of the terrorist nuclear attack, the U.S. president might be expected to place the country’s armed forces, including its would be left with a very short list consisting of nuclear arsenal, on a higher stage of alert. In such a tense environment, when careful planning runs up against the friction of reality, it is just possible that Moscow and/or China might mistakenly read this as a sign of U.S. intentions to use force (and possibly nuclear force) against them. In that situation, the temptations to preempt such actions might grow, although it must be admitted that any preemption would probably still meet with a devastating response. 155 CMSDL Core Files 2015-2016 ANSWERS TO: Surveillance Hasn’t Stopped Any Attacks Information contributes to our safety even if it doesn’t singlehandedly prevent attacks Lewis ‘14 James Andrew Lewis is a senior fellow and director of the Strategic Technologies Program at the Center for Strategic and International Studies in Washington, D.C., where he writes on technology, security, and the international economy. Before joining CSIS, he worked at the US Departments of State and Commerce as a Foreign Service officer and as a member of the Senior Executive Service. His diplomatic experience included negotiations on military basing in Asia, the Cambodia peace process, and the five-power talks on arms transfer restraint. Lewis received his Ph.D. from the University of Chicago. “Underestimating Risk in the Surveillance Debate” - CENTER FOR STRATEGIC & INTERNATIONAL STUDIES - STRATEGIC TECHNOLOGIES PROGRAM – December http://csis.org/publication/underestimating-risk-surveillance-debate Assertions that a collection program contributes nothing because it has not singlehandedly prevented an attack reflect an ill-informed understanding of how the United States conducts collection and analysis to prevent harmful acts against itself and its allies. Intelligence does not work as it is portrayed in films—solitary agents do not make startling discoveries that lead to dramatic, lastminute success (nor is technology consistently infallible). Intelligence is a team sport. Perfect knowledge does not exist and success is the product of the efforts of teams of dedicated individuals from many agencies, using many tools and techniques, working together to assemble fragments of data from many sources into a coherent Analysts assemble this mosaic from many different sources and based on experience and intuition. Luck is still more ability to blend different sources of intelligence has improved U.S. intelligence capabilities and gives us an advantage over some opponents. picture. important than anyone would like and the alternative to luck is acquiring more information. This Aff demand to “name one attack the program stopped” is wrong and a poor standard. Branda ‘14 (et al; JOYCE R. BRANDA, Acting Assistant Attorney General, BRIEF FOR THE APPELLEES - Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals. “Amici” means “friend of the court” and – in this context - is legal reference to the Reporters Committee – October 2nd - https://www.eff.org/document/governmentssmith-answering-brief) Plaintiff asks the government to show more, claiming that the program is an unconstitutional means of serving the paramount need of preventing terrorist attacks because the government has not “describe[d] a single instance” in which the program has “actually stopped an imminent attack” or “aided . . . in achieving any objective that was time-sensitive in nature.” Pl. Br. 33 (quoting Klayman, 957 F. Supp. 2d. at 40). The Constitution does not require an anti-terrorism program to have demonstrably prevented a specific terrorist attack to be reasonable. See Von Raab, 489 U.S. at 676 n.3 (“a demonstration of danger as to any particular airport or airline” is not required since “[i]t is sufficient that the Government have a compelling interest in preventing an otherwise pervasive societal problem from spreading”); Cassidy, 471 F.3d at 84-85; MacWade, 460 F.3d at 272. Nor is it problematic that the Section 215 program is only “one means” among many government programs that work together to accomplish the paramount goal of countering terrorism. Pl. Br. 35. To protect the Nation, the government employs a range of counter-terrorism tools and investigative methods in concert, which often serve different functions in order to complement one another in the service of achieving the overarching goal of preventing attacks. Those tools rarely, however, operate in isolation, and nothing in the Fourth Amendment’s special needs jurisprudence requires a showing that any single program is essential or itself prevented a particular attack. The government has provided examples in which the Section 215 program provided timely and valuable assistance to ongoing counter-terrorism investigations. See ER 74-75. 156 CMSDL Core Files 2015-2016 ANSWERS TO: Bioterror Impossible Synthetic biology makes bioterror inevitable- creates means and motive Rose, 14 -- PhD, recognized international biodefense expert [Patrick, Center for Health & Homeland Security senior policy analyst & biosecurity expert, National Defense University lecturer, and Adam Bernier, expert in counter-terrorism, "DIY Bioterrorism Part II: The proliferation of bioterrorism through synthetic biology," CBRNePortal, 2-24-14, www.cbrneportal.com/diy-bioterrorism-part-ii-the-proliferation-of-bioterrorism-throughsynthetic-biology/, accessed 8-16-14] In Part I of this series, we examined how the advancement of synthetic biology has made bio-engineering accessible to the mainstream biological community. Non-state actors who wish to employ biological agents for ill intent are sure to be aware of how tangible bio-weapons are becoming as applications of synthetic biology become more affordable and the probability of success increases with each scientific breakthrough. The willingness of nonstate actors to engage in biological attacks is not a new concept; however, the past biological threat environment has been subdued compared to that of conventional or even chemical terrorism. The frequency and deadliness of biological attacks has, thankfully, been limited; much of which can be attributed to the technical complexity or apparent ineptitude of the perpetrators developing biological weapons. Despite the infrequency and ineffectiveness of biological attacks in the last four decades, the threat may be changing with the continued advancement of synthetic biology applications. Coupled with the ease of info rmation sharing and a rapidly growing do-it-yourself-biology (DIYbio) movement (discussed in Part I), the chances of not only , more attacks , but potentially more deadly ones will inevitably increase .¶ During the last half century terrorist organizations have consistently had an interest in using biological weapons as a means of attacking their targets, but only few have actually made a weapon and used it. The attraction is that terrorist activities with biological weapons are difficult to detect and even more difficult to attribute without a specific perpetrator claiming responsibility. Since 1971 there have been more than 113,113 terrorist attacks globally and 33 of them have been biological. The majority of bio-terrorism incidents recorded occurred during the year 2001 (17 of the 33); before 2001 there were 10 incidents and since 2001 there were 6 (not counting the most recent Ricin attacks). The lack of a discernable trend in use of bio-terrorism does not negate the clear intent of extremist organizations to use biological weapons. In fact, the capacity to harness biological weapons more effectively today only increases the risk that they will successfully be employed. ¶ The landscape is changing : previously the instances where biological attacks had the potential to do the most harm (e.g., Rajneeshees cult’s Salmonella attacks in 1984, Aum Shinri Kyo’s Botulinum toxin, and Anthrax attacks in the early 90’s) included non-state actors with access to large amounts of funding and scientists. Funding and a cadre of willing scientists does not guarantee success though. The assertion was thus made that biological weapons are not only expensive, they require advanced technical training to make and are even more difficult to effectively perpetrate acts of terrorism with. While it is difficult to determine with certainty whether the expense and expertise needed to create biological weapons has acted as a major deterrent for groups thinking of obtaining them, many experts would argue that the cost/expertise barrier makes the threat from biological attacks extremely small. This assertion is supported by the evidence that the vast majority of attacks have taken place in Western countries and was performed by Western citizens with advanced training in scientific research.¶ In the past decade the cost/expertise assertion has become less accurate. Despite the lack of biological attacks, there are a number of very dangerous and motivated organizations that have or are actively pursuing biological weapons. The largest and most outspoken organization has been the global Al Qaeda network, whose leaders have frequently and passionately called for the development (or purchase) of Weapons of Mass Destruction (WMD). The principal message from Al Qaeda Central and Al Qaeda in the Arabian Peninsula (AQAP) has included the call to use biological WMDs to terrorize Western nations. Al Qaeda has had a particular focus on biological and nuclear weapons because of their potential for greatest harm. Osama Bin Laden, Ayman al-Zawahiri and Anwar al-Awlaki have all called for attacks using biological weapons, going so far as to say that Muslims everywhere should seek to kill Westerners wherever possible and that obtaining WMDs is the responsibility of all Muslims. Before the US-led invasion of Afghanistan, Al Qaeda had spent significant funds on building a bio-laboratory and had begun collecting scientists from around the world; however, the Afghanistan invasion and subsequent global War on Terrorism is thought to have disrupted their capabilities and killed or captured many of their assets. Despite the physical setbacks, this disruption does not appear to have changed the aggressive attitude towards obtaining WMDs (e.g., more recently U.S. Intelligence has been concerned about AQAP attempting to make Ricin).¶ The emergence of synthetic biology and DIYbio has increased the likelihood that Al Qaeda will succeed in developing biological WMDs. The low cost and 157 CMSDL Core Files 2015-2016 significantly reduced level of necessary expertise may change how many non-state actors view bio logical weapons as a worthwhile investment. This is not to say that suddenly anyone can make a weapon or that it is easy. To the contrary making an effective biological weapon will still be difficult, only much easier and cheaper than it has been in the past.¶ The rapid advancements of synthetic bio logy could be a game changer , giving organizations currently pursuing biological weapons more options, and encouraging other organizations to reconsider their worth. Because the bar for attaining bio logical weapons has been lowered and is likely to continue to be lowered as more advances in biological technology are made, it is important that the international community begin to formulate policy that protects advances in science that acts to prevent the intentional misuse of synthetic biology. Disregard for this consideration will be costly. A successful attack with a potent biological weapon, where no pharmaceutical interventions might exist, will be deadly and the impact of such an attack will reverberate around the globe because biological weapons are not bound by international borders. 158 CMSDL Core Files 2015-2016 Terrorism DA Affirmative Answers 159 CMSDL Core Files 2015-2016 Aff—Arab Americans Link Turn Link Turn - Mass surveillance kills law enforcement coop with US-Arab Americans – that’s key to check terror. Risen 2014 (Internally quoting Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Tom Risen is a reporter for U.S. News & World Report. “Racial Profiling Reported in NSA, FBI Surveillance” - U.S. News & World Report - July 9, 2014 - http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-in-nsa-fbisurveillance) The National Security Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point that anti-Islamic racism in those agencies led to the surveillance of prominent Muslim-Americans, revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses monitored between 2002 and 2008, Greenwald’s news service The Intercept reports. To monitor Americans, government agencies must first make the case to the Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage, espionage or terrorism. Despite this filter The Intercept identified five MuslimAmericans with high public profile including civil rights leaders, academics, lawyers and a political candidate. Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at the University of California, Riverside. “The notion that these five upstanding American citizens, all of them prominent public individuals, represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an affront to the constitution,” Aslan says. There is a risk of radicalization among citizens Americans, evidenced by some who have gone to fight jihads in Syria and Somalia, but mass shootings carried out by U.S. citizens of various racial backgrounds occurs much more often, says Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least 70 mass shootings across the U.S. “We have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of terrorism is due in part to the willingness of the Islamic community to cooperate with law enforcement to identify possible radical threats , out of gratitude that the U.S. is a stable, secure country compared with the Middle East, she says. “ That could go sour if law enforcement becomes too aggressive, too extreme ,” she says. 160 CMSDL Core Files 2015-2016 Aff—Surveillance Fails/No Link Current surveillance techniques are unsuccessful – ISIS is beginning to evade them Dale 14 (Helle Dale, a senior fellow in public diplomacy focusing on US outreach to foreign countries, published on the Daily Signal, “ISIS Is Getting Smarter About Avoiding U.S. Surveillance,” http://dailysignal.com/2014/11/21/isis-getting-smarter-avoidingu-s-surveillance/, November 21st, 2014) aj Social media can be a double-edged sword for terrorists groups such as ISIS, a fact that its leadership appears to be aware of. According to recent reports, the group’s top cadre has curtailed electronic communications, hoping to shrink its footprint and exposure to western intelligence agencies. A terrorist group of the 21st century, ISIS is adept at the use of social media, producing “cruelly effective” propaganda, as retired Marine Corps Gen. John Allen has put it. Yet, that same propaganda also has provided a wealth of information for the U.S. and other governments. As reported by The Daily Beast’s Shane Harris, who cited U.S. intelligence sources, ISIS is changing its “communications strategy.” It is encrypting its electronic communications, limiting its online presence and using services that delete messages as soon as they are sent. Its top cadre uses couriers rather than electronic devices to deliver orders, making them elusive in the U.S.-led surveillance campaign. As human intelligence is hardly available on the ground, especially in Syria, and the number of unmanned drones is limited, cyber surveillance has been a key tool in the fight against ISIS. Yet, although ISIS leadership may be wise to its cyber vulnerabilities, its followers are not as easy to control in the electronic sphere. The group disseminates its grisly propaganda on social media, and its thousands of followers and recruits continue to post pictures and information on their social media accounts. According to reports by communications expert James Farwell published by the London-based Institute for International Strategic Studies, “advances in technology may eventually leave the group vulnerable to cyber attacks, similar to those reportedly urged by U.S. intelligence sources to intercept and seize funds controlled by Mexican drug cartels.” Communications strategy must be a critical component in combatting this latest form of violent Islamism, which itself uses propaganda so effectively to magnify its own image of invulnerability. Most effectively, writes Farwell, would be a message that shows the opposite, that the United States and its allies are powerful and determined to win. (Though unfortunately that has hardly been forthcoming yet.) Communications strategy is currently in the hands of Rick Stengel, undersecretary of state for public diplomacy. Stengel recently attended a meeting with Arab nations in Kuwait to discuss precisely this issue and encourage their participation in the communications battle. It is clear though, as Farwell writes, that information warfare should be seamless with military tactics, Strategic communication is as important today as at any time during the Iraq and Afghan wars. allowing Gen. Allen to coordinate the resources of the whole of the U.S. government. No link – targeted warrants, which plan allows, solve the terror disad just as well. Wyden ‘14 (et al; This amicus brief issued by three US Senators - Ron Wyden, Mark Udall and Martin Heinrich. Wyden and Udall sat on the Senate Select Committee on Intelligence and had access to the meta-data program. “BRIEF FOR AMICI CURIAE SENATOR RON WYDEN, SENATOR MARK UDALL, AND SENATOR MARTIN HEINRICH IN SUPPORT OF PLAINTIFFAPPELLANT, URGING REVERSAL OF THE DISTRICT COURT” – Amicus Brief for Smith v. Obama – before the United States Ninth Circuit Court of Appeals - Appeal from the United States District Court District of Idaho The Honorable B. Lynn Winmill, Chief District Judge, Presiding Case No. 2:13-cv-00257-BLW – Sept 9th, 2014 – This Amicus Brief was prepared by CHARLES S. SIMS from the law firm PROSKAUER ROSE LLP. Amici” means “friend of the court” and – in this context - is legal reference to Wyden, Udall, etc. This pdf can be obtained at: https://www.eff.org/document/wyden-udall-heinrich-smith-amicus) 161 CMSDL Core Files 2015-2016 As members of the Senate Select Committee on Intelligence, amici Senators Wyden and Udall have for years participated in the oversight of government surveillance conducted under the Patriot Act that they knew would astonish most Americans. They sought to warn the public about those activities as best they could without disclosing classified information. They also co-sponsored an amendment to the Patriot Act’s reauthorization that sought to address the problem of government officials “secretly reinterpret[ing] public laws and statutes” and “describ[ing] the execution of these laws in a way that misinforms or misleads the public.” See 157 Cong. Rec. S3360 (daily ed. May 25, 2011) (introducing SA 384 to S. 990, 112th Cong. § 3 (2011)); see also 157 Cong. Rec. S3386 (daily ed. May 26, 2011) (statement of Sen. Wyden) (“The fact is anyone can read the plain text of the PATRIOT Act. Yet many Members of Congress have no idea how the law is being secretly interpreted by the executive branch.”); 157 Cong. Rec. S3258 (daily ed. May 24, 2011) (statement of Sen. Udall) (“Congress is granting powers to the executive branch that lead to abuse, and, frankly, shield the executive branch from accountability”). Now that the government’s bulk call-records program has been documented and exposed, the executive branch has retreated from frequently repeated claims about its necessity and expressed an intent to end government bulk collection under section 215. Press Release, FACT SHEET: The Administration’s Proposal for Ending the Section 215 Bulk Telephony Metadata Program (Mar. 27, 2014), http://www.whitehouse.gov/the-pressoffice/2014/03/27/fact-sheet-administration-s-proposal-ending-section-215-bulk-telephony-m (“White House Press Release”). While Senators Udall, Heinrich and Wyden broadly support a policy aimed at ending the government’s indiscriminate collection of telephony metadata, they share a concern that there is no plan to suspend the bulk collection of Americans’ phone records in the absence of new legislation, which is not necessarily imminent. Meanwhile, the government continues to defend its bulk call-record collection program vigorously against statutory and constitutional challenges in the courts. Amici submit this brief to respond to the government’s argument that its collection of bulk call records is necessary to defend the nation against terrorist attacks. Amici make one central point: as members of the committee charged with overseeing the National Security Agency’s surveillance, amici have reviewed this surveillance extensively and have seen no evidence that the bulk collection of Americans’ phone records has provided any intelligence of value that could not have been gathered through means that caused far less harm to the privacy interests of millions of Americans. The government has at its disposal a number of authorities that allow it to obtain the call records of suspected terrorists and those in contact with suspected terrorists. It appears to amici that these more targeted authorities could have been used to obtain the information that the government has publicly claimed was crucial in a few important counterterrorism cases. 162 CMSDL Core Files 2015-2016 Aff—No Impact Terrorism isn’t a threat to our existence – Obama confirms, intelligence hasn’t found any nuclear terrorism Mueller and Stewart 15 (John Mueller and Mark Stewart, professor of political science at Ohio State University and engineer and risk analyst at the University of Newcastle in Australia, 224-2015, "Terrorism poses no existential threat to America. We must stop pretending otherwise," Guardian, http://www.theguardian.com/commentisfree/2015/feb/24/terrorismposes-no-existential-threat-to-america)//MJ One of the most unchallenged, zany assertions during the war on terror has been that terrorists present an existential threat to the United States, the modern state and civilization itself. This is important because the overwrought expression, if accepted as valid, could close off evaluation of security efforts. For example, no defense of civil liberties is likely to be terribly effective if people believe the threat from terrorism to be existential. At long last, President Barack Obama and other top officials are beginning to back away from this absurd position. This much overdue development may not last, however. Extravagant alarmism about the pathological but self-destructive Islamic State (Isis) in areas of Syria and Iraq may cause us to backslide. The notion that international terrorism presents an existential threat was spawned by the traumatized in the immediate aftermath of 9/11. Rudy Giuliani, mayor of New York at the time, recalls that all “security experts” expected “dozens and dozens and multiyears of attacks like this” and, in her book The Dark Side, Jane Mayer observed that “the only certainty shared by virtually the entire American intelligence community” was that “a second wave of even more devastating terrorist attacks on America was imminent”. Duly terrified, US intelligence services were soon imaginatively calculating the number of trained al-Qaida operatives in the United States to be between 2,000 and 5,000. Also compelling was the extrapolation that, because the 9/11 terrorists were successful with box-cutters, they might well be able to turn out nuclear weapons. Soon it was being authoritatively proclaimed that atomic terrorists could “destroy civilization as we know it” and that it was likely that a nuclear terrorist attack on the United States would transpire by 2014. No atomic terrorists have yet appeared (al-Qaida’s entire budget in 2001 for research on all weapons of mass destruction totaled less than $4,000), and intelligence has been far better at counting al-Qaida operatives in the country than at finding them. But the notion that terrorism presents an existential threat has played on. By 2008, Homeland Security Secretary Michael Chertoff declared it to be a “significant existential” one - carefully differentiating it, apparently, from all those insignificant existential threats Americans have faced in the past. The bizarre formulation survived into the Obama years. In October 2009, Bruce Riedel, an advisor to the new administration, publicly maintained the al-Qaida threat to the country to be existential. In 2014, however, things began to change. In a speech at Harvard in October, Vice President Joseph Biden offered the thought that “we face no existential threat – none – to our way of life or our ultimate security.” After a decent interval of three months, President Barack Obama reiterated this point at a press conference, and then expanded in an interview a few weeks later, adding that the US should not “provide a victory to these terrorist networks by over-inflating their importance and suggesting in some fashion that they are an existential threat to the United States or the world order.” Later, his national security advisor, Susan Rice, echoed the point in a formal speech. It is astounding that these utterances – “blindingly obvious” as security specialist Bruce Schneier puts it – appear to mark the first time any officials in the United States have had the notion and the courage to say so in public. Whether that development, at once remarkable and absurdly belated, will have some consequence, or even continue, remains to be seen. Senators John McCain and Lindsay Graham have insisted for months that Isis presents an existential threat to the United States. An alarmed David Brooks reported that financial analysts have convinced themselves that the group has the potential to generate a worldwide “economic cataclysm.” And General Michael Flynn, recently retired as head of the Defense Intelligence Agency, has been insisting that the terrorist enemy is “committed to the destruction of freedom and the American way of life” while seeking “world domination, achieved through violence and bloodshed.” It was reported that his remarks provoked nods of approval, cheers and “ultimately a standing ovation” from the audience. Thus even the most modest imaginable effort to rein in the war on terror hyperbole may fail to gel. 163 CMSDL Core Files 2015-2016 Aff—Link Turn: Targeted Surveillance Link Turn - Mass surveillance makes us less safe against terrorists Schneier 15 [Bruce Schneier is an American cryptographer, computer security and privacy specialist, and writer., http://digg.com/2015/why-mass-surveillance-cant-wont-and-never-has-stopped-a-terrorist, March 25th, In his latest bestseller, Data and Goliath, world-renowned security expert and author Bruce Schneier goes deep into the world of surveillance, investigating how governments and corporations alike monitor nearly our every move. In this excerpt, Schneier explains how we are fed a false narrative of how our surveillance state is able to stop terrorist attacks before they happen. In fact, Schneier argues, the idea that our government is able to parse all the invasive and personal data they collect on us is laughable. The data-mining conducted every day only seems to take valuable resources and time away from the tactics that should be used to fight terrorism. Illustration: Electronic Frontier Foundation/Hugh D'Andrade The NSA repeatedly uses a connectthe-dots metaphor to justify its surveillance activities. Again and again — after 9/11, after the Underwear Bomber, after the Boston Marathon bombings — government is criticized for not connecting the dots. However, this is a terribly misleading metaphor. Connecting the dots in a coloring book is easy, because they’re all numbered and visible. In real life, the dots can only be recognized after the fact. That doesn’t stop us from demanding to know why the authorities couldn’t connect the dots. The warning signs left by the Fort Hood shooter, the Boston Marathon bombers, and the Isla Vista shooter look obvious in hindsight. Nassim Taleb, an expert on risk engineering, calls this tendency the “narrative fallacy.” Humans are natural storytellers, and the world of stories is much more tidy, predictable, and coherent than reality. Millions of people behave strangely enough to attract the FBI’s notice, and almost all of them are harmless. The TSA’s no-fly list has over 20,000 people on it. The Terrorist Identities Datamart Environment, also known as the watch list, has 680,000, 40% of whom have “no recognized terrorist group affiliation.” Data mining is offered as the technique that will enable us to connect those dots. But while corporations are successfully mining our personal data in order to target advertising, detect financial fraud, and perform other tasks, three critical issues make data mining an inappropriate tool for finding terrorists. The first, and most important, issue is error rates. For advertising, data mining can be successful even with a large error rate, but finding terrorists requires a much higher degree of accuracy than data-mining systems can possibly provide. Data mining works best when you’re searching for a well-defined profile, when there are a reasonable number of events per year, and when the cost of false alarms is low. Detecting credit card fraud is one of data mining’s security success stories: all credit card companies mine their transaction databases for spending patterns that indicate a stolen card. There are over a billion active credit cards in circulation in the United States, and nearly 8% of those are fraudulently used each year. Many credit card thefts share a pattern — purchases in locations not normally frequented by the cardholder, and purchases of travel, luxury goods, and easily fenced items — and in many cases data-mining systems can minimize the losses by preventing fraudulent transactions. The only cost of a false alarm is a phone call to the cardholder asking her to verify a couple of her purchases. Similarly, the IRS uses data mining to identify tax evaders, the police use it to predict crime hot spots, and banks use it to predict loan defaults. These applications have had mixed success, based on the data and the application, but they’re all within the scope of what data mining can accomplish. Terrorist plots are different, mostly because whereas fraud is common, terrorist attacks are very rare. This means that even highly accurate terrorism prediction systems will be so flooded with false alarms that they will be useless. The reason lies in the mathematics of detection. All detection systems have errors, and system designers can tune them to minimize either false positives or false negatives. In a terrorist-detection system, a false positive occurs when the system mistakenly identifies something harmless as a threat. A false negative occurs when the system misses an actual attack. Depending on how you “tune” your detection system, you can increase the number of false positives to assure you are less likely to miss an attack, or you can reduce the number of false positives at the expense of missing attacks. Because terrorist attacks are so rare, false positives completely overwhelm the system, no matter how well you tune. And I mean completely: millions of people will be falsely accused for every real terrorist plot the system finds, if it ever finds any. We might be able to deal with all of the innocents being flagged by the system if the cost of false positives were minor. Think about the full-body scanners at airports. Those alert all the time when scanning people. But a TSA officer can easily check for a false alarm with a simple pat-down. This doesn’t work for a more general data-based terrorism-detection system. Each alert requires a lengthy investigation to determine whether it’s real or not. That takes time and money, and prevents intelligence officers from doing other productive work. Or, more pithily, when you’re watching everything, you’re not seeing anything. The US intelligence community also likens finding a terrorist plot to looking for a needle in a haystack. And, as former NSA director General Keith Alexander said, “you need the haystack to find the needle.” That 164 CMSDL Core Files 2015-2016 statement perfectly illustrates the problem with mass surveillance and bulk collection. When you’re looking for the needle, the last thing you want to do is pile lots more hay on it. More specifically, there is no scientific rationale for believing that adding irrelevant data about innocent people makes it easier to find a terrorist attack, and lots of evidence that it does not. You might be adding slightly more signal, but you’re also adding much more noise. And despite the NSA’s “collect it all” mentality, its own documents bear this out. The military intelligence community even talks about the problem of “drinking from a fire hose”: having so much irrelevant data that it’s impossible to find the important bits. The NSA's Utah Data Center Photo Credit: Electronic Frontier Foundation We saw this problem with the NSA’s eavesdropping program: the false positives overwhelmed the system. In the years after 9/11, the NSA passed to the FBI thousands of tips per month; every one of them turned out to be a false alarm. The cost was enormous, and ended up frustrating the FBI agents who were obligated to investigate all the tips. We also saw this with the Suspicious Activity Reports —or SAR — database: tens of thousands of reports, and no actual results. And all the telephone metadata the NSA collected led to just one success: the conviction of a taxi driver who sent $8,500 to a Somali group that posed no direct threat to the US — and that was probably trumped up so the NSA would have better talking points in front of Congress. The second problem with using data-mining techniques to try to uncover terrorist plots is that each attack is unique. Who would have guessed that two pressure-cooker bombs would be delivered to the Boston Marathon finish line in backpacks by a Boston college kid and his older brother? Each rare individual who carries out a terrorist attack will have a disproportionate impact on the criteria used to decide who’s a likely terrorist, leading to ineffective detection strategies. The third problem is that the people the NSA is trying to find are wily, and they’re trying to avoid detection. In the world of personalized marketing, the typical surveillance subject isn’t trying to hide his activities. That is not true in a police or national security context. An adversarial relationship makes the problem much harder, and means that most commercial big data analysis tools just don’t work. A commercial tool can simply ignore people trying to hide and assume benign behavior on the part of everyone else. Government data-mining techniques can’t do that, because those are the very people they’re looking for. Adversaries vary in the sophistication of their ability to avoid surveillance. Most criminals and terrorists — and political dissidents, sad to say — are pretty unsavvy and make lots of mistakes. But that’s no justification for data mining; targeted surveillance could potentially identify them just as well. The question is whether mass surveillance performs sufficiently better than targeted surveillance to justify its extremely high costs. Several analyses of all the NSA’s efforts indicate that it does not. The three problems listed above cannot be fixed. Data mining is simply the wrong tool for this job, which means that all the mass surveillance required to feed it cannot be justified. When he was NSA director, General Keith Alexander argued that ubiquitous surveillance would have enabled the NSA to prevent 9/11. That seems unlikely. He wasn’t able to prevent the Boston Marathon bombings in 2013, even though one of the bombers was on the terrorist watch list and both had sloppy social media trails — and this was after a dozen post9/11 years of honing techniques. The NSA collected data on the Tsarnaevs before the bombing, but hadn’t realized that it was more important than the data they collected on millions of other people. This point was made in the 9/11 Commission Report. That report described a failure to “connect the dots,” which proponents of mass surveillance claim requires collection of more data. But what the report actually said was that the intelligence community had all the information about the plot without mass surveillance, and that the failures were the result of inadequate analysis. Mass surveillance didn’t catch underwear bomber Umar Farouk Abdulmutallab in 2006, even though his father had repeatedly warned the U.S. government that he was dangerous. And the liquid bombers (they’re the reason governments prohibit passengers from bringing large bottles of liquids, creams, and gels on airplanes in their carry-on luggage) were captured in 2006 in their London apartment not due to mass surveillance but through traditional investigative police work. Whenever we learn about an NSA success, it invariably comes from targeted surveillance rather than from mass surveillance. One analysis showed that the FBI identifies potential terrorist plots from reports of suspicious activity, reports of plots, and investigations of other, unrelated, crimes. This is a critical point. Ubiquitous surveillance and data mining are not suitable tools for finding dedicated criminals or terrorists. We taxpayers are wasting billions on mass-surveillance programs, and not getting the security we’ve been promised. More importantly, the money we’re wasting on these ineffective surveillance programs is not being spent on investigation, intelligence, and emergency response: tactics that have been proven to work. The NSA's surveillance efforts have actually made us less secure. Mass surveillance creates useless data, allows for terrorist attacks Patrick Eddington, 2015, "No, Mass Surveillance Won't Stop Terrorist Attacks," 1/27, http://reason.com/archives/2015/01/27/mass-surveillance-and-terrorism#.bejqzr:U8Io, analyst in Homeland Security and Civil Liberties at the Cato Institute, and an assistant professor in the Security Studies Program at Georgetown University. From 20042010, he served as communications director and later as senior policy advisor to Rep. Rush Holt (D-NJ). Eddington’s legislative portfolio included the full range of security-related issues, with an emphasis on intelligence policy reform in the areas of surveillance, detainee interrogation, and the use of drones, both in overseas and domestic contexts.¶ From 1988 to 1996, Eddington was a military imagery analyst at the CIA’s National Photographic Interpretation Center 165 CMSDL Core Files 2015-2016 The recent terrorist attack on the office of French satirical magazine Charlie Hebdo generated a now-familiar meme: Another terrorist attack means we need more surveillance.¶ Sen. Bob Corker (R-Tenn.) said that while "Congress having oversight certainly is important ... what is more important relative to these types of events is ensuring we don't overly hamstring the NSA's ability to collect this kind of information in advance and keep these kinds of activities from occurring." Similarly, Sen. Lindsey Graham (R-S.C.) spoke of his "fear" that "our intelligence capabilities, those designed to prevent such an attack from taking place on our shores, are quickly eroding," adding that the government surveillance "designed to prevent these types of attacks from occurring is under siege."¶ A recent poll demonstrates that their sentiments are widely shared in the wake of the attack.¶ But would more mass surveillance have prevented the assault on the Charlie Hebdo office? Events from 9/11 to the present help provide the answer:¶ 2009: Umar Farouk Abdulmutallab—i.e., the "underwear bomber"—nearly succeeded in downing the airline he was on over Detroit because, according to then-National Counterterrorism Center (NCC) director Michael Leiter, the federal Intelligence Community (IC) failed "to connect, integrate, and fully understand the intelligence" it had collected.¶ 2009: Army Major Nidal Hasan was able to conduct his deadly, Anwar al-Awlaki-inspired rampage at Ft. Hood, Texas, because the FBI bungled its Hasan investigation.¶ 2013: The Boston Marathon bombing happened, at least in part, because the CIA, Department of Homeland Security (DHS), FBI, NCC, and National Security Agency (NSA) failed to properly coordinate and share information about Tamerlan Tsarnaev and his family, associations, and travel to and from Russia in 2012. Those failures were detailed in a 2014 report prepared by the Inspectors General of the IC, Department of Justice, CIA, and DHS.¶ 2014: The Charlie Hebdo and French grocery store attackers were not only known to French and U.S. authorities but one had a prior terrorism conviction and another was monitored for years by French authorities until less than a year before the attack on the magazine.¶ No, mass surveillance does not prevent terrorist attacks.¶ It’s worth remembering that the mass surveillance programs initiated by the U.S. government after the 9/11 attacks—the legal ones and the constitutionally-dubious ones—were premised on the belief that bin Laden’s hijackerterrorists were able to pull off the attacks because of a failure to collect enough data. Yet in their subsequent reports on the attacks, the Congressional Joint Inquiry (2002) and the 9/11 Commission found exactly the opposite. The data to detect (and thus foil) the plots was in the U.S. government’s hands prior to the attacks; the failures were ones of sharing, analysis, and dissemination . That malady perfectly describes every intelligence failure from Pearl Harbor to the present day.¶ The Office of the Director of National Intelligence (created by Congress in 2004) was supposed to be the answer to the "failure-to-connect-the-dots" problem. Ten years on, the problem remains, the IC bureaucracy is bigger than ever, and our government is continuing to rely on mass surveillance programs that have failed time and again to stop terrorists while simultaneously undermining the civil liberties and personal privacy of every American. The quest to "collect it all," to borrow a phrase from NSA Director Keith Alexander, only leads to the accumulation of masses of useless information, making it harder to find real threats and costing billions to store.¶ A recent Guardian editorial noted that such masssurveillance myopia is spreading among European political leaders as well, despite the fact that "terrorists, from 9/11 to the Woolwich jihadists and the neo-Nazi Anders Breivik, have almost always come to the authorities’ attention before murdering."¶ Mass surveillance is not only destructive of our liberties, its continued use is a virtual guarantee of more lethal intelligence failures. And our continued will to disbelieve those facts is a mental dodge we engage in at our peril. 166 CMSDL Core Files 2015-2016 Aff—No Link Data shows no meaningful terror plots have been stopped via mass surveillance Osterndorf 15 [Chris Osterndorf, reporter for the Daily Dot, “Edward Snowden is right—NSA surveillance won't stop terrorism”, http://www.dailydot.com/opinion/edward-snowden-mass-surveillance-nsa-america/, March 17th, 2015//Rahul] It appears that Snowden season is approaching once again. The controversial whistleblower made a surprise appearance via Google Hangout at SXSW this week, where his remarks proved captivating as always. Essentially a less flashy sequel to his ACLU speech from 2014, Snowden only spoke to a few people this time around, engaging in a conversation with a select group of leaders from America’s tech sector. In particular, he urged tech companies to become "champions of privacy," suggesting that they use their power to help shield Americans from an increasingly watchful government. In addition to speaking at SXSW in Austin, Snowden also said a few words at FutureFest in London, where he warned that massive surveillance won't stop terrorism. In this instance, Snowden is absolutely correct, and it’s time we start heeding his advice. At this point, the only people clinging to this idea is an effective is the NSA themselves. In 2013, NSA Director Gen. Keith Alexander went before the House Intelligence Committee to testify to claim that increased surveillance had helped to stop terrorist threats over 50 times since 9/11, including attacks on U.S. soil such as a plot to blow up the New York Stock Exchange and a defunct scheme to fund an overseas terrorist group. Other witnesses in the same hearing also suggested that the Snowden leaks had harmed America greatly. “We are now faced with a situation that because this information has been made public, we run the risk of losing these collection capabilities,” stated Robert S. Litt, general counsel of the Office of the Director of National Intelligence. “We’re not going to know for many months whether these leaks in fact have caused us to lose these capabilities, but if they do have that effect, there is no doubt that they will cause our national security to be affected.” However, the details the NSA provided in this hearing were somewhat hazy, and a closer look at the numbers indicates the benefits of increased surveillance may not be so clear-cut after all. Research from International Security found that out of the 269 terrorist suspects apprehended since 9/11, 158 were brought in through the use of traditional investigative measures. That’s almost 60 percent of all who were arrested. Meanwhile, 78 suspects were apprehended through measures which were “unclear” and 15 were implicated in plots but were not apprehended, while the remaining 18 were apprehended by some form of NSA surveillance. Eighteen is no small number when you’re discussing matters of national security; however, the above statistics do not necessarily indicate that mass surveillance was responsible for the apprehension of these 18 terrorists or whether these suspects were detained under more traditional surveillance measures. Moreover, the evidence suggests that traditional means of combatting terrorism are more effective than surveillance when it comes to overall arrests. Additional analysis from the New America Foundation further supports these findings. Examining 225 post-9/11 terrorism cases in the U.S., their 2014 report found that the NSA’s bulk surveillance program “has had no discernible impact on preventing acts of terrorism, ” citing traditional methods of law enforcement and investigation as being far more effective in the majority of cases. In as many as 48 of these cases, traditional surveillance warrants were used to collect evidence, while more than half of the cases were the product of other traditional investigative actions, such as informants and reports of suspicious activity. In fact, New America determined that the NSA has only been responsible for 7.5 percent of all counterterrorism investigations and that only one of those investigations led to suspects being convicted based on metadata collection. And that case, which took months to solve, as the NSA went back and forth with the FBI, involved money being sent to a terrorist group in Somalia, rather than an active plan to perpetrate an attack on U.S. soil. According to the report’s principal author Peter Bergen, who is the director of the foundation’s National Security Program and their resident terrorism expert, the issue has less to do with the collection of data and more to do with the comprehension of it. Bergen said, “The overall problem for U.S. counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques.” Of course, even when all of the data has been collected, it still isn’t enough to stop a terrorist attack. “It’s worth remembering that the mass surveillance programs initiated by the U.S. government after the 9/11 attacks—the legal ones and the constitutionally dubious ones—were premised on the belief that bin Laden’s hijacker-terrorists were able to pull off the attacks because of a failure to collect enough data,” asserts Reason’s Patrick Eddington. “Yet in their subsequent reports on the attacks, the Congressional Joint Inquiry (2002) and the 9/11 Commission found exactly the opposite. The data to detect (and thus foil) the plots was in the U.S. government’s hands prior to the attacks; the failures were ones of sharing, analysis, and dissemination.” So once again, we see that the key is not collection, but comprehension. If all of this still doesn’t seem like enough evidence that mass surveillance is ineffective, consider that a White House review group has also admitted the NSA’s counterterrorism program “was not essential to preventing attacks” and that a 167 CMSDL Core Files 2015-2016 large portion of the evidence that was collected “could readily have been obtained in a timely manner using conventional [court] orders.” But mass surveillance isn’t just the United States’ problem. Research has shown that Canada's Levitation project, which also involves collecting large amounts of data in the service of fighting terrorism, may be just as questionable as the NSA’s own data collection practices. Meanwhile, in response to the Charlie Hebdo attacks in Paris, British Prime Minister David Cameron has reintroduced the Communications Data Bill, which would force telecom companies to keep track of all Internet, email, and cellphone activity and ban encrypted communication services. But support for this type of legislation in Europe doesn't appear to be any stronger than in North America. Slate’s Ray Corrigan argued, “Even if your magic terrorist-catching machine has a false positive rate of 1 in 1,000—and no security technology comes anywhere near this—every time you asked it for suspects in the U.K., it would flag 60,000 innocent people.” Fortunately, the cultural shift against increased data collection has become so evident in the U.S. that even President Obama is trying to get out of the business of mass surveillance; the president announced plans last March to reform the National Security Agency's practice of collecting call records, which have yet to come to fruition. Benjamin Franklin famously said that “those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.” While this quote has been notoriously butchered and misinterpreted over the years, it has now become evident that we shouldn’t have to give up either of these things in pursuit of the other. The U.S. is still grappling with how to fight terrorism in this technologically advanced age, but just because we have additional technology at our disposal, doesn’t mean that technology is always going to be used for the common good. You may believe Edward Snowden to be a traitor or a hero, but on this matter, there is virtually no question: Mass surveillance is not only unconstitutional, it is also the wrong way to fight terrorism. 168 CMSDL Core Files 2015-2016 **Elections Disadvantage Negative 169 CMSDL Core Files 2015-2016 1NC Hillary Good A. Hillary Clinton is poised to win the election- she is polling higher than every other Republican and Democratic contender and wins Latino vote Poughkeepsie Journal, 2015 (http://www.poughkeepsiejournal.com/story/news/nation/2015/09/14/marist-poll-clinton-leadstrump/72273596, Sept 14) When it comes to the general election, former Secretary of State Hillary Clinton is the leading in the polls among nationally registered voters, according to the most recent Marist Poll. Clinton leads businessman Donald Trump 53 percent to 40 percent among nationally registered voters. Meanwhile, Donald Trump, who has local ties as the owner of the Trump National Golf Club – Hudson Valley, in Stormville, is leading his Republicans rivals with more than 30 percent of the vote, but has 13 points less than Clinton, according to the poll. Ted Cruz, comes in third with 33 points and Marco Rubio and Jeb Bush are tied for fourth with 30 points. Meanwhile, a gap is emerging among Latino voters. Clinton has 69 percent of the Latino vote compared with Trump who has 22 percent. President Barack Obama won the Latino vote in 2012 over Mitt Romney by 44 points, according to the Marist Poll. B. Link- recent polls prove the public views domestic surveillance as a necessary evil-the plan makes Americans feel more vulnerable to national security issues Pew Research Center 2013- “Majority Views NSA Phone Tracking as Acceptable Anti-terror Tactic” http://www.people-press.org/2013/06/10/majority-views-nsa-phone-tracking-asacceptable-anti-terror-tactic/ A majority of Americans – 56% – say the National Security Agency’s (NSA) program tracking the telephone records of millions of Americans is an acceptable way for the government to investigate terrorism , though a substantial minority – 41% – say it is unacceptable. And while the public is more evenly divided over the government’s monitoring of email and other online activities to prevent possible terrorism, these views are largely unchanged since 2002, shortly after the 9/11 terrorist attacks.¶ The latest national survey by the Pew Research Center and The Washington Post, conducted June 6-9 among 1,004 adults, finds no indications that last week’s revelations of the government’s collection of phone records and internet data have altered fundamental public views about the tradeoff between investigating possible terrorism and protecting personal privacy.¶ Currently 62% say it is more important for the federal government to investigate possible terrorist threats, even if that intrudes on personal privacy. Just 34% say it is more important for the government not to intrude on personal privacy, even if that limits its ability to investigate possible terrorist threats.¶ These opinions have changed little since an ABC News/Washington Post survey in January 2006. Currently, there are only modest partisan differences in these opinions: 69% of Democrats say it is more important for the government to investigate terrorist threats, even at the expense of personal privacy, as do 62% of Republicans and 59% of independents. 170 CMSDL Core Files 2015-2016 C. Internal Link- vulnerability means the American public will elect a republican, Kuttner 2015- Robert, The American Prospect, co-founder and co-editor of The American Prospect, and professor at Brandeis University's Heller School “National Security and the 2016 Election” http://prospect.org/article/national-security-and-2016-election So, like it or not, the 2016 presidential election will be about national security. And most Americans and most voters will be very fearful of the threat that the Islamic State represents and confused about how we should respond.¶ In its lifetime, the United States has faced countless threats, and it has overreacted to many. Often in the 20th century, the U.S. government acted as an agent of U.S. corporate interests, wrapping them in the broader rhetoric of the Cold War. And the Cold War itself led to policies that were often excessive and self-defeating, not the least of which was Vietnam. ¶ That said, the Islamic State is a true threat, and one that presents difficult if not impossible choices. It is hydra-headed. Lop off one leader and 10 others appear.¶ The threat of al-Qaeda and the Taliban was easy compared to this new one. These organizations actually had a command structure that could be monitored and disrupted. ¶ The Islamic State and kindred groups represent a throwback to barbarism, yet because of the broad unrest of hundreds of millions of people, their cause has appeal on the ground. And the West has precious few allies in the region that can plausibly serve as either ideological or military counterweights. ¶ Even if the West had the stomach for ground warfare in a war of civilizations, it is not clear where the theatres of operation would be. There is potentially a band that stretches all the way from Boko Haram in Northern Nigeria, through Libya and Somalia, into the region of Jordan, Syria, Iraq, Afghanistan and Pakistan, that is vulnerable to the most brutal sort of Islamist fundamentalism.¶ There are three broad strands of thinking on how the United States ought to respond. One is basically isolationist. Let them stew in their own juices. My wife taught me a terrific Polish proverb that translates, "Not my circus, not my monkeys." ¶ There are some conservatives who espouse this view, such as Rand Paul and the Cato Institute, some lefties like Noam Chomsky who think this retribution is the West's just dessert for its past sins, as well as such centrist foreign policy scholars as John Mearsheimer and Stephen Walt. ¶ I am a little queasy about such views because I find the prospect of the Islamic State taking over much of the world frightening. Even if you write off the fates of hundreds of millions of people (half them women by the way), the march of the Islamic State really does increase the chances of nuclear weapons falling into the hands of people who don't mind blowing up the world, because they are certain that they are bound for glory. ¶ The second strand of thinking might be called Wilsonian. The U.S., in this view, has a duty to intervene because of the need to bring true Enlightenment democracy to regions that are otherwise vulnerable to the appeal of al-Qaeda and the Islamic State. Well, based on the events of the past 15 years, good luck to that. ¶ The third viewpoint we might call realpolitik. It argues that the West needs to act against the threat of the Islamic State, even if that means getting into bed with some unsavory people -- the very people whose dominance in the region helped seed the unrest that led to fundamentalist Islam. Are we to say that the Saudi monarchy is the lesser evil? How about Bashar al-Assad?¶ There have been times in American history when we sided with lesser evils against greater ones, our wartime alliance with Stalin against Hitler being the epic case. Henry Kissinger, the ultimate foreign policy realist, persuaded Richard Nixon to embrace Red China as a counterweight to the USSR, back in an era when China really was ferociously communist as well as brutal. ¶ The problem is that President So we will go into the 2016 election with the electorate feeling very uneasy about our national security, and with Democrats somewhat on the defensive.¶ Normally, that would help the Republicans. Except that no Obama has vacillated between wanting to be Wilson and wanting to be Kissinger. Whatever the policy, it needs to be coherent. Republican first-tier presidential candidate has foreign policy experience.¶ Let's see. Chris Christie can see the World Trade Center from his window. Scott Walker led wars -- on unions and on the University of Wisconsin. Marco Rubio sees national security through the prism of immigration and Cuba. And Jeb Bush has only the proxy foreign policy expertise of his family connections -- which did not perform so well.¶ Which brings us to Hillary Clinton. On the plus side, she was Secretary of State. On the minus side, she was Secretary of State.¶ She is also female, which some retrograde voters associate with weak -- and she has bent over backwards to be the most hawkish of the Democrats, a posture that could wear better than expected as more threats unfold. But whatever you think of her views, Clinton does have more national security chops than anyone else in the field. D. Impact - Hillary Clinton is the only candidate who can preserve Iran deal Real Clear Politics 2015, “Earnest: Hillary Clinton's Role In Bringing Iranians To Negotiating Table "A Testament To Her Diplomatic Skill" March 20 http://www.realclearpolitics.com/video/2015/03/20/earnest_hillary_clintons_role_in_bringing_ iranians_to_negotiating_table_a_testament_to_her_diplomatic_skill.html At Friday's White House press briefing, White House press secretary Josh Earnest praised former Secretary of State Hillary Clinton for helping to bring the Iranians to the negotiating table, calling it a "testament to her diplomatic skill."¶ Earnest was answering a question from FOX News' Ed Henry 171 CMSDL Core Files 2015-2016 regarding what role Secretary Clinton had in getting these negotiations started.¶ JOSH EARNEST: Secretary Clinton did the difficult diplomatic work that was required to get some of our allies in the region to cooperate with the broader international community to prevent the importation, or at least limit the importation of Iranian oil, and that is what maximized the pressure that has compelled the Iranians to come to the negotiating table. I think that is a testament to her diplomatic skill that we have reached a point that we have convened serious negotiations like the ones that are currently taking place. E. Failure to sustain the Iran deal causes global war through miscalculation PressTV, 2013 (“Global nuclear conflict between US, Russia, China likely if Iran talks fail,” http://www.presstv.ir/detail/2013/11/13/334544/global-nuclear-war-likely-if-iran-talks-fail/) A global conflict between the US, Russia, and China is likely in the coming months should the world powers fail to reach a nuclear deal with Iran, an American analyst says.¶ “If the talks fail, if the agreements being pursued are not successfully carried forward and implemented, then there would be enormous international pressure to drive towards a conflict with Iran before [US President Barack] Obama leaves office and that’s a very great danger that no one can underestimate the importance of,” senior editor at the Executive Intelligence Review Jeff Steinberg told Press TV on Wednesday. ¶ “The United States could find itself on one side and Russia and China on the other and those are the kinds of conditions that can lead to miscalculation and general roar,” Steinberg said. ¶ “So the danger in this situation is that if these talks don’t go forward, we could be facing a global conflict in the coming months and years and that’s got to be avoided at all costs when you’ve got countries like the United States, Russia, and China with” their arsenals of “nuclear weapons,” he warned. ¶ The warning came one day after the White House told Congress not to impose new sanctions against Tehran because failure in talks with Iran could lead to war. 172 CMSDL Core Files 2015-2016 **Uniqueness- Hillary Good 173 CMSDL Core Files 2015-2016 Uniqueness- Hillary Good- ANSWERS TO: Bernie Sanders Bernie Sanders will not get the democratic nomination- 2016 isn’t 2008 and he’s no Obama Washington Post 2015 - “Bernie Sanders isn’t Barack Obama, and 2016 isn’t 2008” http://www.washingtonpost.com/opinions/bernie-sanders-isntbarack-obama-and-2016-isnt-2008/2015/07/17/5d85377e-2b37-11e5-bd33-395c05608059_story.html, July 17 Hillary Clinton is once again campaigning for president as the prohibitive front-runner, and once again, she faces a challenge from an insurgent progressive outsider with grass-roots support. Once again, while Clinton (re)introduces herself to voters in a low-key listening tour of sorts, her challenger is drawing huge audiences — 10,000 in Madison, Wis., 8,000 in Portland, Maine, 5,000 in Denver and overflow crowds in Iowa’s small towns and elsewhere.¶ Eight years ago, Clinton led in the polls for most of 2007, only to lose the Iowa caucuses — and, eventually, the Democratic nomination — to a favorite of the party’s progressive base. It’s feeling a bit like deja vu. “If she doesn’t change the terms of the race, she’s going to lose. Again,” former Mitt Romney strategist Stuart Stevens warned in the Daily Beast this month.¶ It may be tempting to compare the race between Clinton and Sen. Bernie Sanders (I-Vt.) to the epic race between Clinton and Sen. Barack Obama: Sanders, like Obama, has consolidated a good portion of the liberal wing of the Democratic Party. Sanders, like Obama, is raising millions from smalldollar donors on the Internet. Sanders, like Obama, is channeling the anger and frustration of some in the party. Then, it was about the Iraq war; now, it’s about Wall Street.¶ But that’s where the similarities end. From the perspective of someone who worked on his campaign and in his White House, it’s clear that Obama’s race against Clinton is not a useful example. Understanding the dynamics at play in the 2016 primaries requires looking further back at history. And unfortunately for Sanders, history shows that there are only two types of Democratic insurgent candidates: Barack Obama and everyone else.¶ The current system for selecting nominees in the Democratic Party is less than 50 years old. After the disastrous 1968 campaign and nominating convention in Chicago, the party abandoned the smoke-filled rooms of yore and shifted to a series of primaries and caucuses. The 1972 nomination went to the grass-roots favorite, Sen. George McGovern (S.D.), who used the new rules to edge out establishment picks Hubert Humphrey and Henry “Scoop” Jackson. (McGovern won only Massachusetts and the District of Columbia in the general election against Richard Nixon.) In nearly every election since then, an anti-establishment figure has sought the nomination. Hillary will win the nomination – history proves endorsements are key New York Times, 2015 (http://www.nytimes.com/interactive/2016/us/elections/presidential-candidatesdashboard.html, September 17) “Since 1980, the single best predictor of a party’s nominee is the number of endorsements from party elites — elected officials and prominent past party leaders — in the months before primaries begin,” as the political scientist Lynn Vavreck put it. Why? Political elites have a better sense of which candidates can endure a long campaign, and they can influence voters and donors by praising or criticizing candidates. One distinguishing feature of the 2016 cycle is how few top Republicans have endorsed any candidate so far — Jeb Bush has received endorsements from 6.6 percent of Republican senators, representatives and governors, compared with Hillary Clinton’s 59 percent of Democratic officials. 174 CMSDL Core Files 2015-2016 History proves Bernie won’t win because he has little support from black voters Washington Post 2015 (http://www.washingtonpost.com/blogs/monkeycage/wp/2015/09/17/bernie-sanderss-surge-doesnt-mean-the-democratic-race-is-wide-openheres-why/, Sept 17) But now, Hillary Clinton’s current popularity with African Americans dramatically exceeds black support for Bernie Sanders. These data from daily surveys by Gallup in July and August, indicate that most black people are unfamiliar with Sanders and that he is not particularly popular among those that recognized his name. So the challenge for Sanders is clear: a little known Senator, from an almost all-white state, who has been criticized by black activists for preaching a message of economic equality that ignores the historic and ongoing circumstances entangling race and class in the United States, somehow needs to galvanize minority support for his candidacy against an opponent who has been extremely popular with blacks and Latinos for over two decades. Early wins by Sanders in Iowa and New Hampshire are unlikely to change that, too. Gary Hart, whose 1984 candidacy is often compared to Sanders’s current campaign, could not translate his better-than-expected strong showing in the Iowa caucuses and resounding victory in the New Hampshire primary into a broader coalition beyond his white base. Nor could Barack Obama’s early-state momentum erode Hillary Clinton’s strong support from Latinos in the 2008 primary. Bernie can’t win Southern state primaries because he doesn’t have minority votes Washington Post 2015 (http://www.washingtonpost.com/blogs/monkeycage/wp/2015/09/17/bernie-sanderss-surge-doesnt-mean-the-democratic-race-is-wide-openheres-why/, Sept 17) The remaining columns of the display show Hillary Clinton dominating Sanders among nonwhite voters both nationally and in South Carolina. (YouGov did not report percentages by race in Iowa and New Hampshire because there were so few non-whites in the sample.) As the New York Times recently reported, the Clinton campaign is looking to such strong support in southern states with large minority electorates as a firewall against her rivals. With non-whites comprising almost half of Barack Obama’s electoral coalition in 2012, Bernie Sanders must make serious inroads with minority voters to have any chance of becoming the Democratic presidential nominee. 175 CMSDL Core Files 2015-2016 2NC/1NR- Uniqueness Wall- Hillary Good Hillary Clinton will win the Hispanic vote- latest Univision poll proves The Fiscal Times 2015 “As Trump Surges in the Polls, Hispanic Voters Flock to Hillary Clinton” http://www.thefiscaltimes.com/2015/07/17/Trump-Surges-Polls-Hispanic-Voters-FlockHillary-Clinton, July 17 The Washington Post reports that Hillary Clinton’s campaign is thrilled with the contrast between Trump’s take-no-enemies approach and Clinton’s more seasoned and sober leadership style and fluency in discussing domestic and foreign policy issues.¶ While Trump has made headlines by denouncing illegal immigrants from Mexico as rapists, murderers and criminals and vowing to build a wall along the southwest border to prevent further illegal crossings, Clinton has spoken on the need for comprehensive immigration reform, including a pathways to citizenship for many of the more than 11 million illegal immigrants in the country.¶ Related: Ted Cruz on Donald Trump – I ‘Salute’ Him ¶ More important, though, is that – whether or not he ultimately wins the GOP nomination—the bombastic Trump may be assuring his party’s failure in trying to woo Latino voters. A new Univision News poll shows that seven in ten Hispanic voters have a negative view of Trump. And in a hypothetical matchup, Clinton beats Trump and other potential GOP opponents by huge margins among Hispanic voters.¶ The Univision findings are part of a larger bipartisan polling project conducted by the research firms of Bendixen & Amandi International and the Tarrance Group to establish a baseline for attitudes of Hispanic voters on a range of issues and candidates. Roughly 90 percent of Hispanic voters interviewed said they have heard about Trump’s insulting comments, and when they have read specific remarks, nearly 8 in 10 say they find them offensive. Hillary will win because of the strong economy The Week, 2015 (http://theweek.com/articles/559639/why-economy-almost-guarantees-hillary- win-almost, June 10) If Mitt Romney couldn't beat President Obama in 2012 when the jobless rate was almost 8 percent, how can the next Republican nominee beat Hillary Clinton in 2016 when the unemployment rate could be under 5 percent? That's the big question Republican presidential candidates must ask themselves. And the unpleasant political possibility for the GOP's White House hopefuls is that the improving U.S. economy is, well, "likeable enough" for voters to give Democrats four more years in the Oval Office. At the very least, the economy might be such a strong tailwind for Democrats that Jeb Bush, Marco Rubio, or whoever else the GOP puts up would need to run a near-flawless campaign to win. Now, there are no economic guarantees here. Maybe the Yellen Fed will start reading too much Austrian economics, freak out about inflation, and crank up interest rates so high that it causes a recession. Of course, that's unlikely. The more likely scenario is more of the same, and the slow-but-steady Obama-era recovery keeps chugging along. Sure, the Fed probably will raise rates sometime this year. With inflation low, however, the pace of tightening should be gradual. And even if economic growth doesn't accelerate much, it seems good enough to keep generating gobs of jobs and a much lower unemployment rate. In a new analysis, for instance, Goldman Sachs says the U.S. economy will add another 3.5 million net 176 CMSDL Core Files 2015-2016 new jobs over the next year and half — on top of the 12 million created since the recovery began — bringing the jobless rate to 4.8 percent by Election Day 2016. Compare that to the Great Recession peak of 10 percent. Even a wooden politician like Clinton should be able to run a successful "stay the course" campaign on those numbers. Hillary will win because of white women voters, especially on security issues The Week, 2015 (April 13, http://theweek.com/articles/549305/hillary-coalition-why-whitewomen-play-kingmaker-2016) Democrats can win without white women, but they will win much easier with them, particularly if they swing just a few percent of the vote among college-educated white women in states like Wisconsin, Indiana, and North Carolina. How? If the election hinges on foreign policy, Clinton can pick off women who want a stable world and a strong leader who can make sense of the chaos. If there's a turn towards the economy, the substance of her proposals will matter. But her general appeal has surprising strengths, too. In 2014, 58 percent of white women said they'd vote for Clinton a matchup with named Republicans. And among voters without college degrees, the split between men and women was profound, which, as The Washington Post noted, is striking because non-college whites of both genders tend to oppose Democrats. Being female — or being Hillary — confers a real advantage. These numbers will fluctuate. And they will drop, inevitably. But Clinton's ceiling is surprisingly high among a particular group of voters who haven't chosen a Democratic presidential candidate in recent memory. White women are why Clinton is in such strong shape now. They will be the key to her eventual success or defeat. Scandals don’t matter – people vote for Hillary whether or not they believe her HNGN, 2015 http://www.hngn.com/articles/96445/20150529/americans-hillary-clinton-dishonestuntrustworthy-still-strong-leader.htm, May 29 While only 39 percent said Clinton is honest and trustworthy, most voters still think she would be a strong leader. Sixty percent of respondents said Clinton has strong leadership qualities, while 37 percent disagreed. Voters were divided 48 to 47 on whether Clinton cares about their needs and problems. Among Democratic voters, 84 percent said they think Clinton cares about their problems, while 42 percent of independents said the same. If the Democratic primary were held today, Clinton would win by a long shot. Fifty-seven percent said they would vote for Clinton, while 15 percent preferred Vermont Sen. Bernie Sanders and 9 percent said they would vote for Vice President Joe Biden. Clinton also leads when matched up head-to-head against nearly every Republican presidential potential. Clinton leads Sen. Rand Paul of Kentucky by 4 points, 46 percent to 42 percent, and leads Sen. Marco Rubio of Florida by 4 points, 45 percent to 41 percent. "Can you get low marks on honesty and still be a strong leader? Sure you can," said Tim Malloy, assistant director of the Quinnipiac University Poll. "Hillary Clinton crushes her democratic rivals and keeps the GOP hoard at arm's length." 177 CMSDL Core Files 2015-2016 ** Links- Hillary good 178 CMSDL Core Files 2015-2016 Link Wall- Drone Affirmative The drone lobby is massively influential and will backlash against Democrats because of the plan and fund the GOP Martin and Viveca 2012 (Gary Martin and Viveca Novak, “Drones: Despite Problems, A Push to Expand Domestic Use”, http://www.opensecrets.org/news/2012/11/drones-despiteproblems-a-push-to-e/, November 27, 2012) WASHINGTON – Are unmanned aircraft, known to have difficulty avoiding collisions, safe to use in America’s crowded airspace? And would their widespread use for surveillance result in unconstitutional invasions of privacy? Experts say neither question has been answered satisfactorily. Yet the federal government is rushing to open America’s skies to tens of thousands of the drones – pushed to do so by a law championed by manufacturers of the unmanned aircraft. The drone makers have sought congressional help to speed their entry into a domestic market valued in the billions. The 60-member House of Representatives’ “drone caucus” _ officially, the House Unmanned Systems Caucus – has helped push that agenda. And over the last four years, caucus members have drawn nearly $8 million in drone-related campaign contributions , an investigation by Hearst Newspapers and the Center for Responsive Politics shows. The Federal Aviation Administration has been flooded with applications from police departments, universities and private corporations, all seeking to use drones that range from devices the size of a hummingbird to full-sized aircraft like those used by the U.S. military to target al Qaeda operatives in Pakistan and elsewhere. PATROLLING THE BORDER Domestic use of drones began with limited aerial patrols of the nation’s borders by Customs and Border Patrol authorities. But the industry and its allies pushed for more , leading to provisions in the FAA Modernization and Reform Act, signed into law on Feb. 14 of this year. cuellar.jpgThe law requires the FAA to fully integrate the unmanned aerial vehicles, or UAVs, into national airspace by September 2015. And it contains a series of interim deadlines leading up to that one: This month, the agency was supposed to produce a comprehensive plan for the integration, and in August it was required to have a plan for testing at six different sites in the U.S. Neither plan has been issued. “These timelines are very aggressive,” said Heidi Williams, a vice president of the Aircraft Owners and Pilots Association, one of the stakeholders taking part in a working group put together by the FAA to help develop a regulatory plan. “These issues are very complex, and we have a long way to go.” Many potential uses for unmanned aircraft, which are cheaper to operate than piloted planes or helicopters, have been identified. Among them: monitoring pipelines and power lines, finding lost hikers, surveying crops, and assessing environmental threats and damage from natural disasters. The FAA has predicted that 30,000 drones could be flying in the United States in less than 20 years, sharing space with commercial, military and general aviation. An FAA official, who spoke on background, said “one of the main safety issues” with drones is lack of ability to “sense and avoid other aircraft.” A September report by the Government Accountability Office identified the same concern: “Obstacles include the inability . . . to sense and avoid other airborne objects in a manner similar to manned aircraft.” In addition, the GAO report said, “Concerns about national security, privacy and interference with Global Positioning System signals have not been resolved.” FAA Administrator Michael Huerta told a conference on drones earlier this year in Las Vegas that the agency is making progress working 179 CMSDL Core Files 2015-2016 through the issues. FAA is working with “collision avoidance experts” from the Defense Department, NASA and private firms to determine what standards and requirements should be set. SOURCES OF FUNDS House members from California, Texas, Virginia and New York on the bipartisan “drone caucus” received the lion’s share of the funds channeled to lawmakers from dozens of firms that are members of the Association for Unmanned Vehicle Systems International, Hearst and CRP found. Eleven drone caucus lawmakers from California, where many aviation firms are located, received more than $2.4 million from manufacturers’ political action committees and employees during the 2012 and 2010 election cycles, according to CRP tabulation of Federal Election Commission reports. Eight Texas House members in the caucus received more than $746,000. And four caucus members from New York got more than $185,000 from companies connected to the business of unmanned vehicles. Rep. Henry Cuellar, D-Laredo, said drone manufacturers contribute just as other interest groups do. “We get contributions from media PACs, from teachers, from doctors and from a whole lot of companies that produce drones,” Cuellar said. EDUCATING LAWMAKERS The House “drone caucus” was established three years ago. Senate lawmakers followed suit this fall. Sen. Joe Manchin, DW.Va., co-chairman of the fledgling Senate drone caucus, said the caucus would help frame future legislation because the use of drones “carries great potential – and great risk.” The Senate caucus has only eight members, including Sen. Kirsten Gillibrand, D-N.Y. Gillibrand did not return a request for comment. Cuellar also said the purpose of the House caucus is to educate other members on the need for and uses of drones for public safety, border enforcement, search-and-rescue and commercial uses. mckeon.jpgThe global market for drones is expected to double in the next decade, from $6.6 billion to $11.4 billion, and could top $2.4 billion in the U.S. alone, said Philip Finnegan, director of corporate analysis with the Teal Group, an independent research group which studies the industry. Growth in UAV technology and operations is encouraged by AUVSI, which represents drone and systems manufacturers. AUVSI firms have been far more generous to Republicans than Democrats when it comes to campaign donations. According to CRP analysis, GOP drone caucus members received 74 percent of the group’s donations. In the House, the top recipient was Rep. Howard “Buck” McKeon, R-Calif., chairman of the House Armed Services Committee. He received $833,650 in drone-related campaign contributions. McKeon and Cuellar are co-chairmen of the caucus. Other Republican California lawmakers – Reps. Darrell Issa, Jerry Lewis, Duncan Hunter and Ken Calvert – each received more than $200,000 from drone firms. And in Texas, Rep. Silvestre Reyes, D-El Paso, a former U.S. Border Patrol sector chief who lost his seat in the Democratic primary, received $310,000. Rep. Michael McCaul, R-Austin, chairman of the House Homeland Security subcommittee on oversight, received $100,000, and Cuellar received almost $77,000. The two have pushed for drone surveillance of the U.S.-Mexico border. CRP’s analysis also showed that companies with drone aircraft currently used by the military , but with potential civilian applications, were among the largest donors to caucus members. Those firms include BAE Systems, which makes the Mantis and Taranis drones; Boeing Co., maker of the hydrogenfueled Phantom Eye; Honeywell International, RQ-16 T-Hawk; Lockheed Martin , RQ-170 Sentinel; Raytheon Co., Cobra; and General Atomics, Pred ator. PRIVACY CONCERNS mccaul.jpgSome lawmakers remain skeptical. Along with civil rights advocates, they worry over government eavesdropping, surveillance photography and other potential privacy violations. “The drones are coming,” shouted Rep. Ted Poe, R-Humble, earlier this year from the House floor, as he warned of encroachment by government into the rights of citizens. A North Dakota court upheld the arrest of a Lakota, N.D., farmer by a police SWAT team using information from 180 CMSDL Core Files 2015-2016 a Customs and Border Protection Predator drone over the northern U.S.-Canadian border. The June 2011 incident began when several cows found their way to Rodney Bossart’s 3,000-acre farm. He claimed ownership of the wayward bovines and allegedly brandished firearms at law enforcement officials. During the ensuing standoff, a SWAT team received surveillance information from Customs and Border Protection, gathered from a high-flying Predator drone. That information was used to locate and arrest the farmer. The Bossart case was apparently the first use of national security surveillance to aid the arrest of a U.S. citizen on non-terror-related charges. More such cases should be expected, said Jay Stanley, a senior policy analyst with the American Civil Liberties Union. “Based on current trends, technology development, law enforcement interest, political and industry pressure, and the lack of legal safeguards – it is clear that drones pose a looming threat to Americans’ privacy,” Stanley said. Law enforcement agencies say drones will better protect the safety of officers and the public in dangerous situations, and can be used for search and rescue during natural disasters. They have joined drone manufacturers in pressuring Congress to relax limitations. Americans support drones usage U.S. News, 7-17-2015, "Poll: Americans OK with some domestic drones," NBC News, http://usnews.nbcnews.com/_news/2012/06/13/12205763-poll-americans-ok-withsome-domestic-drones-but-not-to-catch-speeders?lite)//GV This undated photo provided by U.S. Customs and Border Protection shows an unmanned drone used to patrol the U.S.-Canadian border. The planes, which are based out of North Dakota, venture as far as Eastern Washington on their patrols. Americans overwhelmingly support the use of drones for patrolling U.S. borders, tracking down criminals and aiding search-and-rescue missions, but they don’t want the unmanned craft used to issue speeding tickets, according to a poll. The Monmouth University Polling Institute of New Jersey said it tested the four scenarios in anticipation of a national push that, according to estimates from the Federal Aviation Administration, could see up to 30,000 drones patrolling U.S. skies within a decade. The FAA, under orders from Congress in a bill signed into law Feb. 14 by President Barack Obama, is expediting the expansion of domestic drone use. And that’s OK with most Americans, the poll found. “Americans clearly support using drone technology in special circumstances, but they are a bit leery of more routine use by local law enforcement agencies,” Patrick Murray, director of the Monmouth University Polling Institute, said in a statement. The FAA issued 61 drone authorizations between November 2006 and June 30, 2011, including 13 for local police agencies and one for a state police agency. About 20 went to colleges and universities and others went to federal agencies. Survey: World's opinion of US, Obama slips The Department of Homeland Security, through the Federal Emergency Management Agency, in 2012 offered about $830 million in grants to states and cities for emergency preparedness. Drones could be funded under several of its programs. The Monmouth University poll of 1,708 people called June 4-6 has a margin of error of 2.4 percent, the Institute said. Its chief findings: More than half of Americans, 56 percent, had read “some” or a “great deal” about the U.S. military use of drones. The rest, about 44 percent, read “just a little or none at all.” About two out of three Americans, or 67 percent, oppose the use of drones to issue speeding tickets. About 23 percent support it. 64 percent support the use of drones to control illegal immigration on the nation’s borders. 80 percent support the use of drones to help with search and rescue missions. 67 percent support the use of drones to track down runaway criminals. 64 percent are “very concerned” or “somewhat concerned” about their privacy if U.S. law enforcement uses drones with high-tech cameras. Americans support the US of drones for policing- outweighs privacy concerns Steve Watson, 9-28-2012, "Almost Half Of All Americans Support Domestic Surveillance Drones," http://www.infowars.com/almost-half-of-all-americans-supportdomestic-surveillance-drones/)//GV Close to half of Americans say they are in favour of police departments deploying surveillance drones domestically. According to a survey conducted by The Associated Press and The National Constitution Center, 44 percent support the idea of police using unmanned aerial vehicles to track 181 CMSDL Core Files 2015-2016 suspects and carry out investigations. Only 36 percent said that they “strongly oppose” or “somewhat oppose” police use of drones, according to the survey. The poll also found that only one third of Americans say they are significantly concerned about their privacy being eroded by the adoption of drones by police forces throughout the country. Thrity-five percent of respondents said they were “extremely concerned” or “very concerned” when asked if they believed that police departments’ use of drones for surveillance would impact their privacy. Almost exactly the same number, 36 percent, noted that they were “not too concerned” or “not concerned at all”, while twenty-four percent were neutral on the issue, saying they were only “somewhat concerned” about a potential loss of privacy. David Eisner, president and CEO of the constitution center in Philadelphia, told the AP that he was somewhat baffled by the response to the poll: US public generally supports domestic drones Mike Davin, 8-19-2013, "Poll shows Americans support multiple domestic drone uses," No Publication, http://thebusinessofrobotics.com/law-policy/poll-showsamericans-support-multiple-domestic-drone-uses/)//GV A poll conducted by Monmouth University last month shows that the U.S. public supports certain domestic uses of unmanned aerial vehicles, particularly applications related to search and rescue. However, most Americans haven’t heard a lot about the use of UAVs by law enforcement within the U.S. and harbor some privacy concerns. Of the individuals surveyed, 60 percent had heard “a great deal” or “some” about the use of UAVs by the U.S. military overseas. In contrast, less than half (47 percent) could say the same about the use of UAVs by law enforcement agencies within the United States. Nevertheless, respondents were not closed off to the idea of using UAVs domestically . While the vast majority were unenthusiastic about being issued a speeding ticket by a UAV, 83 percent supported their use for search and rescue missions and 62 percent supported their use to control illegal immigration. These attitudes mirror those seen in a similar survey conducted by the university last year. With regard to weaponized UAVs within U.S. borders, a slight majority (52 percent) supported their use by law enforcement in hostage situations. Fewer (44 percent) supported using armed drones to patrol U.S. borders. When asked about privacy concerns associated with law enforcement using unmanned systems, 49 percent said they were “very concerned” while 20 percent were “somewhat concerned.” Responses also showed some skepticism about whether federal and state law enforcement would use UAVs appropriately, with only 11 percent “very confident” in federal agencies and 12 percent in local police departments. 182 CMSDL Core Files 2015-2016 Link Wall- Stingray Affirmative The public is increasingly willing to allow law enforcement to spy on them if it keeps them safer NEW YORK TIMES 2013- New York Times, 5/01, “U.S. poll finds-strong-acceptance-forpublic-surveillance” http://www.nytimes.com/2013/05/01/us/poll-finds-strong-acceptance-forpublic-surveillance.html Americans overwhelmingly favor installing video surveillance cameras in public places, judging the infringement on their privacy as an acceptable trade-off for greater security from terrorist attacks, according to the latest New York Times/CBS News Poll.¶ A week after the Boston Marathon attack, which was unraveled after the release of video footage of the two suspects flushed them out of hiding, 78 percent of people said surveillance cameras were a good idea, the poll found.¶ The receptiveness to cameras on street corners reflects a public that regards terrorism as a fact of life in the United States — 9 out of 10 people polled said Americans would always have to live with the risk — but also a threat that many believe the government can combat effectively through rigorous law enforcement and proper regulation.¶ For all that confidence, there are lingering questions about the role of the nation’s intelligence agencies before the attacks, with people divided about whether they had collected information that could have prevented them (41 percent said they had; 45 percent said they had not).¶ The murkiness of the case — the Tsarnaev brothers’ ties to the Caucasus; the warnings from Russian intelligence about potential extremist sympathies — has clearly left an impression on the public. A majority, 53 percent, said the suspects had links to a larger terrorist group, while 32 percent said they had acted alone.¶ President Obama, in a White House news conference on Tuesday, defended the performance of the Federal Bureau of Investigation and the Department of Homeland Security, saying the agencies had done their job, while acknowledging, “This is hard stuff.”¶ The poll suggested that Americans are willing to tolerate further tough measures to foil future attacks. Sixty-six percent said information about how to make explosives should not be allowed on the Internet, where it would be available to aspiring terrorists, even if some would view that as a form of censorship. Thirty percent said it should be permitted in the interest of free expression. Millennials like the NSA Santos, Red Alert Politics staff writer, 2015 (Maria, “Poll: The NSA is more popular among millennials than any other generation”, 3-4, http://redalertpolitics.com/2015/03/04/poll-nsa-popular-among-millennials-generation/) Pew’s new poll on public views of various government agencies finds that a lot of agencies are viewed favorably by the majority of Americans—including the NSA, CDC, CIA, and VA. The IRS, however, is the one agency with a favorable-view percentage below 50 percent—no surprise here. Some of the most interesting numbers come from views of the NSA. Overall, 51 percent view the agency favorably, and 37 percent unfavorably. Democrats are bigger fans than Republicans—58 to 47 percent. (The CIA is the only agency that Republicans favor more than Democrats—64 to 46 percent.) And millennials—generally thought to distrust institutions—have more favorable views of the NSA than any other generation. 61 percent of 18-29 years view the NSA favorably. That number dwindles down to 55 percent within the 30-49 age group, and down further, to 40 percent, among those 65 and older. 183 CMSDL Core Files 2015-2016 Link Wall- Security Letters Affirmative Americans fear terrorism more than the loss of civil liberties Gao, 5/29 (George, Pew Research, 2015, http://www.pewresearch.org/facttank/2015/05/29/what-americans-think-about-nsa-surveillance-national-security-and-privacy/) Overall, Americans hold nuanced views on the issue: A majority is against the government collecting bulk data on its citizens, and most believe there are not adequate limits on the types of data collected. But Americans do generally support monitoring the communications activity of suspected terrorists. The expiring Section 215 of the Patriot Act enables the government to collect phone metadata, with authority from a secret national security court known as the Foreign Intelligence Surveillance Court – details that former National Security Agency contractor Edward Snowden leaked to news organizations two years ago. Also expiring are the law’s “lone wolf” and “roving wiretap” provisions, which, respectively, enable the government to collect data on non-U.S. suspects who are not linked to foreign governments or terrorist groups, and enable officials to monitor certain suspects on multiple communication devices rather than a single one. Pew Research Center has been studying various dimensions of Americans’ views about national security, surveillance and privacy. Here are some key takeaways: 1Americans' Views of NSA SurveillanceA majority of Americans (54%) disapprove of the U.S. government’s collection of telephone and internet data as part of anti-terrorism efforts, while 42% approve of the program. Democrats are divided on the program, while Republicans and independents are more likely to disapprove than approve, according to a survey we conducted last spring. 2More broadly, most Americans don’t see a need to sacrifice civil liberties to be safe from terrorism: In spring 2014, 74% said they should not give up privacy and freedom for the sake of safety, while just 22% said the opposite. This view had hardened since December 2004, when 60% said they should not have to give up more privacy and freedom to be safe from terrorism. While they have concerns about government surveillance, Americans also say anti-terrorism policies have not gone far enough to adequately protect them. More (49%) say this is their bigger concern than say they are concerned that policies have gone too far in restricting the average person’s civil liberties (37%), according to a January survey. While Americans held this view between 2004 and 2010, they briefly held the opposite view in July 2013, shortly after the Snowden leaks. Most voters support surveillance, including Democrats Agiesta, 6/1 (Jennifer, “Poll: 6 in 10 back renewal of NSA data collection,” CNN, 2015, http://www.cnn.com/2015/06/01/politics/poll-nsa-data-collection-cnn-orc/) Washington (CNN) Americans overwhelmingly want to see Congress renew the law enabling the government to collect data on the public's telephone calls in bulk, though they are split on whether allowing that law to expire increases the risk of terrorism in the U.S. With the provisions of the Patriot Act which allow the National Security Administration to collect data on Americans' phone calls newly expired, a new CNN/ORC poll finds 61% of Americans think the law ought to be renewed, including majorities across party lines, while 36% say it should not be reinstated. Republican leaders in the Senate are working to pass a bill to reinstate the law, after delays led by Sen. Rand Paul (R-Kentucky), whose presidential campaign has been noted for its appeal to independent voters and younger Republicans, and other surveillance opponents led to the law's expiration at 12:01 a.m. Monday. But Paul's stance on the issue is unlikely to bring him many fans within his own party. Support for renewal peaks among Republicans, 73% of whom back the law. Democrats largely agree, with 63% saying the law should be renewed. Independents are least apt to back it, with 55% saying renew it and 42% let it expire. Liberals, regardless of partisan affiliation, are most likely to say the law should not be renewed, 50% say so while 48% want to see it renewed. About half of Americans, 52%, say that if the law is not renewed, the risk of terrorism here in the U.S. would remain about the same. Still, a sizable 44% minority feel that without the law, the risk of terrorism will rise. Just 3% feel it would decrease. The sense that the risk will rise is greatest among Republicans, 61% of whom say the risk of terrorism will climb if the NSA is unable to collect this data. Among Democrats and independents, less than half feel the risk of terrorism would increase if the program ended. The poll reveals a steep generational divide on the data collection program. Among those under age 35, just 25% say the risk of terrorism would increase without NSA data collection. That more than doubles to 60% among those age 65 or older. Those under age 35 are also split on whether the law should be renewed at all, 50% say it should be renewed while 49% say it should not. Among those age 35 or older, 65% back renewal of the law. 184 CMSDL Core Files 2015-2016 2NC/1NR Answers to: No Link – Surveillance Policy Not Key to Election National Security outweighs any economic considerations for 2016 for voters Kraushaar and Roarty 15 [Josh Krushaar and Alex Roarty, political editor for National Journal, and pens the weekly "Against the Grain" column. Kraushaar has held several positions since joining Atlantic Media in 2010, including as managing editor for politics at National Journal, Alex is the chief political correspondent for National Journal Hotline. “GOP Poll: Foreign Policy, Not Economy, Voters’ Top Concern”, http://www.nationaljournal.com/politics/gop-poll-foreign-policy-not-economy-voters-top-concern20150414, April 14th, 2015//Rahul] GOP poll is reinforcing Republican strategists' conviction that foreign policy will be a major issue in 2016—one the party believes it can wield to its advantage against Democratic congressional candidates and Hillary Clinton. The internal survey, conducted by the GOP firm OnMessage, found that security issues ranked first on a list of top priorities for voters, ahead of economic growth, fiscal responsibility , and moral issues, among others. A 22 percent plurality of all respondents ranked it as the top issue, compared with 13 percent who listed economic growth as their top concern. (14 percent listed "fiscal responsibility" at the head of their list.) The poll was conducted March 23 to 25 for the Republican super PAC American Action Network, the John Boehner-linked third party group that spent tens of millions of dollars last election aiding House Republican campaigns. The poll surveyed 1,400 people and has a margin of error of 2.6 percent. The findings confirm other surveys showing national security has spiked as a leading issue in the upcoming elections. In January, the Pew Research Center found that, for the first time in five years, an equal share of voters rated defending the U.S. against terrorism (76 percent) as important a policy priority as the economy (75 percent). Foreign policy moved down the list of public concerns following the 2008 financial crisis, but the polls are a sign the issue has returned with vigor to the public consciousness. And Republicans see the surveys as a sign that the issue is poised to help their candidates in an important way for the first time since public opinion turned against the Iraq War after the 2004 election. "It really started before the [2014] election, as ISIS and their conquest really took center stage … probably about midsummer, we started noticing that concerns about foreign affairs and defense were popping up," said Wes Anderson, a Republican pollster who conducted the survey. "Honestly, we haven't seen that since 2004 in any real significance. [It was present] in 2006, but obviously in a very negative way for Republicans." Voters worry about terrorism more than the economy Ariel Edwards, Huffington post reporter-Levy Become A Fan, 3-5-2015, "Americans Expect The 2016 Elections To Focus On Foreign Policy," Huffington Post, http://www.huffingtonpost.com/2015/03/05/2016-foreign-policy-poll_n_6811176.html)//GV Overall, Americans are about equally likely to say the economy has gotten better over the past year as they contrast, by a 50-point margin, they say the threat of terrorism is increasing, as opposed to decreasing. And while the gulf between the parties in perceptions of the economy are wide, the gap on terrorism is even wider. Republicans are 20 points more likely than Democrats to say the economy is getting worse, but 35 points more likely to say terrorism is increasing. are to say it has gotten worse, a more positive outlook than last year. By 185 CMSDL Core Files 2015-2016 Unpopular move by Obama would kill Hillary’s campaign – we’re at the tipping point Judis, 2014 (John B., “History Shows That Hillary Clinton Is Unlikely to Win in 2016,” New Republic, November 17, http://www.newrepublic.com/article/120303/democrats-hillaryclinton-could-lose-2016-presidential-election) The chief obstacle that any Democratic nominee will face is public resistance to installing a president from the same party in the White House for three terms in a row. If you look at the presidents since World War II, when the same party occupied the White House for two terms in a row, that party’s candidate lost in the next election six out of seven times. The one exception was George H.W. Bush's 1988 victory after two terms of Ronald Reagan, but Bush, who was seventeen points behind Democratic nominee Michael Dukakis at the Republican convention, was only able to win because his campaign manager Lee Atwater ran a brilliant campaign against an extraordinarily weak opponent. (Democrats might also insist that Al Gore really won in 2000, but even if he had, he would have done so very narrowly with unemployment at 4.0 percent.) There are three reasons why the three-term obstacle has prevailed. The first and most obvious has been because the incumbent has become unpopular during his second term, and his unpopularity has carried over to the nominee. That was certainly the case with Harry Truman and Adlai Stevenson in 1952, Lyndon Johnson and Hubert Humphrey in 1968, Gerald Ford (who had succeeded Richard Nixon) in 1976, and George W. Bush and John McCain in 2008. The second reason has to do with an accumulation over eight years of small or medium-sized grievances that, while not affecting the incumbent’s overall popularity, still weighed down the candidate who hoped to succeed him. Dwight Eisenhower remained highly popular in 1960, but some voters worried about repeated recessions during his presidency, or about his support for school integration; Bill Clinton remained popular, and unemployment low, in 2000, but his second term had been marred by the Monica Lewinsky scandal, and coal-state voters worried about Democrats’ support for Kyoto while white Southern voters worried about the administration’s support for African American causes. The third reason has to do with the voters’ blaming party gridlock between the president and congress partly on the president and his party. That was a factor in 1960—James McGregor Burns was inspired to write The Deadlock of Democracy by the Eisenhower years—and it was also a factor in the 2000 elections. In the 2016 election, not just one, but all three of these factors will be in play and will jeopardize the Democratic nominee. Obama and his administration are likely to remain unpopular among voters. There is already an accretion of grievances among Obama and the Democrats that will carry over to the nominee. These include the Affordable Care Act, which, whatever benefits it has brought to many Americans, has alienated many senior citizens (who see the bill as undermining Medicare), small business owners and employees, and union leaders and workers whose benefits will now be taxed. Add to these the grievances around the administration’s stands on coal, immigration, guns, and civil rights, including most recently its support for the protestors in Ferguson. There are, of course, many voters who would vote for a Republican regardless of who had been in office, but there are many voters in the middle (especially in presidential years) whose vote, or failure to vote at all, will be swayed by a particular grievance. That certainly hurt Al Gore in 2000, McCain in 2008, and could hurt the Democratic nominee in 2016. It’s a very rough measure, but you can look at the shift in the independent vote in 1960, 1968, 1976, 2000, and 2008 to see how the accretion of grievances can sway voters in the middle. There are, of course, mitigating factors that could help a Democrat to succeed in 2016. Demography and turnout are important, although not decisive. (A Democrat still has to win over 40 percent of the white vote to succeed, as well as nearly 70 percent of the Hispanic vote.) The quality of the candidate is also important. If the opposition party nominates candidates who are ineffective, as Dukakis was, or are incapable of moving to the center (either temperamentally or because of party pressures), then the candidate of the party in the White House can win. Equally, if the party in the White House nominates someone who is greatly admired (as Herbert Hoover was in 1928), or runs a terrific campaign (as Bush-Atwater did in 1988), they can win. Can the Democrats overcome the third-term hitch in 2016? If the nominee is Hillary Clinton, as now appears likely, she should be able to command significant support among women and minorities—two key Democratic constituencies. Her experience gives her credibility as a candidate (the dynastic factor is primarily of interest to the press). And she is not positioned too far to the left. But in her 2008 run, neither she nor her campaign managers displayed the political skill of the last presidential victors. And she will have difficulty dissociating herself from the voters’ disapproval of Obama’s administration. 186 CMSDL Core Files 2015-2016 2NC/1NR Answer to: No Link – Election Too Far Off Presidential election is decided based on perceptions made now Sosnik 2015 [Doug Sosnik, senior adviser to President Clinton and co-wrote a New York Times best-seller. “The End of the 2016 Election Is Closer Than You Think”, 7/12 http://www.politico.com/magazine/story/2015/07/the-end-of-the-2016-election-is-closerthan-you-think-119947_Page2.html#.VaUvsflVhBc The end of the 2016 presidential election is actually much closer than you might think. In every game there are decisive moments that determine the ultimate outcome. We like to think that presidential elections are dramatic fall campaigns pitting party against party, but the truth is that the most decisive moments often occur long before the general election kicks off. If history is any guide, the outcome of next year’s presidential campaign will likely be determined before the Republican Party has even selected their nominee. That uncomfortable fact means that the longer and more divisive the Republican primary, the less likely the party will be to win back the White House in 2016. In eight out of the last nine presidential elections these decisive periods of time can all be traced back to the run up to the general election—not the fall campaign. With the exception of the 2000 election—which was an outlier on every front—voters locked in their attitudes about the direction of the country, the state of their own well-being and the presidential candidates—and their political party—prior to the start of the general election. Once voters’ views solidified, subsequent campaign events or activities simply served to reinforce their initial perceptions about the candidate and party best prepared to lead the country. In general, the job approval ratings of the incumbent president, regardless of whether they are running as a proxy for the electorate’s mood and have historically been the most accurate predictor of election outcomes. And the public’s view of the state of the economy and its expectations for for reelection, serve the future are the strongest drivers of the job approval ratings of the sitting president. Since 1980 there have been five presidential elections where the incumbent had a job approval rating near or above 50 percent prior to the start of the general election. In each of these elections, the incumbent’s party won the election. In the three instances when the incumbent president’s job approval fell below 40 percent prior to the start of the general election, their party lost each time. Conventional wisdom has it that the 1980 presidential election was an exception to this rule, but in truth that race only bolsters the pattern. The lore from the race had Jimmy Carter headed to re-election before his support disintegrated in the final two weeks of the election, leading to a massive defeat at the hands of Ronald Reagan. But that analysis ignored the most significant factors that ultimately determined the outcome of the election. It’s true that Carter led in the polls in the three-way race until the middle of October. However, by mid-May his job approval rating had dropped to 38 percent; it remained under 40 percent for the rest of the campaign. Despite the fact that he led in the polls until mid-October, Carter’s job approval numbers reflected the fact that the country had decided six months before the election that they had had enough of him. By the end of October the anti-incumbent vote had consolidated around Reagan, with Carter’s final 41 percent vote reflecting his low approval ratings throughout the year. Since Reagan’s 1980 victory, the media have continued to over-emphasize the significance of the general election in presidential races. Rather than reporting on the fundamentals that will ultimately determine election outcomes, the media continue to place a relentless focus on the daily tracking polls—despite the fact that they have proven increasingly inaccurate over the last 20 years. The last presidential race is a good example. In 2012, reporters who followed the ups and downs of the tracking polls concluded that Romney had surged following the first presidential debate. But in reality Obama had already put the election away long before the Republicans had selected their nominee. Obama’s final 51 percent of the vote closely tracked his job approval numbers that remained steady and well within that range during the last year of his first term. It’s not just history that suggests that the significance of the general election has diminished. There has also been a steady increase in voters casting ballots long before Election Day, with 33 states plus the District of Columbia allowing some form of early voting. Today, every state west of the Mississippi allows early voting. In three of those states—Colorado, Oregon and Washington—all votes are cast by mail before Election Day. In the 2012 election, nationwide 32 percent of all ballots were cast early, with an increasing number of states allowing voting to begin 45 days before Election Day. In these states ballots are being cast prior to the fall presidential debates. There is every indication that past trends will continue to hold in 2016 and that the outcome of the presidential election will come into focus well before the general election. During this period when voters are beginning to seriously contemplate the type of person they want to lead the country, the Republicans will likely be in the middle of a prolonged and messy internecine intra-party fight—a fight that the unique attributes of the 2016 election will likely make more vocal, extreme and prolonged than the party will wish. This period of primaries and caucuses will be marked by a relentless barrage of negative ads by the candidates designed to drive down the image of their opponents. At the same time, Republicans will be focused on locking down the hearts and minds of their right-wing base voters rather than appealing for mainstream support. If these challenges aren’t enough, there are a series of factors—when taken together—during this critical period that that will further complicate Republicans’ attempts to take back the White House. 187 CMSDL Core Files 2015-2016 2NC/1NR Answer to: Impact Turn – Iran Deal The deal imposes new restrictions and monitoring solve that are key to prevent Iranian Proliferation Cirincione 7/14 (Joe, president of Ploughshares Fund and author of Nuclear Nightmares: Securing the World Before It Is Too Late, former director for non-proliferation at the Carnegie Endowment for International Peace, “A Huge Deal; This agreement will shrink wrap Iran’s nuclear program for a generation,” Slate, 7/14/2015, http://www.slate.com/articles/news_and_politics/foreigners/2015/07/iran_and_united_states_ nuclear_deal_why_this_historical_deal_is_what_we.1.html)//duncan The deal just struck by Iran, the United States, and five other world powers in Vienna is a major victory for U.S. national security. It shrinks Iran’s nuclear complex down to a token capability and wraps it in a permanent inspection and monitoring regime.¶ The new agreement doesn’t overthrow the clerical regime ruling Iran. It doesn’t change Iran’s policies toward Israel or its Arab neighbors. And it doesn’t force Iran to end the repression of its own people.¶ The agreement forged between Iran and the world’s powers does only one thing, but it is a big one: It reverses and contains what most experts consider the greatest nuclear proliferation challenge in the world. Whatever else Iran may do in the world, it will not do it backed with the threat of a nuclear weapon.¶ U.S. negotiators went into the Iran talks with three key objectives: cut off all of Iran’s pathways to a nuclear bomb, put in place a monitoring system to catch any Iranian cheating, and keep together the global coalition that can snap back sanctions if Iran breaks the deal. After 22 months of hard bargaining they have emerged with that and more. This detailed 100-plus-page agreement dismantles much of Iran’s nuclear program, freezes it, and puts a camera on it.¶ The deal eliminates the three ways Iran could build a bomb.¶ First, without the deal, Iran could use its centrifuges to purify enough uranium for one or more bombs within weeks. These high-tech machines are the size and shape of water heaters but made of specialized metal alloys. They spin uranium gas at supersonic speeds, cascading the gas through assemblies of thousands of machines. When it reaches a purity level of about 5 percent, the gas can be turned into a powder form used to make fuel rods for nuclear reactors.¶ Iran says that is all it wants to do—make fuel. The problem is that the same machines in the same facilities can keep going until the uranium is enriched to 90 percent purity. Then the gas can be turned into the metal core of a weapon.¶ This deal blocks that path. Iran has agreed to rip out over two-thirds of the 19,000 centrifuges it has installed. Just over 5,000 centrifuges will be allowed to continue enriching uranium. All will be located at one facility at Natanz. The deep underground facility at Fordow that so worried Israeli planners (since it could not be destroyed with their weapons) will be shrunk to a couple of hundred operating centrifuges—and these are prohibited from doing any uranium enrichment. They will be used to purify other elements and be closely monitored. ¶ Furthermore, Iran must shrink its stored stockpile of uranium gas from some 10,000 kilograms to just 300 kilograms—and cannot enrich any uranium above 3.67 percent. This limit lasts for 15 years. ¶ Together, these cuts mean that even if Iran tried to renege on the agreement, it would take it at least a year to make enough uranium for one bomb —more than enough time to detect the effort and take economic, diplomatic, or military steps to stop it.¶ Uranium path, blocked.¶ Without the deal there is a second way Iran could make a bomb—with plutonium. The bomb at Hiroshima was made of uranium; the bomb at Nagasaki was made of plutonium. Unlike uranium, plutonium does not exist in nature. It is made inside nuclear reactors, as part of the fission process, and then extracted from the spent fuel rods. Iran is constructing a research reactor at Arak that would have produced about 8 kilograms of plutonium each year, or enough theoretically for about two bombs.¶ Under the new deal, Iran has agreed to completely reconfigure the Arak reactor so that it will produce less than 1 kilogram a year. The old core will be shipped out of the country. Further, Iran has agreed to never build facilities that could reprocess fuel rods and all spent fuel will be 188 CMSDL Core Files 2015-2016 shipped out the country.¶ Plutonium path, blocked.¶ Finally, without the deal Iran could try to build a covert facility where it could secretly enrich uranium. The verification and monitoring system required by this deal makes that all but impossible.¶ Inspectors will now track Iran’s uranium from the time it comes out of the ground to the time it ends up as gas stored in cylinders. There will be state-of-the-art fiber-optic seals, sensors, and cameras at every facility, inventories of all equipment, tracking of scientists and nuclear workers, and 24/7 inspections. Inspectors will also monitor the manufacture of all centrifuges and related machinery. A special “procurement channel” will be set up through which all of Iran’s imported nuclear-related equipment must go.¶ This makes it extraordinarily difficult for Iran to cheat. Iran might want to set up a covert enrichment plant, but where would it get the uranium? Or the centrifuges? Or the scientists? If a 100 scientists suddenly don’t show up for work at Natanz, it will be noticed. If the uranium in the gas doesn’t equal the uranium mined, it will be noticed. If the parts made for centrifuges don’t end up in new centrifuges, it will be noticed. Iran might be able to evade one level of monitoring but the chance that it could evade all the overlapping levels will be remote.¶ Covert path, blocked.¶ This agreement, however, does leave Iran with significant capabilities. It would be better if the entire nuclear complex was razed to the ground and the earth salted so it could never be rebuilt.¶ But we are not Rome and Iran is not Carthage. Such a deal was the preferred option of most nonproliferation experts, including myself, 12 years ago when Iran’s enrichment program was first disclosed. But the Bush administration rejected talks with Iran, when it had only a few dozen centrifuges. “We don’t negotiate with evil,” said Vice President Dick Cheney, “we defeat it.” That strategy failed. Iran’s talks with the European Union collapsed; Iran had 6,000 centrifuges by the end of the Bush administration, and even as sanctions against it increased, Iran built thousands more.¶ The interim agreement reached in November of 2013 froze that progress, and rolled back some of the most dangerous parts, including the stockpile of 20 percent enriched uranium that Israeli Prime Minister Benjamin Netanyahu warned with his cartoon bomb diagram at the U.N. could lead to an Iranian bomb “within weeks.”¶ This final comprehensive agreement goes much further. It is cleverly crafted so that all sides can claim victory. Iran can say with pride that its rights have been recognized, that sanctions will be lifted, and that it will not destroy a single nuclear facility.¶ And they will be correct. The beauty of this agreement is that Iran gets to keep its buildings and we get to take out all the furniture.¶ Centrifuges cut by two-thirds, research and new facilities limited for 10 years.¶ Uranium gas stockpile cut by 97 percent, no new enrichment above 4 percent and no new facilities for 15 years.¶ Plutonium production in new reactor cut 90 percent, no new reactors for 15 years.¶ Monitoring of all centrifuge manufacturing for 20 years.¶ Confinement of all purchases to monitored procurement channel for 25 years.¶ Monitoring of all uranium mines for 25 years.¶ Permanent ban on any nuclear weapons research or activities.¶ Permanent ban on reprocessing of fuel to extract plutonium.¶ Permanent intrusive inspections.¶ These terms effectively freeze the program for longer than it has been in full operation. It will shrink and confine Iran’s nuclear work for a generation. The Deal creates cooperation and barriers that solve proliferation Slavin 7/14 (Barbara, Washington correspondent for Al-Monitor, a senior fellow at the Atlantic Council and author of "Bitter Friends, Bosom Enemies: Iran, the US and the Twisted Path to Confrontation,” been to Iran 9 times, “Iran nuclear deal shifts tectonic plates in the Middle East,” Al Jazeera, 7/14/2015, http://america.aljazeera.com/articles/2015/7/14/iran-nucleardeal-shifts-mideast-tectonic-plates.html)//duncan Iran and a U.S.-led consortium of the world’s top powers have achieved a historic agreement that should keep Iran from developing nuclear weapons for at least a decade and could lay the basis for broader cooperation on the multiple crises roiling the Middle East.¶ U.S. officials were quick to underline that other differences with Iran remain — over its support for groups on the State Department’s terrorism list, its human rights abuses and its challenge of Israel’s right to exist. But there was no disguising the sense that the tectonic plates of international relations are shifting in promising if, for many old U.S. regional allies, unsettling ways.¶ Exhausted diplomats from Iran, the U.S., the U.K., France, Germany, Russia and China (the P5+1) as well as the European Union 189 CMSDL Core Files 2015-2016 finalized a 159-page joint comprehensive plan of action in the middle of the night in Vienna as the last piece of what negotiators have called a Rubik’s Cube locked into place. This was a disagreement over how long restrictions should be maintained over Iran’s conventional arms trade even as other sanctions imposed because of its nuclear activities are lifted several months from now. ¶ Economic impact of Iranian sanctions being lifted 3:00¶ President Barack Obama, addressing Americans at the unusually early hour of 7 a.m., said the deal “meets every single one of the bottom lines we established” to block four pathways to an Iranian nuclear weapon. Iranian President Hassan Rouhani, speaking to his nation shortly afterward, declared the agreement a “win-win situation for both parties” that preserves Iranian honor and scientific achievements while ending crippling [devastating] economic sanctions.¶ What follows is a complicated process of implementation that will certainly be challenged by opponents in several countries but that could be viewed as an achievement as historic as the U.S. opening to China and U.S.-Soviet détente in the 1970s.¶ Obama alluded to an earlier era of arms talks when he quoted President John F. Kennedy, saying, “Let us never negotiate out of fear, but let us never fear to negotiate.”¶ The essence of the agreement has been known since April 2, when negotiators accepted parameters for a final accord. Their arduous task since then has been to flesh out those parameters, expanding a one-page Iran–European Union statement into a 30,000-word tome that includes five technical annexes.¶ The heart of the trade-off is an Iranian promise to substantially restrict its nuclear program for more than a decade in return for relief from European and United Nations sanctions and a waiver of U.S. secondary sanctions that impede other countries from doing business with Iran.¶ Among the surprises is relief of U.S. sanctions on selling commercial airplanes to Iran — a provision that should delight both U.S. companies such as Boeing and beleaguered Iranians who risk their lives by flying on antiquated jets.¶ According deal will restrict four potential paths to nuclear weapons:¶ First, to U.S. officials, the it will reduce by two-thirds the number of centrifuges Iran currently has installed — from 19,000 to 6,000 — of which only 5,060 will be allowed to enrich uranium for the next decade at a facility at Natanz that is vulnerable to military attack.¶ Of the remaining centrifuges, a few hundred will be allowed to operate at an underground plant at Fordow but will not be allowed to enrich uranium. Excess centrifuges will be dismantled and stored under constant electronic surveillance.¶ Second, Iran will cap enrichment at Natanz at 3.67 percent of the isotope U-235 (far below weapons grade) for 15 years and reduce its stockpile of 10,000 to 12,000 kilograms of low-enriched uranium by 98 percent, to 300 kilograms — a quarter of what would be required for a single nuclear weapon if it were further refined to weapons grade.¶ Third, a heavy-water reactor under construction at Arak will be modified so that it will produce only a tiny amount of plutonium, another potential fuel for weapons. Iran will not build a facility to reprocess the spent fuel, which will be exported.¶ These steps are intended to extend the amount of time it would take Iran to enrich sufficient material for a nuclear weapon from three months at present to 12 to 14 months for the next decade. Other restrictions on research and development of more advanced centrifuges are meant to keep Iran from rapidly ramping up uranium enrichment capacity from 2026 to 2030.¶ The fourth pathway to a bomb — the so-called sneakout — is addressed by intensified monitoring and verification, including the resolution of questions about past military dimensions of the Iranian program. According to an agreement with the I nternational A tomic E nergy A gency, the United Nations’ nuclear watchdog, Iran will allow the agency to visit sites where military-related nuclear activity is believed to have taken place, including Parchin, a military base that Iran has paved over three times to elude detection of suspected prior weapons research.¶ Iran will implement the additional protocol of the Nuclear N on- P roliferation T reaty and provide access to inspectors “where necessary and when necessary,” in the words of Obama, if Iran is suspected of illicit activity. A joint commission will be set up to supervise implementation and resolve the inevitable disputes. Nuclear Deal prevents Iranian Proliferation Tabatabai 7/13 (Ariane, visiting assistant professor in the Security Studies Program at the Georgetown University School of Foreign Service, and an associate in the Belfer Center's 190 CMSDL Core Files 2015-2016 International Security Program and Project on Managing the Atom at Harvard University, “After a historic nuclear agreement, challenges ahead for Iran,” Bulletin of Atomic Scientists, 7/13/2015, http://thebulletin.org/after-historic-nuclear-agreement-challenges-aheadiran8504)//duncan After months of intense negotiations and several extensions, Iran and six world powers finally reached a comprehensive nuclear deal on Tuesday in Vienna. The historic agreement accomplishes several things that benefit the non-proliferation regime and international security. It curbs Iran’s nuclear activities and allows the international community to verify that Tehran’s program is peaceful. In doing so, the deal stops a 10th country from developing nuclear weapons. It also allows Iran to take steps toward normalizing its political and economic relationship with the rest of the world. In short, both sides have reason to celebrate. As global attention moves on, though, Iran still faces major challenges ahead.¶ What was accomplished. While many back home on both sides have been pushing their negotiators to do better, it's important to remember that a deal can only be sustainable if both parties walk away feeling like they gained more than they conceded. Advocates of zero enrichment for Iran have missed this point all along, pushing for a full Iranian capitulation. Even if such a deal had been concluded—which wouldn’t have happened—it wouldn't have lasted. ¶ The P5+1—China, France, Germany, Great Britain, Russia, and the United States—can now leave the negotiating table with the assurance that they have effectively checked sensitive Iranian nuclear activities. They have essentially closed off any possibility of Iran getting the Bomb using plutonium , by getting it to agree to redesign the Arak heavy water reactor, a virtually irreversible step, and formalizing Tehran’s pledge not to reprocess plutonium. The agreement also scales back Iran’s uranium enrichment program , limiting the activity to a single facility, Natanz, and reducing its capacity by two thirds. The Fordow plant, meanwhile, which was a key proliferation concern, is being repurposed as a research and development site. This step lengthens Iran’s breakout time, or the amount of time it would take between choosing to build a nuclear weapon and accumulating enough fissile material to do so.¶ The agreement, furthermore, includes a permitted procurement channel, so that Iran can continue working on its nuclear program without resorting to black market equipment. This means that Iran will get state-of-the-art technology, and ensures the international community will know what Iran is doing and how it is doing it. Last but not least, the prospects of a so-called “sneak out” have been minimized: The Iranian nuclear program will be heavily monitored at all stages, from milling and mining all the way through to enrichment. The International Atomic Energy Agency will do the monitoring to ensure that Tehran complies with its that obligations under the Comprehensive Safeguards Agreement and the Additional Protocol. (Iran is voluntarily implementing the latter under the deal, pending its formal ratification through the legislative process.)¶ With this level of scrutiny, community can make sure that Iran's nuclear program remains peaceful. the international It can also pat itself on the back for bringing a country back into compliance through a negotiated process, rather than yet another military solution. Even critics of the deal who were in favor of military intervention admitted that their option wouldn’t have been a lasting solution; some said the United States would have kept having to "mow the lawn," with all the costs that would have entailed. Instead, the United States and its negotiating partners walk away with what looks like a durable and effective solution to the Iranian nuclear crisis and a step forward for the non-proliferation regime. The Iran deal sets parameters that prevent proliferation Logan and Glaser 7/14 (Justin, director of foreign policy studies at the Cata institute, John, graduate student in International Security at George Mason University, “Iran nuclear deal a clear success,” CNN, 7/14/2015, http://www.cnn.com/2015/07/14/opinions/glaser-logan-irannuclear-deal-positive/)//duncan 191 CMSDL Core Files 2015-2016 (CNN)The deal just struck between the U.S., world powers, and Iran is an historic achievement that decreases the likelihood of an Iranian nuclear weapon and forestalls the risk of another costly U.S. war in the Middle East.¶ But while the diplomats in Vienna are finished wrangling over the final details, the Obama administration is by no means finished fighting for the agreement's survival. Congress has 60 days with which to review the deal for final approval, and while Republicans may not have a veto-proof majority, they -- along with some Democrats -- remain vehemently opposed to any plausible peaceful resolution.¶ The debate over Iran diplomacy was really two debates, in which each side was arguing over something different. On the one side was a strikingly broad consensus of nearly the entire arms control community, which recognizes what the deal can achieve in terms of nonproliferation and regional stability. On the opposing side is the Iran hawk community, which focused less on the nuclear issue than on finding ways to isolate and ultimately destroy Iran's clerical regime, by military force if necessary, nuclear program or not.¶ The near-consensus among arms controllers is due to the deal's strong nonproliferation features. Under the deal, Iran would reduce its stockpile of centrifuges by two-thirds and dismantle about 97% of its low-enriched uranium. For 15 years, the Iranians will be prohibited from enriching any uranium at their Fordow site and the Arak reactor for plutonium production would be permanently disabled.¶ Throughout, Iran would be subject to one of the most robust and intrusive inspection regimes in the world , with continuous video monitoring of its uranium mines for the next 25 years and monitoring of centrifuge production facilities for 20 years. Expanded inspections under the Additional Protocol are permanent.¶ As 30 nonproliferation experts attested to in a statement in April, "the agreement reduces the likelihood of destabilizing nuclear weapons competition in the Middle East, and strengthens global efforts to prevent proliferation , including the Nuclear Nonproliferation Treaty."¶ Under breakout time -- the amount of time it would take to produce one bombs-worth of highly enriched uranium if it decided to do so -- would be extended to roughly one year, up from roughly three months at the interim agreement's inception.¶ To review these technical parameters and feverishly warn that the deal "paves the way for a nuclear Iran," as Sen. David Perdue, R-Georgia, and others recently have is bizarre. Similarly, to declare as Sen. Marco Rubio, R-Florida, recently did that the deal would produce "a the deal, Iran's cascade of proliferation" in the region relies on an array of interlocking dubious assumptions.¶ What these wildly divergent assessments seem to indicate is that the sides were arguing over different problems. For the arms control community, the problem was an Iranian nuclear weapons capability. For them, given the one-two punch of political reality and the terms of the agreement, the deal was a good thing. It significantly reduced the probability of an Iranian nuclear weapon and could meet both sides' minimum standard of necessity.¶ For neoconservatives and interventionist Democrats, the nuclear program was but one piece of a much larger problem: a looming Persian menace that threatened to dominate the Middle East. This explains the specious nonproliferation arguments offered in opposition to the deal, as well as the increased warnings of Iranian "regional hegemony" heard in the run-up to the deal.¶ These sorts of arguments are tendentious in the extreme, because on their own terms they fall short. The nuclear agreement is indeed helpful from the point of view of nonproliferation, and Iran has no path to regional hegemony in the policy-relevant future. Instead, these claims seem to be part of a larger strategy under which everything that happens tied to Iran is treated as a threat.¶ But the question in the context of nuclear diplomacy was never a choice between a neutered, Israel-recognizing liberal Iran or an empowered nuclear theocracy. It was between a nasty but weak regional power with little power-projection capability, closer or further away from a nuclear weapons capability. And on these terms, the agreement must be viewed as a clear success. 192 CMSDL Core Files 2015-2016 **Elections Disadvantage Affirmative 193 CMSDL Core Files 2015-2016 **2AC Blocks 194 CMSDL Core Files 2015-2016 2AC Hillary Good- Link Turn Strategy 1. Non-Unique: Hillary won’t win A) She’s behind Bernie Sanders in the primary Christian Today, 2015 (http://www.christiantoday.com/article/hillary.clinton.loses.lead.in.democratic.race.as.bernie.sanders.soars.in.latest.poll/64240.ht m, Sept 8) Hillary Clinton has lost her status as the frontrunner in the race for the Democratic presidential candidate, a new poll revealed. A survey conducted by NBC News/Marist showed that Clinton has lost her lead to fellow Democratic presidential candidate Sen. Bernie Sanders, who now holds a commanding ninepoint lead over the former Secretary of State. In July, a similar poll showed Clinton leading over Sanders by as much as 10 percentage points. Clinton recently figured in a controversy for using a private email server during her time as Secretary of State, leading to accusations that she might have caused the leakage of top-secret intelligence information. The same survey also showed that Sanders is already gaining ground on Clinton in Iowa, considered as one of the areas whose primaries more often than not indicate the results of the White House race. Sanders managed to chip away Clinton's lead among possible Democratic voters in Iowa by only 13 percentage points, according to the survey. Clinton got the nod of 38 percent of the respondents, while Sanders got the approval of 27 percent. In New Hampshire, another area where primaries are considered crucial, Clinton is only a distant second to Sanders, garnering only 32-percent from the respondents. The Vermont senator got support from 41 percent of the state's likely Democratic voters. B) Multiple polls show Hillary will lose to GOP candidates next November Red Alert Politics, 2015 (http://redalertpolitics.com/2015/09/11/hillary-clinton-loses-edge-republicans-general-election, Sept 11) If the polls in early September are any inclination, it’s going to be an unbearable month for the Hillary Clinton presidential campaign. A CNN/ORC poll conducted from Sept. 4-8 found Clinton losing or tied with the three major GOP frontrunners – Donald Trump, Ben Carson, and former Florida Gov. Jeb Bush. Clinton’s numbers fell the most drastically against Trump, her lead fell by 24 points from June to September where they are now tied at 48 percent. Carson leads the Democratic frontrunner by 51 to 46 percent and Bush leads her more narrowly by 49 to 47 percent. This isn’t the first poll that had Clinton falling behind Republican challengers. A Survey USA poll released last week had Trump beating her by 5 points, a Public Policy Polling report from Sept. 3 showed her tied with Carson, and a Fox News Poll from midAugust had Bush beating the Democratic frontrunner by 44 to 42 percent. 195 CMSDL Core Files 2015-2016 2. Link Turn – Voters, especially independents, hate surveillance – plan helps Hillary Ackerman and Siddiqui, 5/18 (Spencer and Sabrina, “NSA surveillance opposed by American voters from all parties, poll finds,” The Guardian, 2015, http://www.theguardian.com/us-news/2015/may/18/us-voters-broadly-opposed-nsasurveillance) With five days in the legislative calendar remaining before a pivotal aspect of the Patriot Act expires, a new poll shows widespread antipathy to mass surveillance, a sense of where the debate over the National Security Agency’s powers stands outside of Washington. Commissioned by the American Civil Liberties Union and carried out by the Global Strategy Group and G2 Public Strategies, the poll of 1,001 likely voters found broad opposition to government surveillance across partisan, ideological, age and gender divides. Sixty percent of likely voters believe the Patriot Act ought to be modified, against 34% that favor its retention in its current form. The NSA uses Section 215 of the Patriot Act as the legal basis for its daily collection of all Americans’ phone data, as the Guardian revealed in June 2013 thanks to whistleblower Edward Snowden, a practice that a federal appeals court deemed illegal on 7 May. Opposition to reauthorizing the Patriot Act without modification cuts against a bill by the GOP Senate leader, Mitch McConnell of Kentucky. The poll found 58% of Republicans favor modification, the subject of a rival bipartisan bill that recently passed the House, with only 36% of them favoring retention. Self-identified “very conservative” voters favor modification by a 59% to 34% margin. The margins for Democrats are similar to those for Republicans. Independent voters, however, are even less enthusiastic about mass domestic surveillance: 71% want the Patriot Act modified, versus 22% who favor keeping it as it is, which pollster Greg Strimple called “intense”. More than three-quarters of likely voters the poll interviewed opposed related aspects of current surveillance authorities and operations. Eighty-two percent are “concerned” about government collection and retention of their personal data. Eighty-three percent are concerned about government access to data stored by businesses without judicial orders, and 84% want the same judicial protections on their virtual data as exist for physical records on their property. The same percentage is concerned about government use of that data for noncounter-terrorism purposes. “Consensus on this issue is bipartisan,” said Strimple. 3. No link - Surveillance policy won’t swing votes in the election Kelly, 2014 Erin, USA Today, “Government snooping proves weak campaign issue.” http://www.usatoday.com/story/news/politics/2014/10/14/nsa-spying-privacy-congressional-election/17216313/ Government spying on American citizens has sparked public outrage, but it has not caught fire as a major issue in this year's congressional election. "Politicians don't see a lot of votes in the privacy issue because it's something that divides the American people," said Darrell West, founding director of the Center for Technology Innovation at the Brookings Institution. "There are people who are angry about government surveillance, but there are others who believe the government needs to keep doing it to protect the country from terrorists." In June, a poll by the Pew Research Center for the People and the Press said 54% of Americans said they disapproved of the National Security Agency's mass collection of millions of Americans' phone records, and 42% said they approved. The mass-data collection was revealed in June 2013 by former NSA contractor Edward Snowden. It's difficult for congressional candidates to use the issue against their opponents in some of the states with the most hotly contested elections, said Julian Sanchez, a senior fellow and privacy expert at the Cato Institute. "In a lot of purple states, there's a libertarian streak that cuts across party lines," Sanchez said. "You can find Democratic and Republican candidates who are equally likely to be opposed to government surveillance." The issue has been overshadowed in most races by concerns about jobs, the economy and the battle to stop the Islamic State, West said. "There are certainly people who are worried about privacy, but it's a smaller circle than those worried about Syria or the economy," he said. 196 CMSDL Core Files 2015-2016 4 Backing out of Iran deal won’t cause war – neither Iran nor Israel want to fight Miller 2015 – (vice president at the Woodrow Wilson Center for Scholars, July 24, http://blogs.wsj.com/washwire/2015/07/24/why-war-isnt-inevitable-if-congress-rejects-iran-nuclear-deal/) Last week Secretary of State John Kerry said bluntly about the Iran deal: “This is a choice between a diplomatic solution and war.” But is that really the case? Much of the Obama administration’s efforts to sell this accord have involved shackling the public and congressional debate with this binary choice and the horrific consequences should Congress reject the accord and overturn a presidential veto. The administration’s logic goes something like this: Congress takes the hit for sinking the accord; Iran reaps a huge propaganda victory and divides the world powers with which it has been negotiating for months (the “P5 +1,” or the five permanent members of the U.N. Security Council and Germany); the sanctions regime collapses; Iran then accelerates its nuclear program; Israel threatens war and attacks if Iran achieves “break out” or nuclear weapon threshold. By this thinking, the U.S. is invariably drawn into war because Iran gets close to a weapon or because we have to support Israel. And if Iran goes to produce an actual weapon, the U.S. could strike Iran directly. A congressional override of the president’s veto would make it impossible for the president to waive critical oil and banking sanctions against Iran. But would the July 14 deal then be scuttled, with our allies jumping ship on sanctions and Iran then breaking out? War isn’t necessarily what follows from all this. Yes, the odds of resuming negotiations to get a better deal seem unlikely. But so does the prospect of inexorable confrontation. Consider: Politics and propaganda: With Congress taking the major hit for scuttling the accord, Iran would immediately intensify its propaganda war and seek to reap political and financial benefits. No doubt, those would be considerable. But the fact that the Obama administration rushed to pass a U.N. Security Council resolution serves to avert the horrific scenario Mr. Kerry and President Barack Obama have laid out. Just because the U.S. can’t lift congressionally imposed sanctions doesn’t mean that other elements of the resolution couldn’t kick in. Hardliners might argue for walking away. But Iran is too clever to walk away from the prospect of trying to divide the P5+1–and it stands to gain a lot from getting the International Atomic Energy Agency to certify that Tehran held up its part of the commitments to be eligible for considerable sanctions relief. So while U.S. sanctions, particularly those dealing with international banking, would still bite the Iranian economy, Tehran could still benefit enormously . For commercial reasons alone– because opening Iran would bring huge business opportunities to Moscow and Beijing–the Russians and Chinese , and possibly the Germans , are likely to support an Iranian campaign for partial relief from U.N. sanctions. A German trade delegation is already in Iran. Why go to war? The theory that conflict with Iran is inevitable rests on several highly arguable contentions . First is the assumption that Iran is willing to accelerate its nuclear program and to either break out or sneak out to a weapon and thus court a military response from Israel or the United States. The second big assumption is that Israel is just itching for an opportunity to unilaterally strike Iran with or without Washington’s approval. In the wake of a no vote by Congress, neither of these developments are certainties . Israel is implacably opposed to the deal, but Prime Minister Benjamin Netanyahu is pretty risk-averse ; he would have to think long 197 CMSDL Core Files 2015-2016 and hard about launching strike in which Israel is operating at the margins of its capacity, particularly without a reason that would justify the severe international consequences. And why would Iran want to provide such a reason as long as it could play the Security Council card and pocket the political and economic benefits that would flow from being cooperative? For Tehran, the smarter option in the wake of Congress blocking the accord would be to exploit the appetite for international investment and pick up as many chits as possible on the global stage by blaming the failure and missed opportunity on Washington. This isn’t a perfect outcome, but it’s a more compelling choice for Iran’s leadership than a headlong plunge into war . That course stands to bring Iran few benefits and many risks. Tehran is also aware that its ally Hezbollah is bogged down in Syria as part of Iran’s campaign to support Bashar al-Assad, which limits Tehran’s regional assets to use against Israel in the event of a military strike. If Congress blocks the nuclear agreement, the mullahs will take their time and consider all of Iran’s options. Courting a major strike from Israel and the U.S. isn’t necessarily one of them. 5. No Link – Voters aren’t even paying attention yet to the election Jackson, 2015 (Natalie, senior data scientist for Huffington Post) http://www.huffingtonpost.com/entry/2016-election-polls-value_55f83910e4b09ecde1d9b328, September 15th But another way of viewing the data is that even with these anomalies, only 27 percent of Americans are paying close attention to the 2016 presidential race -- meaning more than 7 in 10 are not. There are, after all, still four months to go before the first primary votes are cast, and 14 months before the general election. Most Americans just don't live and breathe politics even when Trump is involved. Focusing on the great majority of Americans who aren't yet following the race very closely provides a reality check on how much stock we place in the current polling. Every week brings new polls showing Trump leading the Republicans and Sen. Bernie Sanders (I-Vt.) gaining on his Democratic rival Hillary Clinton, and those new polls trigger the writing of thousands of words about what it all means. But if 73 percent of Americans aren't really paying attention, what do these horserace polls actually show? For national primary polls, the answer is probably not much. All the candidates are focusing their efforts on New Hampshire, Iowa and sometimes South Carolina because these states vote first. But the three states make up only about 3 percent of the nation's population. The other 97 percent probably haven't had much exposure to the candidates and -- with the exception of those few paying close attention -- are likely responding to the poll question with not much information. 198 CMSDL Core Files 2015-2016 2AC Hillary Good – Impact Turn Strategy 1. Non-Unique: Hillary won’t win A. She’s behind Bernie Sanders in the primary Christian Today, 2015 (http://www.christiantoday.com/article/hillary.clinton.loses.lead.in.democratic.race.as.bernie.sanders.soars.in.latest.poll/64240.ht m, Sept 8) Hillary Clinton has lost her status as the frontrunner in the race for the Democratic presidential candidate, a new poll revealed. A survey conducted by NBC News/Marist showed that Clinton has lost her lead to fellow Democratic presidential candidate Sen. Bernie Sanders, who now holds a commanding ninepoint lead over the former Secretary of State. In July, a similar poll showed Clinton leading over Sanders by as much as 10 percentage points. Clinton recently figured in a controversy for using a private email server during her time as Secretary of State, leading to accusations that she might have caused the leakage of top-secret intelligence information. The same survey also showed that Sanders is already gaining ground on Clinton in Iowa, considered as one of the areas whose primaries more often than not indicate the results of the White House race. Sanders managed to chip away Clinton's lead among possible Democratic voters in Iowa by only 13 percentage points, according to the survey. Clinton got the nod of 38 percent of the respondents, while Sanders got the approval of 27 percent. In New Hampshire, another area where primaries are considered crucial, Clinton is only a distant second to Sanders, garnering only 32-percent from the respondents. The Vermont senator got support from 41 percent of the state's likely Democratic voters. B. Multiple polls show Hillary will lose to GOP candidates next November Red Alert Politics, 2015 (http://redalertpolitics.com/2015/09/11/hillary-clinton-loses-edge-republicans-generalelection, Sept 11) If the polls in early September are any inclination, it’s going to be an unbearable month for the Hillary Clinton presidential campaign. A CNN/ORC poll conducted from Sept. 4-8 found Clinton losing or tied with the three major GOP frontrunners – Donald Trump, Ben Carson, and former Florida Gov. Jeb Bush. Clinton’s numbers fell the most drastically against Trump, her lead fell by 24 points from June to September where they are now tied at 48 percent. Carson leads the Democratic frontrunner by 51 to 46 percent and Bush leads her more narrowly by 49 to 47 percent. This isn’t the first poll that had Clinton falling behind Republican challengers. A Survey USA poll released last week had Trump beating her by 5 points, a Public Policy Polling report from Sept. 3 showed her tied with Carson, and a Fox News Poll from midAugust had Bush beating the Democratic frontrunner by 44 to 42 percent. 199 CMSDL Core Files 2015-2016 2. No link - Surveillance policy won’t swing votes in the election Kelly, 2014 Erin, USA Today, “Government snooping proves weak campaign issue.” http://www.usatoday.com/story/news/politics/2014/10/14/nsa-spying-privacy-congressional-election/17216313/ Government spying on American citizens has sparked public outrage, but it has not caught fire as a major issue in this year's congressional election. "Politicians don't see a lot of votes in the privacy issue because it's something that divides the American people," said Darrell West, founding director of the Center for Technology Innovation at the Brookings Institution. "There are people who are angry about government surveillance, but there are others who believe the government needs to keep doing it to protect the country from terrorists." In June, a poll by the Pew Research Center for the People and the Press said 54% of Americans said they disapproved of the National Security Agency's mass collection of millions of Americans' phone records, and 42% said they approved. The mass-data collection was revealed in June 2013 by former NSA contractor Edward Snowden. It's difficult for congressional candidates to use the issue against their opponents in some of the states with the most hotly contested elections, said Julian Sanchez, a senior fellow and privacy expert at the Cato Institute. "In a lot of purple states, there's a libertarian streak that cuts across party lines," Sanchez said. "You can find Democratic and Republican candidates who are equally likely to be opposed to government surveillance." The issue has been overshadowed in most races by concerns about jobs, the economy and the battle to stop the Islamic State, West said. "There are certainly people who are worried about privacy, but it's a smaller circle than those worried about Syria or the economy," he said. 3 Hillary will maintain the Iran deal, which leads to nuclear war Podhoretz, 2015 Norman, http://www.wsj.com/articles/israels-choice-conventional-war-now-or-nuclear-war-later-1438125451, July 28th For our negotiating partners, the new goal was to open the way to lucrative business contracts, but for Mr. Obama it was to remove the biggest obstacle to his long-standing dream of a U.S. détente with Iran. To realize this dream, he was ready to concede just about anything the Iranians wanted—without, of course, admitting that this was tantamount to acquiescence in an Iran armed with nuclear weapons and the rockets to deliver them. To repeat, then, what cannot be stressed too often: If the purpose were still to prevent Iran from getting the bomb, no deal that Iran would conceivably agree to sign could do the trick, leaving war as the only alternative. To that extent, Mr. Obama is also right. But there is an additional wrinkle. For in allowing Iran to get the bomb, he is not averting war. What he is doing is setting the stage for a nuclear war between Iran and Israel. The reason stems from the fact that, with hardly an exception, all of Israel believes that the Iranians are deadly serious when they proclaim that they are bound and determined to wipe the Jewish state off the map. It follows that once Iran acquires the means to make good on this genocidal commitment, each side will be faced with only two choices: either to rely on the fear of a retaliatory strike to deter the other from striking first, or to launch a pre-emptive strike of its own. Yet when even a famous Iranian “moderate” like the former President Hashemi Rafsanjani has said—as he did in 2001, contemplating a nuclear exchange—that “the use of even one nuclear bomb inside Israel will destroy everything. However, it will only harm the Islamic world. It is not irrational to contemplate such an eventuality,” how can deterrence work? 200 CMSDL Core Files 2015-2016 4 No Link – Voters aren’t even paying attention yet to the election Jackson, 2015 (Natalie, senior data scientist for Huffington Post) http://www.huffingtonpost.com/entry/2016-election-polls-value_55f83910e4b09ecde1d9b328, September 15th But another way of viewing the data is that even with these anomalies, only 27 percent of Americans are paying close attention to the 2016 presidential race -- meaning more than 7 in 10 are not. There are, after all, still four months to go before the first primary votes are cast, and 14 months before the general election. Most Americans just don't live and breathe politics even when Trump is involved. Focusing on the great majority of Americans who aren't yet following the race very closely provides a reality check on how much stock we place in the current polling. Every week brings new polls showing Trump leading the Republicans and Sen. Bernie Sanders (I-Vt.) gaining on his Democratic rival Hillary Clinton, and those new polls trigger the writing of thousands of words about what it all means. But if 73 percent of Americans aren't really paying attention, what do these horserace polls actually show? For national primary polls, the answer is probably not much. All the candidates are focusing their efforts on New Hampshire, Iowa and sometimes South Carolina because these states vote first. But the three states make up only about 3 percent of the nation's population. The other 97 percent probably haven't had much exposure to the candidates and -- with the exception of those few paying close attention -- are likely responding to the poll question with not much information. 201 CMSDL Core Files 2015-2016 **A2- Hillary Good- 1AR Extensions 202 CMSDL Core Files 2015-2016 1AR Hillary Good – Non-Unique: Hillary Loses Now (Bernie Sanders) Bernie is beating Hillary across all Democratic groups, including women and young voters Breitbart, 2015 (http://www.breitbart.com/big-government/2015/09/13/poll-berniesanders-surging-hillary-clinton-cratering, Sept 13) Sen. Bernie Sanders (I-VT) has opened a 22-point lead over Democrat frontrunner Hillary Clinton in New Hampshire, home of the nation’s first primary. The new poll, from YouGov/CBS News Battleground, finds Sanders with 52 percent support among Democrats in the Granite State, far ahead of Clinton’s 30 percent support. Vice President Joe Biden, who is not yet a candidate, trails with 9 percent support. In Iowa, the first caucus state to vote, Sanders has a solid 10 point lead over Clinton. Sanders has 43 percent, Clinton 33 percent and Biden has the support of 10 percent of Democrats. Former Maryland Gov. Martin O’Malley, whose campaign has struggled to gain attention, has 5 percent. In New Hampshire, Sanders beats Clinton in every age demographic. Among the youngest voters, though, he has a 62-point advantage over Clinton. Hillary Clinton does best among voters aged 45-64, but she still loses that group by 2 points. Surprisingly, Sanders also best Clinton among women in New Hampshire. He leads Clinton by 11 points among female voters, long assumed to be an important foundation of support for Clinton. Among male voters, Sanders leads by 38 points. Sanders also leads Clinton among women in Iowa. He leads Clinton by 52-points among the youngest voters, while Clinton beats him by 17 points among the oldest voters in the Hawkeye State. Joe Biden leads both Clinton and Sanders as the preferred “second-choice” for voters in New Hampshire. Almost one-third of Democrats rank him as their second-choice, while 23 percent say Clinton and 12 percent name Sanders. This suggests that if Biden were to formally enter the race, there would be another reshuffling of the poll results. It is possible that Hillary Clinton would run third in New Hampshire. There is more bad news for Hillary Clinton, though. Only 24 percent of Democrats said Clinton’s growing email scandal has affected their vote. In other words, there are other factors underlying the Democrat voter surge to Sanders. It is possible that the voter move to Sanders isn’t simply due to questions over Hillary Clinton, but rather enthusiasm for Sanders and his economic populist message. That suggests Hillary will have to shift much further to the left to quell the Sanders’ rebellion. Hillary Clinton can no longer just assume that her difficulties are due to questions about her email use as Secretary of State. Even if those questions were magically put to rest this week, she is going to have to confront the rising Sanders more directly. He is soundly beating her across all Democrat groups. Bernie is ahead and has momentum 203 CMSDL Core Files 2015-2016 New York Post, 2015 (Sept 13, http://nypost.com/2015/09/13/bernie-is-wiping-thefloor-with-hillary-in-latest-polls) Sen. Bernie Sanders is generating enthusiasm — and Hillary Rodham Clinton anything but, according to new polls released Sunday. Sanders is leading Clinton by 10 points in Iowa and 22 points in New Hampshire, according to the CBS/YouGov surveys. The polls found the Vermont independent is thumping Clinton, 43 percent to 33 percent, among Iowa Democrats and 52 to 30 percent in New Hampshire, but Clinton leads in South Carolina 46 to 23. But the biggest difference, the pollsters found, is enthusiasm — Sanders is generating it and Clinton is not. The Democratic base prefers Bernie Sanders The Daily Beast 2015- “This Is How Hillary Loses the Primary” July 9 http://www.thedailybeast.com/articles/2015/07/09/this-is-how-hillary-loses-the-primary.html Something remarkable is happening in American politics. For the first time in our history, a socialist is running a close second and gaining ground on the front-runner in a presidential race.¶ Anyway you look at it, Senator Bernie Sanders is making history and may very well play a deciding role in who will be the next president. How real is the Sanders movement? Well, at this point in his campaign in 2007, Barack Obama had 180,000 donors on his way to setting records with lowdonor contributions; Bernie Sanders has 250,000.¶ How’s he doing with voters in early states? “The next time Hillary Rodham Clinton visits New Hampshire, she need not look over her shoulder to find Bernie Sanders; the Vermont Senator is running right alongside her in a statistical dead heat for the 2016 Democratic presidential nomination, according to a CNN/WMUR poll,” wrote The New York Times on June 25.¶ But lest the Sanders surge in New Hampshire be dismissed as neighboring state advantage, the Clinton campaign seems even more worried about losing Iowa. In a carefully orchestrated bit of expectation lowering, Clinton campaign manager Robby Mook recently said, “the caucuses are always such a tough proving ground” and Clinton campaign spokeswoman Jennifer Palmeri said, “We are worried about [Sanders].”¶ Here’s what we know has happened so far in the Democratic primary for president. Since Hillary Clinton started spending money, hiring staff and campaigning, she has lost votes. In Iowa and New Hampshire, she was doing better in the polls in January than she is today. Heck, she had more votes last month than she has today.¶ Politics is about trends and the one thing we know is that trends escalate in speed as elections near. Even starting out with the huge lead that she did, Clinton can’t allow Sanders to keep gaining votes while she loses votes in the hope that the bleeding won’t be fatal in the long run.¶ Thinking that little tricks like getting an “organizer” to introduce the candidate at a rally will change an image built over four decades in politics is like McDonald’s thinking they can take on Starbucks because they now sell espresso.¶ So far Clinton’s approach has been to try to demonstrate to the element of the party that finds Sanders so appealing that she is really one of them. This seems like an extremely flawed strategy that plays directly to Sanders’s strengths. If the contest is going to come down to who can be the most pure liberal, the best bet is on the guy who actually is a socialist. Particularly when running against someone with Hillary Clinton’s long record of being everything that the current left of her party hates.¶ The truth is, Hillary Clinton has supported every U.S. war since Vietnam. She supported not only DOMA, which her husband signed, but a travel ban on those who were HIV positive. She supported welfare cuts (remember her husband’s efforts toward “ending welfare as we know it”?). She supports the death penalty and campaigned in her husband’s place during the 1992 New Hampshire primary when he left to oversee the execution of an African-American man whose suicide attempt left him brain damaged. 204 CMSDL Core Files 2015-2016 1AR Hillary Good – Non-Unique: Hillary Loses Now (General Election) Hillary will lose key swing states to GOP candidates The Hill, 2015 http://thehill.com/blogs/ballot-box/presidential-races/250836-poll-finds-clinton-losing-to-fourrepublicans-in-iowa, August 11 Other polls show Clinton well ahead in Iowa of her rivals for the Democratic nomination, but the new survey is likely to add to the sense that Clinton could be vulnerable in a general election battle. A recent survey by Quinnipiac showed Clinton trailing GOP candidates in the swing states of Iowa, Colorado and Virginia. Other polls have suggested voters don’t trust Clinton. Hillary has lost the support of white women, her base Washington Examiner, 2015 http://www.washingtonexaminer.com/msnbc-clinton-losing-the-white-womanvote/article/2572134, Sept 16 Democratic frontrunner Hillary Clinton is hemorrhaging support from white female voters, as this once supposedly locked-down voting bloc is now considering other candidates, MSNBC's Andrea Mitchell warned Tuesday. "Hillary Clinton is reaching out to that group that she had always counted on, white women voters, who are now abandoning her in droves during the last two months," the cable news anchor reported Tuesday. This supposed mass exodus has left Clinton's campaign scrambling to find a way to win back a group that she has "always counted on." "This after seeing her support among white women in one new poll go from 71 percent in July to just 42 percent now, a 29 percent drop in only eight weeks as Clinton has been hammered with questions about her private emails," Mitchell said. Democrats will lose General but Economic growth could be Black Swan Fair 5/27 (Ray Fair, professor of economics at Yale University, has predicted 7 out of 9 elections, author of ‘Predicting Presidential Elections and Other Things’, 5/27/15, ‘In 2016's presidential race, the winner will be ...’, http://www.latimes.com/opinion/op-ed/la-oe-0527-fair-election-prediction20150527-story.html, 7/1/15, ACC) Since 1978, based on data going back to 1916, I've documented how four conditions affect voting patterns. The first is whether the president is running again. If so, this has a positive effect on votes for the president. The second is how long a party has controlled the White House . Voters like change; when a party has been in power for two or more consecutive terms, this has a negative effect on votes for that party's candidate. The third is the slight but persistent bias in favor of the Republican Party. Finally, the state of the economy : A good economy at the time of the election has a positive effect on votes for the incumbent party candidate . The economic variables that matter are the rate of inflation and output (GDP) growth. Of particular importance is GDP growth in the first three quarters of the election year. 205 CMSDL Core Files 2015-2016 These first three conditions are working against the Democrats in 2016. The president is not running; the Democrats have been in power for two terms; there is that lingering Republican bias. According to the equation behind my work, then, the economy has to be very strong between now and the election for the Democrats to have a good chance of winning . Most economists believe the economy will grow at about a 3% annual rate between now and November 2016 . If that happens, my equation predicts the Democrats will win about 46% of the vote in a two-party contest. In order for them to win more than 50%, the economy would need to grow at about 4% , and even in that case their predicted vote share would climb only slightly above the halfway mark. My equation's average prediction error over the 25 elections since 1916 is between 2.5 and 3.5 percentage points. Assuming the economy does indeed grow at 3%, the probability that the Democrats will win is low, between about 5% and 13%. Republicans have cause for confidence. My analysis is, of course, based on the assumption that the future will be like the past. What if voters start caring more about income inequality than economic growth, and perceive the Republicans to be poor on that issue? Or what if the GOP nominates someone further from the mainstream than ever before? Shifts in priorities can never be ruled out, but the best I can say is that the conditions that sway voters appear to have been fairly stable for 100 years — and my equation has a fairly good track record. In seven of the nine contests between 1980 and 2012, my equation correctly predicted which party would win the popular vote . It was wrong in 1992, when it predicted that Clinton would lose. (There was a strong third-party candidate that year, Ross Perot, which may have been a problem.) And it was wrong in 2012, when it predicted President Obama would win only 49% of the vote and he got 52%. All along, however, I said the prediction fell within the margin of error. A prediction of the sort I have just made is different from predictions using polls. Although polls can at times be fairly accurate, at least near the time of the election, they are not causal. The theory behind my analysis is that the economy and the other conditions have a causal effect on voting behavior . Given an economic forecast, I can make a prediction at any time — I don't even need to know who's running. I made my first prediction for the 2016 election in November, at which time I predicted, as now, that the Republicans would win if the economy turned out as currently expected . If a more robust economy does not materialize, it is likely that after 18 months of essentially nonstop campaigning, the Democratic nominee will lose — through no fault of her own. 206 CMSDL Core Files 2015-2016 1AR Hillary Good – No Link – Surveillance doesn’t swing votes No link- both candidates share the same surveillance policy Anderson, 2015 Jake, Global Research, June 19. “Ten Ways Hillary Clinton and Jeb Bush Are Basically the Same Presidential Candidate.” http://www.globalresearch.ca/10-ways-hillary-clinton-and-jeb-bush-are-basically-the-samepresidential-candidate/5456953 3. They both support the Patriot Act and NSA mass surveillance Both Clinton and Bush supported the Patriot Act from the day it was secretly drafted, only days after 9/11. They both voted for its reauthorization in 2006. This unconstitutional bill granted the government unprecedented powers of civilian detainment, as well as access to private data. When the FISA laws were updated by the Patriot Act, programs like PRISM enabled the NSA to collect millions of phone records from Americans with no suspected ties to terrorism. Hillary Clinton has expressed concern over privacy issues, but when she has had the chance to take a real stand on them, she has consistently avoided doing so. Meanwhile, Jeb Bush applauded President Obama’s expansion of NSA surveillance, proclaiming: “I would say the best part of the Obama administration would be his continuance of the protections of the homeland using the big metadata programs, the NSA being enhanced.” Fret no more, cynics of the American political system. When it comes to the erosion of civil liberties, bipartisanship is still possible. 207 CMSDL Core Files 2015-2016 1AR Hillary Good – Link Turn – Surveillance reform is popular Surveillance reform is popular among most Americans – plan helps Hillary Page, 2014 (Susan, “Poll: Most Americans now oppose the NSA program,” USA Today, January 20, http://www.usatoday.com/story/news/politics/2014/01/20/poll-nsa-surveillance/4638551/) WASHINGTON -- Most Americans now disapprove of the NSA's sweeping collection of phone metadata, a new USA TODAY/Pew Research Center Poll finds, and they're inclined to think there aren't adequate limits in place to what the government can collect. President Obama's announcement Friday of changes in the surveillance programs has done little to allay those concerns: By 73%-21%, those who paid attention to the speech say his proposals won't make much difference in protecting people's privacy. The poll of 1,504 adults, taken Wednesday through Sunday, shows a public that is more receptive than before to the arguments made by former NSA contractor Edward Snowden. His leak of intelligence documents since last spring has fueled a global debate over the National Security Agency's surveillance of Americans and spying on foreign leaders. Those surveyed now split, 45%-43%, on whether Snowden's disclosures have helped or harmed the public interest. The snapshot of public opinion comes as the White House, the intelligence agencies and Congress weigh significant changes in the way the programs are run. In his address, Obama insisted no illegalities had been exposed but proposed steps to reassure Americans that proper safeguards were in place. By nearly 3-1, 70%-26%, Americans say they shouldn't have to give up privacy and freedom in order to be safe from terrorism. That may reflect the increasing distance from the Sept. 11 attacks more than a decade ago that prompted some more of the more aggressive surveillance procedures. "In trading off between civil liberty and national security, the American public decisively favors national security when it feels the threat acutely and imminently but tilts in the other direction when the threats seem more remote," says Peter Feaver, a National Security Council aide for presidents George W. Bush and Bill Clinton. Among those who paid attention to Obama's speech, only 13% say his proposals to rein in the surveillance programs would make it more difficult for the government to fight terrorism. Only half of those surveyed said they had paid even a little attention to the speech, however. The president called for a third party rather than the government to hold the massive stores of phone metadata, and he said intelligence analysts would need a court order to search it except in emergencies. He proposed establishing a panel of independent lawyers who could argue in some cases before the supersecret Foreign Intelligence Surveillance Act court. And he said the United States would stop eavesdropping on friendly foreign leaders. Attitudes toward the surveillance program have turned more negative since last June and July, when the Snowden revelations were new. In polls in June and July 2013, more Americans approved of the program than disapproved. Now, by 53%-40%, a majority disapproves. Link Turn- the public is weary of surveillance- recent polls prove Americans are more worried about government surveillance than terrorism The Guardian 2013- July 29, “Major opinion shifts, in the US and Congress, on NSA surveillance and privacy” http://www.theguardian.com/commentisfree/2013/jul/29/poll-nsasurveillance-privacy-pew Numerous polls taken since our reporting on previously secret NSA activities first began have strongly suggested major public opinion shifts in how NSA surveillance and privacy are viewed. But a new comprehensive poll released over the weekend weekend by Pew Research provides the most compelling evidence yet of how stark the shift is.¶ Among other things, Pew finds that "a majority of Americans – 56% – say that federal courts fail to provide adequate limits on the telephone and internet data the government is collecting as part of its anti-terrorism efforts." And "an even larger percentage (70%) believes that the government uses this data for purposes other than investigating terrorism." Moreover, "63% think the government is also gathering information about the content of communications." That demonstrates a decisive rejection of the US 208 CMSDL Core Files 2015-2016 government's three primary defenses of its secret programs: there is adequate oversight; we're not listening to the content of communication; and the spying is only used to Keep You Safe™.¶ But the most striking finding is this one:¶ "Overall, 47% say their greater concern about government anti-terrorism policies is that they have gone too far in restricting the average person's civil liberties, while 35% say they are more concerned that policies have not gone far enough to protect the country. This is the first time in Pew Research polling that more have expressed concern over civil liberties than protection from terrorism since the question was first asked in 2004."¶ For anyone who spent the post-9/11 years defending core liberties against assaults relentlessly perpetrated in the name of terrorism, polling data like that is nothing short of shocking. This Pew visual underscores what a radical shift has occurred from these recent NSA disclosures: 209 CMSDL Core Files 2015-2016 1AR Hillary Good – Impact Turn – Iran Deal Bad Their impact has it backwards – Iran deal hurts US hegemony and leads to war by pushing allies toward Russia and China Washington Free Beacon, 2015 http://freebeacon.com/national-security/retired-air-force-general-iran-nuclear-deal-couldencourage-allies-to-align-with-russia-china, September 9th The chair of a council of prominent military leaders argued in testimony on Capitol Hill Wednesday that the Iranian nuclear deal could encourage U.S. allies in the Middle East to align themselves with other world powers such as Russia or China. Retired Air Force Gen. Chuck Wald, who co-chairs the Iran Strategy Council at the Jewish Institute for National Security Affairs, testified before the House Committee on Foreign Affairs on the implications of the nuclear agreement being pushed by the Obama administration. Wald, who served as deputy commander of United States European Command, explained that the agreement “undermines U.S. credibility” from the perspective of both allies and enemies in the Middle East by making U.S. commitment to alliances appear “weakened.” This in turn, Wald said, could prompt allies to “seek protection elsewhere” and enemies to “feel emboldened” against the United States. “Some U.S. allies have made clear they believe this deal will not prevent a nuclear Iran and, that by proceeding with the [agreement], the United States is disrupting the regional balance of power and endangering them,” Wald said. “Other regional partners have noted that the deal empowers Iran to redouble its destabilizing regional activities, making the Middle East a more dangerous place. ” “There is anger—even a sense of betrayal—among U.S. allies in the region,” the retired general added, pointing to expressions of concern about the deal from Israel and other allies. Wald said that giving the impression that the United States was faltering in its commitment was “dangerous,” suggesting that it could encourage America’s allies to act alone against Iran or to seek help from Russia or China. “This could mean taking matters into their own hands, as Israel previously has done or Saudi Arabia decided to do earlier this year by unilaterally launching an air campaign against Iranian-backed rebels in Yemen. Such actions, if not backed by the overwhelming force of the U.S. military, could spark reprisals that spiral into wider regional conflict,” Wald told House lawmakers. “Alternatively, our regional allies might seek other guarantors of their security,” he continued. “Whether this means accepting Iranian hegemony or allying with other powers—such as Russia or China—the result would be detrimental to U.S. influence and interests in the region.” Wald said that allies could decide to terminate cooperation with the United States, making it impossible for the United States to “project power in the Middle East.” “Basing and overflight rights are critical to maintaining and deploying a deterrent force,” Wald said. “The perception that we are no longer committed to our allies’ security could risk the revocation of those rights and spark a vicious cycle of destabilization.” The Iran deal leads to terrorism and nuclear war Duncan 2015 – on the Foreign Affairs; the Homeland Security; and the Natural Resources committees, author of the Countering Iran in the Western Hemisphere Act (Jeff, The Obama Doctrine: A path to conflict,, July 25 http://thehill.com/blogs/congress-blog/foreign-policy/249131the-obama-doctrine-a-path-to-conflict)//JJ The deal the P5+1 struck with Iran shatters American and Israeli security , potentially placing our great country and our strategic allies in harm’s way. In essence, this deal legitimizes Iran as a nuclear threshold state , unfortunately bringing the United States closer to a deadly military confrontation with the zealous Shiite theocracy. 210 CMSDL Core Files 2015-2016 If Congress fails to block this deal and sanctions against Iran are lifted, then America will essentially subsidize the world’s largest state-sponsor of terrorism with a $ 150 billion payday. The mullahs will use this money to support terrorism around the globe and further their imperialistic ambitions through their proxies across the Middle East . This payday will help the ayatollah’s consolidate its hold on power. It will not help the United States or our allies ensure that Iran does not acquire a nuclear weapons capability. I suspect American capitulation will only make the Orwellian chants of “death to America” and “death to Israel” louder. To allege that the only alternative to this current deal is military action is specious. It is the essence of naiveté to believe that rewarding the Iranian regime – who seeks the “annihilation” of Israel and complete hegemony over the Middle East – will lead to anything other than armed conflict. The truth is that the Obama administration not only rewarded Iranian intransigence by caving at the negotiating table, but will permit the West to subsidize it . This deal greatly reduces the strength of American deterrence against Iran. After 5 years, they may reengage in the global conventional arms trade, while after 8, attain ballistic missiles. These arms will surely go to terrorist proxy groups who currently kill Americans and our allies. The Administration may say we retain the “military option” in case Iran makes a mad dash to the bomb. But this ignores how the deal weakens American deterrence. For example, Russia has already confirmed plans to ship state of the art S-300 surface-to-air missiles to the Iranians making control of the air more difficult . Iran will be allowed to grow their military and emboldened to confront American power . Supporters of this agreement argue that it is the only way to prevent armed conflict with Iran. Perversely, this agreement actually makes war with Iran more likely . The deal lifts virtually all major restrictions against Iran in about 10-15 years, gearing up the ayatollahs to have the ability to break out in days , not months or weeks. Tehran’s nuclear infrastructure is left in place with the ayatollahs retaining the ability to “weaponize” quickly. In just a few years down the road, restrictions on Iran’s centrifuges and limitations on its nuclear facilities, including the number of heavy water reactors, will be abandoned . Furthermore, without adequate provisions in place to inspect Iran’s nuclear programs and sites, or effective compliance measures to efficiently implement snapback sanctions, Iranian centrifuges will spin . Congress has a moral duty to restore clarity and rationale to America’s diplomacy efforts by voting against this absurdly irrational foreign policy strategy. We must return to a rational strategy aimed to protect us and our allies from the Iranian nuclear threat. Iran will emerge as a nuclear threshold state with the international community’s stamp of legitimacy . This is precisely why Iran’s vociferous political leaders and ayatollahs have been rejoicing since the deal was announced. If there was ever a quintessential issue that could so easily unite Democrats and Republicans alike, it’s this one. When it comes to matters of national security and deterrence against enemies, party politics should take a back seat. A pivotal moment for Congress is upon us. When the time comes to vote on the Iranian nuclear accord, I intend to vote against the deal, and strongly encourage my esteemed colleagues on both sides of the aisle to do the same. We are fortunate to know Iranian ambitions: Death to Israel, Death to America. History will record this fatal error. I hope Congress will not be complicit in ushering in a policy that will surely lead to a future – and more difficult – conflict . 211 CMSDL Core Files 2015-2016 **States COUNTERPLAN Negative 212 CMSDL Core Files 2015-2016 1NC States Counterplan Counterplan Text: The 50 states and all relevant territories should <insert affirmative plan text> Solvency: The counterplan solves- The 50 states have taken the lead on protecting individuals from federal government surveillance BBC 2015- April 27, “US states take aim at NSA over warrantless surveillance” http://www.bbc.com/news/world-us-canada-32487971 These days Stickland, a Texas state representative, isn't spending most of his time worrying about the government "stealing" through high taxes or onerous regulation - standard political fare for the kind of conservatives who populate the state capitol in Austin.¶ Instead his cause has been what he sees as government theft of privacy - the unlawful acquisition by the National Security Agency of personal information in the form of metadata about electronic communications by US citizens.¶ The particular target of his ire is the Texas Cryptologic Center, an NSA facility located near San Antonio. He has proposed a state law cutting off the building's access to public utilities - water and electricity - until the agency ceases what he says is unconstitutional warrantless data collection.¶ "I believe the first role of government is to protect the personal rights and liberties of its citizens," says the Republican, who has represented a district near Dallas for two years. "Before we build a road or anything else, we have to ensure that those exist for every Texan."¶ "I believe that it is my responsibility as a representative at the state level to fight against that kind of tyranny," he continues. "Whether it's from the federal government or a foreign entity, it doesn't matter."¶ The Texas bill is just one of the most recent examples of a growing movement among states - both liberal and conservative - to end government support for NSA facilities.¶ Last year California became the first to pass what's been called a Fourth Amendment Protection Act. Its law prohibited the state from providing support to a federal agency "to collect electronically stored information or metadata of any person if the state has actual knowledge that the request constitutes an illegal or unconstitutional collection".¶ This year 15 other states have introduced some kind of anti-NSA legislation, including politically diverse locations like liberal Washington and Maryland and conservative Oklahoma and Mississippi.¶ The movement has been championed by the Tenth Amendment Center and its OffNow coalition, which provides support and model legislation to politicians like Stickland interested in challenging the NSA.¶ According to Mike Maharrey, communications director for the centre, the California law, with its "actual knowledge" provision, is significantly weaker than they had hoped - but a good first step in the nation's most populous state.¶ He says they came up with the suggested legislation because they don't trust the US Congress to do anything to keep the NSA in check. The Patriot Act, which authorises the NSA surveillance programme, is up for renewal in May, and Republican Senate Majority Leader Mitch McConnell has already proposed that it be extended to 2020.¶ "I'm not really faithful in things that are going on in Washington, DC," he says. "People can make a difference more rapidly and more readily at the state level."¶ He adds that state politicians are generally more responsive to their constituents. "A lot of phone calls make a state legislator really nervous," he says. Maharrey says his proposed legislation is just the latest example of a US tradition of states expressing their independence from an intrusive federal government. He says the movement's inspiration was the efforts of Northern states to undermine the federal requirement to return fugitive slaves prior to the Civil War.¶ "It's called the anti-commandeering doctrine," he says. "The federal government cannot force the states to provide personnel or resources to any federal regulation or federal act or federal process. If the feds want to do it they can do it, but they have to do it themselves." 213 CMSDL Core Files 2015-2016 2NC/1NR- States COUNTERPLAN- SolvencyOverview Extend our 1NC BBC evidence, the states are more responsible with surveillance than the federal government- our evidence indicates that states have already begun passing legislation to curb government intrusion, proving that they can do the plan 214 CMSDL Core Files 2015-2016 2NC/1NR- States COUNTERPLAN- SolvencyDrone Aff States and localities are taking the lead on banning domestic drone surveillance Swanson 2013 - David, author War is a Lie “Banning Surveillance: What States and Localities Can Do About Drones” http://www.occupy.com/article/banning-surveillance-what-states-andlocalities-can-do-about-drones Charlottesville, Va., passed a resolution that urged the state of Virginia to adopt a two-year moratorium on drones (which it did), urged both Virginia and the U.S. Congress to prohibit information obtained from the domestic use of drones from being introduced into court, and to preclude the domestic use of drones equipped with "anti-personnel devices, meaning any projectile, chemical, electrical, directed-energy (visible or invisible), or other device designed to harm, incapacitate, or otherwise negatively impact a human being." It also pledged that Charlottesville would "abstain from similar uses with city-owned, leased, or borrowed drones."¶ St. Bonifacius, Minn., passed a resolution with the same language as Charlottesville, plus a ban on anyone operating a drone "within the airspace of the city," making a first offense a misdemeanor and a repeat offense a felony.¶ Evanston, Ill., passed a resolution establishing a two-year moratorium on the use of drones in the city with exceptions for hobby and model aircraft and for non-military research, and making the same recommendations to the state and Congress as Charlottesville and St. Bonifacius.¶ Northampton, Mass., passed a resolution urging the U.S. government to end its practice of extrajudicial killing with drones, affirming that within the city limits "the navigable airspace for drone aircraft shall not be expanded below the longestablished airspace for manned aircraft" and that "landowners subject to state laws and local ordinances have exclusive control of the immediate reaches of the airspace and that no drone aircraft shall have the 'public right of transit' through this private property," and urging the state and Congress and the FAA "to respect legal precedent and constitutional guarantees of privacy, property rights, and local sovereignty in all matters pertaining to drone aircraft and navigable airspace."¶ Other cities, towns, and counties should be able to pass similar resolutions. Of course, stronger and more comprehensive resolutions are best. But most people who learned about the four resolutions above just leaned that these four cities had "banned drones" or "passed an anti-drone resolution."¶ The details are less important in terms of building national momentum against objectionable uses of drones. By including both surveillance and weaponized drones, as all four cities have done, a resolution campaign can find broader support. By including just one issue, a resolution might meet fewer objections. Asking a city just to make recommendations to a state and the nation might also meet less resistance than asking the city to take actions itself. Less can be more.¶ Localities have a role in national policy. City councilors and members of boards of supervisors take an oath to and towns routinely send petitions to Congress for all kinds of requests. This is allowed under Clause 3, Rule XII, Section 819, of the Rules of the House of Representatives. This clause is routinely used to accept petitions from cities, and memorials from states.¶ The same is established in the Jefferson Manual, the rulebook for the House originally written by Thomas support the Constitution of the United States. Cities Jefferson for the Senate. In 1967, a court in California ruled (Farley v. Healey, 67 Cal.2d 325) that "one of the purposes of local government is to represent its citizens before the Congress, the Legislature, and administrative agencies in matters over which the local government has no power. Even in matters of foreign policy it is not uncommon for local legislative bodies to make their positions known."¶ Abolitionists passed local resolutions against U.S. policies on slavery. The anti-apartheid movement did the same, as did the nuclear freeze movement, the movement against the PATRIOT Act, the movement in favor of the Kyoto Protocol, etc. No locality is an island. If we become environmentally sustainable, others will ruin our climate. If we ban assault weapons, they'll arrive at our borders. And if the skies of the United States are filled with drones, it will become ever more difficult for any city or state to keep them out. 215 CMSDL Core Files 2015-2016 2NC/1NR- States COUNTERPLAN- SolvencySecurity Letters The states can legally deny the FBI’s security letter- this solves the affirmative’s internal links Doyle 2014- Charles, Senior Specialist in American Public Law “National Security Letters in¶ Foreign Intelligence Investigations:¶ Legal Background” https://www.fas.org/sgp/crs/intel/RL33320.pdf¶ The ancestor of the first NSL letter provision is a statutory exception to privacy protections¶ afforded by the Right to Financial Privacy Act (RFPA).14 Its history is not particularly instructive ¶ and consists primarily of a determination that the exception in its original form should not be too¶ broadly construed.15 But the exception was just that, an exception. It was neither an affirmative¶ grant of authority to request information nor a command to financial institutions to provided¶ information when asked. It removed the restrictions on the release of customer information¶ imposed on financial institutions by the Right to Financial Privacy Act, but it left them free to¶ decline to comply when asked to do so.¶ [I]n certain significant instances, financial institutions [had] declined to grant the FBI access¶ to financial records in response to requests under [S]ection 1114(a). The FBI informed the¶ Committee that the problem occurs particularly in States which have State constitutional¶ privacy protection provisions or State banking privacy laws. In those States, financial¶ institutions decline to grant the FBI access because State law prohibits them from granting¶ such access and the RFPA, since it permits but does not mandate such access, does not¶ override State law. In such a situation, the concerned financial institutions which might¶ otherwise desire to grant the FBI access to a customer’s record will not do so, because State law does not allow such cooperation, and cooperation might expose them to liability to the¶ customer whose records the FBI sought access. H.Rept. 99-690, at 15-6 (1986). 216 CMSDL Core Files 2015-2016 2NC/1NR- States COUNTERPLAN- SolvencyStingray Affirmative Some state governments have already taken the lead on banning warrantless tracking of cellphones- other states are sure to follow Watchdog.org 2015 -Eric Boehm, bureau chief Pennsylvania Independent, May 29th“State governments taking the ‘sting’ out of surveillance”, 5/29 State governments are laying down an example for Congress to follow when it comes to limiting electronic surveillance.¶ As Congress continues to debate the future of the National Security Agency’s telephone metadata collection program, Washington state has banned the warrantless use of similar technology that allows law enforcement to track cell phones. Police using so-called “stingrays,” also known as simulated cell towers, now have to get approval from a judge, and they will have to use the devices to seek specific individuals rather than sweeping all calls in a certain area.¶ “The warrant-less, illegal collection of data, not only by the federal government but by our state agencies; we understand that it violates the constitution,” said state Rep. David Taylor, RYakima, who sponsored the bill. “It’s a civil liberties issue, a civil rights issue; I think it’s an issue that’s ripe for everybody.”¶ Ballotpedia¶ SHUT IT DOWN: State Rep. David Taylor, R-Yakima, says states must place limits on illegal, warrant-less electronic surveillance by law enforcement.¶ The bill got broad bipartisan support as it sailed through the Washington Legislature and was signed earlier this month by Gov. Jay Inslee, a Democrat.¶ Washington becomes the first state to place such limitations on the use of stingrays. A few states are considering similar bills and one other, Virginia, has already approved one.¶ Taylor told Watchdog.org he believes the stingray technology can be a useful tool for law enforcement, but without requiring a warrant it was wide open for abuse.¶ Stingrays work by essentially fooling cell phones into thinking they’re cell towers. The devices, about the size of a small suitcase, can be used to monitor calls and track all phones within a given area.¶ They’ve been used by the FBI and local police since at least 2008, but their existence has been kept under wraps thanks to non-disclosure agreements between the feds, local cops and the company that manufactures the devices.¶ Use of stingray devices did not become public knowledge until 2013, when the ACLU successfully exposed the FBI’s use of the surveillance technology with a Freedom of Information Act request.¶ In Washington, an investigation by the Tacoma News Tribune revealed judges had given police the authority to use stingrays — apparently without realizing exactly what they were doing.¶ “If they use it wisely and within limits, that’s one thing,” Ronald Culpepper, the presiding judge of Pierce County Superior Court, told the newspaper last year. “I would certainly personally have some concerns about just sweeping up information from non-involved and innocent parties — and to do it with a whole neighborhood? That’s concerning.”¶ Taylor says the revelation prompted his legislation.¶ In addition to requiring police to get a warrant from a judge before using a stingray device in an investigation, the new law requires that police disclose to the judge how they intend to use the technology. Police are also required to immediately delete any data collected on individuals that are not a part of the investigation.¶ ¶ Image via ACLU¶ LISTENING IN: The FBI has given stingray technology to local police departments in a number of states, but the secrecy of the program means no one is sure exactly how many departments are using them.¶ Police and law enforcement groups in Washington seem to agree with Taylor. Though they wield considerable power in state governments across the country, law enforcement lobbyists did not attempt to fight the bill’s passage.¶ The lack of opposition was a surprise to Taylor, who said he expected a lengthy battle.¶ “Its incumbent upon each and every one of us as individual states to take action and correct the situation,” Taylor told Watchdog.org. “We did it and I hope other states will follow suit.”¶ But police in other states are putting up a fight.¶ In California, a similar bill requiring a warrant before cops can use stingrays and other electronic surveillance technology is working its way through the Legislature.¶ But law enforcement groups say the legislation would hurt their ability to go after child predators.¶ The bill has been stuck in the committee process since mid-March, but a hearing is scheduled for this week.¶ In Texas, two bills would place similar restrictions on how and when cell phone interceptor technology could be used by law enforcement.¶ And Virginia actually beat Washington to the punch. The state Legislature there approved a bill requiring a warrant before stingrays can be used, but even though the bill was signed by Gov. Terry McAuliffe in March, it will not become law until July.¶ In signing the Washington measure, Inslee used his executive discretion to waive the waiting period and make the new law effective immediately.¶ The ACLU says at least 50 police agencies in 20 states have been revealed to use the devices, but the exact number is unknown. It has praised legislative and judicial efforts, like the one in Washington, to place limitations on law enforcement’s ability to cast a wide net of electronic surveillance. ¶ 217 CMSDL Core Files 2015-2016 2NC/1NR- States COUNTERPLAN- ANSWERS TO: Permutation 1. Prefer the counterplan alone a. Extend our 1NC BBC evidence; the federal government is not suited to ensure privacy protections, national security concerns will always trump individual liberty. However, the states have proven that they respond to the public’s privacy concerns with concrete legislative reductions in domestic surveillance b. The permutation links to the net benefit- the plan is perceived as a democratic president being “soft” on national security matters- this decreases the chances of a Hillary Clinton presidency 218 CMSDL Core Files 2015-2016 2NC/1NR- States COUNTERPLAN- ANSWERS TO: Fifty State Fiat Bad 50 state fiat is good 1. Education- weighing the costs and benefits of federal versus state policy is crucial to effective policymaking skills- most real world policy making involves deciding whether to implement a policy at the local or federal level 2. Ground- the topic is very large and most of the literature is skewed affirmative- without the States Counterplan, the negative is stuck defending the status quo. The affirmative also has built in advantages such as the first and last speech 3. Reject the argument not the team- if the affirmative wins that 50 state fiat is illegitimate do not vote us down. Instead, disregard the COUNTERPLAN and weigh the net benefit against the affirmative’s impacts 219 CMSDL Core Files 2015-2016 **States COUNTERPLAN Affirmative 220 CMSDL Core Files 2015-2016 2AC- States Counterplan 1. Permutation do both- the counterplan is not functionally competitivethe 50 states and the USFG can do the plan- this would shield the link to the net benefit, if the 50 states do the affirmative along with the federal government, it will not spur backlash against the democrats or with members of congress 2. The counterplan cannot solve- the most pernicious forms of surveillance occur at the federal level, the counterplan has no jurisdiction over FBI surveillance NEW YORK TIMES 2015- New York Times, “F.B.I. Is Broadening Surveillance Role, Report Shows” http://www.nytimes.com/2015/01/12/us/politics/beyond-nsa-fbi-is-assuming-a-largersurveillance-role-report-shows.html WASHINGTON — Although the government’s warrantless surveillance¶ program is associated with the National Security Agency, the Federal¶ Bureau of Investigation has gradually become a significant player in¶ administering it, a newly declassified report shows.¶ In 2008, according to the report, the F.B.I. assumed the power to¶ review email accounts the N.S.A. wanted to collect through the “Prism”¶ system, which collects emails of foreigners from providers like Yahoo and¶ Google. The bureau’s top lawyer, Valerie E. Caproni, who is now a Federal¶ District Court judge, developed procedures to make sure no such accounts¶ belonged to Americans.¶ Then, in October 2009, the F.B.I. started retaining copies of¶ unprocessed communications gathered without a warrant to analyze for its¶ own purposes. And in April 2012, the bureau began nominating new email¶ accounts and phone numbers belonging to foreigners for collection,¶ including through the N.S.A.’s “upstream” system, which collects¶ communications transiting network switches.¶ That information is in a 231page study by the Justice Department’s¶ inspector general about the F.B.I.’s activities under the FISA Amendments¶ Act of 2008, which authorized the surveillance program. The report was¶ entirely classified when completed in September 2012. But the government has now made a semi-redacted version of the report public in response to a¶ Freedom of Information Act lawsuit filed by The New York Times.¶ The Times filed the lawsuit after a wave of declassifications about¶ government surveillance activities in response to leaks by the former¶ intelligence contractor Edward J. Snowden.¶ The report was delivered late Friday to The Times. In it, the inspector¶ general, Michael E. Horowitz, concluded that the F.B.I. was doing a good¶ job in making sure that the email accounts targeted for warrantless¶ collection belonged to noncitizens abroad.¶ But parts of the report remained heavily redacted. For example, there¶ was only one uncensored reference to the Prism system. It was not clear¶ why the Justice Department had redacted all the other references to Prism¶ in the report; the name of that program and many details about it have¶ been declassified and were discussed in a July 2014 report by the Privacy¶ and Civil Liberties Oversight Board.¶ David McCraw, a Times lawyer, said the newspaper may challenge the¶ redactions at a later stage in the Freedom of Information Act litigation.¶ The report also filled in a gap about the evolving legality of the¶ warrantless wiretapping program, which traces back to a decision by¶ President George W. Bush in October 2001 to direct the N.S.A. to collect¶ Americans’ international phone calls and emails, from network locations on¶ domestic soil, without the individual warrants required by the Foreign¶ Intelligence Surveillance Act, or FISA. The Times revealed that program in¶ December 2005.¶ After the article appeared, telecommunications providers that had¶ voluntarily participated in the program were sued, and a Federal District¶ Court judge in Detroit ruled that the program was illegal, although that¶ decision was later vacated. The Bush administration sought to put the¶ program on more solid legal footing by gaining orders from the Foreign¶ Intelligence Surveillance Court approving it In January 2007, the Bush administration persuaded the court’s Judge¶ Malcolm Howard to issue an order to telephone and network companies¶ requiring them to let the security agency target foreigners’ accounts for¶ collection without individual warrants. But in April 2007, when the order¶ came up for renewal before Judge Roger Vinson, he said that it was illegal.¶ Judge Vinson’s resistance led Congress to enact, in August 2007, the¶ Protect America Act, a temporary law permitting warrantless surveillance¶ of foreigners from domestic network locations. The next year, Congress¶ replaced that law with the FISA Amendments Act.¶ Last month, as a result of separate Freedom of Information Act¶ lawsuits by The Times and the Electronic Frontier Foundation, the¶ government declassified the identities of the judges who disagreed in early¶ 2007 and several court filings from 221 CMSDL Core Files 2015-2016 that episode. But it remained unclear¶ what the N.S.A. had done in June and July of 2007.¶ The newly declassified report said Judge Vinson issued an order on¶ May 31, 2007, that allowed existing surveillance to continue by approving¶ collection on a long list of specific foreign phone numbers and email¶ addresses. But after that, when the agency wanted to start wiretapping an¶ additional person, it had to ask the court for permission.¶ The report said that “the rigorous nature of the FISA Court’s probable¶ cause review of new selectors submitted to the various FISA Court judges¶ following Judge Vinson’s May 31, 2007, order caused the N.S.A. to place¶ fewer foreign selectors under coverage than it wanted to.” That and other¶ factors “combined to accelerate the government’s efforts” to persuade¶ Congress to enact the Protect America Act. 3. 50 State Fiat is a reason to reject the team A. Not real world- surveillance practices that occur at the federal level are under USFG jurisdiction and cannot be wished away by state actors B. Education- the topic is about the federal government curtailing its surveillance, the negative shifts the discussion towards 50 state solvency, which was not the framers’ intention for the resolution C. Ground- it’s unfair for the affirmative to have to defend against a counterplan that results in the entirety of the plan, there is not much literature on a difference between the federal and state governments doing the plan 222 CMSDL Core Files 2015-2016 2AC- States COUNTERPLAN- Solvency Deficit- Drone Affirmative 1. The COUNTERPLAN cannot solve the privacy advantage- our 1AC evidence is predicated on FBI use of drones, this is the federal bureau of investigation, and thus, the states do not have the jurisdiction to regulate FBI activity 2. The COUNTERPLAN cannot solve the credibility advantage- our 1AC internal link evidence states that the United States erodes international confidence in human rights regimes by not upholding their commitments- the states cannot resolve international perception only federal action can, the impacts are global warming and hegemony 3. The COUNTERPLAN cannot solve the innovation advantage- our 1AC evidence indicates that state governments are banning drones to resolve privacy concerns, this triggers the impact to the advantage- the 1ac solvency evidence indicates that federal legislation is necessary to reform drones to alleviate privacy concerns, which boosts the commercial drone industry, the impact is conflict through food scarcity 4. Here’s more evidence- the FBI is operating a secret fleet of drones, the states cannot solve Huffington Post 2015- “FBI Confirms Wide-Scale Use Of Surveillance Flights Over U.S. Cities” http://www.huffingtonpost.com/2015/06/02/fbi-surveillanceflights_n_7490396.html, June 2 The FBI is operating a small air force with scores of low-flying planes across the U.S. carrying video and, at times, cellphone surveillance technology -- all hidden behind fictitious companies that are fronts for the government, The Associated Press has learned.¶ The planes' surveillance equipment is generally used without a judge's approval, and the FBI said the flights are used for specific, ongoing investigations. In a recent 30-day period, the agency flew above more than 30 cities in 11 states across the country, an AP review found.¶ Aerial surveillance represents a changing frontier for law enforcement, providing what the government maintains is an important tool in criminal, terrorism or intelligence probes. But the program raises questions about whether there should be updated policies protecting civil liberties as new technologies pose intrusive opportunities for government spying. 223 CMSDL Core Files 2015-2016 2AC- States COUNTERPLAN- Solvency Deficit- Security Letters Affirmative 1. The COUNTERPLAN cannot solve any of the case- extend our 1AC evidence, the FBI has been requesting national security letters from the federal government, only they have the authority to OK the use of security letters, not the state governments 224 CMSDL Core Files 2015-2016 2AC- States COUNTERPLAN- Solvency Deficit- Stingray Affirmative 1. There are over 50 federal agencies that use stingray technology- the counterplan cannot solve ACLU No Date- American Civil liberties Union, https://www.aclu.org/map/stingray-trackingdevices-whos-got-them The map below tracks what we know, based on press reports and publicly available documents, about the use of stingray tracking devices by state and local police departments. Following the map is a list of the federal law enforcement agencies known to use the technology throughout the United States. The ACLU has identified 53 agencies in 21 states and the District of Columbia that own stingrays, but because many agencies continue to shroud their purchase and use of stingrays in secrecy, this map dramatically underrepresents the actual use of stingrays by law enforcement agencies nationwide.¶ Stingrays, also known as "cell site simulators" or "IMSI catchers," are invasive cell phone surveillance devices that mimic cell phone towers and send out signals to trick cell phones in the area into transmitting their locations and identifying information. When used to track a suspect's cell phone, they also gather information about the phones of countless bystanders who happen to be nearby. Click here for more info on stingrays. 2. The COUNTERPLAN cannot solve the racism advantage- our 1AC Kleiner evidence states that stingray technology targets persons of color an ongoing federal practice since 9/11, only the plan can set precedent at the federal level. 225 CMSDL Core Files 2015-2016 **CISA DISADVANTAGE Negative 226 CMSDL Core Files 2015-2016 1NC- CISA DISADVANTAGE A. Uniqueness- CISA will not pass in the status quo- too much senate opposition Washington Examiner 2015 - “Senate vote falls short of approving defense act with CISA amendment”¶ http://www.washingtonexaminer.com/senate-vote-falls-short-of-approvingdefense-act-with-cisa-amendment/article/2566527, June 22 Memories are long in the Senate, and it will probably take Majority Leader Mitch McConnell, RKy., more than a week or two to get over the rebuff he suffered on the floor when he tried to attach cybersecurity legislation as an amendment to a pending defense bill.¶ That procedural gambit was blocked on June 11 by most Democrats and three Republicans, just days after McConnell's move to renew National Security Agency surveillance authorities was similarly rejected. ¶ Last week, McConnell walked away from a reporter without comment when asked about prospects in July for the cybersecurity bill, the Cyber Intelligence Sharing Act, which would encourage the sharing of cyberthreat indicators between government and industry with liability protection for participating companies. Critics of the bill say it places more personal information in government hands and raises profound concerns over privacy. And that it could also open the door to retributive hacking by government and private companies. ¶ Later, McConnell said the cyber bill "is important, it's a priority, we will continue to look for a way forward." B. Link- The plan restricts government surveillance- CISA will be deemed necessary to bridge the gap Flores 2014- Christian, Medill school of journalism reporter, “CISA puts Congress in rough spot”¶ http://nationalsecurityzone.org/site/cisa-puts-congress-in-rough-spot/ The U.S. Senate Select Committee on Intelligence passed the Cybersecurity Information Sharing Act of 2014 – or CISA – last month. But, as with recent attempts at passing other cyber security bills, Congress is once again put in a delicate position.¶ On the one hand, past cyber attacks from China and Russia – as well as the fear of future ones – has led Congress to try and step up with cybersecurity bills.¶ “The continued cybercriminal activity and threats have become so great that everyone realizes something has to be done,” said Jerry Irvine of the National Cyber Security Task Force. “While this may not be the best or even the correct reaction, it is necessary to get something in place now.”¶ But that last part about the bill perhaps not being the best or correct reaction has been the exact complaint by those opposed to the perceived privacy intrusions that come tacked on to CISA.¶ “The Senate Select Committee on Intelligence…continues to attempt to expand the ability of the government to engage in mass surveillance of online communications by Americans without adequate protections for privacy…while at the same time shielding companies providing this information from consequences even if they violate the law,” said Ray Trygstad, a retired U.S. Navy Security Manager and current Associate Director of Cyber Security and Forensics Education at the Illinois Institute of Technology.¶ The proposed bill – drafted by Senate Intelligence Committee Chairman Dianne Feinstein (D-Calif.) and Vice Chairman Saxby Chambliss (R-Ga.) – removes legal barriers for private companies to share cyber threat information with the government voluntarily. This means companies will receive liability protection for the data sharing if used for cyber security purposes. The government can also share information with the companies.¶ CISA passed the Intelligence Committee with an overwhelming 12-3 vote. But U.S. Senators Ron Wyden (D-Ore.) and Mark Udall (DColo.) have been two of the most vocal senators opposed to CISA, stating concerns over the combination of the lack of privacy protections and the bill perhaps not materially improving cyber security. They issued the following statement:¶ “Cyber-attacks on U.S. firms and infrastructure pose a serious threat to America’s economic health and national security. We agree there is a need for information-sharing between the federal government and private companies about cybersecurity threats and how to defend against them.. However, we have seen how the federal government has exploited loopholes to collect Americans’ private information in the name of security The only way to make cybersecurity information-sharing effective and acceptable is to ensure that there are strong protections for Americans’ constitutional privacy 227 CMSDL Core Files 2015-2016 rights. Without these protections in place, private companies will rightly see participation as bad for business.”¶ An Electronic Frontier Foundation – or EFF – article and Trygstad point to President Obama’s signing of Executive Order 13636 as a good start to ensuring national cyber security. The executive order directed the Department of Homeland Security to expand information-sharing programs in a way that provides more privacy protections than CISA and previous cyber security bills.¶ The EFF article also raises concerns with CISA and previously proposed cybersecurity bills. The article calls to question what exactly is a “cybersecurity purpose” and “cybersecurity threat,” two phrases used in CISA, arguing that these broad definitions “grant new spying power to companies.”¶ But these broad definitions are inevitable with all of the advancements in cyber crime, Irvine says.¶ “Unfortunately because of the ever changing technologies and risks that are associated with cyber events, it is difficult if not impossible to provide more specific definitions as both purposes and threats of cyber criminals continuously changes,” Irvine said. C. Impact – CISA devastates investor confidence, ongoing trade talks, and every other facet of the economy Human Rights Watch 2013- Human Rights Watch, July 15, “How the NSA Scandal Hurts the Economy” https://www.hrw.org/news/2013/07/15/how-nsa-scandal-hurts-economy The National Security Agency (NSA) surveillance scandal has been devastating to the U.S. government’s credibility as an advocate for Internet freedom. But as the EU-U.S. trade talks began last week, the impact on U.S. technology companies and a fragile American economy may be even greater.¶ Every new revelation suggests far more surveillance than imagined and more involvement by telephone and Internet companies, with much still unknown. One of the most troubling aspects of this spying is that foreign nationals abroad have no privacy rights under U.S. law. Foreigners using the services of global companies are fair game. (There is also a certain irony to the revelations considering that some European governments such as Germany and the Netherlands are strong U.S. allies on Internet freedom but may simultaneously be targets of U.S. surveillance online). ¶ A July 1 report by Der Spiegel on the NSA spying on European officials infuriated governments a week before negotiations started on a massive U.S.-EU trade agreement that could be worth almost $272 billion for their economies and 2 million new jobs. Officials throughout Europe, most notably French President Francois Hollande, said that NSA spying threatens trade talks. ¶ The French government unsuccessfully called for a two week postponement of the trade talks. The next day it had to address allegations in Le Monde of its own domestic mass surveillance program.¶ For the Internet companies named in reports on NSA surveillance, their bottom line is at risk because European markets are crucial for them. It is too early assess the impact on them, but the stakes are huge . For example, Facebook has about 261 million active monthly European users compared to about 195 million in the U.S. and Canada, and 22 percent of Apple’s net income came from Europe in the first quarter of 2013. ¶ Europe was primed for a backlash against NSA spying because people care deeply about privacy after their experience of state intrusion in Nazi Germany and Communist Eastern Europe. And U.S. spying on Europeans via companies had been a simmering problem since at least 2011.¶ In June 2011, Microsoft admitted that the United States could bypass EU privacy regulations to get vast amounts of cloud data from their European Customers. Six months later, U.K.-based BAE Systems stopped using the company’s cloud services because of this issue.¶ A major 2011 European Union survey released that June found that “[t]hree out of four Europeans accept that revealing personal data is part of everyday life, but they are also worried about how companies – including search engines and social networks – use their information.” Only 22 percent trusted e-mail, social networking, and search companies with their data.¶ Then the European Parliament issued a report on privacy in October 2012 confirming Microsoft’s claim and urging new privacy protections between the EU and the United States. The EU tried, but the Financial Times reported that senior Obama administration officials and tech industry representatives successfully lobbied against it.¶ The NSA scandal has brought tensions over spying to a boil. German prosecutors may open a criminal investigation into NSA spying. On July 3, Germany’s Interior Minister said that people should stop using companies like Google and Facebook if they fear the U.S. is intercepting their data. On July 4, the European Parliament condemned spying on Europeans and ordered an investigation into mass surveillance. The same day, Neelie Kroes, the EU’s chief telecom and Internet official, warned of “multi-billion euro consequences for American companies” because of U.S. spying in the cloud.¶ The companies have belatedly distanced themselves from the NSA and called for more transparency. Google, Microsoft, Yahoo! and Facebook, are 228 CMSDL Core Files 2015-2016 in a particularly tough spot as members of the Global Network Initiative, a group (including Human Rights Watch) formed to verify whether companies respect freedom of expression and privacy online.¶ Their role in NSA surveillance raises serious questions about whether they have done their utmost to protect billions of people’s privacy or whether it is even possible to know since virtually everything is classified. Yahoo! unsuccessfully challenged a Foreign Intelligence Surveillance Act request in 2008, the New York Times reported and the company is trying to publicly release its petition to the government. But on July 11, The Guardian reported that Microsoft helped the NSA and FBI bypass its own encryption to access its users’ data, based on documents from Edward Snowden.¶ Transparency is an important first step. Its absence only exacerbates a trust deficit that companies already had in Europe. And trust is crucial. Google’s chief legal officer recognized this on June 19 when he said, “Our business depends on the trust of our users,” during a web chat about the NSA scandal. Some companies have been aggressive in trying to disclose more, and others have not. But unless the U.S. government loosens strictures and allows greater disclosure , all U.S. companies are likely to suffer the backlash .¶ Since the story broke, the United States has allowed companies to disclose the number of FISA requests they receive, but only combined with all law enforcement requests in ranges of 1,000. So the exact number is impossible to determine.¶ Google has been the most aggressive, including by petitioning the FISA court. Microsoft hasfollowed. Apple, Yahoo!, and Facebook are starting to report aggregate data in the wake of the NSA fallout.¶ Companies should press for meaningful disclosure about the scope and scale of government surveillance and their role in it. They also need to support laws and policies, including changes to surveillance laws, to protect their customers’ privacy. Ultimately, they need to show how they actually protect users from government spying.¶ The Obama administration needs to recognize and mitigate the serious economic risks of spying while trying to rebuild its credibility on Internet freedom. The July 9 hearing of the Privacy and Civil Liberties Oversight Board is a start, but much more is needed. More disclosure about the surveillance programs, more oversight, better laws, and a process to work with allied governments to increase privacy protections would be a start.¶ The European customers of Internet companies are not all al Qaeda or criminals, but that is essentially how U.S. surveillance efforts treat them. If this isn’t fixed, this may be the beginning of a very costly battle pitting U.S. surveillance against European business, trade, and human rights. 229 CMSDL Core Files 2015-2016 **Uniqueness 230 CMSDL Core Files 2015-2016 2NC/1NR- CISA DISADVANTAGE- Uniqueness Wall Democrats and libertarians successfully blocked passage in the status quo, but they need to sustain that momentum Politico 2015 “Democrats block cyber bill, leaving measure in limbo http://www.politico.com/story/2015/06/democrats-cybersecurity-cyber-bill-block-limbo-gopamendments-118890.html, June 11 Democrats made good on their threats to block a bipartisan cybersecurity bill on Thursday, after they were infuriated by Republican procedural moves to pass the bill with only limited amendments, something Democrats called a “cynical ploy.”¶ The partisan blowup marked a stunning turn for legislation that’s enjoyed broad support. The measure had gained new urgency after the Office of Personnel Management announced 4 million federal employees’ records had been breached — at the hands of Chinese hackers, according to anonymous federal officials.¶ Story Continued Below¶ Privacy advocates in both parties had wanted to strengthen personal data protections in the measure, but Senate Majority Leader Mitch McConnell’s (R-Ky.) procedural gambit made it next to impossible to make those changes.¶ So Democrats and libertarian-leaning Republicans banded together to defeat McConnell’s plan to attach the cyberthreat information sharing legislation to the National Defense Authorization Act days. The procedural vote was 56-40, with McConnell needing 60 votes to advance the cyber bill.¶ The majority of Democrats were joined by several Republicans, including Sens. Rand Paul (R-Ky.), Mike Lee (R-Utah) and Dean Heller (R-Nev.), to block the bill from moving forward.¶ On the other side, a handful of Democrats, including Sens. Joe Manchin (D-W.Va.), Mark Warner (D-Va.) and Bill Nelson (D-Fla.), voted with McConnell to advance the cyber measure. CISA is too unpopular with dems, privacy groups, and the president to pass SC Magazine 2015- “OPM breach exposed SSNs, personnel records of all fed workers” http://www.scmagazine.com/opm-breach-larger-than-anticipated-worker-info-on-dark-web/article/420348, June 12 Calling Senate Democrats out for a 56-40 voteThursday that failed to garner enough support to more the Defense Authorization Bill forward, and with it the Cybersecurity Information Sharing Act (CISA), that Republicans had attached to the bill, Senate Majority Whip John Cornyn, R-Texas, said “the refusal to move forward with this legislation, particularly the cybersecurity part of this discussion, is just unconscionable.”¶ CISA had enjoyed bipartisan support, easily passing the Senate Intelligence Committee in a14-1 vote in March, although it continued to draw criticism from privacy groups.¶ After the Office of Personnel Management (OPM) revealed a data breach that is now believed to have exposed the social security numbers and personnel information on every federal worker, Senate Majority Leader Mitch McConnell, R-Ky., tried to attached CISA to the Defense Authorization Bill and fast track its passage.¶ Prior to the vote and amid Republican criticism, Senate Minority Leader Harry Reid noted that Democrats had been trying for five years to pass a cybersecurity bill but it was consistently blocked by Republicans. ¶ “So why does the Republican leader now come and say look how strong I am on cybersecurity, look at me, I lifted my cybersecurity weights this morning,” Reid said in a statement issued the day before the vote. “But what he's done is now he's going to put cybersecurity on this bill the President has said he's going to veto.” 231 CMSDL Core Files 2015-2016 **Link 232 CMSDL Core Files 2015-2016 2NC/1NR – CISA DISADVANTAGE- Link Wall- Drone Affirmative Restricting armed domestic drones popular- shores up political capital for passage FoxNews 2013 (Fox News, “Lawmakers eye regulating domestic surveillance drones”, http://www.foxnews.com/politics/2013/05/19/congress-eyes-regulating-drones/, May 19, 2013) Amid growing concern over the use of drones by police and government officials for surveillance, a bipartisan group of lawmakers is pushing to limit the use of unmanned surveillance "eyes in the sky" aircraft . Rep. James Sensenbrenner, R-Wis., along with Rep. Zoe Lofgren, D-Calif., and Rep. Ted Poe, R-Texas, is sponsoring legislation that would codify due process protections for Americans in cases involving drones and make flying armed drones in the U.S. sky illegal . Sensenbrenner believes it is necessary to develop new standards to address the privacy issues associated with use of drones — which can be as small as a bird and as large as a plane. "Every advancement in crime fighting technology, from wiretaps to DNA, has resulted in courts carving out the Constitutional limits within which the police operate," Sensenbrenner said at a House Judiciary subcommittee hearing Friday on the issues surrounding drones. The subcommittee heard from experts who were divided on what actions Congress should take to address the new technology. But the four witnesses all agreed that drones raised new, often unprecedented questions about domestic surveillance. "Current law has yet to catch up to this new technology," said Chris Calabrese, legislative counsel for the American Civil Liberties Union. Calabrese said he supported immediate regulation of the drone industry and said his biggest concern was the overuse of drones by police and government officials for surveillance. But Calabrese said he doesn't want to hinder the growth of drones with the power to do good, including helping find missing persons, assisting firefighters and addressing other emergencies. Tracey Maclin, a professor with the Boston University School of Law, said the issues raised by drones haven't been addressed by courts before because the technology goes beyond what humans had been capable of through aerial surveillance. Past court rulings, "were premised on naked-eye observations — simple visual observations from a public place," he said. Rep. Cedric Richmond, D-La., said he wanted to know when drone technology will advance to the point where Congress will have to act on the issue. He said he was concerned about the effect on privacy. "At what point do you think it's going to get to a point where we have to say what a reasonable expectation of privacy is?" Richmond said. Republicans expressed similar concerns. "It seems to me that Congress needs to set the standard, rather than wait and let the courts set the standard," Poe said. " Tech nology is great — as long as it's used the right and proper way ," Rep. Jason Chaffetz, R-Utah, said at Friday's hearing. Some experts urged caution. Gregory McNeal, an associate law professor at Pepperdine University, said writing laws to cover drones will be difficult because the technology continues to improve and Congress could think it's addressing key issues, only to have new ones emerge. He compared drones to the privacy concerns raised by development of the Internet in the 1990s. Regulating then, he said, could have stymied the rapid growth of the Internet and wouldn't have addressed today's Internet privacy issues. If Congress feels compelled to act, McNeal said, it should think in terms broader than a "drone policy" and set standards for surveillance or realistic expectations of privacy. "A technology-centered approach to privacy is the wrong approach," he said. But the ACLU's Calabrese said Congress should work quickly. "This can't be adequately addressed by existing law," he said. "Manned aircraft are expensive to purchase. Drones' low cost and flexibility erode that natural limit. They can appear in windows, all for much less than the cost of a plane or a helicopter." A future with domestic drones may be inevitable. While civilian drone use is currently limited to government agencies and some public universities, a law passed by Congress last year requires the Federal Aviation Administration to allow widespread drone flights in the U.S. by 2015. According to FAA estimates, as many as 7,500 civilian drones could be in use within five years. 233 CMSDL Core Files 2015-2016 The plan functions as an olive branch for bipartisanship- massively popular gets republicans the necessary votes Greenwald 2013 (Glenn Greenwald, Business Insider, “GLENN GREENWALD: The US Needs To Wake Up To Threat Of Domestic Drones”, http://www.businessinsider.com/drone-threatsstrikes-us-2013-3, March 30, 2013) Notably, this may be one area where an actual bipartisan/trans-partisan alliance can meaningfully emerge , as most advocates working on these issues with whom I've spoken say that libertarianminded GOP state legislators have been as responsive as more left-wing Democratic ones in working to impose some limits. One bill now pending in Congress would prohibit the use of surveillance drones on US soil in the absence of a specific search warrant, and has bipartisan support . Only the most authoritarian among us will be incapable of understanding the multiple dangers posed by a domestic drone regime (particularly when their party is in control of the government and they are incapable of perceiving threats from increased state police power). But the proliferation of domestic drones affords a real opportunity to forge an enduring coalition in defense of core privacy and other rights that transcends partisan allegiance , by working toward meaningful limits on their use. Making people aware of exactly what these unique threats are from a domestic drone regime is the key first step in constructing that coalition. Limiting domestic drones is popular- shores up support for CISA Sasso 2012 (Brendan Sasso, “Lawmakers mull restrictions on domestic drones”, http://thehill.com/blogs/hillicon-valley/technology/264189-lawmakers-mull-restrictions-ondomestic-drones, October 25, 2012) At Thursday's forum, lawmakers, academics and privacy advocates worried that widespread drone use would pose a serious threat to privacy. "Persistently monitoring Americans' movements can reveal their political identity, their religious views and even how safe your marriage is, how strong it is," Rep. Hank Johnson (D-Ga.) said. "Both parties cast a skeptical eye toward drone surveillance in law enforcement," he added. Rep. Michael McCaul (R-Texas) emphasized that he believes drones are essential for killing suspected terrorists overseas and monitoring the border, and he said drones have a "real benefit and use" for law enforcement. But he added that he would support legislation to limit their use in domestic airspace. Chris Calabrese, legislative counsel for the American Civil Liberties Union, explained that drones can be equipped with surveillance technologies such as night-vision cameras, body scanners and license plate readers. " Drones should only be used if subject to a powerful framework that regulates their use in order to avoid abuse and invasions of privacy," he said. The lawmakers and witnesses agreed that domestic drones should not be equipped with weapons , like the military drones that fly over Afghanistan. But David Crump, a professor at the Houston University Law Center, said Poe should revise his legislation to allow for more uses of drones. He said the law should make it clear that police can use drones in hostage situations, car chases and for security around sensitive government buildings or officials. He predicted that as drones become more widespread, a university may want to use a drone to televise views of a sports game. 234 CMSDL Core Files 2015-2016 2NC/1NR- CISA DISADVANTAGE- Link Wall- Stingray Affirmative The plan has the kind of bipartisan support necessary to get republicans a win on CISA Washington House Republicans 2015- “Rep. Taylor's 'drone' and 'stingray' bills pass the state House” http://houserepublicans.wa.gov/uncategorized/rep-taylors-drone-and-stingraybills-pass-state-house, March 4 Legislation passed the state House of Representatives today setting parameters around the state's use of drones and cell site simulators, commonly called "stingrays."¶ Rep. David Taylor, R-Moxee, sponsored both bills and said today was a good day for open government advocates and those who value individual freedom and liberty.¶ "Today's actions by the House prove once again that freedom and liberty are not partisan issues," said Taylor. "When we work together we can do great things for Washington citizens."¶ House Bill 1639 creates new guidelines for when a state or local agency can use extraordinary sensing devices (ESD) or "drones," and what they can do with the personal information gathered. Specifically, the bill:¶ Prohibits state agencies from procuring an extraordinary sensing device (ESD) without an appropriation by the Legislature and prohibits a local agency from procuring an ESD without explicit approval of its governing body.¶ Requires agencies to publish written policies for the use of ESDs and to minimize collection and disclosure of personal information.¶ Prohibits agencies from operating an ESD and disclosing personal information unless specifically authorized by the act.¶ Allows agencies to operate an ESD without obtaining a warrant if the agency does not intend to collect personal information.¶ Allows agencies to operate an ESD and disclose personal information from the operation under certain circumstances.¶ Excludes all evidence collected by an ESD from all court, legislative, or regulatory proceedings if the collection or disclosure of personal information violates any provision of this act.¶ Creates a legal cause of action for damages where an individual claims a violation of this act injured his or her business, person, or reputation.¶ Requires agencies to maintain records related to each use of an ESD and file an annual report with the Office of Financial Management.¶ Taylor said the bill is similar to bipartisan legislation he proposed last year. His previous bill placing restrictions on drones passed the Legislature but was vetoed by Gov. Jay Inslee. The governor then placed a limited moratorium on the state's use of drones and convened a task force to study the issue more thoroughly.¶ "While the task force didn't come to a clear consensus, we did take some of their suggestions and cleaned up the language of the bill a little bit," said Taylor. "With the amount of lawmakers on both sides of the aisle pushing for this bill, I don't anticipate the governor will veto it this time around."¶ House Bill prohibits the use of cell site simulators, commonly referred to as "stingrays," unless a warrant is issued.¶ A cell site simulator is a device that emits a signal mimicking a cellphone tower. It allows law enforcement 1440 agencies to capture detailed information from a suspect's cell phone, including location and who the person calls or texts. ¶ "As technology evolves and is enhanced, electronic privacy is an important component to consider," said Taylor. "I have serious concerns about information collected from third parties when these devices are used and we will hopefully address that at some point in the future. For now, we're drawing a clear line in the sand and saying you can't use this new technology unless you go to a judge and convince them to give you a warrant to do so."¶ HB 1440 passed the House unanimously. HB 1639 passed the House 73-25. Both bills now move to the state Senate for further consideration.¶ The 105-day 2015 legislative session is scheduled to end April 26. 235 CMSDL Core Files 2015-2016 2NC/1NR- CISA DISADVANTAGE- Link Wall- Security Letters Empirically proven that surveillance reforms enjoy bipartisan support The Nation 2014 John Nichols, co-author with Robert W. McChesney of Dollarocracy: How the Money and Media Election Complex is Destroying America, “NSA Reform Is Blocked by Constitutionally Disinclined Senate Republicans” http://www.thenation.com/article/could-markudall-make-last-ditch-difference-nsa-reform/, Nov 19 The vital cause of NSA reform—which seemed to be gaining strength as not just citizens but their elected representatives came to recognize the consequences of the issues raised by Edward Snowden’s leaks—has hit a rough spot in recent weeks. Allies of the cause are being defeated or abandoning their principles and major initiatives are failing.¶ The first bad news came November 4, when Colorado Senator Mark Udall lost his campaign for a second term. In his first term, the Democrat had emerged as one of the steadiest, and frequently most aggressive, critics of National Security Agency abuses. Arguing that there was “a groundswell of public support for reform,” and that such reform had to “reject half-measures that could still allow the government to collect millions of Americans’ records without any individual suspicion or evidence of wrongdoing,” Udall worked with Oregon Democrat Ron Wyden and Kentucky Republican Rand Paul to get Congress to crack down on the NSA. ¶ Udall is still in the Senate until January, and he moved in the immediate aftermath of his defeat to gain Senate support for at least a small measure of NSA reform. But even that initiative fell short Tuesday night, as Udall and his allies could muster only fifty-eight of the sixty needed votes to prohibit the NSA from holding the phone records of Americans and to establish better procedures for challenging the claims and initiatives of government agencies that overreach. ¶ Though the measure fell far short of what was needed, the American Civil Liberties Union argued that the so-called “USA Freedom Act,” which was our chance to turn the tide on suspicionless mass surveillance, restoring some of the crucial privacy protections lost with passage of the Patriot Act in 2001.” introduced by outgoing Senate Judiciary Committee Chairman Patrick Leahy, D-Vermont, “is Here’s more evidence- the plan’s introduction would create an unusual alliance between dems and republicans NEW YORK TIMES 2015- “Patriot Act Faces Revisions Backed by Both Parties” http://www.nytimes.com/2015/05/01/us/politics/patriot-act-faces-revisions-backed-by-bothparties.html, May 1 After more than a decade of wrenching national debate over the intrusiveness of government intelligence agencies, a bipartisan wave of support has gathered to sharply limit the federal government’s sweeps of phone and Internet records.¶ On Thursday, a bill that would overhaul the Patriot Act and curtail the so-called metadata surveillance exposed by Edward J. Snowden was overwhelmingly passed by the House Judiciary Committee and was heading to almost certain passage in that chamber this month.¶ An identical bill in the Senate — introduced with the support of five Republicans — is gaining support over the objection of Senator Mitch McConnell, Republican of Kentucky, who is facing the prospect of his first policy defeat since ascending this year to majority leader.¶ The push for reform is the strongest demonstration yet of a decade-long shift from a singular focus on national security at the expense of civil liberties to a new balance in the postSnowden era.¶ Under the bipartisan bills in the House and Senate, the Patriot Act would be changed to prohibit bulk collection, and sweeps that had operated under the guise of socalled National Security Letters issued by the F.B.I. would end. The data would instead be stored by the phone companies themselves, and could be accessed by intelligence agencies only after approval of the secret Foreign Intelligence Surveillance Act court.¶ The legislation would also create a panel of experts to advise the FISA court on privacy, civil liberties, and technology matters, while requiring the declassification of all significant FISA court opinions. ¶ The debate has resulted in a highly unusual alliance of House Speaker John A. Boehner, the White House, the Tea Party and a bipartisan majority in the House. They are in opposition to Mr. McConnell, his Intelligence Committee chairman, and a small group of defense hawks. In addition, two Republican presidential candidates in the Senate, Ted Cruz of Texas and Rand Paul of Kentucky, have made it clear they will not accept a straight extension of the current Patriot Act. 236 CMSDL Core Files 2015-2016 **Impact 237 CMSDL Core Files 2015-2016 2NC/1NR- CISA DISADVANTAGE- ANSWERS TO: CISA Good CISA is bad- does little to protect against cyber attacks and hinders privacy protections Laperruque 2015- Jake, fellow on Privacy, Surveillance, and Security. Jake previously served as a law clerk for Senator Al Franken on the Subcommittee on Privacy, Technology, and the Law, and as a policy fellow for Senator Robert Menendez. “How the OPM Hack Demonstrates the Need to Improve CISA” https://cdt.org/blog/how-the-opm-hack-demonstrates-the-need-toimprove-cisa/ The recent mass breach of computers at the Office of Personnel Management (OPM) has increased pressure on Congress to act to enhance cybersecurity. However, the OPM hack demonstrates the importance of strengthening the Cybersecurity Information Sharing Act (CISA, S. 754) in two important ways that would not undermine the goals of the legislation. First, information shared under the bill by the private sector with the government should go to the Department of Homeland Security National Cybersecurity and Communications Integration Center (DHS NCCIC) and not to any government agency, as would be permitted under the current bill. This would direct the flow of cyber threat indicators to an entity that was created to receive and protect them. Second, the requirements to eliminate personal information from cyber threat indicators before they are shared should be strengthened. If less personal information is shared, less personal information is available to the bad guys when they break in.¶ CISA Should Direct the Cyber Threat Indicators that Companies Share to the DHS NCCIC¶ CISA authorizes private entities share cyber threat indicators (CTI’s) with any department or agency within the federal government (Sec. 3(c)(1)). Many agencies do not have the operational ability to receive, store, and process these data, or – as the OPM breach demonstrates – the security protocols and experiences to adequately protect personal information. ¶ A far better path would be to follow the model of Rep. McCaul’s National Cybersecurity Protection Advancement Act (H.R. 1731), passed in the House earlier this year. That legislation required that companies sharing cyberthreat indicators share them with the DHS NCCIC. The NCCIC was created to receive, process, and protect sensitive cyber data. Requiring all private-to-government sharing be directed at this entity would enhance data security and operational functionality.¶ CISA Should Require Implementation of Adequate Privacy Protections Before Information Is Shared.¶ CISA requires that all information shared with the federal government be automatically and instantaneously shared with a range of federal entities (Sec. 5(a)(3)(A)(i)).[1] However, this sharing would occur without full application of privacy protections. The bill requires that automated sharing occur in “real-time” without any “delay, modification, or any other action” that would impede instantaneous receipt by all other designated agencies (Sec. 5(a)(3)(A)(i)). This would prohibit any privacy protections – including redaction and removal of unnecessary personal information – that would require any human effort or review.¶ Thus under CISA, personal data could be instantly distributed to over half a dozen federal departments without adequate privacy protections, and would then be vulnerable if computer networks in any of these entities were breached. In contrast, the Protecting Cyber Networks Act (H.R. 1560, passed in the House earlier this year) requires sharing not be subject to “delay, modification, or any other action without good cause that could impede receipt” (emphasis added). This provision would better protect privacy and data security than CISA. Additional language should be added to make it clear that application of the privacy policies to be created by the bill constitute “good cause.”¶ CISA Should Be Amended To Strengthen Requirements To Remove Personal Information Before Cyber Threat Indicators Are Shared.¶ CISA’s requirement to remove personal information (Sec. 4(d)(2)) is riddled with loopholes that can be closed without harming the goals of the legislation. Closing the loopholes in three ways would mean less personal information is available if (and when) computer systems are penetrated again:¶ CISA does not require that companies “take reasonable efforts” to review cyber threat indicators or remove personal information before sharing – any review, even if it were cursory and ineffective, would be sufficient. Both House information sharing bills (H.R. 1731 and H.R. 1560) require a benchmark of “reasonable” efforts be taken, ensuring that attempts to review and remove personal information before sharing are effective.¶ Even if an acceptable review were to occur, CISA only requires companies to remove personal information they “know” is unrelated to a cybersecurity threat. This could lead companies to take a “default share” policy for personal information, and always include it unless there is a rare smoking gun demonstrating irrelevance. Both House information sharing bills address this loophole as well, requiring companies to remove personal information that is that is “reasonably believed” to be irrelevant.¶ CISA only requires removal of information that is “not directly related” to a cyber threat, meaning that victims’ personal information (which is generally related to the threat) will often go unprotected. A better standard would require removal of information not necessary to respond to the threat.¶ Information Sharing Is Not a Cybersecurity Silver Bullet.¶ Passing CISA without addressing operational, security, and privacy issues risks new problems 238 CMSDL Core Files 2015-2016 without providing significant benefits. Attacks from “zero-day” vulnerabilities – which were used in major recent breaches such as OPM and Sony – cannot be prevented through information sharing, because the exploit is unknown and unpatchable at the time it is used. The impact of new information authorities may actually be limited – a letter sent to Congress this April from over 65 technologists and network security experts concluded that “We do not need new legal authorities to share information that helps us protect our systems from future attacks,” and categorized information necessary to share as “far more narrow” than what is authorized by CISA. Greater focus should be placed on commonsense security measures that can prevent the infiltrations that lead to and aggravate the impact of major breaches: encrypting data, regularly reviewing and updating systems, and using multi-factor authentication.¶ [1] Specifically, cyber threat indicators shared under the bill must be shared with the Department of Commerce, the Department of Defense, the Department of Energy, the Department of Homeland Security, the Department of Justice, the Department of the Treasury, and the Office of the Director of National Intelligence. Cyberterrorism is overstated – no documented risk of attack Lachow, 2014 (Dr. Lachow received his Ph.D. in engineering and public policy from Carnegie Mellon University. He earned an A.B. in political science and a B.S. in physics from Stanford University. He currently works as a principal cybersecurity engineer at the MITRE Corporation, where he provides technical and policy support to several government organizations. He is also chair of the Board of Advisors of the National Cybersecurity Institute and serves as an adviser to the State of Virginia’s Mach37 Cyber Accelerator initiative. http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-19.pdf CYBER TERRORISM is often portrayed as a major threat to the United States. Articles, books, and reports discussing the subject conjure images of infra- structure failures, massive economic losses, and even large-scale loss of life. Fortunately, the hype surrounding this issue outpaces the magnitude of the risk. Terrorists use the Internet extensively, but not to launch massive cyber attacks. In fact, while there is clear evidence that terrorists have used the Internet to gather intelligence and coordinate efforts to launch physical attacks against various infrastructure targets, there has not been a single documented incidence of cyber terrorism against the U.S. Government. Why is that? Is it just a matter of time until terrorists launch a massive cyber attack against the United States, or are current trends likely to continue? If terrorists are not using the Internet to attack us, what are they using it for? This chapter addresses these questions. The chapter begins by providing a framework for assessing the risks of cyber terrorism. It uses this framework to develop a good understanding of the factors that terrorists must consider when deciding whether to pursue cyber-based attacks. It also facilitates a general assessment of the overall risks posed by cyber terrorists, today and in the next few years. Terrorist use of the Internet is common, even though cyber terrorism is rare. The Internet provides an almost perfect tool for enabling the goals of many terrorist organizations. 239 CMSDL Core Files 2015-2016 **CISA DISADVANTAGE Affirmative 240 CMSDL Core Files 2015-2016 2AC- CISA DISADVANTAGE- Link Turn Strategy 1. Non-unique- CISA will pass in the status quo- it has just enough votes The Hill 2015- “GOP senator: Cyber bill has real shot in chamber” June 25 http://thehill.com/policy/cybersecurity/246111-gop-sen-leaders-still-want-to-move-cyber-bill Sen. Deb Fischer (R-Neb.) expressed optimism Thursday about the chances of moving a stalled cybersecurity bill through the Senate. “The leader wants to be able to get a bill out,” Fischer said an event hosted by The Hill and sponsored by Visa, referring to Senate Majority Leader Mitch McConnell (R-Ky.). “I think he has the support of the majority of members in our conference and I would hope the American people would continue to push all members to say we need to get this done.” ADVERTISEMENT Cybersecurity is “at the forefront of discussions that we’ve had in leadership since the beginning of the session,” she added. In the wake of the recent blistering cyberattack on federal networks, the upper chamber tried to attach a major cyber bill — intended to bolster the public-private exchange of data on hackers — to a defense authorization measure. Democrats rebelled, angry they would not be able to offer privacy-enhancing amendments to the bill, known as the Cybersecurity Information Sharing Act (CISA). With the help of a few Republicans, they blocked the maneuver. Civil liberties advocates have argued CISA could shuttle sensitive data to the National Security Agency (NSA), empowering the spy agency weeks after Congress voted to rein in its authority. CISA’s prospects have been uncertain since. Senate leaders have indicated there is no set timeline to bring the measure up as a standalone bill. And House Homeland Security Committee Chairman Michael McCaul (R-Texas) said on Wednesday that the Senate bill in its current form would be a nonstarter in the House, which has already passed its two complementary companion bills. CISA supporters — including a bipartisan group of lawmakers, most industry groups and potentially the White House — believe the measure is necessary to better thwart cyberattackers. By knowing more about our enemies, we can better repel them, they reason. “If we don’t allow companies to be able to share information when they see something, the American people are not going to be protected,” Fischer said. The bill would also help in the wake of massive data breaches, such as the one that has felled the Office of Personnel Management (OPM), Fischer believes. If the public and private sector are swapping more data, both sides can know sooner exactly what has happened, she said. That “will get consumers more involved, I think, at an earlier time so that they know that their information has been compromised,” Fischer said. 2. The plan prevents passage- it starts a debate about surveillance in congress, which alienates republicans The Hill 2015- “Senate GOP whip hopes to act on cyber bill in early August” http://thehill.com/policy/cybersecurity/247921-senate-gop-whip-eyes-early-august-for-cyberbill, July 14 It would be the last chance for the upper chamber to try to pass the anti-hacking measure before a four-week recess. The bill, known as the Cybersecurity Information Sharing Act (CISA), is intended to boost the exchange of cyber threat data between the public and private sectors. The House has already passed its two companion pieces of legislation.¶ But the prospect might seem a longshot to many. The Senate’s calendar is packed in its final weeks before the August break. Myriad budget bills and a fight over the recently struck deal to curb Iran’s nuclear program are expected to dominate backing the measure — a bipartisan group of lawmakers, most industry groups and potentially even the White House — were hopeful for swift passage in the upper chamber after the House approved its two measures by wide margins in April.¶ But the Senate bill was derailed amid a fight over reforming the National Security Agency.¶ A right-left coalition of privacy advocates in Congress are concerned that CISA would simply shuttle more sensitive consumer information to the NSA, further enabling its surveillance programs only months after the Senate voted to restrict the agency’s authority.¶ Senate the diminishing floor time.¶ The Senate has been trying to move the bill for months to no avail.¶ Those Republicans tried to attach the CISA language onto a defense authorization bill in an attempt to rush the bill through following the massive data breach at the Office of Personnel Management.¶ But Democrats revolted and blocked the maneuver. Many on the left, including bill co-sponsor Sen. Dianne Feinstein (D-Calif.), were upset lawmakers wouldn’t get to offer any privacy-enhancing amendments on the bill.¶ Senate Majority Leader Mitch McConnell (R-Ky.) over the weekend insisted Republicans were going to try and move the bill in the coming weeks.¶ 241 CMSDL Core Files 2015-2016 “These cybersecurity issues are enormously significant,” he said during an interview on “Fox News Sunday.” “What we're going to do is before August, take a step in the direction of dealing with the problem with information sharing bill that I think will be broadly supported.”¶ Cornyn backed McConnell’s plan.¶ “He would like to prioritize this and get it done before we leave,” Cornyn said. 3. Issues are compartmentalized- support for the plan will not spill over to effect CISA Bouie 2011 (Jamelle, graduate of the U of Virginia, Writing Fellow for The American Prospect magazine, May 5, [prospect.org/csnc/blogs/tapped_archive?month=05&year=2011&base_name=political_capital) Unfortunately, political capital isn’t that straightforward. As we saw at the beginning of Obama’s presidency, the mere fact of popularity (or a large congressional majority) doesn’t guarantee support from key members of Congress. For Obama to actually sign legislation to reform the immigration system, provide money for jobs, or reform corporate taxes, he needs unified support from his party and support from a non-trivial number of Republicans. Unfortunately, Republicans (and plenty of Democrats) aren’t interested in better immigration laws, fiscal stimulus, or liberal tax reform. Absent substantive leverage—and not just high approval ratings—there isn’t much Obama can do to pressure these members (Democrats and Republicans) into supporting his agenda. Indeed, for liberals who want to see Obama use his political capital, it’s worth noting that approval-spikes aren’t necessarily related to policy success. George H.W. Bush’s major domestic initiatives came before his massive post-Gulf War approval bump, and his final year in office saw little policy success. George W. Bush was able to secure No Child Left Behind, the Homeland Security Act, and the Authorization to Use Military Force in the year following 9/11, but the former two either came with pre-9/11 Democratic support or were Democratic initiatives to begin with. To repeat an oft-made point, when it comes to domestic policy, the presidency is a limited office with limited resources. Popularity with the public is a necessary part of presidential success in Congress, but it’s far from sufficient. 4. There is no impact to economic decline Drezner 2014 (Daniel W., professor of international politics at the Fletcher School of Law and Diplomacy at Tufts University. His latest book, The System Worked: How the World Stopped Another Great Depression, is just out from Oxford University Press; “The Uses of Being Wrong” http://www.lexisnexis.com.proxy2.cl.msu.edu/lnacui2api/results/docview/docview.do?docLinkInd=true&risb=21_T20276111299 &format=GNBFI&sort=DATE,D,H&startDocNo=1&resultsUrlKey=29_T20276111283&cisb=22_T20276111282&treeMax=true&tree Width=0&csi=171267&docNo=1) My new book has an odd intellectual provenance-it starts with me being wrong. Back in the fall of 2008, I was convinced that the open global economic order, centered on the unfettered cross-border exchange of goods, services, and ideas, was about to collapse as quickly as Lehman Brothers. A half-decade later, the closer I looked at the performance of the system of global economic governance, the clearer it became that the meltdown I had expected had not come to pass . Though the advanced industrialized economies suffered prolonged economic slowdowns, at the global level there was no great surge in trade protectionism, no immediate clampdown on capital flows, and, most surprisingly, no real rejection of neoliberal economic principles . Given what has normally transpired after severe economic shocks, this outcome was damn near miraculous. Nevertheless, most observers have remained deeply pessimistic about the functioning of the global political economy. Indeed, scholarly books with titles like No One's World: The West, The Rising Rest, and the Coming Global Turn and The End of American World Order have come to a conclusion the opposite of mine. Now I'm trying to understand how I got the crisis so wrong back in 2008, and why so many scholars continue to be wrong now. 242 CMSDL Core Files 2015-2016 2AC- CISA DISADVANTAGE- Impact Turn Strategy 1. Non-unique- CISA will pass in the status quo- it has just enough votes The Hill 2015- “GOP senator: Cyber bill has real shot in chamber” June 25, http://thehill.com/policy/cybersecurity/246111-gop-sen-leaders-still-want-to-move-cyber-bill Sen. Deb Fischer (R-Neb.) expressed optimism Thursday about the chances of moving a stalled cybersecurity bill through the Senate. “The leader wants to be able to get a bill out,” Fischer said an event hosted by The Hill and sponsored by Visa, referring to Senate Majority Leader Mitch McConnell (R-Ky.). “I think he has the support of the majority of members in our conference and I would hope the American people would continue to push all members to say we need to get this done.” ADVERTISEMENT Cybersecurity is “at the forefront of discussions that we’ve had in leadership since the beginning of the session,” she added. In the wake of the recent blistering cyberattack on federal networks, the upper chamber tried to attach a major cyber bill — intended to bolster the public-private exchange of data on hackers — to a defense authorization measure. Democrats rebelled, angry they would not be able to offer privacy-enhancing amendments to the bill, known as the Cybersecurity Information Sharing Act (CISA). With the help of a few Republicans, they blocked the maneuver. Civil liberties advocates have argued CISA could shuttle sensitive data to the National Security Agency (NSA), empowering the spy agency weeks after Congress voted to rein in its authority. CISA’s prospects have been uncertain since. Senate leaders have indicated there is no set timeline to bring the measure up as a standalone bill. And House Homeland Security Committee Chairman Michael McCaul (R-Texas) said on Wednesday that the Senate bill in its current form would be a nonstarter in the House, which has already passed its two complementary companion bills. CISA supporters — including a bipartisan group of lawmakers, most industry groups and potentially the White House — believe the measure is necessary to better thwart cyberattackers. By knowing more about our enemies, we can better repel them, they reason. “If we don’t allow companies to be able to share information when they see something, the American people are not going to be protected,” Fischer said. The bill would also help in the wake of massive data breaches, such as the one that has felled the Office of Personnel Management (OPM), Fischer believes. If the public and private sector are swapping more data, both sides can know sooner exactly what has happened, she said. That “will get consumers more involved, I think, at an earlier time so that they know that their information has been compromised,” Fischer said. 2. Extend the 1NC link evidence- the plan causes the passage of CISA 3. That’s good- CISA is key to prevent a cyber attack National Journal 2015-Here’s What Is in the Senate’s Cybersecurity Bill” http://www.nationaljournal.com/tech/here-s-what-is-in-the-senate-s-cybersecurity-bill20150318, March 18 The Cybersecurity Information Sharing Act is intended to help forestall cyberattacks like the one that crippled Sony Pictures last year, but concerns about government surveillance prevented a similar measure from earning a vote on the Senate floor in the last Congress. The legislation creates a voluntary framework for the private sector to share more computer data with the government by offering companies expanded legal liability if they choose to participate.¶ "This legislation protects the privacy rights of Americans while also minimizing our vulnerability to cyber-attacks," Senate Intelligence Committee Chairman Richard Burr said in a statement Wednesday. "Information sharing is purely voluntary and companies can only share cyber-threat information and the government may only use shared data for cybersecurity purposes."¶ ADVERTISEMENT ¶ Thanks to an extended spate of high-profile hacks, the bipartisan measure could earn an expedited review and land on the Senate floor as soon as April. In the House, Homeland Security Committee Chairman Michael McCaul signaled on Tuesday he plans to introduce his own information-sharing bill this week.¶ The White House has identified information-sharing as a key priority this year, although it has yet to say if it supports the current CISA language. President Obama issued a veto threat for a similar measure that passed the House a few years ago, partly because of privacy concerns.¶ "We are committed to working with Congress to craft legislation that reflects that balance, and can pass both houses," a senior administration official said in a statement. "In that spirit, we thank the committee for working with us to address some of the administration's most significant concerns with the committee's bill, and look forward to reviewing the legislation."¶ Among the nuanced changes, the latest iteration of CISA grants 243 CMSDL Core Files 2015-2016 liability protection for companies that share information related to "defensive measures" used to fend off hacks, a term substituted for the more controversial "countermeasures." The bill further clarifies that "defensive measures" does not include data that "destroys, renders unusable, or substantially harms an information system." 4. A cyber attack would cause a nuclear war Tilford 2012 (Robert Tilford, Wichita Military Affairs Examiner, Former soldier US Army, infantry, July 27, 2012, Cyber attackers could shut down the electric grid for the entire east coast, http://www.examiner.com/article/cyber-attackers-could-easily-shut-down-the-electricgrid-for-the-entire-east-coa) ¶ To make matters worse a cyber attack that can take out a civilian power grid, for example could also cripple the U.S. military.¶ The senator notes that is that the same power grids that supply cities and towns, stores and gas stations, cell towers and heart monitors also power “every military base in our country.”¶ “Although bases would be prepared to weather a short power outage with backup diesel generators, within hours, not days, fuel supplies would run out”, he said.¶ Which means military command and control centers could go dark.¶ Radar systems that detect air threats to our country would shut Down completely.¶ “Communication between commanders and their troops would also go silent. And many weapons systems would be left without either fuel or electric power”, said Senator Grassley.¶ “So in a few short hours or days, the mightiest military in the world would be left scrambling to maintain base functions”, he said.¶ We contacted the Pentagon and officials confirmed the threat of a cyber attack is something very real.¶ Top national security officials—including the Chairman of the Joint Chiefs, the Director of the National Security Agency, the Secretary of Defense, and the CIA Director— have said, “preventing a cyber attack and improving the nation’s electric grids is among the most urgent priorities of our country” (source: Congressional Record).¶ So how serious is the Pentagon taking all this?¶ Enough to start, or end a war over it, for sure. A cyber attack today against the US could very well be seen as an “Act of War” and could be met with a “full scale” US military response.¶ That could include the use of “nuclear weapons”, if authorized by the President. 244 CMSDL Core Files 2015-2016 2AC- CISA DISADVANTAGE- Drone Affirmative- No Link/Link Turn Congress is on board with armed drone surveillance- restriction unpopular- this prevents passage Hill 2012 (Kashmir Hill, Forbes, “Congress Welcomes The Drones”, http://www.forbes.com/sites/kashmirhill/2012/02/07/congress-welcomes-the-drones/, February 7, 2012) Congress Welcomes The Drones Congress says, 'Bring in the drones!' The Senate passed a $63 billion bill Monday to provide four years of funding for the Federal Aviation Administration. One of the provisions of the Reauthorization Act is that the FAA clear the path for wider spread use of drones (a.k.a. unmanned aircraft) for governmental and commercial purposes. Within 90 days, the FAA has to speed up the process by which government agencies and law enforcement can get permission to use drones, and by 2015, it has to start allowing commercial use of drones: The FAA is also required under the bill to provide military, commercial and privatelyowned drones with expanded access to U.S. airspace currently reserved for manned aircraft by Sept. 30, 2015. That means permitting unmanned drones controlled by remote operators on the ground to fly in the same airspace as airliners, cargo planes, business jets and private aircraft. via Congress OKs FAA bill allowing drones in U.S., GPS air traffic control – chicagotribune.com. Currently, private use of drones is basically limited to hobbyists, and they have to keep the drones under 400 feet and within their line of sight. Once the FAA changes the rules, a company such as Google for example could finally buy drones and use them for mapping purposes. Yes, we may finally have Google Street Drone View. Currently, the FAA restricts drone use primarily to segregated blocks of military airspace, border patrols and about 300 public agencies and their private partners. Those public agencies are mainly restricted to flying small unmanned aircraft at low altitudes away from airports and urban centers. Within nine months of the bill’s passage, the FAA is required to submit a plan on how to safely provide drones with expanded access. via Congress OKs FAA bill allowing drones in U.S., GPS air traffic control – chicagotribune.com. Drones are already being used to patrol our border s (and occasionally to catch cattle rustlers), but their use beyond that is very limited. This Act will change that. “ We are looking at border security using UAV (unmanned aerial vehicles) research, law enforcement , firefighting, just to name a few,” said Texas Senator Kay Bailey Hutchison. “There are going to be more and more uses for unmanned aerial vehicles to be able to do the surveillance and photographing that have taken helicopter pilots and small general aviation and even large aircraft to do in the past.” Drone surveillance is popular with republicans- the plan is perceived as a loss Jones 2013 (Trahern Jones, Cronkite Borderlands Initiative, “U.S. Set to Deploy More Drones Along U.S. Borders, Despite Concerns about Effectiveness and Cost”, http://cronkite.asu.edu/buffett/canada/drones.html CORPUS CHRISTI, Texas — Despite critical reports saying that the use of drones to patrol the nation’s borders is inefficient and costly, the leading Congressional proposal for immigration reform would drastically expand their use . In fact, the compromise bill would have U.S. Customs and Border Protection, which currently has a fleet of 10 Predator drones, using the unmanned aircraft to patrol the southern border with Mexico 24 hours a day, seven days a week. An expanded drone program is also sure to draw the ire of privacy advocates who already worry that increasing use of unmanned aircraft will result in intrusive surveillance of U.S. citizens. The proposal for around-the-clock drone use flies in the face of recent reports from the Government Accountability Office and the Office of the Inspector General. In a 2012 report, the OIG estimated that the agency only used its current Predator fleet about 40 percent of time the time it had projected for use of the crafts. The same report criticized CBP for failing “to obtain reimbursement for missions flown on stakeholders’ behalf,” such as U.S. Border Patrol, local law enforcement or emergency organizations, like FEMA. Criticism of the program also came in 2012 GAO report that said drone program staff frequently had to be relocated from other regions to support Predator operations on the southwestern border. In spite of such measures, the report noted that air support requests were more often left unfulfilled in this high-priority region when compared to lower-priority areas like the Canadian border. Initiated in 2005 at a cost of nearly $18 million for each of the 10 drones and their support systems, the use of unmanned aircraft is a relatively new tool for the Custom and Border Protection’s Office of Air and Marine. While agency officials say that the program is useful in border surveillance, Predator aircraft cannot be launched on a 24/7 basis due to weather conditions and safety regulations. Unmanned aerial vehicles are usually restricted to regions and altitudes where other aircraft do not share the same airspace in order to prevent mid-air collisions. That’s why CBP’s Predator fleet almost always flies at night, further limiting potential operational hours. During an April visit to the National Air Security Operations Center in Corpus Christi, Texas, which controls Predator flights over the Rio Grande, Cronkite student reporters observed that high winds deterred launches for four days. A tire-puncturing device used by drug smugglers to evade Border Patrol agents. Known as 'caltrops,' such devices are made from steel nails welded together. Photo by Trahern W. Jones. SLIDESHOW: A tire-puncturing device used by drug smugglers to evade Border Patrol agents. Known as "caltrops," such devices are made from steel nails welded together. Photo by Trahern W. Jones A pilot for the program, who requested to be unnamed for security reasons, described some of the challenges the agency has had in learning the new systems. “We’re bringing our people up and getting more experience,” he said. “The technology changes; they can change the software. They can give us new payloads. Things come pretty fast in the unmanned aircraft world as opposed to the manned aviation world.” The drones fly for an average of seven to nine hours a mission, 245 CMSDL Core Files 2015-2016 often covering many miles of uninhabited deserts, rivers and forests. CBP’s Predator aircraft are equipped with high-tech cameras and communications equipment to coordinate with Border Patrol and first responder agencies on the ground. Unlike the Predator program used in overseas military missions, CBP’s fleet does not carry weapons payloads. The aircraft often provide useful information for agents in complex situations or difficult-toreach areas, according to Hector Black, border patrol associate Chief, and the agency’s liaison with CBP’s Office of Air and Marine at the Corpus Christi Predator Operations Center. “When we come across something, we’ll contact the guys on the ground,” Black said in a phone interview. “Rather than sending agents in their vehicle, where it may take an hour and a half or two hours to get out and look at these areas, we can cover it in five or ten minutes with this aircraft.” The camera equipment aboard CBP Predators is sophisticated enough, according to Black, that even from an altitude of many thousands of feet, “you can actually zoom in and get street names.” While the same camera equipment can be found on the agency’s manned aircraft, the Predator’s longer flying time allows for increased surveillance and more immediate responsiveness to situations on the ground, according to CBP officials. In attempting to measure the successes or failures of the program, Black cautioned that metrics like apprehensions, seizures or flight hours might not be appropriate. Predator missions are often used for intelligence-gathering purposes, alongside interceptions of illegal crossings. A more subtle measure of drones’ effectiveness is how they impact smuggling patterns in areas they patrol, Black said. “First we’ll see a spike in apprehensions in those zones, and then the spikes will start to show a direct downward trend,” he noted. Not everyone is convinced of their effectiveness, however. The perceived shortfalls noted by the GAO and OIG represent a systemic problem, according to Ed Herlik, a researcher with Market Info Group, an aviation and defense analysis firm. “They already don’t fly their Predators much at all,” Herlik said in a phone interview. “We ran the numbers. Part of the time there are no Predators in the air anywhere in the nation and most of the time there might be one.” “Now, of course they can launch two or three or five if they want to,” he added, “but they almost never do, just by running the averages from what they report from flight times.” The reason for the program’s existence in the first place may have had more to do with the politics of border security than actual need, according to Herlik. “The Predators were forced on them” he said. Herlik explained that such systems were adapted from their wartime purposes in Iraq and Afghanistan for domestic use. “ Congress wanted Predators over the border, therefore it happened ,” Herlik said. “The fact that they’re not tremendously useful is not helpful.” Plan reignites turf battles about Congressional oversight- distracts from bill passage Munoz, 2013 -- The Hill staff writer, covering Defense and National Security [Carlo, "Turf battle builds quietly in Congress over control of armed drone program," The Hill, 49-13, thehill.com/homenews/administration/292501-turf-battle-builds-quietly-over-control-ofarmed-drone-program-, accessed 5-23-13,] The fight is a typical battle over who on Capitol Hill will retain power over the program, according to several analysts, who described it as predictable. ¶ “There is always going to be a turf battle” when dealing with congressional oversight, said Lawrence Korb, a former DOD official and defense analyst at the liberal-leaning Center for American Progress. ¶ But that battle could become particularly heated, given the high-profile nature of the drone program, which since the Sept. 11, 2001, attacks has become a huge factor in shaping counterterrorism policy, given its success, Korb said. ¶ For congressional panels, the fight over who will control the drone program will have a say in the relevancy of the two committees. ¶ 246