2 Week LWY Lab SSRA AFF

advertisement
FYIs
What the plan does – It implements the parts of the SSRA that are relevant to online
surveillance
Lydia O'Connor March 24, 2015, “Bipartisan Bill Would Repeal Patriot Act To End Government
Spying On Americans,” Huffington Post, http://www.huffingtonpost.com/2015/03/24/surveillance-staterepeal-act_n_6935632.html, KEL
The Surveillance State Repeal Act, introduced by Reps. Mark Pocan (D-Wis.) and Thomas Massie (RKy.), would overturn the 2001 Patriot Act that allowed for mass government surveillance in the name of
anti-terrorism and the destruction of any information collected under it. The bill also would repeal the
2008 FISA Amendments Act, which allows Internet spying, and would stop the government from forcing
tech manufacturers to compromise encryption or privacy features to allow spying on their devices.
Whistleblowers like Edward Snowden, who exposed the National Security Agency's mass surveillance in
2013, would have additional protections.
What is Prism?
PRISM is a clandestine[1] surveillance program under which the United States National Security Agency
(NSA) collects internet communications from at least nine major US internet companies.[2][3][4] Since
2001 the United States government has increased its scope for such surveillance, and so this program was
launched in 2007.
PRISM is a government code name for a data-collection effort known officially by the SIGAD US984XN.[5][6] The PRISM program collects stored internet communications based on demands made to
internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn
over any data that match court-approved search terms.[7] The NSA can use these PRISM requests to
target communications that were encrypted when they traveled across the internet backbone, to focus on
stored data that telecommunication filtering systems discarded earlier,[8][9] and to get data that is easier
to handle, among other things.[10]
PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush
Administration.[11][12] The program is operated under the supervision of the U.S. Foreign Intelligence
Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act
(FISA).[13] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned
that the extent of mass data collection was far greater than the public knew and included what he
characterized as "dangerous" and "criminal" activities.[14] The disclosures were published by The
Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a
financial arrangement between NSA's Special Source Operations division (SSO) and PRISM partners in
the millions of dollars.[15]
Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic
reports", and it accounts for 91% of the NSA's internet traffic acquired under FISA section 702
authority."[16][17] The leaked information came to light one day after the revelation that the FISA Court
had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to
the NSA logs tracking all of its customers' telephone calls.[18][19]
What is Bullrun?
Bullrun is a clandestine, highly classified decryption program run by the United States National Security
Agency (NSA). According to the BULLRUN classification guide published by The Guardian, the
program uses multiple sources including Computer Network Exploitation, interdiction, industry
relationships, collaboration with other IC entities, and advanced mathematical techniques to access
encryption programs and technology.
What is US-EU Safe Harbor Agreement?
Under Safe Harbor, U.S. organizations certify to the U.S. Department of Commerce that they provide
certain protections for personal data. Those protections are designed to ensure that organizations meet EU
data protection requirements. Safe Harbor certifications are enforced by the Federal Trade Commission or
the Department of Transportation as appropriate. Over four thousand organizations are currently listed on
the U.S.-EU Safe Harbor list. These organizations rely on Safe Harbor to authorize transfers of personal
data from the EU to the U.S. Recent events, however, have created uncertainty for Safe Harbor and the
organizations that depend on it.
Transatlantic Trade and Investment Partnership (TTIP) –
1AC
Normal Version
Observation 1: Inherency
The 2008 FISA Amendment Act (FAA) removed the probable cause standard
requiring warrants for surveillance, allowing sweeping NSA electronic surveillance
of US citizens and communication within the US. There’s no effective oversight of
these programs now.
Margot Kaminski June 7, 2013, executive director of the Information Society Project at Yale Law
School; She is a graduate of Harvard University and Yale Law School and a former fellow of the
Information Society Project. While at Yale Law School, she was a Knight Law and Media Scholar and
co-founder of the Media Freedom and Information Access Practicum. Following graduation from Yale
Law School, she clerked for The Honorable Andrew J. Kleinfeld of the Ninth Circuit Court of Appeals.
She has been a Radcliffe Research Fellow at Harvard and a Google Policy Fellow at the Electronic
Frontier Foundation, PRISM's Legal Basis: How We Got Here, and What We Can Do to Get Back,” The
Atlantic, http://www.theatlantic.com/national/archive/2013/06/prisms-legal-basis-how-we-got-here-andwhat-we-can-do-to-get-back/276667/, KEL
First, there is the question of whom the surveillance targets.
PRISM spies on Americans. The Director of National Intelligence emphasized yesterday that PRISM targets
only " non-U.S. persons located outside the United States ." But the press release also acknowledges that "information about U.S. persons" may be "incidentally acquired" in such pursuits.
The current scope of this "incidental"
surveillance will shock most Americans. Before 2008, the law limited "incidental" surveillance by limiting primary surveillance. The
government had to show probable cause that its surveillance target was the agent of a foreign power,
and that the facility being watched was about to be used by that target. You could be incidentally observed if you communicated with a
targeted foreign agent, but otherwise foreign communications were likely to be unmonitored. But in 2008, the FISA Amendments Act (FISAAA)
changed this . The government now does not need to show probable cause that the target is a foreign agent. It need only have a "reasonable
belief" that the target is located outside of the United States. The new version of FISA does not require the
government to identify its targets; it does not require the government to identify the monitored facilities; and
the purpose of foreign intelligence gathering attaches to the whole surveillance program, not the individual investigation. That is to say: the FISA Amendments Act
permits the government to obtain a single court order through which it can monitor thousands, or even
millions, of people. The scope of "incidental" surveillance thus vastly expanded as Congress lowered the requirements for spying on the primary target. Such a system
will inevitably sweep in untold numbers of Americans who communicate with foreigners. And because the government
Targeting is not the same as collecting; the program may "target" foreign persons, but "acquire" information on Americans.
need have only a "reasonable belief" that the target is outside the United States--which it is interpreting according to the Washington Post as a 51% chance that the target is outside the U.S.--this
system will undoubtedly sweep in purely domestic communications as well.
This brings us to the issue of oversight: who is watching the watchers? The Director
of National Intelligence assures us that PRISM is "subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress." It is true that in December 2012
Congress renewed the law that allows PRISM to exist. But what kind of oversight did Congress actually provide? When Senators Ron Wyden and Mark Udall asked whether communications by
Americans had been gathered under the law, the Director of National Intelligence responded that it was not possible to identify the number of people in the United States whose communications
At the core of the
problem is that the Foreign Intelligence Surveillance Court (FISA Court), which meets in secret and does not publish its
opinions, itself does not provide adequate oversight. When Congress changed the standard for targeting
foreign individuals in 2008 , it abolished the ability of the FISA Court to evaluate whether the
government had any real cause to target an individual or group of individuals. The Supreme Court itself disputes whether the
were reviewed. How effective can Congressional oversight be if Congress does not understand the scope and nature of the programs it has authorized?
FISA Court enforces the Fourth Amendment. The "minimization procedures" touted by the Director of National Intelligence as adequate privacy safeguards are established by the government,
evaluated by the government, and are subject to review by a secret court--if review occurs at all. And as a general practice, FISA "minimization" hasnot been true minimization: it occurs after
information is already acquired. The existence of PRISM and the Verizon metadata program, both authorized by the FISA Court, confirms that a secret court broadly authorized by an uninformed
Congress will not adequately protect the Fourth and First Amendment rights of American citizens on American soil.
The 2015 USA Freedom Act does NOTHING to reform PRISM and sent a signal
that should trigger all negative disadvantages.
Fred Kaplan June 8, 2015, author of The Insurgents: David Petraeus and the Plot to Change the
American Way of War, is writing a book on the history of cyberwar, “The NSA Debate We Should Be
Having,” Slate Magazine,
http://www.slate.com/articles/news_and_politics/war_stories/2015/06/the_national_security_agency_s_su
rveillance_and_the_usa_freedom_act_the.html, KEL
One week after Congress voted to stop the National Security Agency from collecting and storing millions of
Americans’ phone records, partisans on both sides are exaggerating the significance of this new reform.
NSA supporters lament the loss of a key tool for fighting terrorists , while the agency’s critics hail
the new law as (in Edward Snowden’s words) an “historic victory for the rights of every citizen, ” with some calling its
passage a vindication of Snowden himself as an authentic whistleblower who should be let back home as a hero, not a convict. Both sides are off the
mark. The NSA’s bulk collection of telephone metadata was the subject of the first news stories based on the trove of highly classified documents that Snowden
leaked, and it stirred the biggest commotion. But in fact the metadata program never comprised more than a tiny percentage of the agency’s vast and global
surveillance net. The new law’s reform measure—to keep the metadata stored with the telecom companies, allowing NSA access only to specified materials, and then
only through the Foreign Intelligence Surveillance Court—was first proposed not by some libertarian critic but by Gen. Keith Alexander, then-director of the NSA.
Under the system that has been in effect, as authorized by Section 215 of the Patriot Act (or, rather, by the FISA court’s now-discredited reading of that section), the
NSA routinely collected metadata from some of the biggest cellular companies—not the contents of conversations, but the phone numbers, dates, times, and duration
of the calls. If someone inside the United States called a number linked to one of three terrorist organizations (including al-Qaida), an NSA alert system would note
that fact. The NSA could then ask the FISA Court for permission to search the database for a list of all the other numbers that the American phone had called, as well
as all the numbers that those numbers had called, going back as far as five years. If this search revealed a suspicious pattern, the NSA would turn the materials over to
the FBI, which could seek a warrant to listen to conversations. Under the new reform law, called the USA Freedom Act, the NSA would no longer possess the
database, so it would seek a FISA court order to get it from the telecom companies—and the FISA court would now include a privacy advocate who could argue
against relinquishing the data. If the court sided with the NSA, what happened next would be exactly the same as before the new law passed. So, it’s not exactly a
giant step in the annals of either national-security risk or civil liberties reform—unless one of two things had been true. First, if the NSA had been abusing the
process—if analysts or senior officials had been searching metadata for personal, political, or vindictive purposes—the changes in custody and oversight would have a
huge impact. But neither Snowden’s documents nor any subsequent probes have uncovered any such evidence. Second, if authoritarians or worse—say, modern-day
versions of Richard Nixon and J. Edgar Hoover—were to come to power, they could suspend the internal controls at NSA and use the agency’s vast databases to track
domestic enemies or any target of their choosing. In that case, the Freedom Act would serve as a powerful brake to oppression: Because the government would no
longer possess the data, it couldn’t exploit the data. That is the real—and the intended—effect of the reform: not so much to change the way surveillance technology is
used today, but rather to limit the potential for abuse in the future. For now, surveillance through telephone metadata is pretty sparse. In 2012, the NSA queried the
database for 288 U.S. telephone numbers. As a result of those queries, the agency passed just 12 tips to the FBI. None of those tips led to the capture of a single
terrorist or the halting of a terrorist plot. In fact, according to President Obama’s independent commission on NSA reform, the telephone metadata program has never
had any impact on countering terrorism. A
separate program called PRISM—authorized under Section 702 of the
Foreign Intelligence Surveillance Act—lets the NSA track foreign terrorists and adversaries by
intercepting their Internet traffic as it zips through U.S.–based servers. (Because of the nature of the technology, about 80
percent of the world’s Internet traffic passes through U.S. servers at some point.) PRISM was another highly classified
NSA program that Snowden uncovered. The Washington Post and the Guardian made it the subject of their Day 2 Snowden stories (right after the revelations about
telephone metadata). Yet PRISM
isn’t touched at all by the USA Freedom Act, nor does any serious politician
propose overhauling it. This is the case, even though PRISM data-mining is a much bigger program than
telephone metadata ever was, and it’s potentially more intrusive, since it’s hard to know whether, at first glance, an IP address
belongs to an American or a foreigner.
Plan Text
Thus, my partner and I stand resolved:
Domestic online surveillance authority under the USA PATRIOT Act, Foreign
Intelligence Surveillance Act of 1978 Amendments Act of 2008, and Executive Order
12333 should be repealed and any requirement for manufacturers of electronic
devices or software to provide bypasses for encryption will be prohibited.
Advantage One – Cloud Competitiveness
PRISM revelations and the weak response with US Freedom Act has caused other
nations to retaliate against our information tech sector and undermined our tech
sector competitiveness
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
Almost two years ago, ITIF described how revelations
about pervasive digital surveillance by the U.S. intelligence
community could severely harm the competitiveness of the United States if foreign customers turned
away from U.S. - made technology and services. 1 Since then, U.S. policymakers have failed to take sufficient
action to address these surveillance concerns; in some cases, they have even fanned the flames of
discontent by championing weak information security practices. 2 In addition, other countries have used anger
over U .S. government surveillance as a cover for implementing a new wave of protectionist policies
specifically targeting information technology. The combined result is a set of policies both at home and
abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises
of improved national security.
US competitiveness in the $241 billion global cloud market is key to US innovation,
economic growth, and job growth
Digital 4th, January 2015, Digital 4th is a bipartisan coalition dedicated to reforming and modernizing
our country’s 4th Amendment privacy rights, “U.S. Competitiveness in Cloud Computing: Updating the
Standard for Government Access to Stored Communications,” http://www.digital4th.org/wpcontent/uploads/2015/01/Issue_Brief-2-ECPA-and-the-Cloud.pdf, KEL
Businesses all over the world are looking to cloud - based services for their information management
needs in order to save money on equipment and to achieve better computing reliability and data security.
Cloud based services allow companies to expand their computing capacity quickly – particularly valuable for start - up businesses and
entrepreneurs. Such services give employees the flexibility to share information and collaborate. The
global cloud market is
expected to expand to $241 billion by 2020. American companies have been the global leaders in cloud
computing, and cloud computing has been an engine for U.S. - based innovation, economic growth, and
job creation.
Maintaining US economic growth is key to global economic growth
Rich Miller, January 9, 2015, “U.S. Retakes the Helm of the Global Economy,” Bloomberg News,
http://www.bloomberg.com/news/articles/2015-01-09/u-s-retakes-the-helm-of-the-global-economy, KEL
The U.S. is back in the driver’s seat of the global economy after 15 years of watching China and emerging
markets take the lead. The world’s biggest economy will expand by 3.2 percent or more this year, its best
performance since at least 2005, as an improving job market leads to stepped-up consumer spending, according to economists at JPMorgan Chase
& Co., Deutsche Bank AG and BNP Paribas SA. That outcome would be about what each foresees for the world economy as a whole and would
be the first time since 1999 that America hasn’t lagged behind global growth, based on data from the International Monetary Fund. “The
U.S.
is again the engine of global growth,” said Allen Sinai, chief executive officer of Decision Economics in New York. “The economy
is looking stellar and is in its best shape since the 1990s.”
Economic decline causes global wars – empirically proven
Royal, '10 (Jedediah, Director of Cooperative Threat Reduction Program -- DOD, Economics of War &
Peace: Legal and Political Perspectives, ed. Goldsmith & Brauer, p. 213-15)
Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political
science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defence behaviour of
interdependent states. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow.
First, on the systemic level, Pollins (2008) advances Modelski and Thompson's (1996) work on leadership cycle theory, finding that rhythms
in the global economy are associated with the rise and fall of a pre-eminent power and the oftenbloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as
economic crises could usher in a redistribution or relative power (see also Gilpin. 1981) that leads to
uncertainty about power balances, increasing the risk of miscalculation (Fearon. 1995). Alternatively, even a
relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to
challenge a declining power (Werner, 1999). Separately, Pollins ( L 996) also shows that global economic cycles combined with
parallel leadership cycles impact the likelihood of conflict among major, medium and small powers, although he suggests that the causes and
connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland's (1996. 2000)
theory of trade expectations suggests that future expectation of trade' is a significant variable in understanding economic conditions and security
behaviour of states. He argues that interdependent states arc likely to gain pacific benefits from trade so long as they have an optimistic view of
future trade relations. However, if
the expectations of future trade decline, particularly for difficult to replace
items such as energy resources, the likelihood for conflict increases, as states will be inclined to use
force to gain access to those resources. Crises could potentially be the trigger for decreased trade
expectations either on its own or because it triggers protectionist moves by interdependent states .
Third, others have considered the link between economic decline and external armed conflict at a national level. Blomberg and Hess
(2002) find a strong correlation between internal conflict and external conflict, particularly during
periods of economic downturn. They write, “The linkages between internal and external conflict and
prosperity are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict,
which in turn returns the favour. Moreover, the presence of a recession tends lo amplify the extent to
which international and external conflict self-reinforce each other. (Blomberg & Hess 2002. p. 89) Economic
decline has also been linked with an increase in the likelihood of terrorism (Blomberg. Hess. & Weerapana,
2004), which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the
popularity of a sitting government. 'Diversionary theory’ suggests that when facing unpopularity arising from economic decline,
sitting governments have increased incentives to fabricate external military conflicts to create a rally around the flag effect. Wang (1996),
DeRouen ( 1995), and Blomberg. Hess, and Thacker (2006) find supporting evidence showing that economic decline and use of force are at least
indirectly correlated. Gelpi (1997), Miller (1999), and Kisangani and Pickering (2009) suggest that the tendency towards diversionary tactics arc
greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from
office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United
States and thus weak Presidential popularity arc statistically linked to an increase in the use of force. In summary, recent economic scholarship
positively correlates economic integration with an increase in the frequency or economic crises, whereas political science scholarship links
economic decline with external conflict at systemic, dyadic and national levels. This implied connection between integration, crises and armed
conflict has not featured prominently in the economic-security debate and deserves more attention.
Independently, US competitiveness solves great power war – it solves all imapcts
Colby 14 (Elbridge, the Robert M. Gates fellow at the Center for a New American Security; and Paul
Lettow, was senior director for strategic planning on the U.S. National Security Council staff from 2007
to 2009, 7/3/14, “Have We Hit Peak America?,”
http://www.foreignpolicy.com/articles/2014/07/03/have_we_hit_peak_america)
Many foreign-policy
experts seem to believe that retaining American primacy is largely a matter of will -- of how
America chooses to exert its power abroad. Even President Obama, more often accused of being a prophet of decline than a booster of America's
future, recently asserted that the United States "has rarely been stronger relative to the rest of the world." The question, he continued, is "not whether America will
lead, but how we will lead." But
will is unavailing without strength. If the United States wants the international
system to continue to reflect its interests and values -- a system, for example, in which the global commons are
protected, trade is broad-based and extensive, and armed conflicts among great nations are curtailed -it needs to sustain not just resolve, but relative power. That, in turn, will require acknowledging the
uncomfortable truth that global power and wealth are shifting at an unprecedented pace, with profound implications.
Moreover, many of the challenges America faces are exacerbated by vulnerabilities that are largely self-created, chief among them fiscal policy.
Much more quickly and comprehensively than is understood, those vulnerabilities are reducing America's freedom of action and its ability to
influence others. Preserving
America's international position will require it to restore its economic vitality
and make policy choices now that pay dividends for decades to come. America has to prioritize and to act. Fortunately, the United States still
enjoys greater freedom to determine its future than any other major power, in part because many of its
problems are within its ability to address. But this process of renewal must begin with analyzing America's
competitive position and understanding the gravity of the situation Americans face.
Now is key – trust in Internet business is being eroded every day by government
surveillance –Internet surveillance restrictions are vital to solve
Gross 14 (Grant, Washington, D.C., correspondent for IDG News Service, covers legislation and
regulation related to the technology and telecommunications, contributor to PCWorld, “Snowden leaks
after one year: Wrangling over the meaning of 'bulk'”,
http://www.pcworld.com/article/2361120/snowden-leaks-after-one-year-wrangling-over-the-meaning-ofbulk.html)
The Snowden leaks have forced a national conversation that’s necessary and important, but policymakers “haven’t
waved the flag and said, ‘what was happening before will not happen again,’” Castro said. While some policy
debates in Washington, D.C., take years to play out, speed is important in this case , as other nations look for alternatives to U.S.
tech products, Castro said. “There’s basically a clock on this,” he said. “If you don’t address this in a certain period
you lose out on long-term competitiveness. Every day you don’t address
this, you’re losing out.” Castro doesn’t expect the controversy over the surveillance to die down. “It’s
of time,
defining the brand of American tech companies as something that is both insecure and available to
government surveillance,” he said. “Once you’re branded a certain way, it’s really hard to shake.” This week, the CEOs of nine
major U.S. tech vendors—including Facebook, Google and Apple—wrote a letter to senators, calling
on them to strengthen the USA Freedom Act. “ Confidence in the Internet , both in the U.S. and internationally,
has been badly damaged over the last year, ” the letter said. “It is time for action. As the Senate takes up
this important legislation, we urge you to ensure that U.S. surveillance efforts are clearly restricted by
law, proportionate to the risks, transparent, and subject to independent oversight.”
Repealing the Patriot Act and 2008 FAA restores need for a uniform probablecause-based warrant standard for all surveillance and prevents government from
backdooring encryption software. This solves trust in our tech companies and cloud
services.
Christopher Zara, October 19 2013, “Hope For The Surveillance State Repeal Act? HR 2818 Gains
Support Among House Democrats,” International Business Times, http://www.ibtimes.com/hopesurveillance-state-repeal-act-hr-2818-gains-support-among-house-democrats-1432772, KEL
Congressional support is growing for a bill that would roll back privacy regulations to what they were
before 9/11. H.R.2818, introduced this summer by Rep. Rush Holt, D-N.J., has gained five cosponsors this month, all Democrats. Also known as
the Surveillance State Repeal Act, the bill would repeal the USA Patriot Act of 2001 and the FISA
Amendments Act of 2008. Both laws have received harsh criticism since classified information leaked by Edward Snowden revealed widespread
electronic surveillance by the National Security Agency and the Federal Bureau of Investigation. “Instead of using these powers to zero in on the tiny number of real
terrorist threats we face, the executive branch turned these surveillance powers against the American people as a whole,” Holt said in a July statement. “My legislation
would put a stop to that right now.” Holt said the
bill would restore a “uniform probable-cause-based warrant standard for
surveillance requests,” while also prohibiting the U.S. government from forcing tech companies to create
“back doors” that make spying on the public easier. He added that people should be treated as “citizens first, not suspects.” Last month,
the New York Times editorial board endorsed the bill, citing specifically the provision that would bar the
government from requiring software makers to create ways for the government to bypass encryption.
Privacy and tech-industry advocates say such provisions weaken consumer trust in American tech
companies’ abilities to safeguard private data . One recent report showed that the U.S. cloudcomputing industry could lose up to $35 billion over the next few years as a result of NSA
surveillance and the negative press associated with it.
Advantage Two – US/EU
We have two scenarios – First is Trade
PRISM has placed the US-EU Safe Harbor Agreement on the brink
Devika Kornbacher May 5, 2015, attorney at Vinson & Elkins LLP, “The US-EU Safe Harbor
Program: Is It Safe?,” Law360, http://www.law360.com/articles/642603/the-us-eu-safe-harbor-programis-it-safe, KEL
Following the revelations by Edward Snowden regarding the U.S. government’s mass surveillance programs,
European Union lawmakers and data privacy advocates have stepped up efforts to increase data protection
measures for EU citizens. One program that became an immediate target for attack was the U.S.-EU Safe
Harbor Program. EU law allows companies to transfer EU citizens’ personal data outside of the EU only
to countries deemed to have an “adequate” level of privacy protection. Because the EU does not feel that U.S. privacy
protection laws are “adequate,” the Safe Harbor permits companies to transfer EU citizen data to the United States only if those companies voluntarily certify that they
comply with certain data protection standards. With
more than 5,000 current registrants, the Safe Harbor is hugely
important to companies on both sides of the Atlantic. But the program is in jeopardy, and companies should consider measures to protect
themselves in the event the Safe Harbor is suspended.
Online surveillance is a major obstacle to TIPP passage – failure to reach a deal will
trigger global protectionism and undermine global trade
Sara Miller Llana July 8, 2013 “Will US-EU trade talks spur growth - or show globalization's limits?,”
http://www.csmonitor.com/World/Europe/2013/0708/Will-US-EU-trade-talks-spur-growth-or-showglobalization-s-limits, KEL
A trade deal would deeply integrate US-European relations at a time of drift, and during a rocky patch,
amid friction over American spying allegations. If it succeeds , some say it would create a more level playing field
with the rise of China and other emerging markets, as well as reinvigorate other global trade initiatives. Yet even if it
fails – and there are plenty who think that the obstacles such as agriculture and, most recently, data privacy are
insurmountable – a failure would be pivotal, showing that tariffs can be dropped but non-tariff barriers, which are often more cultural
in nature, remain stubborn. A failure, says Fredrik Erixon, the director of the European Center for International Political Economy (ECIPE) in
Brussels, “could
lead to a larger standstill in efforts to address 21st century trade barriers.”
Independent of TTIP, US internet surveillance has caused other countries to
demand data localization protectionism, which will fragment the internet, destroys
tech trade, and undermine all faith in US tech services, undermining overall US
growth
Seth Rosenblatt, Oct 8, 2014, “US spying scandal will 'break the Internet,' says Google's Schmidt,”
CNET.com, http://www.cnet.com/news/us-spying-scandal-will-break-the-internet-says-googles-schmidt/,
KEL
Some of the international pushback is in response to data collection by tech companies, not the US
government. Europe's new and controversial "right to be forgotten" law, which says European citizens have a right to ask search engines to remove any results
that might infringe on their privacy, is causing headaches for Google. Critics contend that Google policies placed data collection
over privacy. The tech execs on the panel were most upset and scared about international efforts to impose
"data localization," as Microsoft's Smith put it, referring to a burgeoning efforts by countries to force companies to
build data centers based within their borders. The cost of building data centers in each country that a tech
firm wants to do business in could wind up destroying US tech firms, Schmidt and Smith warned. Schmidt called data
localization a "national emergency." Tech titans have yet to go in-depth as to the actual financial impact data localization has had on them, but in addition to the costs
data localization could also subject the data to local
laws in a way that tech firms worry would erode user trust -- and their ability to trade on that trust -- even
further. Smith noted that 96 percent of the world does not live in the US, and that the American tech economy
depends on convincing them that American tech services are trustworthy. "Foreign data centers would
compromise American [economic] growth" and leadership, he said.
of having to build at least one separate data center for each country that demanded it,
AND, surveillance creates the perception of economic espionage – ensures other
nations retaliate against American businesses
John Villasenor, Contributor @ Forbes, “Why The NSA Leaks Will Lead To More Economic
Espionage Against American Companies”, 6/11/2013,
http://www.forbes.com/sites/johnvillasenor/2013/06/11/why-the-nsa-leaks-will-lead-to-more-economicespionage-against-american-companies/
What happens when an American economy built in significant part on intellectual property collides with overt second-class treatment of foreigners who entrust their data to American networks and systems? We’re about to find out.
, the world learned from the Guardian of an order from the F oreign I ntelligence S urveillance C ourt requiring Verizon to provide
NSA with “metadata” for all Verizon phone calls involving at least one party within the United States. Metadata can include the calling and receiving phone numbers, location of the parties, and call time and
duration, but not the actual audio content. A day later, the Washington Post described an NSA program called PRISM, which reportedly enables NSA to access data
On June 5
carried by “nine leading U.S. Internet companies” to extract “audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets.” In a pair of statements on June 6 and June 8,
Director of National Intelligence James R. Clapper explained that the “collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act” includes “extensive procedures . . . to ensure that only nonU.S. persons outside the U.S. are targeted,” and that “Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States.” Foreign
leaders, unsurprisingly, don’t find all of this particularly reassuring. As a spokesman for German Chancellor Angela Merkel quoted in the Washington Post observed, “you can safely assume that this is an issue that the chancellor will
bring up” when she meets President Obama in Berlin next week. European Commission Vice President Viviane Reding said, “This case shows that a clear legal framework for the protection of personal data is not a luxury or
the NSA leaks will have another, less
widely recognized consequence: They will significantly increase the level of state-sponsored economic
espionage directed against American companies. Why? Because many people overseas will view the NSA’s data collection itself as the defining attribute of the story,
constraint, but a fundamental right.” In addition to spurring discussion on the tension between civil liberties and antiterrorism policies,
with less consideration of the larger American security context that frames it. Some of them will conclude that leveling the playing field requires ramping up their own countries’ efforts to eavesdrop on data from American companies.
NSA is almost certainly using the data it gathers under PRISM and from Verizon (and perhaps other carriers) solely for identifying potential terrorism or espionage threats to the United States. It is exceedingly unlikely that NSA
But perception can sometimes matter as
much as reality , and some overseas observers appear to believe that the NSA surveillance has an economic
component. As Volker Perthes, director of the German Institute for International and Security Affairs, reportedly said, “The German business community is on high alert . . . The suspicion in large parts of the
would use PRISM, for example, to help an American company gain a competitive advantage in a bidding war against a foreign rival.
business sector is that Americans would also be interested in our patent applications.” Surveillance in the name of national security is still surveillance, and last week’s developments remind us all in irrefutable terms that nations have
often felt much freer to spy on foreigners than on their own citizens. What varies among nations is the set of priorities that motivate the eavesdropping. In the United States, national security provides the motivation. For some other
nations, the goal of maximizing economic success in the global marketplace is viewed as justifying espionage against foreign companies. Of course, state-sponsored economic espionage is as old as the concept of states itself. But
the NSA leaks will put wind in the sails of non-U.S. intelligence services aiming to ramp up
espionage targeting American businesses. Budgets for spying on American businesses will grow, and people to do the work will be easier to hire. According to the most recent
EMC-sponsored IDC Digital Universe Study, an estimated total of 2.8 billion terabytes of data were created and replicated globally in 2012. Some fraction that tsunami of data passes through networks accessible to foreign
intelligence services. And a small fraction of that, in turn, contains highly confidential information about the products, services, and future plans of American companies. When you start with a few billion terabytes, a fraction of a
And more than ever before, that information is at risk of being compromised and
used to America’s economic disadvantage.
fraction is still a lot of information.
Collapse of global trade results in extinction
Garten, 09 – professor at the Yale School of Management (Jeffrey, “The Dangers of Turning Inward”, 3/5, Wall Street Journal,
http://www.business.illinois.edu/aguilera/Teaching/WSJ09_Dangers_of_Turning_Inward.pdf)
historians look back on today's severe downturn, with its crumbling markets, rising unemployment and massive government interventions, they could well be busy analyzing how
would likely point to the growth
of economic nationalism as the root cause. Ordinary protectionism such as tariffs and quotas would be one aspect of this problem, but it won't be the worst
of it because a web of treaties and the enforcement capabilities of the World Trade Organization will constrain the most egregious behavior. Economic nationalism is
more insidious because it is broader, more subtle and subject to fewer legal constraints. It is a frame of mind
that casts doubt on the very assumption that we live in a single international market, and that relatively open borders are a virtue. It is based on a calculation that
despite all the talk about economic interdependence, nations can go it alone, and could be better off
Yet if
globalization -- the spread of trade, finance, technology and the movement of people around the world -- went into reverse. They
in doing so. True economic nationalists want above all to protect capital and jobs in their own countries. They see global commerce not as a win-win proposition but as a contest in
which there is a victor and a loser. They are thus not focused on international agreements to open the world economy; to the contrary, they are usually figuring out how to avoid international
The last time we saw sustained economic nationalism was in the 1930s, when capital
flows and trade among countries collapsed, and every country went its own way. World growth
went into a ditch, political ties among nations deteriorated, nationalism and populism combined to
create fascist governments in Europe and Asia, and a world war took place. It took at least a
generation for globalization to get back on track. There have been some bouts of inwardlooking governmental action since then, such as the early
commercial obligations.
1970s when the U.S. cut the dollar from its gold base and imposed export embargoes on soybeans and steel scrap. However, the economic conditions were not sufficiently bad for the trend to
sustain itself. The kind of economic nationalism we are seeing today is not yet extreme. It is also understandable. The polit ical pressures could hardly be worse. Over the last decade, the global
economy grew on average about 4% to 5%, and this year it will come to a grinding halt: 0.5% according to the International Monetary Fund, where projections usually err on the optimistic side.
World trade, which has grown much faster than global gross domestic product for many years, is projected to decline this year for the first time since 1982. Foreign direct investment last year
slumped by 10% from 2007. Most dramatically, capital flows into emerging market nations are projected to drop this year by nearly 80% compared to 2007. The aggregate figures don't tell the
story of what is unraveling in individual countries. In the last quarter of 2008, U.S. GDP dropped by 6.2% at an annual rate, the U.K. by 5.9%, Germany by 8.2%, Japan by 12.7% and South
Korea by 20.8%. Mexico, Thailand and Singapore and most of Eastern Europe are also in deep trouble. In every case, employment has been plummeting. So far popular demonstrations against
government policies have taken place in theU.K., France, Greece, Russia and throughout Eastern Europe. And the governments of Iceland and Latvia have fallen over the crisis. Governments
could therefore be forgiven if they are preoccupied above all with the workers and companies within their own borders. Most officials don't know what to do because they haven't seen this level
of distress before. They are living from day to day, desperately improvising and trying to hold off political pressure to take severe measures they know could be satisfying right now but cause
bigger damage later. Thinking about how their policies might affect other countries is not their main focus, let alone taking the time to try to coordinate them internationally. Besides, whether it's
in Washington, Brussels, Paris, Beijing, Brazilia or Tokyo, it is hard to find many top officials who wouldn't say that whatever measures they are taking that may undermine global commerce are
strictly temporary. They all profess that when the crisis is over, they will resume their support for globalization. They underestimate, however, how hard it could be to reverse course. Political
figures take comfort, too, from the global institutions that were not present in the 1930s -- the IMF, the World Bank and the World Trade Organization, all of which are assumed to be keeping
globalization alive. This is a false sense of security, since these institutions are guided by sovereign countries. Government officials often feel that because they are going to endless crisis summit
meetings -- the next big one is in London on April 2, when the world's top 20 nations will be assembling -- that some international coordination is actually taking place. This is mostly an illusion.
With a few exceptions, such as the so-called Plaza Agreements of 1984 when currencies were realigned, it is difficult to point to a meeting where anything major has been said and subsequently
Classic trade
protectionism is on the rise. In the first half of 2008, the number of investigations in the World Trade Organization relating to antidumping cases -- selling below cost -implemented. But as the pressure on politicians mounts, decisions are being made on an incremental and ad hoc basis that amounts to a disturbing trend.
was up 30% from the year before. Washington has recently expanded sanctions against European food products in retaliation for Europe's boycott against hormonetreated American beef -- an old
dispute, to be sure, but one that is escalating. In the last several months, the E.U. reintroduced export subsidies on butter and cheese. India raised tariffs on steel products, as did Russia on
imported cars. Indonesia ingenuously designated that just a few of its ports could be used to import toys, creating a trade-blocking bottleneck. Brazil and Argentina have been pressing for a
higher external tariff on imports into a South American bloc of countries called Mercosur. Just this week, the E.U. agreed to levy tariffs on American exports of biodiesel fuel, possibly a first shot
in what may become a gigantic trade war fought over different environmental policies -- some based on taxes, some on regulation, some on cap and trade -- being embraced by individual
countries. Much bigger problems have arisen in more non-traditional areas and derive from recent direct intervention of governments. The much-publicized "Buy America" provision of the U.S.
stimulus package restricts purchases of construction-related goods to many U.S. manufacturers, and although it is riddled with exceptions, it does reveal Washington's state of mind. The bailout
of GM and Chrysler is a purely national deal. Such exclusion against foreign firms is a violation of so-called "national treatment" clauses in trade agreements, and the E.U. has already put
Washington on notice that it will pursue legal trade remedies if the final bailout package is discriminatory. Uncle Sam is not the only economic nationalist. The Japanese government is offering
to help a broad array of its corporations -- but certainly not subsidiaries of foreign companies in Japan -- by purchasing the stock of these firms directly, thereby not just saving them but providing
an advantage over competition from non-Japanese sources. The French government has created a sovereign wealth fund to make sure that certain "national champions," such as carparts
manufacturer Valeo and aeronautics component maker Daher, aren't bought by foreign investors. Government involvement in financial institutions has taken on an anti-globalization tone. British
regulators are pushing their global banks to redirect foreign lending to the U.K. when credit is sorely needed and where it can be monitored. Just this past week, the Royal Bank of Scotland
announced it was closing shop in 60 foreign countries. Western European banks that were heavily invested in countries such as Hungary, the Czech Republic and the Baltics have pulled back
their credits, causing a devastating deflation throughout Eastern Europe. The Swiss are reportedly considering more lenient accounting policies for loans their banks make domestically as
opposed to abroad. This de-globalizing trend could well be amplified by Washington's effort to exercise tight oversight of several big financial institutions. Already AIG's prime Asian asset,
American International Assurance Company, is on the block. As the feds take an ever bigger stake in Citigroup, they may well force it to divest itself of many of its prized global holdings, such
as Banamex in Mexico and Citi Handlowy in Poland. It appears that new legislation under the Troubled Asset Relief Program will also restrict the employment of foreign nationals in hundreds of
American banks in which the government has a stake. Whether or not it goes into bankruptcy, General Motors will be pressed to sell many of its foreign subsidiaries, too. Even Chinese
multinationals such as Haier and Lenovo are beating a retreat to their own shores where the risks seem lower than operating in an uncertain global economy. The government in Beijing is never
far away from such fundamental strategic decisions. Then there is the currency issue. Economic nationalists are mercantilists. They are willing to keep their currency cheap in order to make their
exports more competitive. China is doing just that. A big question is whether other Asian exporters that have been badly hurt from the crisis -- Taiwan, South Korea and Thailand, for example -will follow suit. Competitive devaluations were a major feature of the 1930s. It's no accident that the European Union has called an emergency summit for this Sunday to consider what to do with
There are a number of reasons why economic nationalism could escalate
rising protectionism of all kinds.
. The recession
could last well beyond this year. It is also worrisome that the forces of economic nationalism were gathering even before the crisis hit, and have deeper roots than most people know. Congress
denied President Bush authority to negotiate trade agreements two years ago, fearing that America was not benefiting enough from open trade, and an effort to reform immigration was paralyzed
for years. Globally, international trade negotiations called the Doha Round collapsed well before Bear Stearns and Lehman Brothers did. Concerns that trade was worsening income distribution
were growing in every major industrial nation since the late 1990s.
Whenever countries turned inward over the past half-century,
Washington was a powerful countervailing force, preaching the gospel of globalization and open
markets for goods, services and capital . As the Obama administration works feverishly to fire up America's growth engines, patch up its financial system and
keep its housing market from collapsing further, and as its major long-term objectives center on health, education and reducing energy dependence on foreign sources, the country's
preoccupations are more purely domestic than at any time since the 1930s. In the past, American business leaders from companies such as IBM, GE, Goldman Sachs and, yes, Citigroup and
Merrill Lynch beat the drum for open global markets. As their share prices collapse, some voices are muted, some silenced. It is not easy to find anyone in America who has the stature and
courage to press for a more open global economy in the midst of the current economic and political crosswinds. And given that the global rot started in the U.S. with egregiously irresponsible
lending, borrowing and regulation, America's brand of capitalism is in serious disrepute around the world. Even if President Obama had the mental bandwidth to become a cheerleader for
globalization, America's do-as-I-say-and-not-as-I-do leadership has been badly compromised. If economic nationalism puts a monkey wrench in the wheels of global commerce, the damage
could be severe. The U.S. is a good example. It is inconceivable that Uncle Sam could mount a serious recovery without a massive expansion of exports -- the very activity that was responsible
for so much of America's economic growth during the middle of this decade. But that won't be possible if other nations block imports. For generations, the deficits that we have run this past
decade and the trillions of dollars we are spending now mean we will be highly dependent on foreign loans from China, Japan and other parts of the world. But these will not be forthcoming at
prices we can afford without a global financial system built on deep collaboration between debtors and creditors -- including keeping our market open to foreign goods and services. The Obama
administration talks about a super-competitive economy, based on high-quality jobs -- which means knowledge-intensive jobs. This won't happen if we are not able to continue to bring in the
brightest people from all over the world to work and live here. Silicon Valley, to take one example, would be a pale shadow of itself without Indian, Chinese and Israeli brain power in its midst.
More generally, without an open global economy, worldwide industries such as autos, steel, banking and telecommunications cannot be rationalized and restructured efficiently, and we'll be
doomed to have excessive capacity and booms and busts forever. The big emerging markets such as China, India, Brazil, Turkey and South Africa will never be fully integrated into the world
economy, depriving them and us of future economic growth. The productivity of billions of men and women entering the global workforce will be stunted to everyone's detriment. Of course, no
one would say that globalization is without its problems. Trade surges and products made by low-priced labor can lead to job displacement and increasing income inequality. Proud national
cultures can be undermined. But these challenges can be met by reasonable regulation and by domestic policies that provide a strong social safety net and the kind of education that helps people
acquire new skills for a competitive world. With the right responses of governments, the benefits should far outweigh the disadvantages.
For thousands of years,
globalization has increased global wealth, individual choice and human freedom. The point is, economic
nationalism, with its implicit autarchic and save-yourself character, embodies exactly the wrong spirit and runs in precisely the
wrong direction from the global system that will be necessary to create the future we all want . As
happened in the 1930s, economic nationalism is also sure to poison geopolitics. Governments under
economic pressure have far fewer resources to take care of their citizens and to deal with rising
anger and social tensions. Whether or not they are democracies, their tenure can be threatened by
popular resentment. The temptation for governments to whip up enthusiasm for something that
distracts citizens from their economic woes -- a war or a jihad against unpopular minorities, for example -is great. That's not all. As an economically enfeebled South Korea withdraws foreign aid from North
Korea, could we see an even more irrational activity from Pyongyang? As the Pakistani economy
goes into the tank, will the government be more likely to compromise with terrorists to alleviate at least one source
of pressure? As Ukraine strains under the weight of an IMF bailout, is a civil war with Cold War
overtones between Europe and Russia be in the cards? And beyond all that, how will economically embattled
and inward-looking governments be able to deal with the critical issues that need global resolution
such as control of nuclear weapons , or a treaty to manage climate change, or help to the hundreds
of millions of people who are now falling back into poverty?
Second is Relations PRISM surveillance has tanked US-EU relations – ending the program is key to
restoring them
Zack Whittaker, Nov 27, 2013, “Realizing it's the underdog post-PRISM, EU lays out new BFF pact
with the U.S.,” ZDNET, http://www.zdnet.com/article/realizing-its-the-underdog-post-prism-eu-lays-outnew-bff-pact-with-the-u-s/, KEL
In efforts to get the "special relationship" back on track after months of painful political rhetoric and
frenemy-like relations, the European Commission wants to rekindle its trans-Atlantic love with its American
partners. But it comes with conditions. And if America doesn't play ball, the rift could get significantly
wider . The EU on Wednesday threw down its demands — albeit in a somewhat subdued typical softly-softly European way now that the 28 member state bloc
has taken time to breathe and think this one through — and hopes its U.S. counterparts bites at the chance to restore relations with its trans-Atlantic friend.
Tensions between the two continents have never been as strained as they are today. It all stems from the
revelations from the Edward Snowden house of leaks, which disclosed the massive surveillance operation by the U.S.
government by its National Security Agency (NSA).
US-EU relations key to solve global war
O'Sullivan, 4 -- National Interest editor (John, Nixon Center for Peace and Freedom Distinguished
Fellow in International Relations, "Europe and the Establishment," The National Interest, 7-31-2004,
nationalinterest.org/article/europe-and-the-establishment-2608)
The report's starting point -- that U.S.-European relations
are extremely important -- is undeniable. A united Western
alliance would shape world institutions in line with values and practices rooted in liberty and democracy and coax rising
powers such as India and China into going along with this international status quo for the foreseeable future. Indeed, this is already
happening as China accepts liberal economic rules at home in order to enter institutions such as the G7 and the World Trade Organization. By
contrast, a
disunited West would tempt such powers to play off Europe and America against each other and
foster a global jockeying for power not unlike the maneuvering between a half-dozen great powers that led to 1914.
Plan solves global protectionism against US tech firms and increases US trade
negotiation credibility
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
RECOMMENDATIONS The
free and open Internet that powers the globally networked economy is dependent
on the ability of individuals and companies to engage in commerce without geographic restrictions. To
turn back the tide of technology protectionism, U.S. trade negotiators will need a stronger hand to
play . They cannot go to other nations and tell them to not discriminate against U.S. tech firms if the U.S.
intelligence system continues to follow policies that threaten their citizens and businesses. As a result, it is
incumbent on the Congress and the Obama administration to take the lead in showing the world
the best standards for transparency, cooperation, and accountability . First, the U.S. government
should be forthcoming and transparent about its surveillance practices and clearly inform the public about
the data it collects domestically and abroad. The U.S. government should set the gold standard for international transparency
requirements, so that it is clear what information both U.S. and non - U.S. companies are disclosing to governments at home and abroad. The U.S.
government should then work with its allies to create an international transparency requirement that illuminates when countries conduct
surveillance that accesses foreign companies’ information. Second,
the U.S. government should draw a clear line in the
sand and declare that the policy of the U.S. government is to strengthen not weaken information security.
The U.S. Congress should pass legislation, such as the Secure Data Act introduced by Sen. Wyden (D - OR) , banning any
government efforts to introduce backdoors in software or weaken encryption. 43 In the short term, President Obama,
or his successor, should sign an executive order formalizing this policy as well. In addition, when U.S. government agencies discover
vulnerabilities in software or hardware products, they should responsibly notify these companies in a timely manner so that the companies can fix
these flaws. The best way to protect U.S. citizens from digital threats is to promote strong cyber security practices in the private sector.
Iowa Plan-1st Version
Plan Text
Plan: Domestic online surveillance authority under the USA PATRIOT Act, Foreign
Intelligence Surveillance Act of 1978 Amendments Act of 2008, and Executive Order
12333 should be repealed and any requirement for manufacturers of electronic
devices or software to provide bypasses for encryption will be prohibited.
Observation 1: Inherency
The 2008 FISA Amendment Act (FAA) removed the probable cause standard
requiring warrants for surveillance, allowing sweeping NSA electronic surveillance
of US citizens and communication within the US. There’s no effective oversight of
these programs now.
Margot Kaminski June 7, 2013, executive director of the Information Society Project at Yale Law
School; She is a graduate of Harvard University and Yale Law School and a former fellow of the
Information Society Project. While at Yale Law School, she was a Knight Law and Media Scholar and
co-founder of the Media Freedom and Information Access Practicum. Following graduation from Yale
Law School, she clerked for The Honorable Andrew J. Kleinfeld of the Ninth Circuit Court of Appeals.
She has been a Radcliffe Research Fellow at Harvard and a Google Policy Fellow at the Electronic
Frontier Foundation, PRISM's Legal Basis: How We Got Here, and What We Can Do to Get Back,” The
Atlantic, http://www.theatlantic.com/national/archive/2013/06/prisms-legal-basis-how-we-got-here-andwhat-we-can-do-to-get-back/276667/, KEL
First, there is the question of whom the surveillance targets.
PRISM spies on Americans. The Director of National Intelligence emphasized yesterday that PRISM targets
only " non-U.S. persons located outside the United States ." But the press release also acknowledges that "information about U.S. persons" may be "incidentally acquired" in such pursuits.
The current scope of this "incidental"
surveillance will shock most Americans. Before 2008, the law limited "incidental" surveillance by limiting primary surveillance. The
government had to show probable cause that its surveillance target was the agent of a foreign power,
and that the facility being watched was about to be used by that target. You could be incidentally observed if you communicated with a
targeted foreign agent, but otherwise foreign communications were likely to be unmonitored. But in 2008, the FISA Amendments Act (FISAAA)
changed this . The government now does not need to show probable cause that the target is a foreign agent. It need only have a "reasonable
belief" that the target is located outside of the United States. The new version of FISA does not require the
government to identify its targets; it does not require the government to identify the monitored facilities; and
the purpose of foreign intelligence gathering attaches to the whole surveillance program, not the individual investigation. That is to say: the FISA Amendments Act
permits the government to obtain a single court order through which it can monitor thousands, or even
millions, of people. The scope of "incidental" surveillance thus vastly expanded as Congress lowered the requirements for spying on the primary target. Such a system
will inevitably sweep in untold numbers of Americans who communicate with foreigners. And because the government
Targeting is not the same as collecting; the program may "target" foreign persons, but "acquire" information on Americans.
need have only a "reasonable belief" that the target is outside the United States--which it is interpreting according to the Washington Post as a 51% chance that the target is outside the U.S.--this
system will undoubtedly sweep in purely domestic communications as well.
This brings us to the issue of oversight: who is watching the watchers? The Director
of National Intelligence assures us that PRISM is "subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress." It is true that in December 2012
Congress renewed the law that allows PRISM to exist. But what kind of oversight did Congress actually provide? When Senators Ron Wyden and Mark Udall asked whether communications by
Americans had been gathered under the law, the Director of National Intelligence responded that it was not possible to identify the number of people in the United States whose communications
At the core of the
problem is that the Foreign Intelligence Surveillance Court (FISA Court), which meets in secret and does not publish its
opinions, itself does not provide adequate oversight. When Congress changed the standard for targeting
foreign individuals in 2008 , it abolished the ability of the FISA Court to evaluate whether the
government had any real cause to target an individual or group of individuals. The Supreme Court itself disputes whether the
were reviewed. How effective can Congressional oversight be if Congress does not understand the scope and nature of the programs it has authorized?
FISA Court enforces the Fourth Amendment. The "minimization procedures" touted by the Director of National Intelligence as adequate privacy safeguards are established by the government,
evaluated by the government, and are subject to review by a secret court--if review occurs at all. And as a general practice, FISA "minimization" hasnot been true minimization: it occurs after
information is already acquired. The existence of PRISM and the Verizon metadata program, both authorized by the FISA Court, confirms that a secret court broadly authorized by an uninformed
Congress will not adequately protect the Fourth and First Amendment rights of American citizens on American soil.
The 2015 USA Freedom Act does NOTHING to reform PRISM and sent a signal
that should trigger all negative disadvantages.
Fred Kaplan June 8, 2015, author of The Insurgents: David Petraeus and the Plot to Change the
American Way of War, is writing a book on the history of cyberwar, “The NSA Debate We Should Be
Having,” Slate Magazine,
http://www.slate.com/articles/news_and_politics/war_stories/2015/06/the_national_security_agency_s_su
rveillance_and_the_usa_freedom_act_the.html, KEL
One week after Congress voted to stop the National Security Agency from collecting and storing millions of
Americans’ phone records, partisans on both sides are exaggerating the significance of this new reform.
NSA supporters lament the loss of a key tool for fighting terrorists , while the agency’s critics hail
the new law as (in Edward Snowden’s words) an “historic victory for the rights of every citizen, ” with some calling its
passage a vindication of Snowden himself as an authentic whistleblower who should be let back home as a hero, not a convict. Both sides are off the
mark. The NSA’s bulk collection of telephone metadata was the subject of the first news stories based on the trove of highly classified documents that Snowden
leaked, and it stirred the biggest commotion. But in fact the metadata program never comprised more than a tiny percentage of the agency’s vast and global
surveillance net. The new law’s reform measure—to keep the metadata stored with the telecom companies, allowing NSA access only to specified materials, and then
only through the Foreign Intelligence Surveillance Court—was first proposed not by some libertarian critic but by Gen. Keith Alexander, then-director of the NSA.
Under the system that has been in effect, as authorized by Section 215 of the Patriot Act (or, rather, by the FISA court’s now-discredited reading of that section), the
NSA routinely collected metadata from some of the biggest cellular companies—not the contents of conversations, but the phone numbers, dates, times, and duration
of the calls. If someone inside the United States called a number linked to one of three terrorist organizations (including al-Qaida), an NSA alert system would note
that fact. The NSA could then ask the FISA Court for permission to search the database for a list of all the other numbers that the American phone had called, as well
as all the numbers that those numbers had called, going back as far as five years. If this search revealed a suspicious pattern, the NSA would turn the materials over to
the FBI, which could seek a warrant to listen to conversations. Under the new reform law, called the USA Freedom Act, the NSA would no longer possess the
database, so it would seek a FISA court order to get it from the telecom companies—and the FISA court would now include a privacy advocate who could argue
against relinquishing the data. If the court sided with the NSA, what happened next would be exactly the same as before the new law passed. So, it’s not exactly a
giant step in the annals of either national-security risk or civil liberties reform—unless one of two things had been true. First, if the NSA had been abusing the
process—if analysts or senior officials had been searching metadata for personal, political, or vindictive purposes—the changes in custody and oversight would have a
huge impact. But neither Snowden’s documents nor any subsequent probes have uncovered any such evidence. Second, if authoritarians or worse—say, modern-day
versions of Richard Nixon and J. Edgar Hoover—were to come to power, they could suspend the internal controls at NSA and use the agency’s vast databases to track
domestic enemies or any target of their choosing. In that case, the Freedom Act would serve as a powerful brake to oppression: Because the government would no
longer possess the data, it couldn’t exploit the data. That is the real—and the intended—effect of the reform: not so much to change the way surveillance technology is
used today, but rather to limit the potential for abuse in the future. For now, surveillance through telephone metadata is pretty sparse. In 2012, the NSA queried the
database for 288 U.S. telephone numbers. As a result of those queries, the agency passed just 12 tips to the FBI. None of those tips led to the capture of a single
terrorist or the halting of a terrorist plot. In fact, according to President Obama’s independent commission on NSA reform, the telephone metadata program has never
had any impact on countering terrorism. A
separate program called PRISM—authorized under Section 702 of the
Foreign Intelligence Surveillance Act—lets the NSA track foreign terrorists and adversaries by
intercepting their Internet traffic as it zips through U.S.–based servers. (Because of the nature of the technology, about 80
percent of the world’s Internet traffic passes through U.S. servers at some point.) PRISM was another highly classified
NSA program that Snowden uncovered. The Washington Post and the Guardian made it the subject of their Day 2 Snowden stories (right after the revelations about
telephone metadata). Yet PRISM
isn’t touched at all by the USA Freedom Act, nor does any serious politician
propose overhauling it. This is the case, even though PRISM data-mining is a much bigger program than
telephone metadata ever was, and it’s potentially more intrusive, since it’s hard to know whether, at first glance, an IP address
belongs to an American or a foreigner.
Observation 2: Solvency
Repealing the Patriot Act and 2008 FAA restores need for a uniform probablecause-based warrant standard for all surveillance and prevents government from
backdooring encryption software. This solves trust in our tech companies and cloud
services.
Christopher Zara, October 19 2013, “Hope For The Surveillance State Repeal Act? HR 2818 Gains
Support Among House Democrats,” International Business Times, http://www.ibtimes.com/hopesurveillance-state-repeal-act-hr-2818-gains-support-among-house-democrats-1432772, KEL
Congressional support is growing for a bill that would roll back privacy regulations to what they were
before 9/11. H.R.2818, introduced this summer by Rep. Rush Holt, D-N.J., has gained five cosponsors this month, all Democrats. Also known as
the Surveillance State Repeal Act, the bill would repeal the USA Patriot Act of 2001 and the FISA
Amendments Act of 2008. Both laws have received harsh criticism since classified information leaked by Edward Snowden revealed widespread
electronic surveillance by the National Security Agency and the Federal Bureau of Investigation. “Instead of using these powers to zero in on the tiny number of real
terrorist threats we face, the executive branch turned these surveillance powers against the American people as a whole,” Holt said in a July statement. “My legislation
would put a stop to that right now.” Holt said the
bill would restore a “uniform probable-cause-based warrant standard for
surveillance requests,” while also prohibiting the U.S. government from forcing tech companies to create
“back doors” that make spying on the public easier. He added that people should be treated as “citizens first, not suspects.” Last month,
the New York Times editorial board endorsed the bill, citing specifically the provision that would bar the
government from requiring software makers to create ways for the government to bypass encryption.
Privacy and tech-industry advocates say such provisions weaken consumer trust in American tech
companies’ abilities to safeguard private data . One recent report showed that the U.S. cloudcomputing industry could lose up to $35 billion over the next few years as a result of NSA
surveillance and the negative press associated with it.
Plan solves global protectionism against US tech firms and increases US trade
negotiation credibility
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
RECOMMENDATIONS The
free and open Internet that powers the globally networked economy is dependent
on the ability of individuals and companies to engage in commerce without geographic restrictions. To
turn back the tide of technology protectionism, U.S. trade negotiators will need a stronger hand to
play . They cannot go to other nations and tell them to not discriminate against U.S. tech firms if the U.S.
intelligence system continues to follow policies that threaten their citizens and businesses. As a result, it is
incumbent on the Congress and the Obama administration to take the lead in showing the world
the best standards for transparency, cooperation, and accountability . First, the U.S. government
should be forthcoming and transparent about its surveillance practices and clearly inform the public about
the data it collects domestically and abroad. The U.S. government should set the gold standard for international transparency
requirements, so that it is clear what information both U.S. and non - U.S. companies are disclosing to governments at home and abroad. The U.S.
government should then work with its allies to create an international transparency requirement that illuminates when countries conduct
surveillance that accesses foreign companies’ information. Second,
the U.S. government should draw a clear line in the
sand and declare that the policy of the U.S. government is to strengthen not weaken information security.
The U.S. Congress
should pass legislation, such as the Secure Data Act introduced by Sen. Wyden (D - OR) , banning any
government efforts to introduce backdoors in software or weaken encryption. 43 In the short term, President Obama,
or his successor, should sign an executive order formalizing this policy as well. In addition, when U.S. government agencies discover
vulnerabilities in software or hardware products, they should responsibly notify these companies in a timely manner so that the companies can fix
these flaws. The best way to protect U.S. citizens from digital threats is to promote strong cyber security practices in the private sector.
Advantage One – Cloud Competitiveness
PRISM revelations and the weak response with US Freedom Act has caused other
nations to retaliate against our information tech sector and undermined our tech
sector competitiveness
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
Almost two years ago, ITIF described how revelations
about pervasive digital surveillance by the U.S. intelligence
community could severely harm the competitiveness of the United States if foreign customers turned
away from U.S. - made technology and services. 1 Since then, U.S. policymakers have failed to take sufficient
action to address these surveillance concerns; in some cases, they have even fanned the flames of
discontent by championing weak information security practices. 2 In addition, other countries have used anger
over U .S. government surveillance as a cover for implementing a new wave of protectionist policies
specifically targeting information technology. The combined result is a set of policies both at home and
abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises
of improved national security.
US competitiveness in the $241 billion global cloud market is key to US innovation,
economic growth, and job growth
Digital 4th, January 2015, Digital 4th is a bipartisan coalition dedicated to reforming and modernizing
our country’s 4th Amendment privacy rights, “U.S. Competitiveness in Cloud Computing: Updating the
Standard for Government Access to Stored Communications,” http://www.digital4th.org/wpcontent/uploads/2015/01/Issue_Brief-2-ECPA-and-the-Cloud.pdf, KEL
Businesses all over the world are looking to cloud - based services for their information management
needs in order to save money on equipment and to achieve better computing reliability and data security.
Cloud based services allow companies to expand their computing capacity quickly – particularly valuable for start - up businesses and
entrepreneurs. Such services give employees the flexibility to share information and collaborate. The
global cloud market is
expected to expand to $241 billion by 2020. American companies have been the global leaders in cloud
computing, and cloud computing has been an engine for U.S. - based innovation, economic growth, and
job creation.
Maintaining US economic growth is key to global economic growth
Rich Miller, January 9, 2015, “U.S. Retakes the Helm of the Global Economy,” Bloomberg News,
http://www.bloomberg.com/news/articles/2015-01-09/u-s-retakes-the-helm-of-the-global-economy, KEL
The U.S. is back in the driver’s seat of the global economy after 15 years of watching China and emerging
markets take the lead. The world’s biggest economy will expand by 3.2 percent or more this year, its best
performance since at least 2005, as an improving job market leads to stepped-up consumer spending, according to economists at JPMorgan Chase
& Co., Deutsche Bank AG and BNP Paribas SA. That outcome would be about what each foresees for the world economy as a whole and would
be the first time since 1999 that America hasn’t lagged behind global growth, based on data from the International Monetary Fund. “The
U.S.
is again the engine of global growth,” said Allen Sinai, chief executive officer of Decision Economics in New York. “The economy
is looking stellar and is in its best shape since the 1990s.”
Economic decline causes global wars – empirically proven
Royal, '10 (Jedediah, Director of Cooperative Threat Reduction Program -- DOD, Economics of War &
Peace: Legal and Political Perspectives, ed. Goldsmith & Brauer, p. 213-15)
Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political
science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defence behaviour of
interdependent states. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow.
First, on the systemic level, Pollins (2008) advances Modelski and Thompson's (1996) work on leadership cycle theory, finding that rhythms
in the global economy are associated with the rise and fall of a pre-eminent power and the oftenbloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as
economic crises could usher in a redistribution or relative power (see also Gilpin. 1981) that leads to
uncertainty about power balances, increasing the risk of miscalculation (Fearon. 1995). Alternatively, even a
relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to
challenge a declining power (Werner, 1999). Separately, Pollins ( L 996) also shows that global economic cycles combined with
parallel leadership cycles impact the likelihood of conflict among major, medium and small powers, although he suggests that the causes and
connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland's (1996. 2000)
theory of trade expectations suggests that future expectation of trade' is a significant variable in understanding economic conditions and security
behaviour of states. He argues that interdependent states arc likely to gain pacific benefits from trade so long as they have an optimistic view of
future trade relations. However, if
the expectations of future trade decline, particularly for difficult to replace
items such as energy resources, the likelihood for conflict increases, as states will be inclined to use
force to gain access to those resources. Crises could potentially be the trigger for decreased trade
expectations either on its own or because it triggers protectionist moves by interdependent states .
Third, others have considered the link between economic decline and external armed conflict at a national level. Blomberg and Hess
(2002) find a strong correlation between internal conflict and external conflict, particularly during
periods of economic downturn. They write, “The linkages between internal and external conflict and
prosperity are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict,
which in turn returns the favour. Moreover, the presence of a recession tends lo amplify the extent to
which international and external conflict self-reinforce each other. (Blomberg & Hess 2002. p. 89) Economic
decline has also been linked with an increase in the likelihood of terrorism (Blomberg. Hess. & Weerapana,
2004), which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the
popularity of a sitting government. 'Diversionary theory’ suggests that when facing unpopularity arising from economic decline,
sitting governments have increased incentives to fabricate external military conflicts to create a rally around the flag effect. Wang (1996),
DeRouen ( 1995), and Blomberg. Hess, and Thacker (2006) find supporting evidence showing that economic decline and use of force are at least
indirectly correlated. Gelpi (1997), Miller (1999), and Kisangani and Pickering (2009) suggest that the tendency towards diversionary tactics arc
greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from
office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United
States and thus weak Presidential popularity arc statistically linked to an increase in the use of force. In summary, recent economic scholarship
positively correlates economic integration with an increase in the frequency or economic crises, whereas political science scholarship links
economic decline with external conflict at systemic, dyadic and national levels. This implied connection between integration, crises and armed
conflict has not featured prominently in the economic-security debate and deserves more attention.
Independently, US competitiveness solves great power war – it solves all imapcts
Colby 14 (Elbridge, the Robert M. Gates fellow at the Center for a New American Security; and Paul
Lettow, was senior director for strategic planning on the U.S. National Security Council staff from 2007
to 2009, 7/3/14, “Have We Hit Peak America?,”
http://www.foreignpolicy.com/articles/2014/07/03/have_we_hit_peak_america)
Many foreign-policy
experts seem to believe that retaining American primacy is largely a matter of will -- of how
America chooses to exert its power abroad. Even President Obama, more often accused of being a prophet of decline than a booster of America's
future, recently asserted that the United States "has rarely been stronger relative to the rest of the world." The question, he continued, is "not whether America will
lead, but how we will lead." But
will is unavailing without strength. If the United States wants the international
system to continue to reflect its interests and values -- a system, for example, in which the global commons are
protected, trade is broad-based and extensive, and armed conflicts among great nations are curtailed -it needs to sustain not just resolve, but relative power. That, in turn, will require acknowledging the
uncomfortable truth that global power and wealth are shifting at an unprecedented pace, with profound implications.
Moreover, many of the challenges America faces are exacerbated by vulnerabilities that are largely self-created, chief among them fiscal policy.
Much more quickly and comprehensively than is understood, those vulnerabilities are reducing America's freedom of action and its ability to
influence others. Preserving
America's international position will require it to restore its economic vitality
and make policy choices now that pay dividends for decades to come. America has to prioritize and to act. Fortunately, the United States still
enjoys greater freedom to determine its future than any other major power, in part because many of its
problems are within its ability to address. But this process of renewal must begin with analyzing America's
competitive position and understanding the gravity of the situation Americans face.
Now is key – trust in Internet business is being eroded every day by government
surveillance –Internet surveillance restrictions are vital to solve
Gross 14 (Grant, Washington, D.C., correspondent for IDG News Service, covers legislation and
regulation related to the technology and telecommunications, contributor to PCWorld, “Snowden leaks
after one year: Wrangling over the meaning of 'bulk'”,
http://www.pcworld.com/article/2361120/snowden-leaks-after-one-year-wrangling-over-the-meaning-ofbulk.html)
The Snowden leaks have forced a national conversation that’s necessary and important, but policymakers “haven’t
waved the flag and said, ‘what was happening before will not happen again,’” Castro said. While some policy
debates in Washington, D.C., take years to play out, speed is important in this case , as other nations look for alternatives to U.S.
tech products, Castro said. “There’s basically a clock on this,” he said. “If you don’t address this in a certain period
you lose out on long-term competitiveness. Every day you don’t address
this, you’re losing out.” Castro doesn’t expect the controversy over the surveillance to die down. “It’s
of time,
defining the brand of American tech companies as something that is both insecure and available to
government surveillance,” he said. “Once you’re branded a certain way, it’s really hard to shake.” This week, the CEOs of nine
major U.S. tech vendors—including Facebook, Google and Apple—wrote a letter to senators, calling
on them to strengthen the USA Freedom Act. “ Confidence in the Internet , both in the U.S. and internationally,
has been badly damaged over the last year, ” the letter said. “It is time for action. As the Senate takes up
this important legislation, we urge you to ensure that U.S. surveillance efforts are clearly restricted by
law, proportionate to the risks, transparent, and subject to independent oversight.”
Advantage Two – US/EU
We have two scenarios – First is Trade
PRISM has placed the US-EU Safe Harbor Agreement on the brink
Devika Kornbacher May 5, 2015, attorney at Vinson & Elkins LLP, “The US-EU Safe Harbor
Program: Is It Safe?,” Law360, http://www.law360.com/articles/642603/the-us-eu-safe-harbor-programis-it-safe, KEL
Following the revelations by Edward Snowden regarding the U.S. government’s mass surveillance programs,
European Union lawmakers and data privacy advocates have stepped up efforts to increase data protection
measures for EU citizens. One program that became an immediate target for attack was the U.S.-EU Safe
Harbor Program. EU law allows companies to transfer EU citizens’ personal data outside of the EU only
to countries deemed to have an “adequate” level of privacy protection. Because the EU does not feel that U.S. privacy
protection laws are “adequate,” the Safe Harbor permits companies to transfer EU citizen data to the United States only if those companies voluntarily certify that they
comply with certain data protection standards. With
more than 5,000 current registrants, the Safe Harbor is hugely
important to companies on both sides of the Atlantic. But the program is in jeopardy, and companies should consider measures to protect
themselves in the event the Safe Harbor is suspended.
Online surveillance is a major obstacle to TIPP passage – failure to reach a deal will
trigger global protectionism and undermine global trade
Sara Miller Llana July 8, 2013 “Will US-EU trade talks spur growth - or show globalization's limits?,”
http://www.csmonitor.com/World/Europe/2013/0708/Will-US-EU-trade-talks-spur-growth-or-showglobalization-s-limits, KEL
A trade deal would deeply integrate US-European relations at a time of drift, and during a rocky patch,
amid friction over American spying allegations. If it succeeds , some say it would create a more level playing field
with the rise of China and other emerging markets, as well as reinvigorate other global trade initiatives. Yet even if it
fails – and there are plenty who think that the obstacles such as agriculture and, most recently, data privacy are
insurmountable – a failure would be pivotal, showing that tariffs can be dropped but non-tariff barriers, which are often more cultural
in nature, remain stubborn. A failure, says Fredrik Erixon, the director of the European Center for International Political Economy (ECIPE) in
Brussels, “could
lead to a larger standstill in efforts to address 21st century trade barriers.”
Independent of TTIP, US internet surveillance has caused other countries to
demand data localization protectionism, which will fragment the internet, destroys
tech trade, and undermine all faith in US tech services, undermining overall US
growth
Seth Rosenblatt, Oct 8, 2014, “US spying scandal will 'break the Internet,' says Google's Schmidt,”
CNET.com, http://www.cnet.com/news/us-spying-scandal-will-break-the-internet-says-googles-schmidt/,
KEL
Some of the international pushback is in response to data collection by tech companies, not the US
government. Europe's new and controversial "right to be forgotten" law, which says European citizens have a right to ask search engines to remove any results
that might infringe on their privacy, is causing headaches for Google. Critics contend that Google policies placed data collection
over privacy. The tech execs on the panel were most upset and scared about international efforts to impose
"data localization," as Microsoft's Smith put it, referring to a burgeoning efforts by countries to force companies to
build data centers based within their borders. The cost of building data centers in each country that a tech
firm wants to do business in could wind up destroying US tech firms, Schmidt and Smith warned. Schmidt called data
localization a "national emergency." Tech titans have yet to go in-depth as to the actual financial impact data localization has had on them, but in addition to the costs
of having to build at least one separate data center for each country that demanded it, data
localization could also subject the data to local
laws in a way that tech firms worry would erode user trust -- and their ability to trade on that trust -- even
further. Smith noted that 96 percent of the world does not live in the US, and that the American tech economy
depends on convincing them that American tech services are trustworthy. "Foreign data centers would
compromise American [economic] growth" and leadership, he said.
AND, surveillance creates the perception of economic espionage – ensures other
nations retaliate against American businesses
John Villasenor, Contributor @ Forbes, “Why The NSA Leaks Will Lead To More Economic
Espionage Against American Companies”, 6/11/2013,
http://www.forbes.com/sites/johnvillasenor/2013/06/11/why-the-nsa-leaks-will-lead-to-more-economicespionage-against-american-companies/
What happens when an American economy built in significant part on intellectual property collides with overt second-class treatment of foreigners who entrust their data to American networks and systems? We’re about to find out.
, the world learned from the Guardian of an order from the F oreign I ntelligence S urveillance C ourt requiring Verizon to provide
NSA with “metadata” for all Verizon phone calls involving at least one party within the United States. Metadata can include the calling and receiving phone numbers, location of the parties, and call time and
duration, but not the actual audio content. A day later, the Washington Post described an NSA program called PRISM, which reportedly enables NSA to access data
On June 5
carried by “nine leading U.S. Internet companies” to extract “audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets.” In a pair of statements on June 6 and June 8,
Director of National Intelligence James R. Clapper explained that the “collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act” includes “extensive procedures . . . to ensure that only nonU.S. persons outside the U.S. are targeted,” and that “Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States.” Foreign
leaders, unsurprisingly, don’t find all of this particularly reassuring. As a spokesman for German Chancellor Angela Merkel quoted in the Washington Post observed, “you can safely assume that this is an issue that the chancellor will
bring up” when she meets President Obama in Berlin next week. European Commission Vice President Viviane Reding said, “This case shows that a clear legal framework for the protection of personal data is not a luxury or
the NSA leaks will have another, less
widely recognized consequence: They will significantly increase the level of state-sponsored economic
espionage directed against American companies. Why? Because many people overseas will view the NSA’s data collection itself as the defining attribute of the story,
constraint, but a fundamental right.” In addition to spurring discussion on the tension between civil liberties and antiterrorism policies,
with less consideration of the larger American security context that frames it. Some of them will conclude that leveling the playing field requires ramping up their own countries’ efforts to eavesdrop on data from American companies.
NSA is almost certainly using the data it gathers under PRISM and from Verizon (and perhaps other carriers) solely for identifying potential terrorism or espionage threats to the United States. It is exceedingly unlikely that NSA
But perception can sometimes matter as
much as reality , and some overseas observers appear to believe that the NSA surveillance has an economic
component. As Volker Perthes, director of the German Institute for International and Security Affairs, reportedly said, “The German business community is on high alert . . . The suspicion in large parts of the
would use PRISM, for example, to help an American company gain a competitive advantage in a bidding war against a foreign rival.
business sector is that Americans would also be interested in our patent applications.” Surveillance in the name of national security is still surveillance, and last week’s developments remind us all in irrefutable terms that nations have
often felt much freer to spy on foreigners than on their own citizens. What varies among nations is the set of priorities that motivate the eavesdropping. In the United States, national security provides the motivation. For some other
nations, the goal of maximizing economic success in the global marketplace is viewed as justifying espionage against foreign companies. Of course, state-sponsored economic espionage is as old as the concept of states itself. But
the NSA leaks will put wind in the sails of non-U.S. intelligence services aiming to ramp up
espionage targeting American businesses. Budgets for spying on American businesses will grow, and people to do the work will be easier to hire. According to the most recent
EMC-sponsored IDC Digital Universe Study, an estimated total of 2.8 billion terabytes of data were created and replicated globally in 2012. Some fraction that tsunami of data passes through networks accessible to foreign
intelligence services. And a small fraction of that, in turn, contains highly confidential information about the products, services, and future plans of American companies. When you start with a few billion terabytes, a fraction of a
And more than ever before, that information is at risk of being compromised and
used to America’s economic disadvantage.
fraction is still a lot of information.
Collapse of global trade results in extinction
Garten, 09 – professor at the Yale School of Management (Jeffrey, “The Dangers of Turning Inward”, 3/5, Wall Street Journal,
http://www.business.illinois.edu/aguilera/Teaching/WSJ09_Dangers_of_Turning_Inward.pdf)
historians look back on today's severe downturn, with its crumbling markets, rising unemployment and massive government interventions, they could well be busy analyzing how
would likely point to the growth
of economic nationalism as the root cause. Ordinary protectionism such as tariffs and quotas would be one aspect of this problem, but it won't be the worst
of it because a web of treaties and the enforcement capabilities of the World Trade Organization will constrain the most egregious behavior. Economic nationalism is
more insidious because it is broader, more subtle and subject to fewer legal constraints. It is a frame of mind
that casts doubt on the very assumption that we live in a single international market, and that relatively open borders are a virtue. It is based on a calculation that
despite all the talk about economic interdependence, nations can go it alone, and could be better off
Yet if
globalization -- the spread of trade, finance, technology and the movement of people around the world -- went into reverse. They
in doing so. True economic nationalists want above all to protect capital and jobs in their own countries. They see global commerce not as a win-win proposition but as a contest in
which there is a victor and a loser. They are thus not focused on international agreements to open the world economy; to the contrary, they are usually figuring out how to avoid international
The last time we saw sustained economic nationalism was in the 1930s, when capital
flows and trade among countries collapsed, and every country went its own way. World growth
went into a ditch, political ties among nations deteriorated, nationalism and populism combined to
create fascist governments in Europe and Asia, and a world war took place. It took at least a
generation for globalization to get back on track. There have been some bouts of inwardlooking governmental action since then, such as the early
commercial obligations.
1970s when the U.S. cut the dollar from its gold base and imposed export embargoes on soybeans and steel scrap. However, the economic conditions were not sufficiently bad for the trend to
sustain itself. The kind of economic nationalism we are seeing today is not yet extreme. It is also understandable. The polit ical pressures could hardly be worse. Over the last decade, the global
economy grew on average about 4% to 5%, and this year it will come to a grinding halt: 0.5% according to the International Monetary Fund, where projections usually err on the optimistic side.
World trade, which has grown much faster than global gross domestic product for many years, is projected to decline this year for the first time since 1982. Foreign direct investment last year
slumped by 10% from 2007. Most dramatically, capital flows into emerging market nations are projected to drop this year by nearly 80% compared to 2007. The aggregate figures don't tell the
story of what is unraveling in individual countries. In the last quarter of 2008, U.S. GDP dropped by 6.2% at an annual rate, the U.K. by 5.9%, Germany by 8.2%, Japan by 12.7% and South
Korea by 20.8%. Mexico, Thailand and Singapore and most of Eastern Europe are also in deep trouble. In every case, employment has been plummeting. So far popular demonstrations against
government policies have taken place in theU.K., France, Greece, Russia and throughout Eastern Europe. And the governments of Iceland and Latvia have fallen over the crisis. Governments
could therefore be forgiven if they are preoccupied above all with the workers and companies within their own borders. Most officials don't know what to do because they haven't seen this level
of distress before. They are living from day to day, desperately improvising and trying to hold off political pressure to take severe measures they know could be satisfying right now but cause
bigger damage later. Thinking about how their policies might affect other countries is not their main focus, let alone taking the time to try to coordinate them internationally. Besides, whether it's
in Washington, Brussels, Paris, Beijing, Brazilia or Tokyo, it is hard to find many top officials who wouldn't say that whatever measures they are taking that may undermine global commerce are
strictly temporary. They all profess that when the crisis is over, they will resume their support for globalization. They underestimate, however, how hard it could be to reverse course. Political
figures take comfort, too, from the global institutions that were not present in the 1930s -- the IMF, the World Bank and the World Trade Organization, all of which are assumed to be keeping
globalization alive. This is a false sense of security, since these institutions are guided by sovereign countries. Government officials often feel that because they are going to endless crisis summit
meetings -- the next big one is in London on April 2, when the world's top 20 nations will be assembling -- that some international coordination is actually taking place. This is mostly an illusion.
With a few exceptions, such as the so-called Plaza Agreements of 1984 when currencies were realigned, it is difficult to point to a meeting where anything major has been said and subsequently
Classic trade
protectionism is on the rise. In the first half of 2008, the number of investigations in the World Trade Organization relating to antidumping cases -- selling below cost -implemented. But as the pressure on politicians mounts, decisions are being made on an incremental and ad hoc basis that amounts to a disturbing trend.
was up 30% from the year before. Washington has recently expanded sanctions against European food products in retaliation for Europe's boycott against hormonetreated American beef -- an old
dispute, to be sure, but one that is escalating. In the last several months, the E.U. reintroduced export subsidies on butter and cheese. India raised tariffs on steel products, as did Russia on
imported cars. Indonesia ingenuously designated that just a few of its ports could be used to import toys, creating a trade-blocking bottleneck. Brazil and Argentina have been pressing for a
higher external tariff on imports into a South American bloc of countries called Mercosur. Just this week, the E.U. agreed to levy tariffs on American exports of biodiesel fuel, possibly a first shot
in what may become a gigantic trade war fought over different environmental policies -- some based on taxes, some on regulation, some on cap and trade -- being embraced by individual
countries. Much bigger problems have arisen in more non-traditional areas and derive from recent direct intervention of governments. The much-publicized "Buy America" provision of the U.S.
stimulus package restricts purchases of construction-related goods to many U.S. manufacturers, and although it is riddled with exceptions, it does reveal Washington's state of mind. The bailout
of GM and Chrysler is a purely national deal. Such exclusion against foreign firms is a violation of so-called "national treatment" clauses in trade agreements, and the E.U. has already put
Washington on notice that it will pursue legal trade remedies if the final bailout package is discriminatory. Uncle Sam is not the only economic nationalist. The Japanese government is offering
to help a broad array of its corporations -- but certainly not subsidiaries of foreign companies in Japan -- by purchasing the stock of these firms directly, thereby not just saving them but providing
an advantage over competition from non-Japanese sources. The French government has created a sovereign wealth fund to make sure that certain "national champions," such as carparts
manufacturer Valeo and aeronautics component maker Daher, aren't bought by foreign investors. Government involvement in financial institutions has taken on an anti-globalization tone. British
regulators are pushing their global banks to redirect foreign lending to the U.K. when credit is sorely needed and where it can be monitored. Just this past week, the Royal Bank of Scotland
announced it was closing shop in 60 foreign countries. Western European banks that were heavily invested in countries such as Hungary, the Czech Republic and the Baltics have pulled back
their credits, causing a devastating deflation throughout Eastern Europe. The Swiss are reportedly considering more lenient accounting policies for loans their banks make domestically as
opposed to abroad. This de-globalizing trend could well be amplified by Washington's effort to exercise tight oversight of several big financial institutions. Already AIG's prime Asian asset,
American International Assurance Company, is on the block. As the feds take an ever bigger stake in Citigroup, they may well force it to divest itself of many of its prized global holdings, such
as Banamex in Mexico and Citi Handlowy in Poland. It appears that new legislation under the Troubled Asset Relief Program will also restrict the employment of foreign nationals in hundreds of
American banks in which the government has a stake. Whether or not it goes into bankruptcy, General Motors will be pressed to sell many of its foreign subsidiaries, too. Even Chinese
multinationals such as Haier and Lenovo are beating a retreat to their own shores where the risks seem lower than operating in an uncertain global economy. The government in Beijing is never
far away from such fundamental strategic decisions. Then there is the currency issue. Economic nationalists are mercantilists. They are willing to keep their currency cheap in order to make their
exports more competitive. China is doing just that. A big question is whether other Asian exporters that have been badly hurt from the crisis -- Taiwan, South Korea and Thailand, for example -will follow suit. Competitive devaluations were a major feature of the 1930s. It's no accident that the European Union has called an emergency summit for this Sunday to consider what to do with
There are a number of reasons why economic nationalism could escalate
rising protectionism of all kinds.
. The recession
could last well beyond this year. It is also worrisome that the forces of economic nationalism were gathering even before the crisis hit, and have deeper roots than most people know. Congress
denied President Bush authority to negotiate trade agreements two years ago, fearing that America was not benefiting enough from open trade, and an effort to reform immigration was paralyzed
for years. Globally, international trade negotiations called the Doha Round collapsed well before Bear Stearns and Lehman Brothers did. Concerns that trade was worsening income distribution
were growing in every major industrial nation since the late 1990s.
Whenever countries turned inward over the past half-century,
Washington was a powerful countervailing force, preaching the gospel of globalization and open
markets for goods, services and capital . As the Obama administration works feverishly to fire up America's growth engines, patch up its financial system and
keep its housing market from collapsing further, and as its major long-term objectives center on health, education and reducing energy dependence on foreign sources, the country's
preoccupations are more purely domestic than at any time since the 1930s. In the past, American business leaders from companies such as IBM, GE, Goldman Sachs and, yes, Citigroup and
Merrill Lynch beat the drum for open global markets. As their share prices collapse, some voices are muted, some silenced. It is not easy to find anyone in America who has the stature and
courage to press for a more open global economy in the midst of the current economic and political crosswinds. And given that the global rot started in the U.S. with egregiously irresponsible
lending, borrowing and regulation, America's brand of capitalism is in serious disrepute around the world. Even if President Obama had the mental bandwidth to become a cheerleader for
globalization, America's do-as-I-say-and-not-as-I-do leadership has been badly compromised. If economic nationalism puts a monkey wrench in the wheels of global commerce, the damage
could be severe. The U.S. is a good example. It is inconceivable that Uncle Sam could mount a serious recovery without a massive expansion of exports -- the very activity that was responsible
for so much of America's economic growth during the middle of this decade. But that won't be possible if other nations block imports. For generations, the deficits that we have run this past
decade and the trillions of dollars we are spending now mean we will be highly dependent on foreign loans from China, Japan and other parts of the world. But these will not be forthcoming at
prices we can afford without a global financial system built on deep collaboration between debtors and creditors -- including keeping our market open to foreign goods and services. The Obama
administration talks about a super-competitive economy, based on high-quality jobs -- which means knowledge-intensive jobs. This won't happen if we are not able to continue to bring in the
brightest people from all over the world to work and live here. Silicon Valley, to take one example, would be a pale shadow of itself without Indian, Chinese and Israeli brain power in its midst.
More generally, without an open global economy, worldwide industries such as autos, steel, banking and telecommunications cannot be rationalized and restructured efficiently, and we'll be
doomed to have excessive capacity and booms and busts forever. The big emerging markets such as China, India, Brazil, Turkey and South Africa will never be fully integrated into the world
economy, depriving them and us of future economic growth. The productivity of billions of men and women entering the global workforce will be stunted to everyone's detriment. Of course, no
one would say that globalization is without its problems. Trade surges and products made by low-priced labor can lead to job displacement and increasing income inequality. Proud national
cultures can be undermined. But these challenges can be met by reasonable regulation and by domestic policies that provide a strong social safety net and the kind of education that helps people
acquire new skills for a competitive world. With the right responses of governments, the benefits should far outweigh the disadvantages.
For thousands of years,
globalization has increased global wealth, individual choice and human freedom. The point is, economic
nationalism, with its implicit autarchic and save-yourself character, embodies exactly the wrong spirit and runs in precisely the
wrong direction from the global system that will be necessary to create the future we all want . As
happened in the 1930s, economic nationalism is also sure to poison geopolitics. Governments under
economic pressure have far fewer resources to take care of their citizens and to deal with rising
anger and social tensions. Whether or not they are democracies, their tenure can be threatened by
popular resentment. The temptation for governments to whip up enthusiasm for something that
distracts citizens from their economic woes -- a war or a jihad against unpopular minorities, for example -is great. That's not all. As an economically enfeebled South Korea withdraws foreign aid from North
Korea, could we see an even more irrational activity from Pyongyang? As the Pakistani economy
goes into the tank, will the government be more likely to compromise with terrorists to alleviate at least one source
of pressure? As Ukraine strains under the weight of an IMF bailout, is a civil war with Cold War
overtones between Europe and Russia be in the cards? And beyond all that, how will economically embattled
and inward-looking governments be able to deal with the critical issues that need global resolution
such as control of nuclear weapons , or a treaty to manage climate change, or help to the hundreds
of millions of people who are now falling back into poverty?
Second is Relations PRISM surveillance has tanked US-EU relations – ending the program is key to
restoring them
Zack Whittaker, Nov 27, 2013, “Realizing it's the underdog post-PRISM, EU lays out new BFF pact
with the U.S.,” ZDNET, http://www.zdnet.com/article/realizing-its-the-underdog-post-prism-eu-lays-outnew-bff-pact-with-the-u-s/, KEL
In efforts to get the "special relationship" back on track after months of painful political rhetoric and
frenemy-like relations, the European Commission wants to rekindle its trans-Atlantic love with its American
partners. But it comes with conditions. And if America doesn't play ball, the rift could get significantly
wider . The EU on Wednesday threw down its demands — albeit in a somewhat subdued typical softly-softly European way now that the 28 member state bloc
has taken time to breathe and think this one through — and hopes its U.S. counterparts bites at the chance to restore relations with its trans-Atlantic friend.
Tensions between the two continents have never been as strained as they are today. It all stems from the
revelations from the Edward Snowden house of leaks, which disclosed the massive surveillance operation by the U.S.
government by its National Security Agency (NSA).
US-EU relations key to solve global war
O'Sullivan, 4 -- National Interest editor (John, Nixon Center for Peace and Freedom Distinguished
Fellow in International Relations, "Europe and the Establishment," The National Interest, 7-31-2004,
nationalinterest.org/article/europe-and-the-establishment-2608)
The report's starting point -- that U.S.-European relations
are extremely important -- is undeniable. A united Western
alliance would shape world institutions in line with values and practices rooted in liberty and democracy and coax rising
powers such as India and China into going along with this international status quo for the foreseeable future. Indeed, this is already
happening as China accepts liberal economic rules at home in order to enter institutions such as the G7 and the World Trade Organization. By
contrast, a
disunited West would tempt such powers to play off Europe and America against each other and
foster a global jockeying for power not unlike the maneuvering between a half-dozen great powers that led to 1914.
Slower version
Observation 1: Inherency
The 2008 FISA Amendment Act (FAA) removed the probable cause standard
requiring warrants for surveillance, allowing sweeping NSA electronic surveillance
of US citizens and communication within the US. There’s no effective oversight of
these programs now.
Margot Kaminski June 7, 2013, executive director of the Information Society Project at Yale Law
School; She is a graduate of Harvard University and Yale Law School and a former fellow of the
Information Society Project. While at Yale Law School, she was a Knight Law and Media Scholar and
co-founder of the Media Freedom and Information Access Practicum. Following graduation from Yale
Law School, she clerked for The Honorable Andrew J. Kleinfeld of the Ninth Circuit Court of Appeals.
She has been a Radcliffe Research Fellow at Harvard and a Google Policy Fellow at the Electronic
Frontier Foundation, PRISM's Legal Basis: How We Got Here, and What We Can Do to Get Back,” The
Atlantic, http://www.theatlantic.com/national/archive/2013/06/prisms-legal-basis-how-we-got-here-andwhat-we-can-do-to-get-back/276667/, KEL
First, there is the question of whom the surveillance targets.
PRISM spies on Americans. The Director of National Intelligence emphasized yesterday that PRISM targets
only " non-U.S. persons located outside the United States ." But the press release also acknowledges that "information about U.S. persons" may be "incidentally acquired" in such pursuits.
The current scope of this "incidental"
surveillance will shock most Americans. Before 2008, the law limited "incidental" surveillance by limiting primary surveillance. The
government had to show probable cause that its surveillance target was the agent of a foreign power,
and that the facility being watched was about to be used by that target. You could be incidentally observed if you communicated with a
targeted foreign agent, but otherwise foreign communications were likely to be unmonitored. But in 2008, the FISA Amendments Act (FISAAA)
changed this . The government now does not need to show probable cause that the target is a foreign agent. It need only have a "reasonable
belief" that the target is located outside of the United States. The new version of FISA does not require the
government to identify its targets; it does not require the government to identify the monitored facilities ; and
the purpose of foreign intelligence gathering attaches to the whole surveillance program, not the individual investigation. That is to say: the FISA Amendments Act
permits the government to obtain a single court order through which it can monitor thousands, or even
millions, of people. The scope of "incidental" surveillance thus vastly expanded as Congress lowered the requirements for spying on the primary target. Such a system
will inevitably sweep in untold numbers of Americans who communicate with foreigners. And because the government
Targeting is not the same as collecting; the program may "target" foreign persons, but "acquire" information on Americans.
need have only a "reasonable belief" that the target is outside the United States--which it is interpreting according to the Washington Post as a 51% chance that the target is outside the U.S.--this
system will undoubtedly sweep in purely domestic communications as well.
This brings us to the issue of oversight: who is watching the watchers? The Director
of National Intelligence assures us that PRISM is "subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress." It is true that in December 2012
Congress renewed the law that allows PRISM to exist. But what kind of oversight did Congress actually provide? When Senators Ron Wyden and Mark Udall asked whether communications by
Americans had been gathered under the law, the Director of National Intelligence responded that it was not possible to identify the number of people in the United States whose communications
At the core of the
problem is that the Foreign Intelligence Surveillance Court (FISA Court), which meets in secret and does not publish its
opinions, itself does not provide adequate oversight. When Congress changed the standard for targeting
foreign individuals in 2008 , it abolished the ability of the FISA Court to evaluate whether the
government had any real cause to target an individual or group of individuals. The Supreme Court itself disputes whether the
were reviewed. How effective can Congressional oversight be if Congress does not understand the scope and nature of the programs it has authorized?
FISA Court enforces the Fourth Amendment. The "minimization procedures" touted by the Director of National Intelligence as adequate privacy safeguards are established by the government,
evaluated by the government, and are subject to review by a secret court--if review occurs at all. And as a general practice, FISA "minimization" hasnot been true minimization: it occurs after
information is already acquired. The existence of PRISM and the Verizon metadata program, both authorized by the FISA Court, confirms that a secret court broadly authorized by an uninformed
Congress will not adequately protect the Fourth and First Amendment rights of American citizens on American soil.
The 2015 USA Freedom Act does NOTHING to reform PRISM and sent a signal
that should trigger all negative disadvantages.
Fred Kaplan June 8, 2015, author of The Insurgents: David Petraeus and the Plot to Change the
American Way of War, is writing a book on the history of cyberwar, “The NSA Debate We Should Be
Having,” Slate Magazine,
http://www.slate.com/articles/news_and_politics/war_stories/2015/06/the_national_security_agency_s_su
rveillance_and_the_usa_freedom_act_the.html, KEL
One week after Congress voted to stop the National Security Agency from collecting and storing millions of
Americans’ phone records, partisans on both sides are exaggerating the significance of this new reform.
NSA supporters lament the loss of a key tool for fighting terrorists , while the agency’s critics hail
the new law as (in Edward Snowden’s words) an “historic victory for the rights of every citizen, ” with some calling its
passage a vindication of Snowden himself as an authentic whistleblower who should be let back home as a hero, not a convict. Both sides are off the
mark. The NSA’s bulk collection of telephone metadata was the subject of the first news stories based on the trove of highly classified documents that Snowden
leaked, and it stirred the biggest commotion. But in fact the metadata program never comprised more than a tiny percentage of the agency’s vast and global
surveillance net. The new law’s reform measure—to keep the metadata stored with the telecom companies, allowing NSA access only to specified materials, and then
only through the Foreign Intelligence Surveillance Court—was first proposed not by some libertarian critic but by Gen. Keith Alexander, then-director of the NSA.
Under the system that has been in effect, as authorized by Section 215 of the Patriot Act (or, rather, by the FISA court’s now-discredited reading of that section), the
NSA routinely collected metadata from some of the biggest cellular companies—not the contents of conversations, but the phone numbers, dates, times, and duration
of the calls. If someone inside the United States called a number linked to one of three terrorist organizations (including al-Qaida), an NSA alert system would note
that fact. The NSA could then ask the FISA Court for permission to search the database for a list of all the other numbers that the American phone had called, as well
as all the numbers that those numbers had called, going back as far as five years. If this search revealed a suspicious pattern, the NSA would turn the materials over to
the FBI, which could seek a warrant to listen to conversations. Under the new reform law, called the USA Freedom Act, the NSA would no longer possess the
database, so it would seek a FISA court order to get it from the telecom companies—and the FISA court would now include a privacy advocate who could argue
against relinquishing the data. If the court sided with the NSA, what happened next would be exactly the same as before the new law passed. So, it’s not exactly a
giant step in the annals of either national-security risk or civil liberties reform—unless one of two things had been true. First, if the NSA had been abusing the
process—if analysts or senior officials had been searching metadata for personal, political, or vindictive purposes—the changes in custody and oversight would have a
huge impact. But neither Snowden’s documents nor any subsequent probes have uncovered any such evidence. Second, if authoritarians or worse—say, modern-day
versions of Richard Nixon and J. Edgar Hoover—were to come to power, they could suspend the internal controls at NSA and use the agency’s vast databases to track
domestic enemies or any target of their choosing. In that case, the Freedom Act would serve as a powerful brake to oppression: Because the government would no
longer possess the data, it couldn’t exploit the data. That is the real—and the intended—effect of the reform: not so much to change the way surveillance technology is
used today, but rather to limit the potential for abuse in the future. For now, surveillance through telephone metadata is pretty sparse. In 2012, the NSA queried the
database for 288 U.S. telephone numbers. As a result of those queries, the agency passed just 12 tips to the FBI. None of those tips led to the capture of a single
terrorist or the halting of a terrorist plot. In fact, according to President Obama’s independent commission on NSA reform, the telephone metadata program has never
had any impact on countering terrorism. A
separate program called PRISM—authorized under Section 702 of the
Foreign Intelligence Surveillance Act—lets the NSA track foreign terrorists and adversaries by
intercepting their Internet traffic as it zips through U.S.–based servers. (Because of the nature of the technology, about 80
percent of the world’s Internet traffic passes through U.S. servers at some point.) PRISM was another highly classified
NSA program that Snowden uncovered. The Washington Post and the Guardian made it the subject of their Day 2 Snowden stories (right after the revelations about
telephone metadata). Yet PRISM
isn’t touched at all by the USA Freedom Act, nor does any serious politician
propose overhauling it. This is the case, even though PRISM data-mining is a much bigger program than
telephone metadata ever was, and it’s potentially more intrusive, since it’s hard to know whether, at first glance, an IP address
belongs to an American or a foreigner.
Plan Text
Thus, my partner and I stand resolved:
Domestic online surveillance authority under the USA PATRIOT Act, Foreign
Intelligence Surveillance Act of 1978 Amendments Act of 2008, and Executive Order
12333 should be repealed and any requirement for manufacturers of electronic
devices or software to provide bypasses for encryption will be prohibited.
Advantage One – Cloud Competitiveness
PRISM revelations and the weak response with US Freedom Act has caused other
nations to retaliate against our information tech sector and undermined our tech
sector competitiveness
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
Almost two years ago, ITIF described how revelations
about pervasive digital surveillance by the U.S. intelligence
community could severely harm the competitiveness of the United States if foreign customers turned
away from U.S. - made technology and services. 1 Since then, U.S. policymakers have failed to take sufficient
action to address these surveillance concerns; in some cases, they have even fanned the flames of
discontent by championing weak information security practices. 2 In addition, other countries have used anger
over U .S. government surveillance as a cover for implementing a new wave of protectionist policies
specifically targeting information technology. The combined result is a set of policies both at home and
abroad that sacrifices robust competitiveness of the U.S. tech sector for vague and unconvincing promises
of improved national security.
US competitiveness in the $241 billion global cloud market is key to US innovation,
economic growth, and job growth
Digital 4th, January 2015, Digital 4th is a bipartisan coalition dedicated to reforming and modernizing
our country’s 4th Amendment privacy rights, “U.S. Competitiveness in Cloud Computing: Updating the
Standard for Government Access to Stored Communications,” http://www.digital4th.org/wpcontent/uploads/2015/01/Issue_Brief-2-ECPA-and-the-Cloud.pdf, KEL
Businesses all over the world are looking to cloud - based services for their information management
needs in order to save money on equipment and to achieve better computing reliability and data security.
Cloud based services allow companies to expand their computing capacity quickly – particularly valuable for start - up businesses and
entrepreneurs. Such services give employees the flexibility to share information and collaborate. The
global cloud market is
expected to expand to $241 billion by 2020. American companies have been the global leaders in cloud
computing, and cloud computing has been an engine for U.S. - based innovation, economic growth, and
job creation.
Maintaining US economic growth is key to global economic growth
Rich Miller, January 9, 2015, “U.S. Retakes the Helm of the Global Economy,” Bloomberg News,
http://www.bloomberg.com/news/articles/2015-01-09/u-s-retakes-the-helm-of-the-global-economy, KEL
The U.S. is back in the driver’s seat of the global economy after 15 years of watching China and emerging
markets take the lead. The world’s biggest economy will expand by 3.2 percent or more this year, its best
performance since at least 2005, as an improving job market leads to stepped-up consumer spending, according to economists at JPMorgan Chase
& Co., Deutsche Bank AG and BNP Paribas SA. That outcome would be about what each foresees for the world economy as a whole and would
be the first time since 1999 that America hasn’t lagged behind global growth, based on data from the International Monetary Fund. “The
U.S.
is again the engine of global growth,” said Allen Sinai, chief executive officer of Decision Economics in New York. “The economy
is looking stellar and is in its best shape since the 1990s.”
Economic decline causes global wars – empirically proven
Royal, '10 (Jedediah, Director of Cooperative Threat Reduction Program -- DOD, Economics of War &
Peace: Legal and Political Perspectives, ed. Goldsmith & Brauer, p. 213-15)
Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political
science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defence behaviour of
interdependent states. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow.
rhythms
in the global economy are associated with the rise and fall of a pre-eminent power and the oftenbloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as
economic crises could usher in a redistribution or relative power (see also Gilpin. 1981) that leads to
uncertainty about power balances, increasing the risk of miscalculation (Fearon. 1995). Alternatively, even a
relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to
challenge a declining power (Werner, 1999). Separately, Pollins ( L 996) also shows that global economic cycles combined with
First, on the systemic level, Pollins (2008) advances Modelski and Thompson's (1996) work on leadership cycle theory, finding that
parallel leadership cycles impact the likelihood of conflict among major, medium and small powers, although he suggests that the causes and
connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level, Copeland's (1996. 2000)
theory of trade expectations suggests that future expectation of trade' is a significant variable in understanding economic conditions and security
behaviour of states. He argues that interdependent states arc likely to gain pacific benefits from trade so long as they have an optimistic view of
future trade relations. However, if
the expectations of future trade decline, particularly for difficult to replace
items such as energy resources, the likelihood for conflict increases, as states will be inclined to use
force to gain access to those resources. Crises could potentially be the trigger for decreased trade
expectations either on its own or because it triggers protectionist moves by interdependent states .
Third, others have considered the link between economic decline and external armed conflict at a national level. Blomberg and Hess
(2002) find a strong correlation between internal conflict and external conflict, particularly during
periods of economic downturn. They write, “The linkages between internal and external conflict and
prosperity are strong and mutually reinforcing. Economic conflict tends to spawn internal conflict,
which in turn returns the favour. Moreover, the presence of a recession tends lo amplify the extent to
which international and external conflict self-reinforce each other. (Blomberg & Hess 2002. p. 89) Economic
decline has also been linked with an increase in the likelihood of terrorism (Blomberg. Hess. & Weerapana,
2004), which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the
popularity of a sitting government. 'Diversionary theory’ suggests that when facing unpopularity arising from economic decline,
sitting governments have increased incentives to fabricate external military conflicts to create a rally around the flag effect. Wang (1996),
DeRouen ( 1995), and Blomberg. Hess, and Thacker (2006) find supporting evidence showing that economic decline and use of force are at least
indirectly correlated. Gelpi (1997), Miller (1999), and Kisangani and Pickering (2009) suggest that the tendency towards diversionary tactics arc
greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from
office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United
States and thus weak Presidential popularity arc statistically linked to an increase in the use of force. In summary, recent economic scholarship
positively correlates economic integration with an increase in the frequency or economic crises, whereas political science scholarship links
economic decline with external conflict at systemic, dyadic and national levels. This implied connection between integration, crises and armed
conflict has not featured prominently in the economic-security debate and deserves more attention.
Repealing the Patriot Act and 2008 FAA restores need for a uniform probablecause-based warrant standard for all surveillance and prevents government from
backdooring encryption software. This solves trust in our tech companies and cloud
services.
Christopher Zara, October 19 2013, “Hope For The Surveillance State Repeal Act? HR 2818 Gains
Support Among House Democrats,” International Business Times, http://www.ibtimes.com/hopesurveillance-state-repeal-act-hr-2818-gains-support-among-house-democrats-1432772, KEL
Congressional support is growing for a bill that would roll back privacy regulations to what they were
before 9/11. H.R.2818, introduced this summer by Rep. Rush Holt, D-N.J., has gained five cosponsors this month, all Democrats. Also known as
the Surveillance State Repeal Act, the bill would repeal the USA Patriot Act of 2001 and the FISA
Amendments Act of 2008. Both laws have received harsh criticism since classified information leaked by Edward Snowden revealed widespread
electronic surveillance by the National Security Agency and the Federal Bureau of Investigation. “Instead of using these powers to zero in on the tiny number of real
terrorist threats we face, the executive branch turned these surveillance powers against the American people as a whole,” Holt said in a July statement. “My legislation
would put a stop to that right now.” Holt said the
bill would restore a “uniform probable-cause-based warrant standard for
surveillance requests,” while also prohibiting the U.S. government from forcing tech companies to create
“back doors” that make spying on the public easier. He added that people should be treated as “citizens first, not suspects.” Last month,
the New York Times editorial board endorsed the bill, citing specifically the provision that would bar the
government from requiring software makers to create ways for the government to bypass encryption.
Privacy and tech-industry advocates say such provisions weaken consumer trust in American tech
companies’ abilities to safeguard private data . One recent report showed that the U.S. cloudcomputing industry could lose up to $35 billion over the next few years as a result of NSA
surveillance and the negative press associated with it.
Advantage Two – US/EU
We have two scenarios – First is Trade
Online surveillance is a major obstacle to TIPP passage – failure to reach a deal will
trigger global protectionism and undermine global trade
Sara Miller Llana July 8, 2013 “Will US-EU trade talks spur growth - or show globalization's limits?,”
http://www.csmonitor.com/World/Europe/2013/0708/Will-US-EU-trade-talks-spur-growth-or-showglobalization-s-limits, KEL
A trade deal would deeply integrate US-European relations at a time of drift, and during a rocky patch,
amid friction over American spying allegations. If it succeeds , some say it would create a more level playing field
with the rise of China and other emerging markets, as well as reinvigorate other global trade initiatives. Yet even if it
fails – and there are plenty who think that the obstacles such as agriculture and, most recently, data privacy are
insurmountable – a failure would be pivotal, showing that tariffs can be dropped but non-tariff barriers, which are often more cultural
in nature, remain stubborn. A failure, says Fredrik Erixon, the director of the European Center for International Political Economy (ECIPE) in
Brussels, “could
lead to a larger standstill in efforts to address 21st century trade barriers.”
Collapse of global trade results in extinction
Garten, 09 – professor at the Yale School of Management (Jeffrey, “The Dangers of Turning Inward”, 3/5, Wall Street Journal,
http://www.business.illinois.edu/aguilera/Teaching/WSJ09_Dangers_of_Turning_Inward.pdf)
historians look back on today's severe downturn, with its crumbling markets, rising unemployment and massive government interventions, they could well be busy analyzing how
globalization -- the spread of trade, finance, technology and the movement of people around the world -- went into reverse. They would likely point to the growth
of economic nationalism as the root cause. Ordinary protectionism such as tariffs and quotas would be one aspect of this problem, but it won't be the worst
of it because a web of treaties and the enforcement capabilities of the World Trade Organization will constrain the most egregious behavior. Economic nationalism is
more insidious because it is broader, more subtle and subject to fewer legal constraints. It is a frame of mind
that casts doubt on the very assumption that we live in a single international market, and that relatively open borders are a virtue. It is based on a calculation that
despite all the talk about economic interdependence, nations can go it alone, and could be better off
in doing so. True economic nationalists want above all to protect capital and jobs in their own countries. They see global commerce not as a win-win proposition but as a contest in
Yet if
which there is a victor and a loser. They are thus not focused on international agreements to open the world economy; to the contrary, they are usually figuring out how to avoid international
The last time we saw sustained economic nationalism was in the 1930s, when capital
flows and trade among countries collapsed, and every country went its own way. World growth
went into a ditch, political ties among nations deteriorated, nationalism and populism combined to
create fascist governments in Europe and Asia, and a world war took place. It took at least a
generation for globalization to get back on track. There have been some bouts of inwardlooking governmental action since then, such as the early
commercial obligations.
1970s when the U.S. cut the dollar from its gold base and imposed export embargoes on soybeans and steel scrap. However, the economic conditions were not sufficiently bad for the trend to
sustain itself. The kind of economic nationalism we are seeing today is not yet extreme. It is also understandable. The polit ical pressures could hardly be worse. Over the last decade, the global
economy grew on average about 4% to 5%, and this year it will come to a grinding halt: 0.5% according to the International Monetary Fund, where projections usually err on the optimistic side.
World trade, which has grown much faster than global gross domestic product for many years, is projected to decline this year for the first time since 1982. Foreign direct investment last year
slumped by 10% from 2007. Most dramatically, capital flows into emerging market nations are projected to drop this year by nearly 80% compared to 2007. The aggregate figures don't tell the
story of what is unraveling in individual countries. In the last quarter of 2008, U.S. GDP dropped by 6.2% at an annual rate, the U.K. by 5.9%, Germany by 8.2%, Japan by 12.7% and South
Korea by 20.8%. Mexico, Thailand and Singapore and most of Eastern Europe are also in deep trouble. In every case, employment has been plummeting. So far popular demonstrations against
government policies have taken place in theU.K., France, Greece, Russia and throughout Eastern Europe. And the governments of Iceland and Latvia have fallen over the crisis. Governments
could therefore be forgiven if they are preoccupied above all with the workers and companies within their own borders. Most officials don't know what to do because they haven't seen this level
of distress before. They are living from day to day, desperately improvising and trying to hold off political pressure to take severe measures they know could be satisfying right now but cause
bigger damage later. Thinking about how their policies might affect other countries is not their main focus, let alone taking the time to try to coordinate them internationally. Besides, whether it's
in Washington, Brussels, Paris, Beijing, Brazilia or Tokyo, it is hard to find many top officials who wouldn't say that whatever measures they are taking that may undermine global co mmerce are
strictly temporary. They all profess that when the crisis is over, they will resume their support for globalization. They underestimate, however, how hard it could be to reverse course. Political
figures take comfort, too, from the global institutions that were not present in the 1930s -- the IMF, the World Bank and the World Trade Organization, all of which are assumed to be keeping
globalization alive. This is a false sense of security, since these institutions are guided by sovereign countries. Government officials often feel that because they are going to endless crisis summit
meetings -- the next big one is in London on April 2, when the world's top 20 nations will be assembling -- that some international coordination is actually taking place. This is mostly an illusion.
With a few exceptions, such as the so-called Plaza Agreements of 1984 when currencies were realigned, it is difficult to point to a meeting where anything major has been said and subsequently
implemented. But as the pressure on politicians mounts, decisions are being made on an incremental and ad hoc basis that amounts to a disturbing trend.
Classic trade
protectionism is on the rise. In the first half of 2008, the number of investigations in the World Trade Organization relating to antidumping cases -- selling below cost -was up 30% from the year before. Washington has recently expanded sanctions against European food products in retaliation for Europe's boycott against hormonetreated American beef -- an old
dispute, to be sure, but one that is escalating. In the last several months, the E.U. reintroduced export subsidies on butter and cheese. India raised tariffs on steel products, as did Russia on
imported cars. Indonesia ingenuously designated that just a few of its ports could be used to import toys, creating a trade-blocking bottleneck. Brazil and Argentina have been pressing for a
higher external tariff on imports into a South American bloc of countries called Mercosur. Just this week, the E.U. agreed to levy tariffs on American exports of biodiesel fuel, possibly a first shot
in what may become a gigantic trade war fought over different environmental policies -- some based on taxes, some on regulation, some on cap and trade -- being embraced by individual
countries. Much bigger problems have arisen in more non-traditional areas and derive from recent direct intervention of governments. The much-publicized "Buy America" provision of the U.S.
stimulus package restricts purchases of construction-related goods to many U.S. manufacturers, and although it is riddled with exceptions, it does reveal Washington's state of mind. The bailout
of GM and Chrysler is a purely national deal. Such exclusion against foreign firms is a violation of so-called "national treatment" clauses in trade agreements, and the E.U. has already put
Washington on notice that it will pursue legal trade remedies if the final bailout package is discriminatory. Uncle Sam is not the only economic nationalist. The Japanese government is offering
to help a broad array of its corporations -- but certainly not subsidiaries of foreign companies in Japan -- by purchasing the stock of these firms directly, thereby not just saving them but providing
an advantage over competition from non-Japanese sources. The French government has created a sovereign wealth fund to make sure that certain "national champions," such as carparts
manufacturer Valeo and aeronautics component maker Daher, aren't bought by foreign investors. Government involvement in financial institutions has taken on an anti-globalization tone. British
regulators are pushing their global banks to redirect foreign lending to the U.K. when credit is sorely needed and where it can be monitored. Just this past week, the Royal Bank of Scotland
announced it was closing shop in 60 foreign countries. Western European banks that were heavily invested in countries such as Hungary, the Czech Republic and the Baltics have pulled back
their credits, causing a devastating deflation throughout Eastern Europe. The Swiss are reportedly considering more lenient accounting policies for loans their banks make domestically as
opposed to abroad. This de-globalizing trend could well be amplified by Washington's effort to exercise tight oversight of several big financial institutions. Already AIG's prime Asian asset,
American International Assurance Company, is on the block. As the feds take an ever bigger stake in Citigroup, they may well force it to divest itself of many of its prized global holdings, such
as Banamex in Mexico and Citi Handlowy in Poland. It appears that new legislation under the Troubled Asset Relief Program will also restrict the employment of foreign nationals in hundreds of
American banks in which the government has a stake. Whether or not it goes into bankruptcy, General Motors will be pressed to sell many of its foreign subsidiaries, too. Even Chinese
multinationals such as Haier and Lenovo are beating a retreat to their own shores where the risks seem lower than operating in an uncertain global economy. The government in Beijing is never
far away from such fundamental strategic decisions. Then there is the currency issue. Economic nationalists are mercantilists. They are willing to keep their currency cheap in order to make their
exports more competitive. China is doing just that. A big question is whether other Asian exporters that have been badly hurt from the crisis -- Taiwan, South Korea and Thailand, for example -will follow suit. Competitive devaluations were a major feature of the 1930s. It's no accident that the European Union has called an emergency summit for this Sunday to consider what to do with
There are a number of reasons why economic nationalism could escalate
rising protectionism of all kinds.
. The recession
could last well beyond this year. It is also worrisome that the forces of economic nationalism were gathering even before the crisis hit, and have deeper roots than most people know. Congress
denied President Bush authority to negotiate trade agreements two years ago, fearing that America was not benefiting enough from open trade, and an effort to reform immigration was paralyzed
for years. Globally, international trade negotiations called the Doha Round collapsed well before Bear Stearns and Lehman Brothers did. Concerns that trade was worsening income distribution
were growing in every major industrial nation since the late 1990s.
Whenever countries turned inward over the past half-century,
Washington was a powerful countervailing force, preaching the gospel of globalization and open
markets for goods, services and capital . As the Obama administration works feverishly to fire up America's growth engines, patch up its financial system and
keep its housing market from collapsing further, and as its major long-term objectives center on health, education and reducing energy dependence on foreign sources, the country's
preoccupations are more purely domestic than at any time since the 1930s. In the past, American business leaders from companies such as IBM, GE, Goldman Sachs and, yes, Citigroup and
Merrill Lynch beat the drum for open global markets. As their share prices collapse, some voices are muted, some silenced. It is not easy to find anyone in America who has the stature and
courage to press for a more open global economy in the midst of the current economic and political crosswinds. And given that the global rot started in the U.S. with egregiously irresponsible
lending, borrowing and regulation, America's brand of capitalism is in serious disrepute around the world. Even if President Obama had the mental bandwidth to become a cheerleader for
globalization, America's do-as-I-say-and-not-as-I-do leadership has been badly compromised. If economic nationalism puts a monkey wrench in the wheels of global commerce, the damage
could be severe. The U.S. is a good example. It is inconceivable that Uncle Sam could mount a serious recovery without a massive expansion of exports -- the very activity that was responsible
for so much of America's economic growth during the middle of this decade. But that won't be possible if other nations block imports. For generations, the deficits that we have run this past
decade and the trillions of dollars we are spending now mean we will be highly dependent on foreign loans from China, Japan and other parts of the world. But these will not be forthcoming at
prices we can afford without a global financial system built on deep collaboration between debtors and creditors -- including keeping our market open to foreign goods and services. The Obama
administration talks about a super-competitive economy, based on high-quality jobs -- which means knowledge-intensive jobs. This won't happen if we are not able to continue to bring in the
brightest people from all over the world to work and live here. Silicon Valley, to take one example, would be a pale shadow of itself without Indian, Chinese and Israeli brain power in its midst.
More generally, without an open global economy, worldwide industries such as autos, steel, banking and telecommunications cannot be rationalized and restructured efficiently, and we'll be
doomed to have excessive capacity and booms and busts forever. The big emerging markets such as China, India, Brazil, Turkey and South Africa will never be fully integrated into the world
economy, depriving them and us of future economic growth. The productivity of billions of men and women entering the global workforce will be stunted to everyone's detriment. Of course, no
one would say that globalization is without its problems. Trade surges and products made by low-priced labor can lead to job displacement and increasing income inequality. Proud national
cultures can be undermined. But these challenges can be met by reasonable regulation and by domestic policies that provide a strong social safety net and the kind of education that helps people
For thousands of years,
globalization has increased global wealth, individual choice and human freedom. The point is, economic
nationalism, with its implicit autarchic and save-yourself character, embodies exactly the wrong spirit and runs in precisely the
wrong direction from the global system that will be necessary to create the future we all want . As
happened in the 1930s, economic nationalism is also sure to poison geopolitics. Governments under
economic pressure have far fewer resources to take care of their citizens and to deal with rising
anger and social tensions. Whether or not they are democracies, their tenure can be threatened by
popular resentment. The temptation for governments to whip up enthusiasm for something that
distracts citizens from their economic woes -- a war or a jihad against unpopular minorities, for example -is great. That's not all. As an economically enfeebled South Korea withdraws foreign aid from North
Korea, could we see an even more irrational activity from Pyongyang? As the Pakistani economy
goes into the tank, will the government be more likely to compromise with terrorists to alleviate at least one source
of pressure? As Ukraine strains under the weight of an IMF bailout, is a civil war with Cold War
overtones between Europe and Russia be in the cards? And beyond all that, how will economically embattled
and inward-looking governments be able to deal with the critical issues that need global resolution
such as control of nuclear weapons , or a treaty to manage climate change, or help to the hundreds
acquire new skills for a competitive world. With the right responses of governments, the benefits should far outweigh the disadvantages.
of millions of people who are now falling back into poverty?
Second is Relations PRISM surveillance has tanked US-EU relations – ending the program is key to
restoring them
Zack Whittaker, Nov 27, 2013, “Realizing it's the underdog post-PRISM, EU lays out new BFF pact
with the U.S.,” ZDNET, http://www.zdnet.com/article/realizing-its-the-underdog-post-prism-eu-lays-outnew-bff-pact-with-the-u-s/, KEL
In efforts to get the "special relationship" back on track after months of painful political rhetoric and
frenemy-like relations, the European Commission wants to rekindle its trans-Atlantic love with its American
partners. But it comes with conditions. And if America doesn't play ball, the rift could get significantly
wider . The EU on Wednesday threw down its demands — albeit in a somewhat subdued typical softly-softly European way now that the 28 member state bloc
has taken time to breathe and think this one through — and hopes its U.S. counterparts bites at the chance to restore relations with its trans-Atlantic friend.
Tensions between the two continents have never been as strained as they are today. It all stems from the
revelations from the Edward Snowden house of leaks, which disclosed the massive surveillance operation by the U.S.
government by its National Security Agency (NSA).
US-EU relations key to solve global war
O'Sullivan, 4 -- National Interest editor (John, Nixon Center for Peace and Freedom Distinguished
Fellow in International Relations, "Europe and the Establishment," The National Interest, 7-31-2004,
nationalinterest.org/article/europe-and-the-establishment-2608)
The report's starting point -- that U.S.-European relations
are extremely important -- is undeniable. A united Western
alliance would shape world institutions in line with values and practices rooted in liberty and democracy and coax rising
powers such as India and China into going along with this international status quo for the foreseeable future. Indeed, this is already
happening as China accepts liberal economic rules at home in order to enter institutions such as the G7 and the World Trade Organization. By
contrast, a
disunited West would tempt such powers to play off Europe and America against each other and
foster a global jockeying for power not unlike the maneuvering between a half-dozen great powers that led to 1914.
Plan solves global protectionism against US tech firms and increases US trade
negotiation credibility
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
RECOMMENDATIONS The
free and open Internet that powers the globally networked economy is dependent
on the ability of individuals and companies to engage in commerce without geographic restrictions. To
turn back the tide of technology protectionism, U.S. trade negotiators will need a stronger hand to
play . They cannot go to other nations and tell them to not discriminate against U.S. tech firms if the U.S.
intelligence system continues to follow policies that threaten their citizens and businesses. As a result, it is
incumbent on the Congress and the Obama administration to take the lead in showing the world
the best standards for transparency, cooperation, and accountability . First, the U.S. government
should be forthcoming and transparent about its surveillance practices and clearly inform the public about
the data it collects domestically and abroad. The U.S. government should set the gold standard for international transparency
requirements, so that it is clear what information both U.S. and non - U.S. companies are disclosing to governments at home and abroad. The U.S.
government should then work with its allies to create an international transparency requirement that illuminates when countries conduct
surveillance that accesses foreign companies’ information. Second,
the U.S. government should draw a clear line in the
sand and declare that the policy of the U.S. government is to strengthen not weaken information security.
The U.S. Congress should pass legislation, such as the Secure Data Act introduced by Sen. Wyden (D - OR) , banning any
government efforts to introduce backdoors in software or weaken encryption. 43 In the short term, President Obama,
or his successor, should sign an executive order formalizing this policy as well. In addition, when U.S. government agencies discover
vulnerabilities in software or hardware products, they should responsibly notify these companies in a timely manner so that the companies can fix
these flaws. The best way to protect U.S. citizens from digital threats is to promote strong cyber security practices in the private sector.
Case Extensions
Inherency
Inherency - General
PRISM’s legal justification exponentially increases the amount of surveillance the
government can conduct legally without warrant
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
According to a leaked working draft of the NSA's Inspector General report, in
order to move the content collection involved in
the President's Surveillance Program to a more secure legal footing, from mid-2005 to January 2007, DOJ worked
with NSA to redefine facility. n41 Instead of understanding the word in the traditional sense, (as a specific
telephone number or email address), DOJ argued that it should be understood as a "general gateway" or
"cable head." n42 This change expanded the amount of information that could be obtained by the
government under FISA. The Internet consists of a number of interconnected networks that allow
computers to communicate. A "gateway" is the entrance point from one network to another, or a node, which
converts one protocol stack into another. It is thus an essential feature in most routers (although other devices may also function as gateways).
Routers may transfer, accept, and relay packets of information, but they are limited to networks using similar protocols. Gateways, however, can
accept packets that are formatted for one protocol and convert it into another protocol format. They house routing databases, which determine the
flow of information. A
"cable head," in turn, includes computer systems, databases required to provide Internet
access, and the cable modem termination system (CMTS), which is a system of devices that sends and
receives digital signals on a cable network. The mechanism resides at a phone company's central location, linking customer
connections to a single point. [*133] Redefining facility to include gateways held by the telecommunications company, as well
as the cable head and CMTS (instead of, more narrowly, specific telephone numbers or Internet protocol addresses associated with
particular computers), exponentially increased the amount of content that could be obtained by the government.
Instead of just obtaining the content carried by a single telephone line, or to and from a particular
computer address, the government could obtain the content of all telephone calls or Internet content run
through telecommunication companies' routers.
FISA Section 702 authorizes PRISM
James Jay Carafano, Aug 6, 2013, Ph.D., Vice President for the Kathryn and Shelby Cullom Davis
Institute for National Security and Foreign Policy at Heritage Foundation, and the E. W. Richardson
Fellow, “PRISM is Essential to U.S. Security in War Against Terrorism,” Heritage Foundation,
http://www.heritage.org/research/commentary/2013/8/prism-is-essential-to-us-security-in-war-againstterrorism, KEL
The authority for PRISM is in FISA Section 702. Congress debated these authorities in 2007 and again
when the program was reauthorized in 2008. Senate Majority Leader Harry Reid, D-Nev., surely
remembers the controversy. He wrote President Bush: "There is no crisis that should lead you to cancel
your trip to Africa. But whether or not you cancel your trip, Democrats stand ready to negotiate a final
bill, and we remain willing to extend existing law for as short a time or as long a time as is needed to
complete work on such a bill." Evidently, Reid must have felt the authorities granted under Section 702
received a full and sufficient hearing.
Inherency – USA Freedom Act Did Nothing for PRISM
US Freedom Act did little – it’s signal won’t restore trust in our online systems and
keeps encryption backdoors in place. Allies are still upset.
San Jose Mercury News June 8, 2015, “Privacy fight is far from over in US,” Reprinted in
Bakerfield Californian, http://www.bakersfield.com/news/opinion/2015/06/08/privacy-fight-is-far-fromover-in-us.html, KEL
The Senate's passage of the USA Freedom Act last week marks the first time since the Nixon administration that Congress chose to
rein in a powerful intelligence agency such as the NSA. Ending the National Security Agency's ability to collect data wholesale was a significant step toward
not close to restoring a presumption of privacy — or to rebuilding
trust in digital communication, the foundation of the tech industry that drives the American
economy . The cost to the tech industry as a result of NSA spying is estimated to reach $200 billion by 2016, as Americans and our European and Asian allies
reclaiming Americans' privacy rights. But Congress is
lose confidence in our security software. The expiration of the Patriot Act signals the end of mass collection of Americans' phone records without a warrant. But
really, the reforms in the USA Freedom Act are modest. They leave intelligence agencies ample room to continue needless invasions of
privacy. For example, the NSA will still be able to obtain metadata from phone companies by seeking a court order, virtually a rubber-stamp process. Intelligence
The NSA will still demand that Silicon Valley
companies leave a backdoor entry point for them to peruse searches and social media exchanges . And
surveillance agencies will still be able to snoop on all international communications involving Americans
— anyone doing business or talking to loved ones overseas. This will further damage U.S.
relationships with allies . Some privacy advocates want Congress to reprise the Church Committee convened in the wake of Watergate to probe abuses
agencies will still be able to collect Americans' emails older than six months.
by the CIA, FBI and NSA. But there's no need: The work was done in 2013 by the President's Review Group on Intelligence, which included former members of the
CIA and NSA and experts on privacy law — not a wide-eyed idealist among them. They made 46 excellent, specific recommendations.
Failure to extend Section 215 of the Patriot Act was counterproductive. It focused
attention away from far greater surveillance threats-Executive Order 12333 and the
2008 FISA Amendments.
Vladeck, 6-1-15 [Stephen, Professor of Law @ American University, “Forget the Patriot Act – Here
Are the Privacy Violations You Should Be Worried About,” Foreign Policy, 6-1-15,
http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/?utm_source=Sailthru&utm_medium=email&utm_term=]
The ongoing debate over U.S. surveillance programs seemingly came to a head last night, when the Senate
failed to extend controversial Section 215 of the USA Patriot Act, which expired at midnight. As we learned from
Edward Snowden two years ago, Section 215 was the provision that the government secretly claimed provided
authority for the bulk collection of Americans’ phone records — their telephone “metadata.” And although the government’s
less-than-obvious interpretation of that statute was accepted by judges sitting on the largely secret Foreign Intelligence Surveillance Act (FISA)
Court, it has since been repudiated by two different federal courts, one on the grounds that Congress had not in fact approved such a program and
one on the grounds that, even if it had, such warrantless, suspicionless surveillance violates the Fourth Amendment to the U.S. Constitution. For
those reasons, and a host of others, the debate over what Congress should do with Section 215 as its sunset approached grew only more heated
ahead of the deadline, provoking bitter disputes over the legal wisdom and practical necessity of the phone records program. Some privacy and
civil liberties groups, joined by libertarian politicians such as Sen. Rand Paul (R-Ky.), supported outright expiration of the provision, arguing that
the phone records program was both unnecessary and unconstitutional. At the other end of the spectrum, hardline conservatives, led by Senate
Majority Leader Mitch McConnell (R-Ky.), backed a straight “reauthorization,” which would allow the program to continue for as much as two
additional years before further reconsideration. The Obama administration, along with a number of more moderate members of Congress, took
more of a middle road, calling for the fairly modest reforms provided by the USA Freedom Act, which would replace the phone records program
with a somewhat less open-ended (and somewhat better regulated) series of authorities for the government to obtain and review similar data —
and which the House of Representatives overwhelmingly passed on May 13. But whatever
the merits of the competing sides in this
debate, the larger problem is that this conversation has missed the forest for a very small — and largely irrelevant
— tree. In fact, from the perspective of individual privacy rights, the phone records program is much less
problematic than the government’s other authorities to conduct mass surveillance under Executive Order
12333 and the 2008 FISA Amendments Act. And so, in focusing on how to “fix” Section 215, we’ve given
short shrift to the far more significant problems raised by these other authorities — and, just as importantly, the
broader lessons we should be taking away from the surveillance reform conversation that Snowden started.
Executive Order 12333 and the 2008 FISA Amendments permit bulk data collection
without a warrant. The 4th Amendment is circumvented.
Vladeck, 6-1-15 [Stephen, Professor of Law @ American University, “Forget the Patriot Act – Here
Are the Privacy Violations You Should Be Worried About,” Foreign Policy, 6-1-15,
http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/?utm_source=Sailthru&utm_medium=email&utm_term=]
Ordinarily, the government needs a warrant before collecting the content of domestic communications, one
based upon a judge’s determination that there’s good reason to believe a particular individual either is
engaged in the commission of a crime or is an agent of a foreign power. But Executive Order 12333 and the 2008
FISA statute, by focusing on individuals who fall outside the Fourth Amendment, capitalize on the lack of
constitutionally required individualized assessments and instead allow the government to engage in bulk
collection of such information — as if it were using an industrial vacuum cleaner to pick up individual particles
of dirt.
Executive Order 12333 and the 2008 FISA Amendments can’t separate surveillance
of citizens from so-called legal surveillance of non-citizens. It’s technologically
impossible.
Vladeck, 6-1-15 [Stephen, Professor of Law @ American University, “Forget the Patriot Act – Here
Are the Privacy Violations You Should Be Worried About,” Foreign Policy, 6-1-15,
http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/?utm_source=Sailthru&utm_medium=email&utm_term=]
It’s easy to see how these authorities could cause diplomatic headaches (as, for example, with the contretemps surrounding U.S. surveillance of
German Chancellor Angela Merkel’s cell phone). But most commentators
have assumed that, at least legally, the validity of
these programs turns on their overseas focus. After all, if the government is only targeting the
communications of non-citizens outside the United States, what could possibly be the constitutional objection?
The answer, we now know, has everything to do with technology. Although the government is only allowed to
“target” non-citizens outside the United States, it is inevitable, given how it collects information under both of these
regimes, that the communications of U.S. citizens and non-citizens lawfully present in the United States will
also be collected, albeit “incidentally,” as the government puts it. After all, when thousands of unrelated emails and other
electronic communications are bundled together in a packet that travels through an Internet switch that’s
physically located in the United States (for the 2008 statute) or overseas (for Executive Order 12333), it’s simply not
possible for the government to only collect the communications between non-U.S. citizens and leave the
others untouched, any more so than it’s possible for a vacuum to segregate particles of dirt.
So-called “minimization” requirements fail to protect privacy from Executive Order
12333 and the 2008 FISA Amendments: too weak, ignored by the government and
sparse judicial and congressional oversight.
Vladeck, 6-1-15 [Stephen, Professor of Law @ American University, “Forget the Patriot Act – Here
Are the Privacy Violations You Should Be Worried About,” Foreign Policy, 6-1-15,
http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/?utm_source=Sailthru&utm_medium=email&utm_term=]
To be sure, the
U.S. government doesn’t dispute that it routinely collects the communications of U.S. citizens. Instead, it has argued
that any potential for abuse is mitigated by so-called “minimization requirements” — procedural rules that
require the relevant intelligence agency to take steps to avoid the improper retention and use of
communications collected under these authorities. The government’s defense, as we’ve come to learn, is flawed in two vital
respects: First, as several since-disclosed opinions from the FISA Court have made clear, the government’s minimization
requirements under the 2008 statute were often too skimpy, allowing the retention and use of information that both
the statute and the Fourth Amendment prohibit. Second — and perhaps more importantly — even where the
minimization rules were legally sufficient, there have been numerous instances in which government officials
violated them, with the FISA Court only discovering the abuses after they were voluntarily reported by Justice Department lawyers. As a
result, the government collected and retained a large volume of communications by U.S. citizens that neither Congress nor the Constitution
allowed it to acquire. More alarmingly, with regard to collection under Executive Order 12333, there
isn’t any similar judicial
review (or meaningful congressional oversight), which means that it has entirely been up to the government to
police itself. As State Department whistleblower John Napier Tye explained last summer, there is every reason to doubt that
such internal accountability has provided a sufficient check. In his words, “Executive Order 12333 contains nothing to
prevent the NSA from collecting and storing all … communications … provided that such collection occurs outside the United States in the
course of a lawful foreign intelligence investigation.”
Executive Order 12333 and the 2008 FISA Amendments pose a much greater
privacy threat than Section 215 of the Patriot Act.
Vladeck, 6-1-15 [Stephen, Professor of Law @ American University, “Forget the Patriot Act – Here
Are the Privacy Violations You Should Be Worried About,” Foreign Policy, 6-1-15,
http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/?utm_source=Sailthru&utm_medium=email&utm_term=]
To put the matter bluntly,
whereas the Section 215 debate has addressed whether the government can collect
our phone records, Executive Order 12333 and the 2008 FISA Amendments Act allow the government to
collect a lot of what we’re actually saying, whether on the phone, in our emails, or even to our search engines.
There is no question that, from a privacy perspective, these programs are far more pernicious than what’s been
pegged to Section 215. There is also no question that such collection raises even graver constitutional questions
than the phone records program. Whereas there is an open debate over our expectation of privacy in the
metadata we voluntarily provide to our phone companies, there’s no doubt that we have an expectation of
privacy in the content of our private communications.
Shortsighted focus on Section 215 places the U.S. on a slippery slope to even greater
privacy violations with no accountability for Executive Order 12333 and the 2008
Amendments.
Vladeck, 6-1-15 [Stephen, Professor of Law @ American University, “Forget the Patriot Act – Here
Are the Privacy Violations You Should Be Worried About,” Foreign Policy, 6-1-15,
http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisa-courtmetadata/?utm_source=Sailthru&utm_medium=email&utm_term=]
But whatever
the reason for our myopic focus on Section 215, it has not only obscured the larger privacy
concerns raised by these other authorities, but also the deeper lessons we should have taken away from Snowden’s
revelations. However much we might tolerate, or even embrace, the need for secret government surveillance
programs, it is all-but-inevitable that those programs will be stretched to — and beyond — their legal limits.
That’s why it’s important not only to place substantive limits upon the government’s surveillance authorities ,
but also to ensure that they are subject to meaningful external oversight and accountability as well. And that’s
why the denouement of Section 215 debate has been so disappointing. This should have been a conversation not
just about the full range of government surveillance powers, including Executive Order 12333 and the
2008 FISA Amendments Act, but also about the role of the FISA Court and of congressional oversight in
supervising those authorities. Instead, it devolved into an over-heated debate over an over-emphasized program.
Congress has tended to a paper cut, while it ignored the internal bleeding. Not only does the expiration of Section 215 have no
effect on the substance of other surveillance authorities, it also has no effect on their oversight and
accountability. Reaching some degree of closure with regard to the phone records program may leave many with the
impression that America has concluded a meaningful and productive national debate over surveillance reform.
We haven’t. And although the 2008 FISA Amendments Act is also set to expire — on December 31, 2017 —
the debate over Section 215 leaves little reason to believe that we’ll have it then, either.
Patriot Act expiration changed little – PRISM and other surveillance continue on
wide scale
Marcy Wheeler, June 1, 2015, “Reports of the Patriot Act’s death are greatly exaggerated,” Salon,
http://www.salon.com/2015/06/01/reports_of_the_patriot_acts_death_are_greatly_exaggerated/, KEL
The PATRIOT Act-authorized phone dragnet expired last night. For the first time since 2006, the NSA
won’t receive records of the phone calls you make within the United States. But that doesn’t mean spying
on Americans has stopped. The NSA still obtains records of calls — potentially all calls — you make
with people overseas. It still tracks Americans’ Internet communications using metadata obtained
overseas. The FBI can still access the content of any communications Americans have with foreigners
targeted under PRISM without a warrant or even any evidence of wrong doing. FBI can still, and indeed
does, obtain phone records of individuals in conjunction with national security investigations without any
court review. Not even the spying conducted under Section 215 — the authority that had been used to
collect all of Americans’ phone records, but which is also used to collect certain kinds of Internet data —
or the two other expiring provisions will stop. Because they’re tied to more focused investigations
(though the Internet collection is probably not targeted at one individual), they will probably continue
under a grandfather clause allowing ongoing investigations using those authorities to continue. So in spite
of all the alarmism you’re hearing, not much changed today. A phone dragnet that has never stopped a
terrorist was shut down, but will probably be restarted later this week or next, for at least 6 months.
US Freedom Act did nothing to deal with more significant mass online surveillance
Stephen Vladeck, June 1, 2015, professor of law at the American University Washington College of
Law, “Forget the Patriot Act – Here Are the Privacy Violations You Should Be Worried About,” Foreign
Policy, http://foreignpolicy.com/2015/06/01/section-215-patriot-act-expires-surveillance-continues-fisacourt-metadata/?wp_login_redirect=0, KEL
The Obama administration, along with a number of more moderate members of Congress, took more of a
middle road, calling for the fairly modest reforms provided by the USA Freedom Act, which would
replace the phone records program with a somewhat less open-ended (and somewhat better regulated)
series of authorities for the government to obtain and review similar data — and which the House of
Representatives overwhelmingly passed on May 13.
But whatever the merits of the competing sides in this debate, the larger problem is that this conversation
has missed the forest for a very small — and largely irrelevant — tree. In fact, from the perspective of
individual privacy rights, the phone records program is much less problematic than the government’s
other authorities to conduct mass surveillance under Executive Order 12333 and the 2008 FISA
Amendments Act. And so, in focusing on how to “fix” Section 215, we’ve given short shrift to the far
more significant problems raised by these other authorities — and, just as importantly, the broader lessons
we should be taking away from the surveillance reform conversation that Snowden started.
Freedom Act doesn’t solve
Edgar 2015
(Tim Edgar, Former director of privacy and civil liberties for the White House National Security Staff,
“Without the USA Freedom Act, NSA Could Resume Bulk Collection Even if Patriot Act Provisions
Expire”, May 30th, 2015, http://www.lawfareblog.com/2015/05/without-the-usa-freedom-act-nsa-couldresume-bulk-collection-even-if-patriot-act-provisions-expire/)
With the Senate continuing its dangerous brinksmanship regarding the imminent expiration of three Patriot Act provisions,
opponents of NSA bulk data collection seem poised to celebrate whatever happens. McConnell’s efforts to
extend the Patriot Act unchanged lack enough support to pass either chamber. A last-minute deal to pass
the USA Freedom Act may be in the works, but would still face a number of procedural and political
hurdles . It is likely there will be at least some lapse of three sections of the Patriot Act, including section 215, the business records provision
that supports the NSA’s bulk collection of telephone records. The assumption has been that the expiration of section 215
of the Patriot Act would mean the end of bulk data collection. That assumption is wrong . Only passing the
USA Freedom Act will do that. Even if section 215 expires, the NSA could resume bulk metadata collection with
a little legal work from Justice Department and Intelligence Community lawyers. It is true that the Foreign Intelligence
Surveillance Court’s interpretation of section 215 has provided the authority for NSA’s current program of
bulk phone records collection as business records under the Foreign Intelligence Surveillance Act (FISA). However, as careful readers of
Lawfare know, the NSA’s bulk telephone metadata program under section 215 is not the only, nor was it the
first, bulk collection of metadata authorized by a creative interpretation of the Patriot Act’s amendments to FISA. The
section 215 phone records program was modeled on an earlier, Internet metadata bulk collection program
that began after September 11. The FISC approved the Internet metadata program under the pen register/trap and
trace (PR/TT) provisions of FISA – as amended by section 214 of the Patriot Act. The Internet metadata
program – known as the PR/TT program – had serious compliance problems because it was difficult for the NSA
reliably to segregate Internet metadata from Internet content. Still, the FISC continued to approve the
PR/TT program, with modifications, until the NSA itself chose to end the program in 2011. As a result, the
FISC’s orders approving bulk metadata collection remain a viable interpretation of the PR/TT
provisions of FISA and would have precedential value in any effort to resume bulk collection , whether
of Internet or telephony metadata. The PR/TT provisions of FISA are not limited to Internet metadata . If
anything, they apply more naturally to traditional telephony metadata, as they cover “dialing, routing, addressing, or
signaling” information. Section 214 , unlike section 215, is not going to expire tomorrow – it was made
permanent in 2005 . The Obama administration has understandably not talked much about this. It doesn’t want to take
pressure off Congress, and there is always risk in advancing a modified legal theory which would certainly
face opposition from telecommunications providers. The administration may feel differently on Monday, after section
215 has expired and it is facing an intelligence gap. Government lawyers would only need to persuade the court that
telephony metadata are “dialing, routing, address, or signaling” data – which they plainly are. The NSA
might well seek to switch its arguments before the FISC from section 215 to the PR/TT theory even if section
215 were reauthorized unchanged, as McConnell has proposed. The existing program is on shaky legal ground
because of the Second Circuit’s rejection of the FISC’s interpretation of section 215. The NSA’s bulk Internet
metadata program is far less well known than its phone records counterpart, probably because it was
terminated in 2011 — two years before Snowden leaked it and the government confirmed it. Still, the drafters of the USA Freedom Act
were careful to extend its reforms of bulk collection beyond section 215 of the Patriot Act. The USA Freedom Act prohibits bulk collection not
only under section 215, but also under either the PR/TT provisions of FISA (section 214 of the Patriot Act) or through the use of “national
there
is no guarantee that bulk collection will end simply because section 215 expires. In fact, they may well
end up preserving, not ending, the very bulk collection they oppose. Freedom Act codifies backdoor searches Gosztola
security letters.” Senator Rand Paul (R-KY) and his supporters should understand that, if they succeed in blocking the USA Freedom Act,
6/7 [KEVIN GOSZTOLA, JUNE 7, 2015, The US Surveillance State Now That USA Freedom Act is Law,
http://firedoglake.com/2015/06/07/podcast-the-us-surveillance-state-now-that-usa-freedom-act-is-law/] The
USA Freedom Act was
signed into law this past week. It was viewed
as both a victory for those concerned with privacy and restricting the National Security
law that did not go far enough in restricting spy agencies. In fact, the USA
Freedom Act further codified the post-9/11 legal framework for surveillance and resurrected
Patriot Act provisions , which expired for a couple days. The law did do away with the NSA’s control of all Americans’ domestic call
records. On the other hand, it left other programs, policies and practices, which NSA whistleblower Edward Snowden revealed to
the public, entirely untouched. For example, “backdoor searches” under Section 702 of the FISA
Amendments Act can continue, which means the NSA can collect emails, browsing and chat history of
US citizens without a warrant . On “Unauthorized Disclosure” this week, journalist Marcy Wheeler joins the show to discuss the
Agency’s mass surveillance and also as a
current state of play now that this law considered to be reform has passed.
Squo doesn’t solve
Business Cloud News 2015
(Business Cloud News, USA Freedom Act passes ending bulk data collection, May 14, 2015,
http://www.businesscloudnews.com/2015/05/14/usa-freedom-act-passes-ending-bulk-data-collection/)
“If
the Patriot Act authorities expire, and the FISC approves bulk collection under a different authority,
how would the public know? Without the USA Freedom Act, they won’t . Allowing the PATRIOT Act authorities to
expire sounds like a civil libertarian victory, but it will actually mean less privacy and more risk .” “Let’s not kill these
important reforms because we wish the bill did more. There is no perfect. Every bill we vote on could do more,” he added. Others, including Ted Lieu (D-CA), voted
against the proposed reforms because the bill didn’t go far enough. “ While
I appreciate a number of the reforms in the bill and
nation is better served by allowing Section
215 to expire completely and replacing it with a measure that finds a better balance between national
security interests and protecting the civil liberties of Americans,” Lieu said. “Beyond Section 215, I am troubled that the USA
Freedom Act would leave in place Sections 505 and 702, provisions that also allow sweeping data
collection and backdoor searches circumventing encryption that can result in the collection of information
of US citizens not identified in warrants . The loopholes left in place will continue to undermine the trust
understand the need for secure counter-espionage and terrorism investigations, I believe our
of the American people.”
Inherency: AT “SQ trend will solve surveillance”
Despite progress, there are still substantial risks of surveillance to overcome.
Snowden, 6-4-15 [Edward, former Central Intelligence Agency officer and National Security Agency
contractor and a director of the Freedom of the Press Foundation, “Edward Snowden: The World Says No
to Surveillance,” New York Times, 6-4-15, http://www.nytimes.com/2015/06/05/opinion/edwardsnowden-the-world-says-no-to-surveillance.html]
Though we have come a long way, the right to privacy — the foundation of the freedoms enshrined in the United States Bill
of Rights — remains under threat. Some of the world’s most popular online services have been enlisted as
partners in the N.S.A.’s mass surveillance programs, and technology companies are being pressured by
governments around the world to work against their customers rather than for them. Billions of cellphone location
records are still being intercepted without regard for the guilt or innocence of those affected. We have learned that our
government intentionally weakens the fundamental security of the Internet with “back doors” that
transform private lives into open books. Metadata revealing the personal associations and interests of
ordinary Internet users is still being intercepted and monitored on a scale unprecedented in history: As you read
this online, the United States government makes a note. Spymasters in Australia, Canada and France have exploited recent
tragedies to seek intrusive new powers despite evidence such programs would not have prevented attacks.
Prime Minister David Cameron of Britain recently mused, “Do we want to allow a means of communication between people which we cannot
read?” He soon found his answer, proclaiming that “for too long, we have been a passively tolerant society, saying to our citizens: As long as you
obey the law, we will leave you alone.” At the turning of the millennium, few
imagined that citizens of developed democracies
would soon be required to defend the concept of an open society against their own Leaders.
Inherency/DA Non-Unique – Freedom Act should have signaled
Status quo efforts to curtail surveillance render any disadvantage terminally non
unique or empirically false. Actions already taken will or should have caused the
impacts. Even Snowden admits curtailment has been substantial.
Snowden, 6-4-15 [Edward, former Central Intelligence Agency officer and National Security Agency
contractor and a director of the Freedom of the Press Foundation, “Edward Snowden: The World Says No
to Surveillance,” New York Times, 6-4-15, http://www.nytimes.com/2015/06/05/opinion/edwardsnowden-the-world-says-no-to-surveillance.html]
Two years on, the difference is profound. In a single month, the N.S.A.’s invasive call-tracking program
was declared unlawful by the courts and disowned by Congress. After a White House-appointed oversight
board investigation found that this program had not stopped a single terrorist attack, even the president
who once defended its propriety and criticized its disclosure has now ordered it terminated. This is the
power of an informed public. Ending the mass surveillance of private phone calls under the Patriot Act is
a historic victory for the rights of every citizen, but it is only the latest product of a change in global
awareness. Since 2013, institutions across Europe have ruled similar laws and operations illegal and
imposed new restrictions on future activities. The United Nations declared mass surveillance an
unambiguous violation of human rights. In Latin America, the efforts of citizens in Brazil led to the
Marco Civil, an Internet Bill of Rights. Recognizing the critical role of informed citizens in correcting the
excesses of government, the Council of Europe called for new laws to protect whistle-blowers. Beyond
the frontiers of law, progress has come even more quickly. Technologists have worked tirelessly to reengineer the security of the devices that surround us, along with the language of the Internet itself. Secret
flaws in critical infrastructure that had been exploited by governments to facilitate mass surveillance have
been detected and corrected. Basic technical safeguards such as encryption — once considered esoteric
and unnecessary — are now enabled by default in the products of pioneering companies like Apple,
ensuring that even if your phone is stolen, your private life remains private. Such structural technological
changes can ensure access to basic privacies beyond borders, insulating ordinary citizens from the
arbitrary passage of anti-privacy laws, such as those now descending upon Russia.
Momentum has shifted in favor of reduced surveillance. Each individual success
enhances solvency while making any disadvantages non unique or empirically
denied.
Snowden, 6-4-15 [Edward, former Central Intelligence Agency officer and National Security Agency
contractor and a director of the Freedom of the Press Foundation, “Edward Snowden: The World Says No
to Surveillance,” New York Times, 6-4-15, http://www.nytimes.com/2015/06/05/opinion/edwardsnowden-the-world-says-no-to-surveillance.html]
Yet the
balance of power is beginning to shift. We are witnessing the emergence of a post-terror generation,
rejects a worldview defined by a singular tragedy. For the first time since the attacks of Sept. 11, 2001,
we see the outline of a politics that turns away from reaction and fear in favor of resilience and reason. With
each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a
society, we rediscover that the value of a right is not in what it hides, but in what it protects.
one that
Inherency - A2 Epstein & Loyola – 2008 FAA solves
SQ FAA procedures do not require destruction of info accidentally captured
Julian Sanchez June 28, 2013, Sr Fellow at CATO on tech, privacy, and civil liberties, “Epstein on
NSA (Again) Part I: PRISM & the FISA Amendments Act,” CATO Institute,
http://www.cato.org/blog/epstein-nsa-again-part-i-prism-fisa-amendments-act, KEL
Epstein and Loyola begin with a defense of the FISA Amendments Act of 2008 (FAA), and in particular the use of FAA authority to collect Internet
content via the PRISM program. That law scrapped the traditional requirement that a Foreign Intelligence Surveillance Act (FISA) warrant be obtained to intercept
wire communications to which a U.S. person was a party, provided that the “target” of surveillance was a foreigner. Epstein and Loyola nevertheless characterize the
new standard as having “unduly restricted” surveillance on the grounds that some limitations on that interception remain. Yet the authors get several of those limits
wrong. They claim, for instance, that
FAA minimization procedures “require, among other things, the destruction of much
potentially valuable information on U.S. persons, and anyone inside the United States, even before
intelligence officials can determine its value.” Since those minimization procedures have now been
published by The Guardian, it is fairly easy to see that this is not accurate. Instead, destruction of U.S.
person information is required only after intelligence officials have determined that it is not of value, which
is to say that once a reviewer has identified a communication as “clearly not relevant to the authorized purpose of the acquisition (e.g., the communication does not
contain foreign intelligence information) or as not containing evidence of a crime which may be disseminated under these procedures.” When the communication
As the secret FISA court has explained in a
rare public ruling, FISA minimization procedures are “weighted heavily in favor of the government ,” with
destruction required only when a communication is unambiguously irrelevant. Even wholly domestic communications—which are not
supposed to be acquired under FAA authority at all—can be retained under a variety of exceptions. Among
“may be related” to an authorized purpose, it can be forwarded to an analyst for further scrutiny.
these: any communication that is encrypted or otherwise suspected to contain a “secret meaning” can be retained pending cryptanalysis.
Epstein & Loyola are wrong – FAA doesn’t require a special target now. The entire
point of the FAA was to allow surveillance of non-specified targets or groups
Julian Sanchez June 28, 2013, Sr Fellow at CATO on tech, privacy, and civil liberties, “Epstein on
NSA (Again) Part I: PRISM & the FISA Amendments Act,” CATO Institute,
http://www.cato.org/blog/epstein-nsa-again-part-i-prism-fisa-amendments-act, KEL
They also claim that “[l]ike a wiretap, the target [of FAA surveillance] is always a specific suspect,” and that
this “system allows the U.S. government to target specific persons wherever they go (outside the United States).” This is not merely incorrect; it is
precisely backwards. As Attorney General Eric Holder made explicit in a letter to Congress urging reauthorization of
the FAA, the attorney general and director of national intelligence annually approve “intelligence collection targeting categories of non-U.S. persons abroad, without
the whole point of the FAA is that the “target” of surveillance
at the authorization level is essentially never a specific suspect. The language of the law, which describes the “target” as a
the need for a court order for each individual target.” In other words,
“person,” may have misled Epstein and Loyola on this point. But as the former head of the Justice Department’s National Security Division explains in the definitive
manual National Security Investigations and Prosecutions, the
“person” who may be a “target” of FAA surveillance: includes
not only “any individual” human being, but also “any group, entity, association, corporation or foreign
power,” some of which are (in fact or by definition) located abroad, even if they have individual members
or affiliates inside the United States… [The FAA] authorizes acquisition “targeting” a “person” reasonably believed to be abroad, and explicitly
adopts traditional FISA’s broad definition of the term “person.”
Cloud Competitiveness Advantage
Brink
Tipping point in storage market; cloud services popularity and
storage hardware decline are indicators
Preimesberger 2014 [Chris J. Preimesberger; Tech editor/writer for: eWEEK Senior Writer, 2005 – 2011, Open Source
Technology Group, Editor/Writer, 2003 – 2005, Fawcette Technical Publications, Editor/Writer, 2000 – 2003, Miller Freeman Publishing,
Editor/Writer, 1999 – 2000, Press On Publications, President/Owner, 1992 – 2000, Tribune Company Editor/Writer 1982 – 1992, Stanford
University Media Relations, 1979 – 1982, Los Angeles Daily News Writer/editor, 1975 – 1979; Storage Industry May Have Reached a Notable
Tipping Point; eWeek; June 8, 2014; http://www.eweek.com/storage/storage-industry-may-have-reached-a-notable-tipping-point.html; July 8,
2015; MG]
NEWS ANALYSIS: The cloud has set in and a new, more distributed environment
is controlling the storage landscape. After more than a generation of double-digit
and high single-digit sales, the enterprise networked storage hardware market is
beginning to see the true effects of the sea change to cloud storage. Leading companies such as
EMC were breaking sales records so often a few years ago that it was hardly news anymore. EMC, the world's largest independent storage
hardware and software maker, reported about 25 straight quarters of double-digit sales percentage increases. The storage cash cow seemed to
But now the cloud has set in and a tipping point has been
reached, and a new, more distributed environment is controlling the storage
landscape. Storage Disk Numbers Fall 5.2 percent Researcher IDC reported earlier this week that worldwide external disk storage systems
factory revenues fell 5.2 percent year-over-year to $5.6 billion during the first quarter of 2014 , with
weak high-end demand causing a drop in rates not seen since the worldwide depression year of 2009. " The poor results of the
first quarter were driven by several factors, the most important of which was a 25
percent decline in high-end storage spending," deduced Eric Sheppard, research director of storage at IDC.
"Other important contributors to the market decline include the mainstream
adoption of storage optimization technologies, a general trend toward keeping systems longer, economic
have an unending supply of milk.
uncertainty and the ability of customers to address capacity needs on a micro- and short-term basis through public cloud offerings." One can
blame it mostly, but not all, on the cloud. The beginning of this inevitable trend started eight years ago with Amazon's subscription storage
model, and it isn't going to let up anytime soon. "Poor" and "weak" are terms that are never associated with the storage industry, whether
all data has to find a home in some sort of hardware, right? But
now the capacity of storage hardware--whether solid-state or spinning disk--is
hundreds of times higher than products of only a decade ago, so fewer and fewer
disks have to be bought. Cloud storage services are soaking up more and more
content, and that means businesses don't have to buy as much, or any storage, in
fact. Cloud Now More Trustworthy Enterprises are trusting cloud services such as
Amazon, Rackspace, HP, Google, Apple, Microsoft, IBM and others for their
mission-critical storage and backup storage requirements. And why not? The IT
gets better and more trustworthy all the time and the subscription rates keep falling
due to competitive forces. Amazon has lowered its pricing 43 times since 2006, and
Google has been doing the same. Others are bound to follow. Again, this is a mere
tipping point, an event a lot of people have expected for a long while. Now that it's here, how
hardware or software. After all,
will the storage makers react? Will they branch out into new lines of business? EMC certainly has. How about NetApp, Dell, HP, Hitachi, Fujitsu
and all the others? The answer is that they, too, are doing the same. Most are already in the cloud-service business. It now depends upon which of
these companies is the quickest to react and answer the challenge of the market. In 2014 IT, the agile take all the marbles.
Surveillance hurts cloud industry
US online surveillance is undermining US cloud storage development and trust in ecommerce
Matthew Taylor, Nick Hopkins and Jemima Kiss November 1, 2013, “NSA surveillance may cause
breakup of internet, warn experts,” The Guardian, http://www.theguardian.com/world/2013/nov/01/nsasurveillance-cause-internet-breakup-edward-snowden, KEL
Large internet-based firms, such as Facebook and Yahoo, have already raised concerns about the impact
of the NSA revelations on their ability to operate around the world. "The government response was, 'Oh don't worry, we're not
spying on any Americans'," said Facebook founder Mark Zuckerberg. "Oh, wonderful: that's really helpful to companies trying to serve people around the world, and
that's really going to inspire confidence in American internet companies." Castro
wrote a report for Itif in August predicting as much as
$35bn could be lost from the US cloud computing market by 2016 if foreign clients pull out their businesses.
And he said the full economic impact of the potential breakup of the internet was only just beginning to
be recognised by the global business community. "This is changing how companies are thinking about
data. It used to be that the US government was the leader in helping make the world more secure but the
trust in that leadership has certainly taken a hit … This is hugely problematic for the general trust in the
internet and e-commerce and digital transactions."
PRISM revelations have undermined US tech sales globally
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
revelations of PRISM and other digital surveillance programs by Edward Snowden in 2013, a steady stream of troubling
details has continued to emerge about online spying by the U.S. intelligence community. 7 These revelations have fundamentally shaken
international trust in U.S. tech companies and hurt U.S. business prospects all over the world. In 2014, one survey
Since the
of businesses in the United Kingdom and Canada found that 25 percent of respondents planned to pull company data out of the United States as a result of the NSA
revelations. 8 This survey also found that respondents were thinking differently about the location of their data in a post - PRISM world, with 82 percent citing
national laws as their top concern when deciding where to store their data. Several companies have come forward describing the damage that this loss of trust has had
on their ability to do business abroad. For example, the software - as - a - service company Birst has found that companies in Europe do not want their data hosted in
North America due to concerns about U.S. spying. 9 In order to address these concerns, Birst was forced to partner with a European - based company to access
European businesses. In another example, a major German insurance company turned its back on Salesforce — a U.S. cloud computing firm — that was slated to
manage its consumer database after the revelations emerged. 10 In fact, Salesforce faced major short - term sales losses and suffered a $124 million deficit in the fiscal
quarter after the NSA revelations. 11 Salesforce
was not the only company to face this challenge, as U.S. firms saw
their sales impacted all over the globe. For example, Cisco — a company that makes routers and switches
— saw its sales interrupted in Brazil, China , and Russia because of reports that the NSA had secretly
inserted backdoor surveillance tools into its routers, servers and networking equipment. 12 During a quarterly
earnings call, Cisco CEO John Chambers even cited the NSA as the factor behind steep sales decreases, saying “I do think (the NSA revelation) is a factor in China.”
13 These reports damaged the company’s international reputation and prompted it to take extra precautions to thwart surreptitious actions by the NSA. The additional
costs this involved were passed along to its customers. 14 Other
companies have seen declining sales. For example, the Virginia saw its international clientele shrink from 60 percent of its business to nearly 30
percent as a result of European outrage. 15 Similarly , while mobile device chipmaker Qualcomm expects to see its sales
continue to grow in China, its CEO has acknowledged that revelations about U.S. government surveillance are
hurting sales and impacting its business in the rapidly growing foreign market. 16 IBM, Microsoft, and
Hewlett - Packard also have reported diminished sales in China as a result of the NSA revelations. 17
based web hosting company Servint
US online surveillance is costing US cloud storage companies $180 billion in
revenue, risking US competitiveness in the market
Ben Young, May 2, 2014, “Data Protection Fears Vs. US Cloud Market,” Information Week,
http://www.informationweek.com/government/cloud-computing/data-protection-fears-vs-us-cloudmarket/d/d-id/1234862, KEL
Business attitudes toward the cloud have changed a lot in recent years, but one thing has not: cloud's growth within small businesses, and now larger enterprises, as a
standard component of IT operations. The
cloud's continued growth is inevitable, because it's one of the best
opportunities for organizations to achieve greater IT flexibility, cost efficiency, and value from their data.
This year alone, the global cloud market is set to grow more than 126%, according to GigaOm Research. Yet, despite the
prospects for growth, there's room for doubt that the US will dominate the global cloud market. The NSA
snooping revelations that broke during last year's "Summer of Snowden" stoked fears around security, compliance, and
privacy in the cloud, particularly for businesses in highly regulated industries, and in countries with strict data privacy laws. When Forrester analyst James
Staten notoriously projected last August that the US cloud market would miss out on $180 billion in revenue by 2016 as a
result of NSA concerns, people in all corners of the tech industry sat up and listened. Since then, unlikely dissidents, including Google,
Microsoft, and Facebook, have made their case to the US government that NSA surveillance needs to be
curtailed, or it could seriously hurt their business. Saber rattling aside, one has to wonder: Just how doomed is the US cloud market? And
should government agencies, including the NSA, be concerned? Unfortunately, the threat to the US cloud market, due to worries about government surveillance, looks
real. Non-US businesses are increasingly concerned about the privacy and security of their (and their customers') data. In fact, a recent survey from ResearchNow,
commissioned by Peer 1 Hosting, showed 25% of UK and Canadian businesses plan to pull company data out of the US in 2014 as a result of the NSA revelations.
The survey also found that most companies are thinking differently about the location of their data post-Snowden: 82% said privacy laws are a top concern for them
when choosing where to store data, and 81% want to know exactly where their data is being hosted.
Revelations about PRISM’s existence is causing the EU and Canada to develop their
own cloud markets, undermining US competitiveness
Ben Young, May 2, 2014, “Data Protection Fears Vs. US Cloud Market,” Information Week,
http://www.informationweek.com/government/cloud-computing/data-protection-fears-vs-us-cloudmarket/d/d-id/1234862, KEL
Such nuances of the global cloud market used to seem like "somebody else's problem" to US government
agencies. But now, with the Snowden leaks confirming data privacy concerns, hesitance to store data in
the US may actually boost the growth of the cloud industry in Europe and Canada, to the detriment of the
US economy, as customers seek ways to keep their information as far from the NSA as possible.
The data sovereignty issue is in fact so important that 70% of the businesses surveyed by ResearchNow
would give up some level of performance to ensure they have control over their data. It's not unreasonable
to assume European cloud upstarts can snatch some of their business.
NSA surveillance will crush US tech firms and US cyber-power
Pema Levy, Contributor @ IBT, “Did The NSA’s Internet Surveillance Damage American Cyber
Power?”, June 23rd 2013, http://www.ibtimes.com/did-nsas-internet-surveillance-damage-americancyber-power-1317257
The revelation that the U.S. government uses America’s top Internet companies to help them track terrorists has landed those companies in hot
water, particularly abroad. In Washington, D.C., the
symbol of the nation's cyberpower is the National Security
Agency, the government’s secretive electronic surveillance arm. But Jason Healey, who heads the Cyber Statecraft
Initiative at the Atlantic Council, says this viewpoint is actually backward: America’s real clout as a
cyberpower actually comes from the companies that are innovating and dominating the Internet -Facebook, Google, Microsoft, Twitter and many more. Now, according to Healey, the NSA’s Internet
spying program, which focuses on foreign surveillance, may have dealt a serious blow to those companies
that keep America on top. “By compelling American companies to participate, completely not in their
shareholders’ interests or their customers’ interests, to participate in American hard cyberpower, we really
are putting this larger American cyberpower at risk,” Healey said Thursday, speaking during a panel discussion at the
Brookings Institute in Washington. One possible result of the NSA’s surveillance programs is that foreign
governments and companies might try to stop using America's Internet companies for social media or
cloud computing, among other things. “It would be a very rational reaction for foreign companies, people
in governments, it would be rational for them to ... choose to avoid U.S. cyberspace wherever they can,
such as by finding alternate routes, if they can find routes that don’t go through the United States,” Healey said. “Or they can start
building their own infrastructure and companies rather than relying on U.S. companies.” He said, “This will be to the detriment of
U.S. companies and ultimately to U.S. cyberpower.” Investing in new infrastructure and companies would take time, but there
have also been predictions that tech companies will suffer in the short term. According to technology security expert Richard
Stiennon, foreign buyers already viewed U.S. tech companies suspiciously due to previous rumors about the NSA’s activities. “Since 2006, every
time I present outside the U.S., the same question has been asked: ‘Is the U.S. reading our email?’” Stiennon wrote in Forbes earlier this month.
“From this week forward, a universal suspicion has transformed into acknowledged fact.”
Cloud storage is fastest growing segment of internet market. Surveillance is
undermining US global competitiveness.
Richard Stiennon June 7, 2013, “NSA Surveillance Threatens US Competitiveness,” Forbes,
http://www.forbes.com/sites/richardstiennon/2013/06/07/nsa-surveillance-threatens-us-competitiveness/,
KEL
The vast foreign and domestic spying by the NSA revealed this week threatens the global competitiveness
of US tech companies.
We are told we live in a digital world and the future is bright for tech startups as costs of launching new
products and services plummet and global markets open up to the smallest vendor. Yet, there is a world
wide perception that any data that is stored or even routed through the United States is sucked into
cavernous NSA data centers for analysis and cataloging. That perception was solidified in 2006 when
former AT&T technician Mark Klein blew the whistle on the fiber tap that ATT had provided to the NSA
in some of its data centers. Those perceptions have had real consequences for US tech firms seeking to
offer global services. Email archiving services such as ProofPoint could not sell to even Canadian
customers without building local infrastructure. Even establishing separate data centers in Canada and
Europe is not enough to assure customers that their data would forever stay out of the grasp of US
intelligence services.
One of the fastest growing segments of the tech industry is cloud services, with Salesforce.com one of the
leading examples. Box.net, and other cloud storage solutions, are burgeoning. Cloud infrastructure
providers like Amazon, Microsoft, and Rackspace are investing billions to serve markets that should be
global but will be barred from most countries thanks to the complete abandonment of trust caused by
NSA/FBI spying.
Surveillance hurts US tech exports/competitivness
NSA Surveillance will close foreign markets to US tech exports
Matthew Yglesias is Slate's business and economics correspondent, “Is PRISM Going To Harm U.S.
High-Tech Exports?”, June 7th 2013,
http://www.slate.com/blogs/moneybox/2013/06/07/prism_tech_exports_will_nsa_revelations_block_ame
rican_companies_abroad.html
The legal and policy arguments around the PRISM program through which the NSA snoops into the data stream of major American high-tech
companies are primarily going to focus on the treatment of American residents and citizens. There
doesn't really appear to be much
in the way of a debate as to whether it's legal or appropriate to be spying on foreigners without warrants
or probable cause. Which is perhaps fine as a matter of constitutional law, but I wonder about it as a matter of business practice. We've had
some disputes in the United States about firms using Huwaei's networking equipment in the telecommunications space. The issue is that Huwaei
is a Chinese firm with ties to the Chinese state, so people raise the worry that there's a national security risk in using them for network
infrastructure. And, of course, whatever legitimate concerns there are about this are politically amplified by the fact that Huwaei's competitors
would like to block them from doing business. So now imagine
a foreign country deciding that it's maybe not such a
great idea for all its citizens' Web search and webmail traffic to be surveilled by the American
government via Google, Microsoft, Yahoo, and AOL along the same principles. Bad, right? Maybe the
most dramatic example here is Google's new Glass product. Right off the bat a number of people have
raised concerns about the privacy issues implied by the use of heads-up displays. But Google Glass +
NSA PRISM essentially amounts to a vision in which a foreign country is suddenly going to be flooded
with American spy cameras. It seems easy to imagine any number of foreign governments having a
problem with that idea. More broadly, Google is already facing a variety of anti-trust issues in Europe, where basic economic
nationalism is mixing with competition policy concerns. Basically, various European mapping and comparison and shopping firms don't want to
be crushed by Google, and European officials are naturally sympathetic to the idea of not letting local firms be crushed by California-based ones.
There is legitimate concern that U.S. tech companies are essentially a giant periscope for American
intelligence agencies and seem like they'd be a very powerful new weapon in the hands of European
companies that want to persuade EU authorities to shackle American firms. Imagine if it had come out in
the 1980s that Japanese intelligence agencies were tracking the location of ever Toyota and Honda
vehicle, and then the big response from the Japanese government was to reassure people that Japanese
citizens weren't being spied upon this way. There would have been—legitimately—massive political
pressure to get Japanese cars out of foreign markets. The intelligence community obviously views
America's dominance in the high-tech sector as a strategic asset that should be exploited in its own quest
for universal knowledge. But American dominance in the high-tech sector is first and foremost a
source of national economic advantage, one that could be undone by excessive security
involvement.
NSA surveillance will collapse US information technology exports
Glenn Derene, Contributor @ Popular Mechanic , June 2013, “Why the NSA Prism Program Could
Kill U.S. Tech Companies”, http://www.popularmechanics.com/technology/military/news/why-the-nsaprism-program-could-kill-us-tech-companies-15564220
Let's say we take Clapper at his word: How
much should we worry about a program that is aimed at monitoring the
digital communications of foreigners? We should worry quite a bit, because this issue goes far beyond just
respecting the civil liberties of non-Americans. Think for a second about just how the U.S. economy has
changed in the last 40 years. While a large percentage of our economy is still based in manufacturing, some of the most
ascendant U.S. companies since the 1970s have been in the information technology sector. Companies
such as Microsoft, Apple, and Google are major exporters of information services (if you can think of
such a thing as "exportable") through products such as Gmail, iCloud, Exchange, and Azure. Hundreds of
millions of people use these services worldwide, and it has just been revealed to everybody outside the
U.S. that our government reserves the right to look into their communications whenever it wants. If you
lived in Japan, India, Australia, Mexico, or Brazil, and you used Gmail, or synced your photos through
iCloud, or chatted via Skype, how would you feel about that? Let's say you ran a business in those
countries that relied upon information services from a U.S. company. Don't these revelations make using
such a service a business liability? In fact, doesn't this news make it a national security risk for pretty
much any other country to use information services from companies based in the U.S.? How should we
expect the rest of the world to react? Here's a pretty good guess: Other countries will start routing around the U.S.
information economy by developing, or even mandating, their own competing services. In 2000, the
European Union worked out a series of "Safe Harbor" regulations mandating privacy protection standards
for companies storing E.U. citizens' data on servers outside of the E.U. For U.S. companies, that means
applying stronger privacy protection for European data than for our own citizens' data. And now there is
considerable reason to believe that Prism violated our Safe Harbor agreements with the E.U.
The possibility of US spying will crush US competitiveness even if the program isn’t
used for economic purposes
Ed Moyle, Senior Security Strategist with Savvis, providing strategy, consulting, and solutions to clients
worldwide and a founding partner of SecurityCurve, “Economic effects of NSA PRISM compared to
PLA’s APT-1”, June 14th 2013, http://www.securitycurve.com/archives/6799
So unless you’ve been living under a rock, chances are you’ve seen the news about NSA’s “PRISM” program. If what we’ve been led to believe
is as bad as we think (it might not be – see the “everything we know about PRISM” link from the Washington Post above), it’s pretty scary stuff.
Like most of us, I’ve been reading a lot of coverage about this over the past few days. We’re still in the “breaking story” portion of the news
cycle, so details are highly speculative at this point: we don’t know exactly what is involved, what is being requested from whom, and what the
details are about how they obtain it. So expect the story to change as more details surface. That being said, the
most astute points I’ve
been these observations from Forbes about the impact of this program on US competitiveness:
Trust is the very foundation of all commerce. Once lost it is almost impossible to regain. This week’s revelations that the
NSA has blanket data harvesting arrangements with Verizon, ATT, Sprint-Nextel, Google, Microsoft,
Apple, Skype, Yahoo, FaceBook and even credit card processors, will have immediate repercussions.
Non-US customers of any US business will immediately evaluate their exposure to these new risks and look
seen to date has
for alternatives. European, Canadian, and Australian tech companies will profit from this. Competitors in those regions will offer alternatives that
will also draw US customers away from the compromised US services. While
the FBI and NSA leverage the dramatic
intelligence opportunities of a digital world, their Orwellian actions are crushing opportunity for tech
giants and startups in the United States. TLDR version is that these actions could will have a stifling effect on the
ability of US firms to compete in the global marketplace. Meaning, given the choice between two products (one hosted in
the US and one hosted elsewhere) firms outside the US are less likely to purchase the US-based one when all other variables are equal. Now you
might say that maybe the PRISM stuff isn’t so bad and that the details (once they surface) might be more
benign than initially reported. That could be true. But the marketing impact is over. Meaning, it almost doesn’t
matter now what the actual details of the program are: the perception right now is so bad that the
competitiveness effects are already written . For example, remember the whole “horse meat” scandal from a while back? Does
it really matter if it turned out (upon closer scrutiny) that “beef” you bought is a mere 10% horse – as opposed to some larger percentage as you
initially speculated? Not really, right? Same with this. So, ”Alea Iacta Est”, as they say. The folks at Forbes didn’t explicitly draw this out in their
piece, but I’m interested in this as it relates to the actions of NSA (via PRISM) compared to the actions of China’s PLA in their activities (via
APT 1). Specifically, the PLA activities seem to be primarily focused on just one thing: increasing China’s competitiveness in the global
marketplace. They do this by bolstering China-based IP and incorporating the “competitive advantage” of the firms they target (allegedly). The
effects of this are more beneficial to the manufacturing sector – so in light of the specifics of the Chinese economy (~39% manufacturing), there’s
a bolstering effect. The impact of the PRISM economic impact is likely to be most strongly felt in services (which is 80% of the US economy).
So that’s not good. I guess time will tell what the full impact will be… but it does seem (to me anyway) like the
is the most salient point.
competitiveness impact
US internet surveillance undermines US tech firms like Google and destroys trust
necessary to sustain e-commerce
Seth Rosenblatt, Oct 8, 2014, “US spying scandal will 'break the Internet,' says Google's Schmidt,”
CNET.com, http://www.cnet.com/news/us-spying-scandal-will-break-the-internet-says-googles-schmidt/,
KEL
The impact of US government surveillance on tech firms and the economy is going to get worse before it
gets better, leaders at some of the biggest tech firms warned US Sen. Ron Wyden on Wednesday during a roundtable on the impact
of US government surveillance on the digital economy. The senior Democratic senator from Oregon took the floor at the Palo Alto High School gymnasium -- where
he played high school basketball well enough to earn a college scholarship for his court-side abilities more than 50 years ago -- to discuss the economic impact and
future risks of US government surveillance on technology firms. Google
Executive Chairman Eric Schmidt, who has been outspoken on the
topic, pulled no punches with his assessment of how the spying scandal has and will continue to impact
Google and other tech companies. The impact is "severe and is getting worse," Schmidt said. "We're going to wind up breaking
the Internet." Also on the panel with Schmidt was Microsoft General Counsel Brad Smith, another critic who became more outspoken of government
surveillance after Edward Snowden leaked National Security Agency documents in 2013 that showed a much wider federal spying apparatus than previously believed.
"Just as people won't put their money in a bank they won't trust, people won't use an Internet they won't
trust," Smith said. Panelist Ramsey Homsany, general counsel for online storage company Dropbox, said the trust between customers and
businesses that is at the core of the Internet's economic engine has begun to "rot it from the inside out."
"The trust element is extremely insidious," Homsany said. "It's about personal emails, it's about photos, it's about plans, it's about medical
records."
Surveillance Programs Cause Decline of U.S Technological Competitiveness—well
beyond $35 billion
Whittaker 15 Zack Whittaker, writer-editor for ZDNet, and sister sites CNET and CBS News. He is
based in the New York newsroom, US tech giants to "far exceed" $35 billion loss in NSA fallout, ZDNet,
June 9, 2015, http://www.zdnet.com/article/us-tech-companies-to-far-exceed-35-billion-loss-in-nsafallout/
Silicon Valley is expected to take a harsher beating over claims it was working with US intelligence
agencies The Information Technology and Innovation Foundation (ITIF) said in a new report Tuesday that the tech industry will
likely "far exceed" the group's initial estimate of losing up to $35 billion. The group's reason is in part
because little has been done to address global concerns two years after leaks revealed the PRISM
surveillance program.
NSA surveillance is already costing US tech industry its competitiveness
Whittaker 15 Zack Whittaker, writer-editor for ZDNet, and sister sites CNET and CBS News. He is
based in the New York newsroom, US tech giants to "far exceed" $35 billion loss in NSA fallout, ZDNet,
June 9, 2015, http://www.zdnet.com/article/us-tech-companies-to-far-exceed-35-billion-loss-in-nsafallout/
China is backing away from US tech brands for state purchases as NSA revelations continue to make
headlines in newspapers all around the world. ITIF, a non-profit group with a focus on tech issues, said that matters were
compounded by politicians failing to adopt new laws reining in government surveillance, which
"sacrifices robust competitiveness of the US tech sector for vague and unconvincing promises of
improved national security," said report authors Daniel Castro and Alan McQuinn. But in reality, the figures could be incalculable.
The report follows a slew of paltry earnings reports and lower-than-expected sales figures reports from
major tech and cloud providers over the past year. It's partly because their customers, concerned about their own
users' data being slurped up by the National Security Agency, are turning to local companies in Europe
and elsewhere to store their data.
China is shunning US Tech companies
Whittaker 15 Zack Whittaker, writer-editor for ZDNet, and sister sites CNET and CBS News. He is
based in the New York newsroom, US tech giants to "far exceed" $35 billion loss in NSA fallout, ZDNet,
June 9, 2015, http://www.zdnet.com/article/us-tech-companies-to-far-exceed-35-billion-loss-in-nsafallout/
Foreign governments, who remain big spenders in IT and technology, are also shunning tech giants. Many technology
companies are reporting significant sales drop-offs in China, once a burgeoning economy for Silicon
Valley firms. While some consumer-focused companies like Apple are seeing considerable success in the country, others -- like Cisco, HP, and
Microsoft -- are taking a hit. It follows Beijing's decision to drop key brands from its list of authorized government suppliers in the wake of the NSA
leaks. Although a number of reasons were cited, domestic companies were said to offer "more product guarantees" than their overseas rivals.
Competitiveness Impacts - Economy
Loss of US competitiveness leads to economic decline due to growth, job, and trade
balance losses
Whittaker 15 Zack Whittaker, writer-editor for ZDNet, and sister sites CNET and CBS News. He is
based in the New York newsroom, US tech giants to "far exceed" $35 billion loss in NSA fallout, ZDNet,
June 9, 2015, http://www.zdnet.com/article/us-tech-companies-to-far-exceed-35-billion-loss-in-nsafallout/
"The cost of inaction is not only short-term economic losses for U.S. companies," write Castro and
McQuinn in their conclusion. "But a wave of protectionist policies that will systematically weaken U.S.
technology competitiveness in years to come, with impacts on economic growth, jobs, trade balance,
and national security through a weakened industrial base."
Weak competitiveness kills productivity, quality of life and the economy
Howes et. al. 2K Candace Howes, Professor of Economics at Connecticut College and Ajit Singh,
Professo of Econmics at the Queen’s College, University of Cambridge pg. 180 “Competitiveness
Matters: Industry and Economic Performance in the U.S.”
In the introduction to this book, Howes and Singh (1999) argued that there
are good analytical and empirical reasons for the view
that relative productivity growth and the relative competitiveness of a country’s export sector matter
profoundly to its overall economic performance. With so much trade based on nonprice competitiveness, the trade balance can rarely be
achieved solely through exchange rate manipulation or only at great cost in terms of employment and real income growth. Moreover, greater
productivity growth abroad, as a result of faster technical progress there, is likely to have negative
consequences for productivity growth in the home economy unless corrective measures are taken to enhance the country’s
technological capabilities. Thus even an advanced country cannot afford to ignore its international competitive
position if it wishes to improve its standard of living in the long run. Contrary to Krugman’s (1994)
argument, competitiveness matters. Otherwise, in a world of wage-price inflexibility, external balance is
achieved only through adjustments in a country’s rate of growth relative to that of its trading partners.
Furthermore, due to cumulative causation, a country that is investing and innovating at a slower rate than its competitors will fall even further behind, requiring slower
and slower relative growth. Real
incomes will fall, inequality will increase, and employment will stagnate.
Competitiveness is key to high level of productivity and high standard of living –
empirics prove
Hämäläinen ’03 Professor Timo J. Hämäläinen, Finnish National Fund for Research and
Development, Finland. Pg. 7 “National Competitiveness and Economic Growth: The Changing
Determinants of Economic Performance in the World Economy”
If a country has a significant real competitive advantage in sectors where the level of productivity is both
high and rapidly increasing, its standard of living will be higher and develop more favorably than it would
without such an advantage. Since the lack of real competitiveness in high productivity (growth) sectors can only be compensated with lower prices and
costs an uncompetitive economy must either select a low-price, low-cost strategy, if feasible in a particular sector; or specialize in other sectors where it is. Such priceand cost-driven sectors tend to be rather labor-intensive and involve mature technologies. National specialization on these kinds of sectors means lower productivity
growth and standards of living than specialization on sectors in which competitiveness is primarily based on non-price factors. Hence,
the nature and
sectoral composition of a nation’s competitive advantage is a crucial determinant of the level and growth
of its aggregate productivity, and consequently the nation’s living standards.
American Economic leadership key to prevent world economic collapse
Mandelbaum 2005 – Professor and Director of the American Foreign Policy Program at Johns
Hopkins – 2005 [Michael, The Case for Goliath: How America Acts As the World’s Government in the
Twenty-First Century, p. 192-195]
Although the
spread of nuclear weapons, with the corresponding increase in the likelihood that a nuclear shot
would be fired in anger somewhere in the world, counted as the most serious potential consequence of the abandonment by the United
States of its role as the world's government, it was not the only one. In the previous period of American international reticence, the
1920s and 1930s, the global economy suffered serious damage that a more active American role might
have mitigated. A twenty-first-century American retreat could have similarly adverse international economic consequences. The economic
collapse of the 1930s caused extensive hardship throughout the world and led indirectly to World War II
by paving the way for the people who started it to gain power in Germany and Japan. In retrospect, the Great
Depression is widely believed to have been caused by a series of errors in public policy that made an economic downturn far worse than it would have been had
governments responded to it in appropriate fashion. Since
the 1930s, acting on the lessons drawn from that experience by
professional economists, governments have taken steps that have helped to prevent a recurrence of the
disasters of that decade.' In the face of reduced demand, for example, governments have increased rather than cut spending. Fiscal and monetary crises
have evoked rescue efforts rather than a studied indifference based on the assumption that market forces will readily reestablish a desirable economic equilibrium. In
contrast to the widespread practice of the 1930s, political authorities now understand that putting up barriers to imports in an attempt to revive domestic production
will in fact worsen economic conditions everywhere. Still,
a serious, prolonged failure of the international economy,
inflicting the kind of hardship the world experienced in the 1930s (which some Asian countries also suffered as a result of their
fiscal crises in the 1990s) does not lie beyond the realm of possibility. Market economies remain subject to cyclical downturns, which public policy can limit but has
not found a way to eliminate entirely. Markets also have an inherent tendency to form bubbles, excessive values for particular assets, whether seventeenth century
Dutch tulips or twentieth century Japanese real estate and Thai currency, that cause economic harm when the bubble bursts and prices plunge. In responding to these
events, governments can make errors. They can act too slowly, or fail to implement the proper policies, or implement improper ones. Moreover, the global economy
and the national economies that comprise it, like a living organism, change constantly and sometimes rapidly: Capital flows across sovereign borders, for instance, far
more rapidly and in much greater volume in the early twenty-first century than ever before. This means that measures that successfully address economic malfunctions
at one time may have less effect at another, just as medical science must cope with the appearance of new strains of influenza against which existing vaccines are not
effective. Most
importantly, since the Great Depression, an active American international economic role has
been crucial both in fortifying the conditions for global economic well-being and in coping with the
problems that have occurred, especially periodic recessions and currency crises, by applying the lessons of the past. The absence of such a
role could weaken those conditions and aggravate those problems. The overall American role in the world since World War II
therefore has something in common with the theme of the Frank Capra film It's a Wonderful Life, in which the angel Clarence, played by Henry Travers, shows James
Stewart, playing the bank clerk George Bailey, who believes his existence to have been worthless, how life in his small town of Bedford Falls would have unfolded
it is with the United States and
its role as the world's government. Without that role, the world very likely would have been in the past,
and would become in the future, a less secure and less prosperous place. The abdication by the United States of some or all of
had he never been born. George Bailey learns that people he knows and loves turn out to be far worse off without him. So
the responsibilities for international security that it had come to bear in the first decade of the twenty-first century would deprive the international system of one of its
In this sense, a world without
America would be the equivalent of a freeway full of cars without brakes. Similarly, should the American
government abandon some or all of the ways in which it had, at the dawn of the new century, come to
support global economic activity, the world economy would function less effectively and might even
suffer a severe and costly breakdown. A world without the United States would in this way resemble a fleet of cars without gasoline.
principal safety features, which keeps countries from smashing into each other, as they are historically prone to do.
Cloud Industry Non-Econ Impacts
Cloud has led to faster, better communication globally; this means
understanding of others’ needs and reporting issues instantly
Ferkoun 2013 [Maamar Ferkoun; Client Technical Architect for Cloud Services at IBM in the Asia-Pacific region; How cloud
computing is impacting everyday life; Thoughts On Cloud; April 4, 2013; http://www.thoughtsoncloud.com/2013/04/how-cloud-computing-isimpacting-everyday-life/; July 7, 2015; MG]
The likes of YouTube and Google are testimony to a shift in how people are now
interacting with others. From remote locations to the global center stage, an event can reach the four
corners of the planet by going viral. Global has reached its true significance, and we’ve
seen the emerging of the “citizen journalist” on this global stage. Anyone can turn into an instant
reporter, and live news feeds are constantly streaming the media, at times sparking social
upheavals. It has never been as easy to look out for long forgotten friends and classmates
with the explosion of social networks and websites proposing ways to connect and relate
through online communities. Facebook is of course a primary example. Public figures and politicians, too,
are now turning to engines such as Twitter to get a feel of the community and convey
their views while bearing the pressure and influence from the groups they are looking at
leading. Taking advantage of developments in cloud technology and the social media space has allowed these
different actors access to sophisticated analytical abilities. As an example of that, businesses are now increasingly using
data from social media platforms in combination with cloud-based information resources
to get better insights on potential services, innovations and customer requirements.
Cloud databases assist with access to education; cut expenses and
difficulties so more people can learn
Ferkoun 2013 [Maamar Ferkoun; Client Technical Architect for Cloud Services at IBM in the Asia-Pacific region; How cloud
computing is impacting everyday life; Thoughts On Cloud; April 4, 2013; http://www.thoughtsoncloud.com/2013/04/how-cloud-computing-isimpacting-everyday-life/; July 7, 2015; MG]
Educational institutions have been quick to realize the advantages of cloud technology
and have been eagerly adopting it for several reasons, including: Ability for the students
to access data anywhere, anytime, to enroll in online classes and to participate in group
activities The value of combining business automation processes to streamline
subscription, class enrollments and assignment tracking, thus reducing expenses
significantly Ability for the institutional body to leverage the storage cloud to store the
daily 2.5 quintillion bytes of data securely and without the need to cater to a complicated
infrastructure The benefit of process billing and charging for education and noneducation related activities While these are probably most obvious in a mature and developed market, cloud
computing technology also offers benefits to students from developing countries. Access
is now instantly available and in many instances free thanks to the proliferation of
websites dispensing educational material and cloud knowledge-sharing communities. A
simple internet connection can go a long way.
Developing countries weighed down by expensive infrastructure and
lack of education; cloud is k2 changing this
Ferkoun 2013 [Maamar Ferkoun; Client Technical Architect for Cloud Services at IBM in the Asia-Pacific region; How cloud
computing is impacting everyday life; Thoughts On Cloud; April 4, 2013; http://www.thoughtsoncloud.com/2013/04/how-cloud-computing-isimpacting-everyday-life/; July 7, 2015; MG]
Cloud technology also offers other benefits to developing countries since they no longer
have the burden of investing in costly infrastructures and can tap into data and
applications that are readily available in the cloud. I briefly mentioned the education sector above, but the same
applies to other areas, such as banking, agriculture, health and science. Take as an example the telecom industry,
whereby these developing countries have been fast embracing the smart mobile
technology that accelerated development by leaping over the traditional wire and copper
infrastructure.
Healthcare physicians and patients benefit from cloud; record
management and lowered operational costs result
Ferkoun 2013 [Maamar Ferkoun; Client Technical Architect for Cloud Services at IBM in the Asia-Pacific region; How cloud computing is
impacting everyday life; Thoughts On Cloud; April 4, 2013; http://www.thoughtsoncloud.com/2013/04/how-cloud-computing-is-impactingeveryday-life/; July 7, 2015; MG]
There are many reasons why using cloud technology in the healthcare industry is gaining pace.
Some examples include: managing non-siloed patient data and sharing it among different parties
such as medical professionals or patients checking their own status and treatment follow-ups;
reducing operational costs such as data storage; accessing this data through pervasive devices
such as mobile phones and going beyond the traditional intranet; implementing a quick solution in a secure
environment that is compliant with the Health Insurance Portability and Accountability Act
regulations. While there may be challenges in integrating old or current tools with new technologies and the corresponding level of
services, the benefits will outweigh the inhibition to move to the cloud. According to the industry, healthcare
will be a growing market in the coming years, running into the billions.
EU-US Advantage
AT “no impact – tons of trade now”
Even if the neg is correct that there’s a great deal of free trade between EU-US now,
TIPP still offers a huge boost for both US and European economies
Sara Miller Llana July 8, 2013 “Will US-EU trade talks spur growth - or show globalization's limits?,”
http://www.csmonitor.com/World/Europe/2013/0708/Will-US-EU-trade-talks-spur-growth-or-showglobalization-s-limits, KEL Tariffs between the US and EU are already relatively low, but because of
the sheer size of trade between the two – representing half of global economic output – advocates
say it would be a major booster of growth and jobs, especially in debt-stricken Europe that has
seen record high unemployment at 12.2 percent. The two already invest nearly $4 trillion in each
other’s economies, according to US statistics, which translates into 7 million jobs.
Surv threatens TTIP negotations
PRISM surveillance risks a final TTIP agreement
European Parliament News, March 31, 2015, “TTIP: Trade agreements must not undermine
EU data protection laws, say Civil Liberties MEPs,” http://www.europarl.europa.eu/news/en/newsroom/content/20150330IPR39308/html/TTIP-Trade-agreements-must-not-undermine-EU-dataprotection-laws-say-MEPs, KEL
The negotiators should keep in mind that that the consent of the European Parliament to the final TTIP
agreement "could be endangered as long as the blanket mass surveillance activities are not completely
abandoned and an adequate solution is found for the data privacy rights of EU citizens, including
administrative and judicial redress", MEPs say, in line with Parliament's resolution on the surveillance
programmes adopted on 12 March 2014 (press release).
PRISM surveillance risks TTIP passage by the EU
Jennifer Baker, April 9, 2015, “TTIP: Protect our privacy in EU-US trade deal or ELSE, snarl
MEPs,” The Register (UK),
http://www.theregister.co.uk/2015/04/09/ttip_eu_parliament_rattles_eu_commissions_cage_data_protecti
on/, KEL
Members of the
European Parliament’s civil liberties committee said last week that an “unambiguous, horizontal, selfstanding provision” in the Transatlantic Trade and Investment Partnership (TTIP) must be created to safeguard Europe’s
data protection laws. Although the ongoing negotiations on TTIP do not specifically deal with data protection, MEPs say that they “touch upon
international data flows, while excluding privacy and data protection entirely.” Ignoring data privacy has raised the ire of many in the
civil liberties committee and they warned EU Commission negotiators to “keep in mind that Parliament's
consent to the final TTIP agreement could be endangered as long as the blanket mass surveillance
activities are not completely abandoned and an adequate solution is found for the data privacy rights of EU citizens.” In other words,
the EU Parliament could hold the Commission to ransom.
MEPs have called on American and European negotiators to guarantee citizens’ right to privacy in an international trade deal.
NSA surveillance threatens TTIP negotiations – SQ talks on the issue wont resolve
long-term concerns – plan is key
Atlantic Community Press Commentary August 21, 2013, “NSA Scandal Heightens EU Data
Concerns with TTIP,” http://www.atlantic-community.org/-/nsa-scandal-heightens-eu-data-concernswith-ttip, KEL
NSA Scandal Heightens EU Data Concerns with TTIP The
recent NSA leaks have increased the debate around data
protection and how the US government and companies could use TTIP to further its data collection
operations. While large US corporations seek to reduce the level of data protection rules, European companies, with German companies out in front, have sought
to strengthen EU data protection regulations. The differing views of the EU and the US on data protection regulations are sure to affect the outcome of TTIP. The
disclosure of the collection of data by the National Security Agency (NSA) has had major reverberations throughout
the EU and the US. Although both sides have attempted to side step the issue of data protection to allow the
Transatlantic Trade and Investment Partnership (TTIP) negotiations to proceed, the issue of data protection and data
privacy is bound to play an important role in the finalisation of the agreement. While EU companies may have been
skeptical of US data operations prior to the leaking of NSA documents, this week's articles show how European sentiment toward data privacy has become more
entrenched, which could pose problems to future TTIP negotiations.
EU-US negotiations over Safe Harbor are ongoing, they can collapse at any time,
which would harm US tech firms
Devika Kornbacher May 5, 2015, attorney at Vinson & Elkins LLP, “The US-EU Safe Harbor
Program: Is It Safe?,” Law360, http://www.law360.com/articles/642603/the-us-eu-safe-harbor-programis-it-safe, KEL
Negotiations between the EU and the Department of Commerce regarding implementation of these
recommendations remain ongoing more than 16 months since first proposed. In November 2014, U.S. Federal Trade
Commissioner Julie Brill said that only 11 of the 13 recommendations could be addressed by either the Department of Commerce or the FTC, and that the two
recommendations on access to data by U.S. authorities are outside their jurisdiction. Recently, in mid-March, a delegation of EU members of Parliament visited
Washington, D.C., to continue these negotiations. But nothing has yet been finalized, and there is no timetable for an agreement. Schrems’ team cited these protracted
negotiations and missing timetable as proof that efforts to fix the admitted flaws in the Safe Harbor were failing. In defense of the Safe Harbor, Ireland and the EC
argued that the program is necessary both politically and economically, and that negotiations with the U.S. are ongoing. They asked the court to let the EC work
toward improving the Safe Harbor without inflicting the damage that would result from its suspension. The ECJ’s advocate general should publish a nonbinding
opinion by June 24 of this year, and the court should issue a final verdict by October. What Changes to the Safe Harbor Might Mean The EC appears to remain firmly
in support of the Safe Harbor, so the greatest threat to the program at the moment is likely from European courts or the national data protection agencies. Schrems’
ECJ case against Facebook involves limited questions from Ireland’s high court about the authority of the data protection agencies. The Irish high court did not ask the
ECJ to rule outright whether, in view of the NSA’s activities, the Safe Harbor complies with EU laws. Thus, the ECJ could limit its decision to the referred questions
and not directly address the validity of the Safe Harbor itself. Instead, it might give data protection agencies the authority to investigate the adequacy of the Safe
Harbor and make their own decisions regarding whether self-certifying U.S. companies are in compliance with the directive. A number of EU countries whose data
protection agencies have already made their positions clear could then find that the Safe Harbor does not provide “adequate” protection and potentially prosecute U.S.
companies that have relied on the program for years. On the other hand, there is the possibility that the ECJ could sua sponte rule that the Safe Harbor fails to satisfy
EU laws and order the program’s suspension, as Schrems attempted to argue. Relying on the ECJ’s April 2014 ruling invalidating the EU Data Retention Directive —
which required telecom companies to retain mass quantities of metadata for law enforcement — as being contrary to the EU’s Charter of Fundamental Rights,
In the face of uncertainty
surrounding the Safe Harbor, it is essential that companies formulate strategies to deal with a potential
suspension of the program. Twitter Inc., for example, stated in a recent U.S. Securities and Exchange Commission filing that
elimination of the Safe Harbor would disrupt its business by requiring duplicative operations in Europe or
by limiting its ability to use EU data. And Apple Inc. recently announced it will spend nearly $2 billion to
build two datacenters in Ireland and Denmark, which are expected to come online in 2017.
Schrems argued that this precedent required the invalidation of the Safe Harbor in light of U.S. surveillance.
NSA foreign surveillance will collapse the US-EU Safe Harbor compromise
Brian Proffitt, Adjunct @ the University of Notre Dame and technology expert specializing in
enterprise, cloud computing and big data with 23 years of journalism and publishing experience, “PRISM
Fallout: In Cloud We Don't Trust?”, June 07, 2013, http://readwrite.com/2013/06/07/prism-fallout-incloud-we-dont-trust#awesm=~oaaRV9iu6MkbgX
Successfully pulling off that impression would seem to be nearly impossible and the nine tech companies named in the PRISM documents are
in for a world of pain. Already, U.S.-based users, individual and corporate, are up in arms about the perceived breach, even as the U.S.
government insists that it is not spying on its own citizens, but is
targeting non-U.S. citizens in its quest to maintain
national security. US companies may end up becoming more active participants in cyber/national security related activities anyway,
depending on how Department of Defense cyberwar rules of engagement play out. Bit for public cloud users who reside outside
the U.S., the statements about non-U.S. targets are sure to have a chilling effect. Especially in the
European Union, which has been critically examining their data relationship with the U.S. for some time.
That relationship, once precarious, may have just gotten pushed off the cliff. Currently, data generated by
European companies is bound by the strictures of the E.U.'s 1998 European Commission Directive on
Data Protection (ECDDP), which, among other things, blocks data from being transferred to outside the
European Economic Area unless the E.U.'s strict protection guidelines were followed. The problem is that U.S. laws and
policies let data like names and addresses be handled in ways that were way outside the ECDDP comfort
zone. This would have effectively prevented any European data from being stored on U.S.-based clouds
and data centers, were it not for Safe Harbor. Established in the Fall of 2000, Safe Harbor is a compromise that
would allow data interchange to take place. Safe Harbor requires that companies follow a certain set of
privacy practices, such as informing individuals that their data is being collected and how it will be used. If Safe Harbor rules are
followed by U.S. companies, which self-certify themselves to be Safe Harbor compliant, then E.U. data can be stored in
the U.S., which is handy since many of the world's biggest public cloud services are located in the U.S. All of the E.U. nations, with the
exception of Germany, are participants in the E.U.-U.S. Safe Harbor agreement. This is why in Germany, corporate workers are prohibited from
using services like Google Docs to store and work with company information. (One has to wonder if the Germans didn't have an inkling that
something like PRISM was going on.) The Europeans have had some qualms about Safe Harbor already. Last July, an
independent European advisory body, the Article 29 Working Party, recommended the existing Safe Harbor agreement between the U.S. and
E.U. is not enough to provide true security for European organizations' data. Their
argument? That self-certification was
nowhere near enough to assure adequate protections. "…[I]n the view of the [Article 29] Working Party,
sole self-certification with Safe Harbor may not be deemed sufficient in the absence of robust
enforcement of data protection principles in the cloud environment," the recommendation stated. "The Working Party
considers that companies exporting data should not merely rely on the statement of the data importer claiming that he has a Safe Harbor
certification. On the contrary, the company exporting data should obtain evidence that the Safe Harbor self-certifications exists and request
evidence demonstrating that their principles are complied with." In other words, don't take U.S. tech companies at their word that they will
comply with Safe Harbor rules. Fast
forward to today, when suddenly the Article 29 Working Party's non-binding
recommendation has some teeth to it. European companies and lawmakers are very likely going to look at
the events surrounding PRISM and wonder how safe their data would be if stored in a U.S. system. Amazon
and Rackspace, two large U.S.-based public cloud providers, were not named in the PRISM slides, but Microsoft and Google were. While no one
knows if the U.S. intelligence services can and were accessing cloud-based data hosted by Microsoft and Google, the integrity of their cloud
hosting services will probably be called into question now, especially by companies outside the U.S., which - by the U.S. government's own
insistence - are valid targets for national security investigations. The
E.U.-U.S. Safe Harbor agreement may be the one of
first casualties of the leaking of PRISM - even if PRISM turns out to be fictitious. Just the hint that something like
PRISM could exist could evaporate a large amount of trust and business for U.S. cloud vendors - even ones
not named in the PRISM documents. Public cloud infrastructure is under serious threat, as users domestic and
international start seriously questioning public cloud security and integrity. This may bring a large shift
towards private cloud or virtual data centers deployments, as companies seek to protect their data from
government's prying eyes.
Discord over Safe Harbor could disrupt TTIP trade discussions
Privacy Tracker, Aug 2, 2013, Privacy Tracker provides allerts and legal analysis of legislative
trends, “US-EU Safe Harbor Under Pressure,” https://privacyassociation.org/news/a/us-eu-safe-harborunder-pressure/, KEL
Further signs of EU discontent over Safe Harbor came to light after the announcement of the Transatlantic Trade
and Investment Partnership (TTIP) negotiations. Those negotiations are aimed at establishing a free trade agreement between the U.S. and
the EU. Because of the substantial contribution that data transfers make to international trade, senior U.S.
officials wanted cross-border data transfers to be included in TTIP negotiations. The Coalition for Privacy and Free
Trade, launched by Hogan Lovells in March of this year, stated in comments to the United States Trade Representative that TTIP offers a unique
“opportunity to progress the interoperability of data privacy frameworks in a way that endures.” But not all stakeholders felt that TTIP was an
appropriate forum for addressing cross-border data transfers. Germany’s data protection commissioner, for example, blogged that the United
States data protection framework is lacking and that the Safe Harbor “cannot compensate for these deficits.”
Prism’s existence has placed Safe Harbor on the brink
Privacy Tracker, Aug 2, 2013, Privacy Tracker provides allerts and legal analysis of legislative
trends, “US-EU Safe Harbor Under Pressure,” https://privacyassociation.org/news/a/us-eu-safe-harborunder-pressure/, KEL
Recent attention to the National Security Agency’s (NSA’s) surveillance operations have made things
even tougher for Safe Harbor. The European Parliament has called on the European Commission to
conduct a full review of Safe Harbor. Parliament’s resolution notes that some companies involved in
NSA’s PRISM surveillance program are certified under Safe Harbor. Parliament claims that PRISM
surveillance may have involved a “serious violation” of EU data protection laws, and that the
Commission may therefore be obliged to reverse or suspend Safe Harbor. Germany’s data protection
commissioners wrote a letter asking German Chancellor Merkel to recommend that the EU suspend Safe
Harbor. EU Vice President Viviane Reding announced the European Commission’s plan to conduct a full
review of Safe Harbor by the end of this year. Reding, who drafted the Commission’s proposed data
reform package, called PRISM a “wake-up call” and said that Safe Harbor “may not be so safe after all.”
These claims come a little more than one year after Reding, in a joint release with then U.S. Commerce
Secretary John Bryson, reaffirmed the EU’s commitment to Safe Harbor “as a tool to promote
transatlantic trade and economic growth.”
Criticisms of Safe Harbor and other mechanisms that allow data to be transferred from the EU to the
United States have, in many instances, been blind to the nature of government surveillance in EU
countries. As Hogan Lovells privacy lead Chris Wolf wrote in a recent Privacy Perspectives blog post,
“[I]t is naïve to think that intelligence agencies in European countries do not utilize information collected
from phone and Internet companies in their investigations.” And those countries often lack the judicial
and legislative oversight protections incorporated into U.S. surveillance laws. Regardless of the relative
strengths and weaknesses of the privacy protections in EU and U.S. surveillance laws, however, the
outcry over U.S. government surveillance has apparently reenergized EU data protection reform efforts.
That could spell trouble for Safe Harbor even though Safe Harbor facilitates substantial and valuable data
transfers that have been undisturbed by government access.
AT: “TTIP negotiations have derailed”
The recent TPA passage has TTIP back on track
Agence France Press June 26, 2015“US Congress passes trade bill paving way for TTIP,”
http://www.wort.lu/en/business/ttip-and-tpp-us-congress-passes-trade-bill-paving-way-for-ttip558d17db0c88b46a8ce5be4d, KEL
After weeks of legislative clashes Congress handed US President Barack Obama a major policy victory Wednesday,
giving him authority to rapidly conclude a Pacific trade accord and move forward with the transatlantic
EU trade deal. Bucking political tradition, the Democratic president relied on his Republican rivals to help realise the top economic priority of his second
term: creating a 12-nation trans-Pacific free-trade area aimed at opening new markets for US exports in countries like Japan, Chile, Australia and Vietnam. Obama's
own party has rebelled, worried about a repeat of the 1990s North American Free Trade Agreement, which led to large numbers of manufacturing jobs going to
Mexico, where labor costs were dramatically lower. But after a major trade package including so-called trade promotion authority (TPA) stalled in Congress this
month, the White House and Republican leaders secured the necessary votes to advance at least the TPA measure. The Senate voted 60 to 38, with 15 pro-trade
TPA expands Obama's powers to negotiate the Trans-Pacific Partnership
and other trade deals, including the Transatlantic Trade and Investment Partnership (TTIP) with the EU, and present
them to Congress for an up-or-down vote, without lawmakers able to pick apart the accord.
Democrats joining all but five Republicans to approve the measure.
European Parliament is no longer against TTIP – its approval of recommendations
for negotiations have clear objections from June
Neil Madden July 9, 2015, “MEPs give greenlight to further TTIP negotiations,” Shanghai Daily,
http://www.shanghaidaily.com/article/article_xinhua.aspx?id=291554, KEL
The European Parliament (EP) finally approved Wednesday its recommendations to European Commission (EC)
officials negotiating the Transatlantic Trade and Investment Partnership (TTIP) with the United States. In June, the vote on the
recommendations was suspended after the EP's two major political groups, the centre-right European People's Party (EPP)
and centre-left Socialists & Democrats (S&D), failed to agree the final text. But a compromise was reached allowing the
recommendations to be put to Parliament which voted in favor by 436 votes to 241, with 32 abstentions. At a press conference
after the vote, the rapporteur, German Socialist MEP (member of EP) Bernd Lange, said he was delighted that the EP had achieved a positive result, adding that MEPs
had sent a clear signal to EC negotiators as to what can and cannot be negotiated in the trade pact. Lange said the TTIP negotiations could now proceed safe in the
knowledge that issues such as cultural diversity, data protection standards, workers' rights and environmental protection would not be watered down to suit the final
agreement, which could be ready by 2017-2018. A compromise wording on investor-state dispute resolution tools, hammered out by political groups in long and tense
negotiations and inserted in the text with 447 votes in favor, 229 against and 30 abstentions, calls for a new justice system to replace the controversial "investor state
dispute settlement" (ISDS), which relies on private arbitration and are common in trade deals. The new system should be "subject to democratic principles and
scrutiny," MEPs insisted, in which cases are handled "in a transparent manner", by publicly appointed, independent professional judges and in public hearings. It
should also include an appellate mechanism, respect the jurisdiction of EU and member state courts and ensure that private interests "cannot undermine public policy
objectives", the text states. Among the provisions MEPs want to see in the final TTIP agreement is the removal of U.S. restrictions on foreign ownership of transport
services and airlines, improved EU access to America's giant telecommunications markets and a "significant opening" of the U.S. public procurement market at all
levels of government. At the same time, high levels of protection for EU consumer data, and health and safety must be guaranteed, they added. MEPs also stressed
that public services must be excluded from the scope of the deal, and there should be special treatment for "sensitive agricultural and industrial products." Mutual
recognition of equivalent standards is another demand. However, the approved text stresses that there can be "no agreement" in areas where the U.S. standards are
"very different", e.g. authorization of chemicals, genetically modified food and crops, use of hormones in the cattle sector, cloning or endocrine-disrupting chemicals.
The tenth round of the TTIP negotiations is scheduled for 13-17 July 2015 in Brussels. But, it remains to be seen how U.S. negotiators will respond to the MEPs
demands. America
also has powerful lobbies -- for example, in agriculture -- that are just as keen to shield their markets
from foreign competition. And U.S. policy makers could point to the sometimes painfully slow progress in allowing cross-border freedom of trade even
between EU member states. In parts of the EU, some sectors, like financial services or rail transport, are still all but closed to companies from other EU countries.
But at least Wednesday's vote enables the TTIP negotiating process to clear a significant hurdle .
TTIP will be finalized – the sides are working out the issues
BBC, 10/3/14 (“US and EU 'make progress' in free trade area talks,” http://www.bbc.com/news/business-29482892, bgm)
Officials from the United States and the European Union say they have made progress as they seek to
sweep away trade barriers. Teams from the two sides have held a week of discussions in Chevy Chase,
Maryland. If successful an agreement would create the world's biggest free trade zone. The chief US
negotiator Dan Mullaney said the ultimate goal is to "create opportunities for job creating trade and
investment". 'Spadework' They are trying to do that by eliminating tariffs (taxes on imported goods) and
removing what Mr Mullaney called "non-tariff obstacles". This was the seventh formal round in an
exercise that began last year. Mr Mullaney said they have "progressed from discussing general
approaches to the spadework of reviewing the many proposals that each side has put on the table." The
planned agreement is known as the Trans-Atlantic Trade and Investment Partnership or TTIP.
Wide government support for TTIP
New Scientist, 10/31/14 (“TTIP: How the world's largest trade deal affects you,”
http://www.newscientist.com/article/mg22429932.600-ttip-how-the-worlds-largest-trade-deal-affects-you.html, bgm)
This isn't the first time that the US and EU have tried to forge a broad trade agreement. The TTIP
negotiations might fail too. But TTIP has wide support from governments, and national parliaments will
only get a brief period to scrutinise the deal before being asked to ratify it. And if they do, it'll be hard to
call anyone to account. All the documentation will be locked away for 30 years.
There is bipartisan support for trade.
Stokes 15 [Bruce is director of global economic attitudes in the Pew Research Center’s Global Attitudes
Project, where he assesses public and expert views about economic conditions, values and policies.
“Americans agree on trade: Good for the country, but not great for jobs”,
http://www.pewresearch.org/fact-tank/2015/01/08/americans-agree-on-trade-good-for-the-country-butnot-great-for-jobs/, 7/7/15] BG
Despite conventional wisdom in Washington that Republicans are free traders and Democrats are
protectionists, there is no partisan divide on trade outside the Washington Beltway. Both Republicans and
Democrats voice the view that trade is good for the United States. But that won’t necessarily make
passage of either trade initiative a slam dunk. Both the GOP and Democrats also agree that trade may not be good for them
personally. About two-thirds (68%) of Americans say that growing trade and business ties between the U.S.
and other nations are good for the country. This includes 71% of Democrats and 68% of Republicans.
However, only one-in-five Americans think trade with other countries creates jobs. This includes 24% of Republicans and just 19% of
Democrats. Similarly, only 17% of the general public says trade leads to higher wages, among these are 21% of the GOP and 14% of Democrats.
According to another Pew
Research poll, more than half the American public thinks both TPP and the Transatlantic Trade and
Investment Partnership (TTIP), an Obama administration trade and investment initiative with the
European Union, would be good for the country.
Moreover, there is a discernible partisan split in support for specific trade agreements now under negotiation.
AT: “Ag issues will doom TTIP deal”
TTIP negotiations will solve GMO disputes
Andreas Geiger Oct 21, 2013, managing partner of Alber & Geiger, a leading EU lobbying law firm,
“American agriculture, GMOs and Europe,” The Hill, http://thehill.com/blogs/congress-blog/economy-abudget/329375-american-agriculture-gmos-and-europe, KEL
But the TTIP
could be the ultimate way to solve the GMO dispute at the same time. There are major issues
which need to be resolved before a free-trade agreement can come into effect. The divergence is particularly visible with
regard to the mentioned sale of genetically modified food products. While the United States has embraced GMOs and regulated GM food products as if they were
equal to non-GM food, the EU has always imposed heavy restrictions on GM food through a series of labeling requirements and by limiting the approvals for the
cultivation of GMO crops. US farmers have been frustrated by these barriers for years and the US government is pushing towards concessions by the EU in this area.
In fact, the US Senate Finance committee has recently stressed that any agreement must also reduce EU restrictions, among others, on genetically modified crops.
Reaching consensus on this contentious issue is vital to successful negotiations of the TTIP. Despite
the considerable regulatory differences
in approach towards GMOs and the risk that they pose to the conclusion of the trade agreement, consensus may still be reached if
agriculture and patent based US industry stop relying on their government to lobby their interests in
Europe. But engage in direct, hard core lobbying activity themselves. US diplomacy alone will not do it. The EU-US
FTA talks are a unique opportunity for agriculture big business to make their voice heard in the EU and
implement their interests effectively, while at the same time paving the way for the successful conclusion of the trade talks. The TTIP
offers the perfect vehicle to overcome the overwhelming opposition to GMOs in the EU, if companies learnt from
past mistakes and engaged directly and in a meaningful manner with the EU institutions and regulatory bodies, treating their EU efforts equally to their efforts in
Washington D.C. Interested parties should do what they do in DC: Rely on professional lobbying services to mitigate concerns falsely attributed to GMOs associating
genetically modified crops with environmental risks or with safety hazards for food. There is a need to engage seriously through government relations work instead of
simply public affairs work to counter commonly held views across Europe. Past failures can also be attributed to an American lack of sensitivity about the Brussels
lobbying scene. No European tries to lobby Senate or Cngress without the help of a DC lobbying firm. For good reasons. So why do some American companies still
think they can handle themselves? While there is real money at stake. US companies should seek professional lobbying services on the TTIP issue, and especially
lobby firms that understand the agricultural EU politics, process and rules of engagement in Brussels. They should rely on firms that understand sensitivities in
Europe. Companies that will rely on specialized lobby firms, which will come up with the most convincing arguments by understanding the political and social
So while the differences in
transatlantic approach towards GM foods pose a concrete threat to the conclusion of the trade agreement,
the trade talks themselves provide the ultimate opportunity to enable the authorization and cultivation of
GM crops in Europe. The TTIP would be the biggest free-trade deal in the world. According to the Centre for Economic Policy Research in London a
realities on both sides of the Atlantic will have the best chance to change Brussels’ stance on GMOs now.
trade agreement which eliminates tariffs and reduces non-tariff barriers could boost US and EU economic growth by more than $100 billion a year.
TTIP Good – Russian Agression
TTIP key to check Russian aggression
Brown and Oudratt, 2/6/15 (Dr. Michael E. Brown is dean of the Elliott School of International Affairs at the George
Washington University, received his Ph.D. in Government from Cornell University, Dr. Chantal de Jonge Oudraat, president of Women In
International Security and received her PhD in Political Science from the University of Paris II (Panthéon), “Trade, power and opportunity,”
www.washingtonpost.com/blogs/monkey-cage/wp/2015/02/06/trade-partnerships-are-an-opportunity-not-to-be-missed/, bgm)
First, Russian aggression is an unpleasant balance of power problem that is unlikely to go away any time
soon. TTIP isn’t a panacea, but it would strengthen the West’s balance of power position. It would help
European economies grow, provide more opportunities for European companies to turn from Russia to
the United States and enhance the prospects for further trans-Atlantic economic policy coordination. The
United States and its European allies need to prepare for more rounds of economic sanctions against
Russia in the near term, and they have to build a stronger, more united economic front for the long haul.
Extinction
Baum ‘14 (Seth Baum is Executive Director of the think tank Global Catastrophic Risk Institute. He recently completed a Ph.D. in
Geography at Pennsylvania State University and a Post-Doctoral Fellowship with the Columbia University Center for Research on Environmental
Decisions. Based in New York City, Baum's research covers a variety of topics including ethics, economics, climate change, nuclear war, and life
in the universe, “Best And Worst Case Scenarios for Ukraine Crisis: World Peace And Nuclear War”, March 7,
http://www.huffingtonpost.com/seth-baum/best-and-worst-case-scena_b_4915315.html)
No one yet knows how the Ukraine crisis will play out. Indeed, the whole story is a lesson in the perils of prediction. Already we have a classic: "Putin's Bluff? U.S. Spies Say Russia Won't
Invade Ukraine," published February 27, just as Russian troops were entering Crimea. But considering the best and worst cases highlights some important opportunities to make the most of the
The best case scenario has the Ukraine crisis being resolved diplomatically through
The worst case scenario has the crisis escalating into
nuclear war between the United States and Russia, causing human extinction. Let's start with the worst case scenario,
nuclear war involving the American and Russian arsenals. How bad would that be? Put it this way: Recent analysis finds that a "limited" IndiaPakistan nuclear war could kill two billion people via agricultural declines from nuclear winter.
This "limited" war involves just 100 nuclear weapons. The U.S. and Russia combine to possess
about 16,700 nuclear weapons. Humanity may not survive the aftermath of a U.S.-Russia nuclear
war. It seems rather unlikely that the U.S. and Russia would end up in nuclear war over Ukraine. Sure, they have opposing positions, but neither side has anywhere near enough at stake to
situation. Here's the short version:
increased Russia-Europe cooperation, which would be a big step towards world peace.
justify such extraordinary measures. Instead, it seems a lot more likely that the whole crisis will get resolved with a minimum of deaths. However, the story has already taken some surprising plot
We cannot rule out the possibility of it ending in direct nuclear war. A nuclear war could also
occur inadvertently, i.e. when a false alarm is misinterpreted as real, and nuclear weapons are launched in what is believed to be a
counterattack. There have been several alarmingly close calls of inadvertent U.S.-Russia nuclear war over
the years. Perhaps the most relevant is the 1995 Norwegian rocket incident. A rocket carrying scientific equipment was
launched off northern Norway. Russia detected the rocket on its radar and interpreted it as a nuclear attack. Its own
twists.
nuclear forces were put on alert and Boris Yeltsin was presented the question of whether to launch Russia's nuclear weapons in response. Fortunately, Yeltsin and the Russian General Staff
apparently sensed it was a false alarm and declined to launch. Still, the disturbing lesson from this incident is that nuclear war could begin even during periods of calm. With the Ukraine crisis,
the situation today is not calm. It is even more tense than last year, when the United States was considering military intervention in Syria.
Unchecked Putin leads to nuclear war
Taylor, 14 (Jeffrey, Foreign Policy, Citing Andrei Piontkovsky, a former executive director of the Strategic Studies Center in Moscow
and a political commentator for the BBC World Service, “Putin's Nuclear Option”,
http://www.foreignpolicy.com/articles/2014/09/04/putins_nuclear_option_russia_weapons, September 4, 2014, ak.)
Ever the one to administer bracing doses of Geopolitics 101 to his opponents, especially those inclined to underestimate his nerve, President
Vladimir Putin, at a youth forum north of Moscow last week, reminded
the world that "Russia is one of the most
powerful nuclear nations. This is a reality, not just words." (Indeed it is.) Fifteen days earlier, on Aug. 14, at a conference in
Yalta, the Russian president had told the assembled factions of the State Duma that he soon planned to "surprise the
West with our new developments in offensive nuclear weapons about which we do not talk yet." This
came as Russian
strategic nuclear bombers and fighter jets have been accused of violating the airspace of the
United States and Western European countries with mounting frequency, while under the surface of the world's seas
Russian and U.S. nuclear submarines have been involved in confrontations recalling the worst days of the Cold War. As NATO leaders convene
for their summit in Wales, Russia
just announced that its strategic nuclear forces will hold exercises of
unprecedented dimensions this month. And the Kremlin, for its part, just declared that it will amend its
military doctrine to reflect Russia's growing tensions with NATO. What this means exactly remains unclear, but in view
of the rising tensions with the Western alliance, it cannot be good. Russia has also been purportedly breaching the terms of
the Intermediate-Range Nuclear Forces Treaty, which prohibits Russia (and the United States) from
possessing the sort of missiles that could be used against targets in Europe. If Barack Obama entered the
White House hoping to reduce atomic weapons stockpiles and make the world a safer place, it looks like
he will leave it with a Russia boasting a more lethal arsenal of nuclear weapons than at any time since the
Cold War. But Putin would never actually use nuclear weapons, would he? The scientist and longtime Putin critic
Andrei Piontkovsky, a former executive director of the Strategic Studies Center in Moscow and a political
commentator for the BBC World Service, believes he might. In August, Piontkovsky published a troubling
account of what he believes Putin might do to win the current standoff with the West -- and, in one blow,
destroy NATO as an organization and finish off what's left of America's credibility as the world's
guardian of peace. In view of the Russian leader's recent remarks and provocative actions, the scenario
Piontkovsky lays out becomes terrifyingly relevant. Worse, if the trigger events described come to pass, it
becomes logical, maybe even inevitable . Piontkovsky explains the positions of the two camps presenting Putin with
advice about how to resolve the Ukraine crisis. The first, the "Peace Party," as he calls it, composed of those occupying posts in
influential think tanks, including, in this case, Sergey Karaganov, the head of Moscow's Higher School of Economics, urges Putin to declare
victory in Ukraine now and thereby end the conflict. Having taken note of the lengths to which Moscow will go to prevent Ukraine from
slipping out of its orbit, NATO will almost certainly never invite the former Soviet republic to join its ranks, the Peace Party argues. And Russia
has already won tacit acceptance from the international community of its acquisition of Crimea. Piontkovsky
dismisses out of hand
the possibility of Putin pursuing this solution. If Putin chose to go this route, he would look defeated, and
looming before him would be the fate of Soviet Premier Nikita Khrushchev, who was deposed and forced into
retirement following his failed, and nearly catastrophic, 1962 attempt to secure communism in Cuba by stationing nuclear missiles there. The
other camp putting pressure on Putin, the "War Party," however, gives the president two options. The first, writes Piontkovsky,
is a "romantic and inspiring scenario: World War IV between the Orthodox Russian World, now risen
from its knees, against the rotting and decadent Anglo-Saxon World." (World War III, in his view, has already
happened: the Cold War.) This World War IV would be a conventional war with NATO -- and it would not go well. Given NATO's superior
armed forces and Russia's comparative economic, scientific, and technological weaknesses, a conventional campaign would, Piontkovsky
concludes, end with Russia's defeat. That
leaves Putin only one option: a nuclear attack. Not a massive launch of
intercontinental ballistic missiles at the United States or Western Europe, which would bring about a suicidal atomic holocaust, but a
small,
tactical strike or two against a NATO member that few in the West would be willing to die to protect.
Piontkovsky surmises that, in such a conflict, the nuclear-armed country with the "superior political will" to alter
the geopolitical "status quo" and -- most importantly -- with the "greater indifference to values concerning
human lives" would prevail. Any guesses which country that would be? But what would trigger a Russian
attack? According to Piontkovsky's scenario, it could be something as simple as a plebiscite: the Estonian city of
Narva, overwhelmingly ethnically Russian and adjacent to Russia, deciding to hold a referendum on
joining the Motherland. To help them "freely express their will" at the polls, Russia could send in a
brigade of "little green men armed to the teeth," much like it did in Crimea in March. Estonia would
thereupon invoke Article 5 of the NATO charter -- "an armed attack against one or more [NATO members]
… shall be considered an attack against them all" -- and demand that the alliance defend it. Speaking in the Estonian capital of
Tallinn on the eve of NATO's summit in Wales, this is just what Obama promised. "The defense of Tallinn and Riga and Vilnius is just as
important as the defense of Berlin and Paris and London," he said. Suddenly,
the most terrifying nightmare becomes reality:
NATO faces war with Russia. Suddenly, the most terrifying nightmare becomes reality: NATO faces war with Russia. How
would Putin then react? Piontkovsky believes that NATO would balk at attacking Moscow over a small country remote from NATO's heartland
and the hearts of its citizens. Piontkovsky imagines the course of action open to Nobel Peace Prize laureate Obama as he contemplates unleashing
a planetary holocaust over a "damned little city no one has even heard of" while the American public cries out, "We don't want to die for fucking
Narva, Mr. President!" Piontkovsky also cites a German public opinion poll asking what Berlin should do if Estonia enters an armed conflict with
Russia: 70 percent would want their country to remain neutral. Piontkovsky then tries to envision the situation in which Putin would find himself
if NATO intervened to drive his little green men from Narva. Would Putin commit suicide by letting his missiles fly against the United States?
No. Rather, he would respond with a limited nuclear strike against a couple of European capitals -- not London or
Paris, but smaller ones, presumably in Eastern European countries that have only recently joined NATO. Warsaw, against which Russia has
already conducted a drill simulating a Russian nuclear attack, first comes to mind. Or, say, Vilnius, Lithuania's capital. The point is, Putin would
bet on decision-makers in Washington, Berlin, London, and Paris not retaliating with nuclear weapons against Russia if it had "only" hit a city or
two most Westerners have barely heard of -- and certainly do not want to die for. The
outcome of Putin's putative gambit is that
NATO effectively capitulates. The alliance's credibility as guarantor of security for its member states
would be utterly destroyed, as would U.S. hegemony, which largely rests on the threat of using force.
Putin would then be free to do what he wanted in Ukraine and anywhere else he perceived Russia's
interests to be threatened. It might all sound a bit far-fetched. On the surface, there are obvious reasons that Putin would not want to be
the first to fire nuclear weapons at anyone, even his die-hard adversaries in NATO. It would be, to put it mildly, risky, and would irremediably
besmirch his place, and Russia's, in history. The world would unite against him and could do more damage to the Russian economy, which is
highly dependent on food imports and the export of hydrocarbons, than anyone now can imagine. And domestically, Russian anti-war sentiment
is formidable. The Russian
public has, throughout the crisis, adored Putin for standing up to the West and
retaking Crimea, and it even supports Russia's arming the separatist rebels in eastern Ukraine. But Russians
have shown no appetite for direct military intervention, which is one reason the Kremlin repeatedly asserts that it has no troops or materiel on
Ukrainian soil. But it's worth remembering that since
2000 Russian nuclear doctrine has foreseen the deployment of
battlefield nuclear weapons to de-escalate a conflict with NATO, if Russian forces were about to suffer
defeat in a conventional conflict -- which shows that the Kremlin has already been betting that neither Obama
nor the leaders of other nuclear powers would push the button if they could avoid it. The Kremlin is probably
right.
TTIP solves Russian Expansion
TTIP boosts US-EU relations and stops Russian expansionism
James Stavridis 11/19/14, Dean of the Fletcher School of Law and Diplomacy at Tufts University,
Chairman of the Board of the U.S. Naval Institute, PhD and Master of Arts in Law and Diplomacy, retired
United States Navy admiral who served as the 15th Commander, U.S. European Command and NATO's
16th Supreme Allied Commander Europe, “Vladimir Putin Hates the TTIP,”
http://en.wikipedia.org/wiki/James_G._Stavridis
Flying under the international radar is one of the most potentially important agreements ever
negotiated across the broad Atlantic: the Transatlantic Trade and Investment Partnership (TTIP), also known as the
Transatlantic Free Trade Agreement (TAFTA). It is a big basket of agreed-upon rules and regulations that would make the United States and
much of Europe a free trade zone, perhaps increasing overall trade by as much as 50 percent, according to the European Commission and the
Putin hates it. It’s not hard to figure out why: it would more tightly bind Europe to the
United States, thus hurting Russian leverage. The TTIP is a sensible agreement on economic grounds, broadly speaking. But it
also holds enormous real value in the geopolitical sphere. The increased linkages between the United
States and our European allies and partners will stand in direct opposition to Putin’s key strategy of
driving a wedge between the United States and the EU as the central members of the transatlantic community. But let’s back
White House. Guess what?
up: what are the key elements in the transatlantic relationship? First are values and demographics. The ideas we cherish — democracy, liberty,
freedom of speech, freedom of religion, freedom of assembly, the right to peaceful protest, gender and racial equality — came largely from
Europe. The Enlightenment provided much of the basic DNA of our nation’s intellectual heritage, not to mention many waves of immigrants. To
this day, numerous fundamental connections between the United States and Europe persist in our approaches to the civil rights, our judicial
bodies, and the structures of our basic political systems. And by the way, it is worth remembering that Russia stood largely outside the process of
the Enlightenment, with notable cultural distinctions resulting between Western European and Russian traditions. Second is geography. For the
United States, one of Europe’s key values is its strategic position on the edge of the Eurasian landmass. In my time as the NATO Supreme Allied
Commander for global operations, people in the United States would occasionally chide me for supporting bases in Europe that were, in their
view, "the outmoded bastions of the Cold War." But as we have seen over the past decade, these bases are anything but obsolete. Again and
again, we have used bases in Europe for operations in Africa, the Levant, and Central Asia. Europe’s geographic position between the United
States and many of our security interests and allies to the south and west of Europe remains critical. Thirdly, the NATO alliance remains central
to our military operations overseas. Afghanistan, Libya, the Balkans, Iraq, Syria, piracy, and cyber security are all areas in which our NATO
allies have stood shoulder to shoulder with us. We will never find another pool of ready partners with the numbers, military capability, and
willingness to deploy that we have in Europe.We will never find another pool of ready partners with the numbers, military capability, and
willingness to deploy that we have in Europe. The Europeans spend $300 billion a year on defense, and have millions of men and women —
virtually all of them volunteers — in their standing armies and reserves. While Washington would prefer that European nations spent the full 2
percent of GDP on defense that they have pledged, the fact remains that they collectively constitute a highly capable force under the aegis of
NATO. That fundamental security plank in the transatlantic bridge is not going anywhere, and the recent resurgence of the Russian Federation,
with its invasion of Ukraine and annexation of Crimea, have only amplified the NATO’s standing as the gold standard of security membership.
Fourth is the economy, which brings us to the TTIP. Some $4.2 trillion of trade flows across the Atlantic between the United States and Europe.
It is the largest trading relationship in the $60 trillion global economy, dwarfing any other trade relationship for the United States. Yet this
commerce continues to operate today without the benefit of a free trade zone which would break down regulatory barriers and — according to the
U.S. trade representative — add to the 13 million jobs already dependent on trade. The TTIP is a promising idea, and a draft agreement could be
finalized by the end of the year. Naturally, there are challenges. There is nervousness on both sides of the Atlantic about various elements of the
potential agreement — in particular, worries from Europe about the competitiveness of the continent’s agriculture sector; the impact on energy
production and the rise of fracking; protection of intellectual property; and the level of protection afforded to cultural assets. All of these
outstanding areas of concern have received considerable attention from the negotiators, and that there is guarded optimism they will be resolved
according to conversations with senior negotiators. There will also be obstacles to ratification. In Europe, the European Parliament will need to
approve it, and there are questions being raised about the need for national parliaments to be involved. In the United States, the Senate will have
to ratify the treaty. And we would still need to address the status of Canada and Mexico who currently enjoy a free trade zone via the North
American Free Trade Agreement with the United States, and presumably would be interested in TTIP inclusion. Likewise, in Europe: four
nations outside of the EU would likewise be interested (Norway, Iceland, Switzerland, and tiny Liechtenstein). So
how does all this
affect the geopolitics of the region — especially Russia’s fraught relationship with the United States,
NATO, and the EU? In addition to the economic benefits that would flow to both sides, there is clear geopolitical value. An
economically energized Atlantic community with a shared free trade zone is far more likely to stand
firm against Russian pressures (with natural gas closures, for example) designed to break up transatlantic
solidarity. A European economy that enjoys a bounce from the benefits of free trade creates a stronger
military partner for the United States, and provides more resources for defense spending. The
agreement could help improve the Atlantic community’s ability to share energy resources like liquefied
natural gas through free trade. Indeed, a negotiated and eventually ratified TTIP would be a powerful
signal to Putin’s Russia that Europe and the United States stand together in all dimensions — values, politics,
security, and trade. And if Putin hates it, TTIP probably makes sense.
TTIP good – Obama international leadership
TTIP reinvigorates Obama international leadership
Brown and Oudratt, 2/6/15 (Dr. Michael E. Brown is dean of the Elliott School of International Affairs at the George
Washington University, received his Ph.D. in Government from Cornell University, Dr. Chantal de Jonge Oudraat, president of Women In
International Security and received her PhD in Political Science from the University of Paris II (Panthéon), “Trade, power and opportunity,”
www.washingtonpost.com/blogs/monkey-cage/wp/2015/02/06/trade-partnerships-are-an-opportunity-not-to-be-missed/, bgm)
Third, TPP and TTIP pacts would strengthen Obama’s personal credibility and the United States’
international leadership position. Obama’s failure to enforce his “red line” on the use of chemical
weapons by the regime of Syrian President Bashar al-Assad has done real damage to his credibility in the
Middle East, Asia and around the world. Effective presidential leadership in these trade negotiations
would help to restore Obama’s international credibility. A TPP agreement would also solidify the
economic pillar of Obama’s “pivot” to Asia – a geostrategic priority. More generally, effective U.S.
leadership on TPP and TTIP would enhance the United States’ standing in an era when many countries
need strategic reassurance and want U.S. engagement.
Solves nuke war
Coes, 9-30-11 (Ben, former speechwriter in the George H.W. Bush administration, managed Mitt
Romney’s successful campaign for Massachusetts Governor in 2002 & author, “The disease of a weak
president”, The Daily Caller, http://dailycaller.com/2011/09/30/the-disease-of-a-weak-president/)
The disease of a weak president usually begins with the Achilles’ heel all politicians are born with — the desire to be popular. It
leads to pandering to different audiences, people and countries and creates a sloppy, incoherent set of
policies. Ironically, it ultimately results in that very politician losing the trust and respect of friends and
foes alike. In the case of Israel, those of us who are strong supporters can at least take comfort in the knowledge that Tel Aviv will do
whatever is necessary to protect itself from potential threats from its unfriendly neighbors. While it would be preferable for the Israelis to be able
to count on the United States, in both word and deed, the fact is right now they stand alone. Obama and his foreign policy team have undercut the
Israelis in a multitude of ways. Despite this, I wouldn’t bet against the soldiers of Shin Bet, Shayetet 13 and the Israeli Defense Forces. But
Obama’s weakness could — in other places — have implications far, far worse than anything that might ultimately occur in
Israel. The triangular plot of land that connects Pakistan, India and China is held together with much more
fragility and is built upon a truly foreboding foundation of religious hatreds, radicalism, resource envy
and nuclear weapons. If you can only worry about preventing one foreign policy disaster, worry about this one. Here are a few unsettling
facts to think about: First, Pakistan and India have fought three wars since the British de-colonized and left the region in 1947. All
three wars occurred before the two countries had nuclear weapons. Both countries now possess hundreds of nuclear
weapons, enough to wipe each other off the map many times over. Second, Pakistan is 97% Muslim. It is a question of
when — not if — Pakistan elects a radical Islamist in the mold of Ayatollah Khomeini as its president. Make no mistake, it will happen, and
when it does the world will have a far greater concern than Ali Khamenei or Mahmoud Ahmadinejad and a single nuclear device. Third, China
China covets India’s
natural resources. Over the years, it has slowly inched its way into the northern tier of India-controlled
Kashmir Territory, appropriating land and resources and drawing little notice from the outside world. In my book, Coup D’Etat, I consider
sits at the northern border of both India and Pakistan. China is strategically aligned with Pakistan. Most concerning,
this tinderbox of colliding forces in Pakistan, India and China as a thriller writer. But thriller writers have the luxury of solving problems by
imagining solutions on the page. In my book, when Pakistan elects a radical Islamist who then starts a war with India and introduces nuclear
weapons to the theater, America steps in and removes the Pakistani leader through a coup d’état. I wish it was that simple. The more complicated
and difficult truth is that we, as Americans, must take sides. We must be willing to be unpopular in certain places. Most important, we must be
ready and willing to threaten our military might on behalf of our allies. And our allies are Israel and India. There
are many threats out
there — Islamic radicalism, Chinese technology espionage, global debt and half a dozen other things that
smarter people than me are no doubt worrying about. But the single greatest threat to America is none of these. The
single greatest threat facing America and our allies is a weak U.S. president. It doesn’t have to be this
way. President Obama could — if he chose — develop a backbone and lead. Alternatively, America could elect a new president.
It has to be one or the other. The status quo is simply not an option.
TTIP Good – EU Soft Power
TTIP key to EU soft power
Brattberg, 13 – Swedish Institute of International Affairs analyst
[Erik, currently Visiting Fellow at the Atlantic Council of the United States and a Non-Resident Fellow at
the Paul H. Nitze School of Advanced International Studies (SAIS) at Johns Hopkins University, "The
Geopolitical Importance of TTIP," 11-8-13, www.euglobalstrategy.eu/nyheter/opinions/reinventing-thewest-the-geopolitical-importance-of-ttip, accessed 1-3-14]
Although the obstacles remain several, European and American leaders have very good reasons to keep pushing for a TTIP deal. Besides the
immediate positive economic effects for both sides, the agreement could also give spark to a
more strategic transatlantic
relationship – something that is desperately needed. As former Secretary of State Hillary Clinton has observed, TTIP could
potentially serve as a second anchor, in addition to NATO, binding together the US and the EU. Along similar lines, the
European Global Strategy report correctly notes that TTIP, if successful, could ‘spill over into more robust
political and security cooperation’ between the US and Europe. There is a great sense of urgency to this
task. 2015 will mark the ten-year anniversary of the New Transatlantic Agenda (NTA). Originally established by the Clinton White House, this
framework was designed to bring the US and EU together. While some progress has been made over the past decade, the US-EU
relationship remains far from strategic in nature. Washington still prefers to deal with European countries on a strictly bilateral
level, rather than with Brussels. Clearly, a New Transatlantic Compact requires a new set of leadership structures.
Moreover, the disappointments as of late with creating a robust EU security and defense policy has reinforced the notion that NATO is the only
Euro-Atlantic security organization that really matters. While the
US wants a strong EU as its core partner, it is uncertain about
Brussels’ level of ambition. In fact, Washington currently thinks the EU has no ambition whatsoever. If Europe and the US
can agree on TTIP it would send a signal to Washington that Brussels is indeed a serious strategic partner.
If so, this could be the start of a recreated and re-invented transatlantic relationship. The development of a
more strategic EU-US relationship could also help allay fears regarding the US ‘abandonment’ of Europe.
While US strategic thinking is changing – and fast (the so-called ‘Asian pivot’ is only the beginning) – a more strategic transatlantic relationship
would still serve a critical function for Washington, and not just on the security side of things. The
drawdown of the military
mission in Afghanistan means that the US will have less need for Europe in coming years. Focusing more
on global economic and trade issues could constitute a new strategic imperative for closer EU-US ties. At
the same time, for the EU, which still views itself predominantly as a global soft power, TTIP could help the
union utilize its role as the world’s single largest trading bloc in a more strategic way. The EGS report correctly
notes that the EU must seek to ‘maximize the opportunities that trade and development provide as a means of
pursuing its strategic objectives’. TTIP is accordingly an opportunity for Europe to reinforce its role as a
global trading superpower. In summary, Europe must strive for an ambitious and comprehensive TTIP. Such an agreement would not
only generate economic growth on both sides of the Atlantic, it would also pave the way for a more strategic transatlantic
partnership. As US strategic attention is quickly fading away from Europe toward the global East and
South, an agreement could send a message to Washington that Europe remains America’s core partner in the
world. In doing so, Europe could also draw on its unique strengths as a global trading superpower, but apply
these strengths more strategically.
Strong EU key to solve multiple scenarios for extinction
Burton ’01 (John,- Ambassador for the European Commission Delegation
http://www.irlgov.ie/committees-02/c-europeanaffairs/future/page1.htm)
2.5 As the Laeken Declaration put it, "Europe needs to shoulder its responsibilities in the governance of globalisation" adding that Europe must
exercise its power in order "to set globalisation within a moral framework, in other words to anchor it in solidarity and sustainable
development". 2.6 Only
a strong E uropean U nion is big enough to create a space, and a stable set of rules, within which
all Europeans can live securely, move freely, and provide for themselves, for their families and for their old age. Individual states are too small
to do that on their own. Only a strong European Union is big enough to
deal with the globalised human diseases, such as
AIDS and tuberculosis. Only a strong European Union is big enough to deal with globalised criminal conspiracies, like the
Mafia, that threaten the security of all Europeans. Only a strong European Union is big enough to deal with globalised environmental
threats, such as global warming, which threaten our continent and generations of its future inhabitants. Only a
strong European Union is big enough to deal with globalised economic forces, which could spread recession
from one country to another and destroy millions of jobs. Only a strong European Union is big enough to regulate, in the
interests of society as a whole, the activities of profit seeking private corporations, some of which now have more spending power than many
individual states. 2.7 These tasks are too large for individual states. 2.8 Only by coming together in the
E uropean U nion can we
ensure that humanity, and the values which make us, as individuals, truly human, prevail over blind global forces that will
otherwise overwhelm us.
TTIP Good – Solves G. Warming
TTIP is key to effective multilateral solutions to warming
Benson 13 - Intern at the Streit Council [Johann Benson (Master’s degree in public policy at the University of Minnesota’s Humphrey
School of Public Affairs), “Toward a Transatlantic Free Trade Agreement: What Impact on World Trade?,” Streit Talk, July 26, 2013 pg.
http://blog.streitcouncil.org/?tag=ttip
the proposed Transatlantic Trade and Investment Partnership (TTIP) is taking its first steps toward becoming
reality. Questions remain , however; not only about what form the final agreement may take, but also what effect it could have on international trade. In its initial
assessment of the TTIP, the OECD notes that while multilateral arrangements are preferable, bilateral and plurilateral agreements like the proposed TTIP “can be
supportive of an effective multilateral trading system .” One of the primary ways in which these agreements can
promote trade at the global level is by addressing issues that currently lie outside the scope of WTO
regulations. Richard Baldwin, of the Graduate Institute in Geneva and the Centre for Economic Policy
Research, has laid out the shortcomings of current WTO regulations and how post-2000 trade agreements are fundamentally different from those of the 1990s. Baldwin argues
that the rise of global supply chains has elevated the importance of removing non-tariff barriers, while tariffs (with
some notable exceptions) have largely fallen by the wayside. Current WTO regulations (as well as agenda items of the stalled Doha Round) are not adequate
for addressing the most pressing issues of international commerce and investment, such as competition (or antitrust) policy, the movement of capital,
intellectual property rights (IPR), and investment assurances. These issues can and often have been addressed through
recent bilateral trade and investment agreements. Critically, Baldwin also notes that there is a feedback effect from increased trade
liberalization that makes future liberalization even more likely. It is for this reason, if no other, that an EU-U.S.
free trade agreement is a step in the right direction . Economic gains from the TTIP would mainly come from the harmonization of regulations and
With negotiations now officially underway,
the removal of other non-tariff barriers. While the agreement is expected to lead to trade diversion among EU members (in the case of an ambitious agreement, for example, total trade between
TTIP would benefit the struggling economies of southern Europe
It would also drive trade creation between the EU and the U.S., and between the
transatlantic area and third parties. For example, if car safety standards are harmonized in the European and American markets, it lowers costs not only for U.S. and
EU automakers, but also for any other company that exports to both markets. In fact, the third parties with the largest expected gains from the
TTIP are ASEAN countries, due to their very high trade to GDP ratios. Unfortunately, the fact that third parties often benefit from
the UK and Spain would decrease by about 45%), it is projected that the
even more than the EU as a whole.
the removal of non-tariff barriers can also act as an obstacle to bilateral agreements. For instance, Jagdish Bhagwati has noted that getting rid of production subsidies requires a multilateral
agreement because “you cannot – bilaterally – say that if the U.S. reduces or relaxes production subsidies, it will be only for New Zealand. Or only for Brazil.” This may, in some respects, limit
the breadth and depth of the TTIP. One of Bhagwati’s other worries about preferential trade agreements is that they create dispute settlement mechanisms that favor the stronger trading partner
and undermine the WTO’s own dispute settlement mechanism. If the TTIP is eventually opened to newcomers on a take-it-or-leave-it basis, any country wishing to join the agreement – for
which there would be strong incentives – would be strictly a rule-taker, with absolutely no say in the drafting of existing regulations. While numerous commentators argue that the primary
objective of the TTIP is to ensure that “the United States and Europe remain standard makers, rather than standard takers, in the global economy,” there is a risk that China and other emerging
the TTIP is concluded. The
is not likely to seriously threaten the multilateral trading system for the simple fact that bilateral
deals – no matter how large – are themselves unable to address a longer list of the world’s most pressing trade issues.
Resource and food security, exchange rate policy, and efforts to limit carbon emissions all demand
multilateral solutions. But the TTIP could provide a launching pad to address these and other issues.
economies will attempt to erect trading blocs amongst themselves and create their own rules. Completing the Doha Round may still be an uphill battle after
agreement
Warming is real, anthropogenic, and threatens extinction --- prefer new evidence
that represents consensus
Richard Schiffman 13, environmental writer @ The Atlantic citing the Fifth Intergovernmental Panel
on Climate Change, “What Leading Scientists Want You to Know About Today's Frightening Climate
Report,” The Atlantic, http://www.theatlantic.com/technology/archive/2013/09/leading-scientists-weighin-on-the-mother-of-all-climate-reports/280045/
The polar icecaps are melting faster than we thought they would; seas are rising faster than we thought
they would; extreme weather events are increasing. Have a nice day! That’s a less than scientifically rigorous summary of the
findings of the Fifth Intergovernmental Panel on Climate Change (IPCC) report released this morning in Stockholm. Appearing exhausted after a nearly two sleepless days
fine-tuning the language of the report, co-chair Thomas Stocker called climate change “the greatest challenge of our time,"
adding that “each of the last three decades has been successively warmer than the past,” and that this trend is
likely to continue into the foreseeable future. Pledging further action to cut carbon dioxide (CO2) emissions, U.S. Secretary of State John Kerry said, "This isn’t a run of the mill
report to be dumped in a filing cabinet. This isn’t a political document produced by politicians... It’s science." And that science needs to be
communicated to the public, loudly and clearly. I canvassed leading climate researchers for their take on the findings of the vastly influential IPCC report. What headline would they put on the news? What do they hope people hear
Mann, the Director of the Earth Systems Science Center at Penn State (a former IPCC
author himself) suggested: "Jury In: Climate Change Real, Caused by Us, and a Threat We Must Deal
With." Ted Scambos, a glaciologist and head scientist of the National Snow and Ice Data Center (NSIDC) based in Boulder would lead with: "IPCC 2013, Similar Forecasts, Better Certainty." While the report,
which is issued every six to seven years, offers no radically new or alarming news, Scambos told me, it puts an exclamation point on what we already know, and
refines our evolving understanding of global warming. The IPCC, the indisputable rock star of UN documents, serves as the basis for global climate
negotiations, like the ones that took place in Kyoto, Rio, and, more recently, Copenhagen. (The next big international climate meeting is scheduled for 2015 in Paris.) It is also arguably the most
elaborately vetted and exhaustively researched scientific paper in existence. Founded in 1988 by the United Nations and the World
Meteorological Organization, the IPCC represents the distilled wisdom of over 600 climate researchers in 32 countries on changes
about this report? When I asked him for his headline, Michael
in the Earth’s atmosphere, ice and seas. It endeavors to answer the late New York mayor Ed Koch’s famous question “How am I doing?” for all of us. The answer, which won’t surprise anyone who has been following the climate
It is now 95 percent likely that human spewed heat-trapping gases — rather than natural
variability — are the main cause of climate change, according to today’s report. In 2007 the IPCC’s confidence level was 90 percent, and in 2001 it was 66 percent, and
just over 50 percent in 1995. What’s more, things are getting worse more quickly than almost anyone thought would happen a
few years back. “If you look at the early IPCC predictions back from 1990 and what has taken place since, climate change is proceeding faster than we expected,” Mann told me by email. Mann helped develop the
famous hockey-stick graph, which Al Gore used in his film “An Inconvenient Truth” to dramatize the sharp rise in temperatures in recent times. Mann cites the decline of Arctic sea ice to explain : “Given the
current trajectory, we're on track for ice-free summer conditions in the Arctic in a matter of a decade or
two... There is a similar story with the continental ice sheets, which are losing ice — and contributing to sea level rise — at a faster rate than the [earlier IPCC] models had predicted.” But there is a lot that we still don’t
change story, is not very well at all.
understand. Reuters noted in a sneak preview of IPCC draft which was leaked in August that, while the broad global trends are clear, climate scientists were “finding it harder than expected to predict the impact in specific regions in
hotspots are not consistent, but move erratically around the globe. The same has been true of heat waves, mega-storms and
There is broad agreement that climate change is increasing the
severity of extreme weather events, but we’re not yet able to predict where and when these will show up. “It is like watching a pot boil,” Danish
astrophysicist and climate scientist Peter Thejll told me. “We understand why it boils but cannot predict where the next bubble will be.” There is also uncertainty about an
apparent slowdown over the last decade in the rate of air temperature increase. While some critics claim that global warming has “stalled,” others point out that,
when rising ocean temperatures are factored in, the Earth is actually gaining heat faster than previously
anticipated. “Temperatures measured over the short term are just one parameter,” said Dr Tim Barnett of the Scripps Institute of Oceanography in an interview.
“There are far more critical things going on; the acidification of the ocean is happening a lot faster than
anybody thought that it would, it’s sucking up more CO2, plankton, the basic food chain of the planet,
are dying, it’s such a hugely important signal. Why aren’t people using that as a measure of what is going on?” Barnett thinks that recent increases in
volcanic activity, which spews smog-forming aerosols into the air that deflect solar radiation and cool the atmosphere, might help account for the temporary slowing
of global temperature rise. But he says we shouldn’t let short term fluctuations cause us to lose sight of the big picture. The dispute over temperatures underscores just how formidable the IPCC’s task of
coming decades.” From year to year, the world’s
catastrophic floods, like the recent ones that ravaged the Colorado Front Range.
modeling the complexity of climate change is. Issued in three parts (the next two installments are due out in the spring), the full version of the IPCC will end up several times the length of Leo Tolstoy’s epic War and Peace. Yet every
I do not know of any other area of any complexity and importance at all where there
is unanimous agreement ... and the statements so strong ,” Mike MacCracken, Chief Scientist for Climate Change Programs, Climate Institute in Washington, D.C.
told me in an email. “What IPCC has achieved is remarkable (and why it merited the Nobel Peace Prize granted in 2007).” Not surprisingly, the IPCC’s conclusions tend to be
“conservative by design,” Ken Caldeira, an atmospheric scientist with the Carnegie Institution’s Department of Global Ecology told me: “The IPCC is not supposed
to represent the controversial forefront of climate science. It is supposed to represents what nearly all
scientists agree on, and it does that quite effectively.” Nevertheless, even these understated findings are inevitably controversial. Roger Pielke Jr., the Director of the
last word of the U.N. document needs to be signed off on by all of the nations on earth. “
Center for Science and Technology Policy Research at the University of Colorado, Boulder suggested a headline that focuses on the cat fight that today’s report is sure to revive: "Fresh Red Meat Offered Up in the Climate Debate,
Activists and Skeptics Continue Fighting Over It." Pielke should know. A critic of Al Gore, who has called his own detractors "climate McCarthyists," Pielke has been a lightning rod for the political controversy which continues to
swirl around the question of global warming, and what, if anything, we should do about it. The public’s skepticism of climate change took a dive after Hurricane Sandy. Fifty-four percent of Americans are now saying that the effects
of global warming have already begun. But 41 percent surveyed in the same Gallup poll believe news about global warming is generally exaggerated, and there is a smaller but highly passionate minority that continues to believe the
whole thing is a hoax.
For most climate experts, however, the battle is long over — at least when it comes to the science. What remains
in dispute is not whether climate change is happening, but how fast things are going to get worse. There are some possibilities that are deliberately left out of the IPCC projections, because we simply don’t have enough data yet to
The scary elephant in the closet is terrestrial and oceanic
model them. Jason Box, a visiting scholar at the Byrd Polar Research Center told me in an email interview that: “
methane release triggered by warming.” The IPCC projections don’t include the possibility — some scientists say likelihood — that huge quantities of methane (a greenhouse gas thirty times as potent as CO2)
will eventually be released from thawing permafrost and undersea methane hydrate reserves. Box said that the threshhold “when humans lose control of potential
management of the problem, may be sooner than expected.” Box, whose work has been instrumental in documenting the rapid deterioration of the Greenland ice
sheet, also believes that the latest IPCC predictions (of a maximum just under three foot ocean rise by the end of the century) may turn out to be wildly
optimistic, if the Greenland ice sheet breaks up. “We are heading into uncharted territory” he said. “We are creating a different
climate than the Earth has ever seen.” The head of the IPCC, Rajendra Pachauri, speaks for the scientific consensus when he says that time is fast running
out to avoid the catastrophic collapse of the natural systems on which human life depends. What he recently told a
group of climate scientist could be the most chilling headline of all for the U.N. report: "We have five minutes before midnight."
TTIP Good – US/EU Relations
TTIP boosts relations – increases cooperation
Patrick Christy is a senior policy analyst at the Foreign Policy Initiative., 4-5-2013
http://www.usnews.com/opinion/blogs/world-report/2013/04/05/obama-should-prioritize-free-tradeagreements-with-europe-and-asia
The U.S.-E.U. agreement would reinvigorate relations between Europe and the United States at a time when
many European leaders worry that the Obama administration's "rebalance" to the Asia-Pacific will come at the expense of transatlantic ties. Despite
occasional differences on both sides of the Atlantic, the United States and Europe are bound by history, common interests, and shared values. In particular,
European nations who are aligned with NATO remain America's strategic partners of "first resort" – countries
that the United States works with in concert on key international matters. Indeed, NATO's 2011 mission in Libya and ongoing efforts in
Afghanistan reflect these common interests and shared values.
Security cooperation with Europe solves nuclear war and multiple transnational
threats
Yannis Stivachtis 10, Director of International Studies Program @ Virginia Polytechnic Institute &
State University A. Stivachtis (Professor of Poli Sci & Ph.D. in Politics & International Relations from
Lancaster University), THE IMPERATIVE FOR TRANSATLANTIC COOPERATION,” The Research
Institute for European and American Studies, 2010, pg. http://www.rieas.gr/research-areas/globalissues/transatlantic-studies/78.html
There is no doubt that
US-European relations are in a period of transition , and that the stresses and strains of globalization are increasing both the
number and the seriousness of the challenges that confront transatlantic relations. The events of 9/11 and the Iraq War have added significantly to these stresses and strains. At the same time,
terrorism, the nuclearization of North Korea and especially Iran, the proliferation of weapons of mass destruction (WMD), the
Russia into a stable and cooperative member of the international community, the growing power of China, the political and economic transformation and
integration of the Caucasian and Central Asian states, the integration and stabilization of the Balkan countries, the promotion of peace
and stability in the Middle East, poverty, climate change, AIDS and other emergent problems and situations require
further cooperation among countries at the regional, global and institutional levels. Therefore, cooperation between the U.S. and Europe is more
imperative than ever to deal effectively with these problems. It is fair to say that the challenges of crafting a new
relationship between the U.S. and the EU as well as between the U.S. and NATO are more regional than global, but the
implications of success or failure will be global. The transatlantic relationship is still in crisis, despite efforts to improve it since the Iraq War. This is not
international
transformation of
to say that differences between the two sides of the Atlantic did not exist before the war. Actually, post-1945 relations between Europe and the U.S. were fraught with disagreements and never
free of crisis since the Suez crisis of 1956. Moreover, despite trans-Atlantic proclamations of solidarity in the aftermath of 9/11, the U.S. and Europe parted ways on issues from global warming
and biotechnology to peacekeeping and national missile defense. Questions such as, the future role of NATO and its relationship to the common European Security and Defense policy (ESDP),
or what constitutes terrorism and what the rights of captured suspected terrorists are, have been added to the list of US-European disagreements. There are two reasons for concern regarding the
if European leaders conclude that Europe must become counterweight to the U.S., rather than a
it will be difficult to engage in the kind of open search for a common ground than an elective partnership
requires. Second, there is a risk that public opinion in both the U.S. and Europe will make it difficult even for leaders who want to forge a new relationship to make the necessary
accommodations. If both sides would actively work to heal the breach, a new opportunity could be created. A vibrant transatlantic partnership remains a
real possibility, but only if both sides make the necessary political commitment. There are strong reasons to believe that the
transatlantic rift. First,
partner,
security challenges facing the U.S. and Europe are more shared than divergent. The most dramatic case is terrorism. Closely related is the common interest in halting the spread of weapons of
mass destruction and the nuclearization of Iran and North Korea. This commonality of threats is clearly perceived by publics on both sides of the Atlantic. Actually, Americans and Europeans see
eye to eye on more issues than one would expect from reading newspapers and magazines. But while elites on both sides of the Atlantic bemoan a largely illusory gap over the use of military
force, biotechnology, and global warming, surveys of American and European public opinion highlight sharp differences over global leadership, defense spending, and the Middle East that
There are other important, shared interests as well. The transformation of
Russia into a stable cooperative member of the international community is a priority both for the U.S. and Europe. They also have an
interest in promoting a stable regime in Ukraine. It is necessary for the U.S. and EU to form a united front to meet these
challenges because first, there is a risk that dangerous materials related to WMD will fall into the wrong hands; and second, the
threaten the future of the last century’s most successful alliance.
spread of conflict along those countries’ periphery could destabilize neighboring countries and provide safe havens for
terrorists and other international criminal organizations. Likewise, in the Caucasus and Central Asia both sides share a stake in
promoting political and economic transformation and integrating these states into larger communities such as the OSCE. This
would also minimize the risk of instability spreading and prevent those countries of becoming havens for international terrorists and criminals. Similarly, there is a common interest in integrating
Dealing with Iran, Iraq, Lebanon, and the Israeli-Palestinian conflict as well as other political issues in the Middle
East are also of a great concern for both sides although the U.S. plays a dominant role in the region. Finally, US-European cooperation will
be more effective in dealing with the rising power of China through engagement but also containment. The post Iraq War realities have shown
the Balkans politically and economically.
that it is no longer simply a question of adapting transatlantic institutions to new realities. The changing structure of relations between the U.S. and Europe implies that a new basis for the
The future course of relations will be determined above
all by U.S. policy towards Europe and the Atlantic Alliance. Wise policy can help forge a new, more enduring strategic partnership, through
which the two sides of the Atlantic cooperate in meeting the many major challenges and opportunities of the evolving world together. But a policy that takes Europe
for granted and routinely ignores or even belittles Europe an concerns, may force Europe to conclude that the costs
of continued alliance outweigh its benefits.
relationship must be found if transatlantic cooperation and partnership is to continue.
TTIP boosts US-EU relations and stops Russian expansionism
James Stavridis 14 11/19/14, Dean of the Fletcher School of Law and Diplomacy at Tufts University,
Chairman of the Board of the U.S. Naval Institute, PhD and Master of Arts in Law and Diplomacy, retired
United States Navy admiral who served as the 15th Commander, U.S. European Command and NATO's
16th Supreme Allied Commander Europe, “Vladimir Putin Hates the TTIP,”
http://en.wikipedia.org/wiki/James_G._Stavridis
Flying under the international radar is one of the most potentially important agreements ever
negotiated across the broad Atlantic: the Transatlantic Trade and Investment Partnership (TTIP), also known as the Transatlantic Free
Trade Agreement (TAFTA). It is a big basket of agreed-upon rules and regulations that would make the United States and much of Europe a free trade zone, perhaps
increasing overall trade by as much as 50 percent, according to the European Commission and the White House. Guess what?
Putin hates it. It’s not hard
to figure out why: it
would more tightly bind Europe to the United States, thus hurting Russian leverage. The TTIP is
a sensible agreement on economic grounds, broadly speaking. But it also holds enormous real value in the geopolitical
sphere. The increased linkages between the United States and our European allies and partners will stand
in direct opposition to Putin’s key strategy of driving a wedge between the United States and the EU as the
central members of the transatlantic community. But let’s back up: what are the key elements in the transatlantic relationship? First are values and demographics. The
ideas we cherish — democracy, liberty, freedom of speech, freedom of religion, freedom of assembly, the right to peaceful protest, gender and racial equality — came
largely from Europe. The Enlightenment provided much of the basic DNA of our nation’s intellectual heritage, not to mention many waves of immigrants. To this day,
numerous fundamental connections between the United States and Europe persist in our approaches to the civil rights, our judicial bodies, and the structures of our
basic political systems. And by the way, it is worth remembering that Russia stood largely outside the process of the Enlightenment, with notable cultural distinctions
resulting between Western European and Russian traditions. Second is geography. For the United States, one of Europe’s key values is its strategic position on the
edge of the Eurasian landmass. In my time as the NATO Supreme Allied Commander for global operations, people in the United States would occasionally chide me
for supporting bases in Europe that were, in their view, "the outmoded bastions of the Cold War." But as we have seen over the past decade, these bases are anything
but obsolete. Again and again, we have used bases in Europe for operations in Africa, the Levant, and Central Asia. Europe’s geographic position between the United
States and many of our security interests and allies to the south and west of Europe remains critical. Thirdly, the NATO alliance remains central to our military
operations overseas. Afghanistan, Libya, the Balkans, Iraq, Syria, piracy, and cyber security are all areas in which our NATO allies have stood shoulder to shoulder
with us. We will never find another pool of ready partners with the numbers, military capability, and willingness to deploy that we have in Europe.We will never find
another pool of ready partners with the numbers, military capability, and willingness to deploy that we have in Europe. The Europeans spend $300 billion a year on
defense, and have millions of men and women — virtually all of them volunteers — in their standing armies and reserves. While Washington would prefer that
European nations spent the full 2 percent of GDP on defense that they have pledged, the fact remains that they collectively constitute a highly capable force under the
aegis of NATO. That fundamental security plank in the transatlantic bridge is not going anywhere, and the recent resurgence of the Russian Federation, with its
invasion of Ukraine and annexation of Crimea, have only amplified the NATO’s standing as the gold standard of security membership. Fourth is the economy, which
brings us to the TTIP. Some $4.2 trillion of trade flows across the Atlantic between the United States and Europe. It is the largest trading relationship in the $60
trillion global economy, dwarfing any other trade relationship for the United States. Yet this commerce continues to operate today without the benefit of a free trade
zone which would break down regulatory barriers and — according to the U.S. trade representative — add to the 13 million jobs already dependent on trade. The
TTIP is a promising idea, and a draft agreement could be finalized by the end of the year. Naturally, there are challenges. There is nervousness on both sides of the
Atlantic about various elements of the potential agreement — in particular, worries from Europe about the competitiveness of the continent’s agriculture sector; the
impact on energy production and the rise of fracking; protection of intellectual property; and the level of protection afforded to cultural assets. All of these outstanding
areas of concern have received considerable attention from the negotiators, and that there is guarded optimism they will be resolved according to conversations with
senior negotiators. There will also be obstacles to ratification. In Europe, the European Parliament will need to approve it, and there are questions being raised about
the need for national parliaments to be involved. In the United States, the Senate will have to ratify the treaty. And we would still need to address the status of Canada
and Mexico who currently enjoy a free trade zone via the North American Free Trade Agreement with the United States, and presumably would be interested in TTIP
So how
does all this affect the geopolitics of the region — especially Russia’s fraught relationship with the United
inclusion. Likewise, in Europe: four nations outside of the EU would likewise be interested (Norway, Iceland, Switzerland, and tiny Liechtenstein).
States, NATO, and the EU? In addition to the economic benefits that would flow to both sides, there is clear geopolitical value.
An economically energized Atlantic community with a shared free trade zone is far more likely to
stand firm against Russian pressures (with natural gas closures, for example) designed to break up transatlantic
solidarity. A European economy that enjoys a bounce from the benefits of free trade creates a stronger
military partner for the United States, and provides more resources for defense spending.
The agreement could help improve the Atlantic community’s ability to share energy resources like
liquefied natural gas through free trade. Indeed, a negotiated and eventually ratified TTIP would be a
powerful signal to Putin’s Russia that Europe and the United States stand together in all dimensions —
values, politics, security, and trade. And if Putin hates it, TTIP probably makes sense.
Extinction—prefer consensus of academic, NATO, State and Defense all-stars
Daalder, et al 15 (Ivo Daalder, President, the Chicago Council on Global Affairs, and former U.S.
Permanent; Representative to NATO; Michele Flournoy, Chair, Center for a New American Security, and
former Under Secretary of Defense; John Herbst, Director, Dinu Patriciu Eurasia Center, the Atlantic
Council, and former U.S. Ambassador to Ukraine; Jan Lodal, Distinguished Fellow and former President,
the Atlantic Council, and former Principal Deputy Under Secretary of Defense; Steven Pifer, Senior
Fellow, the Brookings Institution, and former U.S. Ambassador to Ukraine; James Stavridis, Member of
the Board, the Atlantic Council, Dean, Fletcher School of Law and Diplomacy, Tufts University, and
former Supreme Allied Commander Europe; Strobe Talbott, President, the Brookings Institution, and
former Deputy Secretary of State; and Charles Wald, Member of the Board, the Atlantic Council, and
former Deputy Commander, U.S. European Command; “Preserving Ukraine’s Independence, Resisting
Russian Aggression: What the United States and NATO Must Do,” Atlantic Council, February 2015,
http://www.thechicagocouncil.org/sites/default/files/UkraineReport_February2015_FINAL.pdf)
The situation in eastern Ukraine is urgent and deteriorating. In recent weeks, the flow of heavy weapons has grown markedly, and
Moscow is no longer taking steps to hide this support from overhead imagery. Fighting along the line of contact increased
significantly during the week of January 19. Aleksandr Zakharchenko, leader of the self-proclaimed “Donetsk People’s Republic,” indicated on January 23 that
the separatists would seek to take all of the Donetsk oblast. Large numbers of Russian forces remain deployed along the border,
ready to enter Ukraine on very short notice. Russian and separatist forces clearly have the capacity for
further offensive military action—whether to gain control of the entire Donbas region or, worse, to establish a land bridge between Russia and the
Crimea through effective control of southeastern Ukraine. Any such offensive move would set back the prospect for a peaceful
settlement and further destabilize Ukraine. The costs to the West of maintaining an independent Ukraine would then only grow, and
Moscow might be emboldened to take further actions. While these actions may not seem likely, they certainly are not
unthinkable. Few analysts at the end of 2013 would have considered a Russian military seizure of
Crimea or invasion of the Donbas “thinkable.” The post-World War II effort to create a safer Europe is
under serious threat. The 1975 Conference on Security and Cooperation in Europe Final Act, in which Russia agreed to respect the “inviolability of
borders” in Europe, has been blatantly violated. The United States, moreover, is a signatory to the 1994 Budapest Memorandum on Security Assurances for Ukraine.
In that document, the United States, Britain and Russia committed to respect Ukraine’s sovereignty, independence and territorial integrity, and not to use or threaten to
use force against Ukraine. Russia has grossly violated those commitments, which were key to Kyiv’s decision to eliminate its nuclear weapons. The United States and
is not just a question of honoring U.S.
commitments under international agreements. It is important for preserving the credibility of
security assurances for the future, when they might play a role in resolving other nuclear
proliferation cases, such as Iran and North Korea. Above and beyond Ukraine—and more important
in strategic terms for the United States and NATO—is the need to respond to the challenge to European and
Eurasian security posed by the Kremlin’s aggressive policies. Russia has broken the cardinal rule of postwar European security, i.e.,
Britain should, in response, do more to robustly support Ukraine and penalize Russia. This
states must not use military force to change international borders. Putin and the Kremlin have proclaimed a unique and legally dubious right to “protect” ethnic
Russians and Russian speakers, wherever they are located and whatever their citizenship. This was the justification that Putin belatedly offered for Russia’s illegal
annexation of Crimea, despite the fact that there was no credible threat to ethnic Russians in Crimea. If
not constrained, such Russian policies
represent a clear danger to European security, the North Atlantic community, as well as to Russia’s
neighbors in Eurasia. Given the many other world challenges confronting the United States, especially problems in the broader Middle East and the
strategic challenge posed by the rise of China, Washington and other capitals have not devoted sufficient attention to the threat posed by Russia and its implications
for Western security. This must change. If the United States and NATO do not adequately support Ukraine, Moscow
may well conclude that the
kinds of tactics it has employed over the past year can be applied elsewhere. Of particular concern would
be Russian actions to destabilize Estonia or Latvia, each of which has a significant ethnic Russian
minority and both of which are NATO members to whom the United States and allies have an Article 5
commitment. The Kremlin has already demonstrated aggressive intent in the Baltics by kidnapping
an Estonian security official the day the NATO Wales summit ended. To be sure, there are issues on which the interests of the United States and the
West, on the one hand, and Russia, on the other, coincide. These include preventing Iran from acquiring nuclear arms, avoiding a return of the Taliban or chaos in
Afghanistan, the broader counterterrorism struggle, and controlling nuclear weapons and materials. But these interests should not outweigh the West’s interest in
The world has
faced this kind of challenge before. History makes clear that the only way to stop such aggression
from precipitating a regional or even worldwide conflagration is to deter and defend against it as
early as possible and not to be fooled by protestations of innocent motives or lack of further ambitions.
blocking Russian aggression that poses a threat not just to Ukraine, but also to the security of broader Europe and the transatlantic community.
TTIP Good – Solves Trade
TTIP causes spillover effects as big as the treaty
Stagnaro 14 [Carlo is senior fellow at Istituto Bruno Leoni. Since April 2014 he serves as an adviser
on energy and liberalization to Italy’s Minister for Economic Development. “In defence of TTIP: Good
for the economy – and for the climate”, http://www.energypost.eu/defence-ttip-good-economy-climate/,
7/7/15] BG
On top of that, given the size of the economies and the scope of the treaty, despite being formally only a
bilateral agreement, it is very likely that it would kick off a process whereby a global standard is set. It
would be very difficult for any other country to call for a change in the trade rules, if they are accepted
and enforced by such important countries/blocs as the US and the EU. In other words, TTIP may have
spillover effects that may end up being almost as important as the treaty itself.
TTIP boosts trade when econ crisis.
European Commission 15 [The European commission is the main site for European Union. “About
TTIP – basics, benefits, concerns”, http://ec.europa.eu/trade/policy/in-focus/ttip/about-ttip/questions-andanswers/index_en.htm, 7/7/15]
TTIP would boost trade at a time of continuing economic crisis. That means more business opportunities,
more growth and more jobs. Lower prices, a wider variety of products to choose from and confidence
that products and services from across the Atlantic meet the highest safety standards would also
contribute to the prosperity of the over 800 million EU and US citizens.
Trade leads to a laundry list of benefits
European Commission 15 [The European commission is the main site for European Union. “About
TTIP – basics, benefits, concerns”, http://ec.europa.eu/trade/policy/in-focus/ttip/about-ttip/questions-andanswers/index_en.htm, 7/7/15]
The EU is one of the world's most open economies. Open
trade: strengthens our economy creates jobs gives us more
choice and buying power as consumers helps our firms compete abroad. We are working hard to ensure
Europeans benefit even more from open trade and globalisation. As in any area of life, open trade may
affect each of us differently. We are working with EU governments, the European Parliament and civil
society to identify any potential negative effects early on in the process. This will help us manage them and take
possible measures to off-set them.
TTIP good – farming industry
TTIP benefits the farming industry
European Commission 15 [The European commission is the main site for European Union. “About
TTIP – basics, benefits, concerns”, http://ec.europa.eu/trade/policy/in-focus/ttip/about-ttip/questions-andanswers/index_en.htm, 7/7/15]
EU exports to the US are mostly high-value products, like cheese, hams, wine, olive oil, spirits, and chocolate. High tariffs at
US customs - up to 30% - make some of these hard for Americans to afford - and difficult for European farmers
and firms to export. The US also faces customs tariffs in the EU on basic products like maize, soya beans,
and animal feed. This in turn raises costs for European farmers and food manufacturers. TTIP would
lower these customs duties - or get rid of them altogether US approval procedures and red tape can also
make it very difficult for EU exporters. At the moment, many apples and pears sold in Europe are effectively banned in the US.
TTIP Good – global trade & income
TTIP boosts trade and income around the world
European Commission 15 [The European commission is the main site for European Union. “About
TTIP – basics, benefits, concerns”, http://ec.europa.eu/trade/policy/in-focus/ttip/about-ttip/questions-andanswers/index_en.htm, 7/7/15]
TTIP would not only boost trade and income in the EU and US but also in the rest of the world. An
independent study found TTIP could increase our trading partners' output by almost €100 billion. More
growth in the EU and the US would increase demand for exports of raw materials, components and
finished products from other countries. Aligning EU and US standards and regulations would mean
exporters in other countries would only have to comply with one set of rules instead of two. This would
make it easier for them to export and would help their economies. Aligning EU and US standards and
regulations could also provide the basis for high global standards, bringing benefits to consumers and
business alike.
Protectionism/retaliation now
PRISM and Encryption backdoor programs are costing US tech firms well over $35
billion through increasing protectionist backlash and shunning of US companies.
We must end NSA online surveillance to solve.
Daniel Castro and Alan McQuinn June 9, 2015, Castro is VP of ITIT; McQuinn is a research
assistant at ITFF, “Beyond the USA Freedom Act: How U.S. Surveillance Still Subverts U.S.
Competitiveness,” Information Tech and Innovation Foundation,
http://www.itif.org/publications/2015/06/09/beyond-usa-freedom-act-how-us-surveillance-still-subvertsus-competitiveness, KEL
ITIF estimated in 2013 that even a modest drop in the expected foreign market share for cloud computing
stemming from concerns about U.S. surveillance could cost the United States between $21.5 billion and $35
billion by 2016. 3 Since then, it has become clear that the U.S. tech industry as a whole, not just the cloud
computing sector, has under - performed as a result of the Snowden revelations. Therefore, the economic impact
of U.S. surveillance practices will likely far exceed ITIF’s initial $35 billion estimate. This report catalogues a
wide range of specific examples of the economic harm that has been done to U.S. businesses. In short, foreign customers are shunning
U.S. companies. The policy implication of this is clear: Now that Congress has reformed how the National
Security Agency (NSA) collects bulk domestic phone records and allowed private firms — rather than the government — to
collect and store approved data, it is time to address other controversial digital surveillance activities by the
U.S. intelligence community .4 The failure of U.S. policymakers to address surveillance concerns
over the last few years has buoyed foreign protectionism and hurt American businesses. The U.S.
government’s failure to reform many of the NSA’s surveillance programs has damaged the
competitiveness of the U.S. tech sector and cost it a portion of the global market share .5 This
includes programs such as PRISM — the controversial program authorized by the FISA Amendments Act , which allows for
warrantless access to private - user data on popular online services both in the United States and abroad — and Bullrun — the NSA’s
program to undermine encryption standards both at home and abroad. Foreign companies have seized on
these controversial policies to convince their customers that keeping data at home is safer than sending it
abroad, and foreign governments have pointed to U.S. surveillance as justification for protectionist
policies that require data to be kept within the ir national borders. In the most extreme cases, such as in China, foreign governments are using
fear of digital surveillance to force companies to surrender valuable intellectual property, such as source code.6
Surv harmed Relations
Surveillance has decked the relationship
Barker, Bertelsmann Foundation trans-Atlantic relations director, 2013
(Tyson, “BLOWN COVER: THE NSA AND THE UNRAVELING US-EU INTELLIGENCE
RELATIONSHIP”, 7-3, http://www.bfna.org/sites/default/files/BBrief%20Blown%20Cover%20%20The%20NSA%20and%20the%20Unraveling%20USEU%20Intelligence%20Relationship%20(3%20July%202013).pdf, ldg)
The EU has long pined for greater respect from Washington. Negotiations over data sharing were more than
discrete talks on limited framework agreements. They were a vehicle by which to develop a broader strategic relationship
based on equal partnership and mutual respect with a post-Lisbon Treaty EU. US officials often found the negotiations
tedious and exasperating. Since 2010, the administration and members of Congress have held extensive consultations with the European Commission
and waves of EP delegations to ensure them that the systems used for data collection and analysis are limited, carefully monitored, and operating under judiciously
crafted and transparent guidelines. Such assurances
went a long way toward repairing the US’s damaged image in
Europe. The recent disclosures have obliterated much of this effort . Even while negotiating an intricate framework for the
usage of narrowly defined classifications of personal data, the NSA was voraciously aggregating Europeans’ personal and institutional data across wide swaths of
The public debate on both sides of the Atlantic has
returned to the hubristic bravado characteristic of the George W. Bush era. Former NSA chief and CIA head Michael
territory. It will be difficult to justify this action as vital to US national security.
Hayden has stated that fourth-amendment privacy protections are not part of an “international treaty” and that Europeans should “look first and find out what their
own governments are doing”.20 For their part, Europeans brandish images from the 2007 German film “The Lives of Others”, which explored the deep human impact
of pervasive surveillance in authoritarian East Germany. In their eyes, USA stands for “United Stasi of America.”21 Secretary of State John Kerry’s comment that the
NSA’s alleged activities were “not unusual” reflects the indifference with which the US has treated the EU’s governing pathos.22 This
apathy could now
lead to a crisis of confidence . The Obama administration has touted the reparation of US’s global soft power as one of its greatest foreign-policy
achievements. How it handles relations with Europe in its wake could demonstrate whether that achievement is enduring.
Data privacy issues wreck cooperation
Global Post 2013
(“Are America's secretive ways destroying its relationship with Europe?”, 7-31,
http://www.globalpost.com/dispatch/news/regions/europe/130730/europe-data-wars-surveillance-nsasnowden, ldg)
It’s already casting a shadow over Europe’s most powerful leader — German Chancellor Angela Merkel — as well as jeopardizing transAtlantic agreements that Washington views as vital to the fight against terrorism, and threatening the
future of the world's biggest internet companies. Anger over the PRISM system — under which the US National Security
Agency claimed "direct access" to data stored by Google, Microsoft, Yahoo and other tech giants — has boosted the positions of those seeking
tough new data-protection rules that would make it harder for the US authorities to get their hands on the
private details of European citizens. "I hope that PRISM has been a wake-up call," Viviane Reding, the European Union's justice commissioner,
said recently. "There is no area which lies outside the law in Europe, even when issues of security are involved." Outspoken in her criticism of the US cyber-snooping,
Reding has been leading efforts to update EU data privacy rules. " In Europe, data protection is a fundamental right. Citizens do not want
the secret service to listen to every phone call they make or read every email they write," she said in recent speech in Munich. "National security is important, but it
does not mean that anything goes and that fundamental rights no longer apply." Draft
EU data privacy rules drawn up by Reding's
office in 2011 were watered down by politicians who argued they would harm security and hamper
business. But the brouhaha over Snowden has prompted a turnaround, with powerful voices now demanding more protection.
Merkel has lent her highly influential voice to the demands for tougher rules. She’s publicly called for "very strict" European privacy laws that would force companies
such as Google and Facebook to keep European authorities informed of whom they share data with. "The protection of citizens' data must be ensured," she told ARD
television. With Germany's national elections looming in September, Merkel is under pressure to take a firm stance. Snowden's exposure of collusion between
Germany's BND spy agency and the NSA caused widespread outrage in a country where intrusion into private lives by secret services revives bad memories of the
Nazi Gestapo and Communist Stasi. Trailing Merkel in opinion polls, Germany's opposition has seized on the spy scandal. Social Democratic Party leader Peer
Steinbrueck has accused the chancellor of breaking her oath of office for failing to protect citizens from privacy violations by US intelligence. However, Merkel is far
A change of heart in the European
Parliament now seems certain to ensure that strict limits on how internet companies share European
citizens' data with foreign governments will be re-inserted into the proposed EU data-privacy legislation.
Lawmakers fearful of upsetting EU-US relations had opposed the so-called anti-FISA clause — named after the
Foreign Intelligence Surveillance Act, which enables the US government to monitor international phone and email conversations. Snowden has
changed their minds. "It's definitely a big step in the right direction," says Joe McNamee, director of the privacy campaign group European Digital
from the sole European politician pressed by public disquiet over PRISM to take a harder line.
Rights. "In the space of a few days, we went from being the only ones asking for this text to seeing the biggest groups in the European Parliament standing up and
saying it must be re-introduced. It was a pleasant trip into the mainstream for us.” The inclusion of the clause in the final EU law could have profound implications for
American tech firms. They could find themselves obliged by American legislation to share information about foreigners with government agencies at home, but facing
massive EU fines for passing on such data. The clause was removed from the bill originally drafted by Reding's office in 2011 after a bout of intense lobbying by the
Obama administration. The US authorities and American internet giants are continuing to mount a major lobbying campaign to dilute the legislation. "I've never seen
anything like it, such a powerful lobbying operation," Reding told Spain's El Pais newspaper last week. "The lobbies have 10 times more people than my team, there
are hundreds of lawyers' offices active on this and representatives paid by the big companies." The Snowden scandal has pushed American lobbyists onto the back
foot as European politicians call not just for tough new legislation, but also a rollback of existing rules that allow the sharing of information such as airline passenger
data or bank account details. Reding has also ordered a review of "safe-harbor" rules set up in the 1990s that — under the assumption that both sides of the Atlantic
shared broadly similar privacy standards — allow American companies to self-regulate their compliance with European laws under the supervision of the US Federal
Trade Commission. Germany's Conference of Data Protection Commissioners wrote to Merkel last week urging her to support a suspension of the safe-harbor
arrangements. "Supervisory authorities may suspend the transfer of data to such countries when there is a 'substantial likelihood' that the safe harbor principles ... are
being violated. This is now the case," the German authorities wrote. All
of this is casting a dark cloud over the recently launched
negotiations between the United States and European Union to create the world's largest free-trade zone.
Merkel intervened to persuade French President Francois Hollande not to block the first round of talks
over the PRISM scandal, but privacy issues seem certain to dog future progress.
US-EU Relations Impact Ext
Security cooperation with Europe solves nuclear war and multiple transnational
threats
Yannis Stivachtis 10, Director of International Studies Program @ Virginia Polytechnic Institute & State
University A. Stivachtis (Professor of Poli Sci & Ph.D. in Politics & International Relations from Lancaster
University), THE IMPERATIVE FOR TRANSATLANTIC COOPERATION,” The Research Institute for European
and American Studies, 2010, pg. http://www.rieas.gr/research-areas/global-issues/transatlanticstudies/78.html
There is no doubt that
US-European relations are in a period of transition , and that the stresses and strains of globalization are increasing both the
number and the seriousness of the challenges that confront transatlantic relations. The events of 9/11 and the Iraq War have added significantly to these stresses and strains. At the same
terrorism, the nuclearization of North Korea and especially Iran, the proliferation of weapons of mass destruction (WMD), the
transformation of Russia into a stable and cooperative member of the international community, the growing power of China, the political and economic transformation
and integration of the Caucasian and Central Asian states, the integration and stabilization of the Balkan countries, the promotion of
peace and stability in the Middle East, poverty, climate change, AIDS and other emergent problems and situations
require further cooperation among countries at the regional, global and institutional levels. Therefore, cooperation between the U.S. and
Europe is more imperative than ever to deal effectively with these problems. It is fair to say that the challenges of
crafting a new relationship between the U.S. and the EU as well as between the U.S. and NATO are more regional than
global, but the implications of success or failure will be global. The transatlantic relationship is still in crisis, despite efforts to improve it
time, international
since the Iraq War. This is not to say that differences between the two sides of the Atlantic did not exist before the war. Actually, post-1945 relations between Europe and the U.S. were
fraught with disagreements and never free of crisis since the Suez crisis of 1956. Moreover, despite trans-Atlantic proclamations of solidarity in the aftermath of 9/11, the U.S. and Europe
parted ways on issues from global warming and biotechnology to peacekeeping and national missile defense. Questions such as, the future role of NATO and its relationship to the common
European Security and Defense policy (ESDP), or what constitutes terrorism and what the rights of captured suspected terrorists are, have been added to the list of US-European
if European leaders conclude that Europe must become
counterweight to the U.S., rather than a partner, it will be difficult to engage in the kind of open search for a
common ground than an elective partnership requires. Second, there is a risk that public opinion in both the U.S. and Europe will make it difficult even for
leaders who want to forge a new relationship to make the necessary accommodations. If both sides would actively work to heal the breach, a new opportunity could be created. A
vibrant transatlantic partnership remains a real possibility, but only if both sides make the necessary
political commitment. There are strong reasons to believe that the security challenges facing the U.S. and Europe are more shared than divergent. The most dramatic case is
disagreements. There are two reasons for concern regarding the transatlantic rift. First,
terrorism. Closely related is the common interest in halting the spread of weapons of mass destruction and the nuclearization of Iran and North Korea. This commonality of threats is clearly
perceived by publics on both sides of the Atlantic. Actually, Americans and Europeans see eye to eye on more issues than one would expect from reading newspapers and magazines. But while
elites on both sides of the Atlantic bemoan a largely illusory gap over the use of military force, biotechnology, and global warming, surveys of American and European public opinion highlight
sharp differences over global leadership, defense spending, and the Middle East that threaten the future of the last century’s most successful alliance.
There are other
important, shared interests as well. The transformation of Russia into a stable cooperative member of the
international community is a priority both for the U.S. and Europe. They also have an interest in promoting a stable regime in Ukraine. It is
necessary for the U.S. and EU to form a united front to meet these challenges because first, there is a risk that dangerous
materials related to WMD will fall into the wrong hands; and second, the spread of conflict along those countries’ periphery could
destabilize neighboring countries and provide safe havens for terrorists and other international criminal organizations. Likewise, in
the Caucasus and Central Asia both sides share a stake in promoting political and economic
transformation and integrating these states into larger communities such as the OSCE. This would also minimize the risk of instability spreading and
prevent those countries of becoming havens for international terrorists and criminals. Similarly, there is a common interest in integrating the Balkans politically and economically.
Dealing with Iran, Iraq, Lebanon, and the Israeli-Palestinian conflict as well as other political issues in the Middle East are also of a great
concern for both sides although the U.S. plays a dominant role in the region. Finally, US-European cooperation will be more effective in
dealing with the rising power of China through engagement but also containment. The post Iraq War realities have shown that it is no longer simply a question
of adapting transatlantic institutions to new realities. The changing structure of relations between the U.S. and Europe implies that a new basis for the relationship must be found if
transatlantic cooperation and partnership is to continue.
The future course of relations will be determined above all by U.S.
policy towards Europe and the Atlantic Alliance. Wise policy can help forge a new, more enduring strategic partnership, through which the two sides of the
a policy that takes Europe for granted and
routinely ignores or even belittles Europe an concerns, may force Europe to conclude that the costs of continued
alliance outweigh its benefits.
Atlantic cooperate in meeting the many major challenges and opportunities of the evolving world together. But
Cooperation with Europe solves nuclear terror and prolif
Stivachtis 10 – Director of International Studies Program @ Virginia Polytechnic Institute & State
University [Dr. Yannis. A. Stivachtis (Professor of Poli Sci & Ph.D. in Politics & International Relations
from Lancaster University), THE IMPERATIVE FOR TRANSATLANTIC COOPERATION,” The Research
Institute for European and American Studies, 2010, pg. http://www.rieas.gr/research-areas/globalissues/transatlantic-studies/78.html]
There is no doubt that US-European
relations are in a period of transition, and that the stresses and strains of globalization are
increasing both the number and the seriousness of the challenges that confront transatlantic relations. The events of 9/11 and the Iraq War have added significantly
to these stresses and strains. At the same time, international terrorism, the nuclearization
of North Korea and especially Iran, the
proliferation of weapons of mass destruction (WMD), the transformation of Russia into a stable and cooperative member of the
international community, the growing power of China, the political and economic transformation and integration of the Caucasian and
Central Asian states, the integration and stabilization of the Balkan countries, the promotion of peace and stability in the Middle
East, poverty, climate change, AIDS and other emergent problems and situations require further cooperation among
countries at the regional, global and institutional levels. Therefore, cooperation between the U.S. and Europe is more imperative
than ever to deal effectively with these problems. It is fair to say that the challenges of crafting a new relationship
between the U.S. and the EU as well as between the U.S. and NATO are more regional than global, but the implications
of success or failure will be global. The transatlantic relationship is still in crisis, despite efforts to improve it since the Iraq War. This is not to say
that differences between the two sides of the Atlantic did not exist before the war. Actually, post-1945 relations between Europe and the U.S. were fraught with
disagreements and never free of crisis since the Suez crisis of 1956. Moreover, despite trans-Atlantic proclamations of solidarity in the aftermath of 9/11, the U.S.
and Europe parted ways on issues from global warming and biotechnology to peacekeeping and national missile defense. Questions such as, the future role of NATO
and its relationship to the common European Security and Defense policy (ESDP), or what constitutes terrorism and what the rights of captured suspected terrorists
are, have been added to the list of US-European disagreements. There are two reasons for concern regarding the transatlantic rift. First, if European leaders
conclude that Europe must become counterweight to the U.S., rather than a partner, it will be difficult to engage in the kind of open search for a common ground
than an elective partnership requires. Second, there is a risk that public opinion in both the U.S. and Europe will make it difficult even for leaders who want to forge
a new relationship to make the necessary accommodations. If both sides would actively work to heal the breach, a new opportunity could be created. A
vibrant
transatlantic partnership remains a real possibility, but only if both sides make the necessary political
commitment. There are strong reasons to believe that the security challenges facing the U.S. and Europe are more shared than divergent. The most
dramatic case is terrorism. Closely related is the common interest in halting the spread of weapons of mass destruction and the nuclearization of Iran and North
Korea. This commonality of threats is clearly perceived by publics on both sides of the Atlantic. Actually, Americans and Europeans see eye to eye on more issues
than one would expect from reading newspapers and magazines. But while elites on both sides of the Atlantic bemoan a largely illusory gap over the use of military
force, biotechnology, and global warming, surveys of American and European public opinion highlight sharp differences over global leadership, defense spending,
and the Middle East that threaten the future of the last century’s most successful alliance. There
are other important, shared interests as well.
The transformation of Russia into a stable cooperative member of the international community is a priority both for the
U.S. and Europe. They also have an interest in promoting a stable regime in Ukraine. It is necessary for the U.S. and EU to form
a united front to meet these challenges because first, there is a risk that dangerous materials related to WMD will fall
into the wrong hands; and second, the spread of conflict along those countries’ periphery could destabilize
neighboring countries and provide safe havens for terrorists and other international criminal organizations. Likewise, in the
Caucasus and Central Asia both sides share a stake in promoting political and economic transformation
and integrating these states into larger communities such as the OSCE. This would also minimize the risk of instability spreading and prevent those
countries of becoming havens for international terrorists and criminals. Similarly, there is a common interest in integrating the Balkans politically and economically.
Dealing with Iran, Iraq, Lebanon, and the Israeli-Palestinian conflict as well as other political issues in the Middle East are also of a great concern for both sides
although the U.S. plays a dominant role in the region. Finally, US-European cooperation will be more effective in dealing with the rising power of China through
engagement but also containment. The post Iraq War realities have shown that it is no longer simply a question of adapting transatlantic institutions to new
realities. The changing structure of relations between the U.S. and Europe implies that a new basis for the relationship must be found if transatlantic cooperation
and partnership is to continue. The future course of relations will be determined above all by U.S. policy towards Europe and the Atlantic Alliance. Wise policy can
help forge a new, more enduring strategic partnership, through which the two sides of the Atlantic cooperate in meeting the many major challenges and
opportunities of the evolving world together. But a
policy that takes Europe for granted and routinely ignores or even
belittles European concerns, may force Europe to conclude that the costs of continued alliance
outweigh its benefits.
Nuclear terrorism is highly likely
Plame ’14 (Nuclear terrorism: Most immediate and extreme threat to global security 143686 2 By
Valerie Plame - 09/26/14 07:00 AM EDT A former career covert CIA operations officer, Plame worked to
protect U.S. national security and prevent the proliferation of weapons of mass destruction. She is now
a New York Times best-selling author and a leader of the international Global Zero movement for the
elimination of all nuclear weapons.
Yet this mounting violence and instability pales in comparison to what could be wrought by nucleararmed terrorists. We know that the Islamic State group has the means and motive to attain weapons
of mass destruction. They have an appetite for shocking demonstrations and indiscriminate killing,
and have already seized low-grade nuclear material from a facility in Mosul. They are acquiring the ability to
build radioactive dirty bombs that could cause major health and economic damage. With reports of
escalating funding and recruitment of citizens from every continent, and ties to radicals in nuclear
weapons-states such as Pakistan, it is increasingly conceivable that weapons-grade materials – or
even a ready-made nuclear device – could fall into their hands. If that happens, they would not hesitate
to use them – possibly at a cost of hundreds of thousands of lives. There are more than 16,000 nuclear weapons in the
world and enough highly-enriched uranium and plutonium to make hundreds of thousands more. We can do our best to prevent isolated
incidents in which terrorists buy, build or steal them – but those efforts are stop-gap at best, and we won’t know if we missed something until
it’s too late.
Nuclear terrorism is all but inevitable unless we work quickly and urgently to secure all
nuclear materials and eradicate all nuclear weapons. To eliminate the risk we have to drain the swamp.
Terrorism causes full scale nuclear wars
Hellman ‘8 (Martin E. Hellman* * Martin E. Hellman is a member of the National Academy of
Engineering and Professor Emeritus at Stanford University. His current project applies risk analysis to
nuclear deterrence
Nuclear proliferation and the specter of nuclear terrorism are creating additional possibilities for
triggering a nuclear war. If an American (or Russian) city were devastated by an act of nuclear terrorism, the
public outcry for immediate, decisive action would be even stronger than Kennedy had to deal with
when the Cuban missiles first became known to the American public. While the action would likely not
be directed against Russia, it might be threatening to Russia (e.g., on its borders) or one of its allies and
precipitate a crisis that resulted in a full-scale nuclear war. Terrorists with an apocalyptic mindset might
even attempt to catalyze a full-scale nuclear war by disguising their act to look like an attack by the U.S. or
Russia.
Prolif causes extinction- it will be fast and dangerous
Kroenig ’12 (Matthew Kroenig: The History of Proliferation Optimism: Does It Have A Future? NPEC
asked Council on Foreign Relations Stanton Nuclear Security Fellow and Georgetown University assistant
professor of government Matthew Kroenig to review the bidding. His take and bottom line is that such
nuclear optimism always was strained, that it remains far less popular out of academe than in and with
cause. May 26, 2012 AUTHOR: Matthew Kroenig: Assistant Professor of Government, Georgetown
University and Stanton Nuclear Security Fellow, Council on Foreign Relations The History of Proliferation
Optimism (PDF) 173.80 KB The History of Proliferation Optimism: Does It Have A Future? Prepared for
the Nonproliferation Policy Education Center)
The greatest threat posed by the spread of nuclear weapons is nuclear war. The more states in
possession of nuclear weapons, the greater the probability that somewhere, someday, there is a
catastrophic nuclear war. A nuclear exchange between the two superpowers during the Cold War could have arguably resulted in human
extinction and a nuclear exchange between states with smaller nuclear arsenals, such as India and Pakistan, could still result in millions of deaths and casualties,
billions of dollars of economic devastation, environmental degradation, and a parade of other horrors. To date, nuclear weapons have only been used in warfare
once. In 1945, the United States used one nuclear weapon each on Hiroshima and Nagasaki, bringing World War II to a close. Many
analysts point to
sixty-five-plus-year tradition of nuclear non-use as evidence that nuclear weapons are unusable, but it
would be naïve to think that nuclear weapons will never be used again. After all, analysts in the 1990s
argued that worldwide economic downturns like the great depression were a thing of the past, only to
be surprised by the dot-com bubble bursting in the later 1990s and the Great Recession of the late
Naughts.[53] This author, for one, would be surprised if nuclear weapons are not used in my lifetime. Before reaching a state of MAD, new
nuclear states go through a transition period in which they lack a secure-second strike capability. In this
context, one or both states might believe that it has an incentive to use nuclear weapons first. For example, if
Iran acquires nuclear weapons neither Iran, nor its nuclear-armed rival, Israel, will have a secure, second-strike capability. Even though it is believed to have a large
arsenal, given its small size and lack of strategic depth, Israel might not be confident that it could absorb a nuclear strike and respond with a devastating
counterstrike. Similarly, Iran might eventually be able to build a large and survivable nuclear arsenal, but ,
when it first crosses the nuclear
threshold, Tehran will have a small and vulnerable nuclear force. In these pre-MAD situations, there are
at least three ways that nuclear war could occur. First, the state with the nuclear advantage might
believe it has a splendid first strike capability. In a crisis, Israel might, therefore, decide to launch a
preemptive nuclear strike to disarm Iran’s nuclear capabilities and eliminate the threat of nuclear war against Israel. Indeed, this incentive
might be further increased by Israel’s aggressive strategic culture that emphasizes preemptive action.
Second, the state with a small and vulnerable nuclear arsenal, in this case Iran, might feel use ‘em or loose
‘em pressures. That is, if Tehran believes that Israel might launch a preemptive strike, Iran might decide to strike first rather than risk having its entire
nuclear arsenal destroyed. Third, as Thomas Schelling has argued, nuclear war could result due to the reciprocal fear of surprise
attack.[54] If there are advantages to striking first, one state might start a nuclear war in the belief that war is inevitable and that it would be better to go first
than to go second. In a future Israeli-Iranian crisis, for example, Israel and Iran might both prefer to avoid a nuclear war, but decide to strike first rather than suffer a
devastating first attack from an opponent. Even in a world of MAD, there is a risk of nuclear war. Rational
deterrence theory assumes
nuclear-armed states are governed by rational leaders that would not intentionally launch a suicidal
nuclear war. This assumption appears to have applied to past and current nuclear powers, but there is no guarantee that it will continue to hold in the
future. For example, Iran’s theocratic government, despite its inflammatory rhetoric, has followed a fairly pragmatic foreign policy since 1979, but it contains
leaders who genuinely hold millenarian religious worldviews who could one day ascend to power and have their finger on the nuclear trigger. We
cannot
rule out the possibility that, as nuclear weapons continue to spread, one leader will choose to launch
a nuclear war, knowing full well that it could result in self-destruction. One does not need to resort to irrationality,
however, to imagine a nuclear war under MAD. Nuclear weapons may deter leaders from intentionally launching full-scale wars, but they do not mean the end of
international politics. As was discussed above, nuclear-armed states still have conflicts of interest and leaders still seek to coerce nuclear-armed adversaries. This
leads to the credibility problem that is at the heart of modern deterrence theory: how can you threaten to launch a suicidal nuclear war? Deterrence theorists have
devised at least two answers to this question. First, as stated above, leaders can choose to launch a limited nuclear war.[55] This strategy might be especially
attractive to states in a position of conventional military inferiority that might have an incentive to escalate a crisis quickly. During the Cold War, the United States
was willing to use nuclear weapons first to stop a Soviet invasion of Western Europe given NATO’s conventional inferiority in continental Europe. As Russia’s
conventional military power has deteriorated since the end of the Cold War, Moscow has come to rely more heavily on nuclear use in its strategic doctrine. Indeed,
Russian strategy calls for the use of nuclear weapons early in a conflict (something that most Western strategists would consider to be escalatory) as a way to deescalate a crisis. Similarly, Pakistan’s military plans for nuclear use in the event of an invasion from conventionally stronger India. And finally, Chinese generals
openly talk about the possibility of nuclear use against a U.S. superpower in a possible East Asia contingency. Second, as was also discussed above leaders can make
a “threat that leaves something to chance.”[56] They can initiate a nuclear crisis. By playing these risky games of nuclear brinkmanship, states can increases the risk
of nuclear war in an attempt to force a less resolved adversary to back down. Historical crises have not resulted in nuclear war, but many of them, including the
1962 Cuban Missile Crisis, have come close. And scholars have documented historical incidents when accidents could have led to war.[57] When we think about
future nuclear crisis dyads, such as India and Pakistan and Iran and Israel, there are fewer sources of stability that existed during the Cold War, meaning that
there is a very real risk that a future Middle East crisis could result in a devastating nuclear exchange.
Nuclear terrorism. The spread of nuclear weapons also increases the risk of nuclear terrorism.[58] It used to be said that “terrorists want a lot of people watching,
not a lot of people dead,” but the terrorist attacks of September 11, 2001 changed expert perceptions of the terrorist threat.[59] September 11th demonstrated
that Al Qaeda and other modern terrorist groups are interested in imposing massive casualties and there are few better ways of killing large numbers of civilians
than detonating a nuclear weapon in a major metropolitan area. And, while September 11th was one of the greatest tragedies in American history, it would have
been much worse had Osama Bin Laden been able to acquire nuclear weapons. Osama Bin Laden declared it a “religious duty” for Al Qaeda to acquire nuclear
weapons and radical clerics have issued fatwas declaring it permissible to use nuclear weapons in Jihad against the West.[60] Unlike states, which can be deterred,
there is little doubt that if terrorists acquired nuclear weapons, they would use them. Indeed, in recent years, many U.S. politicians and security analysts have
agreed that nuclear terrorism poses the greatest threat to U.S. national security.[61] Wanting nuclear weapons and actually possessing them, however, are two
different things and many analysts have pointed out the tremendous hurdles that terrorists would have to overcome in order to acquire nuclear weapons.[62]
Nevertheless, as nuclear weapons spread, the possibility that they will eventually fall into terrorist hands increases. States could intentionally transfer nuclear
weapons, or the fissile material required to build them, to terrorist groups. There are good reasons why a state might be reluctant to transfer nuclear weapons to
terrorists, but, as nuclear weapons spread, the possibility that a leader might someday purposely arm a terrorist group with nuclear weapons increases. Some fear,
for example, that Iran, with its close ties to Hamas and Hezbollah, might be at a heightened risk of transferring nuclear weapons to terrorists. Moreover, even if no
state would ever intentionally transfer nuclear capabilities to terrorists, a new nuclear state, with underdeveloped security procedures, might be vulnerable to theft,
allowing terrorist groups or corrupt or ideologically-motivated insiders to transfer dangerous material to terrorists. There is evidence, for example, that
representatives from Pakistan’s atomic energy establishment met with Al Qaeda members to discuss a possible nuclear deal.[63] Finally, a nuclear-armed state
could collapse, resulting in a breakdown of law and order and a loose nuclear weapons problem. U.S. officials are currently very concerned about what would
happen with Pakistan’s nuclear weapons if the government were to fall. As nuclear weapons spread, this problem is only further amplified. Iran is a country with a
history of revolutions and a government with a tenuous hold on power. The regime change that Washing has long dreamed about in Tehran could actually become a
nightmare if Iran had nuclear weapons and a break down in authority forced us to worry about the fate of Iran’s nuclear arsenal. Regional instability: The spread of
nuclear weapons also emboldens nuclear powers contributing to regional instability. States that lack nuclear weapons need to fear direct military attack from other
states, but states with nuclear weapons can be confident that they can deter an intentional military attack, giving them an incentive to be more aggressive in the
conduct of their foreign policy. In this way, nuclear weapons provide a shield under which states can feel free to engage in lower-level aggression. Indeed,
international relations theories about the “stability-instability paradox” maintain that stability at the nuclear level contributes to conventional instability.[64]
Historically, we have seen that the spread of nuclear weapons has emboldened their possessors and contributed to regional instability. Recent scholarly analyses
have demonstrated that, after controlling for other relevant factors, nuclear-weapon states are more likely to engage in conflict than nonnuclear-weapon states and
that this aggressiveness is more pronounced in new nuclear states that have less experience with nuclear diplomacy.[65] Similarly, research on internal decisionmaking in Pakistan reveals that Pakistani foreign policymakers may have been emboldened by the acquisition of nuclear weapons, which encouraged them to
initiate militarized disputes against India.[66] Currently, Iran restrains its foreign policy because it fears a major military retaliation from the United States or Israel,
but with nuclear weapons it could feel free to push harder. A nuclear-armed Iran would likely step up support to terrorist and proxy groups and engage in more
aggressive coercive diplomacy. With a nuclear-armed Iran increasingly throwing its weight around in the region, we could witness an even more crisis prone Middle
East. And in a poly-nuclear Middle East with Israel, Iran, and, in the future, possibly other states, armed with nuclear weapons, any one of those crises could result in
a catastrophic nuclear exchange. Nuclear
proliferation can also lead to regional instability due to preventive strikes
against nuclear programs. States often conduct preventive military strikes to prevent adversaries from
acquiring nuclear weapons . Historically, the United States attacked German nuclear facilities during World War II, Israel bombed a nuclear reactor
in Iraq in 1981, Iraq bombed Iran’s Bushehr reactors in the Iran-Iraq War in the 1980s and Iran returned the favor against an Iraqi nuclear plant, a U.S.-led
international coalition destroyed Iraq’s nuclear infrastructure in the first Gulf War in 1991, and Israel bombed a Syrian nuclear reactor in 2007. These strikes have
not led to extensive conflagrations in the past, but we might not be so lucky in the future. At the time of writing in 2012, the United States and Israel were polishing
military plans to attack Iran’s nuclear program and some experts maintain that such a strike could very well lead to a wider war in the Middle East. Constrained
freedom of action. The spread of nuclear weapons also disadvantages American’s national security by constraining U.S. freedom of action. As the most powerful
country on the planet, with the ability to project power to every corner of the globe, the United States has the ability to threaten or protect every other state in the
international system. This is a significant source of strategic leverage and maintaining freedom of action is an important objective of U.S. national security
policy.[67] As nuclear weapons spread, however, America’s military freedom of action is constrained. The United States can use or credibly threaten to use force
against nonnuclear states. The threat of military action against nuclear-armed states is much less credible, however, because nuclear-armed states can deter U.S.
military action with the threat of nuclear retaliation. In January of 2012, for example, Iran threatened to close the Strait of Hormuz, a narrow Persian Gulf waterway
through which roughly 20% of the world’s oil flows, and the United States issued a counter-threat, declaring that Washington would use force to reopen the Strait. If
Iran had had nuclear weapons, however, Washington’s threats would have been much less credible. Would a U.S. President really be willing to risk nuclear war with
Iran in order to reopen the Strait? Maybe. But, maybe not. While the United States might not be deterred in every contingency against a nuclear-armed state, it is
clear that, at a minimum, the spread of nuclear weapons greatly complicates U.S. decisions to use force. Undermines alliances: The spread of nuclear weapons also
complicates U.S. alliance relationships. Washington uses the promise of military protection as a way to cement its alliance structures. U.S. allies depend on
America’s protection, giving Washington influence over allied states’ foreign policies. Historically, the United States has offered, and threatened to retract, the
security guarantee carrot to prevent allied states from acting contrary to its interests. As nuclear weapons spread, however, alliances held together by promises of
military protection are undermined in two ways. First, U.S. allies may doubt the credibility of Washington’s commitments to provide a military defense against
nuclear-armed states, leading them to weaken ties with their patron. As Charles de Gaulle famously asked about the U.S. commitment to defend France from the
Soviet Union during the Cold War, would Washington be willing to trade New York for Paris? Similarly, if Iran acquires nuclear weapons, U.S. partners in the Middle
East, such as Israel and Gulf States, will question Washington’s resolve to defend them from Iran. After all, if the United States proves unwilling to use force to
prevent Iran from acquiring nuclear weapons, would it really be willing to fight a war against a nuclear-armed Iran? Qatar, for example, already appears to be
hedging its bets, loosening ties to Washington and warming to Tehran. Second, nuclear proliferation could encourage client states to acquire nuclear weapons
themselves, giving them greater security independence and making them less dependable allies. According to many scholars, the acquisition of the force de frappe
was instrumental in permitting the French Fifth Republic under President Charles de Gualle to pursue a foreign policy path independent from Washington at
NATO.[68] Similarly, it is possible that Turkey, Saudi Arabia, and other regional states will acquire independent nuclear capabilities to counter Iran’s nuclear arsenal,
greatly destabilizing an already unstable region and threatening Washington’s ability to influence regional dynamics. Further proliferation. Nuclear
proliferation poses an additional threat to international peace and security because it causes further
proliferation. As former Secretary of State George Schultz once said, “ proliferation begets proliferation .”[69] When one
country acquires nuclear weapons, its regional adversaries, feeling threatened by its neighbor’s new
nuclear capabilities, are more likely to attempt to acquire nuclear weapons in response. Indeed, the history of
nuclear proliferation can be read as a chain reaction of proliferation. The United States acquired nuclear weapons in response to Nazi Germany’s crash nuclear
program. The Soviet Union and China acquired nuclear weapons to counter the U.S. nuclear arsenal. The United Kingdom and France went nuclear to protect
themselves from the Soviet Union. India’s bomb was meant to counter China and it, in turn, spurred Pakistan to join the nuclear club. Today, we worry that, if Iran
acquires nuclear weapons, other Middle Eastern countries, such as Egypt, Iraq, Turkey, and Saudi Arabia, might desire nuclear capabilities, triggering an arms race in
a strategically important and volatile region.
US-EU relations key to solve warming
Larivé 12 (Maxime Henri André Larivé, Ph.D., is a Research Associate at the EU Center of Excellence at
the University of Miami, “Obama 2: Future Implications for EU,” Miami - Florida European Union Center
of Excellence - US Relations, November, Vol. 12, No. 8, http://aei.pitt.edu/43440/1/Larive_EUUSunderObama.pdf, CMR)
As demonstrated during the 15 th session of the Confer ence of the Parties to the United Nations Framework Convention on Climate
Change in 2009, or COP15, followed by the COP16 in 2010, and COP17 in 2011, the EU and US were not in sync. The lack
of unity has had a considerable role on the failure of all three UN meetings on Climate Change. The most
obvious was the COP15 taking place in Copenhagen, where for the first time the ‘Rest’ – BRICS countries led by China – did balance the
influence and power of a divided West, which affected the outcomes of the convent ion. Since
then, the Europeans have been
increasing their diplomatic reach in order to develop strategic partnerships and push for a global set of
rules on carbon emissions. 40 Quite interestingly, in the mind of Americans, climate change is still closely li nked to energy
independence. The latest energy revolution taking place in the US, shale gas, has completely changed the dynamics. The US is on its way to
become the largest producer of gas by 2020 well beyond Russia. 41 The narrative in the US has been that shale gas not only will permit to lower
carbon emissions, but is also environmental friendly. Such assumption has been a strong point of debate within the specialized literature. 42
For instance, Europeans, at the exception of Poland, have stopped the produc tion of shale gas due to the environmental risks associated with
the extraction process, so - called fracking, which is a mix of sand, water and undisclosed chemicals underground in order to release the
unconventional gas stacked in the rocks. In order to ad dress the problem of gas emissions, which have been identified as the major cause of
global warming, two solutions are currently on the table: carbon tax or Emission Trading Scheme (ETS). 43 The carbon tax has been advanced as
the best option to regulate gas emissions. Even Shell’s chief executive, Peter Voser, was calling governments to introduce a carbon tax, or a
minimum price for CO2, because “the ETS was failing to deliver sufficient incentives to kickstart expensive technologies such as carbon capture
a nd storage.” 44 Furthermore, the current financial crisis has hurt the credibility of a solid and reliable trading system considering the flaws of
market - based mechanisms. Thus, a tax on carbon would be a more accurate way to calculate the actual emissions. In the case of the EU, it has
been argued that a carbon tax would have the greatest impact on the “green growth” of the EU, rather than the ETS, which has been the
flagship of the EU climate policy instrument. 45 Despite a lack of unity in the US, the politi cs tend to favor a trading scheme rather than a tax.
Even though both actors may disagree on the future of shale gas and on the creation of carbon tax, it
second mandate of President Obama, the
is undeniable that under the
EU and the US must work closely together in order to push for new sets
of global regulations in order to address climate change. The discussion over carbon tax or ETS will be
crucial in the coming four years. Europeans are keen on pushing new norms, but only with the support of
the US can they be transferred and adopted by other countries and global institutions.
Warming is the largest risk of extinction
Deibel 07 – professor of IR at National War College (Terry L. Deibel, Foreign Affairs Strategy, “Conclusion: American Foreign
Affairs Strategy Today Anthropogenic – caused by CO2”)
there is one major existential threat to American security (as well as prosperity) of a nonviolent nature, which, though far in the future, demands urgent
action. It is the threat of global warming to the stability of the climate upon which all earthly life
depends. Scientists worldwide have been observing the gathering of this threat for three decades now, and what was once a mere
possibility has passed through probability to near certainty. Indeed not one of more than 900 articles on
climate change published in refereed scientific journals from 1993 to 2003 doubted that anthropogenic
warming is occurring. “In legitimate scientific circles,” writes Elizabeth Kolbert, “it is virtually impossible to find
evidence of disagreement over the fundamentals of global warming.” Evidence from a vast international scientific monitoring effort accumulates
Finally,
almost weekly, as this sample of newspaper reports shows: an international panel predicts “brutal droughts, floods and violent storms across the planet over the next century”; climate change could “literally alter ocean currents,
wipe away huge portions of Alpine Snowcaps and aid the spread of cholera and malaria”; “glaciers in the Antarctic and in Greenland are melting much faster than expected, and…worldwide, plants are blooming several days earlier
than a decade ago”; “rising sea temperatures have been accompanied by a significant global increase in the most destructive hurricanes”; “NASA scientists have concluded from direct temperature measurements that 2005 was the
Earth’s warming climate is estimated to contribute to more than 150,000 deaths
and 5 million illnesses each year” as disease spreads; “widespread bleaching from Texas to Trinidad…killed broad swaths of corals” due to a 2-degree rise in sea
temperatures. “The world is slowly disintegrating ,” concluded Inuit hunter Noah Metuq, who lives 30 miles from the Arctic Circle. “They call it climate change…but we just call it breaking
hottest year on record, with 1998 a close second”; “
up.” From the founding of the first cities some 6,000 years ago until the beginning of the industrial revolution, carbon dioxide levels in the atmosphere remained relatively constant at about 280 parts per million (ppm). At present
Unfortunately, atmospheric CO2 lasts about a
century, so there is no way immediately to reduce levels, only to slow their increase, we are thus in for
significant global warming; the only debate is how much and how serous the effects will be. As the newspaper stories
quoted above show, we are already experiencing the effects of 1-2 degree warming in more violent storms, spread of disease, mass die offs
of plants and animals, species extinction, and threatened inundation of low-lying countries like the Pacific nation of Kiribati and the
Netherlands at a warming of 5 degrees or less the Greenland and West Antarctic ice sheets could disintegrate, leading to a sea
level of rise of 20 feet that would cover North Carolina’s outer banks, swamp the southern third of Florida, and inundate Manhattan up to the middle of Greenwich Village. Another
catastrophic effect would be the collapse of the Atlantic thermohaline circulation that keeps the winter
weather in Europe far warmer than its latitude would otherwise allow. Economist William Cline once estimated the damage to the United States
alone from moderate levels of warming at 1-6 percent of GDP annually; severe warming could cost 13-26 percent of GDP. But the most frightening scenario is runaway
they are accelerating toward 400 ppm, and by 2050 they will reach 500 ppm, about double pre-industrial levels.
greenhouse warming, based on positive feedback from the buildup of water vapor in the atmosphere
that is both caused by and causes hotter surface temperatures. Past ice age transitions, associated with only 5-10 degree changes in average global
temperatures, took place in just decades, even though no one was then pouring ever-increasing amounts of carbon into the atmosphere. Faced with this specter, the best one can conclude is that “humankind’s
continuing enhancement of the natural greenhouse effect is akin to playing Russian roulette with the
earth’s climate and humanity’s life support system. At worst, says physics professor Marty Hoffert of New York University, “we’re just going to
burn everything up; we’re going to heat the atmosphere to the temperature it was in the Cretaceous
when there were crocodiles at the poles, and then everything will collapse.” During the Cold War, astronomer Carl Sagan popularized a
theory of nuclear winter to describe how a thermonuclear war between the Untied States and the Soviet Union would not only destroy both countries but possibly end life on this planet. Global warming is
the post-Cold War era’s equivalent of nuclear winter at least as serious and considerably better supported scientifically. Over the
long run it puts dangers form terrorism and traditional military challenges to shame. It is a threat not only to the security and prosperity to the United
States, but potentially to the continued existence of life on this planet.
Internet Fragmentation Add-on
2AC Fragmentation Add-on
US online surveillance risks fragmenting the internet, harming the US economy and
internet innovation
Matthew Taylor, Nick Hopkins and Jemima Kiss November 1, 2013, “NSA surveillance may cause
breakup of internet, warn experts,” The Guardian, http://www.theguardian.com/world/2013/nov/01/nsasurveillance-cause-internet-breakup-edward-snowden, KEL
The vast scale of online surveillance revealed by Edward Snowden is leading to the breakup of the internet
as countries scramble to protect private or commercially sensitive emails and phone records from UK and
US security services, according to experts and academics. They say moves by countries, such as Brazil and Germany,
to encourage regional online traffic to be routed locally rather than through the US are likely to be the
first steps in a fundamental shift in the way the internet works. The change could potentially hinder
economic growth. "States may have few other options than to follow in Brazil's path," said Ian Brown, from the Oxford Internet Institute.
"This would be expensive, and likely to reduce the rapid rate of innovation that has driven the
development of the internet to date … But if states cannot trust that their citizens' personal data – as well as
sensitive commercial and government information – will not otherwise be swept up in giant surveillance
operations, this may be a price they are willing to pay." Since the Guardian's revelations about the scale of state surveillance,
Brazil's government has published ambitious plans to promote Brazilian networking technology, encourage regional internet traffic to be routed
locally, and is moving to set up a secure national email service. In India, it has been reported that government employees are being advised not to
use Gmail and last month, Indian diplomatic staff in London were told to use typewriters rather than computers when writing up sensitive
documents. In Germany, privacy commissioners have called for a review of whether Europe's internet traffic can be kept within the EU – and by
implication out of the reach of British and US spies.
Fragmentation destroys innovation – that’s key to solve all collective problems
Genachowski 13 (Chair-FCC, 4/16, "The Plot to Block Internet Freedom",
http://www.foreignpolicy.com/articles/2013/04/16/plot_block_internet_freedom?page=full)
The Internet has created an extraordinary new democratic forum for people around the world to express
their opinions. It is revolutionizing global access to information: Today, more than 1 billion people
worldwide have access to the Internet, and at current growth rates, 5 billion people -- about 70 percent of
the world's population -- will be connected in five years. But this growth trajectory is not inevitable, and
threats are mounting to the global spread of an open and truly "worldwide" web. The expansion of
the open Internet must be allowed to continue: The mobile and social media revolutions are critical
not only for democratic institutions' ability to solve the collective problems of a shrinking world ,
but also to a dynamic and innovative global economy that depends on financial transparency and
the free flow of information. The threats to the open Internet were on stark display at last December's
World Conference on International Telecommunications in Dubai, where the United States fought
attempts by a number of countries -- including Russia, China, and Saudi Arabia -- to give a U.N.
organization, the International Telecommunication Union (ITU), new regulatory authority over the
Internet. Ultimately, over the objection of the United States and many others, 89 countries voted to
approve a treaty that could strengthen the power of governments to control online content and deter
broadband deployment. In Dubai, two deeply worrisome trends came to a head. First, we see that the
Arab Spring and similar events have awakened nondemocratic governments to the danger that the
Internet poses to their regimes. In Dubai, they pushed for a treaty that would give the ITU's
imprimatur to governments' blocking or favoring of online content under the guise of preventing
spam and increasing network security. Authoritarian countries' real goal is to legitimize content
regulation, opening the door for governments to block any content they do not like, such as political
speech. Second, the basic commercial model underlying the open Internet is also under threat. In
particular, some proposals, like the one made last year by major European network operators, would
change the ground rules for payments for transferring Internet content. One species of these proposals is
called "sender pays" or "sending party pays." Since the beginning of the Internet, content creators -individuals, news outlets, search engines, social media sites -- have been able to make their content
available to Internet users without paying a fee to Internet service providers. A sender-pays rule would
change that, empowering governments to require Internet content creators to pay a fee to connect with an
end user in that country. Sender pays may look merely like a commercial issue, a different way to divide
the pie. And proponents of sender pays and similar changes claim they would benefit Internet deployment
and Internet users. But the opposite is true: If a country imposed a payment requirement, content creators
would be less likely to serve that country. The loss of content would make the Internet less attractive and
would lessen demand for the deployment of Internet infrastructure in that country. Repeat the process in a
few more countries, and the growth of global connectivity -- as well as its attendant benefits for
democracy -- would slow dramatically. So too would the benefits accruing to the global economy .
Without continuing improvements in transparency and information sharing, the innovation that springs
from new commercial ideas and creative breakthroughs is sure to be severely inhibited . To their
credit, American Internet service providers have joined with the broader U.S. technology industry,
civil society, and others in opposing these changes. Together, we were able to win the battle in
Dubai over sender pays, but we have not yet won the war. Issues affecting global Internet openness,
broadband deployment, and free speech will return in upcoming international forums, including an
important meeting in Geneva in May, the World Telecommunication/ICT Policy Forum. The massive
investment in wired and wireless broadband infrastructure in the United States demonstrates that
preserving an open Internet is completely compatible with broadband deployment. According to a recent
UBS report, annual wireless capital investment in the United States increased 40 percent from 2009 to
2012, while investment in the rest of the world has barely inched upward. And according to the
Information Technology and Innovation Foundation, more fiber-optic cable was laid in the United States
in 2011 and 2012 than in any year since 2000, and 15 percent more than in Europe. All Internet users lose
something when some countries are cut off from the World Wide Web. Each person who is unable to
connect to the Internet diminishes our own access to information. We become less able to understand the
world and formulate policies to respond to our shrinking planet. Conversely, we gain a richer
understanding of global events as more people connect around the world, and those societies nurturing
nascent democracy movements become more familiar with America's traditions of free speech and
pluralism. That's why we believe that the Internet should remain free of gatekeepers and that no entity -public or private -- should be able to pick and choose the information web users can receive. That is a
principle the United States adopted in the Federal Communications Commission's 2010 Open Internet
Order. And it's why we are deeply concerned about arguments by some in the United States that
broadband providers should be able to block, edit, or favor Internet traffic that travels over their networks,
or adopt economic models similar to international sender pays. We must preserve the Internet as the most
open and robust platform for the free exchange of information ever devised. Keeping the Internet open is
perhaps the most important free speech issue of our time.
That makes extinction inevitable
Eagleman 10 [David Eagleman is a neuroscientist at Baylor College of Medicine, where he directs the
Laboratory for Perception and Action and the Initiative on Neuroscience and Law and author of Sum
(Canongate). Nov. 9, 2010, “ Six ways the internet will save civilization,”
http://www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no]
Many great civilisations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually
this results from: natural disasters, resource depletion, economic meltdown, disease, poor
information flow and corruption . But we’re luckier than our predecessors because we command a
technology that no one else possessed: a rapid communication network that finds its highest
expression in the internet. I propose that there are six ways in which the net has vastly reduced the
threat of societal collapse. Epidemics can be deflected by telepresence One of our more dire prospects
for collapse is an infectious-disease epidemic. Viral and bacterial epidemics precipitated the fall of the
Golden Age of Athens, the Roman Empire and most of the empires of the Native Americans. The
internet can be our key to survival because the ability to work telepresently can inhibit microbial
transmission by reducing human-to-human contact. In the face of an otherwise devastating epidemic,
businesses can keep supply chains running with the maximum number of employees working from home.
This can reduce host density below the tipping point required for an epidemic. If we are well prepared
when an epidemic arrives, we can fluidly shift into a self-quarantined society in which microbes fail
due to host scarcity. Whatever the social ills of isolation, they are worse for the microbes than for us. The
internet will predict natural disasters We are witnessing the downfall of slow central control in the
media: news stories are increasingly becoming user-generated nets of up-to-the-minute information.
During the recent California wildfires, locals went to the TV stations to learn whether their
neighbourhoods were in danger. But the news stations appeared most concerned with the fate of celebrity
mansions, so Californians changed their tack: they uploaded geotagged mobile-phone pictures, updated
Facebook statuses and tweeted. The balance tipped: the internet carried news about the fire more
quickly and accurately than any news station could. In this grass-roots, decentralised scheme, there
were embedded reporters on every block, and the news shockwave kept ahead of the fire. This head start
could provide the extra hours that save us. If the Pompeiians had had the internet in 79AD, they could
have easily marched 10km to safety, well ahead of the pyroclastic flow from Mount Vesuvius. If the
Indian Ocean had the Pacific’s networked tsunami-warning system, South-East Asia would look
quite different today. Discoveries are retained and shared Historically, critical information has
required constant rediscovery. Collections of learning -- from the library at Alexandria to the entire
Minoan civilisation -- have fallen to the bonfires of invaders or the wrecking ball of natural disaster.
Knowledge is hard won but easily lost. And information that survives often does not spread. Consider
smallpox inoculation: this was under way in India, China and Africa centuries before it made its way to
Europe. By the time the idea reached North America, native civilisations who needed it had already
collapsed. The net solved the problem. New discoveries catch on immediately; information spreads
widely. In this way, societies can optimally ratchet up, using the latest bricks of knowledge in their
fortification against risk. Tyranny is mitigated Censorship of ideas was a familiar spectre in the last
century, with state-approved news outlets ruling the press, airwaves and copying machines in the USSR,
Romania, Cuba, China, Iraq and elsewhere. In many cases, such as Lysenko’s agricultural despotism in
the USSR, it directly contributed to the collapse of the nation. Historically, a more successful
strategy has been to confront free speech with free speech -- and the internet allows this in a natural
way. It democratises the flow of information by offering access to the newspapers of the world, the
photographers of every nation, the bloggers of every political stripe. Some posts are full of doctoring and
dishonesty whereas others strive for independence and impartiality -- but all are available to us to sift
through. Given the attempts by some governments to build firewalls, it’s clear that this benefit of the net
requires constant vigilance. Human capital is vastly increased Crowdsourcing brings people together
to solve problems. Yet far fewer than one per cent of the world’s population is involved. We need
expand human capital. Most of the world not have access to the education afforded a small minority. For
every Albert Einstein, Yo-Yo Ma or Barack Obama who has educational opportunities, uncountable
others do not. This squandering of talent translates into reduced economic output and a smaller pool of
problem solvers. The net opens the gates education to anyone with a computer. A motivated teen
anywhere on the planet can walk through the world’s knowledge -- from the webs of Wikipedia to the
curriculum of MIT’s OpenCourseWare. The new human capital will serve us well when we confront
existential threats we’ve never imagined before. Energy expenditure is reduced Societal collapse
can often be understood in terms of an energy budget: when energy spend outweighs energy return,
collapse ensues. This has taken the form of deforestation or soil erosion; currently, the worry involves
fossil-fuel depletion. The internet addresses the energy problem with a natural ease. Consider the
massive energy savings inherent in the shift from paper to electrons -- as seen in the transition from the
post to email. Ecommerce reduces the need to drive long distances to purchase products. Delivery
trucks are more eco-friendly than individuals driving around, not least because of tight packaging and
optimisation algorithms for driving routes. Of course, there are energy costs to the banks of computers
that underpin the internet -- but these costs are less than the wood, coal and oil that would be expended
for the same quantity of information flow. The tangle of events that triggers societal collapse can be
complex, and there are several threats the net does not address. But vast, networked communication
can be an antidote to several of the most deadly diseases threatening civilisation. The next time your
coworker laments internet addiction, the banality of tweeting or the decline of face-to-face conversation,
you may want to suggest that the net may just be the technology that saves us.
Surveillance causes internet fragmentation
NSA surveillance has placed us at the brink of online fragmentation, which risks
collapsing the whole internet system
Matthew Taylor, Nick Hopkins and Jemima Kiss November 1, 2013, “NSA surveillance may cause
breakup of internet, warn experts,” The Guardian, http://www.theguardian.com/world/2013/nov/01/nsasurveillance-cause-internet-breakup-edward-snowden, KEL
Daniel Castro, a senior analyst at the Information Technology & Innovation Foundation in Washington,
said the Snowden revelations were pushing the internet towards a tipping point with huge ramifications
for the way online communications worked. "We are certainly getting pushed towards this cliff and it is a
cliff we do not want to go over because if we go over it, I don't see how we stop. It is like a run on the
bank – the system we have now works unless everyone decides it doesn't work then the whole thing
collapses." Castro said that as the scale of the UK and US surveillance operations became apparent,
countries around the globe were considering laws that would attempt to keep data in-country, threatening
the cloud system – where data stored by US internet firms is accessible from anywhere in the world.
US internet surveillance causes other countries to demand data localization, which
will fragment the internet, destroy US tech firms, and undermine all faith in US tech
services, undermining overall US growth
Seth Rosenblatt, Oct 8, 2014, “US spying scandal will 'break the Internet,' says Google's Schmidt,”
CNET.com, http://www.cnet.com/news/us-spying-scandal-will-break-the-internet-says-googles-schmidt/,
KEL
Some of the international pushback is in response to data collection by tech companies, not the US
government. Europe's new and controversial "right to be forgotten" law, which says European citizens have a right to ask search engines to remove any results
that might infringe on their privacy, is causing headaches for Google. Critics contend that Google policies placed data collection
over privacy. The tech execs on the panel were most upset and scared about international efforts to impose
"data localization," as Microsoft's Smith put it, referring to a burgeoning efforts by countries to force companies to
build data centers based within their borders. The cost of building data centers in each country that a tech
firm wants to do business in could wind up destroying US tech firms, Schmidt and Smith warned. Schmidt called data
localization a "national emergency." Tech titans have yet to go in-depth as to the actual financial impact data localization has had on them, but in addition to the costs
data localization could also subject the data to local
laws in a way that tech firms worry would erode user trust -- and their ability to trade on that trust -- even
further. Smith noted that 96 percent of the world does not live in the US, and that the American tech economy
depends on convincing them that American tech services are trustworthy. "Foreign data centers would
compromise American [economic] growth" and leadership, he said.
of having to build at least one separate data center for each country that demanded it,
Cyber Security Add-on
2AC Add-on Module
U.S. government attacks on encryption destroy cybersecurity.
Open Letter 15 — An Open Letter to President Obama co-signed by 36 civil society organizations
(including the American Civil Liberties Union, Electronic Frontier Foundation, Electronic Privacy
Information Center, and the Free Software Foundation), 48 technology companies and trade associations
(including Apple, Facebook, Google, Microsoft, and Yahoo), and 58 security and policy experts
(including Jacob Applebaum, Eric Burger, Joan Feigenbaum, and Bruce Schneier), the full list of
signatories is available upon request under the “FYI: Open Letter To Obama” header, 2015 (Open Letter
to Obama, May 19th, Available Online at https://static.newamerica.org/attachments/3138-113/Encryption_Letter_to_Obama_final_051915.pdf, Accessed 06-29-2015, p. 1)
Strong encryption is the cornerstone of the modern information economy’s security. Encryption protects
billions of people every day against countless threats—be they street criminals trying to steal our phones and laptops,
computer criminals trying to defraud us, corporate spies trying to obtain our companies’ most valuable trade secrets, repressive
governments trying to stifle dissent, or foreign intelligence agencies trying to compromise our and our allies’ most sensitive national security
secrets. Encryption thereby protects us from innumerable criminal and national security threats. This
protection would be undermined by the mandatory insertion of any new vulnerabilities into encrypted
devices and services. Whether you call them “front doors” or “back doors”, introducing intentional vulnerabilities into secure
products for the government’s use will make those products less secure against other attackers. Every
computer security expert that has spoken publicly on this issue agrees on this point, including the
government’s own experts .
Cyber attacks are frequent and devastating. Every attack increases the risk of
existential catastrophe.
Nolan 15 — Andrew Nolan, Legislative Attorney at the Congressional Research Service, former Trial
Attorney at the United States Department of Justice, holds a J.D. from George Washington University,
2015 (“Cybersecurity and Information Sharing: Legal Challenges and Solutions,” CRS Report to
Congress, March 16th, Available Online at http://fas.org/sgp/crs/intel/R43941.pdf, Accessed 07-05-2015,
p. 1-3)
Introduction
Over the course of the last year, a host of cyberattacks1 have been perpetrated on a number of high profile
American companies. In January 2014, Target announced that hackers, using malware,2 had digitally
impersonated one of the retail giant’s contractors,3 stealing vast amounts of data—including the names, mailing
addresses, phone numbers or email addresses for up to 70 million individuals and the credit card information of 40 million shoppers.4 Cyberattacks in
February and March of 2014 potentially exposed contact and log-in information of eBay’s customers,
prompting the online retailer to ask its more than 200 million users to change their passwords. 5 In September, it was revealed that over the
course of five months cyber-criminals tried to steal the credit card information of more than fifty million
shoppers of the world’s largest home improvement retailer, Home Depot.6 One month later, J.P. Morgan Chase, the largest
U.S. bank by assets, disclosed that contact information for about 76 million households was captured in a
cyberattack earlier in the year.7 In perhaps the most infamous cyberattack of 2014, in late November, Sony Pictures
Entertainment suffered a “significant system disruption” as a result of a “brazen cyber attack”8 that resulted in
the leaking of the personal details of thousands of Sony employees.9 And in February of 2015, the health
care provider Anthem Blue Cross Blue Shield [end page 1] disclosed that a “very sophisticated attack”
obtained personal information relating to the company’s customers and employees.10 The high profile
cyberattacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and
ferocity of cyberattacks are increasing,11 posing grave threats to the national interests of the U nited
S tates. Indeed, the attacks on Target, eBay, Home Depot, J.P. Morgan-Chase, Sony Pictures, and Anthem
were only a few of the many publicly disclosed cyberattacks perpetrated in 2014 and 2105.12 Experts suggest that
hundreds of thousands of other entities may have suffered similar incidents during the same period,13 with
one survey indicating that 43% of firms in the United States had experienced a data breach in the past year.14
Moreover, just as the cyberattacks of 2013—which included incidents involving companies like the New
York Times, Facebook, Twitter, Apple, and Microsoft15—were eclipsed by those that occurred in 2014,16
the consensus view is that 2015 and beyond will witness more frequent and more sophisticated cyber
incidents.17 To the extent that its expected rise outpaces any corresponding rise in the ability to defend
against such attacks, the result could be troubling news for countless businesses that rely more and more
on computers in all aspects of their operations, as the economic losses resulting from a single cyberattack
can be extremely costly .18 And the resulting effects of a cyberattack can have effects beyond a single
company’s bottom line. As “nations are becoming ever more dependent on information and information
technology,”19 the threat posed by any one cyberattack [end page 2] can have “devastating collateral and
cascading effects across a wide range of physical, economic and social systems.”20 With reports that
foreign nations—such as Russia, China, Iran, and North Korea—may be using cyberspace as a new front
to wage war,21 fears abound that a cyberattack could be used to shut down the nation’s electrical grid,22
hijack a commercial airliner,23 or even launch a nuclear weapon with a single keystroke .24 In short,
the potential exists that the United States could suffer a “cyber Pearl Harbor,” an attack that would “cause
physical destruction and loss of life”25 and expose—in the words of one prominent cybersecurity expert—“vulnerabilities
of staggering proportions.”26
Cyber Security Extensions
Cybersecurity outweighs terrorism.
CSM 14 — Christian Science Monitor, 2014 (“Feds hacked: Is cybersecurity a bigger threat than
terrorism?,” Byline Harry Bruinius, November 10th, Available Online at
http://www.csmonitor.com/USA/2014/1110/Feds-hacked-Is-cybersecurity-a-bigger-threat-than-terrorismvideo, Accessed 07-06-2015)
While the terrestrial fears of terrorism and Ebola have dominated headlines, American leaders are fretting about
what may be even more serious virtual threats to the nation’s security. This year, hundreds of millions of
private records have been exposed in an unprecedented number of cyberattacks on both US businesses
and the federal government. On Monday, just as President Obama arrived in Beijing to being a week-long summit with regional leaders, Chinese
hackers are suspected to have breached the computer networks of the US Postal Service, leaving the personal data of more than 800,00 employees and customers
compromised, The Washington Post reports. The data breach, which began as far back as January and lasted through mid-August, potentially exposed 500,000 postal
employees’ most sensitive personal information, including names, dates of birth, and Social Security numbers, the Postal Service said in a statement Monday. The
data of customers who used the Postal Service’s call center from January to August may have also been exposed. "The FBI is working with the United States Postal
Service to determine the nature and scope of this incident," the federal law enforcement agency said in a statement Monday. Neither the FBI nor the Postal Service,
however, confirmed it was the work of Chinese hackers. The breach did not expose customer payment or credit card information, the Postal Service said, but hackers
did gain access to its computer networks at least as far back as January. The FBI informed the Postal Service of the hack in mid-September. “It is an unfortunate fact
of life these days that every organization connected to the Internet is a constant target for cyber intrusion activity,”
said Postmaster General Patrick Donahoe in a statement. “The United States Postal Service is no different. Fortunately, we have seen no evidence of malicious use of
both
intelligence officials and cybersecurity experts say computer hackers now pose a greater threat to
national security than terrorists . Since 2006, cyber-intruders have gained access to the private data of nearly 90 million people in federal
the compromised data and we are taking steps to help our employees protect against any potential misuse of their data.” But the reported breach comes as
networks, the Associated Press reported in a major investigation published Monday. Hackers have also accessed 255 million customer records in retail networks
during this time, 212 million customer records in financial and insurance industry servers, as well as 13 million records of those in educational institutions, the AP
reported. “The
increasing number of cyber-attacks in both the public and private sectors is unprecedented and
poses a clear and present danger to our nation’s security,” wrote Rep. Elijah Cummings (D) of Maryland, ranking member of the
House Committee on Oversight and Government Reform, in a letter to Postmaster General Donahoe on Monday.
Only strong encryption can preserve cybersecurity.
Kehl et al. 15 — Danielle Kehl, Senior Policy Analyst at the Open Technology Institute at the New
America Foundation, holds a B.A. in History from Yale University, with Andi Wilson, Policy Program
Associate at the Open Technology Institute at the New America Foundation, holds a Master of Global
Affairs degree from the Munk School at the University of Toronto, and Kevin Bankston, Policy Director
at the Open Technology Institute at the New America Foundation, former Senior Counsel and Director of
the Free Expression Project at the Center for Democracy & Technology, former Senior Staff Attorney at
the Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow at the
American Civil Liberties Union, holds a J.D. from the University of Southern California Law School,
2015 (“Doomed To Repeat History? Lessons From The Crypto Wars of the 1990s,” Report by the Open
Technology Institute at the New America Foundation, June, Available Online at
https://static.newamerica.org/attachments/3407-125/Lessons%20From%20the%20Crypto%20Wars%20of%20the%201990s.882d6156dc194187a5fa51b1
4d55234f.pdf, Accessed 07-06-2015, p. 19)
Strong Encryption Has Become A Bedrock Technology That Protects The Security Of The Internet The
evolution of the ecosystem for encrypted communications has also enhanced the protection of individual
communications and improved cybersecurity. Today, strong encryption is an essential ingredient in the
overall security of the modern network, and adopting technologies like HTTPS is increasingly considered an industry best-practice among major
the report of the President’s Review Group on Intelligence and Communications
Technologies, the panel of experts appointed by President Barack Obama to review the NSA’s surveillance
activities after the 2013 Snowden leaks, was unequivocal in its emphasis on the importance of strong encryption to
protect data in transit and at rest. The Review Group wrote that: Encryption is an essential basis for trust
on the Internet; without such trust, valuable communications would not be possible. For the entire
system to work, encryption software itself must be trustworthy. Users of encryption must be confident, and
justifiably confident, that only those people they designate can decrypt their data…. Indeed, in light of the
massive increase in cyber-crime and intellectual property theft on-line, the use of encryption should be
greatly expanded to protect not only data in transit, but also data at rest on networks, in storage, and in the
cloud.178 The report further recommended that the U.S. government should: Promote security[] by (1) fully
supporting and not undermining efforts to create encryption standards; (2) making clear that it will not
in any way subvert, undermine, weaken, or make vulnerable generally available commercial encryption;
and (3) supporting efforts to encourage the greater use of encryption technology for data in transit, at rest,
in the cloud, and in storage.179
technology companies.177 Even
Surveillance State Critical Advantage
1AC Advantage
Programs like PRISM are the epitome of the modern security state. The worse effect
of this state is to normalize society to accept neoliberal surveillance and capitalist
commodification of all aspects of life.
Henry A. Giroux, June 30, 2015, McMaster University Chair for Scholarship in the Public Interest in
the English and Cultural Studies Department and the Paulo Freire Chair in Critical Pedagogy at The
McMaster Institute for Innovation & Excellence in Teaching & Learning. He also is a Distinguished
Visiting Professor at Ryerson University, “Orwell, Huxley and the Scourge of the Surveillance State,”
Truth-out, http://www.truth-out.org/news/item/31639-orwell-huxley-and-the-scourge-of-the-surveillancestate2, KEL
In this instance,
the surveillance state is one that not only listens, watches and gathers massive amounts of
information through data mining, allegedly for the purpose of identifying "security threats." It also
acculturates the public into accepting the intrusion of commercial surveillance technologies - and, perhaps
more vitally, the acceptance of privatized, commodified values - into all aspects of their lives. In other words,
the most dangerous repercussions of a near total loss of privacy involve more than the unwarranted
collecting of information by the government: We must also be attentive to the ways in which being spied
on has become not only normalized, but even enticing, as corporations up the pleasure quotient for
consumers who use new digital technologies and social networks - not least of all by and for simulating experiences of
community. Many individuals, especially young people, now run from privacy and increasingly demand services in which they can share every personal facet of their
lives. While Orwell's vision touches upon this type of control, there is a notable difference that he did not foresee. According to Pete Cashmore, while Orwell's
"Thought Police tracked you without permission, some consumers are now comfortable with sharing their every move online." (17 )
The state and
corporate cultural apparatuses now collude to socialize everyone - especially young people - into a regime
of security and commodification in which their identities, values and desires are inextricably tied to a
culture of commodified addictions, self-help, therapy and social indifference. Intelligence networks now inhabit the
world of major corporations such as Disney and Bank of America as well as the secret domains of the NSA, FBI and 15 other intelligence agencies. As Edward
Snowden's revelations about the PRISM program revealed, the NSA has also collected personal data
from many of the world's largest internet companies, including Apple, Google, Yahoo and Facebook. According to a senior lawyer for
the NSA, the internet companies "were fully aware of the surveillance agency's widespread collection of data." (18) The fact is that Orwell's and
Huxley's ironic representations of the modern totalitarian state - along with their implied defense of a democratic ideal
rooted in the right to privacy and the right to be educated in the capacity to be autonomous and critical thinkers - have been transformed and
mutilated almost beyond recognition by the material and ideological registers of a worldwide
neoliberal order . Just as we can envision Orwell's and Huxley's dystopian fables morphing over time from "realistic novels" into a "real life documentary,"
and now into a form of "reality TV," privacy and freedom have been radically altered in an age of permanent, nonstop global exchange and circulation. That is, in
the current moment, the right to privacy and freedom has been usurped by the seductions of a narcissistic
culture and casino capitalism's unending desire to turn every relationship into an act of commerce and to
make all aspects of daily life subject to market forces under watchful eyes of both government and
corporate regimes of surveillance.
The Status Quo Surveillance State crushes domestic dissent and militarizes
everyday life in the name of increased security versus terrorism. The problem is not
so much the loss of privacy but the lack of concern about federal authority to claim
the power to intrude into our lives. This destroys any value to justice and freedom.
Our politics must resist the authority of such surveillance to revive any meaningful
sense of progressive democracy.
Henry A. Giroux, June 30, 2015, McMaster University Chair for Scholarship in the Public Interest in
the English and Cultural Studies Department and the Paulo Freire Chair in Critical Pedagogy at The
McMaster Institute for Innovation & Excellence in Teaching & Learning. He also is a Distinguished
Visiting Professor at Ryerson University, “Orwell, Huxley and the Scourge of the Surveillance State,”
Truth-out, http://www.truth-out.org/news/item/31639-orwell-huxley-and-the-scourge-of-the-surveillancestate2, KEL
By integrating insights drawn from both Huxley and Orwell, it becomes necessary for any viable critical analysis to take a long view, contextualizing the
contemporary moment as a new historical conjuncture in which political rule has been replaced by corporate sovereignty, consumerism becomes the only obligation of
citizenship, and the only value that matters is exchange value. Precarity has replaced social protections provided by the state, just as the state cares more about
The United
States is not just dancing into oblivion as Huxley suggested; it is also being pushed into the dark recesses of an
authoritarian state. Orwell wrote dystopian novels but he believed that the sheer goodness of human nature would in the end be enough for individuals
building prisons and infantilizing the US public than it does about providing all of its citizens with quality educational institutions and health care.
to develop modes of collective resistance that he could only imagine in the midst of the haunting specter of totalitarianism. Huxley was more indebted to Kafka's
notion of destabilization, despair and hopelessness. For Huxley, the subject had lost his or her sense of agency and had become the product of a scientifically
manufactured form of idiocy and conformity. Progress had been transformed into its opposite, and science needed to be liberated from itself. As Theodor Adorno has
pointed out, where Huxley fails is that he has no sense of resistance. According to Adorno, "The weakness of Huxley's entire conception is that it makes all its
concepts relentlessly dynamic but nevertheless arms them against the tendency to turn into their own opposites." (27) Hence, the forces of resistance are not simply
underestimated but rendered impotent. The
authoritarian nature of the corporate-state surveillance apparatus and
security system with its "urge to surveil, eavesdrop on, spy on, monitor, record, and save every
communication of any sort on the planet" (28) can only be fully understood when its ubiquitous tentacles are
connected to wider cultures of control and punishment, including security-patrolled corridors of public schools, the rise in
supermax prisons, the hypermilitarization of local police forces, the justification of secret prisons and state-sanctioned torture abroad, and the increasing
labeling of dissent as an act of terrorism in the United States. (29) This is part of Orwell's narrative, but it does not go far enough. The
new authoritarian, corporate-driven state deploys more subtle tactics to depoliticize public memory and
promote the militarization of everyday life. Alongside efforts to defund public and higher education and to attack the welfare state, a wideranging assault is being waged across the culture on all spheres that encourage the public to hold power accountable. If these public institutions are destroyed, there
will be few sites left in which to nurture the critical formative cultures capable of educating people to challenge the range of injustices plaguing the United States and
the forces that reproduce them. One
particular challenge comes from the success of neoliberal tyranny to dissolve
those social bonds that entail a sense of responsibility toward others and form the basis for political
consciousness. Under the new authoritarian state, perhaps the gravest threat one faces is not simply being
subject to the dictates of what Quentin Skinner calls "arbitrary power," but failing to respond with outrage when "my
liberty is also being violated, and not merely by the fact that someone is reading my emails but also by
the fact that someone has the power to do so should they choose." (30) The situation is dire when
people no longer seem interested in contesting such power. It is precisely the poisonous spread of a
broad culture of political indifference that puts at risk the fundamental principles of justice and
freedom, which lie at the heart of a robust democracy . The democratic imagination has been transformed into a data machine that
marshals its inhabitants into the neoliberal dream world of babbling consumers and armies of exploitative labor whose ultimate goal is to accumulate capital and
initiate individuals into the brave new surveillance-punishing state that merges Orwell's Big Brother with Huxley's mind-altering soma. Nothing
will
change unless people begin to take seriously the subjective underpinnings of oppression in the United States
and what it might require to make such issues meaningful in order to make them critical and
transformative. As Charles Derber has explained, knowing "how to express possibilities and convey them authentically and persuasively seems crucially
important" (31) if any viable notion of resistance is to take place. The current regime of authoritarianism is reinforced through a
new and pervasive sensibility in which people surrender themselves to both the capitalist system and a
general belief in its call for security. It does not simply repress independent thought, but constitutes new modes of thinking through a diverse set
of cultural apparatuses ranging from the schools and media to the internet. The fundamental question in resisting the transformation
of the United States into a 21st century authoritarian society must concern the educative nature of politics that is, what people believe and how their individual and collective dispositions and capacities to be either
willing or resistant agents are shaped.
The belief that NSA online surveillance is necessary to protect us establishes this
kind of intrusive surveillance as the governing norm that controls our freedom and
lives. We self-regulate and self-sacrifice our all our freedom and the value of a
liberal democratic society through this disciplinary logic of power.
Zack Beauchamp June 7, 2013, “Why The NSA’s Secret Online Surveillance Should Scare You,”
Think Progress, http://thinkprogress.org/justice/2013/06/07/2120141/why-the-nsas-secret-onlinesurveillance-should-scare-you/
The reaction to the National Security Agency (NSA)’s secret online spying program, PRISM, has been polarized between seething
outrage and some variant on “what did you expect?” Some have gone so far as to say this program helps open the door to fascism, while others have downplayed it as in line with
the way that we already let corporations get ahold of our personal data. That second reaction illustrates precisely why this program is so troubling.
The more we accept perpetual government and corporate surveillance as the norm, the more we change
our actions and behavior to fit that expectation — subtly but inexorably corrupting the liberal ideal that
each person should be free to live life as they choose without fear of anyone else interfering with it .
Put differently, George Orwell isn’t who you should be reading to understand the dangers inherent to the NSA’s
dragnet. You’d be better off turning to famous French social theorist Michel Foucault. The basic concern with the PRISM program is that it is undoubtedly collecting
information on significant numbers of Americans, in secret, who may not have any real connection to the case the Agency is pursuing. PRISM sifts through tech giants’ databases to cull information about suspected national security
threats. However, since it uses a 51 percent confidence threshold for determining whether a target is foreign, and likely extends to individuals that are “two degrees of separation” from the original target, the chances are
A citizenry that’s constantly on guard for secret,
unaccountable surveillance is one that’s constantly being remade along the lines the state would
prefer . Foucault illustrated this point by reference to a hypothetical prison called the Panopticon. Designed by
utilitarian philosopher Jeremy Bentham, the Panopticon is a prison where all cells can be seen from a central tower shielded
such that the guards can see out but the prisoners can’t see in. The prisoners in the Panopticon could thus
never know whether they were being surveilled, meaning that they have to, if they want to avoid running
the risk of severe punishment, assume that they were being watched at all times. Thus, the Panopticon
functioned as an effective tool of social control even when it wasn’t being staffed by a single guard. In his famous Discipline and Punish, Foucault argues that we live in a
world where the state exercises power in the same fashion as the Panopticon’s guards. Foucault called it “disciplinary power;” the basic idea is that the
omnipresent fear of being watched by the state or judged according to prevailing social norms caused
people to adjust the way they acted and even thought without ever actually punished. People had become
“self-regulating” agents, people who “voluntarily” changed who they were to fit social and political
expectations without any need for actual coercion. Online privacy advocates have long worried that government surveillance programs could end up disciplining internet
extraordinarily high that this program is spying on a significant number of Americans.
users in precisely this fashion. In 1997, the FBI began using something called Project Carnivore, an online surveillance data tool designed to mimic traditional wiretaps, but for email. However, because online information is not like a
phone number in several basic senses, Carnivore ended up capturing far more information than it was intended to. It also had virtually no oversight outside of the FBI. As the Electronic Frontier Foundation told Congress in 2000,
“Systems like Carnivore have the potential to turn into mass surveillance systems that will harm our free and open society…Once individuals realize that they have a lowered expectation of privacy on the Net, they may not visit
particular web sites that they may otherwise have visited.” Writing in 2004, a group of scholars drew a straight line from this analysis to Foucault’s theory of disciplinary power. “Resembling the ever-present powers of the central
watchtower in a prison modeled after the Panopticon,” they wrote “the very fact that the FBI has the potential to monitor communications on a website may lead Internet users to believe that they are constantly being watched.” We
The more people come to see mass online surveillance as
a norm, rather than something used only on specific subjects of investigation, the more they’ll tailor their
online habits to it. Since people understandably don’t want the government looking at their private
information, that’ll mean the internet will over time slowly become less of a place for vibrant selfexpression. That should trouble anyone who believes that the best society is one in which people are
most free to be themselves in whatever way they find most meaningful . In essence, that should trouble anyone committed to the basic
know now that this hypothetical fear about Carnivore has become a reality, courtesy of the NSA.
liberal project. Foucault’s point wasn’t that disciplinary power was intrinsically bad; the idea that, for example, pedophiles might be deterred from accessing child pornography for fear of state surveillance of child porn sites shouldn’t
Foucault warned, disciplinary power was dangerous — used in certain fashions, it could
be subtly corrosive of exactly the sorts of freedoms of expression and self-identity that liberal
democracies purportedly protected absolutely . The NSA program, especially as its breadth
becomes clear, is exactly the sort of overreach his work should warn us against.
bother anyone. Rather,
Surveillance’s panoptic discipline leads to passivity and no resistance to increased
oppression and a total loss of freedom. SQ social movements and resistance cannot
succeed without our advocacy. You should be skeptical of all the negative arguments
because the security power/knowledge system asserts “truth” about national
security threats to rationalize its all-pervading surveillance techniques.
Ray Pensador Sept 11, 2013, “The Surveillance State As Foucault's Panopticon,” Daily Kos,
http://www.dailykos.com/story/2013/09/11/1238013/-The-Surveillance-State-As-Foucault-s-Panopticon,
KEL
Another relevant/related observation I've been intrigued with is what I consider to be an eerie passivity with which the population reacts in the face of increasing
corporate-government corruption, criminality, and oppression. Also, the utter inability for any type of social justice movement to take hold so it can grow and become
powerful (organized, strategic, and cohesive) enough to be able to effect change, has been something I've been observing and thinking about for many years now. I've
always felt that there
must be a logical explanation for this seemingly illogical docility exhibited by the
population in the face of increasingly outrageous abuses and rampant government corruption. I think that
Foucault's Panopticon metaphor offers that explanation... The Panopticon was a metaphor that allowed Foucault to explore the
relationship between 1.) systems of social control and people in a disciplinary situation and, 2.) the power-knowledge concept. In his view, power and
knowledge comes from observing others. It marked the transition to a disciplinary power, with every
movement supervised and all events recorded. The result of this surveillance is acceptance of regulations
and docility - a normalization of sorts, stemming from the threat of discipline. Suitable behaviour is
achieved not through total surveillance, but by panoptic discipline and inducing a population to
conform by the internalization of this reality . The actions of the observer are based upon this monitoring and the behaviours he sees
exhibited; the more one observes, the more powerful one becomes. The power comes from the knowledge the observer has
accumulated from his observations of actions in a circular fashion, with knowledge and power reinforcing
each other. Foucault says that "by being combined and generalized, they attained a level at which the formation of knowledge and the increase in power
regularly reinforce one another in a circular process" (Foucault 1977). The emphasis is mine I think this metaphor, this concept, applies perfectly to
the current situation regarding the illegal and unconstitutional spying by the corporate-controlled NSA. Here's how
Heidi Boghosian, executive director of the National Lawyers Guild, and author of "Spying on Democracy" sees it: This book ["Spying on Democracy"] documents the
way relentless
surveillance makes people in the United States less free. As government agencies shift from
investigating criminal activity to preempting it, they have forged close relationships with corporations
honing surveillance and intelligence-gathering techniques for use against Americans. By claiming that
anyone who questions authority or engages in undesired political speech is a potential terrorist threat, this
government-corporate partnership makes a mockery of civil liberties. The examples in these pages show how a free
press, our legal system, activists, and other pillars of a democratic society—and even children—suffer as a
consequence. As the assault by an alignment of consumer marketing and militarized policing grows, each single act of individual
expression or resistance assumes greater importance . As individuals and communities, we need to
dismantle this system if we are to restore and protect our civil liberties. Now, I argue that what makes this
corporate-controlled total information awareness surveillance apparatus so pernicious, so dangerous,
so Orwellian, is the fact that once combined with the effects of a propagandist media ("Research Study
Explains How U.S. Media Brainwashes The Public"), and a security apparatus that actively engages in disrupting the
formation of viable social justice movements, what we end up with is a totally paralyzed population, incapable
of reacting to the increased oppression from the ruling elite, as it has done throughout the entire history of this country ("A People's
History of The United States").
We outline two impacts to Surveillance State:
First, the biopolitical desire to protect us all from both internal and external threats
produces continuous violence and eventual extinction in the name of the greater
good
Foucault 1978 Michel, esteemed French philosopher, The History of Sexuality, Volume I: An
Introduction, trans. Robert Hurley, 1978, p. 136-137
Since the classical age the West has undergone a very profound transformation of these mechanisms of power. "Deduction" has tended to be no longer the major form
of power but merely one element among others, working to incite, reinforce, control, monitor, optimize, and organize the forces under it: a power bent on generating
forces, making them grow, and ordering them, rather than one dedicated to impeding them, making them submit, or destroying them. There has been a parallel shift in
the right of death, or at least a tendency to align itself with the exigencies of a life-administering power and to define itself accordingly. This death that was based on
the right of the sovereign is now manifested as simply the reverse of the right of the social body to ensure, maintain, or develop its life. Yet wars
were never
as bloody as they have been since the nineteenth century, and all things being equal, never before did regimes visit
such holocausts on their own populations. But this formidable power of death -and this is perhaps what accounts for part of its force and the
cynicism with which it has so greatly expanded its limits -now presents itself as the counterpart of a power that exerts a positive influence on life, that endeavors to
administer, optimize, and multiply it, subjecting it to precise controls and comprehensive regulations. Wars
are no longer waged in the name of
a sovereign who must be defended; they are waged on behalf of the existence of everyone; entire
populations are mobilized for the purpose of wholesale slaughter in the name of life necessity: massacres
have become vital. It is as managers of life and survival, of bodies and the race, that so many regimes
have been able to wage so many wars, causing so many men to be killed. And through a turn that closes the circle, as the technology
of wars has caused them to tend increasingly toward all-out destruction, the decision that initiates them
and the one that terminates them are in fact increasingly informed by the naked question of survival. The atomic
situation is now at the end point of this process: the power to expose a whole population to death is the
underside of the power to guarantee an individual's continued existence. The principle underlying the tactics of battle that one
has to be capable of killing in order to go on living-has become the principle that defines the strategy of states. But the existence in question is no
longer the juridical existence of sovereignty; at stake is the biological existence of a population. If
genocide is indeed the dream of modern powers, this is not because of a recent return of the ancient right to kill; it is because
power is situated and exercised at the level of life, the species, the race, and the large-scale phenomena of population.
Second, the monitoring and destruction of the Other to ensure to smooth operation
of neoliberalism makes the entire world disposable in the name of utilitarianism this justifies endless destruction, culminating in extinction – all their impacts are
non-unique in a world of biopower and neoliberalism.
Santos 3 - Professor of Sociology, University of Coimbra; Distinguished Legal Scholar at the
University of Wisconsin-Madison; LL.M and J.S.D. from Yale University (Boaventura, Collective
Suicide?, Bad Subjects, Issue # 63, April 2003)
the West has repeatedly been under the illusion that it should try to save humanity by
destroying part of it. This is a salvific and sacrificial destruction, committed in the name of the need to radically materialize all the
possibilities opened up by a given social and political reality over which it is supposed to have total power. This is how it was in colonialism, with the genocide of
indigenous peoples, and the African slaves. This is how it was in the period of imperialist struggles, which caused millions of deaths in
two world wars and many other colonial wars. This is how it was under Stalinism, with the Gulag, and under Nazism, with the
Holocaust. And now today, this is how it is in neoliberalism, with the collective sacrifice of the periphery and
even the semiperiphery of the world system. With the war against Iraq, it is fitting to ask whether what is in progress is a new genocidal and sacrificial
illusion, and what its scope might be. It is above all appropriate to ask if the new illusion will not herald the radicalization and the ultimate perversion of the
Western illusion: destroying all of humanity in the illusion of saving it. Sacrificial genocide arises from a totalitarian illusion manifested
According to Franz Hinkelammert,
in the belief that there are no alternatives to the present-day reality, and that the problems and difficulties confronting it arise from failing to take its logic of development to ult imate
consequences. If there is unemployment, hunger and death in the Third World, this is not the result of market failures; instead, it is the outcome of market laws not having been fully applied. If
terrorism, this is not due to the violence of the conditions that generate it; it is due, rather, to the fact that total violence has not been employed to physically
eradicate all terrorists and potential terrorists. This political logic is based on the supposition of total power and knowledge, and on the
radical rejection of alternatives; it is ultra-conservative in that it aims to reproduce infinitely the status quo. Inherent to
there is
it is the notion of the end of history. During the last hundred years, the West has experienced three versions of this logic, and, therefore, seen three versions of the end of history:
Stalinism, with its logic of insuperable efficiency of the plan; Nazism, with its logic of racial superiority; and neoliberalism, with its logic of insuperable efficiency of
the market. The first two periods involved the destruction of democracy. The last one trivializes democracy, disarming it in the face of social actors sufficiently powerful to be
able to privatize the state and international institutions in their favor. I have described this situation as a combination of political democracy and social fascism. One current manifestation of this
combination resides in the fact that intensely strong public opinion, worldwide, against the war is found to be incapable of halting the war machine set in motion by supposedly democratic rulers.
a death drive, a catastrophic heroism, predominates, the idea of a looming collective
suicide, only preventable by the massive destruction of the other . Paradoxically, the broader the definition of the other and the
efficacy of its destruction, the more likely collective suicide becomes. In its sacrificial genocide version, neoliberalism is a mixture of market
radicalization, neoconservatism and Christian fundamentalism. Its death drive takes a number of forms, from the idea of
"discardable populations", referring to citizens of the Third World not capable of being exploited as workers and consumers, to the concept of "collateral damage", to refer
At all these moments,
to the deaths, as a result of war, of thousands of innocent civilians. The last, catastrophic heroism, is quite clear on two facts: according to reliable calculations by the Non-Governmental
Organization MEDACT, in London, between 48 and 260 thousand civilians will die during the war and in the three months after (this is without there being civil war or a nuclear attack); the war
will cost 100 billion dollars, enough to pay the health costs of the world's poorest countries for four years. Is it possible to fight this death drive? We must bear in mind that, historically,
sacrificial destruction has always been linked to the economic pillage of natural resources and the labor
force, to the imperial design of radically changing the terms of economic, social, political and cultural exchanges in the face of falling efficiency rates postulated by the maximalist logic of
the totalitarian illusion in operation. It is as though hegemonic powers, both when they are on the rise and when they are in decline, repeatedly go through times of primitive accumulation,
legitimizing the most shameful violence in the name of futures where, by definition, there is no room for what must be destroyed. In today's version, the period
of primitive accumulation consists of combining neoliberal economic globalization with the globalization of war . The machine of
democracy and liberty turns into a machine of horror and destruction. In opposition to this, there is the ongoing movement of globalization from below, the
global struggle for social justice, led by social movements and NGOs, of which the World Social Forum (WSF) has been an eloquent manifestation. The WSF has been a remarkable affirmation
of life, in its widest and most inclusive sense, embracing human beings and nature. What challenges does it face before the increasingly intimate interpenetration of the globalization of the
economy and that of war? I am convinced that this new situation forces the globalization from below to re-think itself, and to reshape its priorities. It is well-known that the WSF, at its second
meeting, in 2002, identified the relationship between economic neoliberalism and imperial warmongering, which is why it organized the World Peace Forum, the second edition of which took
place in 2003. But this is not enough. A strategic shift is required. Social movements, no matter what their spheres of struggle, must give priority to the fight for peace, as a necessary condition
for the success of all the other struggles. This means that they must be in the frontline of the fight for peace, and not simply leave this space to be occupied solely by peace movements. All the
movements against neoliberal globalization are, from now on, peace movements.
War)
We are now in the midst of the fourth world war (the third being the Cold
and the spiral of war will go on and on. The principle of non-violence that is contained in the WSF Charter of Principles must no longer be a demand made on the
,
movements; now it must be a global demand made by the movements. This emphasis is necessary so that, in current circumstances the celebration of life can be set against this vertiginous
collective suicide. The peace to be fought for is not a mere absence of war or of terrorism. It is rather a peace based upon the elimination of the conditions that foster war and terrorism: global
injustice, social exclusion, cultural and political discrimination and oppression and imperialist greed. A new, cosmopolitan humanism can be built above and beyond Western illuminist
abstractions, a humanism of real people based on the concrete resistance to the actual human suffering imposed by the real axis of evil: neoliberalism plus war.
We solve - The current surveillance-based knowledge/power system makes us
believe that we have limited options other than passively accepting our own
subjugation in the face of purported terrorist threats. Even if our plan doesn’t do
anything, we can use our 1AC knowledge as a form of power and resistance to form
solidarity against the surveillance police state.
Ray Pensador Sept 11, 2013, “The Surveillance State As Foucault's Panopticon,” Daily Kos,
http://www.dailykos.com/story/2013/09/11/1238013/-The-Surveillance-State-As-Foucault-s-Panopticon,
KEL
The conclusions that I draw from this situation is that, one, the constant propaganda bombardment we are
being exposed to 24/7 helps in conditioning us to accept a worldview where we only have a limited
number of (artificially-formulated) options; two, the fact that the corporate-government total
information surveillance apparatus is so vast and overreaching, it has the capacity to manipulate us
into remaining "docile" and malleable in the face of increasing oppression; three, we need to
understand the importance of being fully aware about exactly how the corporate-government system
is monitoring us, and the reason for that is, once again, because "knowledge is power." Here's how Ms. Mason saw
it: Can we mobilize counter-power to form a resistance against the pervasiveness of an increasingly
intrusive electronic society that is trying to manage the information it is tracking and collecting? Can we
wage our own battles and develop some strategies to help us retain a semblance of individual anonymity and privacy? Can we develop our own
system of power/knowledge as a form of resistance? Or should we just surrender to it? Surrender to the unseen power
that endeavours to control us from afar? Or should we continue to adapt and submissively, quietly accept the prevailing philosophy of an increasingly monitored
society? Or should we try to overcome? The emphasis is mine I argue that the
reason we can't seem to form a strong and united
peaceful resistance and social justice movements is because of the effects of Panopticism in combination
with an ongoing active campaign by the police state to prevent it, as we saw with the brutal suppression
(surveillance, infiltration, psychological warfare) of the Occupy Wall Street movement. Knowledge is power . We need to
understand the true nature of the system, so we can then start formulating the right solutions ; if we are
being manipulated, then we need to fully understand exactly how that's happening; we need to know exactly how the corporate-government apparatus is illegally and
we need to unite in solidarity (unions, social justice
and formulate strategies to dismantled the Oligarchy, and the surveillance
unconstitutionally monitoring us with the total information awareness surveillance state;
activists, progressive groups, etc.)
police state .
Surveillance key to Neoliberalism
Norm spreads throughout society – controlling and normalizing individuals. Social
control of individuals for the purpose of smooth operation of neoliberal order.
Holly Ventura, J. Mitchell Miller & Mathieu Deflem 2005, Ventura is Assist Prof of criminal
justice at U Texas-San Antonio, Miller is Deflem is professor of sociology at South Carolina,
“Governmentality and the War on Terror: FBI Project Carnivore and the Diffusion of Disciplinary
Power,” Critical Criminology 13(1): 55-70, http://deflem.blogspot.com/2009/08/governmentality-andwar-on-terror-fbi.html, KEL
From a more analytically informed perspective, we argue, the Carnivore program presents an instance of the evolving rationality of social control that Michel Foucault
(1977, 1981, 1991) has described as governmentality. In Discipline and Punish (1977), Foucault
developed the theory that the
disciplinary effects of power, which had originally been developed in prison, gradually spread
throughout society in all kinds of manifestations aimed at correcting and normalizing individuals .
Aimed at producing docile bodies in a society’s population, disciplinary power moves beyond the walls of the prison “right down into the depths of society,.... down
to the finest grain of the social body” (Foucault 1977:27, 80). Thus, discipline
steadily grows and expands to become a “whole
complex mechanism, embracing the development of production, the increase in wealth, a higher juridical
and moral value placed on property relations, stricter methods of surveillance, a tighter portioning of the
population, more efficient techniques of locating and obtaining information” (p. 77). The perspective of
governmentality explains the diffusion of disciplinary power as the result of a transformation of power from a negatively oriented
concept (to forbid) towards a positive notion of power that centers on the members of a population in all aspects of
their behavior (Foucault, 1980, 1981, 1991; see also Deflem, 1997; Gordon, 1991). Dating back to political thought of the 16th century,
governmental power extends to the current phase of neo-liberal mechanisms of social control by
centering on each and every thought and action of any and all people as the building blocks of law and
order. Social control is not merely crime control (literally: the control of criminals), but extends to an entire
population and its potential relevance to positively or negatively affect the security of the nation .
Thus, a whole series of knowledge systems is developed (e.g., traditional criminology as criminal justice administration) and a sophisticated apparatus of strategies
and tools is devised and implemented to foster the development of this power-knowledge.
Surveillance = disciplinary power
Disciplinary power is a perfect model in order to under the effect of online
surveillance. This type of social control extends beyond its law-enforcement or
intelligence purposes throughout society to constitute all of us as criminals or
terrorists.
Holly Ventura, J. Mitchell Miller & Mathieu Deflem 2005, Ventura is Assist Prof of criminal
justice at U Texas-San Antonio, Miller is Deflem is professor of sociology at South Carolina,
“Governmentality and the War on Terror: FBI Project Carnivore and the Diffusion of Disciplinary
Power,” Critical Criminology 13(1): 55-70, http://deflem.blogspot.com/2009/08/governmentality-andwar-on-terror-fbi.html, KEL
Although Foucault’s
research of power was centered on discipline in correctional contexts, his discussion also provides an adequate
framework in which to consider Project Carnivore. For, indeed, as other scholars discussing practices of social control in advanced
capitalist societies have observed (Baddeley, 1997; Garland, 1997; Walters, 2003), the governmental diffusion of disciplinary power
continues to characterize modern systems of social control. At the most general level, as a system of deeply penetrating
surveillance, Carnivore represents a means of correct training which Foucault (1977:170-194) describes as an ‘examination,’ i.e., a method of
disciplinary power that is able to see and record every move and thought of each and all, but that
itself cannot be seen . Resembling the ever-present powers of the central watchtower in a prison modeled after the Panopticon, the very fact
that the FBI has the potential to monitor communications on a website may lead Internet users to
believe that they are constantly being watched . The proven fact that there have been crimes that were perpetuated by reliance on the
internet (e.g., the September 11 highjackers planned their attacks via email) justifies the federal law enforcement response to target the internet. Besides the fact that
the enacted system of surveillance may go well beyond its initial justification, the very development and utilization of the Carnivore software has effectively enabled
law enforcement to further increase its arsenal of disciplinary tools. It is important in this respect to note that Project Carnivore was initiated by the FBI more than a
year prior to the terrorist attacks of September 11. Although it may be relatively easy to accept the need for the software since the events of 9-11, especially given the
fact that the hijackers orchestrated the attacks via the internet, it is more difficult to reconcile that federal law enforcement planned on utilizing this technology prior to
to Foucault (1980), disciplinary power creates “a machine in which everyone
is caught” in order to accomplish a system of “total and circulating mistrust” (pp. 156, 158). In this context, it
is difficult to accept at face-value that social control is a mere functional response to crime . In the case of
the current state of emergency. According
Project Carnivore, high-level Bureau officials have linked the system intimately to the investigation of criminals. For example, John E. Collingwood, the Assistant
Director of the Office of Public and Congressional Affairs of the FBI, defended Carnivore by simply stating that the software would be used to “to obtain a criminal’s
e-mail…” (Collingwood, 2000b). In a theoretical vacuum, the use of the word ‘criminal’ is powerful, but misleading and somewhat at odds with the notion of an
adversarial and due-process orientation to law and justice. A central tenet of the criminal justice system in our society is the presumption of innocence. Labeling the
the constitutive effect of
the labeling might imply that all those who are monitored will be considered criminals, because the
logic of an official investigation is based on the premise that only criminals will be monitored.
targets of criminal investigations prematurely as ‘criminals’ compromises the spirit of the justice process. Ironically, also,
Be skeptical of all neg claims
Surveillance knowledge produces social knowledge through power – all of the
negative’s truth claims are suspect because this kind of knowledge produces its own
authority and legitimizes its own claims.
Ray Pensador Sept 11, 2013, “The Surveillance State As Foucault's Panopticon,” Daily Kos,
http://www.dailykos.com/story/2013/09/11/1238013/-The-Surveillance-State-As-Foucault-s-Panopticon,
KEL
I've always found the "knowledge is power" concept very intriguing because of its simplicity and applicability. No matter the setting, this concept, which I consider a
truism, can be viewed as a universal principle which applies to all human interactions. And as I've thought about it, I've come to view these two components
(knowledge and power) as inextricably linked in that one cannot exist without the other. When
it comes to the issue of the corporategovernment total information awareness surveillance system, the "knowledge is power" concept could not
have more relevance. And if so, then there is no better metaphor than Michel Foucault's take on late 18th century English
philosopher Jeremy Bentham's "Panopticon." Here's how the late (she passed away in 2012) Moya K. Mason saw it: Along with other social theorists,
Foucault believed that knowledge is always a form of power, but he took it a step further and told us that knowledge can be gained from power;
producing it, not preventing it. Through observation, new knowledge is produced. In his view, knowledge is
forever connected to power, and often wrote them in this way: power/knowledge. Foucault's theory states that knowledge is power: Knowledge
linked to power, not only assumes the authority of 'the truth' but has the power to make itself true. All
knowledge, once applied in the real world, has effects, and in that sense at least, 'becomes true.' Knowledge, once used to regulate the
conduct of others, entails constraint, regulation and the disciplining of practice. Thus, 'there is no power relation
without the correlative constitution of a field of knowledge, nor any knowledge that does not presuppose and constitute at the same
time, power relations (Foucault 1977,27). The emphasis is mine
Disciplinary Surveillance is Racist
Disciplinary and biopolitical power seeks to eliminate internal dangers to the
population along racial lines. This is especially true in a post-9/11 environment.
Falguni A. Sheth, 2011, Hampshire College, “The War on Terror and Ontopolitics: Concerns with
Foucault’s Account of Race, Power Sovereignty,” Foucault Studies, No. 12, pp. 51-76, October 2011,
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CDQQFjAC&url=http%
3A%2F%2Frauli.cbs.dk%2Findex.php%2Ffoucaultstudies%2Farticle%2Fdownload%2F3337%2F3634&ei=97mbVbHwJMn7tQXRZCgAQ&usg=AFQjCNHeiorCKk0jlhvENU_uo5g1eV0EYA, KEL
Biopolitics8 is clearly an urgent lens by which to assess the political management that has taken place in
the 20th century. As a regulatory technology ,9 biopower’s scope pertains to human beings as a species,
and is deployed to divide populations along the lines of life and death . Biopower replaces the old
sovereign right to‚ take life and let live‛ with a new capacity, ‚the right to make live and to let die.‛10
Biopolitics engages policies and processes pertaining to reproduction, fertility, health, and medical care,11 as well as geography and climate,12 using the mechanisms
of statistics, forecasts, estimates, to organize—rather than discipline—men as species.13 Biopower functions as a: technology which brings together the mass effects
characteristic of a population, which tries to control the series of random events that can occur in a living mass, a technology which tries to predict the probability of
This is a technology which aims to establish a sort of homeostasis , not by training individuals, but by
achieving an overall equilibrium that protects the security of the whole from internal dangers .14
Whereas disciplinary power is a non-sovereign power,15 biopower goes beyond sovereign right.16 Together, disciplinary and regulatory
power establish a link between the body and population, and correspondingly between knowledge
and power. 17 Even though biopower goes beyond sovereign right, it retains its effectiveness through the exercise of the
capacity to kill. Death, once meted out by the sovereign, is now regulated through the mechanism of
racism. As Foucault states, ‚ racism is inscribed as the basic mechanism of power, as it is exercised in
modern States .‛18 For Foucault, racism is the tendency or the drive to fragment or divide the ‚biological
continuum of the human race.‛19 As he says, racism ‚is primarily a way of introducing a break into the domain of life that is power’s control: the
those events<
break between what must live and what must die.‛ But as Foucault describes it, racism operates within the framework of biopolitics: The appearances within the
biological continuum of the human race of races, the distinction among races, the hierarchy of race, the fact that certain races are described as good and that others, in
contrast, are described as inferior: all this is a way of fragmenting the field of the biological that power controls. It is a way of separating the groups that exist within a
population. It is, in short, a way of establishing a biological-type caesura within a population that appears to be a biological domain.20 The
racism of the
state lies in the ability to produce races of subjects by dividing that continuum, using any number and
quality of characteristics, in order to create divisions between the living and the dying. Foucault frames this racism
through the framework of biopolitics, which involves managing men-as-species through the control and regulation of the health and life of the population. However,
Foucault insists that racism functions through ‚not a military or warlike relationship of confrontation, but a biological-type relationship‛21 in order to pro-duce a purer
species. Thus, the criteria along which racism operates could include the physical, biological, sexual, health, or medical, as we see in his analyses of madness,
incarceration, and psychiatric power. Foucault gives the examples of sexuality as a site where body and population meet, and of medicine as a technique that
establishes a link ‚between scientific know-ledge of both biological and organic processes. Medicine thus, can be an effective ‘political intervention technique’ which
will have ‘both disciplinary and regulatory’ effects.‛22 Race it-self is neither biological nor phenotypical in Foucault’s reading, although it can be inscribed through
biological vehicles and measures, as manifested through health policies, pension plans, etc. These practices operate at the level of life, and yet they can collude to
create ‚good‛ and bad races.23 It is possible to see how Muslims
could eventually be construed as a threat to the general
population at the level of biopolitics, especially as seen through the various policies implemented in detention and immigrant centers, access to
public schools and health care. These reflect the antipathy or ambivalence of the ‚Western‛ world toward this
population. And yet, the biopolitical fails to fully capture the impetus and the path of the racism that has surfaced in the decade since September 11, 2001.
Security State exaggerates threats; = continual violence
The Security State uses exaggerated threats of a constructed Other to justify
continual war and violence
Grondin 2004 ((Re)Writing the “National Security State”: How and Why Realists (Re)Built the(ir)
Cold War David Grondin Occasional Paper Paper presented at the annual International Studies
Association Convention, March 17-20, 2004, Montreal)
The Cold
War national security culture represented in realist discourses was constitutive of the American
national security state. There was certainly a conflation of theory and policy in the Cold War military-intellectual complex, which “were observers of, and
active participants in, defining the meaning of the Cold War. They contributed to portray the enemy that both reflected and
fueled predominant ideological strains within the American body politic. As scholarly partners in the national security state, they were
instrumental in defining and disseminating a Cold War culture” (Rubin, 2001: 15). This national security culture was “a complex space where various representations
and representatives of the national security state compete to draw the boundaries and dominate the murkier margins of international relations” (Der Derian, 1992: 41).
The same Cold War security culture has been maintained by political practice (on the part of realist
analysts and political leaders) through realist discourses in the post-9/11 era and once again reproduces
the idea of a national security state. This (implicit) state identification is neither accidental nor inconsequential. From a poststructuralist vantage
point, the identification process of the state and the nation is always a negative process for it is achieved by
exclusion, violence, and marginalization. Thus, a deconstruction of practices that constitute and consolidate state identity is necessary: the
writing of the state must be revealed through the analysis of the discourses that constitute it. The state and the discourses that (re)constitute it thus
frame its very identity and impose a fictitious “national unity” on society; it is from this fictive and arbitrary creation of the modernist dichotomous
discourses of inside/outside that the discourses (re)constructing the state emerge. It is in the creation of a Self and an Other in
which the state uses it monopolistic power of legitimate violence – a power socially constructed, following
Max Weber’s work on the ethic of responsibility – to construct a threatening Other differentiated from the “unified” Self,
the national society (the nation).16 It is through this very practice of normative statecraft,17 which produces threatening Others, that the international
sphere comes into being. David Campbell adds that it is by constantly articulating danger through foreign policy that the state’s very conditions of existence are
generated18.
K of Nuclear Impacts
Threats of nuclear war are used to justify militarization
Grondin 2004 ((Re)Writing the “National Security State”: How and Why Realists (Re)Built the(ir)
Cold War David Grondin Occasional Paper Paper presented at the annual International Studies
Association Convention, March 17-20, 2004, Montreal)
Much of the Cold War state apparatus and military infrastructure remained in place to meet the challenges
and threats of the post-Cold War era. If the attack on Pearl Harbor was the driving force of the postwar national security state
apparatus (Stuart, 2003: 303), the 9/11 events have been used as a motive for resurrecting the national security
discourse as a justification against a new ‘infamy’, global terrorism.19 Although in this study I am calling into question
the political practices that legitimized the very idea of a national security state during the Cold War era, I find even more problematic
the reproduction of a similar logic in the post-9/11 era – a rather different historical and socio-political
context. As Simon Dalby highlights, Coupling fears of Soviet ambitions, of a repeat of Pearl Harbor, and of nuclear
war, these institutions formed the heart of a semipermanent military mobilization to support the policies
of containment militarism. If this context is no longer applicable, the case that the national security state is not an appropriate mode for
social organization in the future is in many ways compelling. If security is premised on violence, as security-dilemma and
national-security literatures suggest (albeit often reluctantly), perhaps the necessity of rethinking global
politics requires abandoning the term and the conceptual strictures that go with it (Dalby, 1997: 2
K of Terrorism Impacts
Terrorist threats constructs inside/outside and friend/enemy distinctions that justify
continual violence and preemptive attacks once identified through intelligence
systems like PRISM
Mark Duffield 2004 Professor at the Department of Politics and International Relations at the
University of Lancaster, “Carry on Killing: Global Governance, Humanitarianism and Terror,” Danish
Institute for International Studies, 2004,
http://www.diis.dk/graphics/Publications/WP2004/duffield_carry_on_killing.pdf
For Georgio Agamben (1998),3 rather than emerging from a social contract, sovereignty
is argued to reside in the power to
decide the exception. That is , to fix in language the boundary between who or what is included or
excluded as valid life : sovereign power is that which constitutes the ‘other’. In populating the space of the exception, sovereignty calls
forth a particular form of subjectivity to bear the consequences of exclusion. Agamben has given this subjectivity a generic name calling it ‘bare’
or ‘natural’ life. That is, an abandoned life that effectively exists beyond the rights, conventions and moral restraints of secular and religious law.
Deciding the exception constitutes a juridico-political space where anything becomes possible; it is even
“…permitted to kill without committing homicide…” (Ibid: 83 as orig.).4 Such life, however, is more than an
abandoned subjectivity destined to bear sovereignty’s ordering; it is constitutive of political order itself.
Bare life is an exclusion that is also an inclusion (Ibid: 18). While sovereignty decides the exception, it simultaneously elects to
protect society from the threat that it has itself identified. The war on terrorism is an example of this recurrent
sovereign design . During the 1990s, the leading ‘homeland’ states, as it were, remapped the zone of exception in
terms of a global ‘borderland’ of failed states, shadow networks, rogue states, and so on. Today, this new
cartography of risk encapsulates the terrorist threat (National Security Strategy 2002). At the same time, through
emergency powers , the derogation of international law and pre-emptive attack , homeland states seek to protect
society and its values from the menace their intelligence systems have identified . The global
borderlands have once again become zones where anything becomes possible; an open-range where you can kill
without committing murder.
4th Amendment stuff
Failure to require probable cause for PRISM surveillance undermines any meaning
to the 4th Amendment
Margot Kaminski June 7, 2013, executive director of the Information Society Project at Yale Law
School; She is a graduate of Harvard University and Yale Law School and a former fellow of the
Information Society Project. While at Yale Law School, she was a Knight Law and Media Scholar and
co-founder of the Media Freedom and Information Access Practicum. Following graduation from Yale
Law School, she clerked for The Honorable Andrew J. Kleinfeld of the Ninth Circuit Court of Appeals.
She has been a Radcliffe Research Fellow at Harvard and a Google Policy Fellow at the Electronic
Frontier Foundation, PRISM's Legal Basis: How We Got Here, and What We Can Do to Get Back,” The
Atlantic, http://www.theatlantic.com/national/archive/2013/06/prisms-legal-basis-how-we-got-here-andwhat-we-can-do-to-get-back/276667/, KEL
The Fourth Amendment prevents dragnet surveillance by requiring law enforcement to go to courts and
show probable cause . These dual requirements of court oversight and a legitimate, targeted investigation ensure that people will not be subject to
general searches by an abusive government. But intelligence-gathering that involves "the activities of foreign powers" is
treated differently, whether it occurs inside or outside of the United States. Foreign intelligence is the exception that has
swallowed the Fourth Amendment whole. As my colleague Anjali Dalal points out, people probably believe that foreign intelligence law is "
supposed to be going after foreign intelligence ," but its impact on Americans is surprisingly broad. In 1978, Congress set up a system governing foreign intelligence
surveillance. The surveillance programs leaked in the past two days are the results of the post-9/11 version of this system. The Verizon call records, which include
the PRISM
program --which allows the NSA to access content such as emails, search histories, and audio chats-- is authorized as part of "foreign
intelligence" gathering under the 2008 Amendments to the Foreign Intelligence Surveillance Act ( FISA ). It is crucial to
phone numbers, location data, and timestamps, were authorized as the collection of "business records" under the PATRIOT Act. And
understand that the foreign intelligence system as it currently exists fails to require both adequate targeting and adequate oversight. The system allows intelligence
agencies to gather an enormous amount of information "incidental" to any investigations. And it does so with minimal court and Congressional oversight. If the
revision of our foreign intelligence surveillance system is a
constitutional necessity. If the Fourth Amendment is to have any meaning, Congress must untangle
the current web of broad authorizations and broad secrecy that allows the government to escape
judicial accountability for its acts .
revelations of the past two days have taught us anything, it is that
PRISM raises important 4th Amendment concerns
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
Within days of the releases, the intelligence community acknowledged the existence of the programs. n12
In August 2013 the Director of National Intelligence, James Clapper, offered further confirmation, noting
that PRISM had been in operation since Congress had passed the 2008 FISA Amendments Act. n13 He
declassified eight documents, n14 and by the end of the month, he had announced that the intelligence
community would release the total [*122] number of Section 702 orders issued, and targets thereby
affected, on an annual basis. n15 Although much of the information about PRISM and upstream
collection remains classified, what has been made public suggests that these programs push statutory
language to its limit, even as they raise critical Fourth Amendment concerns. n16 Accordingly, this
Article proceeds in three Parts: the evolution of Section 702, a statutory analysis of PRISM and upstream
collection, and the attendant constitutional concerns.
PRISM violates the 4th Amendment in several ways
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
In its constitutional analysis, the Article finds certain practices instituted under Section 702 to fall outside
acceptable Fourth Amendment bounds. Although lower courts had begun to recognize a domestic foreign intelligence exception to
the warrant clause, in 1978 Congress introduced FISA to be the sole means via which domestic foreign intelligence electronic intercepts could be
undertaken. Consistent with separation of powers doctrine, this shift carried constitutional meaning. Internationally, practice and precedent prior
to the FAA turned on a foreign intelligence exception. But in 2008 Congress altered the status quo, introducing individualized judicial review into
the process. Like FISA, the FAA carried constitutional import. [*124] If that were the end of the story, one could argue that the incidental
collection of U.S. persons' information, as well as the interception of domestic conversations ought to be regarded in Justice Jackson's third
category under Youngstown Sheet & Tube Co. v. Sawyer. n18 Renewal in 2012, however, points in the opposite direction. The NSA's actions,
for purposes of the warrant clause, appear to be constitutionally sufficient insofar as foreign intelligence gathering to or from non-U.S. persons is
concerned. The tipping point comes with regard to criminal prosecution. Absent a foreign intelligence purpose, there is no exception to the
warrant requirement for the query of U.S. persons' international or domestic communications. Although a warrant is not required for foreign
intelligence collection overseas, the interception of communications under Section 702 must still comport with the reasonableness requirements
of the Fourth Amendment. A totality of the circumstances test, in which the significant governmental interest in national security is weighed
against the potential intrusion into U.S. persons' privacy, applies. The
incidental collection of large quantities of U.S.
persons' international communications, the scanning of content for information "about" non-U.S. person
targets, and the interception of non-relevant and entirely domestic communications in multicommunication transactions, as well as the query of data using U.S. person identifiers, fall outside the
reasonableness component of the Fourth Amendment.
The Fourth Amendment is not adapted to current administrative purposes
Budiansky, 2003 [Privacilla, Stephen Budiansky, Privacy and Government, found online 7/7/15,
http://www.privacilla.org/government/fourthamendment.html LB]
the growth of both the U.S. and state governments during the 20th century vastly increased the
amount of information that governments collect. When information is collected for "administrative"
purposes, like issuing licenses and benefits or collecting taxes, the government does not have to satisfy the Fourth
Amendment. Unfortunately, sometimes this information is used by investigators, released or sold by
government agencies, or just misused by rogue government employees. This invades citizens'
expectations of privacy and violates their Fourth Amendment rights.
In addition,
4th amendment is vital
Swindle, 2013[ Swindle law group, Jason Swindle, May 31 2013, the history behind the 4
th
amendment, found online 7/7/15,
http://www.swindlelaw.com/2013/03/the-history-behind-the-4th-amendment/ LB]
In modern society, it is easy to forget where many of our freedoms come from. It is also dangerous to turn a blind
eye to history. Civilizations, military commanders, and leaders of nations have ignored history with
devastating results. Because the 4th Amendment is so vitally important to America, it deserves a look into the
history behind its inception into the Constitution. The 4th Amendment to the United States Constitution was added as part of the Bill of Rights on
December 15, 1791. It deals with protecting people from the searching of their homes and private property without properly executed search
warrants. The 4th Amendment specifically provides:
4th amendment is relevant and important
Barbara, 2006 [Courier Post, 4 amendment protections are among the most relevant today, Reach Barbara, March 1 2006, found
th
online 7/7/15 , http://archive.courierpostonline.com/article/20060228/SPECIAL08/603010301/4th-Amendment-protections-among-mostrelevant-today
LB]
Civil rights and constitutional lawyers agree that the Fourth Amendment is perhaps the most fundamental
and relevant in today's society. In the post-9/11 age, the context in which the amendment is utilized has
certainly changed in some respects from what the Founding Fathers intended, but the principles remain
the same. "Protection against unreasonable search and seizure is what people deal with as a part of their
daily life," said James Katz, a Cherry Hill lawyer who specializes in labor and employment issues, civil rights and constitutional litigation.
"You see it in the news today regarding electronic eavesdropping. I see it in the context of a wide variety of drug-testing issues, including in a
civil context with random drug-testing in the work place, in schools, and among student athletes," Katz said. "It
is as vitally important
today as when it was enacted. It provides protection against an overzealous government, and seeks to
balance the interests of the government with that of the people to be free of unreasonable conduct," he said.
4th Amendment equally important as 2nd
Lee, 2014 [Breitbart, Tony Lee, march 7 2014, 4 amendment vital, found online 7/7/15, http://www.breitbart.com/bigth
government/2014/03/07/rand-what-you-do-on-your-cell-phone-none-of-nsa-s-damn-business/ LB]
Yet as Americans protest the National Security Agency’s spying programs, Paul said that the federal government still monitors everyone’s cell
phone activity. I believe what you do on your cell phone is none of their damn business,” Paul said. “I believe this is a profound Constitutional
question: can a single warrant be applied to millions of Americans’ phone records, emails, credit cards?” Paul said that though the government
the Fourth Amendment is
“very clear” that a single warrant for “millions of Americans’ phone records hardly sounds
specific to an individual.” Paul said that issuing “generalized warrants that don’t name an individual and
seek the records of millions of individuals goes against the very fabric of the Fourth Amendment.” He
maintains that Americans do not own their records and credit card statements, he disagreed because
recalled that John Adams said that James Otis’s revolt against generalized warrants was the “spark” that started the American Revolution. He said
in the “great battle for the heart and soul of America,” the
Amendment, and conservatives cannot forget this.”
Fourth Amendment is “equally as important as the Second
Solvency
Congress should act – solves fear of Cloud
Congressional repeal of the 2008 FAA best solves PRISM and fear of spying on
cloud computing. The Courts cannot solve.
Margot Kaminski June 7, 2013, executive director of the Information Society Project at Yale Law
School; She is a graduate of Harvard University and Yale Law School and a former fellow of the
Information Society Project. While at Yale Law School, she was a Knight Law and Media Scholar and
co-founder of the Media Freedom and Information Access Practicum. Following graduation from Yale
Law School, she clerked for The Honorable Andrew J. Kleinfeld of the Ninth Circuit Court of Appeals.
She has been a Radcliffe Research Fellow at Harvard and a Google Policy Fellow at the Electronic
Frontier Foundation, PRISM's Legal Basis: How We Got Here, and What We Can Do to Get Back,” The
Atlantic, http://www.theatlantic.com/national/archive/2013/06/prisms-legal-basis-how-we-got-here-andwhat-we-can-do-to-get-back/276667/, KEL
The first instinct might be to look to federal courts to protect our constitutional rights. But in February of this year, the
Supreme Court effectively closed that avenue of recourse at least with respect to PRISM in Clapper
v. Amnesty International. The majority of the Court found that the group of lawyers, journalists, and
human rights advocates who challenged the constitutionality of the law that authorizes PRISM could not
show that they had been injured by it. The Court explained that the alleged surveillance was too speculative; the group could not get into court
unless it showed that surveillance of its members was "certainly impending." One might think that a new
lawsuit could show that surveillance is "certainly impending," because we now know that the PRISM
program exists. But this is not clear. Any plaintiffs would probably still face the significant hurdle of
showing that the government has spied on them in particular, or their foreign correspondents. And while the existence of a similarly pervasive spying program
led the Ninth Circuit to find that a similar lawsuit could proceed, that case came down before the recent Supreme Court opinion. The best solution, then, is Congress.
Congress must repeal the FISA Amendments Act, which it regrettably reauthorized in 2012.
Otherwise the revelation that the government can and does spy on Americans through Internet companies
will chill expression, chill free association, and threaten our society's growing reliance on cloud
computing for everything from intimate communications to business transactions. And Congress should reevaluate the secrecy surrounding our entire foreign intelligence-gathering system, because if the past two days
have shown anything, it is that lack of oversight leads to extraordinary abuses.
NSA requirements for encryption backdoors to surveil online systems weaken
confidence in e-commerce and cloud systems. Congress should ban the practice to
solve.
NY Times Editorial Board, Sept 21, 2013, “Close the N.S.A.’s Back Doors,” NY Times,
http://www.nytimes.com/2013/09/22/opinion/sunday/close-the-nsas-back-doors.html?_r=1, KEL
Documents leaked by Edward Snowden, the former N.S.A. contractor, make clear that the agency has never met an
encryption system that it has not tried to penetrate. And it frequently tries to take the easy way out. Because modern
cryptography can be so hard to break, even using the brute force of the agency’s powerful supercomputers, the agency prefers to
collaborate with big software companies and cipher authors, getting hidden access built right into their
systems. The New York Times, The Guardian and ProPublica recently reported that the agency now has access to the codes that
protect commerce and banking systems, trade secrets and medical records, and everyone’s e-mail and
Internet chat messages, including virtual private networks. In some cases, the agency pressured companies to give it access; as The Guardian reported
earlier this year, Microsoft provided access to Hotmail, Outlook.com, SkyDrive and Skype. According to some of the Snowden documents given to Der Spiegel, the
These back doors and special access
routes are a terrible idea , another example of the intelligence community’s overreach. Companies and individuals are
increasingly putting their most confidential data on cloud storage services, and need to rely on
N.S.A. also has access to the encryption protecting data on iPhones, Android and BlackBerry phones.
assurances their data will be secure . Knowing that encryption has been deliberately weakened will
undermine confidence in these systems and interfere with commerce. The back doors also strip away the expectations
of privacy that individuals, businesses and governments have in ordinary communications. If back doors are built into systems by the N.S.A., who is to say that other
The government can get a warrant and
break into the communications or data of any individual or company suspected of breaking the
law. But crippling everyone’s ability to use encryption is going too far, just as the N.S.A. has exceeded its boundaries
in collecting everyone’s phone records rather than limiting its focus to actual suspects. Representative Rush Holt , Democrat of New Jersey, has
introduced a bill that would, among other provisions, bar the government from requiring software
makers to insert built-in ways to bypass encryption . It deserves full Congressional support . In the
countries’ spy agencies — or hackers, pirates and terrorists — won’t discover and exploit them?
meantime, several Internet companies, including Google and Facebook, are building encryption systems that will be much more difficult for the N.S.A. to penetrate,
forced to assure their customers that they are not a secret partner with the dark side of their own government.
Need to restore faith in Cloud Market – Act now
PRISM surveillance will cost cloud businesses $22-35 billion if we don’t restore faith
in US cloud systems
Kashmir Hill, Sept 10, 2013, “How The NSA Revelations Are Hurting Businesses,” Forbes,
http://www.forbes.com/sites/kashmirhill/2013/09/10/how-the-nsa-revelations-are-hurting-businesses/,
KEL
Earlier this summer, technology analyst Daniel Castro authored a report suggesting that revelations about
corporate cooperation with the government through programs like PRISM would take a toll on cloud
computing businesses to the tune of $22 to $35 billion over the next three years “if foreign customers
decide the risks of storing data with a U.S. company outweigh the benefits.”
Solves US Tech Competitivness
Repealing the FAA and Patriot Act solves US tech competitiveness
Julie Borowski, April 15, 2015, “Top 5 Reasons to Support the Surveillance State Repeal Act,”
Freedom Works, http://www.freedomworks.org/content/top-5-reasons-support-surveillance-state-repealact, KEL
Domestic spying doesn’t just violate our privacy. It also hurts the economy. Many U.S. technology companies are
finding it harder to compete on a global scale after the NSA revelations. Under law, companies are forbidden from
informing their customers if the government is spying on them. Former Federal Trade Commission employee Ed Felten writes: “This is
going to put U.S. companies at a competitive disadvantage, because people will believe that U.S.
companies lack the ability to protect their customers—and people will suspect that U.S. companies may feel compelled to lie
to their customers about security.” The Surveillance State Repeal Act would help to boost global trust in U.S.
companies.
Should prohibit NSA collection
Need to prohibit all NSA collection to solve
Tech Freedom 2014 Tech Freedom, TF, CDT, and 40 others tell Congress what real NSA reform
should look like, April 1, 2014, http://techfreedom.org/post/81391689035/tf-cdt-and-40-others-tellcongress-what-real-nsa)
The White House has expressed support for reining in the NSA’s bulk collection of Americans’ phone records, but
with multiple bills in Congress it’s uncertain which specific reforms will be included in the debate moving forward. To ensure whichever
NSA reform bill advances is as strong as possible, TechFreedom and 41 other nonprofits and businesses have sent
a joint letter to key policymakers outlining what any bill aiming to reform bulk surveillance should
include. Read the text below, and see the full letter for the list of signatories and recipients: We the undersigned are writing to express support
for ending the government’s bulk collection of data about individuals. We strongly urge swift markup and passage of the USA FREEDOM Act
(H.R.3361), which would enact appropriate surveillance reforms without sacrificing national security. This
letter focuses on bulk
collection, but overbroad NSA surveillance raises many more privacy and security issues that Congress
and the Administration should address. We appreciate that Congress and the Administration are converging on consensus that the
National Security Agency’s (NSA) bulk collection of telephone records must end. Among other things, legislation on bulk
collection should: Prohibit bulk collection for all types of data, not just phone records. Section 215 of the
PATRIOT Act applies broadly to business records, and the Department of Justice has claimed authority for bulk collection of any records that
reveal relationships between individuals. Legislation that focuses only on phone records may still allow for the bulk collection of, for example,
Internet metadata, location information, financial records, library records, and numerous other records that may help “identify unknown
relationships among individuals.” Prohibit
bulk collection under Section 214 as well as Section 215 of the
PATRIOT Act, or under any other authority . While the NSA’s bulk collection of telephone records under the purported
authority of Section 215 has received considerable attention, the NSA engaged in the bulk collection of Internet metadata
using the Pen/Trap authority under Section 214 until 2011. Legislation that focuses solely on Section 215
would still fail to prohibit the bulk collection of phone and Internet metadata using Section 214, the National Security Letter
(NSL) statutes, or another authority. Require prior court approval for each record request. Under current law, the
government must obtain approval from the FISA court before it can force private entities to turn over
records (in bulk or otherwise) under Sections 215 and 214 of the PATRIOT Act. In addition, President Obama, in his January 17th policy
announcement, established that a judicial finding is required before the government can query the phone records that the NSA collected in
bulk. Congress
should leave this key safeguard in place. If there is concern that the FISA Court would
move too slowly to authorize domestic surveillance beforehand, then the solution should be to provide
the FISA Court with sufficient resources .
AT Circumvention
Only the plan solves — anything less gets circumvented.
Marthews 15 —Alex Marthews, National Chair at Restore The Fourth—a 501(c)(4) nonprofit that
seeks to strengthen the Fourth Amendment to the United States Constitution and end programs that
violate it, holds a Masters in Public Policy from the University of California-Berkeley and a B.A. in
English from the University of Cambridge, 2015 (“Go Big or Go Home: Pass the New Surveillance State
Repeal Act,” Restore The Fourth, March, Available Online at http://restorethe4th.com/blog/go-big-or-gohome-pass-the-new-surveillance-state-repeal-act/, Accessed 06-19-2015)
Congress has done nothing to fix the US government's massively abusive surveillance
practices. They think Americans will be OK with an unconstitutional, sprawling, mass-surveillance empire intruding into every part of our lives. We’re not. It’s time to take a stand. We’ve seen what
happens when reformers try to nibble around the edges, when we try to pre-compromise with the
intelligence community. We saw a good reform bill last session, the “USA FREEDOM Act”, get stripped of nearly
everything worth doing as it passed through the process, and then it failed anyway. So this time, we’re setting out for
what we’d really like to see happen–a bill that embodies our vision for a new way of dealing with security
and surveillance. Restore The Fourth has been working quietly with a new coalition of surveillance reform
groups and with representatives interested in real reform, and today we’re helping to launch HR 1466, the
Surveillance State Repeal Act. Co-sponsored by Rep. Thomas Massie (R-KY) and Rep. Mark Pocan (D-WI), this bill strikes at the heart of the
surveillance state. The SSRA: repeals the PATRIOT Act; repeals the FISA Amendments Act; requires the
destruction of information gathered under that Act; reforms the Foreign Intelligence Surveillance Court;
bans law enforcement “back doors” into our hardware and software; requires annual audits of intelligence
community practices; protects intelligence community whistleblowers; and requires a probable cause
warrant for information on US persons gathered under Executive Order 12333. It is the only
comprehensive surveillance reform bill in this Congress, and it deserves maximum publicity and support.
Nearly two years after Snowden began revealing them,
Details The SSRA... 1. Repeals the PATRIOT Act and the FISA Amendments Act. The PATRIOT Act was passed by a panicked Congress in the weeks following the 9/11 attacks. At the time, it was a wet dream for law enforcement.
Since then, it’s become clear that it doesn’t meaningfully help with thwarting terrorist attacks. What it is very good at is legitimating activities more appropriate for the East German secret police than for a free republic. Secret national
security letters that recipients can’t talk about or challenge. Phone metadata dragnets sweeping up calls from Pawtucket to Peoria. So-called “roving wiretaps” that deeply violate the Fourth Amendment requirement for particularized
probable cause. This was all meant to be “emergency” legislation. The emergency is long past, and it’s time to bury the PATRIOT Act in the unhallowed ground it deserves. The FISA Amendments Act was passed after the Bush
administration’s illegal mass surveillance became public. Its purpose was to give a vague color of law to their intentional violations, prevent their prosecution, and also give immunity to the criminals running our telecommunications
companies who went along with administration requests rather than protecting their users. It also turned the Fourth Amendment on its head, by approving warrants connected to a “program” rather than a person. Not only would SSRA
repeal the FISA Amendments Act, but it would require the destruction of any information gathered under it. 2. Reforms the Foreign Intelligence Surveillance Court set up after the surveillance scandals of the 1970s. It increases the
independence of judges by extending their terms from seven to ten years and allowing them to have multiple terms on the Court. It allows technical experts to be appointed to assist the judges in forming a more critical and
independent view of administration demands. 3. Bans the farcical practice of mandating “back doors” for government access to hardware and software. Computer security can’t be designed to provide a “magic golden key” to the US
government (while also making systems vulnerable to foreign governments and black-hat hackers). You’re either vulnerable or you’re not. The US government should be promoting secure cyber-infrastructure, not holding conferences
on how to weaken it. 4. Improves transparency by requiring the GAO to audit domestic surveillance annually. Famously, there’s a GAO room at the NSA that is empty, because too many members of Congress don’t want to appear
unpatriotic by calling on GAO to investigate a surveillance agency. Required annual audits would overcome that problem. 5. Sets out whistleblower procedures for employees of or contractors to intelligence agencies, requires the
Comptroller General to investigate and report on their complaints, and prohibits retaliation against them. 6. For the first time, meaningfully limits collection under Executive Order 12333, requiring (for US persons) a valid warrant
based on probable cause. In short, this is a blockbuster bill. If passed, it would undo much of the enormous damage done to the Bill of Rights after the September 11 attacks. It would return us to a path we should never have left,
where we investigate Americans only when we have reason to. At the same time, we believe it will increase our actual security. We have been trying too much to control our own citizens and the world by surveilling them into sullen
and resentful silence; we make a desolation, and call it peace. If instead we practice justice, promote peace, and let people pursue their ideas and aspirations freely, we will be far more secure in the long run.
The plan is a “hard reset” of surveillance authority — it can’t be circumvented.
Meinrath 15 — Sascha Meinrath, Founder of X-Lab—a future-focused technology policy and
innovation project, Fellow and Doctoral Candidate at the Institute of Communications Research at the
University of Illinois at Urbana-Champaign, Founder and former Director of the Open Technology
Institute, former Vice President and Research Director of the Wireless Futures Program at the New
America Foundation, holds an M.A. in Social-Ecological Psychology from the University of Illinois at
Urbana-Champaign, 2015 (“Opinion: Meaningful surveillance reform must prioritize civil liberties,”
Passcode—the Christian Science Monitor security and privacy publication, March 24th, Available Online
at http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0324/Opinion-Meaningfulsurveillance-reform-must-prioritize-civil-liberties, Accessed 06-20-2015)
Now is the time for meaningful surveillance reform. Across the political spectrum, from the progressive left to libertarian right, there is
widespread agreement that mass surveillance has exceeded the bounds of legality, morality, and efficacy. Today, the key ingredients for a
successful surveillance reform agenda can be found in the boldly titled Surveillance State Repeal Act. Among its bold provisions,
it repeals the Patriot Act and the excesses of the 2008 amendment to the Foreign Intelligence Surveillance Act. It would also
restore our civil liberties by clearing out legislation that even the Patriot Act’s main author, Rep. Jim Sensenbrenner (R) of Wisconsin, has stated is extremely
troubling. The Surveillance State Repeal Act begins with the right questions: What parts of these laws, which have proven to be the catalysts for widespread civil
liberties violations, should we even keep? What kinds of surveillance actually work? While many have made light of Benjamin Franklin’s quote, “Those who would
give up essential liberty, to purchase a little temporary safety, deserve neither liberty nor safety,” few have trivialized the conditions undergirding his missive –
namely, that interpretations of law were often “‘of an extraordinary nature,’ without informing us wherein that extraordinary nature consisted,” and rejected
participatory democracy for “disagreeing with new discovered meanings, and forced constructions of a clause in the proprietary [secret] commission.” The parallels to
Previous reform efforts have floundered
because they compromised – attempting to lessen the diminution of our freedoms, rather than
prioritizing our inherent and inalienable right to “the preservation of life, liberty and the pursuit of
happiness.” Surveillance reform needs grassroots support – same as the millions of people who killed the Stop Online Piracy Act in 2012 by overloading
congressional phone lines – in order to pass, and Americans of all stripes are only mobilized by unambiguous and forceful legislation to protect their rights. The
Surveillance repeal act is clear, concise, and accessible (the latest version is less than 10 pages long), and rolls back some
of the worst constitutional abuses with a hard reset of the US government’s surveillance powers.
the current surveillance state that the proposed repeal act aims to address couldn’t be clearer.
Noncompliance isn’t a reason reject the plan — the real problems are the laws that
authorize the surveillance.
Jaffer 13 — Jameel Jaffer, ACLU Deputy Legal Director and Director of ACLU Center for
Democracy, 2013 (“"There Have Been Some Compliance Incidents": NSA Violates Surveillance Rules
Multiple Times a Day,” ACLU Blog, August 16th, Available Online at https://www.aclu.org/blog/therehave-been-some-compliance-incidents-nsa-violates-surveillance-rules-multiple-timesday?redirect=blog/national-security/nsa-privacy-violations-even-more-frequent-we-imagined, Accessed
06-05-2015)
One final note: The NSA's noncompliance incidents are a big deal, but we shouldn't let them become a
distraction. The far bigger problem is with the law itself, which gives the NSA almost unchecked
authority to monitor Americans' international calls and emails. The problem arises, in other words, not
just from the NSA's non-compliance with the law, but from its compliance with it.
We get permanent fiat – any other interpretation turns debate from a “should”
question to a “will question”. Neg would always win and we’d also learn a lot less.
Doesn’t take out solvency – our cloud and EU advantages are both based on
perception of privacy in the US – the aff is a substantial improvement in privacy in
the eyes of world – that’s our Advantage 1 Zara 13 ev and Advantage 2 Castro &
McQuinn 15 cards.
The NSA and FBI will now have to abide by Congressional mandate — heightened
Congressional attention and whistleblowers will check
Buttar 15 — Shahid Buttar, constitutional lawyer and executive director of the Bill of Rights Defense
Committee, 2015 (“Senate Moves to Check Executive Spying Power,” The Progressive, May 27th,
Available Online at http://progressive.org/news/2015/05/188151/senate-moves-check-executive-spyingpower, Accessed 06-07-2015)
The political shift indicates a direction for future reform. Who Wins and Who Loses? The
most obvious losers are the NSA and FBI.
After 15 years of breaking already permissive laws, yet not congressional blank checks, the agencies must finally
start complying with constitutional limits . Within the agencies, senior leaders of the intelligence
establishment also emerge looking like clowns. Section 215 survived this long only because agency
officials—including Director of National Intelligence James Clapper and former NSA Director Michael Hayden—lied under oath to evade
oversight. The Senate's decision to end a program that senators learned about from whistleblowers, instead of
those officials, further discredits their legacies. Even if they remain above the law by evading the prosecution for perjury sought by multiple members of
Congress, their careers will be defined by congressional and judicial rejection of illegal programs they built in secret. To the extent intelligence officials are clowns,
the many congressional leaders from both parties who supported them are stooges. Establishment Democrats and Republicans alike uncritically accepted lies, deferred
to them and went along with the Beltway consensus - in sharp contrast to their populist colleagues who proved willing to uphold their oath of office to "defend the
Constitution against all enemies, foreign and domestic." Several winners also emerged from this drama. Congressional
rejection of mass spying
vindicates several principles at once, including transparency, oversight, checks and balances, the
separation of powers and constitutional rights enshrined in the First and Fourth Amendments. Each of those
values is cherished across the political continuum, making them especially powerful during a presidential election year. Senator Paul is another clear winner. He
demonstrated leadership, surged among the crowded GOP field of 2016 presidential hopefuls and effectively seized control of the Senate from the majority leader.
With its senators leading both the surveillance/secrecy/corruption caucus, as well as the competing constitutional/privacy/accountability caucus, Kentucky could also
claim victory. The US Constitution may be the most important winner. By proxy, "We the People of the United States" actually scored two victories at once.
Narrowly, the expiration of Patriot Act Section 215 advances Fourth Amendment privacy interests. Even though mass surveillance will continue for now under other
legal authorities, one program through which our government monitors phone calls and tracks everyone's behavior, regardless of wrongdoing, will end. More broadly,
this vote begins a long-overdue process of limiting executive powers , expanded during a period of seeming emergency,
which grew entrenched despite proving ineffective as well as constitutionally offensive. In this sense, congressional assertiveness supports
democracy in a long-running battle to avoid the erosion from within foreseen by both Alexis de Tocqueville and President and
Supreme Allied Commander Dwight Eisenhower. What Comes Next? With reformers having triumphed in Congress, the debate over surveillance reform must
expand. Further reforms are necessary to enable an adversarial process and greater transparency at the secret Foreign Intelligence Surveillance Court, and also to limit
other legal authorities - like Executive Order 12333 and FISA Section 702 - used to justify unconstitutional domestic surveillance. It's a good thing that a bipartisan
measure, the Surveillance State Repeal Act (HR 1466), is poised to do exactly that. Rep. Mark Pocan (D-Wisconsin) and Rep. Thomas Massie (R-Kentucky)
introduced the SSRA to force the agencies to justify the expansion of any powers from a constitutional baseline, rather than one contrived by a decade of executive
lies. Congress
has long abandoned its role of checking and balancing runaway executive power, but the
Senate's recent vote suggests an overdue awakening . Members should heed the political wind, and embrace bipartisan calls for
aggressive limits as the starting point for comprehensive surveillance reform.
Obama will comply
David J Barron 8, Professor of Law at Harvard Law School and Martin S. Lederman, Visiting
Professor of Law at the Georgetown University Law Center, “The Commander in Chief at the Lowest
Ebb -- A Constitutional History”, Harvard Law Review, February, 121 Harv. L. Rev. 941, Lexis
In addition to offering important guidance concerning the congressional role, our historical review also illuminates the practices of the President in creating the
it is
tempting to think that Commanders in Chief would always have claimed a unilateral and unregulable authority to
determine the conduct of military operations. And yet, as we show, for most of our history, the presidential practice was
otherwise. Several of our most esteemed Presidents - Washington, Lincoln, and both Roosevelts, among others - never invoked the sort of
preclusive claims of authority that some modern Presidents appear to embrace without pause. In fact, no Chief Executive did so in any clear way until
the onset of the Korean War, even when they confronted problematic restrictions, some of which could not be fully interpreted away and
constitutional law of war powers at the "lowest ebb." Given the apparent advantages to the Executive of possessing preclusive powers in this area,
some of which even purported to regulate troop deployments and the actions of troops already deployed. ¶ Even since claims of preclusive power emerged in full, the
practice within the executive branch has waxed and waned. No consensus among modern Presidents has crystallized. Indeed, rather
than denying the
authority of Congress to act in this area, some modern Presidents, like their predecessors, have acknowledged the
constitutionality of legislative regulation. They have therefore concentrated their efforts on making effective use of other presidential
authorities and institutional [*949] advantages to shape military matters to their preferred design. n11 In sum, there has been much less executive
assertion of an inviolate power over the conduct of military campaigns than one might think. And, perhaps most importantly, until recently
there has been almost no actual defiance of statutory limitations predicated on such a constitutional theory.¶ This repeated,
though not unbroken, deferential executive branch stance is not, we think, best understood as evidence of the timidity of prior Commanders in
Chief. Nor do we think it is the accidental result of political conditions that just happened to make it expedient for all of these Executives to refrain from lodging such
a constitutional objection. This consistent pattern of executive behavior is
more accurately viewed as reflecting deeply rooted
norms and understandings of how the Constitution structures conflict between the branches over war. In
particular, this well-developed executive branch practice appears to be premised on the assumption that the
constitutional plan requires the nation's chief commander to guard his supervisory powers over the military chain of command jealously, to be willing to act in times
of exigency if Congress is not available for consultation, and to use the very powerful weapon of the veto to forestall unacceptable limits proposed in the midst of
military conflict - but that otherwise, the
Constitution compels the Commander in Chief to comply with legislative
restrictions .¶ In this way, the founding legal charter itself exhorts the President to justify controversial military
judgments to a sympathetic but sometimes skeptical or demanding legislature and nation, not only for the sake of liberty, but also for effective and
prudent conduct of military operations. Justice Jackson's famous instruction that "with all its defects, delays and inconveniences, men have discovered no technique
for long preserving free government except that the Executive be under the law, and that the law be made by parliamentary deliberations" n12 continues to have a
strong pull on the constitutional imagination. n13 What
emerges from our analysis is how much pull it seemed to [*950] have
on the executive branch itself for most of our history of war powers development.
AT Off-Case Arguments
AT Topicality – “Domestic”
2AC Frontline
1) We meet – we are domestic surveillance. The plan curtails domestic surveillance
— it’s the biggest aff on the topic. Here’s contextual evidence.
RT 15 — RT USA—a Russian English-language news publication, 2015 (“Bipartisan bill would repeal
Patriot Act, cut down American surveillance,” March 25th, Available Online at http://rt.com/usa/243745bill-repeal-patriot-act-surveillance/, Accessed 06-20-2015)
The bipartisan Surveillance State Repeal Act, if passed, would repeal dragnet surveillance of Americans’ personal
communications, overhaul the federal domestic surveillance program, and provide protections for
whistleblowers. House lawmakers Mark Pocan (D-Wis.) and Thomas Massie (R-Ky.) are co-sponsoring bill H.R.1466, which was introduced on Tuesday and
would repeal the 2001 Patriot Act, limit powers of the FISA Amendments Act, and prohibit retaliation against federal national security whistleblowers, according to
The Hill. “The
Patriot Act contains many provisions that violate the Fourth Amendment and have led to a
dramatic expansion of our domestic surveillance state ,” said Rep. Massie in a statement. "Our Founding Fathers fought and
died to stop the kind of warrantless spying and searches that the Patriot Act and the FISA Amendments Act authorize. It is long past time to repeal the Patriot Act and
the bill would revoke all the powers of the Patriot Act, and
instruct the Director of National Intelligence and the Attorney General to destroy any information
collected under the FISA Amendments Act concerning any US person not under investigation. It would repeal
reassert the constitutional rights of all Americans.” Specifically,
provisions of the FISA Amendments Act to ensure surveillance of email data only occurs with a valid warrant based on probable cause. The bill would also prohibit
the government from mandating that manufacturers build mechanisms allowing the government to bypass encryption in order to conduct surveillance. Additionally,
the bill would protect a federal whistleblower’s efforts to expose mismanagement, waste, fraud, abuse, or criminal behavior. It would also make retaliation against
anyone interfering with those efforts – such as threatening them with punishment or termination – illegal. “Really, what we need are new whistleblower protections so
that the next Edward Snowden doesn’t have to go to Russia or Hong Kong or whatever the case may be just for disclosing this,” Massie said. There have been
previous attempts to limit dragnet surveillance under the Patriot Act since former National Security Agency analyst Edward Snowden leaked information regarding
the programs in 2013, but the Senate bill introduced in 2013 never reached the floor for a vote. “ The
warrantless collection of millions of
personal communications from innocent Americans is a direct violation of our constitutional right to
privacy,” said Rep. Pocan in a statement. “Revelations about the NSA’s programs reveal the extraordinary extent
to which the program has invaded Americans’ privacy . I reject the notion that we must sacrifice liberty for security – we can live in
a secure nation which also upholds a strong commitment to civil liberties. This legislation ends the NSA’s dragnet surveillance
practices, while putting provisions in place to protect the privacy of American citizens through real and
lasting change.”
2) Counter-definition:
A) Domestic means “occurring within the United States”
Congressional Bills 105th Congress, S.2617, 1998, http://www.gpo.gov/fdsys/pkg/BILLS105s2617is/html/BILLS-105s2617is.htm
(2) Domestic.--The term `domestic' means
within the territorial jurisdiction of the United States.
B) “Domestic surveillance” must collect information from within the United States
Sladick 12 – Kelli Sladick, Blogger at the Tenth Amendment Center, “Battlefield USA: The Drones are
Coming”, Tenth Amendment Center, 12-10, http://blog.tenthamendmentcenter.com/2012/12/battlefieldusa-the-drones-are-coming/
In a US leaked document, “Airforce Instruction 14-104”, on domestic surveillance is permitted on US
citizens. It defines domestic surveillance as, “any imagery collected by satellite (national or commercial)
and airborne platforms that cover the land areas of the 50 United States, the District of Columbia, and the
territories and possessions of the US, to a 12 nautical mile seaward limit of these land areas.” In the
leaked document, legal uses include: natural disasters, force protection, counter-terrorism, security
vulnerabilities, environmental studies, navigation, and exercises.
C) The Foreign-to-foreign surveillance of NSA surveillance occurs within the US
RICHARD HENRY SEAMON, Professor, University of Idaho College of Law, “Domestic
Surveillance for International Terrorists: Presidential Power and Fourth Amendment Limits”, Hastings
Law Quarterly, Vol. 35:3 Spring 2008,
http://www.hastingsconlawquarterly.org/archives/V35/I3/seamon.pdf
As discussed above, the
Protect America Act of 2007 "clarifies" that FISA's definition of "electronic surveillance"
excludes "surveillance directed at a person reasonably believed to be located outside of the United
States.216 The primary purpose is to free the government from having to get a traditional FISA warrant to intercept
communications between people overseas.217 Under the analysis proposed here, this provision supports both the President's
power to intercept foreign-to-foreign communications through warrantless surveillance inside the United
States , and the reasonableness of such interception for Fourth Amendment purposes. The Protect America Act does not grant surveillance
power to the President; instead, it implicitly recognizes that the President has such power independently of any statutory grant. It does so by
lifting FISA's restrictions on the President's exercise of surveillance authority when directing electronic surveillance at people outside the U.S. In
light of the
3)
Your violation is wrong - FISA domestic vs. foreign espionage distinction is
flawed. And NSA analysts target US citizens both in initial data collection and
reverse targeting.
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
The Article next turns to statutory issues related to targeting, post-targeting analysis, and the retention and dissemination of information. It argues that
the NSA
has sidestepped FAA restrictions by adopting procedures that allow analysts to acquire information not just to or from, but also "about" targets. In its foreignness
assumes, absent evidence to the contrary, that the target is a non-U.S. person
located outside domestic bounds . And weak standards mark the foreign intelligence purpose
determination . Together, these elements allow for the broad collection of U.S. persons' international
communications, even as they open the door to the interception of domestic communications. In regard
to post-targeting analysis, the Article draws attention to the intelligence community's use of U.S. person
information to query data obtained under Section 702, effectively bypassing protections Congress
introduced to prevent reverse targeting. The Article further notes in relation to retention and dissemination that increasing consumer and
determination the agency
industrial reliance on cryptography means that the NSA's retention of encrypted data may soon become the exception that swallows the rule.
4) Our Interpretation is superior:
A) Their FISA definition is a flawed framework – it does not envision SQ bulk data
collection
William C. Banks 2009, “Responses to the Ten Questions,” 35 WM. MITCHELL L. REV. 5007, 5012,
pp. LN, KEL
For a long time, the process worked well as a mechanism to regulate surveillance of known intelligence targets. The FISA process and its
eventual orders have always been limited, however. FISA was concerned with "acquisition," not with the uses the Government might have for
what is collected. FISA also assumed that officials know where the target is and what "facilities" he will use for his communications. Knowing
this much enabled the Government to demonstrate the required "probable cause" to believe that the target was an agent of a foreign power, or
more recently, a lone wolf. FISA
did not authorize intelligence collection for the purpose of identifying the
targets of surveillance, by collecting aggregate communications traffic and then identifying the
surveillance target. In other words, FISA envisioned case-specific surveillance, not a generic surveillance
operation, and its approval architecture was accordingly geared to specific, narrowly targeted
applications. FISA was also based on the recognition that persons lawfully in the United States have constitutional privacy and free
expression rights that stand in the way of unfettered [*5009] government surveillance.
B) Ground – they exclude the only predictable NSA aff on the topic, making affs run
to the margins of the topic to find small affs that are unpredictable and worse for
neg ground – we are best for neg ground
5) No ground loss for the negative – even if we are extra-topical this is an example of
it benefiting the negative – we supercharge their links by requiring a warrant for
ANY surveillance
6) But we aren’t extra topical
Jon Henke, Director of DigitalSociety.org, a tech policy think tank, and Arts+Labs, a technology policy
coalition defending the future of the digital economy, “CENSURE LIES, CENSURE MYTHS”, March
2006, http://qando.net/details.aspx?Entry=3611
Tom clearly is operating from his own unique set of definitions. For example, he seems to think that
"domestic surveillance" means "calls wherein both participants are within the United States" — which is
simply incorrect and at direct variance with the language of FISA.
7) Prefer reasonability – competing interpretations justifies “everything except the
aff” which we can’t generate offense against
We Meet – domestic Surveillance Ext
The plan dramatically curtails domestic surveillance under all relevant legal
authorities.
Williams 15 — Lauren C. Williams, Technology Reporter for ThinkProgress who covers consumer
privacy, cybersecurity, tech culture, and the intersection of civil liberties and tech policy, holds a master’s
in journalism from the University of Maryland, 2015 (“House Members Move To Repeal The Patriot Act
With Strongest Anti-Surveillance Bill To Date,” ThinkProgress, March 24th, Available Online at
http://thinkprogress.org/election/2015/03/24/3638234/house-members-move-repeal-patriot-act-strongestanti-surveillance-bill-date/, Accessed 06-29-2015)
Overshadowed by congressional budget talks, Reps. Mark Pocan (D-WI) and Thomas Massie (R-KY) quietly introduced
the strongest
anti-surveillance bill to date that would strip the government of much of its spying power. “This isn’t just
tinkering around the edges, it’s a meaningful overhaul that makes sure the meaningless surveillance of
emails and cell phones are done away with ,” Pocan said in a briefing for congressional staffers Tuesday. The Surveillance State
Repeal Act, or HR 1466, aims to repeal the Patriot Act, including the controversial telephony metadata collection program, and
strip many of the surveillance permissions granted under the Foreign Intelligence Surveillance Act
amendments passed under President George W. Bush in 2008. Reps. Alan Grayson (D-FL), James McGovern (D-MA), and Lloyd Doggett (D-TX) are
original co-sponsors on the bill, which was ushered in March 19. Surveillance has been a prominent in public debate since former National Security Agency contractor
Edward Snowden’s massive document leak exposed several government intelligence programs, namely the NSA’s dragnet telephone metadata collection. But despite
public outrage over civil liberties violations and calls for immediate reform, little has been done since Snowden’s 2013 revelations. The controversial phone metadata
surveillance program was reauthorized for the fifth time under Section 215 of the Patriot Act extended until June. Other sections of the Patriot Act are also expected to
sunset this summer. In 2014, President Barack Obama announced a scaled-back surveillance program that would permit intelligence agencies to collect phone records
without storing them, and agencies could only query the data stored by a third party after getting a warrant except in true emergencies. Those queries were limited to
people who have called or been called by suspected terrorists. Revised versions of the USA Freedom Act, a counter bill to the Patriot Act introduced after the
Snowden leaks, have stalled, and only offered smaller changes. But with continued bipartisan support, HR
1466 could rekindle hope for
sweeping changes in surveillance laws. “All mass surveillance does is violate the rights and put a chilling effect on the American people,”
causing people to change their behavior because they’re afraid of government spying, said Patrick Eddington, national security and civil liberties policy analyst for the
libertarian think tank CATO Institute, at Tuesday’s meeting. The
Patriot Act, as written, is heavily contingent on Executive Order
12333, signed by President Ronald Reagan more than 30 years ago. The order has been since used as the legal justification for
some of the NSA’s surveillance programs including backdoor access to internet companies’ data centers . If
passed, the Surveillance State Repeal Act would ban the use of order 12333 and close those data access loopholes
built in to software and devices’ encryption. It would also extend greater protections to whistleblowers,
such as making it illegal to fire or retaliate against them. “This is not about Edward Snowden. If you want to talk about Edward
Snowden, we need better whistleblower protections so it doesn’t happen again,” Massie said, indicating the contractor turned whistleblower couldn’t legally have
disclosed problems with the agency to him or other Congress members.” Pocan
and Massie’s bill would upend that justification by repealing
the programs under FISA and the Patriot Act that allow indiscriminate collection and access to
Americans’ communications . For example, HR 1466 would repeal the amendment that permits email
harvesting, with few exceptions, and make it illegal to survey individuals without a warrant and
probable cause. The bill also mandates domestic surveillance programs be monitored for compliance by
the Government Accountability Office.
Data repackaging and rerouting means domestic communication travels over
foreign servers, making it domestic surveillance
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
Second,
wholly domestic conversations may become swept up in the surveillance simply by nature of how
the Internet is constructed. Everything one does online involves packets of information. Every Web site, every e-mail, every transfer of documents
takes the information involved and divides it up into small bundles. Limited in size, these packets contain information about the sender's IP address, the intended
receiver's IP address, something that indicates how many packets the communication has been divvied up into, and what number in the chain is represented by the
packet in question. n182 Packet
switched networks ship this information to a common destination via the most
expedient route--one that may, or may not, include the other packets of information contained in the message. If a roadblock or problem
arises in the network, the packets can then be re-routed, to reach their final destination. Domestic messages may thus be
routed through international servers, if that is the most efficient route to the final destination. What this
means is that even if the NSA applies an IP filter to eliminate communications that appear to be within
the United States, it may nevertheless monitor domestic conversations by nature of them being routed
through foreign servers. In this manner, a student in Chicago may send an e-mail to a student in Boston
[*164] that gets routed through a server in Canada. Through no intent or design of the individual in
Chicago, the message becomes international and thus subject to NSA surveillance.
FISA Definitions are Flawed Ext.
FISA is a bad framework for understanding electronic surveillance
William C. Banks 2009, “Responses to the Ten Questions,” 35 WM. MITCHELL L. REV. 5007, 5012,
pp. LN, KEL
It is widely understood that the
political dynamics that led to the enactment of the Foreign Intelligence Surveillance Act (FISA) in
1978 were unique, and that the inter-branch compromises reached then authorized the means for
electronic collection of foreign intelligence that served the Nation well for many years. The basic idea was simple:
the Government can conduct intrusive electronic surveillance of Americans or others lawfully in the United States without traditional probable cause to believe that
they had committed a crime, if it could demonstrate to a special Article III court that it had a different kind of probable cause: reason to believe that they are acting on
behalf of foreign powers. Since
then, critics argue that the basic patchwork-like architecture of FISA became too
rigid, too complicated, and too unforgiving to enable effective intelligence responses to crises . Would-be targets
of surveillance are communicating in ways that stress or evade the FISA system (when, for example, the location of the target is difficult or impossible to determine).
Because of switching technology, collection inside the United States is now often the best or only way to acquire even foreign-to-foreign communications.
Furthermore, powerful
computers and data mining techniques now permit computers to select potential
surveillance targets from electronic databases of previously unimaginable size. The wholesale quality of
such computer collection and data mining is incompatible with the retail scope of the original FISA
process. At the same time, more Americans than ever are engaged in international communications and there is
far [*5008] greater intelligence interest in communications to and from Americans. Both circumstances
increase the likelihood that the Government will be intercepting communications of innocent Americans,
raising as many questions about the adequacy of the FISA safeguards, as about the adaptability of FISA
architecture. This tension forms the context for a series of post-1978 amendments to FISA, culminating in the FISA Amendments Act of 2008 (FAA), which
this essay examines.
Their interpretation is wrong – FISA says persons targeted in the US for
surveillance is done for the purpose of foreign intelligence
William C. Banks 2009, “Responses to the Ten Questions,” 35 WM. MITCHELL L. REV. 5007, 5012,
pp. LN, KEL
Until the 2008 amendments, FISA
governed the electronic surveillance of persons in the United States for the
purpose of collecting foreign intelligence . (FISA did not apply to surveillance conducted outside the
United States, or to foreign-to-foreign telephone communications intercepted within the United States.)
FISA "probable cause" required that targets of the surveillance had to be a "foreign power," an "agent of a foreign power," or, since 2004, a "lone
wolf" terrorism suspect. Applications had to specify "facilities" where the surveillance would be directed and provide "minimization" procedures
to assure that the "acquisition" of collected information would not be disseminated or retained outside authorized bounds. A special court that
meets in secret was created to hear requests for orders to conduct the surveillance.
NSA interpretation of FISA is the problem, not the letter of the law – your
interpretation doesn’t account for this.
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
Section 702 places four limitations on acquisition, each of which is meant to restrict the amount of
information that can be obtained by the government. n166 The NSA has sidestepped these statutory
restrictions in three important ways : first, it has adopted procedures that allow analysts to acquire
information "about" selectors (that is, communications modes used by targets) or targets, and not merely communications to or from
targets (or selectors employed by targets), or information held by targets themselves. Second, it has created a presumption of non-U.S. person
status: That is, if an individual is not known to be a U.S. person (and thus exempted from Section 702 and treated either under Sections 703
As aforementioned,
then the NSA assumes that the individual is a non-U.S. person. Third,
the NSA has failed to adopt standards that would require it to ascertain whether a target is located within
domestic bounds. Instead, the agency, having looked at the available evidence, absent evidence to the contrary, assumes that
the target is located outside the United States. These interpretations work together to undermine
Congress's addition of Sections 703 and 704, even as they open the door to more extensive collection of
domestic communications. In 2008 Congress anticipated that U.S. person information would inadvertently be collected under Section 702. This is in part why it included
and 704 or under traditional FISA, depending on the location),
minimization procedures, as well as limits on what could be collected. Most Members, however, do not appear to have contemplated broad, programmatic collection that would undermine
protections introduced in Sections 702 and 703. n167 Those who did articulate this possibility voted against the bill. [*159] Even if Congress did not initially appreciate the potential for
programmatic collection, however, certainly by 2012 the intelligence community had made enough information available to Congress for Members to make an informed decision. This does not
mean that all Members were fully informed. But to the extent that Members selected not to access the material or to take a public stand on the matter, particularly in light of the legislature's
FISC realized the
implications of the NSA's interpretation of to, from or about (TFA) collection. However, in light of the seriousness
of the NSA's aim (protecting national security), and the limitations imposed by the types of technologies being used,
the Court read the statute in a manner that found the targeting procedures to be consistent with the statute.
reading of its authorities with regard to classification, fault lies with Congress. The Foreign Intelligence Surveillance Court failed to step into the gap. In 2011,
Domestic v Foreign Distinction Flawed Ext
Their domestic vs. foreign intelligence distinction is flawed – Status quo data
collection makes the distinction meaningless
William C. Banks 2009, “Responses to the Ten Questions,” 35 WM. MITCHELL L. REV. 5007, 5012,
pp. LN, KEL
Second, the Attorney General submits classified procedures to the FISC by which the Government will determine that acquisitions conducted
under the program meet the program targeting objectives and satisfy traditional FISA minimization procedures. After a judge approves the
program features, executive branch officials authorize the surveillance and issue directives compelling communications carriers to assist.
Although details of the implementation of the program authorized by the FAA are not known, a best
guess is the Government uses a broad vacuum cleaner-like first stage of collection, focusing on
transactional data, where wholesale interception occurs following the development and implementation of filtering criteria. Then the
NSA engages in [*5015] a more particularized collection of content after analyzing mined data. Although
traditional FISA orders are still required for "intentional acquisition" of domestic communications,
accidental or incidental acquisition of U.S. persons inside the United States surely occurs, especially in
light of the difficulty of ascertaining a target's location. Nor do the minimization rules require the
Government to discard communications of U.S. persons incidentally collected when the Government is
targeting someone abroad. NSA may decide to retain any communications that constitute foreign
intelligence, and there is no review of the NSA decisions.
Modern technologies make determining domestic vs. foreign impossible
William C. Banks 2009, “Responses to the Ten Questions,” 35 WM. MITCHELL L. REV. 5007, 5012,
pp. LN, KEL
A third problematic feature of the FAA is, ironically, that the legislation follows the thirty-year FISA
model of focusing on targets and their location for the purposes of authorizing and conditioning
surveillance and data collection. With modern communications capabilities, it is not possible to tell
reliably in many cases where an individual is when a communication is made. From the Government's
perspective, the downside of relying on a target's location as a basis for conducting lawful surveillance
was softened when the PAA and FAA provided that the Government had only to reasonably believe that
the target is abroad. However, one inevitable problem with the relaxed standard is that more warrantless
surveillance of persons inside the United States will occur.
Their interpretation is wrong – modern email makes consideration of physical
location and the domestic/foreign distinction impossible to determine. Despite not
being considered legally “domestic” surveillance under FISA currently, it *should
be*
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
The same types of communications exempted from FISA, however, in the modern age of e-mail, had
begun to fall within traditional FISA. For instance, U.S. Internet Service Providers (ISPs) store e-mail
on servers in the United States. The same British subject, if she accesses her email from London (pulling
it from a server within the United States), suddenly falls within FISA--even when the e-mail she is
retrieving is sent by the same French citizen in Paris. In other words, merely by using an American ISP,
[*148] non-citizens could obtain the protections of the more rights-protective FISA framework--even
where such persons had no other ties to the United States and presented a classic foreign intelligence
threat (and would otherwise be covered by the less rigorous contours of Executive Order 12,333).
Exacerbating the problem was the difficulty of determining where the user was located--inside the
U.S. or on foreign soil--a consideration crucial to determining whether the intelligence community
must first approach FISC for an order.
FISA doesn’t define “domestic” – it allows blurring between foreign and domestic
Laura Donohue 2015, Professor of Law, Georgetown University Law Center, “SECTION 702 AND
THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT,” Harvard
Journal of Law & Public Policy, pp. LN, KEL
The FAA is largely silent about what burden must be borne by the government to establish
whether the target is a U.S. person. Instead, Section 702 directs the Attorney General to adopt targeting procedures reasonably
designed (a) to ensure acquisition is limited to persons reasonably believed to be outside U.S.; and (b) to prevent the acquisition of domestic communications. n185 In
only requires that the NSA not know (a) that the target is in the U.S.; or (b) that it is
intercepting entirely domestic communications. There is nothing in the targeting requirements
requiring intelligence agencies to take certain steps to ascertain whether the target is a U.S. person
or what must be done to ascertain the target's location
other words, the statute
The negative’s definition of “domestic surveillance” is outdated
Jonathan Masters, Deputy Editor, CFR, “U.S. Domestic Surveillance”, June 13th 2013,
http://www.cfr.org/intelligence/us-domestic-surveillance/p9763
The Bush administration maintained that the Foreign Intelligence Surveillance Act (FISA) was an outdated lawenforcement mechanism that was too time-consuming given the highly fluid, modern threat environment. Administration officials
portrayed the NSA program as an "early warning system" (PDF) with "a military nature that requires speed and agility." Moreover, the White
House stressed that the program was one not of domestic surveillance but of monitoring terrorists abroad, and publicly
referred to the operation as the "Terrorist Surveillance Program." Opponents of the program referred to it as "domestic spying." Under
congressional pressure, Gonzales announced in January 2007 plans to disband the warrantless surveillance
program and cede oversight to FISC, but questions about the legality of the program lingered in Congress and Gonzales resigned months later.
But Washington's vow to seek FISA approval for domestic surveillance was short-lived. In July 2007--weeks before Gonzales stepped down-intelligence officials pressed lawmakers for emergency legislation to broaden their wiretapping authority following a ruling by the court
overseeing FISA that impacted the government's ability to intercept foreign communications passing through telecommunications "switches" on
U.S. soil. In August, President Bush
signed the Protect America Act of 2007, which gave the attorney general and
the director of national intelligence temporary power to approve international surveillance, rather than the
special intelligence court. It also said warrants are unnecessary for surveillance of a person "reasonably believed"
to be located overseas. This six-month stopgap measure expired in early 2008, but the FISA Amendment
Act passed just months later contained similar provisions. President Obama reauthorized this legislation for five more years
in December 2012.
AT Politics DA
2AC Answers
Non-Unique: Anti-surveillance coalition is already pushing for more antisurveillance measures that go beyond USA Freedom Act, which should trigger the
link
Sara Sorcher June 8, 2015, “NSA surveillance debate gives rise to bipartisan Civil Liberties
Coalition,” Christian Science Monitor, pp. LN, KEL
Most of the privacy advocates agreed the USA Freedom Act - the bill President Obama eventually signed to end bulk collection and force the agency to collect
the data from the private sector - would be better than the straight extension of the spying authorities McConnell was proposing, but many thought it did not go far enough. So a critical
mass within the coalition formed what David Segal, executive director of progressive political activist group Demand Progress, called a "vanguard, grassroots
flank" pushing for a total sunset of the Patriot Act provisions. "We think USA Freedom is woefully insufficient at best," Mr. Segal said. Yet Segal and other
advocates acknowledged that, if the coalition could convince a swath of members in both parties to hold out for sunset, lawmakers against surveillance reform would be forced take it seriously. After all, if no compromise was reached
and the authorities were about to expire, the coalition believed - correctly - that Congress would be more likely to have USA Freedom form the compromise than a weaker surveillance reform bill. The group generated at least 600,000
e-mails to lawmakers' offices and tens of thousands of phone calls in the weeks leading up to the vote. What's more, during the intense days of the Patriot Act fight, the various segments of the groups targeted the members of Congress
naturally more receptive to their core issues. "We could lead with the Quakers, or [progressive digital rights advocacy group] Fight for the Future, or FreedomWorks - in a way that traditional coalitions of this sort just don't do,
because they are coalitions of either the left or right," Meinrath says. Each member of the coalition found allies on Capitol Hill who advocated for reforming Section 215, making for strange bedfellows in Congress. Republican
With the passage of the
USA Freedom Act behind them, the alliance is already working on a multiyear, coordinated
strategy to push Congress to continue surveillance reforms . Just last week, the House of
Representatives approved several antispying measures within a major appropriations bill - including banning the government
from forcing tech companies to place "back doors" into encrypted devices, and prohibiting the Drug Enforcement Agency from revamping a once-secret bulk call records collection program. The coalition
supported and consulted with more than 50 House lawmakers on these efforts, and is looking ahead to the
Defense Appropriations bill expected later this month as another vehicle for anti-spying amendments. "You'll
libertarians such as Senator Paul or Rep. Justin Amash found themselves in the same camp as liberal Democrats such as Sen. Ron Wyden of Oregon and Rep. Mark Pocan.
see an immediate push for amendments to appropriations bills to prevent the NSA from making use of what's called the 'back door loophole' for warrantless wiretapping of Americans," Segal said. The coalition is eyeing several
amendments, including one that would prevent the NSA from purposefully degrading the security of devices to get access to the data.
N/U: Congress is divided – strong Democrat opposition
Kakumi Kobayashi, 6-27-15, “TPP’s fate rests with Japan, U.S.,” Japan Times,
http://www.japantimes.co.jp/news/2015/06/27/business/top-problem-new-tpp-talks-will-disputes-japan-us/#.VaB-n_kpsTd, KEL
Obama said the United States needs the TPP, which would cover 40 percent of the global economy, to boost its economy and prevent China from setting the rules of
trade in the Asia-Pacific region. However, Obama
had to deal with rebellions in his Democratic Party to pass the related
bills, including the one last week that gave him trade promotion authority — which enables him to sign trade deals with only
a yes or no vote by Congress. Democrats who are critical of free trade deals because of the risk they pose to
domestic jobs blocked one of the bills, forcing the legislation to be batted back and forth between the
Senate and the House of Representatives. “It has been a roller-coaster ride,” said Mack McLarty, a former White House
chief of staff, describing the twists and turns in the congressional debates on trade, including the TPP, since a
bipartisan group of lawmakers introduced the TPA bill in April. The split in Congress apparently stoked a sense of crisis among
leading lawmakers and prompted them to call for unity in supporting Obama’s trade agenda and the TPP
itself.
TURN - Trade partners will balk to TPP because we will use it to expand NSA
surveillance of them – plan is necessary to solve those fears
Justin Ling, July 16, 2014, “The World's Next Major Trade Agreement Will Make NSA Spying Even
Easier,” Motherboard, http://motherboard.vice.com/read/the-trans-pacific-partnership-will-make-nsaspying-easier, KEL
With paranoia over NSA surveillance reaching a fever pitch , foreign governments are making a
reasonable plea: bring our data home. But the Americans are doing their best to ensure that the
world’s Internet data stays on U.S. soil, well within the reach of their spies. To do so, American
negotiators are leveraging trade deals with much of the developed world, inserting language to ensure
“cross-border data flows”—a euphemism that actually means they want to inhibit foreign governments
from keeping data hosted domestically. The trade deals they’re influencing—the Trans-Atlantic Partnership (TPP), the Trade in Services
Agreement (TiSA), and the Transatlantic Trade and Investment Partnership (TTIP)—are all so secretive that nobody but the governments themselves are privy to the
we have a pretty good idea of what’s going
on in the latest Trans-Pacific Partnership—a trade agreement that will act as a sort of NAFTA for Asia-Pacific region nations. America
is, essentially, the world’s data server. Since the dawn of the internet itself, every database of import has
been hosted in the grand US of A. But now, foreign governments are starting to see the benefit of
patriating their citizens’ private information. Canada was an early adopter of the idea. Federal procurement regulations often require
details. But thanks to the Australians and Wikileaks, both of whom have leaked details on TPP,
government departments to insert local data requirements, stating that businesses who wish to administer or host Canadians’ information must keep the information
within Canadian borders. Most recently, the Canadian Government put out a tender for a company to merge and host the email servers for all their departments. In
doing so, they stuck in a national security exemption, forbidding foreign contractors from applying. Nova Scotia and British Columbia went a step further, flatly
requiring any government-hosted personal data to be physically located in Canada. Australia has taken similar steps, including setting up firm requirements for how
companies store offshore data. But
the American government is not having any of it and is using TPP negotiations to
strong-arm new provisions that favour American hosted data.
Turn – Obama is all about his legacy, he won’t fight the plan, he’ll embrace it as his
own progressive reform
Spencer Ackerman June 3, 2015, national security editor for Guardian US. A former senior writer
for Wired, he won the 2012 National Magazine Award for Digital Reporting, “Barack Obama and
surveillance reform: a story of vacillation, caution and fear,” The Guardian,
http://www.theguardian.com/us-news/2015/jun/03/barack-obama-surveillance-reform-vacillation-cautionfear, KEL
Almost exactly two years before Barack Obama signed a bill to end the National Security Agency’s bulk
collection of US phone records, the US president defended a domestic surveillance dragnet he would later claim
credit for stopping. “You can’t have 100% security and also then have 100% privacy and zero inconvenience. You know, we’re going to
have to make some choices as a society,” Obama said on 7 June 2013, two days after the Guardian, thanks to whistleblower Edward Snowden,
The Snowden revelations began a process of classic Obama
vacillation , bringing him from public defender of domestic mass surveillance to its reluctant and
partial critic . It was a path crafted by politics, accelerated by law and fueled by fear. On 1 June 2015,
after the Senate conceded it would pass a bill ending the phone records dragnet, Obama’s spokesman
claimed full ownership of the end of a program the US president had two years before said posed mere
“modest encroachments on privacy”. “To the extent that we’re talking about the president’s legacy, I
would suspect that that would be a logical conclusion from some historians that the president ended some
of these programs,” said the White House press secretary, Josh Earnest.
began revealing the reach of US surveillance.
Reform’s popular and builds political support – lobbies, lawmakers – their evidence
doesn’t assume new changes in the political environment
Barfield, 14 (Claude Barfield, resident scholar at AEI who researches international trade policy, the
WTO, IP, and science and tech policy, and is former consultant to the Office of the US Trade
Representative, 8-6-2014, "NSA surveillance reform: A tilt toward privacy over security?-CICTP", Tech
Policy Daily, http://www.techpolicydaily.com/technology/nsa-surveillance-reform-tilt-toward-privacysecurity/, DA: 5-23-2015)
Several months ago, I predicted that in the debate over proposed NSA surveillance reform, NSA’s security defenders would ultimately hold the
line against significant changes in the current mode of operation. Traditionally,
security trumps privacy. But at this point in
time, the tide seems to be going the other way . Last week, the chairman of the Senate Judiciary Committee, Sen. Patrick
Leahy (D-VT), introduced a version of the USA Freedom Act that is far more restrictive on intelligence
agencies’ operations than any other competing bill. Surprisingly, given the deep political divisions, Leahy’s bill
seems to have swept the field. As Jodie Liu and Benjamin Wittes write in Lawfare, “It’s the bill. It represents a compromise between
the intelligence community, the administration more generally, civil liberties groups, industry, and a fairly wide range of senators. And it will be
the legislation that moves forward with the sometimes nose-holding support of most of the major parties.” What follows is a brief review of how
we got here – and the future prospects for NSA surveillance reform. One can start with President Obama’s much heralded but ultimately
noncommittal speech on NSA and FISA court reforms in January. In
his “leading from behind” mode, the president laid
down general principles but left it to Congress and various interest groups to fill in the specifics. Reactions to the
president’s speech were decidedly mixed and reflected the strong, opposing viewpoints across the security-privacy spectrum.
Then NSA Director General Keith Alexander had already publicly stated his opposition to ending the government’s control of the metadata
program. His skepticism regarding this and other elements of the administration’s proposed FISA reforms was echoed publicly by the chairmen
and ranking members of both the Senate and House Intelligence Committees. On
the other side, numerous privacy and civil
liberties organizations – the ACLU, Electronic Frontier Foundation, Center for Democracy and Technology, et. al. –
immediately clamored for legally binding, tighter restrictions on NSA/CIA/FBI surveillance activities. They
were joined by a Who’s Who of high-tech companies, including Microsoft, Google, Amazon, Yahoo, Apple, Verizon, Facebook, Twitter, and
LinkedIn. Jockeying among congressional committees provides one central focus for the narrative over the past six months. Jurisdiction over
NSA/FISA reform is split between the Intelligence and Judiciary Committees in both houses, with primary power traditionally residing in the
Intelligence Committees. Pursuant to the president’s proposals, the House Intelligence Committee began working on a bill to partially revamp
intelligence community and FISA Court procedures. But in a surprising turn of events, a competing bill from the House Judiciary Committee
developed strong bipartisan support and 163 sponsors. At that point, House Intelligence Committee leadership capitulated and entered into
negotiations with the administration and with Rep. Sensenbrenner and others on the Judiciary Committee. This in turn led to a Judiciary
Committee version of the USA Freedom Act that was revised in late negotiations to assuage concerns among both the administration and
Intelligence committee members. This bill passed the House on May 21, 303-121. Giving
evidence of how far the pendulum has
swung in recent months, however, both civil libertarian groups and high-tech companies came down hard against the
House bill as passed, and demanded further restrictions and changes in current policy and practice. This set
the stage for Senate Judiciary Chairman Leahy to seize the lead and rally a broad political coalition behind his own revised bill.
Non-Unique Ext – Dems oppose
Pelosi and Dem Leadership oppose TPP
Adam Behsudi, 6/24/15, “Trade talks approach endgame with fast track passage,” Politico,
http://www.politico.com/story/2015/06/trade-talks-approach-endgame-with-fast-track-in-reach119392.html, KEL
Ironically, Democrats in the House voted against the program’s renewal last month in an effort to stop the trade legislation, with which it was linked. But Minority
Leader Nancy Pelosi, who remained mum on the previous measure until announcing her opposition just before that vote, threw her support behind the current bill on
Wednesday, giving it a better chance of passing once the Senate sends it over. That could happen as soon as Wednesday evening if Democrats cede back post-cloture
debate time. Pelosi
shifted her focus from the fast-track debate to the actual contents of the Asia-Pacific trade
agreement in a “dear colleague” letter Wednesday morning, adding that she expected a final passage vote on the workers’ assistance reauthorization, which is
combined with trade preferences for developing countries, on Thursday. “ I’m disappointed that the TAA bill isn’t nearly as robust as
it should be in light of a trade agreement that encompasses 40 percent of the global economy,” Pelosi said,
referring to the sprawling the trans-Pacific trade deal. “While we may not all vote in the same manner on TAA, I will support its passage because it can open the door
to a full debate on TPP.” The
California Democrat and other party leaders are highly critical of the pact, expressing
concern that it doesn’t do enough to address currency manipulation, isn’t transparent and fails to protect
U.S. workers adequately from competition from cheap foreign labor, among numerous other concerns .
Non-Unique Ext -- Congress & lobbies will push for more reforms
Non-Unique - Congress will continue to push for more surveillance reforms
Yahoo News 15 — Yahoo News, Byline Scott Bomboy, 2015 (“USA Freedom Act signed, so what’s
next for NSA spying?,” Yahoo News, June 3rd, Available Online at http://news.yahoo.com/usa-freedomact-signed-next-nsa-spying-111450759.html, Accessed 06-08-2015)
Surveillance will certainly continue under other parts of the act and under other government programs designed to combat terrorism. But
the
fight in Congress may just be getting started. The New York Times says that Senator Mike Lee and Senator Pat Leahy
are moving on to targeting the government program that allows e-mails older than six months to be read by
investigators. Congressional reformers may also seek to limit the Foreign Intelligence Surveillance Act. And there
is debate in the House and Senate about other spying provisions. “Some of us don’t think USA Freedom
sufficiently ends bulk metadata collection. In fact, [the government] will still contend after the act passes that they can bulk
collect all of the websites and emails and all that content,” said Representative Thomas Massie. “Read it closely, it’s only about your
phone calls.”
Non-Unique & Turn – Symbolic victory over the Freedom Act will cause the
libertarian and liberal coalition to push for more surveillance curtailment. This
coalition is powerful and will overcome any resistance from the white house,
security agencies, and congressional leadership.
Sara Sorcher June 8, 2015, “NSA surveillance debate gives rise to bipartisan Civil Liberties
Coalition,” Christian Science Monitor, pp. LN, KEL
When the clock struck midnight on June 1, the National Security Agency's sweeping call records surveillance program ended. The expiration was a major loss for
Senate Majority Leader Mitch McConnell of Kentucky. He wanted the Patriot Act's Section 215 that authorized the spying extended without any change. But it was a
coup for Senator McConnell's fellow Republican senator from Kentucky. Sen. Rand Paul successfully stood in the way of renewing the bulk collection that vacuumed
up Americans' call data, clearing the way for Congress to pass a landmark surveillance reform bill instead. While the fight over Section 215 aired deep divisions in
Congress over surveillance practices, behind
the scenes, an unusual alliance that brought together far-left Democrats
and conservative Republicans had been fighting hard against a clean reauthorization of the Patriot Act and
in favor of surveillance reforms. Now, that coalition is celebrating the Patriot Act's brief expiration as its
first major victory - in what the group pledges will be a much longer fight to protect civil liberties in
the face of what it considers to be excessive government surveillance. "It's a real game changer," says Becky Bond, political
director of progressive activist organization Credo Action. "We found ourselves aligned fighting for the full repeal of the Patriot Act. Since we don't align
on many other issues, the mission was very focused." The loose-knit network, dubbed the Civil Liberties Coalition, spanned all corners
of the political spectrum and united groups such as Credo and conservative advocacy group FreedomWorks that are usually at odds on other hot political issues. Its
diversity is a rarity in Washington as it was focused on a single issue - ending mass surveillance - while at
the same time not seeking the limelight media attention. Some members are even reluctant to be
publicly affiliated with each other because they have such polar opposite views on issue such as
health care and economic policy . "Alone, libertarians nor progressives have not been able to make much headway," says Ms. Bond. Now, she
adds, " there's a recognition that progressive and libertarians coming together can form a very
powerful counterweight to the White House, security agencies, and even leadership in Congress
when we line up . We have some power, where people felt really powerless before."
Tech Lobby Link Turn Extensions
Tech lobbying over surveillance is a powerful influence – deep campaign finance
pockets, overcomes the fight because they can get the public behind them.
San Jose Mercury News June 8, 2015, “Privacy fight is far from over in US,” Reprinted in
Bakerfield Californian, http://www.bakersfield.com/news/opinion/2015/06/08/privacy-fight-is-far-fromover-in-us.html, KEL
Curtailing the metadata collection and increasing the transparency of surveillance programs are among a handful that have gotten traction. The
tech industry
can push for implementation of the rest. Increasingly engaged in lobbying, companies can authoritatively
argue that effective intelligence gathering does not have to trample Americans' privacy rights . The public
has yet to see evidence that the NSA's "collect it all" approach to phone records ever thwarted a terrorist.
Politicians increasingly understand that the path to the presidency runs through Silicon Valley's
pockets. A record $64 million from this region went to the 2012 presidential campaigns . Valley executives
and organizations should insist that candidates commit to preserving the fundamental right to privacy essential to Americans' personal liberty — and, by the way, an
essential factor in the industry's ability to thrive.
The tech sector loves and will push for the plan – they’re a key lobby group
Romm, 15 (Tony Romm, senior technology reporter for Politico, 1-21-2015, "Tech giants get deeper
into D.C. influence game", POLITICO, http://www.politico.com/story/2015/01/tech-lobby-apple-amazonfacebook-google-114468.html, DA: 6-2-2015)
Apple, Amazon and Facebook shelled out record amounts to influence Washington; Google posted one of
its biggest lobbying years ever; and a slew of new tech companies dipped their toes into politics for the first
time in 2014 — a sign of the industry’s deepening effort to shape policymaking in D.C. The sharp uptick
in spending reflects the tech sector’s evolution from an industry that once shunned Washington into a powerful interest
that’s willing to lobby extensively to advance the debates that matter most to companies’ bottom lines —
from clamping down on patent lawsuits to restricting NSA surveillance to obtaining more high-skilled immigration visas and green
cards. Story Continued Below “There is increasingly a sense from companies that they need to engage earlier and smarter,” said Ryan Triplette, a
Republican lobbyist for Franklin Square Group, which represents companies like Apple and Google. “They began opening up their view as their
businesses have grown … and not just looking at traditional technology issues.” Apple, which mostly avoided D.C. under the watch of late
CEO Steve Jobs, grew its lobbying balance sheet to just over $4.1 million last year from $3.3 million in 2013, according to an
analysis of lobbying reports, the latest of which were filed midnight Tuesday. The iPhone giant recently has shown a greater willingness to
engage Washington under CEO Tim Cook: It even dispatched executives to Capitol Hill in September to talk about its new smart watch and
health tracking tools hoping to assuage lawmakers’ fears about the new technology’s data-tracking abilities. Amazon’s
lobbying
expenses — more than $4.7 million, up from around $3.5 million in 2013 — correspond with the company’s own
Washington makeover. The e-commerce giant last year jumped into new lines of business, expanding its pursuit of government contracts
while eyeing a new drone delivery service, prompting it to hire a slew of new lobbyists and move to a bigger downtown D.C. office. Amazon is
also fighting the Federal Trade Commission over how it handled app purchases made by kids. Apple, Amazon and Google declined to comment
on the record. Facebook did not reply to a request for comment. For all their efforts, these tech giants failed to advance their political priorities in
the last Congress — but the fights are sure to return in 2015 under the Republican-majority Congress. GOP leaders in
both chambers have already promised to revive the debate over patent litigation reform — a critical issue for tech companies like Google that
want to curb lawsuits from so-called patent trolls. There’s also talk of boosting the number of foreign high-skilled workers, something industry
titans have coveted as part of broader immigration reform. The looming expiration of key Patriot Act surveillance authorities means Congress
must also wade back into the fight over what data the NSA can collect — a major issue for tech
companies stung by Edward Snowden’s leaks about the agency’s spying via popular Internet services. And lawmakers are plugging
into new issues like drones and wearable technology that are important to Silicon Valley. “No doubt, Internet and tech companies are
a bigger and more important part of the economy — period. It’s natural they’re going to be more involved in the
political process,” said Ed Black, president of the Computer and Communications Industry Association, a trade group whose members
include Amazon, Facebook and Google. “There’s been a growing realization that not only do tech companies have to be in there [in D.C.], to
make a fair pitch, they have to be more actively involved because they have to fight off hostile efforts.“ Google is the leader of the tech pack
when it comes to lobbying: The company, which until October owned Motorola Mobility, spent more than $17 million in 2014 — its secondmost expensive year after 2012, when it battled back a federal antitrust investigation. The search giant’s D.C. operation, led by former GOP Rep.
Susan Molinari, relocated last year to a new, sprawling 54,000-square-foot office steps from the Capitol. Facebook, for its part, spent more than
$9.3 million in 2014, up from $6.4 million in 2013. The company’s most recent lobbying report points to its work on privacy and security issues
along with Internet access and trade, as Facebook aims to expand its service worldwide and avoid foreign rules that might restrict where it stores
user data. Companies like Belkin, a major player in the emerging sector of connected home devices, and Snapchat, an app for disappearing photo
messages, each registered their first-ever lobbyists last year. Snapchat hired its new consultants from the firm Heather Podesta + Partners after a
major data breach registered on Washington’s radar. Other prominent tech companies retained new help, as well. Netflix grew its lobbying roster
amid the fight at the FCC over net neutrality. And Uber added D.C. lobbyists to win new allies for its ride-hailing app, which has triggered fights
with state and local regulators and cab operators nationwide. And a
coalition of tech titans like Apple, Google and
Microsoft banded together to invest in an anti-NSA snooping coalition, Reform Government Surveillance, which spent
$230,000 in 2014. Many of those companies’ executives regularly traveled to Washington to press President Barack
Obama on surveillance reforms, and the group ran frequent advertisements highlighting the need for more NSA transparency.
Online industry has tremendous lobbying clout – has proven success
Business Pundit April 26, 2011, “10 of the Biggest Lobbies in Washington,”
http://www.businesspundit.com/10-of-the-biggest-lobbies-in-washington/, KEL
Over the past 15 years, the tech industry has become one of the big spenders in lobbying, doling out over
$120 million in 2010. With the power of tech giants Google, Apple, Amazon, and Microsoft behind it, the
computer and Internet lobby has a lot of weight to throw around. By weight, we mean money: In 2010, Microsoft alone
spent over $6.9 million in federal lobbying efforts. The tech lobby’s priorities include trying to lower corporate tax rates and pass cybersecurity legislation. In the last few
years, tech industry heavy-hitters and activists have found themselves at odds with communication companies and governing bodies like the FCC over the issue of Net Neutrality. In the summer of 2010,
Google brokered a deal with Verizon that seemed an abrupt about-face from its former stance. Meanwhile, the
House has gridlocked a bill by the FCC that would regulate ISPs and give them authority to step into
disputes; more evidence of the tech lobby, hard at work.
Google is a powerhouse lobbying group with proven success and influence who
supports our plan
Tom Hamburger and Matea Gold April 12, 2014, “Google, once disdainful of lobbying, now a
master of Washington influence,” Washington Post, http://www.washingtonpost.com/politics/howgoogle-is-transforming-power-and-politicsgoogle-once-disdainful-of-lobbying-now-a-master-ofwashington-influence/2014/04/12/51648b92-b4d3-11e3-8cb6-284052554d74_story.html, KEL
The behind-the-scenes machinations demonstrate how Google — once a lobbying weakling — has come
to master a new method of operating in modern-day Washington, where spending on traditional
lobbying is rivaled by other, less visible forms of influence. That system includes financing sympathetic
research at universities and think tanks, investing in nonprofit advocacy groups across the political
spectrum and funding pro-business coalitions cast as public-interest projects. The rise of Google as a top-tier
Washington player fully captures the arc of change in the influence business. Nine years ago, the company opened
a one-man lobbying shop, disdainful of the capital’s pay-to-play culture. Since then, Google has soared to near the top of the city’s
lobbying ranks, placing second only to General Electric in corporate lobbying expenditures in 2012 and fifth place in 2013. The
company gives money to nearly 140 business trade groups, advocacy organizations and think tanks ,
according to a Post analysis of voluntary disclosures by the company, which, like many corporations, does not reveal the size of its donations. That’s double the
number of groups Google funded four years ago. This summer, Google will move to a new Capitol Hill office, doubling its Washington space to 55,000 square feet —
Google’s increasingly muscular Washington presence matches its expanded
needs and ambitions as it has fended off a series of executive- and legislative-branch threats to
regulate its activities and well-funded challenges by its corporate rivals. Today, Google is working to preserve its rights
to collect consumer data — and shield it from the government — amid a backlash over revelations that the National Security
roughly the size of the White House.
Agency tapped Internet companies as part of its surveillance programs. And it markets cloud storage and other services to federal departments, including intelligence
agencies and the Pentagon.
Google can appeal in a bipartisan manner
Tom Hamburger and Matea Gold April 12, 2014, “Google, once disdainful of lobbying, now a
master of Washington influence,” Washington Post, http://www.washingtonpost.com/politics/howgoogle-is-transforming-power-and-politicsgoogle-once-disdainful-of-lobbying-now-a-master-ofwashington-influence/2014/04/12/51648b92-b4d3-11e3-8cb6-284052554d74_story.html, KEL
As Google’s lobbying efforts have matured, the company has worked to broaden its appeal on both
sides of the aisle . Executive Chairman Eric Schmidt is a well-known backer of President Obama and advises the White House. Google’s
lobbying corps — now numbering more than 100 — is split equally, like its campaign donations, among
Democrats and Republicans. Google executives have fostered a new dialogue between Republicans and
Silicon Valley, giving money to conservative groups such as Heritage Action for America and the Federalist Society. While also supporting
groups on the left, Google has flown conservative activists to California for visits to its Mountain View campus and a stay at the Four Seasons Hotel. The
company has also pioneered new and unexpected ways to influence decision-makers, harnessing its vast
reach. It has befriended key lawmakers in both parties by offering free training sessions to Capitol Hill
staffers and campaign operatives on how to use Google products that can help target voters.
AT Elections DA
Anti-surveillance coalition will impact the election – will force GOP compliance with
new measures – their push for more reform is inevitable
Sara Sorcher June 8, 2015, “NSA surveillance debate gives rise to bipartisan Civil Liberties
Coalition,” Christian Science Monitor, pp. LN, KEL
The coalition is also looking ahead to 2017. That's the expiration data the Patriot Act's Section 702, a provision that allows the collection of
foreign data but Mr. Snowden's revelations showed also sucked up Americans' e-mails and chats without a warrant. The coalition is working with lawmakers on
amendments to effectively defund the spying practices by stipulating no money be allocated toward them. "We don't have to wait until 2017 to wait for Section 702 to
expire to demand attention for greater reforms," Withrow said. "All we have to do is keep on encouraging them, and letting them know there's a grassroots
constituency outside the beltway that has their back." Some
in the coalition are working with lawmakers on various strategies
to create an oversight and investigation panel, analogous to the Church and Pike Committees of the 1970s, to vet the totality of
surveillance activities in the post-9/11 era. Others want to see Congress debate whether Director of National Intelligence James Clapper
should keep his job - who, depending on who you ask, either lied or misspoke when he testified the NSA does not wittingly collect data on millions of Americans.
All this, too, could have an impact in election season . FreedomWorks, for instance, generated 10,000 phone
calls from conservatives in the weeks leading up to the Patriot Act vote to ensure McConnell heard from the right wing of his
party that a clean reauthorization was "absolutely unacceptable" and "toxic to him, his party, and allies," says Withrow. Now that the group knows
its base is energized on the issue of privacy, it won't stop there . FreedomWorks also has a political
action committee that raises money for and endorses Republican candidates - and plans to call out
conservatives who are, in its view, failing on surveillance and civil liberties issues. "We need to make sure conservatives are
aware of which Republicans are good on this issue," Withrow says, "and which are bad."
Income inequality, not surveillance, will the shape the entire political debate for the
2016 Presidential elections and far beyond.
Walsh, 7-6-15 [Tom, business columnist for the Detroit Free Press, former member of Board of
Governors, Society of American Business Editors and Writers, former Jefferson Fellow on Pacific Rim
Studies at the East-West Center, “America is prosperous: Now can we make people feel it?,” Detroit Free
Press, 7-6-2015, http://www.freep.com/story/money/business/columnists/tomwalsh/2015/07/06/economy-strength-inequality-obama-income-hopefuls/29555241/]
The U.S. stands tall atop an otherwise skittery world economy — with Detroit and Michigan generating some of the
strongest data points on rising car and truck sales and consumer sentiment. Yet alongside the momentum lurks nagging
anxiety that the economic lives of most U.S. citizens is not improving. Income inequality is increasingly
pronounced as the nation's wealthiest reap gains while wages of the trailing 90% are stagnant. These dueling trends are
already shaping the political narrative heading into the 2016 U.S. elections. Some Republican presidential
hopefuls, realizing they can't argue credibly that America's economy is weak — or that President Barack Obama
is to blame — are talking more like Democrats, asking why the middle class is being left behind while elites
are prospering. The risk in ignoring that issue, even as the U.S. outperforms around the globe, is frustration rooted
in the prosperity gap that can spark recurring unrest — Occupy Wall Street; Baltimore; Ferguson, Mo. —
here at home. Nancy Kaffer: How many more must die before we act? "I think this is not just a 2016 political debate, I
think this is the political debate for the next 10, 20 years because it’s hard to have a democracy when
people's income is going down," said Lou Glazer, president of the Michigan Future think tank.
AT Terrorism DA
2AC Frontline
No link - PRISM is not critical to stopping terrorism – The cases are overblown and
there’s no reason why warrantless surveillance is key. Traditional police procedures
solved these threats.
Julian Sanchez June 28, 2013, Sr Fellow at CATO on tech, privacy, and civil liberties, “Epstein on
NSA (Again) Part I: PRISM & the FISA Amendments Act,” CATO Institute,
http://www.cato.org/blog/epstein-nsa-again-part-i-prism-fisa-amendments-act, KEL
Finally, Epstein
and Loyola rather uncritically repeat the claim that the PRISM program surveillance
pursuant to FAA authorities “is responsible for foiling about 40 of the 50 terrorist plots which the administration
recently disclosed to Congress in classified briefings.” If we scrutinize the government’s claims a bit more closely, we see that in fact NSA Director Keith Alexander
claimed that PRISM intercepts had “contributed” to the disruption of 40 of 50 terrorist “events,” mostly overseas, and judged this contribution to have been “critical”
we examine some of the specific “events” government officials have discussed,
however, it becomes clear that not all of these are “plots” at all—many seem to have involved funding or
other forms of “material support” for radical groups, though in at least one such case the government
appears to have claimed a “plot” to bomb the New York Stock Exchange where none really existed. (FBI
in 50 percent of these cases. When
Deputy Sean Joyce further told Congress that the “plot” must have been serious given that a jury convicted the plotters. But federal prosecutors themselves
emphasized that the men “had not been involved in an active plot” and there was no jury trial: they were charged with “material support” and pled guilty.)
Presumably at least some of these “events” did involve actual planned attacks, but knowing that PRISM
surveillance was “critical” to disrupting half of them doesn’t in itself tell us much. The question is
whether the same surveillance could have been conducted in these cases using authorities that
existed before the FISA Amendments Act , or under narrower amendments to FISA. Since the bulk of these “events”
appear to have been overseas, the traditional authority to intercept purely foreign communications without
a warrant would seem to have sufficed, or at most required a legal tweak to accommodate stored data on
U.S. servers used by foreigners to communicate with other foreigners. There is no evidence to suggest
that the actually controversial part of the FAA—the revocation of the warrant requirement for
interception of U.S.-to-foreign wire communications—made a necessary contribution in these cases .
Indeed, as national security expert Peter Bergen has documented, the public record in the overwhelming majority of terror plots we
know about shows that they were “uncovered by traditional law enforcement methods, such as the use of informants, reliance on
community tips about suspicious activity and other standard policing practices.”
Turn: US-EU relations are key to solve terrorism – NSA surveillance undermines
that
Kristin Archick, Dec 1, 2014, Specialist in European Affairs, “US-EU Cooperation against Terrorism,”
Congressional Research Service, https://www.fas.org/sgp/crs/row/RS22030.pdf, KEL
As part of the EU’s efforts to combat terrorism since September 11, 2001, the EU made improving law
enforcement and intelligence cooperation with the United States a top priority. The previous George W. Bush
Administration and many Members of Congress largely welcomed this EU initiative in the hopes that it would help root out
terrorist cells in Europe and beyond that could be planning other attacks against the United States or its
interests. Such growing U.S.-EU cooperation was in line with the 9/11 Commission’s recommendations
that the United States should develop a “comprehensive coalition strategy” against Islamist terrorism,
“exchange terrorist information with trusted allies,” and improve border security through better international cooperation. Some measures in the resulting Intelligence
Reform and Terrorism Prevention Act of 2004 (P.L. 108-458) and in the Implementing Recommendations of the 9/11 Commission Act of 2007 (P.L. 110-53) mirrored
these sentiments and were consistent with U.S.-EU counterterrorism efforts, especially those aimed at improving border controls and transport security. U.S.-EU
cooperation against terrorism has led to a new dynamic in U.S.-EU relations by fostering dialogue on law
enforcement and homeland security issues previously reserved for bilateral discussions with individual
EU member states. Despite some frictions, most U.S. policy makers and analysts view the developing partnership with the EU in these areas as positive.
Like its predecessor, the Obama Administration has supported U.S. cooperation with the EU in the fields of counterterrorism, border controls, and transport security.
At the November 2009 U.S.-EU Summit in Washington, DC, the two sides reaffirmed their commitment to work together to combat terrorism and enhance
cooperation in the broader JHA field. In June 2010, the United States and the EU adopted a “Declaration on Counterterrorism” aimed at deepening the already close
U.S.-EU relationship and highlighting the commitment of both sides to combat terrorism within the rule of law. In June 2011, President Obama’s National Strategy for
Counterterrorism asserted that in addition to working with European allies bilaterally, “the United States will continue to partner with the European Parliament and
European Union to maintain and advance CT efforts that provide mutual security and protection to citizens of all nations while also upholding individual rights.” The
EU has also been a key U.S. partner in the 30-member Global Counterterrorism Forum, founded in September 2011 as a multilateral body aimed at mobilizing
resources and expertise to counter violent extremism, strengthen criminal justice and rule of law capacities, and enhance international counterterrorism cooperation. 12
Recently, U.S. and EU officials have been discussing ways to combat the foreign fighter phenomenon given increasing concerns that both European and American
Muslims are being recruited to fight with Islamist groups in Syria and Iraq. U.S. policy makers, including some Members of Congress, have expressed worries in
particular about such foreign fighters in light of short-term visa-free travel arrangements between the United States and most EU countries. In early July 2014, U.S.
Attorney General Eric Holder asserted, “We have a mutual and compelling interest in developing shared strategies for confronting the influx of U.S. and Europeanborn violent extremists in Syria. And because our citizens can freely travel, visa-free ... the problem of fighters in Syria returning to any of our countries is a problem
for all of our countries.” 13 In September 2014, the White House noted that U.S. officials from the Department of Justice and the Department of Homeland Security
are “working closely” with EU counterparts to “address a wide range of measures focused on enhancing counter-radicalization, border security, aviation security, and
some challenges remain in the evolving
U.S.-EU counterterrorism relationship. Among the most prominent are long-standing data privacy
and data protection concerns, which have long complicated a range of U.S.-EU informationsharing agreements and have received renewed attention in the wake of the unauthorized
disclosures since June 2013 of U.S. National Security Agency (NSA) surveillance activities . Other issues that have led to periodic
information sharing” to address potential threats posed by foreign fighters. 14 Nevertheless,
tensions include detainee policies, differences in the U.S. and EU terrorist designation lists, and balancing measures to improve border controls and border se curity
with the need to facilitate legitimate transatlantic travel and commerce.
The plan solves without jeopardizing counter-terrorism. Targeted investigations of
specific people are still authorized.
Buttar 15 — Shahid Buttar, Executive Director of the Bill of Rights Defense Committee, Director of
Civil Rights Enforcement in the Green Shadow Cabinet—a civic organization whose membership
includes prominent scientists, community and labor leaders, physicians, cultural workers, and veterans
and which provides progressive analysis of government policies and alternative policy recommendations,
incoming Director of Grassroots Advocacy for the Electronic Frontier Foundation, former Associate
Director of the American Constitution Society for Law & Policy, serves on the advisory bodies of the
Rights Working Group, the National Coalition to Protect Civil Freedoms, the National Campaign to
Restore Civil Rights, and South Asian Americans Leading Together, 2015 (“Back to Square One on
Spying,” Green Shadow Cabinet, March 26th, Available Online at
http://greenshadowcabinet.us/statements/back-square-one-spying, Accessed 06-20-2015)
By repealing the twin pillars of the surveillance dragnet, the SSRA would essentially shift the burden of
proof , forcing intelligence agencies like the NSA and FBI to justify the expansion of their powers from a
constitutional baseline, rather then the illegitimate status quo. Most policymakers forget the 9/11
commission’s most crucial finding: the intelligence community's failures that enabled the 9/11 attacks
were not failures of limited data collection, but rather failures of data sharing & analysis. Over the last 15
years, Congress has allowed the agencies to expand their collection capacities, solving an imaginary
problem while creating a host of real threats to US national security far worse than any act of rogue
violence: the specter of state omniscience, immune from oversight and accountability, and thus
vulnerable to politicization . This was among the fears of which President Eisenhower warned us in his last speech as President. Meanwhile, the
SSRA would preserve what the PATRIOT Act’s authors have said they meant to authorize: targeted
investigations of particular people suspected by authorities to present potential threats. HR 1466 would
also advance transparency, both by protecting conscientious whistleblowers from the corrupt retaliation of
agencies and careerists, and by giving judges on the secret FISA court access to technical expertise they have
been denied. Finally, the bill would directly address disturbing government duplicity, prohibiting agencies
from hacking encryption hardware and software, and from using an executive order authorizing
foreign surveillance as a basis to monitor Americans.
PRISM isn’t key to stop terrorism – traditional police methods solved all the
instances cited by the NSA
Peter Bergen and David Sterman June 17, 2013, “Did NSA snooping stop 'dozens' of terrorist
attacks?,” CNN.com, http://www.cnn.com/2013/06/17/opinion/bergen-nsa-spying/, KEL
Testifying before Congress on Wednesday, Gen. Keith Alexander,
director of the N ational S ecurity A gency, asserted that his
agency's massive acquisition of U.S. phone data and the contents of overseas Internet traffic that is provided by
American tech companies has helped prevent "dozens of terrorist events." On Thursday, Sens. Ron Wyden and Mark Udall,
Democrats who both serve on the Senate Select Committee on Intelligence and have access to the nation's
most sensitive secrets, released a statement contradicting this assertion. "Gen. Alexander's testimony yesterday suggested that
the NSA's bulk phone records collection program helped thwart 'dozens' of terrorist attacks, but all of the plots that he mentioned appear to
have been identified using other collection methods," the two senators said. Indeed, a survey of court
documents and media accounts of all the jihadist terrorist plots in the United States since 9/11 by the New America
Foundation shows that traditional law enforcement methods have overwhelmingly played the most significant
role in foiling terrorist attacks. This suggests that the NSA surveillance programs are wide-ranging fishing
expeditions with little to show for them.
The plan maintains sufficient law enforcement tools to prevent terrorism.
Kibbe 15 — Matt Kibbe, President of FreedomWorks— a conservative and libertarian advocacy group,
former Chief of Staff to U.S. Representative Dan Miller (R-FL), former Senior Economist at the
Republican National Committee, former Director of Federal Budget Policy at the U.S. Chamber of
Commerce, and former Managing Editor of Market Process—an academic economics journal published
by the Center for the Study of Market Processes at George Mason University, 2015 (“Letter in Support of
the Surveillance State Repeal Act,” FreedomWorks, March 24th, Available Online at
http://www.freedomworks.org/content/letter-support-surveillance-state-repeal-act, Accessed 06-19-2015)
It’s important to note that the
Surveillance State Repeal Act saves anti-terrorism tools that are useful to law
enforcement. It retains the ability for government surveillance capabilities against targeted individuals,
regardless of the type of communications methods or devices being used. It would also protect
intelligence collection practices involving foreign targets for the purpose of investigating weapons of
mass destruction. We urge you to voice your support for the Surveillance State Repeal Act to stop
unconstitutional spying on U.S. citizens . It is our hope that you will ask your representatives to co-sponsor and otherwise support the bill if
they have not already done so.
PRISM not key to effective operations
Ingersol 13 (Geoffrey Ingersol, staff writer, http://www.businessinsider.com/the-nsa-prism-is-aimedat-terrorisms-idiots-2013-6#ixzz3duIX7WfL, “The NSA's PRISM Surveillance Program Only Gathers
Info On Stupid Terrorists” ekr)
It doesn't really matter if the NSA gathers all the information from the big tech giants, because real terrorists, smart
terrorists, the guys in management, they don't use those platforms. Only terrorism's idiots do . Leonid Bershidsky of Bloomberg
writes: The infrastructure set up by the National Security Agency, however, may only be good for gathering information on the
stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s
largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that
truly dangerous elements typically use . A few weeks ago, National Security Agency whistleblower Edward Snowden leaked documents
diagramming the existence of a program called PRISM. Supposedly this program enabled the NSA to tap into the content of communications from the major tech
giants — but only specific information and only if they had a court order, NSA officials later claimed. Later, when Congress pressed for information and justification
for such a program, NSA director Keith Alexander claimed they had stopped 50 terrorist acts, 10 of which were aimed at the U.S. Former vice president Dick Cheney
raised the stakes, asserting PRISM could have stopped 9/11. Dubious claims at best. There are multiple platforms and methods to avoid the higher, more visible side
of the Internet. Even Bin Laden was smart enough to use a courier and hand written notes to give orders. The
real terrorist planners prefer to
"remain in the undernet," writes Bershidsky. From Bloomberg: In 2012, a French court found nuclear physicist Adlene Hicheur
guilty of, among other things, conspiring to commit an act of terror for distributing and using software called Asrar alMujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including
variable stealth ciphers and RSA 2,048-bit keys. A mathmetician found out when he hacked into Google last year that they were only
using 512 bit keys for their email communications. Likely they've upgraded, but the anecdote goes to show just how sophisticated terrorist planners can get. Earlier
this year we covered an element of the undernet called "Tor." Certainly the paranoid upper echelons of Al Qaeda would use this side-road rather than the general
Internet super highway. Those aren't the only options either when it comes to avoding PRISM. "At best," writes Bershidsky, " the
recent revelations
concerning Prism and telephone surveillance might deter potential recruits to terrorist causes from
using the most visible parts of the Internet ."
Turn - Strong data encryption decreases crime.
Kehl et al. 15 — Danielle Kehl, Senior Policy Analyst at the Open Technology Institute at the New
America Foundation, holds a B.A. in History from Yale University, with Andi Wilson, Policy Program
Associate at the Open Technology Institute at the New America Foundation, holds a Master of Global
Affairs degree from the Munk School at the University of Toronto, and Kevin Bankston, Policy Director
at the Open Technology Institute at the New America Foundation, former Senior Counsel and Director of
the Free Expression Project at the Center for Democracy & Technology, former Senior Staff Attorney at
the Electronic Frontier Foundation, former Justice William Brennan First Amendment Fellow at the
American Civil Liberties Union, holds a J.D. from the University of Southern California Law School,
2015 (“Doomed To Repeat History? Lessons From The Crypto Wars of the 1990s,” Report by the Open
Technology Institute at the New America Foundation, June, Available Online at
https://static.newamerica.org/attachments/3407-125/Lessons%20From%20the%20Crypto%20Wars%20of%20the%201990s.882d6156dc194187a5fa51b1
4d55234f.pdf, Accessed 07-06-2015, p. 19)
Moreover, there is now a significant body of evidence that, as Bob Goodlatte argued back in 1997,
“Strong encryption prevents crime.”180 This has become particularly true as smartphones and other
personal devices that store vast amount of user data have risen in popularity over the past decade.
Encryption can stop or mitigate the damage from crimes like identity theft and fraud targeted at
smartphone users.181
Even with increasing numbers, terrorism is far from an existential worldwide
threat. Recent State Department data proves.
Zenko, 6-19-15 [Micah, the Douglas Dillon fellow with the Center for Preventive Action at
the
Council on Foreign Relations, “Terrorism Is Booming Almost Everywhere But in the United States,”
Foreign Policy, 6-19-15, https://foreignpolicy.com/2015/06/19/terrorism -is-booming-almosteverywhere-but-in-the-united-states-state-department -report/?utm_source=Sailthru&utm_ ]
Third, even with these worsening trends, terrorism still represents only a small fraction of overall violent
deaths. The annual number of violent deaths worldwide is 508,000, according to the Global Burden of
Armed Violence 2015: Every Body Counts report. In other words, less than 7 percent of violent deaths
are a result of acts of terrorism. Compare the 32,727 terrorist fatalities to the estimated 377,000 people
who were killed in interpersonal violence, gang violence, or economically motived crimes. Citizens of
several Central American and Caribbean countries are still more likely to be the victim of homicide than
Iraqis or Syrians are from terrorism.
No impact- terrorism not an existential risk – threats declining
Burke, The Guardian, ’13 [Jason Burke, The Guardian, 1/28/13, “Al-Qaida: how great is the terrorism threat to the west now?,”
http://www.guardian.co.uk/world/2013/jan/29/al-qaida-terrorism-threat-west, accessed 7/11/13, JTF]
Of course a threat remains. But the big attacks – those that could potentially pose something a little
closer to "an existential threat" – are unlikely. These would need to be in a major European or US city or
involve at least one passenger jet. If British intelligence, despite having a team devoted for months to
checking and rechecking every possible potential lead, could not come up with a single credible threat to
the London Olympics last year and their US counterparts were confident enough to declare a similar lack
of immediate danger during the recent presidential campaign, it appears fair to assume that bombs in
London or New York are a fairly distant prospect for the moment. The biggest threat to airplanes comes
from a single highly proficient bombmaker in the Yemen.
No link – PRISM not key Exts
Of the 42 plots to attack within the US, PRISM data was only important to
preventing one
Peter Bergen and David Sterman June 17, 2013, “Did NSA snooping stop 'dozens' of terrorist
attacks?,” CNN.com, http://www.cnn.com/2013/06/17/opinion/bergen-nsa-spying/, KEL
Homegrown jihadist extremists have mounted 42 plots to conduct attacks within the United States since 2001.
Of those plots, nine involved an actual terrorist act that was not prevented by any type of government action, such as the failed attempt by Faisal Shahzad to blow up a
car bomb in Times Square on May 1, 2010. Of
the remaining 33 plots, the public record shows that at least 29 were
uncovered by traditional law enforcement methods, such as the use of informants, reliance on community
tips about suspicious activity and other standard policing practices. Informants have played a critical role in preventing more
than half of the plots by homegrown jihadist extremists since the 9/11 attacks, according to New America Foundation data. For instance, a group of Muslims from the
Balkans living in southern New Jersey who were virulently opposed to the Iraq War told a government informant in 2007 they were plotting to kill soldiers stationed
at the nearby Fort Dix army base. Other investigations have relied on tips to law enforcement. Saudi student Khalid Aldawsari's plot to attack a variety of targets in
Texas in 2011, including President George W. Bush's home in Dallas, was foiled when a company reported his attempt to buy chemicals suitable for making
explosives. Standard police work has also stopped plots. Kevin Lamar James, a convert to Islam, formed a group dedicated to holy war while he was jailed in
California's Folsom Prison during the late 1990s. James' crew planned to attack a U.S. military recruiting station in Los Angeles on the fourth anniversary of 9/11 as
well as a synagogue a month later. Members of James' group financed their activities by sticking up gas stations, and their plans only came to light during the course
of a routine investigation of a gas station robbery by local police in Torrance, California, who found documents that laid out the group's plans for mayhem. In
defending the role of NSA surveillance in his congressional testimony, Alexander pointed to two plots
averted by his agency's programs; the plan by Denver resident Najibullah Zazi to bomb the New York subway
system in 2009 and a plot the same year by Chicago resident David Coleman Headley to attack the offices of a Danish
newspaper that had printed cartoons of the Prophet Mohammed that many Muslims deemed offensive. In the Zazi case, testimony in a Brooklyn court shows
that around the eighth anniversary of 9/11, U.S. officials found an e-mail address in Pakistan, believed to be connected to al Qaeda, that was in communication with
njbzaz@yahoo.com, an e-mail address in the Denver area. Officials found that Zazi was e-mailing from njbzaz@yahoo.com to get clarification from his handlers in
Pakistan about how to mix ingredients for the bombs he was building in his Denver apartment. Zazi was arrested before he could carry out his plan to attack the New
York subways. This plot could well have been detected by the NSA's PRISM program, which collects the e-mails and other
records of computer users outside the United States from nine U.S. technology companies, including Yahoo. But the detection of the plot does not appear to have
anything to do with the government's collection of the phone records of tens of millions of Americans. In the case of Headley, the government hasn't clarified its claim
that NSA surveillance led to his detection, but Sebastian Rotella of ProPublica, who has done the most authoritative reporting on the Headley case, says that Headley
came to the attention of U.S. officials because he was in contact with al Qaeda operatives in the United Kingdom who were under surveillance by the British. In other
words, Headley
was not detected by NSA surveillance but because of a tip from a close ally. Moreover,
conventional law enforcement methods were available to detect Headley's ties to terrorism, but they were
ignored. Headley's wife warned the FBI of his involvement with the Pakistani-based militant group Lashkar-e-Taiba years before his plot to attack the Danish
newspaper.
PRISM and NSA surveillance not key to stopping terrorism
Cohn and Kayyali 2014 (Cindy Cohn and Nadia Kayyali, Electronic Frontier Foundation, The Top
5 Claims That Defenders of the NSA Have to Stop Making to Remain Credible, June 2nd, 2014,
https://www.eff.org/deeplinks/2014/06/top-5-claims-defenders-nsa-have-stop-making-remain-credible)
you hear any one of these in the future, you can tell yourself straight up: “this person isn’t
credible ,” and look elsewhere for current information about the NSA spying. And if these are still in your talking points (you
know who you are) it’s time to retire them if you want to remain credible. And next time, the talking points should stand the
test of time. 1. The NSA has Stopped 54 Terrorist Attacks with Mass Spying The discredited claim NSA
defenders have thrown out many claims about how NSA surveillance has protected us from terrorists,
including repeatedly declaring that it has thwarted 54 plots. Rep. Mike Rogerssays it often. Only weeks after the first
So if
Snowden leak, US President Barack Obama claimed: “We know of at least 50 threats that have been averted” because of the NSA’s spy powers.
Former NSA Director Gen. Keith Alexander also repeatedly claimed that those programs thwarted 54 different attacks. Others, including former
Vice President Dick Cheney have claimed that had the bulk spying programs in place, the government could have stopped the 9/11 bombings,
specifically noting that the government needed the program to locate Khalid al Mihdhar, a hijacker who was living in San Diego. Why
it’s
not credible: These claims have been thoroughly debunked. First, the claim that the information stopped
54 terrorist plots fell completely apart. In dramatic Congressional testimony, Sen. Leahy forced a formal retraction from NSA
Director Alexander in October, 2013: "Would you agree that the 54 cases that keep getting cited by the administration were not
all plots, and of the 54, only 13 had some nexus to the U.S.?" Leahy said at the hearing. "Would you agree with that, yes or
no?" "Yes," Alexander replied, without elaborating. But that didn’t stop the apologists. We keep hearing the “54 plots” line to this day. As for
9/11, sadly, the same is true. The government did not need additional mass collection capabilities, like the
mass phone records programs, to find al Mihdhar in San Diego. AsProPublica noted, quoting Bob Graham, the former chair of the Senate
Intelligence Committee: U.S.
intelligence agencies knew the identity of the hijacker in question, Saudi national Khalid
before 9/11 and had the ability find him, but they failed to do so. "There were plenty of opportunities
without having to rely on this metadata system for the FBI and intelligence agencies to have located Mihdhar," says former Senator
al Mihdhar, long
Bob Graham, the Florida Democrat who extensively investigated 9/11 as chairman of the Senate’s intelligence committee. Moreover, Peter
Bergen and a team at the New America Foundation dug into the government’s claims about plots in America, including studying over 225
individuals recruited by al Qaeda and similar groups in the United States and charged with terrorism, and concluded: Our
review of the
government’s claims about the role that NSA "bulk" surveillance of phone and email communications
records has had in keeping the United States safe from terrorism shows that these claims are overblown
and even misleading... When backed into a corner, the government’s apologists cite the capture of Zazi, the so-called
New York subway bomber. However, in that case, the Associated Press reported that the government could have
easily stopped the plot without the NSA program, under authorities that comply with the Constitution. Sens. Ron Wyden and
Mark Udall have been saying this for a long time. Both of the President’s hand-picked advisors on mass
surveillance concur about the telephone records collection. The President’s Review Board issued a report in which
it stated “the information contributed to terrorist investigations by the use of section 215 telephony metadata was not essential to preventing attacks,” The Privacy and Civil Liberties Oversight Board (PCLOB) also issued a report in
which it stated, “we have not identified a single instance involving a threat to the United States in which [bulk
collection under Section 215 of the Patriot Act] made a concrete difference in the outcome of a counterterrorism investigation.”
And in an amicus brief in EFF’s case First Unitarian Church of Los Angeles v. the NSA case, Sens. Ron Wyden, Mark Udall, and Martin
Heinrich stated that, while the administration has claimed that bulk collection is necessary to prevent terrorism, they “have reviewed the bulk-
top NSA official John Inglis
admitted that the phone records program has not stopped any terrorist attacks aimed at the US and at
most, helped catch one guy who shipped about $8,000 to a Somalian group that the US has designated as a
collection program extensively, and none of the claims appears to hold up to scrutiny.” Even former
terrorist group but that has never even remotely been involved in any attacks aimed at the US. 2. Just collecting call detail records isn’t a big deal.
The discredited claim The
argument goes like this: Metadata can’t be privacy invasive, isn’t very useful and
therefore its collection isn’t dangerous—so the Constitution shouldn’t protect it. Even the President said, “what the
intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not
looking at content”—as if that means there is no privacy protection for this information. Why
it’s not credible: As former director
of the NSA and CIA Michael Hayden recently admitted: “We kill people based on metadata .” And former
NSA General Counsel Stu Baker said: “metadata absolutely tells you everything about somebody’s life. If you have
enough metadata, you don’t really need content.” In fact, a Stanford study this year demonstrated exactly
what you can reconstruct using metadata: “We were able to infer medical conditions, firearm ownership,
and more, using solely phone metadata.” Metadata can show what your religion is, if you went to get an abortion, and other
incredibly private details of your life. 3. There Have Been No Abuses of Power The discredited claim President Obama stated in an interview that
“there are no allegations, and I am very confident —knowing the NSA and how they operate — that purposefully somebody is out there trying to
abuse this program…” And General Alexander stated in a speech that “We get all these allegations of [abuses of power] but when people check...
they find zero times that that's happened. And that's no bullshit. Those are facts.” Why it’s not credible: We already have evidence of abuses of
power. We know that NSA analysts were using their surveillance powers to track their ex-wives and husbands, and other love interests. They
even had a name for it, LOVEINT. The FISA court has also cited the NSA for violating or ignoring court orders for years at a time. And those are
just self-reported abuses – the only oversight that occurs is that the NSA investigates itself and reports on the honor system to Congress or the
FISC about what it finds. A real independent investigation might reveal even more. Unfortunately, until we get something like a new Church
Committee, we are unlikely to see such details. 4. Invading Privacy is Okay Because It’s Done to Prevent Terrorist Attacks The discredited claim
We keep hearing the same thing: Surveillance is a “critical tool in protecting the nation from terror threats.” When we reform the NSA, it must be
done in a way that “protect[s] the operational capability of a critical counterterrorism tool.” The implication is that the stopping terrorist attacks is
the government’s only goal. Why it’s not credible: We know that NSA surveillance is not used just for stopping terrorists and it’s not even just
used for national security. The Intercept recently revealed leaks detailing the NSA’s role in the “war on drugs,”—in particular, a 2004 memo
detailing how the NSA has redefined narcotics trafficking as a national security issue. We also know that the NSA feeds data to the DEA, where
it ends up playing a part in ordinary law enforcement investigations. And internationally, the NSA engages in economic espionage and diplomatic
spying, something detailed in Glenn Greenwald’s recent book No Place to Hide. 5. There’s Plenty of Oversight From Congress, the Foreign
Intelligence Surveillance Court, and Agency Watchdogs The discredited claim We’ve repeatedly heard from the President and from NSA
defenders like Sen. Dianne Feinsteinand Rep. Mike Rogers that Congress knows all about NSA spying. Right after the first Snowden leak,
President Obama said: “your duly elected representatives have been consistently informed on exactly what we’re doing.” We’ve also heard that a
court has approved these programs, so we shouldn’t be concerned. Why it’s not credible: EFF and others have long documented that Congress
has an incredibly hard time getting information about NSA spying. And it’s not just Congress. We learned a few months ago that the Department
of Defense's deputy Inspector General, in charge of Intelligence and Special Program Assessments, was not aware of the call detail collection
program. What’s more, the secretive Foreign Intelligence Surveillance Court (FISC) is completely incomparable to an ordinary adversarial court.
It makes decisions in a vacuum, and it doesn’t always have complete information, much less a second adversarial voice or technical help. Its chief
judge has said that it’s not equipped to conduct oversight. EFF recently had to tell the court that its Jewel v. NSA case even existed – the
government had apparently decided that it didn’t have to. We also know that the FISC isn’t much of a block, since in 11 years “the court has
denied just 10 applications, and modified several dozen, while approving more than 15,000.” So why are we giving up our rights? It's time for
NSA and its supporters to admit what we all know is true: what is at stake in this debate is the simple ability for any of us—in the US or around
the world—to be able to use the Internet without fear of surveillance. They continue to be willing to overstate their case in order to scare us into
allowing them to continue to “collect it all.” But the American people are getting wise and the media are increasingly double-checking their
claims. As a result, more Americans than ever now say that the NSA has gone too far and those tired old stories are starting to wear thin.
No link – Encryption not key Exts
Empirically, strong encryption doesn’t foil law enforcement. Their evidence is
baseless fearmongering.
Schneier 14 — Bruce Schneier, Chief Technology Officer for Counterpane Internet Security, Fellow at
the Berkman Center for Internet and Society at Harvard Law School, Program Fellow at the New
America Foundation's Open Technology Institute, Board Member of the Electronic Frontier Foundation,
Advisory Board Member of the Electronic Privacy Information Center, 2014 (“Stop the hysteria over
Apple encryption,” CNN, October 31st, Available Online at
http://www.cnn.com/2014/10/03/opinion/schneier-apple-encryption-hysteria/index.html, Accessed 06-292015)
Last week Apple announced that it is closing a serious security vulnerability in the iPhone. It used to be that the phone's encryption only protected a small amount of
the data, and Apple had the ability to bypass security on the rest of it. From now on, all the phone's data is protected. It can no longer be accessed by criminals,
governments, or rogue employees. Access to it can no longer be demanded by totalitarian governments. A user's iPhone data is now more secure. To
hear U.S.
law enforcement respond, you'd think Apple's move heralded an unstoppable crime wave . See, the FBI had been
using that vulnerability to get into peoples' iPhones. In the words of cyberlaw professor Orin Kerr, "How is the public interest served by a policy that only thwarts
lawful search warrants?" Ah, but that's the thing: You
can't build a "back door" that only the good guys can walk through.
Encryption protects against cybercriminals, industrial competitors, the Chinese secret police and the FBI.
You're either vulnerable to eavesdropping by any of them, or you're secure from eavesdropping from all
of them. Back-door access built for the good guys is routinely used by the bad guys. In 2005, some unknown group
surreptitiously used the lawful-intercept capabilities built into the Greek cell phone system. The same thing happened in Italy in 2006. In 2010, Chinese hackers
subverted an intercept system Google had put into Gmail to comply with U.S. government surveillance requests. Back doors in our cell phone system are currently
being exploited by the FBI and unknown others. This
doesn't stop the FBI and Justice Department from pumping up the
fear . Attorney General Eric Holder threatened us with kidnappers and sexual predators. The former head of the
FBI's criminal investigative division went even further, conjuring up kidnappers who are also sexual predators.
And, of course, terrorists. FBI Director James Comey claimed that Apple's move allows people to place themselves beyond the law" and also invoked that now
overworked "child kidnapper." John J. Escalante, chief of detectives for the Chicago police department now holds the title of most hysterical: "Apple will become the
It's all bluster. Of the 3,576 major offenses for which warrants were granted for
communications interception in 2013, exactly one involved kidnapping. And, more importantly, there's no
evidence that encryption hampers criminal investigations in any serious way. In 2013, encryption foiled
the police nine times, up from four in 2012 – and the investigations proceeded in some other way . This
is why the FBI's scare stories tend to wither after public scrutiny. A former FBI assistant director wrote
about a kidnapped man who would never have been found without the ability of the FBI to decrypt an
iPhone, only to retract the point hours later because it wasn't true . We've seen this game before. During
the crypto wars of the 1990s, FBI Director Louis Freeh and others would repeatedly use the example of mobster John
Gotti to illustrate why the ability to tap telephones was so vital. But the Gotti evidence was collected
using a room bug, not a telephone tap. And those same scary criminal tropes were trotted out then, too.
Back then we called them the Four Horsemen of the Infocalypse: pedophiles, kidnappers, drug dealers,
and terrorists. Nothing has changed .
phone of choice for the pedophile."
No link - Warrants solve Ext
Law enforcement can still get a warrant — no link.
Cohn et al. 14 — Cindy Cohn, Executive Director and former Legal Director and General Counsel of
the Electronic Frontier Foundation, holds a J.D. from the University of Michigan Law School, with
Jeremy Gillula, Staff Technologist at the Electronic Frontier Foundation, holds a Ph.D. in Computer
Science from Stanford University, and Seth Schoen, Senior Staff Technologist at the Electronic Frontier
Foundation, 2014 (“What Default Phone Encryption Really Means For Law Enforcement,” Vice News,
October 8th, Available Online at https://news.vice.com/article/what-default-phone-encryption-reallymeans-for-law-enforcement, Accessed 07-05-2015)
The common misconception among the hysteria is that this decision will put vital evidence outside the
reach of law enforcement. But nothing in this encryption change will stop law enforcement from seeking
a warrant for the contents of a phone, just as they seek warrants for the contents of a laptop or desktop
computer. Whether or not a person can be required to unlock the device is a complicated question —
intertwined with the right of due process and the right to avoid self-incrimination — that ought to be
carefully considered by a court in the context of each individual situation.
No impact: Terrorism not a threat
The threat of domestic terrorism in the U.S. and to its citizens is miniscule. Recent
State Department data proves.
Zenko, 6-19-15 [Micah, the Douglas Dillon fellow with the Center for Preventive Action at the
Council on Foreign Relations, “Terrorism Is Booming Almost Everywhere But in the United States,”
Foreign Policy, 6-19-15, https://foreignpolicy.com/2015/06/19/terrorism-is-booming-almost-everywherebut-in-the-united-states-state-department-report/?utm_source=Sailthru&utm_]
Finally, terrorism
continues to pose an extremely small threat to the United States and its citizens. The number
of Americans killed by international terrorism grew over the past year from 16 to 24. However, this is still
fewer than the average number that has tragically been killed each year since 9/11, which is 28. Moreover,
not one U.S. citizen died from terrorism within the United States last year. Rather, as has been consistent with
previous years, Americans die from terrorism when they travel to war zones, or areas marked by violent
instability: Of the 24 deaths last year, 10 were in Afghanistan, 5 in Israel or the Occupied Territories, 3 in Somali, 3 in Syria, and 1 a piece in
Egypt and the United Arab Emirates.
No existential threat
Buchanan, Analyst – MSNBC, 9/21/2007 (Patrick
http://www.realclearpolitics.com/articles/2007/09/is_terrorism_a_mortal_threat.html)
Terrorism, said Powell, is not a mortal threat to America. "What is the greatest threat facing us now?" Powell asked. "People will say it's terrorism.
But are there any terrorists in the world who can change the American way of life or our political system? No. Can they knock down a building? Yes. Can they kill
somebody? Yes. But can they change us? No. Only we can change ourselves. So what is the great threat we are facing?" History and common sense teach that
Powell speaks truth. Since
9-11, 100,000 Americans have been murdered -- as many as we lost in Vietnam, Korea and Iraq combined.
Yet, not one of these murders was the work of an Islamic terrorist, and all of them, terrible as they are, did not imperil the
survival of our republic. Terrorists can blow up our buildings, assassinate our leaders, and bomb our malls and stadiums. They cannot
destroy us. Assume the worst. Terrorists smuggle an atom bomb into New York harbor or into Washington, D.C., and
detonate it. Horrible and horrifying as that would be -- perhaps 100,000 dead and wounded -- it would not mean the end of
the United States. It would more likely mean the end of Iran, or whatever nation at which the United States chose to direct its rage and retribution. Consider.
Between 1942 and 1945, Germany and Japan, nations not one-tenth the size of the United States, saw their cities
firebombed, and their soldiers and civilians slaughtered in the millions. Japan lost an empire. Germany lost a third of its territory. Both were put under
military occupation. Yet, 15 years later, Germany and Japan were the second and third most prosperous nations
on Earth, the dynamos of their respective continents, Europe and Asia. Powell's point is not that terrorism is not a threat. It is that the terror threat must be
seen in perspective, that we ought not frighten ourselves to death with our own propaganda, that we cannot allow fear of terror to monopolize our every waking
hour or cause us to give up our freedom. For all the blather of a restored caliphate, the
"Islamofascists," as the neocons call them, cannot create
or run a modern state, or pose a mortal threat to America. The GNP of the entire Arab world is not equal to Spain's. Oil aside, its
exports are equal to Finland's.
AT Executive CP
Perm: Do both – only perm can give an executive order the power of law and
prevent roll back
Leanna Anderson (clerk for H.R. Lloyd, U.S. Magistrate) Hastings Constitutional Law Quarterly 2002
To be challengeable, an executive order must have the force and effect of law. Under the United States Code, federal court jurisdiction is limited
to "federal questions." "The district courts shall have original jurisdiction of all civil actions arising under the Constitution, laws, or treaties of the
United States." For federal courts to have jurisdiction over a civil action challenging an executive order, the order must have the "force and effect
if the order is issued in accordance with
Congressional statutory mandate or delegation, the order has the force and effect of law. However, if the
order is not based on an express Congressional grant of authority, federal courts may either look for an implied
Congressional basis for the order or find that no statutory basis exists so that the order does not have the force and
effect of law.
of law." There are two different branches of analysis under this requirement. First,
Congress key- future presidents won’t restrain themselves
Froomkin ‘12
[Dan, contributing editor, Nieman Reports. http://www.huffingtonpost.com/dan-froomkin/obama-white-house-leaks_b_1973649.html ETB]
Troubling legal and moral issues left behind by the previous administration remain unresolved. Far from
reversing the Bush-Cheney executive power grab, President Barack Obama is taking it to new extremes by
unilaterally approving indefinite detention of foreign prisoners and covert targeted killings of terror suspects, even when they are
American citizens.¶ There is little to none of the judicial and legislative oversight Obama had promised, so the
executive branch's most controversial methods of violence and control remain solely in the hands of the
president -- possibly about to be passed along to a leader with less restraint.
Solvency deficit – cannot solve Cloud or EU relations – Presidential Action can
easily be rolled back or circumvented – will be perceived as weak action.
No link and perm solvency – Presidential flexibility is structurally guaranteed,
unrestricted war powers do not guarantee more flex. Working with Congress
actually increases flexibility, best decision-making, and legitimatizes the policies
with various constituencies.
Mariah Zeisberg 2013, assistant professor of pol sci @ U of Michigan, War Powers: The Politics of
Constitutional Authority, p.15-6, KEL
While policy flexibility is important, the relationship between policy flexibility and interbranch behavior
is more complex than insularists claim. The president’s capacity to independently respond to crisis is
structurally guaranteed by a fixed term and by high barriers to impeachment. Given a massive military
establishment, he can pursue his policies even if very few people agree with him at all. Congress cannot, except
tinder exceptional circumstances, remove him personally from office. The need for flexibility through independence is
guaranteed at the structural level. There are good reasons not to expand this structurally guaranteed
independence into a norm of political insularity. In part, this is because the president’s decision space may be restricted
by many forces beyond Congress. Presidents who govern unilaterally may discover that their strategy becomes more and more
determined by the imperatives of a single force, say the views of a single cabinet. In fact, engaging the conflicting demands of
different political realities and institutions can open space for an agent to make flexible decisions in
a broader space . A president “freed” from Congress may end up chained by party. In the prelude to World War
II, Senator Nye sought restrictive legislation out of a worry that open presidential discretion would leave the president beholden to economic
interests against his own willl.52 Roosevelt affirmed this worry, telling certain senators that “[i]f war came in Europe, [he] did not want to be
forced to defend American commercial interests blindly—we would prefer to conduct American policy free from emotional and economic
pressures.”5 Even imagining a presidency that laces no external pressures at all, groupthink
in the cabinet may still restrict the
branch’s flexibility. Politicians can sometimes achieve policy flexibility in the US constitutional system
by working through a crossroads of conflicting imperatives, rather than being freed from any one of them.
Moreover, flexibility is not the only value for achieving a sound security policy . Wisdom, deliberateness,
stability, and consistency are also values, and Congress is well-positioned to contribute here. The right
response to a threat is often unclear. Diplomacy, embargoes, and even ignoring the incident may sometimes be more skillful than war.54 Some
legislators have more expertise than the president on particular security problems, and they may have
creative perspectives borne of long experience in difficult areas. So too, the inertia associated with decisionmaking in large groups can be a positive good for achieving policy stability. In certain contexts, like the provision of
security guarantees to other nations, long-term policy stability is required for a policy’s success. The time and effort it takes to
respond to Congress is time and effort spent toward convincing many people that the policy chosen is in
the national interest, and toward building and sustaining policy architectures along that path.55
Links to politics – immense opposition to bypassing debate
Hallowell 13
(Billy Hallowell, writer for The Blaze, B.A. in journalism and broadcasting from the College of Mount Saint Vincent in Riverdale, New York and
an M.S. in social research from Hunter College in Manhattan, “HERE’S HOW OBAMA IS USING EXECUTIVE POWER TO BYPASS
LEGISLATIVE PROCESS” Feb. 11, 2013, http://www.theblaze.com/stories/2013/02/11/heres-how-obamas-using-executive-power-to-bylasslegislative-process-plus-a-brief-history-of-executive-orders/, KB)
“In an era of polarized parties and a fragmented Congress, the opportunities to legislate are few and far between,” Howell said. “So presidents
have powerful incentive to go it alone. And they do.”¶ And the political opposition howls.¶ Sen. Marco Rubio, RFla., a possible contender for the Republican presidential nomination in 2016, said that on the gun-control front in particular, Obama
is “abusing his power by imposing his policies via executive fiat instead of allowing them to be debated
in Congress.Ӧ The Republican reaction is to be expected, said John Woolley, co-director of the American Presidency Project
at the University of California in Santa Barbara.¶ “For years there has been a growing concern about unchecked executive
power,” Woolley said. “It tends to have a partisan content, with contemporary complaints coming from the
incumbent president’s opponents.”
Separation of Powers Turn –
Executive power is expanding in the squo- continuing the trend will destroy
separation of powers- congressional checks are key to solve
Marshall ‘8
[William P. Marshall, Kenan Professor of Law, University of North Carolina. Boston Law Review
88:505. http://www.bu.edu/law/central/jd/organizations/journals/bulr/documents/MARSHALL.pdf ETB]
Specifically, I contend that the
power of the Presidency has been expanding ¶ since the Founding, and that we need to
consider the implications of this ¶ expansion within the constitutional structure of separation of powers, no
matter ¶ which party controls the White House. Part I of this Essay makes the ¶ descriptive case by briefly canvassing a series of factors that have
had, and ¶ continue to have, the effect of expanding presidential power. Part II suggests ¶ this
expansion in presidential power has
created a constitutional imbalance ¶ between the executive and legislative branches, calling into doubt the
¶ continued efficacy of the structure of separation of powers set forth by the ¶ Framers. Part III then offers some
suggestions as to how this power imbalance ¶ can be alleviated, but it does not present a silver bullet solution. Because ¶ many, if not all, the
factors that have led to increased presidential power are ¶ the products of inevitable social and technological change, they are not easily
it is critical that those
on both sides of ¶ the aisle work to assure that the growth in presidential power is at least ¶ checked, if not
reversed.¶
remedied.3¶ Thus, the Essay ends with only the modest conclusion that ¶ regardless of who wins the Presidency,
Strong SOP key to heg
G. John Ikenberry, Professor @ Georgetown University, Spring 2001 (The National Interest)
First, America's
mature political institutions organized around the rule of law have made it a
relatively predictable and cooperative hegemon. The pluralistic and regularized way in which U.S.
foreign and security policy is made reduces surprises and allows other states to build long-term,
mutually beneficial relations. The governmental separation of powers creates a shared decisionmaking system that opens up the process and reduces the ability of any one leader to make abrupt
or aggressive moves toward other states. An active press and competitive party system also provide a service to outside states by generating
information about U.S. policy and determining its seriousness of purpose. The messiness of a democracy can, indeed, frustrate
American diplomats and confuse foreign observers. But over the long term, democratic institutions
produce more consistent and credible policies--policies that do not reflect the capricious and
idiosyncratic whims of an autocrat. Think of the United States as a giant corporation that seeks foreign investors. It is more likely to attract
investors if it can demonstrate that it operates according to accepted accounting and fiduciary principles. The rule of law and the institutions of policymaking in a
democracy are the political equivalent of corporate transparency and accountability. Sharp shifts in policy must ultimately be vetted within the policy process and pass
muster by an array of investigatory and decision-making bodies. Because
it is a constitutional, rule-based democracy, outside
states are more willing to work with the United States-or, to return to the corporate metaphor, to invest in ongoing partnerships.
Extensions
No link & turn - Interbranch deliberation doesn’t harm national security – it can
increase it
Mariah Zeisberg 2013, assistant professor of pol sci @ U of Michigan, War Powers: The Politics of
Constitutional Authority, p.16-17, KEL
A second pro-presidency insularist argument is that the challenging characteristic of interbranch deliberation
endangers the well-being of troops in the field by exposing a troubling lack of will.56 Legislators also sometimes
say they cannot cut off funds for an unconstitutional war because that would amount to stranding soldiers. This argument is largely
drawn from a Cold War security context where an almost global security guarantee seemed important for
US security interests. In some contexts, the concern may he sound. But not all security dilemmas are like those of the
Cold War. Nor should we overlook the costs of the security order that Cold War Congresses built. In many, if not all cases, the soundness of
the actual policies that the president and Congress enact should have greater consequence for enemies than the tenor of public conversation. If
contentiousness contributes to better-crafted security policies, then contentiousness can also support
security. Today we know that the contentiousness of democratic politics may keep the country from
entering or sustaining unwise hostilities, hostilities that themselves pose enormous costs to troops. Finally, a
refusal to fund continuing operations does not mean leaving troops in the field unprotected. The president continues to bear responsibility for
troops even as they withdraw.
Agent counterplans are a voting issue- they moot the 1ac with no 2ac recourse due
to lack of comparative solvency evidence between congress and the executive.
CP will get rolled back by future presidents
Friedersdorf 13
(CONOR FRIEDERSDORF, staff writer, “Does Obama Really Believe He Can Limit the Next President's Power?” MAY 28 2013,
http://www.theatlantic.com/politics/archive/2013/05/does-obama-really-believe-he-can-limit-the-next-presidents-power/276279/, KB)
Obama doesn't seem to realize that his legacy won't be shaped by any perspicacious limits he places on the executive branch, if he ever gets
around to placing any on it. The
next president can just undo those "self-imposed" limits with the same wave of a
hand that Obama uses to create them. His influence in the realm of executive power will be to expand it. By 2016
we'll be four terms deep in major policy decisions being driven by secret memos from the Office of Legal
Counsel. The White House will have a kill list, and if the next president wants to add names to it using
standards twice as lax as Obama's, he or she can do it, in secret, per his precedent.
CP Links to Politics Exts
Links to politics – the narrative inevitably gets twisted
Gyatso 13
(Ngawang Gyatso, B.A. in Political Economies from the University of California, Berkeley, “Obama’s Counterterrorism Strategy Isn’t Popular or
Idealistic. It’s Realistic!” May 24, 2013, http://jamandbutter.com/2013/05/24/obamas-counterterrorism-strategy-isnt-popular-or-idealistic-itsrealistic/, KB)
No sooner had the President delivered his speech, than superficial narratives on Obama not living up to
humanitarian image and campaign promises surfaced in the media. And what is especially disappointing is
reputable sources like the New York Times joining in unison with sensationalist news outlets like Huffington
Post and Slate in drumming the blame-it-on-Obama beat , when they surely understand the enormous weight Obama
shoulders in carefully repairing a failed and messy neoconservative American foreign policy in the Middle-East – while his administration
aggressively confronts the undeniable reality of terrorism.
Unpopular XOs spark massive congressional backlash
Risen 4
[Clay, Managing editor of Democracy: A Journal of Ideas, M.A. from the University of Chicago “The Power of the Pen: The Not-So-Secret
Weapon of Congress-wary Presidents” The American Prospect, July 16, http://www.prospect.org/cs/articles?article=the_power_of_the_pen]
The most effective check on executive orders has proven to be political. When
it comes to executive orders, “The president is
much more clearly responsible,” says Dellinger, who was heavily involved in crafting orders under Clinton. “Not only is there no
involvement from Congress, but the president has to personally sign the order.” Clinton's Grand Staircase-Escalante
National Monument executive order may have helped him win votes, but it also set off a massive congressional and public
backlash. Right-wing Internet sites bristled with comments about “dictatorial powers,” and Republicans warned of an end to civil liberties as
we know them. “President Clinton is running roughshod over our Constitution,” said then–House Majority Leader Dick Armey. Indeed, an
unpopular executive order can have immediate--and lasting--political consequences. In 2001, for example,
Bush proposed raising the acceptable number of parts per billion of arsenic in drinking water. It was a bone he
was trying to toss to the mining industry, and it would have overturned Clinton's order lowering the levels. But the overwhelmingly
negative public reaction forced Bush to quickly withdraw his proposal--and it painted him indelibly as an
anti-environmental president.
Plan popular with dems, CP isn’t
Nzelibe ‘11
[Jibe, Professor of Law, Northwestern University Law School. William and Mary Law Review 53:389.
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1216&context=facultyworkingpapers ETB]
But there is also reason to think that the long-term effects of an¶ expansion of presidential war powers will not be symmetric across¶ right-leaning
and left-leaning parties. A growing literature in¶ foreign policy shows that the use of force generates more electoral¶ and ideological benefits for
right-leaning governments than for leftleaning governments.86 More specifically, Foster and Palmer argue¶ that Republican Presidents in the
United States are more prone to¶ view the use of force as an instrumentally desirable political option ¶ because their core supporters are more
likely to reward, and less¶ likely to sanction, these Presidents for foreign military engagements¶ than their liberal counterparts.87 If this is the
case, and if politicians¶ are sensitive to the institutional conditions that make it more likely¶ that they will achieve their favored policy objectives,
then we would¶ expect Republican politicians to generally prefer more presidential¶ flexibility in the use of force. By contrast, we
would
expect leftleaning politicians to view expansive war powers as an obstacle to¶ their preferred policy and
electoral objectives. In other words, not¶ only may Democrats prefer less presidential flexibility in war¶
powers because of their supporters’ dovish preferences, but they¶ might also be concerned that if issues
like national security and¶ antiterrorism dominate the political agenda, they will crowd out¶ issues such as
health care, education reform, or welfare in which¶ Democrats are likely to have an electoral advantage
over¶ Republicans.88
AT Presidential Flexibility
Double bind- either CP doesn’t solve case or it can’t preserve flexibility. And
flexibility causes terrorism, turns the internal link
Englehardt ‘5
[Tom Engelhardt created and runs the Tomdispatch.com website, a project of The Nation Institute where he is a Fellow. Each spring he is a
Teaching Fellow at the Graduate School of Journalism at the University of California, Berkel. http://www.tomdispatch.com/post/32668/ ETB]
Here it is worth reviewing the positions Yoo advocated while in the executive branch and since, and their consequences in the "war on terror."
At every turn,
Yoo has sought to exploit the "flexibility" he finds in the Constitution to advocate an approach to the "war
on terror" in which legal limits are either interpreted away or rejected outright. Just two weeks after the September 11
attacks, Yoo sent an extensive memo to Tim Flanigan, deputy White House counsel, arguing that the President had unilateral authority to use military force not only
against the terrorists responsible for the September 11 attacks but against terrorists anywhere on the globe, with or without congressional authorization. ¶ Yoo followed
that opinion with a series of memos in January 2002 maintaining, against the strong objections of the State Department, that the Geneva Conventions should not be
applied to any detainees captured in the conflict in Afghanistan. Yoo argued that the president could unilaterally suspend the conventions; that al-Qaeda was not party
to the treaty; that Afghanistan was a "failed state" and therefore the president could ignore the fact that it had signed the conventions; and that the Taliban had failed to
adhere to the requirements of the Geneva Conventions regarding the conduct of war and therefore deserved no protection. Nor, he argued, was the president bound by
customary international law, which insists on humane treatment for all wartime detainees. Relying on Yoo's reasoning, the Bush administration claimed that it could
capture and detain any person who the president said was a member or supporter of al-Qaeda or the Taliban, and could categorically deny all detainees the protections
of the Geneva Conventions, including a hearing to permit them to challenge their status and restrictions on inhumane interrogation practices.¶ Echoing Yoo, Alberto
Gonzales, then White House counsel, argued at the time that one of the principal reasons for denying detainees protection under the Geneva Conventions was to
"preserve flexibility" and make it easier to "quickly obtain information from captured terrorists and their sponsors." When CIA officials reportedly raised concerns
that the methods they were using to interrogate high-level al-Qaeda detainees -- such as waterboarding -- might subject them to criminal liability, Yoo was again
consulted. In response, he drafted the August 1, 2002, torture memo, signed by his superior, Jay Bybee, and delivered to Gonzales. In that memo, Yoo "interpreted"
the criminal and international law bans on torture in as narrow and legalistic a way as possible; his evident purpose was to allow government officials to use as much
coercion as possible in interrogations.¶ Yoo
wrote that threats of death are permissible if they do not threaten "imminent
death," and that drugs designed to disrupt the personality may be administered so long as they do not
"penetrate to the core of an individual's ability to perceive the world around him." He said that the law
prohibiting torture did not prevent interrogators from inflicting mental harm so long as it was not
"prolonged." Physical pain could be inflicted so long as it was less severe than the pain associated with "serious physical injury, such as organ failure,
impairment of bodily function, or even death."¶ Even this interpretation did not preserve enough executive "flexibility" for
Yoo. In a separate section of the memo, he argued that if these loopholes were not sufficient, the president
was free to order outright torture. Any law limiting the president's authority to order torture during wartime, the memo claimed, would "violate the
Constitution's sole vesting of the Commander-in-Chief authority in the President."¶ Since leaving the Justice Department, Yoo has also defended the practice of
"extraordinary renditions," in which the United States has kidnapped numerous "suspects" in the war on terror and "rendered" them to third countries with records of
torturing detainees. He has argued that the federal courts have no right to review actions by the president that are said to violate the War Powers Clause. And he has
defended the practice of targeted assassinations, otherwise known as "summary executions."¶ In short, the
flexibility Yoo advocates allows the
administration to lock up human beings indefinitely without charges or hearings, to subject them to
brutally coercive interrogation tactics, to send them to other countries with a record of doing worse, to
assassinate persons it describes as the enemy without trial, and to keep the courts from interfering with all
such actions.¶ Has such flexibility actually aided the U.S. in dealing with terrorism? In all likelihood, the policies
and attitudes Yoo has advanced have made the country less secure. The abuses at Guantánamo and Abu
Ghraib have become international embarrassments for the United States, and by many accounts have
helped to recruit young people to join al-Qaeda. The U.S. has squandered the sympathy it had on September 12, 2001, and we now find
ourselves in a world perhaps more hostile than ever before. ¶ With respect to detainees, thanks to Yoo, the U.S. is now in an untenable bind: on the one hand, it has
become increasingly unacceptable for the U.S. to hold hundreds of prisoners indefinitely without trying them; on the other hand our coercive and inhumane
interrogation tactics have effectively granted many of the prisoners immunity from trial. Because the evidence we might use against them is tainted by their
mistreatment, trials would likely turn into occasions for exposing the United States' brutal interrogation tactics. This predicament was entirely avoidable. Had we
given alleged al-Qaeda detainees the fair hearings required by the Geneva Conventions at the outset, and had we conducted humane interrogations at Guantánamo,
Abu Ghraib, Camp Mercury, and elsewhere, few would have objected to the U.S. holding some detainees for the duration of the military conflict, and we could have
tried those responsible for war crimes. What has been so objectionable to many in the U.S. and abroad is the government's refusal to accept even the limited
constraints of the laws of war.¶ The
consequences of Yoo's vaunted "flexibility" have been self-destructive for the
U.S. -- we have turned a world in which international law was on our side into one in which we see it as
our enemy. The Pentagon's National Defense Strategy, issued in March 2005, states,¶ "Our strength as a nation state will continue to be challenged by those
who employ a strategy of the weak, using international fora, judicial processes, and terrorism." ¶ The proposition that judicial processes -- the very essence of the rule
of law -- are to be dismissed as a strategy of the weak, akin to terrorism, suggests the continuing strength of Yoo's influence. When the rule of law is seen simply as a
device used by terrorists, something has gone perilously wrong. Michael Ignatieff has written that "it
is the very nature of a democracy that it
not only does, but should, fight with one hand tied behind its back. It is also in the nature of democracy
that it prevails against its enemies precisely because it does." Yoo persuaded the Bush administration to
untie its hand and abandon the constraints of the rule of law. Perhaps that is why we are not prevailing.
A multitude of other actors hamper presidential flexibility
Rozell 12
(Mark Rozell, Professor of Public Policy, George Mason University, “From Idealism to Power: The Presidency in the Age of Obama” 2012,
http://www.libertylawsite.org/book-review/from-idealism-to-power-the-presidency-in-the-age-of-obama/, KB)
A substantial portion of Goldsmith’s book presents in detail his case that various
forces outside of government, and some within, are
responsible for hamstringing the president in unprecedented fashion: Aggressive, often intrusive, journalism, that at
times endangers national security; human rights and other advocacy groups, some domestic and other crossnational, teamed with big resources and talented, aggressive lawyers, using every legal category and
technicality possible to complicate executive action; courts thrust into the mix, having to decide critical national
security law controversies, even when the judges themselves have little direct knowledge or expertise on the topics brought before
them; attorneys within the executive branch itself advising against actions based on often narrow legal interpretations and
with little understanding of the broader implications of tying down the president with legalisms.
Flexibility will inevitability limited- ideological and electoral incentives
Nzelibe ‘11
[Jibe, Professor of Law, Northwestern University Law School. William and Mary Law Review 53:389.
http://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1216&context=facultyworkingpapers ETB]
The problem, I suggest below, is that these institutional
accounts¶ do not capture the full range of pressures that
influence the¶ preferences of elected officials for expanding or contracting presidential authority. Although
Presidents and their copartisans in¶ Congress may be pushed towards an expansive vision of presidential¶ authority by a shared desire to
maintain maximum policy flexibility,¶ they are often pulled by their partisan commitments to try to¶ embrace
constraints that limit the President’s policy flexibility on¶ those issues that may be owned by the political
opposition.21 Indeed,¶ both electoral and ideological incentives may explain why politicians¶ are sometimes
willing to commit to institutional arrangements they¶ hope will constrain their successors even if it comes
at the expense¶ of maintaining policy flexibility. To be clear, some constitutional¶ scholars have recognized that societal actors
may try to usher in¶ new constitutional orders for partisan objectives, but these scholars¶ have focused largely on tactics like stacking the
judiciary, exerting¶ greater influence over administrative agencies, or establishing¶ policy agendas in a way that demobilizes political
opponents.22¶ However, these scholars have neither focused specifically on the¶ separation of powers nor examined the interaction between
partisan¶ issue ownership and constitutional structure, which is a crucial¶ aspect of the approach this Essay advances.
AT Supreme Court CP
2AC Frontline
Solvency Deficit - Congress solves better than the courts—have a significant
institutional advantage in regulating new technologies:
Orin S. Kerr, 2004 (Associate Professor, George Washington University Law School, Michigan Law
Review, 102 Mich. L. Rev. 801, Accessed 7/7/2015, rwg)
In this part, I will argue that such enthusiasm for judicial solutions overlooks significant institutional limitations of judicial rulemaking. Courts
tend to be poorly suited to generate effective rules regulating criminal investigations involving new
technologies. In contrast, legislatures possess a significant institutional advantage in this area over
courts. While courts have successfully created rules that establish important privacy rights in many areas,
it is difficult for judges to fashion lasting guidance when technologies are new and rapidly changing. The
context of judicial decisionmaking often leaves the law surprisingly unclear. Courts lack the institutional
capacity to easily grasp the privacy implications of new technologies they encounter. Judges cannot readily
understand how the technologies may develop, cannot easily appreciate context, and often cannot even recognize [*859] whether the facts of the
case before them raise privacy implications that happen to be typical or atypical. Judicially
created rules also lack necessary
flexibility; they cannot change quickly and cannot test various regulatory approaches. As a result,
judicially created rules regulating government investigations tend to become quickly outdated or uncertain as
technology changes. The context of legislative rule-creation offers significantly better prospects for the
generation of balanced, nuanced, and effective investigative rules involving new technologies. In light of these
institutional realities, courts should proceed cautiously and with humility, allowing some room for political judgment and maneuvering in a
setting that is in such flux. n345
Perm – Do Both – Courts will shield Congressional action on surveillance – will look
like Courts forced Congress and Obama to act
Keith E. Whittington, 2007 politics at Princeton University, (Political Foundations of Judicial
Supremacy, p. 137-39)
Independent and active judicial review generates position-taking opportunities by reducing the
policy responsibility of the elected officials. They may vote in favor of a bill that they personally
dislike secure in the knowledge that it will never be implemented. State statutes regulating abortion after the Roe
decision, for example, were often pure symbolism, though they could also play a more productive role in pressing the Court to refine its
doctrine or in filling in the lacuna left by judicial decisions. More subtly, the
judicial backstop allows legislators to focus
on some dimensions of the proposed policy (the most optimistic and politically popular) while
downplaying others (the constitutionally subversive and treacherous). Legislators even gain a political
windfall when the courts actually act to strike down the popular law. The visibility of the exercise of
judicial review creates another opportunity for legislators to publicize their position on the issue, this
time by bewailing the Court’s actions.
Separation of Powers Turn A) Failure of other branches to play a proper role in interpreting the Constitution
undermines Separation of Powers:
Robert J. Kaczorowski, 2005 Professor of Law at Fordham University School of Law, March 2005.
[The Fordham Law Review, “Theories of taking the Constitution seriously outside the courts: popular
Constitutionalism versus justice in plain clothes: reflections from history,” p.lexis]
A majority of the American public today believes that the Supreme Court should have the final authority
to interpret the Constitution. In light of history, Kramer argues, the current acceptance of judicial
supremacy "is exceedingly anomalous." The practice of judicial supremacy takes control over
fundamental law away from the people and turns it over to "a judicial oligarchy." Consequently, Kramer contends
that advocates of judicial supremacy are anti-democratic who believe "that popular politics is by nature dangerous and arbitrary; that "tyranny of
the majority' is a pervasive threat; that a democratic constitutional order is therefore precarious and highly vulnerable; and that substantial checks
Kramer sees the current debate regarding judicial supremacy as the
same debate over the question of how to control an excess of democracy or popular rule that arose at the
founding and again during the middle of the nineteenth century. It is a debate between democracy and
aristocracy, and aristocracy is currently winning.
on politics are necessary lest things fall apart."
B) Flawed model of separation of powers causes global wars
Zakaria, 1997 editor of Newsweek International, ’97 (Fareed, Foreign Affairs, November, LN)¶
When divining the cause behind this correlation, one thing becomes clear: the democratic peace is¶ actually the liberal peace.
Writing in the eighteenth century, Kant believed that democracies were ¶ tyrannical, and he specifically excluded them from his conception of
"republican" governments, which lived in a zone of peace. Republicanism,
for Kant, meant a separation of powers, checks
and balances, the rule of law, protection of individual rights, and some level of representation in
government (though nothing close to universal suffrage). Kant's other explanations for the "perpetual peace" between republics are all closely
linked to their constitutional and liberal character: a mutual respect for the rights of each other's citizens, a system of checks and balances
assuring that no single leader can drag his country into war, and classical liberal economic policies -- most importantly, free trade -- which create
an interdependence that makes war costly and cooperation useful. Michael Doyle, the leading scholar on the subject, confirms in his 1997 book
Ways of War and Peace that without constitutional liberalism, democracy itself has no peace-inducing qualities: Kant distrusted unfettered,
democratic majoritarianism, and his argument offers no support for a claim that all participatory polities -- democracies -- should be peaceful,
either in general or between fellow democracies. Many participatory polities have been non-liberal. For two thousand years before the modern
age, popular rule was widely associated with aggressiveness (by Thucydides) or imperial success (by Machiavelli) . . . The decisive preference of
[the] median voter might well include "ethnic cleansing" against other democratic polities. The distinction between liberal and illiberal
democracies sheds light on another striking statistical correlation. Political scientists Jack Snyder and Edward Mansfield contend, using an
impressive data set, that over the last 200 years democratizing states went to war significantly more often than either stable autocracies or liberal
democracies. In
countries not grounded in constitutional liberalism, the¶ rise of democracy often brings with
it hyper-nationalism and war-mongering. When the political¶ system is opened up, diverse groups with incompatible interests gain
access to power and press their¶ demands. Political and military leaders, who are often embattled remnants of the old authoritarian¶ order, realize
that to succeed that they must rally the masses behind a national cause. The
result is¶ invariably aggressive rhetoric and
policies, which often drag countries into confrontation and war.¶ Noteworthy examples range from Napoleon III's
France, Wilhelmine Germany, and Taisho Japan to¶ those in today's newspapers, like Armenia and Azerbaijan and Milosevic's Serbia. The
democratic¶ peace, it turns out, has little to do with democracy.¶
Can’t solve signal to foreign markets and EU - Congressional actions have stronger
legitimacy than Court actions
Araiza, 2005 Professor of Law @ Loyola Law School, 2005 (William, Tulane Law Review, February
2005, 79 Tul. L. Rev. 519; Lexis)
These concerns about overreaching and line-drawing are much less salient for a legislature. As a political
institution with a constantly renewed democratic mandate, Congress is less susceptible to the charge of
imperialism. n174 The idea of self-limitation is at least formally inapplicable to the body that represents
the people, and whose powers, within its proper sphere, are understood to be plenary. Congress's
democratic legitimacy also spares it from the requirement that it use legal reasoning to justify the lines it
draws.
CP links to politics - Controversial S Court decisions link to politics – Healthcare
proves
Stephen Manual, 2012 (6/28/2012, staff writer, “Will Supreme Court judgment help Obama win
presidential election?” Accessed 7/26/2012 at http://www.allvoices.com/contributed-news/12483143will-supreme-court-judgment-help-obama-win-presidential-election, rwg)
Finally, President Barack Obama
has carried the day. He stood winner as the Supreme Court ruled on Thursday to
uphold the Affordable Care Act. However, the president remained humble during his speech following the decision. He said that it
was a victory for the American people and his administration would continue to work for betterment of the people. The Supreme Court
judgment is clearly against the anticipation of Republicans, as they were predicting a contrary decision on the issue. The
judgment can be called one of the biggest victories of the Obama administration in years. However, the question arises whether
the Obama administration will be able to translate the victory into successful election campaign or not.
Observers believe the administration would definitely exploit the judgment in its favor and try its best to
convince electorates to cast vote for Obama in the upcoming presidential election. The visionary abilities of Obama would be highlighted and
people would be told about revolutionary plans of Obama for the people and that all these plans would be implemented only if he is reelected into
the office in November’s election. The judgment would also help the Obama administration to undermine capabilities of Republican presidential
candidate Mitt Romney. Observers opine the judgment dealt a heavy blow to the Republicans, as they believed the court would strike down the
individual mandate – at the very least. They were planning to celebrate the judgment and shaming the Obama administration once the verdict was
out, but they were shocked after the judgment was released. Observers believe that the Obama administration has got a fresh opportunity to set
the house in order and focus more on public-related issues so that they could bag maximum votes in the upcoming presidential election. It is the
best opportunity for Obama to sell his Health-Care law to the masses. Mitt Romney, while giving his reaction on the Supreme Court judgment,
said that he would repeal the law if elected to the presidency in the November election. He even said that there was a need to get rid of Obama if
people want to get rid of Obama-care. Definitely, Republicans
would lash out at the law in their public meetings and
try to invoke public anger on the issue. Republicans believe the ruling of the Supreme Court can hamper their campaign against
Obama.
Agent counterplans are a voting issue- they moot the 1ac with no 2ac recourse due
to lack of comparative solvency evidence between congress and the executive.
Congress solves better Ext
Congress key to regulate electronic surveillance:
Timothy Casey, 2008 (Associate Professor of Law, Case Western Reserve University School of Law,
“RIGHTS AND REMEDIES: Electronic Surveillance and the Right To Be Secure,” UC Davis Law
Review, Lexis/Nexis, Accessed 6/25/2015, rwg)
n152. One
commentator has suggested that the legislature, and not the courts, are properly situated to
regulate electronic surveillance. Orin Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for
Caution, 102 Mich. L. Rev. 801, 804-06 (2004) ("Courts should place a thumb on the scale in favor of judicial caution
when technology is in flux, and should consider allowing legislatures to provide the primary rules
governing law enforcement investigations involving new technologies.").
Congress key to regulate electronic surveillance:
Timothy Casey, 2008 (Associate Professor of Law, Case Western Reserve University School of Law,
“RIGHTS AND REMEDIES: Electronic Surveillance and the Right To Be Secure,” UC Davis Law
Review, Lexis/Nexis, Accessed 6/25/2015, rwg)
n152. One
commentator has suggested that the legislature, and not the courts, are properly situated to
regulate electronic surveillance. Orin Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for
Caution, 102 Mich. L. Rev. 801, 804-06 (2004) ("Courts should place a thumb on the scale in favor of judicial caution
when technology is in flux, and should consider allowing legislatures to provide the primary rules
governing law enforcement investigations involving new technologies.").
(--) Congress best to regulate Internet surveillance law:
Orin S. Kerr, 2004 (Associate Professor, George Washington University Law School, Michigan Law
Review, 102 Mich. L. Rev. 801, Accessed 7/7/2015, rwg)
Of course, the legislative enactment of law enforcement regulations beyond the Fourth Amendment does not necessarily mean that these statutory
laws are adequate. I have argued both in congressional testimony and in my academic writing that Congress's
handiwork in the field
of Internet surveillance law offers a promising framework, but needs reforms to bolster privacy
protections. n334 At the same time, Congress's track record is often ignored by scholars even [*857] when statutes provide the most
important privacy protection against invasive government practices. n335 Both criminal procedure and privacy law scholars
have tended to focus their attention on the Fourth Amendment, overlooking the reality that since the
1960s Congress rather than the courts has shown the most serious interest in protecting privacy from new
technologies. Judicial decisions have played a role by shaping legislation, but the real work that has been done to regulate
law enforcement use of new technologies has come primarily from Congress, not the courts.
(--) Congress better at conducting Internet privacy laws:
Orin S. Kerr, 2004 (Associate Professor, George Washington University Law School, Michigan Law
Review, 102 Mich. L. Rev. 801, Accessed 7/7/2015, rwg)
The statutory framework that governs Internet privacy demonstrates the flexibility and creative potential of legislative approaches. Congress
enacted the Electronic Communications Privacy Act ("ECPA") in 1986 to regulate the privacy of Internet communications. n420 Since that time,
Congress has amended the framework no less than eleven times: once in 1988, n422 three times in 1996, n424 twice in 2001, n426 Some of those
changes were only minor technical amendments, while others were more significant alterations to the statutory scheme. Moreover, the
structure of Congress's statutory Internet privacy laws demonstrates how legislative rules can impose
[*872] creative and flexible regulatory regimes involving new technologies. For example, Congress opted
to regulate both public and private parties to best protect privacy. This would be difficult if not impossible
under the Fourth Amendment, which regulates only the government and private parties acting on the
government's behalf. n427 But ECPA recognizes that private parties acting on their own can pose a serious threat to Internet privacy: if
America Online can look through the e-mails of its 30 million subscribers and disclose the evidence to the police without restriction, this would
gut Internet privacy protections. The Fourth Amendment does not restrict this disclosure, but ECPA does: n428 in addition to restricting the
ability of law enforcement to order private ISPs to disclose communications to law enforcement, n429 the law also restricts the ability of private
ISPs to disclose communications to law enforcement voluntarily. n430
Congress is superior to judiciary due to expertise in national security judgment
Mariah Zeisberg 2013, assistant professor of pol sci @ U of Michigan, War Powers: The Politics of
Constitutional Authority, p. 32-33, KEL
The first, most
obvious strength of the presidency and legislature vis-à-vis the judiciary is their
connectedness to policymaking. As they confront security politics every day, officials in the legislative
and executive branches acquire knowledge that is useful for making good judgments about foreign policy.
This shared distinctive strength partly grounds their actual dominance and normative prominence in
security politics relative to the judiciary. We can translate this constitutional capacity into two different standards for processual
assessment. The first is that the branches engage in reasoning over public policy that is sensitive to the security realities they encounter. Because
they are exposed to dilemmas of war and security in their daily governance tasks, they should he equipped to use reality-based assessments about
war and security in their deliberations. To what extent are the branches’ deliberations premised on reality, rather than fantasy? To what extent are
they using their governance capacities to generate the kind of information about the world they need? The extent to which each branch uses, and
cultivates, the knowledge available to it; the extent to which deliberative processes incorporate more rather than fewer relevant considerations;
the extent to which deliberation is able to clarify relevant alternatives; and a scalar consideration, about the extent to which the branches advance
high priorities over and above low priorities—these are all relatively ordinary ways that citizens, officials, and scholars already assess whether the
branches engage in politics that are sensitive to policy realities.94
Congress is better than Courts at legitimizing their decisions with the public – it
overcomes opposition
Mariah Zeisberg 2013, assistant professor of pol sci @ U of Michigan, War Powers: The Politics of
Constitutional Authority, p. 34, KEL
A second strength that Congress and the presidency share vis-a-vis the judiciary is the elected branches’
relatively tight link to the public.95 Given recurrent elections, the justifications the branches offer for their
policies and constitutional positions play out within a horizon of meaning and interpretability set by the need to justify
policy to larger publics. The branches make security and constitutional claims not only to persuade one another, but also to persuade
public constituencies that are watching, evaluating, and voting. In fact, the branches are often aware that their success in
winning over rivals may depend on their success in mobilizing public opinion. Both branches have
resources to woo that opinion.
CP links to Politics - Exts
Health care proves: Republicans will rally against Supreme Court decisions they
oppose:
Fox News Latino, 2012 6/28/2012 (“Supreme Court Upholds Health Care Reform Law in Big Win
for Obama,” http://latino.foxnews.com/latino/politics/2012/06/28/supreme-court-obama-health-carereform-act-is-constitutional/, rwg)
Republicans immediately cast the Supreme Court decision as a wake-up call for Americans. In what is
surely to be a campaign theme for Romney going forward, the Republican National committee chairman
Reince Priebus said: "We need market-based solutions that give patients more choice, not less. The answer to
rising health care costs is not, and will never be, Big Government.” Democrats heralded the decision as a much needed extension of basic health
care to millions of Americans without access to medical attention.
(--) Conservatives will push other branches of Congress to reverse unpopular
Supreme Court decisions:
Steffi Porter, 2012 6/28/2012 (staff writer, “Conservative groups denounce Supreme Court ruling on
‘ObamaCare’” Porter http://blog.chron.com/txpotomac/2012/06/conservative-groups-denounce-supremecourt-ruling-on-obamacare/, Accessed 7/26/2012, rwg)
Conservative opponents of “ObamaCare” were not happy to hear that the Supreme Court ruled 5-4 in
favor of upholding the controversial health care law. Not just unhappy. Furious. “Today’s Supreme Court decision
will do serious harm to American families,” said Family Research Council President Tony Perkins. “Not only is the individual mandate a
profound attack on our liberties, but it is only one section among hundreds of provisions in the law that will force taxpayers to fund abortions,
violate their conscience rights, and impose a massive tax and debt burden on American families.”
American Conservative Union
Chairman Al Cardenas called for the law to be “thrown out.”
“Today’s unfortunate decision by the Supreme Court to
uphold an unpopular and ill-considered law puts the American healthcare system at the mercy of Washington bureaucrats,” Cardenas said in a
statement. “This law needs to be thrown out by the Congress and the President immediately, as it exceeds federal
power, asserting enormous federal control over the healthcare of every man, woman and child in America. We need a bill that that will actually
solve our healthcare problems and reduce the cost — not add to the legacy of debt to our children with trillions of dollars in new spending.”
(--) Liberal Supreme Court decisions quickly become fodder for the Republican
Party to rally their conservative base:
Atlanta Journal-Constitution, 2005 7/10/2005; Lexis
With the retirement of Supreme Court Justice Sandra Day O'Connor, and the expected retirement of Chief Justice William Rehnquist, a court that
has been unchanged since 1994 is about to take on a very different look. But it's not going to happen without a fight. The
conservative
movement that has taken control of the Republican Party --- and with it the legislative and executive
branches --- now sees its opportunity to remake the Supreme Court as well, clearing the last obstacle to the revolution
it seeks to create in American government and culture. To justify that makeoverof the court, Republican activists have
spun out an elaborate indictment of the current system, repeating it endlessly until it has taken on the aura
of absolute truth in some corners. For instance, much of the rhetoric coming from House Majority Leader Tom DeLay, Senate
Majority Leader Bill Frist and other Republican leaders has focused on what they call "judicial activism," judges who in their minds have been
overly eager to impose their own personal beliefs on the political system.
Download