topicality surveillance - Millennial Speech & Debate

advertisement
Resolution
Resolved: The United States federal government should substantially curtail its domestic surveillance.
Resolved: The Federal Government Should
Resolved
Resolved means to express by formal vote
Webster’s Revised Unabridged Dictionary, 1998 (dictionary.com)
Resolved:
5. To express, as an opinion or determination, by resolution and vote; to declare or decide by a formal
vote; -- followed by a clause; as, the house resolved (or, it was resolved by the house) that no money should be apropriated (or, to
appropriate no money).
‘Resolved’ denotes a proposal to be enacted by law
Words and Phrases 64 Permanent Edition
Definition of the word “resolve,” given by Webster is “to express an opinion or determination by
resolution or vote; as ‘it was resolved by the legislature;” It is of similar force to the word “enact,” which
is defined by Bouvier as meaning “to establish by law”.
Firm decision
AHD 6 (American Heritage Dictionary, http://dictionary.reference.com/browse/resolved)
Resolve TRANSITIVE VERB:1. To make
decide or express by formal vote.
a firm decision about. 2. To cause (a person) to reach a decision. See synonyms at decide. 3. To
Specific course of action
AHD 6 (American Heritage Dictionary, http://dictionary.reference.com/browse/resolved)
INTRANSITIVE VERB:1. To reach a decision or make
reduced to constituents. 3. Music To undergo resolution.
a determination: resolve on a course of action . 2. To become separated or
Resolved: – Aff Competition
“Resolved” doesn’t require certainty
Webster’s 9 – Merriam Webster 2009
(http://www.merriam-webster.com/dictionary/resolved)
# Main Entry: 1re·solve # Pronunciation: \ri-ˈzälv, -ˈzȯlv also -ˈzäv or -ˈzȯv\ # Function: verb # Inflected Form(s): re·solved; re·solv·ing 1 : to
become separated into component parts; also : to become reduced by dissolving or analysis 2 : to form a resolution : determine 3 : consult,
deliberate
Or immediacy
PTE 9 – Online Plain Text English Dictionary 2009
(http://www.onelook.com/?other=web1913&w=Resolve)
Resolve: “To form a purpose; to make a decision; especially, to determine after reflection; as, to resolve on a better course of
life.”
Colon
Colon is meaningless --- everything after it is what’s important
Webster’s 00 (Guide to Grammar and Writing, http://ccc.commnet.edu/grammar/marks/colon.htm)
Use of a colon before a list or an explanation that is preceded by a clause that can stand by itself. Think of the colon as a gate, inviting one to go
on… If
the introductory phrase preceding the colon is very brief and the clause following the colon
represents the real business of the sentence, begin the clause after the colon with a capital letter.
The colon just elaborates on what the community was resolved to debate
Encarta 7 (World Dictionary, “colon”,
http://encarta.msn.com/encnet/features/dictionary/DictionaryResults.aspx?refid=1861 598666)
co·lon (plural co·lons)
noun
Definition:
1. punctuation mark: the punctuation mark (:) used
to divide distinct but related sentence components such as
clauses in which the second elaborates on the first, or to introduce a list, quotation, or speech. A colon is sometimes used in
U.S. business letters after the salutation. Colons are also used between numbers in statements of proportion or time and Biblical or literary
references.
The
“The” is used to denote a specific entity
American Heritage, 00 (Fourth Edition, http://dictionary.reference.com/browse/the)
the1
P (th before a vowel; th before a consonant)
def.art.
Used before singular or plural nouns and noun phrases that denote particular, specified persons or
things: the baby; the dress I wore. Used before a noun, and generally stressed, to emphasize one of a
group or type as the most outstanding or prominent: considered Lake Shore Drive to be the
neighborhood to live in these days. Used to indicate uniqueness: the Prince of Wales; the moon. Used
before nouns that designate natural phenomena or points of the compass: the weather; a wind from the
south. Used as the equivalent of a possessive adjective before names of some parts of the body: grab
him by the neck; an infection of the hand. Used before a noun specifying a field of endeavor: the law;
the film industry; the stage. Used before a proper name, as of a monument or ship: the Alamo; the
Titanic. Used before the plural form of a numeral denoting a specific decade of a century or of a life
span: rural life in the Thirties.
The word “the” implies there is only one – as in the USFG
Cambridge Dictionaries Online 7
used to refer to things or people when only one exists at any one time:
‘The’ means all parts.
Merriam-Websters 8 Online Collegiate Dictionary, http://www.m-w.com/cgi-bin/dictionary
4 -- used as a function word before a noun or a substantivized adjective to indicate reference to a group
as a whole <the elite>
‘The’ denotes uniqueness – distinguishes the federal government from other
governments
Merriam-Websters 8 Online Collegiate Dictionary, http://www.m-w.com/cgi-bin/dictionary
used as a function word to indicate that a following noun or noun equivalent is a unique or a particular
member of its class <the President> <the Lord>
Federal Government
Federal government is central government
WEBSTER'S 76 NEW INTERNATIONAL DICTIONARY UNABRIDGED, p. 833.
Federal government. Of or relating to the central government of a nation, having the character of a
federation as distinguished from the governments of the constituent unites (as states or provinces).
Federal government is the national government that expresses power
Black’s Law Dictionary, 8th Edition, June 1, 2004, pg.716.
Federal government. 1. A national government that exercises some degree of control over smaller
political units that have surrendered some degree of power in exchange for the right to participate in
national politics matters – Also termed (in federal states) central government. 2. the U.S. government –
Also termed national government. [Cases: United States -1 C.J.S. United States - - 2-3]
Federal refers to the national government. It’s distinct from state law.
Dictionary of Government and Politics ’98 (Ed. P.H. Collin, p. 116)
federal [‘federal] adjective (a) referring to a system of government in which a group of states are linked
together in a federation; a federal constitution = constitution (such as that in Germany) which provides
for a series of semi-autonomous states joined together in a national federation (b) referring especially to
the federal government of the United States; federal court or federal laws = court or laws of the USA, as
opposed to state courts or state laws.
USFG is the federal government of the USA, based in DC
Dictionary of Government and Politics ’98 (Ed. P.H. Collin, p. 292)
United States of America (USA) [ju:’naitid ‘steits av e’merike] noun independent country, a federation of
states (originally thirteen, now fifty in North America; the United States Code = book containing all the
permanent laws of the USA, arranged in sections according to subject and revised from time to time
COMMENT: the federal government (based in Washington D.C.) is formed of a legislature (the Congress)
with two chambers (the Senate and House of Representatives), an executive (the President) and a
judiciary (the Supreme Court). Each of the fifty states making up the USA has its own legislature and
executive (the Governor) as well as its own legal system and constitution
Should
Should refers to what should be NOT what should have been
OED, Oxford English Dictionary, 1989 (2ed. XIX), pg. 344
Should An utterance of the word should. Also, what ‘should be’.
Should means an obligation or duty
AHD 92 – AHD, American Heritage Dictionary of the English Language, 1992 (4ed); Pg. 1612
Should—1. Used to express obligation or duty: You should send her a note.
Should expresses an expectation of something
AHD 92 – AHD, American Heritage Dictionary of the English Language, 1992 (4ed); Pg. 1612
Should—2. Used to express probability or expectation: They should arrive at noon.
Should expresses conditionality or contingency
AHD 92 – AHD, American Heritage Dictionary of the English Language, 1992 (4ed); Pg. 1612
Should—3. Used to express conditionality or contingency: If she should fall, then so would I.
“Should” expresses duty, obligation, or necessity
Webster’s 61 – Webster’s Third New International Dictionary 1961 p. 2104
Used in auxiliary function to express duty, obligation, necessity, propriety, or expediency
Should – Mandatory
“Should” is mandatory
Nieto 9 – Judge Henry Nieto, Colorado Court of Appeals, 8-20-2009 People v. Munoz, 240 P.3d 311
(Colo. Ct. App. 2009)
"Should" is "used . . . to express duty, obligation, propriety, or expediency." Webster's Third New International Dictionary
2104 (2002). Courts [**15] interpreting the word in various contexts have drawn conflicting conclusions, although the weight of
authority appears to favor interpreting "should" in an imperative, obligatory sense. HN7A number of courts,
confronted with the question of whether using the word "should" in jury instructions conforms with the Fifth and Sixth Amendment protections
governing the reasonable doubt standard, have upheld instructions using the word. In the courts of other states in which a
defendant has argued that the word "should" in the reasonable doubt instruction does not sufficiently inform the jury that it is bound to find
the defendant not guilty if insufficient proof is submitted at trial, the courts have squarely rejected the argument. They reasoned that the
word "conveys a sense of duty and obligation and could not be misunderstood by a jury." See State v. McCloud,
257 Kan. 1, 891 P.2d 324, 335 (Kan. 1995); see also Tyson v. State, 217 Ga. App. 428, 457 S.E.2d 690, 691-92 (Ga. Ct. App. 1995) (finding
argument that "should" is directional but not instructional to be without merit); Commonwealth v. Hammond, 350 Pa. Super. 477, 504 A.2d
940, 941-42 (Pa. Super. Ct. 1986). Notably, courts
interpreting the word "should" in other types of jury instructions [**16] have
also found that the word conveys to the jury a sense of duty or obligation and not discretion . In Little v. State, 261
Ark. 859, 554 S.W.2d 312, 324 (Ark. 1977), the Arkansas Supreme Court interpreted the word "should" in an instruction
on circumstantial evidence as synonymous with the word "must" and rejected the defendant's argument that the jury may have
been misled by the court's use of the word in the instruction. Similarly, the Missouri Supreme Court rejected a defendant's
argument that the court erred by not using the word "should" in an instruction on witness credibility which
used the word "must" because the two words have the same meaning. State v. Rack, 318 S.W.2d 211, 215 (Mo.
1958). [*318] In applying a child support statute, the Arizona Court of Appeals concluded that a legislature's or
commission's use of the word "should" is meant to convey duty or obligation. McNutt v. McNutt, 203 Ariz. 28, 49
P.3d 300, 306 (Ariz. Ct. App. 2002) (finding a statute stating that child support expenditures "should" be allocated for the purpose of parents'
federal tax exemption to be mandatory).
“Should” means must – its mandatory
Foresi 32 (Remo Foresi v. Hudson Coal Co., Superior Court of Pennsylvania, 106 Pa. Super. 307; 161 A.
910; 1932 Pa. Super. LEXIS 239, 7-14, Lexis)
As regards the mandatory character of the rule, the word 'should' is not only an auxiliary verb, it is also the
preterite of the verb, 'shall' and has for one of its meanings as defined in the Century Dictionary: "Obliged or
compelled (to); would have (to); must; ought (to); used with an infinitive (without to) to express obligation,
necessity or duty in connection with some act yet to be carried out." We think it clear that it is in that sense that the
word 'should' is used in this rule, not merely advisory. When the judge in charging the jury tells them that, unless they find from all the
evidence, beyond a reasonable doubt, that the defendant is guilty of the offense charged, they should acquit,
the word 'should' is not
used in an advisory sense but has the force or meaning of 'must', or 'ought to' and carries [***8] with it
the sense of [*313] obligation and duty equivalent to compulsion. A natural sense of sympathy for a few unfortunate
claimants who have been injured while doing something in direct violation of law must not be so indulged as to fritter away, or nullify,
provisions which have been enacted to safeguard and protect the welfare of thousands who are engaged in the hazardous occupation of
mining.
Should means must
Words & Phrases 6 (Permanent Edition 39, p. 369)
C.D.Cal. 2005.
“Should,” as used in the Social Security Administration’s ruling stating that an ALJ should call on the services of a medical
advisor when onset must be inferred, means “must.”—Herrera v. Barnhart, 379 F.Supp.2d 1103.—Social S 142.5.
Should – Not Mandatory
Should isn’t mandatory
Words & Phrases 6 (Permanent Edition 39, p. 369)
C.A.6 (Tenn.) 2001.
Word “should,” in most contexts, is precatory, not mandatory. –U.S. v. Rogers, 14 Fed.Appx. 303. –Statut 227.
Strong admonition --- not mandatory
Taylor and Howard 5 (Michael, Resources for the Future and Julie, Partnership to Cut Hunger and
Poverty in Africa, “Investing in Africa's future: U.S. Agricultural development assistance for Sub-Saharan
Africa”, 9-12, http://www.sarpn.org.za/documents/d0001784/5-US-agric_Sept2005_Chap2.pdf)
Other legislated DA earmarks in the FY2005 appropriations bill are smaller and more targeted: plant biotechnology research and development
($25 million), the American Schools and Hospitals Abroad program ($20 million), women’s leadership capacity ($15 million), the International
Fertilizer Development Center ($2.3 million), and clean water treatment ($2 million). Interestingly, in the wording of the bill, Congress uses the
term shall in connection with only two of these eight earmarks; the others say that USAID should make the prescribed amount available. The
difference between shall and should may have legal significance—one is clearly mandatory while the other is a
strong admonition—but it makes little practical difference in USAID’s need to comply with the congressional directive to the
best of its ability.
Permissive
Words and Phrases 2 (Vol. 39, p. 370)
Cal.App. 5 Dist. 1976.
Term “should,” as used in statutory provision that motion to suppress search warrant should first be heard by
used in regular, persuasive sense, as recommendation, and is thus not mandatory
magistrate who issued warrant, is
but permissive. West’s Ann.Pen Code, § 1538.5(b).---Cuevas v. Superior Court, 130 Cal. Rptr. 238, 58 Cal.App.3d 406 ----Searches 191.
Desirable or recommended
Words and Phrases 2 (Vol. 39, p. 372-373)
Or. 1952. Where safety regulation for sawmill industry providing that a two by two inch guard rail should be installed at extreme outer edge of
walkways adjacent to sorting tables was immediately preceded by other regulations in which word “shall” instead of “should” was used, and
word “should” did not appear to be result of inadvertent use in particular regulation, use of word “should” was intended to convey
idea that particular precaution involved was desirable and recommended, but not mandatory . ORS 654.005 et seq.---Baldassarre v. West Oregon Lumber Co., 239 P.2d 839, 193 Or. 556.---Labor & Emp. 2857
Should – Desirable
“Should” means desirable --- this does not have to be a mandate
AC 99 (Atlas Collaboration, “Use of Shall, Should, May Can,”
http://rd13doc.cern.ch/Atlas/DaqSoft/sde/inspect/shall.html)
shall
'shall' describes something that is mandatory. If a requirement uses 'shall', then that requirement _will_ be satisfied without
fail. Noncompliance is not allowed. Failure to comply with one single 'shall' is sufficient reason to reject the entire product. Indeed, it must be
rejected under these circumstances. Examples: # "Requirements shall make use of the word 'shall' only where compliance is mandatory." This
is a good example. # "C++ code shall have comments every 5th line." This is a bad example. Using 'shall' here is too strong.
should
'should' is weaker. It describes something that might not be satisfied in the final product, but that is
desirable enough that any noncompliance shall be explicitly justified. Any use of 'should' should be examined carefully, as it probably
means that something is not being stated clearly. If a 'should' can be replaced by a 'shall', or can be discarded entirely, so much the better.
Examples: # "C++ code should be ANSI compliant." A good example. It may not be possible to be ANSI compliant on all platforms, but we
should try. # "Code should be tested thoroughly." Bad example. This 'should' shall be replaced with 'shall' if this requirement is to be stated
anywhere (to say nothing of defining what 'thoroughly' means).
“Should” doesn’t require certainty
Black’s Law 79 (Black’s Law Dictionary – Fifth Edition, p. 1237)
Should. The past tense of shall; ordinarily implying duty or obligation; although usually no more than an obligation of propriety or
expediency, or a moral obligation, thereby distinguishing it from “ought.” It is not normally synonymous with “may,” and although often
interchangeable with the word “would,” it does
not ordinarily express certainty as “will” sometimes does.
Should – Immediate
“Should” means “must” and requires immediate legal effect
Summers 94 (Justice – Oklahoma Supreme Court, “Kelsey v. Dollarsaver Food Warehouse of Durant”,
1994 OK 123, 11-8,
http://www.oscn.net/applications/oscn/DeliverDocument.asp?CiteID=20287#marker3fn13)
¶4 The
legal question to be resolved by the court is whether the word "should"13 in the May 18 order connotes
futurity or may be deemed a ruling in praesenti.14 The answer to this query is not to be divined from rules of grammar;15 it must
be governed by the age-old practice culture of legal professionals and its immemorial language usage. To determine if the omission (from the
critical May 18 entry) of the turgid phrase, "and the same hereby is", (1) makes it an in futuro ruling - i.e., an expression of what the judge will
or would do at a later stage - or (2) constitutes an in in praesenti resolution of a disputed law issue, the trial judge's intent must be garnered
from the four corners of the entire record.16
[CONTINUES – TO FOOTNOTE]
13 "Should" not only is used as a "present indicative" synonymous with ought but also is the past tense of "shall" with various shades of
meaning not always easy to analyze. See 57 C.J. Shall § 9, Judgments § 121 (1932). O. JESPERSEN, GROWTH AND STRUCTURE OF THE ENGLISH
LANGUAGE (1984); St. Louis & S.F.R. Co. v. Brown, 45 Okl. 143, 144 P. 1075, 1080-81 (1914). For a more detailed explanation, see the Partridge
quotation infra note 15. Certain
contexts mandate a construction of the term "should" as more than merely
indicating preference or desirability. Brown, supra at 1080-81 (jury instructions stating that jurors "should" reduce the amount of
damages in proportion to the amount of contributory negligence of the plaintiff was held to imply an obligation and to be more than advisory);
Carrigan v. California Horse Racing Board, 60 Wash. App. 79, 802 P.2d 813 (1990) (one of the Rules of Appellate Procedure requiring that a party
"should devote a section of the brief to the request for the fee or expenses" was interpreted to mean that a party is under an obligation to
include the requested segment); State v. Rack, 318 S.W.2d 211, 215 (Mo. 1958) ("should" would
mean the same as "shall" or
"must" when used in an instruction to the jury which tells the triers they "should disregard false testimony"). 14 In praesenti means
literally "at the present time." BLACK'S LAW DICTIONARY 792 (6th Ed. 1990). In legal parlance the phrase denotes that which
in law is presently or immediately effective, as opposed to something that will or would become effective in
the future [in futurol]. See Van Wyck v. Knevals, 106 U.S. 360, 365, 1 S.Ct. 336, 337, 27 L.Ed. 201 (1882).
Should – No Immediate
Should doesn’t mean immediate
Dictionary.com – Copyright © 2010 – http://dictionary.reference.com/browse/should
should
/ʃʊd/ Show Spelled[shood] Show IPA –auxiliary verb 1. pt. of shall. 2. (used to express condition): Were he to arrive, I
should be pleased. 3. must; ought (used to indicate duty, propriety, or expediency): You should not do that. 4. would (used to make a statement
less direct or blunt): I should think you would apologize. Use should in a Sentence See images of should Search should on the Web Origin: ME
sholde, OE sc ( e ) olde; see shall —Can be confused: could, should, would (see usage note at this entry ). —Synonyms 3. See must1 . —
Usage note Rules similar to those for choosing between shall
and will have long been advanced for should and would, but again the rules
have had little effect on usage. In most constructions, would is the auxiliary chosen regardless of the person of the subject: If our allies would
support the move, we would abandon any claim to sovereignty. You would be surprised at the complexity of the directions. Because the main
function of should in modern American English is to express duty, necessity, etc. ( You should get your flu shot before winter comes ), its use
for other purposes, as to form a subjunctive, can produce ambiguity, at least initially: I should get my flu shot if I were you. Furthermore,
should seems an affectation to many Americans when used in certain constructions quite common in British English: Had I been informed, I
should (American would ) have called immediately. I should (American would ) really prefer a different arrangement. As with shall and will,
most educated native speakers of American English do not follow the textbook rule in making a choice between should and would. See
shall.
also
Shall –auxiliary verb, present singular 1st person shall, 2nd shall or ( Archaic ) shalt, 3rd shall, present plural shall; past singular 1st
person should, 2nd should or ( Archaic ) shouldst or should·est, 3rd should, past plural should; imperative, infinitive, and participles lacking. 1.
plan to, intend
to, or expect to: I shall go later.
Substantially
1nc – subsets
Curtail means to limit
MacMillan Dictionary, 15 (‘curtail’, http://www.macmillandictionary.com/dictionary/american/curtail
curtail
VERB [TRANSITIVE] FORMAL
to reduce or limit something, especially something good
a government attempt to curtail debate
A substantial curtailment must occur across the board – the aff only curtails a single
program
Anderson 5 – Brian Anderson, Becky Collins, Barbara Van Haren & Nissan Bar-Lev, Wisconsin Council
of Administrators of Special Services (WCASS) Committee Members. 2005 WCASS Research / Special
Projects Committee* Report on: A Conceptual Framework for Developing a 504 School District Policy
http://www.specialed.us/issues-504policy/504.htm#committee
The issue “Does it substantially limit the major life activity?” was clarified by the US Supreme Court
decision on January 8th, 2002 , “Toyota v. Williams”. In this labor related case, the Supreme Court noted
that to meet the “substantially limit” definition, the disability must occur across the board in multiple
environments, not only in one environment or one setting. The implications for school related 504
eligibility decisions are clear: The disability in question must be manifested in all facets of the student’s
life, not only in school.
Voting issue – this topic is massive and allows hundreds of minor reform affs – err neg
to create a reasonable expectation of preparedness
Substantially – 2%
“Substantial” must be at least 2%
Words & Phrases 60
'Substantial" means "of real worth and importance; of considerable value; valuable." Bequest to charitable institution,
making 1/48 of expenditures in state, held exempt from taxation; such expenditures constituting "substantial" part of its
activities. Tax Commission of Ohio v. American Humane Education Soc., 181 N.E. 557, 42 Ohio App. 4.
Substantially – 10%
Less than 10% is insubstantial
Mickels 8 (Alissa, JD Candidate – Hastings College of Law, “Summary of Existing US Law Affecting
Fourth Sector Organizations”, 7-17,
http://www.fourthsector.net/attachments/7/original/Summary_of_US_Law_Affecting_
FS.pdf?1229493187)
Substantial v. insubstantial: Modern courts consider competition with commercial firms as “strong evidence of a substantial
nonexempt purpose.” Living Faith, Inc. v. Comm’r, 60 T.C.M. 710, 713 (1990). Although the tax court has held that the definition of
insubstantial is fact specific, it has found that less than ten percent of a charity’s total efforts is
“insubstantial”, World Family Corp. v. Comm’r, 78 T.C. 921 (1982), where as unrelated business activity generating one-third of an
organizations revenue does not qualify for tax-exempt status. Orange County Agric. Soc’y, Inc. v. Comm’r, 55 T.C.M. 1602, 1604 (1988), aff’d
893 F.2d 647 (2d Cir. 1990). However, this may be changing after an increasing emphasis on commensurate test.
Substantially – 33%
“Substantially” means 33 percent
Maples 7 (Larry, “Pitfalls in Preserving Net Operating Losses”, The CPA Journal, 3-1, Lexis)
If a new loss corporation has substantial nonbusiness assets, the value of the old loss corporation must be reduced by the amount of the
nonbusiness assets less liabilities attributable to those assets. "Substantial" is defined as one-third of total assets. This is a difficult
provision to interpret. IRC section 382(1)(4) provides that a value reduction in the old loss corporation is required if, just after an ownership
change, the new loss corporation has substantial nonbusiness assets. This language seems odd because the purpose of IRC section 382 is to
prevent loss trafficking, so it would seem that the asset test ought to apply to the old loss corporation.
Substantially – 40%
“Substantially” means 40% --- strict quantification avoids vagueness
Schwartz 4 (Arthur, Lawyer – Schwartz + Goldberg, 2002 U.S. Briefs 1609, Lexis)
a way to avoid vagueness
issues. (Pet. App., at 13-14) Indeed, one of the Amici supporting the City in this case, the American Planning Association, produced
a publication that actually makes a recommendation of a percentage figure that should be adopted by municipalities in
establishing zoning [*37] regulations for adult businesses. n8 The APA's well researched report recommended that the terms
"substantial" and "significant" be quantified at 40 percent for floor space or inventory of a business in the definition of adult
In the opinion below, the Tenth Circuit suggested that a percentage figure would be
business. n9 (Resp. Br. App., at 15-16)
Substantially – 50%
Less than 50% is insubstantial
Brown 94 (Mark R., Professor of Law – Stetson University College of Law, “The Demise of
Constitutional Prospectivity: New Life for Owen?”, Iowa Law Review, January, 79 Iowa L. Rev. 273, Lexis)
n241 I am assuming here that "foreseeable" means "probable," as in "more probable than not." This appears to be a safe assumption given the
proliferance of cases granting immunity to officials who offend the Constitution. If this definition is correct, deterrence only works and liability
should only attach if one's conduct, viewed ex ante, is more likely illegal than legal: the risk of illegality must be more than fifty percent. In
other words, one cannot face deterrence, and liability will not attach, if the risk of illegality is less than fifty percent.
(When viewed in
this fashion, one might perceive a risk of illegality but still not be deterrable because the risk is not substantial, i.e., not
greater than fifty percent.). Lawful conduct, of course, need not be probably lawful. That is what risk is about. Situations might arise
where the objective risk is that conduct is unlawful, but ex post it is lawful. Lest judicial reasoning be completely askew, a fairly strong
correlation exists, however, between action that is ex ante probably lawful and that which is lawful ex post in the courts. If this is not true, then
courts are reaching objectively improbable conclusions, and the whole idea of reliance is illusory.
Legal experts agree
Davignon v. Clemmey 1 (Davignon v. Clemmey, 176 F. Supp. 2d 77, Lexis)
The court begins the lodestar calculation by looking at the contemporaneous billing records for each person who worked on the plaintiff's case.
The absence of detailed contemporaneous time records, except in extraordinary circumstances, will call for a substantial
reduction in any award or, in egregious cases, disallowance. What is a "substantial reduction"? Fifty percent is a favorite
among judges.
Substantially – 90%
“Substantially” means at least 90%
Words & Phrases 5 (40B, p. 329)
N.H. 1949. -The word "substantially" as used in provision of Unemployment Compensation Act that experience rating of an employer may
transferred to' an employing unit which acquires the organization, -trade, or business, or "substantially" all of the assets thereof, is 'an
elastic term which does not include a definite, fixed amount of percentage, and the transfer does not have to be
100 per cent but cannot be less than 90 per cent in the ordinary situation. R.L c. 218, § 6, subd. F, as added by Laws
1945, c. 138, § 16.-Auclair Transp. v. Riley, 69 A.2d 861, 96 N.H. l.-Tax347.1.
Substantial curtailment is 25%
A substantial curtailment is 25%
Senate Hearing, 66 (Possible anticompetitive effects of sale of network TV advertising. Hearings, Eightyninth Congress, second session, pursuant to S. Res. 191, Hein Online)
(f) Substantial curtailment of the normal sales of Brown & Williamson tobacco products due to (1)
prohibition of the manufacture or sale of tobacco products of Brown & Williamson due to governmental
regulations or restrictions; (2) inability to obtain the necessary raw material for the manufacture of
Brown ; Williamson tobacco products due to governmental regulations or restrictions. Substantial
curtailment is defined for the purpose of this subparagraph (f) as a condition where the total sales
volume of Brown & Williamson for any twelve (12) month period has fallen by more than twenty-five
percent (25%) from the preceding twelve (12) months' volume.
Substantially – Considerable
"Substantial" means of real worth or considerable value --- this is the USUAL and
CUSTOMARY meaning of the term
Words and Phrases 2 (Volume 40A, p. 458)
The word “substantial” within Civil Rights Act providing that a place is a public accommodation if a
“substantial” portion of food which is served has moved in commerce must be construed in light of its usual and
customary meaning, that is, something of real worth and importance; of considerable value; valuable, something
D.S.C. 1966.
worthwhile as distinguished from something without value or merely nominal
“Substantial” means considerable or to a large degree --- this common meaning is
preferable because the word is not a term of art
Arkush 2 (David, JD Candidate – Harvard University, “Preserving "Catalyst" Attorneys' Fees Under the
Freedom of Information Act in the Wake of Buckhannon Board and Care Home v. West Virginia
Department of Health and Human Resources”, Harvard Civil Rights-Civil Liberties Law Review, Winter,
37 Harv. C.R.-C.L. L. Rev. 131)
Plaintiffs should argue that the term "substantially prevail" is not a term of art because if considered a term of art, resort to Black's 7th
produces a definition of "prevail" that could be interpreted adversely to plaintiffs. 99 It is commonly accepted that words that are not
legal
terms of art should be accorded their ordinary, not their legal, meaning , 100 and ordinary-usage dictionaries provide FOIA fee
claimants with helpful arguments. The Supreme Court has already found favorable , temporally relevant definitions of the word
"substantially" in ordinary dictionaries: "Substantially" suggests "considerable" or "specified to a large degree." See
Webster's Third New International Dictionary 2280 (1976) (defining "substantially" as "in a substantial manner" and "substantial" as
"considerable in amount, value, or worth" and "being that specified to a large degree or in the main"); see also 17 Oxford English Dictionary 6667 (2d ed. 1989) ("substantial": "relating to or proceeding from the essence of a thing; essential"; "of ample or considerable amount, quantity
or dimensions"). 101
Substantial means “of considerable amount” – not some contrived percentage
Prost 4 (Judge – United States Court of Appeals for the Federal Circuit, “Committee For Fairly Traded
Venezuelan Cement v. United States”, 6-18,
http://www.ll.georgetown.edu/federal/judicial/fed/opinions/04opinions/04-1016.html)
The URAA and the SAA neither amend nor refine the language of § 1677(4)(C). In fact, they merely suggest, without disqualifying other
alternatives, a “clearly higher/substantial proportion” approach. Indeed, the SAA specifically mentions that no “precise mathematical formula”
or “‘benchmark’ proportion” is to be used for a dumping concentration analysis. SAA at 860 (citations omitted); see also Venez. Cement, 279 F.
Supp. 2d at 1329-30. Furthermore, as the Court of International Trade noted, the SAA emphasizes that the Commission retains the discretion
to determine concentration of imports on a “case-by-case basis.” SAA at 860. Finally, the definition of the word “substantial”
undercuts the CFTVC’s argument. The word “substantial” generally means “considerable in amount, value or
worth.” Webster’s Third New International Dictionary 2280 (1993).
It does not imply a specific number or cut-off. What
may be substantial in one situation may not be in another situation. The very breadth of the term “substantial” undercuts the
CFTVC’s argument that Congress spoke clearly in establishing a standard for the Commission’s regional antidumping and countervailing duty
analyses. It therefore supports the conclusion that the Commission is owed deference in its interpretation of “substantial proportion.” The
Commission clearly embarked on its analysis having been given considerable leeway to interpret a particularly broad term.
Substantially – Real
Substantially means real, not imaginary
Wollman ’93 (Circuit Judge, US Court of Appeals – 8th Circuit, Kansas City Power & Light Company, a
Missouri corporation, Appellee, v. Ford Motor Credit Company, a Delaware corporation; McDonnell
Douglas Finance Corporation, a Delaware corporation; HEI Investment Corp., a Hawaii corporation,
Appellants, 995 F.2d 1422; 1993 U.S. App. LEXIS 13755, L/N)
Instruction No. 10 was not given in isolation, however. The district court's instructions also contained a
definition of "substantial." Instruction No. 11 defined "substantial" as meaning "true, real or likely to
materialize" and as not meaning "imaginary or unlikely to materialize." This instruction properly limited
the potential bases for the jury's decision, which is the essential function of jury instructions. When
combined with the contract and the verdict-directing instructions, [*1432] which tracked the operative
language of the contract, Instruction No. 11 required the jury to find that KCPL had determined a real
risk, not some imaginary hypothetical risk premised solely on a reduction in the DRD. Because the
contract provided only one means of creating a risk of making an indemnity payment--a demand notice
from an Investor--the jury's discretion was properly channelled into deciding whether KCPL had
sufficiently studied and honestly considered the likelihood of receiving such a demand notice. That
determination is all that the contract required.
"Substantial" means actually existing, real, or belonging to substance
Words and Phrases 2 (Volume 40A) p. 460
Ala. 1909. “Substantial”
means “belonging to substance; actually existing; real; *** not seeming or
imaginary; not elusive; real; solid; true; veritable
"Substantial" means having substance or considerable
Ballentine's 95 (Legal Dictionary and Thesaurus, p. 644)
having substance; considerable
Substantially – In the Main
"Substantial" means in the main
Words and Phrases 2 (Volume 40A, p. 469)
Ill.App.2 Dist. 1923 “Substantial” means in substance, in the main, essential, including material or essential parts
Substantially – Without Material Qualification
Substantially is without material qualification
Black’s Law 91 (Dictionary, p. 1024)
Substantially - means essentially; without material qualification.
Substantially – Durable
“Substantial” means durable
Ballantine’s 94 (Thesaurus for Legal Research and Writing, p. 173)
substantial [sub . stan . shel] adj. abundant, consequential, durable, extraordinary, heavyweight, plentiful (“a substantial supply”); actual,
concrete, existent, physical, righteous, sensible, tangible (“substantial problem”); affluent, comfortable, easy, opulent, prosperous, solvent.
Substantially – Not Covert
“Substantially” means not covert
Words & Phrases 64 (40 W&P 759)
The words “outward, open, actual, visible, substantial, and exclusive,” in connection with a change of possession, mean substantially
the same thing. They mean not concealed; not hidden; exposed to view; free from concealment, dissimulation,
reserve, or disguise; in full existence; denoting that which not merely can be, but is opposed to potential, apparent, constructive, and
imaginary; veritable; genuine; certain; absolute; real at present time, as a matter of fact, not merely nominal; opposed to form; actually
existing; true; not including admitting, or pertaining to any others; undivided; sole; opposed to inclusive.
AT: Arbitrary
‘Substantially’ isn’t precise --- but still must be given meaning. The most objective way
to define it contextually.
Devinsky 2 (Paul, “Is Claim "Substantially" Definite? Ask Person of Skill in the Art”, IP Update, 5(11),
November, http://www.mwe.com/index.cfm/fuseaction/publications.nldetail/object_id/c2c73bdb9b1a-42bf-a2b7-075812dc0e2d.cfm)
In reversing a summary judgment of invalidity, the U.S. Court of Appeals for the Federal Circuit found that the district court,
by failing to look beyond the intrinsic claim construction evidence to consider what a person of skill in the art would understand in a
"technologic context," erroneously concluded the term "substantially" made a claim fatally indefinite. Verve, LLC v.
Crane Cams, Inc., Case No. 01-1417 (Fed. Cir. November 14, 2002). The patent in suit related to an improved push rod for an internal
combustion engine. The patent claims a hollow push rod whose overall diameter is larger at the middle than at the ends and has
"substantially constant wall thickness" throughout the rod and rounded seats at the tips. The district court found that the expression
"substantially constant wall thickness" was not supported in the specification and prosecution history by a sufficiently clear definition
of "substantially" and was, therefore, indefinite. The district court recognized that the use of the term "substantially" may be definite
in some cases but ruled that in this case it was indefinite because it was not further defined. The Federal Circuit reversed, concluding
that the district court erred in requiring that the meaning of the term "substantially" in a particular "technologic context" be found
solely in intrinsic evidence: "While reference to intrinsic evidence is primary in interpreting claims, the criterion is the meaning of
words as they would be understood by persons in the field of the invention." Thus, the Federal Circuit instructed that
"resolution of any ambiguity arising from the claims and specification may be aided by extrinsic evidence of usage and
meaning of a term in the context of the invention." The Federal Circuit remanded the case to the district court with instruction that
"[t]he question is not whether the word 'substantially' has a fixed meaning as applied to 'constant wall thickness,' but
how the phrase would be understood by persons experienced in this field of mechanics, upon reading the patent
documents."
“Substantially” needs to be given a quantitative meaning --- any other interpretation
is more arbitrary
Webster’s 3 (Merriam Webster’s Dictionary, www.m-w.com)
Main Entry: sub.stan.tial
b : considerable in quantity : significantly great <earned a substantial wage>
Make the best determination available. Substantially must be given meaning
Words and Phrases 60 (Vol. 40, State – Subway, p. 762)
“Substantial” is a relative word, which, while it must be used with care and discrimination, must nevertheless
be given effect, and in a claim of patent allowed considerable latitude of meaning where it is applied to such subject as thickness, as by
requiring two parts of a device to be substantially the same thickness, and cannot be held to require them to be of exactly the same thickness.
Todd. V. Sears Roebuck & Co., D.C.N.C., 199 F.Supp. 38, 41.
Using context removes the arbitrariness of assigning a fixed percentage to
“substantial”
Viscasillas 4 – professor at the Universidad Carlos III de Madrid, (Pilar, “Contracts for the Sale of
Goods to Be Manufactured or Produced and Mixed Contracts (Article 3 CISG)”, CISG Advisory Council
Opinion No. 4, 10-24, http://cisgac.com/default.php?ipkCat=128&ifkCat=146&sid=146)
2.8. Legal writers who follow the economic value criterion have generally quantified the term "substantial part" by comparing Article 3(1) CISG
(substantial) with Article 3(2) CISG (preponderant): substantial being less than preponderant. In this way, legal
writers have used the
following percentages to quantify substantial: 15%,[14] between 40% and 50%,[15] or more generally
50%.[16] At the same time, other authors, although they have not fixed any numbers in regard to the quantification of the term "substantial"
have declared that "preponderant" means "considerably more than 50% of the price" or "clearly in excess of 50%".[17] Thus it seems that for
the latter authors, the quantification of the term "substantial" is placed above the 50% figure. Also, some Courts have followed this
approach.[18]
2.9. To consider a fixed percentage might be arbitrary due to the fact that the particularities of each
case ought to be taken into account; that the scholars are in disagreement; and that the origin of those
figures is not clear.[19]
Therefore, it does not seem to be advisable to quantify the word "substantial" a priori in percentages. A
case-by-case analysis is preferable and thus it should be determined on the basis of an overall
assessment.
Contextual definitions of “substantial” solve arbitrariness
Tarlow 2k – Nationally prominent criminal defense lawyer practicing in Los Angeles, CA. He is a frequent
author and lecturer on criminal law. He was formerly a prosecutor in the United States Attorney's Office
and is a member of The Champion Advisory Board (Barry, The Champion January/February, lexis)
In Victor, the trial court instructed that: "A reasonable doubt is an actual and substantial doubt . . . as distinguished from a doubt
arising from mere [*64] possibility, from bare imagination, or from fanciful conjecture." Victor argued on appeal after receiving the death
penalty that equating a reasonable doubt with a "substantial doubt" overstated the degree of doubt necessary for acquittal. Although
the
court agreed that the instruction was problematic given that "substantial," could be defined as "that
specified to a large degree," it also ruled that any ambiguity was removed by reading the phrase in the
context of the sentence in which it appeared. Finding such an explicit distinction between a substantial doubt and a fanciful
conjecture was not present in the Cage instruction, it held that the context makes clear that "substantial" was used in the sense of existence
rather than in magnitude of the doubt and, therefore, it was not unconstitutional as applied. Id. at 1250.
Even if substantial isn’t precise --- you should still exclude their Aff for being tiny.
Even judges can make a gut check.
Hartmann 7 – Judge, Hong Kong (IN THE HIGH COURT OF THE HONG KONG SPECIAL ADMINISTRATIVE
REGION COURT OF FIRST INSTANCE, 8/20,
http://legalref.judiciary.gov.hk/lrs/common/ju/ju_frame.jsp?DIS=58463&currpage=T
The word ‘substantial’ is not a technical term nor is it a word that lends itself to a precise
measurement. In an earlier judgment on this issue, that of S. v. S. [2006] 3 HKLRD 251, I said that it is not a word —
To say, for example, that ‘there has been a
substantial increase in expenditure’ does not of itself allow for a calculation in numerative terms of the exact
increase. It is a statement to the effect that it is certainly more than a little but less than great. It
defines, however, a significant increase, one that is weighty or sizeable.”
“… that lends itself to precise definition or from which precise deductions can be drawn.
Context – Obama reforms ‘substantial’
Contextually Obama’s surveillance reforms are ‘substantial’ despite maintaining
robust intelligence
Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the Georgetown
University Law Center (Timothy, “The Good News About Spying”
https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-about-spying
In 2013, Obama called for a national dialogue on surveillance and privacy. Since then, he has made
genuine attempts at reform. The job is far from over, but Washington has already come farther than
many believe. Today, the United States confronts a variety of threats—ranging from the Islamic State, to
Iran’s nuclear program, to cyber intrusions from China, North Korea, and Russia. Each of these threats
requires robust intelligence capabilities. Obama has maintained these capabilities, but at the same time,
has ordered surveillance reforms that are substantial indeed. Privacy and civil liberties advocates have a
friend in the White House, even if they do not realize it. Obama has led, and it is time for others to
follow.
Obama’s reforms are transparency, extending privacy protections to foreign persons,
and creating protections against the use of bulk data
Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the Georgetown
University Law Center (Timothy, “The Good News About Spying”
https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-about-spying
In 2013, at Obama’s direction, the Office of the Director of National Intelligence (ODNI) established a
website for the intelligence community, IC on the Record, where previously secret documents are
posted for all to see. These are not decades-old files about Cold War spying, but recent slides used at
recent NSA training sessions, accounts of illegal wiretapping after the 9/11 attacks, and what had been
highly classified opinions issued by the Foreign Intelligence Surveillance Court about ongoing
surveillance programs.
Although many assume that all public knowledge of NSA spying programs came from Snowden’s leaks,
many of the revelations in fact came from IC on the Record, including mistakes that led to the
unconstitutional collection of U.S. citizens’ emails. Documents released though this portal total more
than 4,500 pages—surpassing even the 3,710 pages collected and leaked by Snowden. The Obama
administration has instituted other mechanisms, such as an annual surveillance transparency report,
that will continue to provide fodder for journalists, privacy activists, and researchers.
The transparency reforms may seem trivial to some. From the perspective of an intelligence community
steeped in the need to protect sources and methods, however, they are deeply unsettling. At a Brown
University forum, ODNI Civil Liberties Protection Officer Alexander Joel said, “The intelligence
community is not designed and built for transparency. Our culture is around finding our adversaries’
secrets and keeping our own secrets secret.” Accordingly, until only a few years ago, the intelligence
community resisted making even the most basic information public. The number of FISA court opinions
released to the public between 1978 and 2013 can be counted on one hand.
Beyond more transparency, Obama has also changed the rules for surveillance of foreigners. Until last
year, privacy rules applied only to “U.S. persons.” But in January 2014, Obama issued Presidential Policy
Directive 28 (PPD-28), ordering intelligence agencies to write detailed rules assuring that privacy
protections would apply regardless of nationality. These rules, which came out in January 2015, mark
the first set of guidelines for intelligence agencies ordered by a U.S. president—or any world leader—
that explicitly protect foreign citizens’ personal information in the course of intelligence operations.
Under the directive, the NSA can keep personal information in its databases for no more than five years.
It must delete personal information from the intelligence reports it provides its customers unless that
person’s identity is necessary to understand foreign intelligence—a basic rule once reserved only for
Americans.
The new rules also include restrictions on bulk collection of signals intelligence worldwide—the practice
critics call “mass surveillance.” The NSA’s bulk collection programs may no longer be used for
uncovering all types of diplomatic secrets, but will now be limited to six specific categories of serious
national security threats. Finally, agencies are no longer allowed simply to “collect it all.” Under PPD-28,
the NSA and other agencies may collect signals intelligence only after weighing the benefits against the
risks to privacy or civil liberties, and they must now consider the privacy of everyone, not just U.S.
citizens. This is the first time any U.S. government official will be able to cite a written presidential
directive to object to an intelligence program on the basis that the intelligence it produces is not worth
the costs to privacy of innocent foreign citizens.
Context – ending bulk data collection
Ending bulk data collection is a ‘substantial curtailment’ of surveillance
Timmons, 6/1/15 – staff for Quartz (Heather, “The US government can no longer spy on every US citizen
at once” Quartz, http://qz.com/416262/the-us-government-can-no-longer-spy-on-every-us-citizen-atonce/
The US government’s ability to collect information on American citizens was substantially curtailed on
midnight Sunday, after an extension of the Patriot Act expired before the US Congress passed a
replacement bill aimed at reforming it.
What’s expiring: The Patriot Act extension, signed into law in 2011. This includes the controversial
Section 215, which, as the ACLU explains it, “allows the [Federal Bureau of Investigation] to force
anyone at all—including doctors, libraries, bookstores, universities, and Internet service providers—to
turn over records on their clients or customers.” Because of this expiration, the National Security Agency
and others can also no longer collect this information, including US citizens’ phone calls, in bulk. In
addition, agencies abilities to conduct roving wiretaps, and spy on so-called “lone wolf” terrorists not
connected to any organization are curbed.
Who is responsible. Republican presidential candidate Rand Paul, a longtime privacy advocate, dug in his
heels and said he would refuse to allow a replacement bill to be adopted in time to replace the nowexpired parts of the Act. In a special Sunday session of the Senate, he appeared to harass his fellow
Republicans while they were speaking.
National security hawks and Senate leader Mitch McConnell “badly underestimated the shift in the
national mood,” which the Democrats and Libertarians understand, The New York Times reported.
What happens next. The replacement bill, named, without apparent irony, the “USA Freedom Act,” is
still expected to pass as early as this week. While it still gives widespread information gathering powers
to US security agencies, it will prohibit them from collecting American citizens’ phone records and other
information in bulk, limiting such collecting to specific searches.
Curtail
Curtail violations
1nc – curtail means decrease size
Curtail means to reduce the extent or quantity of
Oxford Dictionaries, 15 (“curtail”,
http://www.oxforddictionaries.com/us/definition/american_english/curtail)
Definition of curtail in English:
verb
[WITH OBJECT]
1Reduce in extent or quantity; impose a restriction on: civil liberties were further curtailed
That precludes qualitative modifications – the plan violates by maintaining the
existing scope of surveillance
State v. Knutsen, 3 - 71 P. 3d 1065 - Idaho: Court of Appeals, http://caselaw.findlaw.com/id-court-ofappeals/1320950.html
By its plain language, Rule 35 grants a district court the authority within a limited period of time to
reduce or modify a defendant's sentence after relinquishing jurisdiction. To "reduce" means to
diminish in size, amount, extent or number, or to make smaller, lessen or shrink. WEBSTER'S THIRD
NEW INTERNATIONAL DICTIONARY 1905 (1993). To "modify" means to make more temperate and
less extreme, or to lessen the severity of something. Id. at 1452. Thus, under the plain meaning of
its language, Rule 35 authorizes a district court to diminish, lessen the severity of, or make more
temperate a defendant's sentence. An order placing a defendant on probation lessens the severity
of a defendant's sentence and thus falls within the district court's authority granted by Rule 35.
Other state jurisdictions have held likewise in interpreting similar rules for reduction of sentence.
See State v. Knapp, 739 P.2d 1229, 1231-32 (Wy.1987) (similar rule of criminal procedure
authorizes reduction of a sentence of incarceration to probation); People v. Santana, 961 P.2d 498,
499 (Co.Ct.App.1997) (grant of probation is a "reduction" under Colorado Cr. R. 35(b)).
Voting issue –
1. Limits – every existing program can be modified any number of ways, they
create hundreds of new cases
2. Negative ground – all predictable disad links stem from cutting the size of
federal surveillance – qualitative reforms don’t link
1nc – net curtailment
Curtail means to reduce the extent or quantity of
Oxford Dictionaries, 15 (“curtail”,
http://www.oxforddictionaries.com/us/definition/american_english/curtail)
Definition of curtail in English:
verb
[WITH OBJECT]
1Reduce in extent or quantity; impose a restriction on: civil liberties were further curtailed
It must be a net reduction measured against the status quo baseline – the plan
violates by merely preventing a future increase
Howell, 14 - US District Court Judge (Beryl, HUMANE SOCIETY OF THE UNITED STATES, et al., Plaintiffs, v.
SALLY JEWELL, Secretary of the Interior, et al.,1 Defendants, v. STATE OF WISCONSIN, et al. IntervenorDefendants. 1 Pursuant to Federal Rule of Civil Procedure 25(d), Sally Jewell, Secretary of the Interior, is
automatically substituted for her predecessor in office. Civil Action No. 13-186 (BAH) UNITED STATES
DISTRICT COURT FOR THE DISTRICT OF COLUMBIA 2014 U.S. Dist. LEXIS 175846 December 19, 2014,
Decided December 19, 2014, Filed
Moreover, by defining "significant portion of a species' range" in the final rule as referring only to a
species' "current range," the FWS explicitly contradicts the conclusions by courts finding that "range"
must include the "historical range" and the ESA's legislative history. LEG. HIST. at 742 (H. Rep. 95-1625,
from Committee on Merchant Marine and Fisheries, regarding ESAA) ("The term 'range' [in the ESA] is
used in the general sense, and refers to the historical range of the species."); Defenders of Wildlife, 258
F.3d at 1145. It also renders meaningless the word "curtailment" in 16 U.S.C. § 1533(a)(1)(A), since it is
impossible [*162] to determine the "present . . . curtailment of [a species'] habitat or range" without
knowing what the species' historical range was prior to being curtailed.
Voting issue to protect negative ground – we can’t get predictable disad links or
counterplans against affirmatives that merely codify status quo actions
--xt – requires a baseline
Curtail requires a measurable baseline
Federal Register, 80 (45 Fed. Reg. 45107 1980, Hein Online)
A number of commenters offered various definitions for the terms “curtailments” and "requirements."
"Curtailment" was generally agreed to be the inability to deliver the volumes of gas demanded or
necessary to meet contract requirements. Commenters explained that the term "curtailment" has long
been used by the gas industry to cover any situation in which an operating gas company by reason of
emergencies, shortages of supply or other factors, cannot make the deliveries of gas to which its
customers are entitled under governing instruments such as curtailment plans, tariffs and service
agreements. Furthermore, the operational definition of "curtailment" may-vary somewhat from pipeline
.to pipeline with regard to the index from which curtailment is to be measured. All of the commenters
agreed that "curtailment" should not be merely a reduction in deliveries from contractual requirements, but rather should continue to be measured relative to actual base period end-use data
for some period of time prior to a shortage and adjusted for specific factors such as weather. Some
commentdrs suggested that ERA not adopt a standardized definition of "'curtailment."
1nc – budget authority
Curtail means reducing the budget authority for a program – the aff is only a
regulatory change
Dembling, 78 – General Counsel, General Accounting Office; (Paul, “OVERSIGHT HEARING ON THE
IMPOUNDMENT CONTROL ACT OF 1974” HEARING BEFORE THE TASK FORCE ON BUDGET PROCESS OF
THE COMMITTEE ON THE BUDGET HOUSE OF REPRESENTATIVES NINETY-FIFTH CONGRESS SECOND
SESSION JUNE 29, 1978, Hein Online)
Application of curtailment procedure.-The review procedure is triggered by an executive branch decision
to 'curtail" a program which has been made subject to the bill. The definition of "curtail" (subsection
(a)(3)) requires that the executive branch decision result in a reduction of budget authority applied in
furtherance of the program. As noted above, the level of budget authority for this purpose would be the
amount so specified in an appropriation act. The reduction relates to the use of funds "in furtherance of
the program." Thus, although the full amount of budget authority may be spent in some manner, e.g., to
pay contract termination costs or other liabilities incident to the curtailment, such a use of funds still
involves a reduction in funding for affirmative program purposes which triggers the review provisions.
Curtailment review procedure.-The review procedure would generally be similar to the procedure for
reviewing deferrals of budget authority under the Impoundment Control Act, except that congressional
disapproval would take the form of a concurrent resolution. The President would report a proposed
curtailment decision to Congress, together with appropriate information (subsection (b)), and
supplementary reports would be made for any revisions (subsection (c)(3)). The proposal, and any
supplementary reports, would be printed in the Federal Register (subsection (c)(4)).
Voting issue to protect limits and negative ground. Allowing regulatory changes
explodes the topic by creating many small affs that don’t link to very much – only a
hard budgetary limit forces affirmatives to take large enough actions to ensure
adequate disad links and counterplan competition
--xt budget authority
Curtail means discontinuing a program and reducing budget authority for it
Dembling, 78 – General Counsel, General Accounting Office; (Paul, “OVERSIGHT HEARING ON THE
IMPOUNDMENT CONTROL ACT OF 1974” HEARING BEFORE THE TASK FORCE ON BUDGET PROCESS OF
THE COMMITTEE ON THE BUDGET HOUSE OF REPRESENTATIVES NINETY-FIFTH CONGRESS SECOND
SESSION JUNE 29, 1978, Hein Online)
(3) "Curtail" means to discontinue, in whole or in part, the execution of a program, resulting in the
application of less budget authority in furtherance of the program than provided by law.
1nc – third party curtailment
Curtail means cutting away the authority
Merriam-Webster, 15 (‘curtail’, http://www.merriam-webster.com/dictionary/curtail
Full Definition of CURTAIL
transitive verb
: to make less by or as if by cutting off or away some part <curtail the power of the executive branch>
<curtail inflation>
That requires a third party restriction – executive self-restraint isn’t topical
8th Circuit Court of Appeals 10
(Public Water Supply Dist. No. 3 v. City of Leb., 605 F.3d 511, Lexis)
HN9 7 U.S.C.S. § 1926(b) provides that a rural district's service shall not be curtailed or limited. In this
context, the verbs "curtail" and "limit" connote something being taken from the current holder, rather
than something being retained by the holder to the exclusion of another. "Curtail" is defined as shorten
in extent or amount; abridge; "limit" is defined as set bounds to; restrict. The available cases and
fragments of legislative history all seem to have in mind curtailment resulting from substitution of some
third party as a water-supplier for the rural district. Shepardize - Narrow by this Headnote
Voting issue for limits and negative ground. This is the largest topic in memory and
allowing executive self-restraint explodes the number of solvency advocates and takes
away core negative CP ground
--xt – third party curtailment
Curtail is a rule limiting action
Gibbons 99 – PhD in Statistics
(Jean, “Selecting and Ordering Populations: A New Statistical Methodology,” p 178)
In general, curtailment is defined with respect to any rule as terminating the drawing of observations at
a number smaller than n as soon as the final decision is determined; here n is the maximum number of
observations that one is allowed to take. Thus curtailment is an “early stopping rule” and it yields a
saving in the number of observations taken. Therefore we now discuss curtailment with respect to our
sampling rule of looking for the cell with the highest frequency in n observations; we wish lo evaluate
the amount of saving that may result for various values of k and n.
1nc - Curtail not abolish
Curtail means a partial restriction – the aff is a cancelation of a program, not
curtailment
San Fellipo, 92 (John, “OREGON'S TELEPHONE INFORMATION DELIVERY SERVICE LAW: A CONSUMER
PROTECTION STEP TOO FAR” 28 Willamette L. Rev. 455 1991-1992, Hein Online)
131. The author understands "limit" as used in OR. ADMIN. R. 860-21-505(8) (1991) to mean cancel, as
opposed to the word "curtail" used in section (7), meaning only a partial restriction.
Voting issue to create reasonable limits and protect negative ground. They increase
the number and quality of affirmative solvency advocates on a topic that is already
the broadest in memory.
--xt curtail is not abolish
Curtail means reduce – not abolish
Black’s Law Dictionary, 90 (Sixth Edition,
http://archive.org/stream/BlacksLaw6th/Blacks%20Law%206th_djvu.txt
Curtail. To cut off the end or any part of; hence to shorten, abridge, diminish, lessen, or reduce; and
term has no such meaning as abolish. State v. Edwards, 207 La. 506, 21 So.2d 624, 625.
Curtail cannot abolish
Supreme Court of Connecticut 85
(IN RE JUVENILE APPEAL (85-AB), Lexis)
1. In an attempt to suggest that the statutory right to a private hearing under General Statutes § 46b122 is not really nullified by their opinion, the majority points to General Statutes § 46b-124. While
recognizing, as they must, that their position does result in publicity, they nevertheless argue that § 46b124 by prohibiting disclosure of records and proceedings in juvenile matters does "curtail the additional
publicity that a public trial would generate." Two points should be made to counter this "justification."
First, as one court said: "[I]n common parlance, or in law composition, the word `curtail' has no such
meaning as `abolish.'" State v. Edwards, 207 La. 506, 511, 21 So.2d 624 (1945). Rather, it means "`to cut
off the end, or any part, of; hence to shorten; abridge; diminish; lessen; reduce.'" Id. Second, the
statutory right to a private hearing in § 46b-122 does not talk at all in terms of relativity, of something is
to be diminished, lessened or reduced. It confers a right that is not to be diluted, let alone nullified.
Curtail means reduce, not end – prefer definitions in the context of restricting
executive power
Tatro et al, 15 – Director and Asst. General Counsel for Union Electric Company (Wendy, REPLY BRIEF OF
AMEREN MISSOURI, 4/10,
https://www.efis.psc.mo.gov/mpsc/commoncomponents/viewdocument.asp?DocId=935923768
Noranda does describe some options if it should encounter problems. In its brief, Noranda quotes from
its SEC filings on this issue.345 Notably, these filings never say “close,” let alone “will close.” They do,
however, use the term “curtailment.”346 Webster’s defines “curtail” as “to make less by or as if by
cutting off or away some part,” as in “curtail the power of the executive branch.”347 Thus, Noranda
discusses reducing its operations, but not closure. In these same filings, Noranda also uses the terms
“restructuring,” “bankruptcy,” and “divest.”348 Thus, while Noranda argues to this Commission that
closure “will” occur, the fine print in Noranda’s SEC filings list every option but closure. Outside of
illogical and factually unsupported threats, Noranda presents nothing that suggests the smelter’s
mandatory closure.
Curtail is a reduction – distinct from termination
2nd Circuit Court of Appeals 49
(Commission of Dep't of Public Utilities v. New York, N. H. & H. R. Co., 178 F.2d 559, Lexis)
When these provisions are read in the light of the background stated and particularly the rejection of
express provisions for the power now claimed by the New Haven, it is obviously difficult to accept the
New Haven's present view that a complete abandonment of passenger service was not intended. Even
the words used point to the decisive and- under the circumstances- clean-cut step. The word
'discontinue' is defined by Webster's New International Dictionary, 2d Ed. 1939, as meaning ' * * * to put
an end to; to cause to cease; to cease using; to give up'- meanings quite other than the connotations
implicit in the word 'curtail,' which it defines ' * * * to shorten; abridge; diminish; lessen; reduce.' It goes
on to give the meaning of 'discontinue' at law as being 'to abandon or terminate by a discontinuance'an even more direct interpretation of the critical term. An interesting bit of support from the court itself
for this view is found in Art. XI, §. 2(m), of the final Consummation Order and Decree, which reserved
jurisdiction in the District Court: 'To consider and act on any question respecting the 'Critical Figures'
established by the Plan with respect to the termination by the Reorganized Company of passenger
service on the Old Colony Lines.' A 'termination' is quite different from a 'reduction.'∂ In this light the
provision substituting a contractual for a franchise obligation for the maintenance of Old Colony
passenger service assumes understandable significance. A plan approved by the I.C.C. might properly
provide for abandonment of service upon the happening of a stated event; the crucial factors of public
interest have been weighed and evaluated just as they would be on a proposal for immediate
abandonment, and only the final event, conclusively detrimental to the continuance of the road, is
needed for operation of the announced step. Surely, however, no such consideration can properly apply
to the substitution of a contractual undertaking so broad and general in its terms as to permit a railroad
to cease, taper off, continue, or expand its operations at will. Should such a provision appear in even a
fully consummated plan, I should think it still sufficiently unusual and vulnerable that its validity could
not be considered conclusively determined. In this connection reference should be made to the New
Haven's claim of 'option' even when the critical figures of loss are reached. A choice between continuing
or abandoning the service is a much more limited one than the wide authority to operate substantially
at will here asserted. But there is, indeed, little to indicate that even this choice was contemplated in the
plan. About the only thing looking in this direction is the provision as to the option, inserted as an
afterthought on the state's insistence, giving Massachusetts the right to buy the Braintree line at salvage
value in the event the passenger losses exceed the critical figure and as a result the road 'shall elect' to
discontinue the service. Definite interpretation of this might well await the clearer light of fuller
discussion; meanwhile I apprehend that it does not contemplate anything as extensive as a purely
discretionary power in the officers of the road to continue incurring these losses as they choose. The
lines of the device to [569] be rid of the Old Colony had been firmly fixed before this appeared; at most
it should permit the road to operate after the happening of the stated event only with the consent of
the vitally interested parties and the representative of the public so long as losses stayed near the
critical figure. Anything beyond this would again tend to nullify the plan. It was certainly never
contemplated that the passenger service would be continued when the losses incurred were four and a
half times as great as those specified as critical.∂ In reaching their differing conclusion, my brethren rely
upon the circumstance that on a few occasions during this long reorganization the Commission or our
court has spoken of a 'curtailment of service' or of discontinuing passenger service 'in whole or in part.'
Neither by themselves nor in their contexts do these offhand characterizations or references appear to
me to support the inference sought to be drawn from them. Indeed several are only statements of
contentions or arguments presented and without further significance. True, the word 'curtailment' has
occasionally been used; but it must be recalled that in the total picture of Old Colony service, complete
abandonment of passenger trains is only a 'curtailment,' since freight trains are still to run. Thus it is that
discontinuing passenger travel must be authorized by the I.C.C. under the bankruptcy power, rather
than under its normal power over abandonment, since it constitutes only a partial abandonment.
Moreover, no stress can properly be put on the Commission's statement early in the proceedings that
the public was 'alive to the danger that service may be discontinued, in whole or in part.' 244 I.C.C. 239,
264. For this was soon after the time that the New Haven had been seeking a curtailment of Old Colony
passenger service, rather than a discontinuance, in the form of its abortive attempt to close 88
passenger stations. The Commonwealth, various towns, and commuters groups had just finished
fighting to prevent any curtailment of service, and were as aware of that as a danger as they were of
discontinuance as a danger. See Rood, Protecting the User Interest in Railroad Reorganization, 7 Law &
Contemp.Prob. 495, 1940. It is a fact that as early as 1939 the New Haven trustees had tried to
discontinue passenger service on the Boston Group of Old Colony lines, and the efforts of the
reorganization judge were required to induce them to hold off on this move while a satisfactory
compromise was sought. Id. at 502.
Not abolishment
Supreme Court of Louisiana 45
(State v. Edwards, 207 La. 506, Lexis)
Police Jury of Concordia Parish, La., Ordinance No. 202 (April 14, 1943) provided that three open seasons
for the hunting of squirrels were curtailed, but the ordinance did not specify how much the state open
hunting seasons were to be curtailed. La. Gen. Stat. § 2947 (1926) provided that the annual open season
for hunting squirrels was from October 1st to January 15, and defendant was convicted of killing
squirrels on October 1, 1944. The ordinance was purportedly enacted to exercise the discretion given to
parish authorities to curtail the hunting season by La. Gen. Stat. § 2939 (1926), but defendant claimed
that the ordinance was invalid because it was meaningless. The court annulled defendant's conviction,
finding that the ordinance was meaningless because the time frame in which hunting was to be curtailed
was not specified. The state's argument that the parish abolished all hunting for the three seasons was
rejected because the Ordinance's use of the term "curtailed" indicated that there was a reduction of the
hunting season and not its abolishment. Also the court had jurisdiction to review the conviction
because its jurisdiction extended to ordinances that imposed penalties.∂ Outcome∂ The court annulled
the conviction and sentence that had been imposed on defendant, and it ordered that the prosecution
of defendant be dismissed.∂ Hide sectionLexisNexis® Headnotes∂ Civil Procedure > ... > Jurisdiction >
Jurisdictional Sources > Constitutional Sources∂ Civil Procedure > Appeals > Appellate Jurisdiction > State
Court Review∂ Constitutional Law > ... > Jurisdiction > Subject Matter Jurisdiction > Amount in
Controversy∂ Criminal Law & Procedure > Appeals > General Overview∂ HN1 The Supreme Court of
Louisiana has jurisdiction of the question of constitutionality or legality of an ordinance under La. Const.
art. VII, § 10, which states that it shall have appellate jurisdiction in all cases where the legality, or
constitutionality of any fine, forfeiture, or penalty imposed by a parish, municipal corporation, board, or
subdivision of the State shall be in contest, whatever may be the amount thereof. Shepardize - Narrow
by this Headnote∂ Environmental Law > Natural Resources & Public Lands > Topic Summary ReportFish &
Wildlife Protection∂ HN2 La. Gen. Stat. § 2947 (1926 ) provides that the annual open season for hunting
squirrels is from October 1st to January 15th; and, according to La. Gen. Stat. § 2925 (1926), the term
"open season" includes the first and the last of the two days mentioned. Shepardize - Narrow by this
Headnote∂ Counsel: A. B. Parker, of Jena, and C. T. Munholland and Theus, Grisham, Davis & Leigh, all of
Monroe (W. T. McCain and J. W. Ethridge, both of Colfax, of counsel), for defendant-appellant.∂ Fred S.
LeBlanc, Atty. Gen., M. E. Culligan, Asst. Atty. Gen., and Jesse C. McGee, Dist. Atty., of Harrisonburg (Jos.
M. Reeves, of Vidalia, of counsel), for plaintiff-appellee. ∂ Judges: O'Niell, Chief Justice. ∂ Opinion by:
O'NIELL ∂ Opinion∂ [507] The appellant was convicted of killing squirrels out of season, in violation of a
parish ordinance, and was sentenced to pay a fine of $ 25 and the costs of court or be imprisoned in the
parish jail for 30 days.∂ In a motion to quash the bill of information, and again in a motion for a new trial
and a motion in arrest of judgment, the defendant pleaded that the parish ordinance [508] was
unconstitutional, for several reasons which we find it unnecessary to consider. He pleaded also that in
any event the ordinance was illegal because it was so worded as to have no meaning or effect. The
motions were overruled.∂ HN1 This court has jurisdiction of the question of constitutionality or legality of
the ordinance, under the provision in Section 10 of Article VII of the Constitution that the Supreme Court
shall have appellate jurisdiction in all cases "where the legality, or constitutionality of any fine,
forfeiture, or penalty imposed by a parish, municipal corporation, board, or subdivision of the State shall
be in contest, whatever may be the amount thereof."∂ The charge in the bill of information, stated
specifically, is that on the 1st day of October, 1944, the defendant "did unlawfully hunt and take six
squirrels during the closed season, contrary to the provisions of Ordinance 202 of the Police Jury of
Concordia Parish". Under the state law the 1st day of October was within the open season for hunting
squirrels. HN2 In Section 1 of Article III of Act 273 of 1926, being Section 2947 of Dart's General Statutes,
the annual open season for hunting squirrels is from October 1st to January 15th; and, according to
Section 1 of Article I of the act, being Section 2925 of Dart's General Statutes, the term "open season"
includes the first and the last of the two days mentioned. Hence the defendant is not accused of
violating the state law.∂ The ordinance purports to "curtail" the open season for hunting squirrels, or
deer [509] or bear, as fixed by the state law, but does not give the extent of the curtailment, or indicate
whether it shall be cut off from the beginning or from the end of the open season, from October 1st to
January 15th. The first section of the ordinance, adopted on April 14, 1943, reads as follows: "Section 1.
Be it ordained by the Police Jury of the Parish of Concordia, State of Louisiana, in lawful session
convened, that the open seasons for the hunting and taking of wild deer, bear and squirrels within the
boundaries of the Parish of Concordia, State of Louisiana, are hereby curtailed for the open seasons of
1943-1944, the open seasons of 1944-1945, and the open seasons of 1945-1946, it being apparent that
a curtailment of the open seasons so that such game life may restock themselves by natural breeding is
necessary, and written consent having been given by the Conservation Commissioner of the State of
Louisiana to the Police Jury of the Parish of Concordia, to adopt this ordinance."∂ The second section of
the ordinance imposes the penalty, -- a fine not less than $ 25 or more than $ 100, or imprisonment for
a period not exceeding 60 days, or both the fine and imprisonment; the third section repeals all
ordinances in conflict with Ordinance No. 202; and the fourth or last section provides that Ordinance
No. 202 shall become effective after promulgation in the official journal of the parish, once a week for
four consecutive weeks. Such promulgation is required by the third paragraph of Section 15 of Article I
of Act 273 of 1926, Section 2939 of Dart's General [510] Statutes. Ordinance No. 202 was adopted under
authority of that section of the statute, which section reads as follows:∂ "Section 15. The Police Jury of
any parish may apply to the Conservation Commissioner for the right to adopt an ordinance to curtail
the open season in such parish, or any part thereof, when it becomes apparent that the game bird and
game quadruped life are in need of a curtailment of the open seasons so that such game life may
restock themselves by natural breeding.∂ "Upon receipt of such application and if conditions indicate the
need of adding protection for any game bird or game quadruped or all of them, the Commissioner may
give written consent to the police jury of the parish to adopt, in their discretion, an ordinance to curtail
the open season, but for not more than three consecutive years, which curtailment shall apply to
everyone, including the residents of such parish.∂ "Such curtailment shall become effective only after
notice of the adoption of such ordinance shall have been promulgated by the police jury, in the official
parish journal, once a week for four consecutive weeks prior to the regular annual open seasons for
hunting. Annual special parish close seasons on the game birds and game quadrupeds shall commence
on the legal date of the open seasons in each year."∂ The argument for the prosecution is that the
ordinance abolished the three open seasons, namely, the open season from October 1, 1943, to January
15, [511] 1944, and the open season from October 1, 1944, to January 15, 1945, and the open season
from October 1, 1945, to January 15, 1946; and that, in that way, the ordinance suspended altogether
the right to hunt wild deer, bear or squirrels for the period of three years. The ordinance does not read
that way, or convey any such meaning. According to Webster's New International Dictionary, 2 Ed.,
unabridged, the word "curtail" means "to cut off the end, or any part, of; hence to shorten; abridge;
diminish; lessen; reduce." The word "abolish" or the word "suspend" is not given in the dictionaries as
one of the definitions of the word "curtail". In fact, in common parlance, or in law composition, the
word "curtail" has no such meaning as "abolish". The ordinance declares that the three open seasons
which are thereby declared curtailed are the open season of 1943-1944, -- meaning from October 1,
1943, to January 15, 1944; and the open season 1944-1945, -- meaning from October 1, 1944, to January
15, 1945; and the open season 1945-1946, -- meaning from October 1, 1945, to January 15, 1946. To
declare that these three open seasons, 1943-1944, 1944-1945, and 1945-1946, "are hereby curtailed",
without indicating how, or the extent to which, they are "curtailed", means nothing.
It cannot ‘make surveillance impossible’
Baker 7 - author of Capitalism's Achilles Heel: Dirty Money and How to Renew the Free-Market System
(“Proceedings of the Standing Senate Committee on Foreign Affairs and International Trade,”
http://www.parl.gc.ca/Content/SEN/Committee/391/fore/15evbe.htm?comm_id=8&Language=E&Parl=39&Ses=1)
Mr. Baker: I agree with the point that you were making about the World Bank. Many people in the
World Bank are extremely dedicated to curtailing poverty in developing countries. Some others are
looking for the next opportunity in the private sector and may be less aggressive in fighting corruption
and money laundering; perhaps less aggressive in taking on the kinds of problems we are talking about
here.
You are correct when you talk about oil revenues going out into foreign banks. They do not go to other
African banks, but come frequently through the structure I talked about, the illicit financial structure,
but ultimately into Western economies.
Part of what fascinates me is that it is almost entirely a permanent outward transfer; very little turns
around and goes back in at a later date to developing countries. The little bit that turns around and goes
back almost always goes back as foreign direct investment, FDI; that is to say it has gone abroad, has
acquired a foreign nationality as a company, investment fund or trust account, and it comes as FDI with
the intention of going abroad again as dividends, interest on principal payments on loans or as transfer
pricing disguised in inter-company transactions.
You used the words "make it impossible"; I use the word "curtail." I am interested in curtailing the
outflow of illicit money, not trying to stop it entirely. Curtailing it is a matter of political will; stopping it
is draconian. I am not certain I favour that.
General curtail definitions
Reduce
Curtail means to reduce
American Heritage, 15 (‘curtail’, https://www.ahdictionary.com/word/search.html?q=curtail
cur·tail (kər-tāl )
tr.v. cur·tailed, cur·tail·ing, cur·tails
To cut short or reduce: We curtailed our conversation when other people entered the room. See
Synonyms at shorten.
Means to reduce or limit
MacMillan Dictionary, 15 (‘curtail’, http://www.macmillandictionary.com/dictionary/american/curtail
curtail
VERB [TRANSITIVE] FORMAL
to reduce or limit something, especially something good
a government attempt to curtail debate
Impose a restriction
Curtail means impose a restriction
Oxford Dictionaries, 15 (“curtail”,
http://www.oxforddictionaries.com/us/definition/american_english/curtail)
Definition of curtail in English:
verb
[WITH OBJECT]
1Reduce in extent or quantity; impose a restriction on: civil liberties were further curtailed
Curtail means place restrictions on
Vocabulary.com, 15 (‘curtail’ http://www.vocabulary.com/dictionary/curtail
DEFINITIONS OF:
curtail
v place restrictions on
“curtail drinking in school”
Synonyms:
curb, cut back, restrict
Curtail means cutting away authority
Curtail means cutting away some authority
Merriam-Webster, 15 (‘curtail’, http://www.merriam-webster.com/dictionary/curtail
Full Definition of CURTAIL
transitive verb
: to make less by or as if by cutting off or away some part <curtail the power of the executive branch>
<curtail inflation>
Curtail means reduce duration
Curtail can apply to duration
OED, 15 (Oxford English Dictionary, 3rd edition, ‘curtail’,
http://www.oed.com.proxy.lib.umich.edu/view/Entry/46170?rskey=Xeus0B&result=2#eid
curtail, v.
3. To shorten in duration or extent; to cut down; to abbreviate, abridge, diminish, or reduce, in extent
or amount.
Curtail requires prevention
Curtail requires prevention, not just stopping current actions
Doss, 99 (Julie, “PEER TO PEER SEXUAL HARASSMENT UNDER TITLE IX: A DISCUSSION OF LIABILITY
STANDARDS FROM DOE v. LONDONDERRY” 34 Tulsa L.J. 443 1998-1999, Hein Online)
The court also turned to the OCR policy interpretations for guidance acknowledging that the OCR
requires school districts to "take reasonable steps to curtail peer sexual harassment" and holds those
districts to a "knows or should have known" standard."' 9 The word "curtail" suggests that the districts
are required to prevent as well as stop sexual harassment.
AT: Curtail excludes abolish
Curtailment can discontinue a program in whole or in part
Dembling, 78 – General Counsel, General Accounting Office; (Paul, “OVERSIGHT HEARING ON THE
IMPOUNDMENT CONTROL ACT OF 1974” HEARING BEFORE THE TASK FORCE ON BUDGET PROCESS OF
THE COMMITTEE ON THE BUDGET HOUSE OF REPRESENTATIVES NINETY-FIFTH CONGRESS SECOND
SESSION JUNE 29, 1978, Hein Online)
(3) "Curtail" means to discontinue, in whole or in part, the execution of a program, resulting in the
application of less budget authority in furtherance of the program than provided by law.
Curtailment includes complete elimination
FASB 85
(Financial Accounting Standards Board, EMPLOYERS' ACCOUNTING FOR SETTLEMENTS AND
CURTAILMENTS OF DEFINED BENEFIT PENSION PLANS AND FOR TERMINATION BENEFITS (ISSUED
12/85))
Statement 87 continues the past practice of delaying the recognition in net periodic pension cost of (a)
gains and losses from experience different from that assumed, (b) the effects of changes in assumptions,
and (c) the cost of retroactive plan amendments. However, this Statement requires immediate
recognition of certain previously unrecognized amounts when certain transactions or events occur. It
prescribes the method for determining the amount to be recognized in earnings when a pension
obligation is settled or a plan is curtailed. Settlement is defined as an irrevocable action that relieves the
employer (or the plan) of primary responsibility for an obligation and eliminates significant risks related
to the obligation and the assets used to effect the settlement. A curtailment is defined as a significant
reduction in, or an elimination of, defined benefit accruals for present employees' future services.
Eliminating part curtails the whole
Chase, 49 – US Circuit Court judge (COMMISSION OF DEPARTMENT OF PUBLIC UTILITIES OF
COMMONWEALTH OF MASSACHUSETTS v. NEW YORK, N.H. & H.R. CO. No. 40, Docket 21392 UNITED
STATES COURT OF APPEALS FOR THE SECOND CIRCUIT 178 F.2d 559; 1949 U.S. App. LEXIS 3864
November 10, 1949, Argued December 13, 1949, Decided, lexis)
In reaching their differing conclusion, my brethren rely upon the circumstance that on a few occasions
during this long reorganization the Commission or our court has spoken of a 'curtailment [**32] of
service' or of discontinuing passenger service 'in whole or in part.' Neither by themselves nor in their
contexts do these offhand characterizations or references appear to me to support the inference sought
to be drawn from them. Indeed several are only statements of contentions or arguments presented and
without further significance. True, the word 'curtailment' has occasionally been used; but it must be
recalled that in the total picture of Old Colony service, complete abandonment of passenger trains is
only a 'curtailment,' since freight trains are still to run. Thus it is that discontinuing passenger travel
must be authorized by the I.C.C. under the bankruptcy power, rather than under its normal power over
abandonment, since it constitutes only a partial abandonment. Moreover, no stress can properly be put
on the Commission's statement early in the proceedings that the public was 'alive to the danger that
service may be discontinued, in whole or in part.' 244 I.C.C. 239, 264. For this was soon after the time
that the New Haven had been seeking a curtailment of Old Colony passenger service, rather than a
discontinuance, in the form of its abortive attempt to [**33] close 88 passenger stations. The
Commonwealth, various towns, and commuters groups had just finished fighting to prevent any
curtailment of service, and were as aware of that as a danger as they were of discontinuance as a
danger. See Rood, Protecting the User Interest in Railroad Reorganization, 7 Law & Contemp.Prob. 495,
1940. It is a fact that as early as 1939 the New Haven trustees had tried to discontinue passenger service
on the Boston Group of Old Colony lines, and the efforts of the reorganization judge were required to
induce them to hold off on this move while a satisfactory compromise was sought. Id. at 502.
No limiting function – curtailing to make an agency non-functional has the same effect
as abolition
Hildebrandt, 37 – chair of the Subcommittee of the Committee on the Post Office and Post Roads
(“Foreign Air Mail,” HEARINGS BEFORE A SUBCOMMITTEE OF THE COMMITTEE ON THE POST OFFICE
AND POST ROADS HOUSE OF REPRESENTATIVES SEVENTY-FIFTH CONGRESS, Hein Online)
The CHAIRMAN. By the authority to curtail or reduce service you have the right to destroy or to
eliminate the contractor. He cannot render service if you reduce the service, for instance, to one round
trip a month. You have ample authority under the provision you now recommend to destroy a route if
you wish to do so.
Mr. CROWLEY. One could not probably put that construction on the word "curtail." It seems to reduce,
but it would not be held to reduce to such an extent as to destroy the contract itself.
The CHAIRMAN. You could cut the service down so much that a contractor could not operate.
Curtail allows almost elimination
Brooke, 77 – US Senator (9 Housing and Transportation of the Handicapped Laws Histories and
Administrative Documents Bernard D. Jr. ed. 17792 1977-1978, Hein Online
Mr. BROOKE. The Senator said "closing of the base." I think he used the word "curtail," because
sometimes a base may not be closed, but it will be cut back to such an extent that it is almost closed
anyway.
Context – Levi Guidelines
The Levi Guidelines ‘curtailed’ domestic intelligence gathering
Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily Berman, Regulating
Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3,
http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5
Since the FBI’s inception, there has been tension embedded in its mission. It is charged not only with
solving crimes but also with preventing them.26 While the two goals often complement one another,
they call for very different types of investigative activities. Focus on crime solving argues for a set of
investigative powers enabling inquiries into specific acts, with an eye toward successful prosecution of
the perpetrators.27 Preventive work, by contrast, requires the collection of much broader swaths of
information—information about illicit organizations, their members, their goals, their capacities, and
their sources of funding as well as information about possible targets.28
Over time, both the Bureau’s focus and the rules governing its activities have swung back and forth
along the spectrum between the targeted investigations of crime solving and the broader intelligence
gathering associated with prevention. The Guidelines themselves are the product of the FBI’s early1970s move away from intelligence collection. After the United States Senate Select Committee to Study
Governmental Operations with Respect to Intelligence Activities, commonly known as the Church
Committee for its chair Senator Frank Church (D-ID), revealed that decades of unregulated intelligence
collection by the FBI had resulted in widespread abuses of the government’s investigative powers,29
Congress determined that the FBI should be subject to a legislative charter setting out strict limits on its
intelligence-collection authority.30 In an effort to stave off potentially more restrictive legislative action,
President Gerald Ford’s Attorney General, Edward Levi, issued in 1976 the first set of Attorney General’s
Guidelines—known as the Levi Guidelines.31
The Levi Guidelines strictly curtailed domestic intelligence investigations through a basic regulatory
structure that subsequent versions of the Guidelines have largely retained.32 This structure consists of
multiple investigative levels. For each successive level, a higher threshold of suspicion is necessary to
proceed; the investigative tools agents may use are more intrusive; and procedural safeguards, such as
the need for supervisory approval and limits on the temporal length of investigations, are more
robust.33 The Guidelines continue to function as the primary constraint on the FBI’s operations and
remain a justification for the lack of a statutory charter governing the FBI’s activities, but they have not
remained static.34 Multiple modifications made in the years between 1976 and 2001 eased, though
ultimately retained, restrictions on intelligence collection.35
Its
Its denotes ownership
‘Its’ is a possessive pronoun showing ownership
Glossary of English Grammar Terms, 2005
(http://www.usingenglish.com/glossary/possessive-pronoun.html)
Mine, yours, his, hers, its, ours, theirs are the possessive pronouns used to substitute a noun and to
show possession or ownership.
EG. This is your disk and that's mine. (Mine substitutes the word disk and shows that it belongs to me.)
US must be the possessor or agent of surveillance
Merriam Webster No date (http://www.merriam-webster.com/dictionary/its its AWEY)
Full Definition of ITS¶ : of or relating to it or itself especially as possessor, agent, or object of
kennel> <a child proud of its first drawings> <its final enactment into law>
an action <going to its
“Its” means belonging to it or that thing
Oxford English Dictionary 14 http://www.merriam-webster.com/dictionary/its
Its
A. As adj. poss. pron. Of or belonging to it, or that thing (L. ejus); also refl., Of or belonging to itself, its own
(L. suus).
Grammatically, this refers solely to U.S. policy
Manderino 73 (Justice – Supreme Court of Pennsylvania, “Sigal, Appellant, v. Manufacturers Light and
Heat Co”., No. 26, Jan. T., 1972, Supreme Court of Pennsylvania, 450 Pa. 228; 299 A.2d 646; 1973 Pa.
LEXIS 600; 44 Oil & Gas Rep. 214, Lexis)
On its face, the written instrument granting easement rights in this case is ambiguous. The same sentence which refers to the right to lay a 14
inch pipeline (singular) has a later reference to "said lines" (plural). The use of the plural "lines" makes no sense because the only previous
reference has been to a "line" (singular). The writing is additionally ambiguous because other key words which are "also may change
the size of its pipes" are dangling in that the possessive pronoun "its" before the word "pipes" does not have any subject
preceding, to which the possessive pronoun refers. The dangling phrase is the beginning of a sentence, the first word of which
does not begin with a capital letter as is customary in normal English [***10] usage. Immediately preceding the "sentence" which does not
begin with a capital letter, there appears a dangling [*236] semicolon which makes no sense at the beginning of a sentence and can hardly
relate to the preceding sentence which is already properly punctuated by a closing period.
The above deviations from accepted
grammatical usage make difficult, if not impossible, a clear understanding of the words used or the
intention of the parties. This is particularly true concerning the meaning of a disputed phrase in the instrument which states that the
grantee is to pay damages from ". . . the relaying, maintaining and operating said pipeline. . . ." The instrument is ambiguous as to what the
words ". . . relaying . . . said pipeline . . ." were intended to mean.
Its is possessive and refers to the party preceding its use – the USFG
US District Court 7
(United States District Court for the District of the Virgin Islands, Division of St. Thomas and St. John,
“AGF Marine Aviation & Transp. v. Cassin, 2007 U.S. Dist. LEXIS 90808,” Lexis)//BB
The Court inadvertently used the word "his" when the Court intended to use the word "its." The
possessive pronoun was intended to refer to the party preceding its use--AGF. Indeed, that reference is
consistent with the undisputed facts in this case, which indicate that Cassin completed an application for
the insurance policy and submitted it to his agent, Theodore Tunick & Company ("Tunick"). Tunick, in
turn, submitted the application to AGF's underwriting agent, TL Dallas. (See Pl.'s Mem. of Law in Supp. of
Mot. for Summ. J. 5.)
Grammatically, this refers to the United States Federal Government
Manderino 73 – Justice, Supreme Court of Pennsylvania
(“Sigal, Appellant, v. Manufacturers Light and Heat Co., No. 26, Jan. T., 1972, Supreme Court of
Pennsylvania, 450 Pa. 228; 299 A.2d 646; 1973 Pa. LEXIS 600; 44 Oil & Gas Rep. 214, Lexis)
On its face, the written instrument granting easement rights in this case is ambiguous. The same
sentence which refers to the right to lay a 14 inch pipeline (singular) has a later reference to "said lines"
(plural). The use of the plural "lines" makes no sense because the only previous reference has been to a
"line" (singular). The writing is additionally ambiguous because other key words which are "also may
change the size of its pipes" are dangling in that the possessive pronoun "its" before the word "pipes"
does not have any subject preceding, to which the possessive pronoun refers. The dangling phrase is the
beginning of a sentence, the first word of which does not begin with a capital letter as is customary in
normal English [***10] usage. Immediately preceding the "sentence" which does not begin with a
capital letter, there appears a dangling [*236] semicolon which makes no sense at the beginning of a
sentence and can hardly relate to the preceding sentence which is already properly punctuated by a
closing period. The above deviations from accepted grammatical usage make difficult, if not impossible,
a clear understanding of the words used or the intention of the parties. This is particularly true
concerning the meaning of a disputed phrase in the instrument which states that the grantee is to pay
damages from ". . . the relaying, maintaining and operating said pipeline. . . ." The instrument is
ambiguous as to what the words ". . . relaying . . . said pipeline . . ." were intended to mean.
Possessive means “owning” – Merriam Webster
(Merriam Webster, 2014 access date, http://www.merriam-webster.com/dictionary/possession)//BB
: the condition of having or owning something
: something that is owned or possessed by someone
law : the crime of having something that is illegal (such as a drug or weapon)
That means the USFG must own the surveillance program
Supreme Court of Oklahoma 34
(Swindall v. State Election Board, 168 Okla. 97, Lexis)//BB
However, I view another phase of the act which is not considered in the majority opinion. It is my
opinion that the expression, "its nominees," should have been construed by this court. Had this court so
construed those words, it would have assisted the State Election Board in the furtherance of its
ministerial duties, and would have set to rest the immediate question. It is my theory that the correct
interpretation to place upon those words, "its nominees," is to the effect that those words do not mean
all the nominees of any particular party. The word "its" is the possessive case, or the possessive
adjective of "it", meaning of or belonging to it. Webster's International Dictionary. In other words, the
expression, "its nominees," as applied to the Republican party, means nominees of it (the Republican
party). The words, "nominees" of the "Republican party," do not and necessarily cannot mean all the
nominees of the Republican party. Those words, however, do mean more than one nominee. It seems
reasonable to conclude, in the absence of an expression like "all of its nominees," or words of similar
import, that it was not the intent of the Legislature to make those words, "its nominees," all inclusive. It
seems to me that a fair and reasonable interpretation would be that those words support and embrace
the thought expressed by the New York statute, to wit, that it is the intention of the candidate to
support generally at the next general election the nominees of the party from which he seeks his
nomination, or that it is his intention to support a majority of the candidates of that party.
Its is associated with
Its means associated with
Dictionary.com, 9 (based on Collins English Dictionary, http://dictionary.reference.com/browse/its?s=t)
its (ɪts)
— determiner
a. of, belonging to, or associated in some way with it: its left rear wheel
b. ( as pronoun ): each town claims its is the best
Domestic
Domestic violations
1nc - Domestic means within US borders
Domestic surveillance is the collection of information within national borders
Avilez et al, 14 - Ethics, History, and Public Policy Senior Capstone Project at Carnegie Mellon University
(Marie, “Security and Social Dimensions of City Surveillance Policy” 12/10,
http://www.cmu.edu/hss/ehpp/documents/2014-City-Surveillance-Policy.pdf
Domestic surveillance – collection of information about the activities of private individuals/organizations
by a government entity within national borders; this can be carried out by federal, state and/or local
officials
The plan violates – they restrict surveillance on US persons regardless of borders
Voting issue to protect limits and negative ground. They explode the topic by allowing
a wide range of international affirmatives where US nationals are tangentially
involved with foreign terrorism – requiring a geographic limit is more predictable
--xt - Domestic means within the US
Domestic means wholly within the United States
Meyer, 14 – lawyer at Stanford (Jonathan, “Executive Order 12333 on American Soil, and Other Tales
from the FISA Frontier” 12/3, http://webpolicy.org/2014/12/03/eo-12333-on-american-soil/
3. These Aren’t “Domestic” Communications Under FISA and the Wiretap Act
Both the Wiretap Act and FISA include exclusivity provisions. The Wiretap Act text, in 18 U.S.C. §
2511(2)(f), reads:
[Procedures] in [the Wiretap Act, the Stored Communications Act, and FISA] shall be the exclusive
means by which electronic surveillance, as defined in [FISA], and the interception of domestic wire, oral,
and electronic communications may be conducted.
The similar FISA text, in 50 U.S.C. § 1812, says:
Except as [otherwise expressly authorized by statute,] the procedures of [the Wiretap Act, the Stored
Communications Act, the Pen Register Act, and FISA] shall be the exclusive means by which electronic
surveillance and the interception of domestic wire, oral, or electronic communications may be
conducted.
Once again unpacking the legalese, these parallel provisions establish exclusivity for 1) “electronic
surveillance” and 2) interception of “domestic” communications. As I explained above, intercepting a
two-end foreign wireline communication doesn’t constitute “electronic surveillance.” As for what counts
as a “domestic” communication, the statutes seem to mean a communication wholly within the United
States.7 A two-end foreign communication would plainly flunk that definition.
So, there’s the three-step maneuver. If the NSA intercepts foreign-to-foreign voice or Internet traffic, as
it transits the United States, that isn’t covered by either FISA or the Wiretap Act. All that’s left is
Executive Order 12333.
Domestic surveillance means within the geographic territory of the US
Sladick, 12 – blogger for the Tenth Amendment Center, (Kelly, “Battlefield USA: The Drones are Coming”
http://blog.tenthamendmentcenter.com/2012/12/battlefield-usa-the-drones-are-coming/
In a US leaked document, “Airforce Instruction 14-104”, on domestic surveillance is permitted on US
citizens. It defines domestic surveillance as, “any imagery collected by satellite (national or commercial)
and airborne platforms that cover the land areas of the 50 United States, the District of Columbia, and
the territories and possessions of the US, to a 12 nautical mile seaward limit of these land areas.” In the
leaked document, legal uses include: natural disasters, force protection, counter-terrorism, security
vulnerabilities, environmental studies, navigation, and exercises.
Federal definitions concur
Letters of Credit
(2-6 Letters of Credit § 6.04, Lexis)
The second type of transaction out of which eligible acceptances arise is transactions involving the
domestic shipment of goods.12Link to the text of the note The word “domestic” in this context has been
defined by the Federal Reserve Board to mean “within the United States.”13Link to the text of the note
The requirements of connection between the acceptance and the domestic shipment transaction
parallel those for the import- export transaction: The draft should be drawn by the buyer or seller of the
goods, in an amount reasonably equal to the cost of the transaction, and should finance a current
shipment. Like the import-export transaction, the domestic shipment transaction should be selfliquidating.
--excludes the cloud
The cloud is outside of US borders
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE
COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117,
Winter, lexis)
These other types of programs can potentially yield significant amounts of information. The NSA appears
to be collecting email address books for most major webmail companies, and storing the information in
multiple databases. n136 According to the Washington Post, the yield is "hundreds of millions of contact
lists from personal e-mail and instant messaging accounts around the world." n137 On any
representative day, in turn, the NSA appears to collect approximately half a million buddy lists and
inboxes (which frequently include the first part of the messages that have been sent). n138
Another example of collection under Executive Order 12,333 is the interception of content flowing
between data centers overseas. In October 2013, the Washington Post reported that the NSA was
collecting hundreds of millions of records, ranging from metadata to content, transiting fiber optics
cables between Google and Yahoo data centers. n139 The principal tool used to analyze the infor [*153]
mation, MUSCULAR, appears to be operated jointly with the U.K.'s Government Communications
Headquarters (GCHQ). n140 The collection of information held on the cloud, outside U.S. borders, shifts
the program outside the FISA framework. n141
--includes foreign intelligence
Refers to searches within the United States---this can include relevant information
about foreign sources
Truehart 2 – J.D., Boston University School of Law
(Carrie, “CASE COMMENT:UNITED STATES v. BIN LADEN AND THE FOREIGN INTELLIGENCE EXCEPTION
TO THE WARRANT REQUIREMENT FOR SEARCHES OF "UNITED STATES PERSONS" ABROAD,” 82 B.U.L.
Rev. 555)
This Case Comment uses the word "domestic" to refer to searches and investigations conducted within
the United States. The term "domestic foreign intelligence investigations" at first glance seems like an
oxymoron, but it is not. As used in this Case Comment, the term refers to investigations conducted
within the United States to obtain foreign intelligence information - that is, information pertaining to
foreign nationals and their respective governments or international groups - as opposed to
investigations conducted within the United States to obtain domestic intelligence information - that is,
information pertaining to United States persons only. Notice that a United States person residing in the
United States, however, could become the target of a foreign intelligence investigation if the
Government were investigating that individual's relationship with a foreign government or international
terrorist group. In other words, the difference between whether an investigation is a "domestic foreign
intelligence investigation" or a "domestic intelligence investigation" turns on whether the investigation
focuses in part on a foreign government or international group.
The line between "foreign intelligence investigations" and "criminal investigations" is admittedly a blurry
one. This is especially true where the target of the investigation is suspected of involvement in
espionage or terrorism because these activities are crimes as well as national security concerns. See
United States v. Troung Dinh Hung, 629 F.2d 908, 915-16 (stating that "almost all foreign intelligence
investigations are in part criminal investigations" because, "although espionage prosecutions are rare,
there is always the possibility that the targets of the investigations will be prosecuted for criminal
violations"); Bin Laden, 126 F. Supp. 2d at 278 (stating that "[a] foreign intelligence collection effort that
targets the acts of terrorists is likely to uncover evidence of crime"). For the purpose of this Case
Comment, the term "foreign intelligence investigations" refers to investigations conducted primarily for
the purpose of obtaining foreign intelligence. "Criminal investigations" refers to investigations
conducted specifically for the purpose of obtaining information to prosecute crimes.
FISA only applies to domestic surveillance of foreigners on US soil
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE
COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117,
Winter, lexis)
C. The Protect America Act
Four months after McConnell's proposal, Congress passed the Protect America Act (PAA), easing
restrictions on the surveillance of foreigners where one (or both) parties were located overseas. n53 In
doing so, it removed such communications from FISA's definition of "electronic surveillance," narrowing
the term to include only domestic communications. The attendant restrictions, such as those related to
probable cause that the target be a foreign power or an agent thereof, or likely to use the facilities to be
placed under surveillance, or specifications related to the facility in question, dropped away.
Includes foreigners on US soil
Adelson 8 – Program Director of the Human Rights and Immigration Law Project, Center for the
Advancement of Human Rights, Florida State University College of Law; BA, Brandeis University; MPhil,
University of Cambridge; JD, University of Miami School of Law
(Wendi, “CHILD PROSTITUTE OR VICTIM OF TRAFFICKING?,” 6 U. St. Thomas L.J. 96)
Although the TVPA was not enacted specifically to prevent the prostitution of U.S. born children, some
of the legislative debates reflect that certain legislators had that goal in mind. For example, the late
Senator Wellstone imagined that Congress designed the TPVA "to help federal law enforcement officials
expand anti-trafficking efforts here and abroad; [and] to expand domestic anti-trafficking and victim
assistance efforts." 30Link to the text of the note His use of the word "domestic" likely refers to efforts
that take place on U.S. soil as well as actions geared toward the aid of "domestic" or U.S. born victims.
[102] As executed, the language of the TVPA is broad enough to extend its protective blanket to foreign
born as well as LPR and U.S. children exploited in this manner.
--US persons definition unlimits
Their interpretation allows affs about data collection anywhere in the world
Tracy, 15 (Sam, “NSA WHISTLEBLOWER JOHN TYE EXPLAINS EXECUTIVE ORDER 12333” 3/18,
http://warrantless.org/2015/03/tye-12333/
It’s been widely reported that the NSA, under the constitutionally suspect authority of Section 215 of
the PATRIOT Act, collects all Americans’ phone metadata. Congress has not yet passed any reforms to
this law, but there have been many proposals for changes and the national debate is still raging. Yet
Americans’ data is also being collected under a different program that’s entirely hidden from public
oversight, and that was authorized under the Reagan-era Executive Order 12333.
That’s the topic of a TEDx-Charlottesville talk by whistleblower John Napier Tye, entitled “Why I spoke
out against the NSA.” Tye objected to NSA surveillance while working in the US State Department. He
explains that EO 12333 governs data collected overseas, as opposed to domestic surveillance which is
authorized by statute. However, because Americans’ emails and other communications are stored in
servers all over the globe, the distinction between domestic and international surveillance is much less
salient than when the order was originally given by President Reagan in 1981.
--AT: Geography definition overlimits
A wide range of genuinely domestic affs exists
Thompson, 13 – Legislative Attorney for the Congressional Research Service (Richard, “Drones in
Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses”
https://www.fas.org/sgp/crs/natsec/R42701.pdf
1 The term “domestic drone surveillance” as used in this report is designed to cover a wide range of
government uses including, but not limited to, investigating and deterring criminal or regulatory
violations; conducting health and safety inspections; performing search and rescue missions; patrolling
the national borders; and conducting environmental investigations.
--AT: ‘originated within’ CI
Physically located within---distinct from originated
Beppu 8 – Senior Articles Editor, Cardozo Law Review. J.D. Candidate (June 2007), Benjamin N. Cardozo
School of Law
(Daisuke, “WHEN CULTURAL VALUE JUSTIFIES PROTECTIONISM: INTERPRETING THE LANGUAGE OF THE
GATT TO FIND A LIMITED CULTURAL EXCEPTION TO THE NATIONAL TREATMENT PRINCIPLE,” 29 Cardozo
L. Rev. 1765)
Although there is no provision in the Vienna Convention that deals with this contingency, 80Link to the
text of the note and although the Appellate Body has not [1779] expressly formulated a rule that would
help to decide the matter, 81Link to the text of the note it is a sound assumption to make, based on the
fact that the Oxford Dictionary is the one most often cited, that the Appellate Body would defer to the
Oxford Dictionary. 82Link to the text of the note In other words, the Oxford definition prevails when the
Oxford Dictionary offers a definition that differs significantly from that of Webster's Dictionary. 83Link to
the text of the note Relying primarily on the Appellate Body's preference for the Oxford Dictionary, the
result for the purposes of this analysis is that the word "domestic" comes to mean "physically located
within boundaries." Therefore, the Oxford meaning of "domestic" - being physically located within
boundaries - is different from "national origin" - a source of national character.
1nc – domestic means US persons
Domestic surveillance means that it must target US persons – not just be collected
within the US
McCarthy, 6 – former assistant U.S. attorney for the Southern District of New York. (Andrew, “It’s Not
“Domestic Spying”; It’s Foreign Intelligence Collection” National Review, 5/15, Read more at:
http://www.nationalreview.com/corner/122556/its-not-domestic-spying-its-foreign-intelligencecollection-andrew-c-mccarthy
Eggen also continues the mainstream media’s propagandistic use of the term “domestic surveillance [or
'spying'] program.” In actuality, the electronic surveillance that the NSA is doing — i.e., eavesdropping
on content of conversations — is not “domestic.” A call is not considered “domestic” just because one
party to it happens to be inside the U.S., just as an investigation is not “domestic” just because some of
the subjects of interest happen to reside inside our country. Mohammed Atta was an agent of a foreign
power, al Qaeda. Surveilling him — had we done it — would not have been “domestic spying.” The calls
NSA eavesdrops on are “international,” not “domestic.” If that were not plain enough on its face, the
Supreme Court made it explicit in the Keith case (1972). There, even though it held that judicial
warrants were required for wiretapping purely domestic terror organizations, the Court excluded
investigations of threats posed by foreign organizations and their agents operating both within and
without the U.S. That is, the Court understood what most Americans understand but what the media,
civil libertarians and many members of Congress refuse to acknowledge: if we are investigating the
activities of agents of foreign powers inside the United States, that is not DOMESTIC surveillance. It is
FOREIGN counter-intelligence.
That, in part, is why the statute regulating wiretaps on foreign powers operating within the U.S. — the
one the media has suddenly decided it loves after bad-mouthing it for years as a rubber-stamp — is
called the FOREIGN Intelligence Surveillance Act (FISA). The United States has never needed court
permission to conduct wiretapping outside U.S. territory; the wiretapping it does inside U.S. territory for
national security purposes is FOREIGN INTELLIGENCE COLLECTION, not “domestic surveillance.”
Voting issue to protect limits – they explode the topic by expanding ‘domestic’ to
cover immigration and foreign counter-intelligence – which are both big enough to be
separate topics
--Excludes FISA
Domestic surveillance only observes conduct of potential criminal activity – foreign
intelligence gathering is a legally distinct category of federal policy
Fisher, 4 - Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School
(Linda, “GUILT BY EXPRESSIVE ASSOCIATION: POLITICAL PROFILING, SURVEILLANCE AND THE PRIVACY
OF GROUPS” ARIZONA LAW REVIEW [Vol. 46:621)
There is ample precedent for adopting a reasonable suspicion of criminality standard for political
surveillance. This standard remains as a requirement for police departments accepting federal aid.237
Its substantial equivalent was successfully employed in the FBI’s domestic surveillance guidelines for
over twenty-five years.238 It was also incorporated into the Chicago Red Squad consent decree.239 The
Church Committee endorsed the reasonable suspicion standard as a predicate for terrorism
investigations in 1976.240 Notably, it was recently adopted in the Denver police spying consent
decree.241 And it was enacted in a Seattle ordinance.242 Other political surveillance litigation was not
as successful.243 However, the Dale Court’s affirmation of a robust right of association strengthens and
reinforces those First Amendment arguments previously available.
(footnote 238)
238. See ATTORNEY GENERAL GUIDELINES, supra note 13; Lininger, supra note 13. These guidelines
apply to domestic surveillance only; that is, surveillance of conduct that involves potential criminal
activity, rather than foreign intelligence. The guidelines governing foreign intelligence are classified.
Portions of prior foreign intelligence surveillance guidelines from 1995 have been released, but nothing
since that time has been made available to the public. The 1995 guidelines give investigators much
greater leeway to collect intelligence than do the domestic surveillance guidelines. See ATTORNEY
GENERAL GUIDELINES FOR FBI FOREIGN INTELLIGENCE COLLECTION AND FOREIGN
COUNTERINTELLIGENCE INVESTIGATIONS (1995), available at http://www.politrix.org/foia /fbi/fbiguide.htm.
The FISC is exclusively about foreign surveillance, not domestic
Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily Berman, Regulating
Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3,
http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5
Another barrier to enlisting the FISC in intelligencecollection governance is that the intelligencecollection activities governed by the Guidelines extend beyond the scope of the FISC’s jurisdiction. The
FISC oversees electronic foreign intelligence surveillance and physical searches of premises connected
with foreign powers.322 It has no role in overseeing purely domestic surveillance of Americans absent
probable cause that those Americans are agents of a foreign power.323 The content of the Guidelines
and the activities they regulate—such as physical surveillance of Americans, infiltration of religious or
political groups, the use of informants, requests for internet history— rarely fall within the FISC’s
jurisdiction. Individuals who wish to challenge FBI activity—if they can establish standing—do not have
access to the FISC.324 Thus, it is unclear what role the FISC could play in reviewing many activities in
which the FBI engages.
FISA only governs foreign surveillance even if it operates within the United States
Harper, 14 – JD, University of Chicago (Nick, “FISA’s Fuzzy Line between Domestic and
International Terrorism” The University of Chicago Law Review [81:1123,
https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/81_3/Harper_CMT.pdf
The Foreign Intelligence Surveillance Act of 1978 1 (FISA) regulates, among other things, the
government’s acquisition of electronic surveillance within the United States for foreign intelligence
purposes. FISA allows a federal officer to seek an order from a judge at a specially designated court
“approving electronic surveillance of a foreign power or an agent of a foreign power for the purpose of
obtaining foreign intelligence information.” 2 As long as the requisite foreign nexus can be shown, FISA
warrants are preferable to their possible substitutes because they are easier to obtain and allow for
more secretive and penetrating investigations.3
Consistent with FISA’s foreign focus, the government may use the statute to investigate members of
international terrorist groups within the United States.4 However, the activities of purely domestic
terrorist groups do not fall under FISA and must therefore be investigated using standard criminal
investigative tools.5 Often, terrorists will easily be identified as international; members of designated
“foreign terrorist organizations” operating within the United States are clearly international terrorists.
But the proliferation of modern communication technologies has caused increasing slippage between
the definitions of domestic and international terrorism. For example, many homegrown terrorists are
inspired by international groups to commit attacks in the United States.6 In many cases, the government
seems to classify these actors as international terrorists based on Internet activity that ranges from
viewing and posting jihadist YouTube videos to planning attacks with suspected foreign terrorists in chat
rooms, thus using FISA’s formidable investigatory weapons against them.7 The government is aided in
this task by FISA’s definition of international terrorism, which has an extremely vague and potentially
loose internationality requirement.8 An expansive interpretation of this requirement could be used to
subject what might properly be considered domestic terrorist groups to FISA surveillance.
FISA doesn’t apply to domestic surveillance
Harper, 14 – JD, University of Chicago (Nick, “FISA’s Fuzzy Line between Domestic and
International Terrorism” The University of Chicago Law Review [81:1123,
https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/81_3/Harper_CMT.pdf
Although the Supreme Court has not explicitly said that members of international and domestic terrorist
groups should receive differing levels of Fourth Amendment protection,153 there is strong implicit
support for this proposition. The Keith Court, by limiting its decision to domestic organizations, implicitly
acknowledged that the surveillance of international groups would trigger different considerations, even
noting that warrantless surveillance “may be constitutional where foreign powers are involved.” 154
Moreover, Congress unequivocally stated that domestic terrorist groups should not be subject to FISA
surveillance, implying that a different balancing of interests is at stake for the two groups.155
--Excludes section 702
Section 702 is purely targeted towards non-US persons outside of the United States
Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE
COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117,
Winter, lexis)
1. Section 702
FISA Section 702 empowers the Attorney General (AG) and the Director of National Intelligence (DNI)
jointly to authorize, for up to one year, "the targeting of persons reasonably believed to be located
outside the United States to acquire foreign intelligence information." n64 Five limitations apply.
Acquisition may not intentionally (a) target a person known to be located in the United States; n65 (b)
target an individual reasonably believed to be located outside the United States, if the actual purpose is
to target an individual reasonably believed to be located in domestic bounds; n66 (c) target a U.S.
person reasonably believed to be outside domestic bounds; n67 or (d) obtain wholly domestic
communications. n68 In addition, (e), all acquisition must be conducted consistent with the Fourth
Amendment. n69
PRISM governs foreign intelligence gathering, not domestic surveillance
Margulies, 14 - Professor of Law, Roger Williams University School of Law (“CITIZENSHIP, IMMIGRATION,
AND NATIONAL SECURITY AFTER 9/11: THE NSA IN GLOBAL PERSPECTIVE: SURVEILLANCE, HUMAN
RIGHTS, AND INTERNATIONAL COUNTERTERRORISM” 82 Fordham L. Rev. 2137, April, lexis)
Edward Snowden's disclosures have thus far centered on two NSA programs. One is domestic - the socalled metadata program, operated pursuant to section 215 of the USA PATRIOT Act, n13 and entailing
the bulk collection of call record information, including phone numbers and times of calls. n14 The other
is foreign - the PRISM program, operated pursuant to section 702 of the Foreign Intelligence Surveillance
Act (FISA). n15 Under section 702, the government may conduct surveillance targeting the contents of
communications of non-U.S. persons reasonably believed to be located abroad when the surveillance
will result in acquiring foreign intelligence information. n16 The FISC must approve any government
request for surveillance under section 702, although these requests can [*2141] describe broad types
of communications without identifying particular individuals. n17
Under section 702, "foreign intelligence information" that the government may acquire includes a
number of grounds related to national security, such as information relating to an "actual or potential
attack" or "other grave hostile acts of a foreign power or an agent of a foreign power." n18 It also
includes information relating to possible sabotage n19 and clandestine foreign "intelligence activities."
n20 Another prong of the definition appears to sweep more broadly, including information relating to
"the conduct of the foreign affairs of the United States." n21 Despite the greater breadth of this
provision, President Obama informed a domestic and global audience that U.S. intelligence agencies
seek a narrow range of information centering on the national security and foreign intelligence concerns
described above. n22 While the U.S. intelligence agencies acquire a substantial amount of data that
does not fit under these rubrics, the president's speech confirmed that U.S. analysts do not rummage
through such data randomly or for invidious purposes. n23 A scatter-shot approach of this kind would
be unethical, illegal, and ineffective. Instead, NSA officials query communications using specific
"identifiers" such as phone numbers and email addresses that officials reasonably believe are used by
non-U.S. persons abroad to communicate foreign intelligence information. n24 The government must
also have in place minimization procedures to limit the acquisition, retention, and dissemination of
nonpublic information about U.S. persons. n25 The NSA deletes all irrelevant content, including content
from non-U.S. persons, after five years. n26
In acknowledging the "legitimate privacy interests" of both U.S. and non-U.S. persons, President Obama
affirmed the U.S. commitment to core principles in January 2014. n27 First, he narrowed the operating
definition of [*2142] foreign intelligence information, limiting it to "information relating to the
capabilities, intentions, or activities of foreign governments or elements thereof, foreign organizations,
foreign persons, or international terrorists." n28 In addition, he asserted that the NSA would engage in
bulk collection of communications for purposes of "detecting and countering" terrorism, espionage,
nuclear proliferation, threats to U.S. forces, and financial crimes, including evasion of duly enacted
sanctions. n29 Addressing anticipated concerns that these limits still left the NSA with too much
discretion, President Obama declared what the United States would not do. First, it would not collect
communications content "for the purpose of suppressing or burdening criticism or dissent, or for
disadvantaging persons based on their ethnicity, race, gender, sexual orientation, or religion." n30
Second, it would disseminate and store information regarding any person based on criteria in section 2.3
of Executive Order 12,333 n31: cases involving "foreign intelligence or counterintelligence," public
safety, or ascertainment of a potential intelligence source's credibility. n32
PRISM only governs foreign intelligence information
Greenwald, 13 – Glenn Greenwald is a fomer columnist on civil liberties and US national security issues
for the Guardian. An ex-constitutional lawyer, he was until 2012 a contributing writer at Salon. (Glenn,
“NSA Prism program taps in to user data of Apple, Google and others” The Guardian, 6/7,
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
A senior administration official said in a statement: "The Guardian and Washington Post articles refer to
collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This
law does not allow the targeting of any US citizen or of any person located within the United States.
"The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive
Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure
that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and
dissemination of incidentally acquired information about US persons.
"This program was recently reauthorized by Congress after extensive hearings and debate.
"Information collected under this program is among the most important and valuable intelligence
information we collect, and is used to protect our nation from a wide variety of threats.
"The Government may only use Section 702 to acquire foreign intelligence information, which is
specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies
across the board, regardless of the nationality of the target."
--Excludes XO 12333
XO 12333 only governs exclusively foreign surveillance – curtailing it isn’t topical
Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The
NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July,
https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/
Over the course of the past year, the world has learned that this bulk collection program was just one
small part of the NSA’s massive surveillance apparatus.4 Just a day after the first leak, The Washington
Post ran a story about PRISM, the NSA’s “downstream” collection program authorized under Section 702
of the Foreign Intelligence Surveillance Act (FISA). Under the PRISM program, the NSA compels major
tech companies like Google, Yahoo, Microsoft, Facebook, and Twitter to turn over the contents of
communications stored on company servers that have been sent or received by targets that the NSA
reasonably believes are outside of the United States.5 While few details are known about the programs
the NSA operates under Section 702, and several of the details regarding the PRISM program are a
subject of debate,6 a declassified 2011 Foreign Intelligence Surveillance Court opinion revealed that the
NSA collects more than 250,000,000 Internet communications annually using Section 702 and that “the
vast majority of these communications are obtained from Internet service providers” through the PRISM
program.7 The remainder of those communications comes from Section 702 surveillance that is
conducted “upstream”—that is, surveillance conducted not by obtaining stored communications from
cloud providers’ servers but by tapping directly into the U.S. Internet backbone network that carries
domestic, international, and foreign communications.8
Beyond NSA surveillance inside the United States under Section 215 and Section 702, the NSA engages
in massive surveillance of Internet and telephone communications outside of the country as well.
Unconstrained by statute and subject only to Executive Branch oversight under the Reagan-era
Executive Order 12333,9 this extraterritorial surveillance was revealed in October 2013 to include the
monitoring of key private data links that connect Google and Yahoo data centers around the world—
monitoring that in just 30 days processed 181,280,466 new records that traversed those links.10
Similarly, the NSA is using Executive Order 12333 to authorize the collection of millions of email address
books globally,11 and the recording of vast numbers of international phone calls—sometimes all of the
phone traffic in an entire country.12 Executive Order 12333 is also presumably the authority under
which the NSA is assisting British intelligence agencies in acquiring millions of webcam photos sent by
users of Yahoo,13 and under which the NSA is collecting over five billion cell phone location data points
per day, enabling it to track individuals’ movements and relationships with others.14
--Excludes internet surveillance
Internet surveillance isn’t ‘domestic’ if it’s targeted towards foreign persons
Thompson, 13 - Chief Operating Officer of the non-profit Lexington Institute and Chief Executive Officer
of Source Associates. Prior to holding my present positions, I was Deputy Director of the Security Studies
Program at Georgetown University (Loren, “Why NSA's PRISM Program Makes Sense” Forbes, 6/7,
http://www.forbes.com/sites/lorenthompson/2013/06/07/why-nsas-prism-program-makes-sense/
President Obama’s firm defense of the National Security Agency’s “domestic” surveillance program on
Friday should calm some of the more extravagant fears provoked by public disclosure of its existence. I
put the word “domestic” in quotes because the effort to monitor Internet and other communications
traffic isn’t really about listening in on Americans, or even foreign nationals living here, but rather
intercepting suspicious transmissions originating overseas that just happen to be passing through the
United States.
That is an eminently sensible way of keeping up with terrorists, because it is so much easier than
tapping into network conduits in other countries or under the seas (not that we don’t do that). In order
to grasp the logic of the NSA program, which is code-named PRISM, you have to understand how the
Internet evolved. It was a purely American innovation at its inception, with most of the infrastructure
concentrated in a few places like Northern Virginia.
I live a few miles from where the Internet’s first big East Coast access point was located in the parking
garage of an office building near the intersection of Virginia’s Routes 7 and 123, an area that some
people refer to as Internet Alley. Because the Worldwide Web grew so haphazardly in its early days, it
was common until recently for Internet traffic between two European countries to pass through my
neighborhood. There were only a few major nodes in the system, and packet-switching sends messages
through whatever pathway is available.
The Washington Post story on PRISM today has a graphic illustrating my point about how bandwidth
tends to be allocated globally. Like a modern version of ancient Rome’s Appian Way, all digital roads
lead to America. It isn’t hard to see why Director of National Intelligence James R. Clapper could say on
Thursday that “information collected under this program is among the most important and valuable
foreign intelligence information we collect.” No kidding: PRISM generated an average of four items per
day for the President’s daily intelligence briefing in 2012.
The key point to recognize, though, is that this really is foreign intelligence. The architecture of the
Internet enables NSA to collect it within U.S. borders, but there is no intention to spy on U.S. citizens. A
few elementary algorithms used in narrowing the analysis of traffic should be sufficient to assure that
the privacy of American citizens is seldom compromised. President Obama stressed in his comments
today that safeguards have been put in place to prevent the scope of NSA surveillance from expanding
beyond its original purpose.
I don’t want to minimize the dangers to civil liberties associated with such a program. It needs to be
monitored closely, which is one reason why Congress has been kept informed about its existence.
However, compared with the threat posed by terrorists bent upon destroying America, PRISM presents
at worst only modest danger to our liberties. Its main purpose is to protect those liberties, not subvert
them.
--xt - Domestic means US persons
Domestic surveillance is the acquisition of nonpublic information about US persons
IT Law Wiki, no date - This wiki is an encyclopedia of the legal issues, cases, statutes, events, policies,
people, organizations and publications that make up the global fields of information law, information
technology law (“domestic surveillance” http://itlaw.wikia.com/wiki/Domestic_surveillance
Domestic surveillance is the acquisition of nonpublic information concerning United States persons.
Domestic refers to citizens of the US
POWELL, 72 – US Supreme Court Justice (UNITED STATES v. UNITED STATES DISTRICT COURT FOR THE
EASTERN DISTRICT OF MICHIGAN ET AL. (PLAMONDON ET AL., REAL PARTIES IN INTEREST) No. 70-153
SUPREME COURT OF THE UNITED STATES 407 U.S. 297; 92 S. Ct. 2125; 32 L. Ed. 2d 752; 1972 U.S. LEXIS
38
8 Section 2511 (3) refers to "the constitutional power of the President" in two types of situations: (i)
where necessary to protect against attack, other hostile acts or intelligence activities of a "foreign
power"; or (ii) where necessary to protect against the overthrow of the Government or other clear and
present danger to the structure or existence of the Government. Although both of the specified
situations are sometimes referred to as "national security" threats, the term "national security" is used
only in the first sentence of § 2511 (3) with respect to the activities of foreign powers. This case involves
only the second sentence of § 2511 (3), with the threat emanating -- according to the Attorney General's
affidavit -- from "domestic organizations." Although we attempt no precise definition, we use the term
"domestic organization" in this opinion to mean a group or organization (whether formally or informally
constituted) composed of citizens of the United States and which has no significant connection with a
foreign power, its agents or agencies. No doubt there are cases where it will be difficult to distinguish
between "domestic" and "foreign" unlawful activities directed against the Government of the United
States where there is collaboration in varying degrees between domestic groups or organizations and
agents or agencies of foreign powers. But this is not such a case.
--2nc limits
Domestic surveillance is the acquisition of nonpublic information concerning United
States persons – this is already very broad – expanding it further prevents focused
analysis
Small, 8 - United States Air Force Academy (Matthew, “His Eyes are Watching You: Domestic
Surveillance, Civil Liberties and Executive Power during Times of National Crisis”
http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf
Before one can make any sort of assessment of domestic surveillance policies, it is first necessary to
narrow the scope of the term “domestic surveillance.” Domestic surveillance is a subset of intelligence
gathering. Intelligence, as it is to be understood in this context, is “information that meets the stated or
understood needs of policy makers and has been collected, processed and narrowed to meet those
needs” (Lowenthal 2006, 2). In essence, domestic surveillance is a means to an end; the end being
intelligence. The intelligence community best understands domestic surveillance as the acquisition of
nonpublic information concerning United States persons (Executive Order 12333 (3.4) (i)). With this
definition domestic surveillance remains an overly broad concept.
This paper’s analysis, in terms of President Bush’s policies, focuses on electronic surveillance;
specifically, wiretapping phone lines and obtaining caller information from phone companies. Section f
of the USA Patriot Act of 2001 defines electronic surveillance as:
[T]he acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire
or radio communication sent by or intended to be received by a particular, known United States person
who is in the United States, if the contents are acquired by intentionally targeting that United States
person, under circumstances in which a person has a reasonable expectation of privacy and a warrant
would be required for law enforcement purposes;
Adhering to the above definition allows for a focused analysis of one part of President Bush’s domestic
surveillance policy as its implementation relates to the executive’s ability to abridge certain civil
liberties. However, since electronic surveillance did not become an issue of public concern until the
1920s, there would seem to be a problem with the proposed analysis.
--AT: Geographic limit best
Geographic interpretation of ‘domestic’ is outdated in the surveillance context
Sanchez, 14 - Senior Fellow at the Cato Institute. His work focuses on technology, privacy, and civil
liberties, particularly national security and intelligence surveillance. (Julian, “Snowden: Year One” 6/5,
http://www.cato-unbound.org/2014/06/05/julian-sanchez/snowden-year-one
The second basic fact is that modern communications networks obliterate many of the assumptions
about the importance of geography that had long structured surveillance law. A “domestic” Internet
communication between a user in Manhattan and a server in Palo Alto might, at midday in the United
States, be routed through nocturnal Asia’s less congested pipes, or to a mirror in Ireland, while a
“foreign” e-mail service operated from Egypt may be hosted in San Antonio. “What we really need to do
is all the bad guys need to be on this section of the Internet,” former NSA director Keith Alexander likes
to joke. “And they only operate over here. All good people operate over here. All bad guys over here.”
It’s never been quite that easy—but General Alexander’s dream scenario used to be closer to the truth.
State adversaries communicated primarily over dedicated circuits that could be intercepted wholesale
without much worry about bumping into innocent Americans, whereas a communication entering the
United States could generally be presumed to be with someone in the United States. The traditional
division of intelligence powers by physical geography—particularized warrants on this side of the
border, an interception free-for-all on the other—no longer tracks the reality of global information
flows.
It’s terrible for both teams – it unlimits the topic, but also means no aff could actually
solve, since the internet has made borders a non-factor
Bedan, 7 - J.D. Candidate, Indiana University School of Law (Matt Echelon's Effect: The Obsolescence of
the U.S. Foreign Intelligence Legal Regime," Federal Communications Law Journal: Vol. 59: Iss. 2, Article
7. Available at: http://www.repository.law.indiana.edu/fclj/vol59/iss2/7
Apart from the issue of private corporations gathering and sharing intelligence, FISA's surveillance
definition is antiquated due to the distinction it makes between data acquired inside or outside of the
U.S. Again, government observation only qualifies as surveillance if the data is acquired inside the U.S. or
if one or more of the parties is a known U.S. person, inside the U.S., who the government is targeting
intentionally. In other words, unrestrained and indiscriminate eavesdropping by the NSA is allowed
under FISA as long as the communication is not physically intercepted within the U.S., and the target is
either: (1) someone known to be a non-U.S. person, (2) someone who is intentionally targeted but
whose identity is unknown, or (3) anyone else in the world who is not intentionally being targeted.
Today, the requirement that the interception of electronic communications takes place outside U.S.
borders is hardly an obstacle to intelligence agencies. The proliferation of the Internet and other global
communication networks has made physical distance and political borders a nonfactor in the realm of
communications. To increase efficiency, Internet traffic is often routed through the least congested
server regardless of the server's physical location.58 For instance, two neighbors in Nebraska chatting
on an instant messenger program might have their communications routed through servers in Hong
Kong and back, despite being only 30 feet apart.
A territorial limit doesn’t reflect the changing nature of technology that renders
territory obsolete
Margulies, 14 - Professor of Law, Roger Williams University School of Law (“CITIZENSHIP, IMMIGRATION,
AND NATIONAL SECURITY AFTER 9/11: THE NSA IN GLOBAL PERSPECTIVE: SURVEILLANCE, HUMAN
RIGHTS, AND INTERNATIONAL COUNTERTERRORISM” 82 Fordham L. Rev. 2137, April, lexis)
[*2151] As I suggest in my forthcoming article, however, the effective control test is inadequate for the
cyber and communications realm. n78 Here, physical control over persons or territory is unnecessary.
n79 The NSA can remotely control much of the communication of a foreign national abroad. It can
eavesdrop on those communications and may be able to filter the communications received by that
individual or alter the content the individual receives. n80 According to press reports, the NSA can break
many forms of encryption used around the world because of "back doors" it has engineered in many
software systems. n81 The NSA apparently also has the capacity to gain control of computers not
directly connected to the internet, because of the implantation of tiny radio transmitters in many
computers manufactured in the United States and elsewhere. n82 Consider as well that the United
States has relationships with internet and telecommunications companies that facilitate surveillance.
Since, at the present time, much of the world's internet traffic is routed through the United States, that
virtual power is unprecedented. Moreover, the United States has the capacity to directly access
undersea cables and other carriers of internet and telephonic communications. n83 The extended
duration and seamlessness of U.S. control [*2152] in the virtual sphere constitutes an ongoing state
presence that is in some ways more pervasive than states' dominance within their physical territory. A
narrow standard requiring physical control does not do justice to the challenge of rapidly evolving
technology in a changing world. n84 The virtual control test supplies a broader standard that meets this
challenge.
General domestic definitions
Patriot Act definition
Patriot Act definition of ‘domestic’ terrorism
Casman, 11 – master’s thesis for Master of Arts Degree in Ethics and Policy Studies Department of
Political Science at UNLV (Betsey, “The Right to Privacy in Light of the Patriot Act and Social Contract
Theory” May, UNLV Theses/ Dissertations/Professional Papers/Capstones. Paper 1086,
http://digitalscholarship.unlv.edu/cgi/viewcontent.cgi?article=2087&context=thesesdissertations
These modifications of the First Amendment seem to stem from the provision for the right to free
speech, but the right to assembly has also called into question. Though as noted a person’s exercising of
their First Amendment’s rights is not in and of itself enough to initiate an investigation, but that seems
to be more theory than fact. Rackow writes the legislation of Section 802, “Section 802 of the Patriot Act
amends 18 U.S.C. 2331, which defines international terrorism by instituting a new crime of ‘domestic
terrorism’. The Act broadly defines ‘domestic terrorism’ as activities that:
(A) involve acts dangerous to human life that are a violation of the criminal laws of the United States or
any State;
(B) appear to be intended –
(i) to intimidate or coerce a civilian population;
(ii) to influence the policy of a government by intimidation or coercion; or
(iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping; and
(C) occur primarily within the territorial jurisdiction of the United States
Upon review of this expansive definition it becomes clear that many acts of political dissent and activism
now will be characterized as ‘domestic terrorism’ (Rackow 2002, 1688). The attitude of “you are either
for us or against” has grown to mean that if you speak against “us” then you are against “us” then you
support terrorism. As was the case with the passing of the Patriot Act, no discourse on the legislation
was allowed or “terrorism” would win. There is a prevailing understanding that United States citizens
have the right to free speech and a right to assemble (among other rights enumerated within the First
Amendment); however, to exercise these rights in light of 9/11, especially to criticize the government,
can lead and has led to accusations of terrorism. This is not talking about sedition or incitement to
violence which are not covered speech under the First Amendment, but the ability to voice dissent in
open in public forums without being the subject of prosecution. The most basic of American rights can
garner attention, followed by investigation. Despite laws stating specifically that the practice of one’s
First Amendment rights shall not lead to investigation, the definitions involved in the expansive
definition of domestic terrorism do not lead to any confidence that that will be the case.
AT: FISA is only international
No bright line exists between foreign and domestic terrorists
Harper, 14 – JD, University of Chicago (Nick, “FISA’s Fuzzy Line between Domestic and
International Terrorism” The University of Chicago Law Review [81:1123,
https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/81_3/Harper_CMT.pdf
Consistent with FISA’s foreign focus, the government may use the statute to investigate members of
international terrorist groups within the United States.4 However, the activities of purely domestic
terrorist groups do not fall under FISA and must therefore be investigated using standard criminal
investigative tools.5 Often, terrorists will easily be identified as international; members of designated
“foreign terrorist organizations” operating within the United States are clearly international terrorists.
But the proliferation of modern communication technologies has caused increasing slippage between
the definitions of domestic and international terrorism. For example, many homegrown terrorists are
inspired by international groups to commit attacks in the United States.6 In many cases, the government
seems to classify these actors as international terrorists based on Internet activity that ranges from
viewing and posting jihadist YouTube videos to planning attacks with suspected foreign terrorists in chat
rooms, thus using FISA’s formidable investigatory weapons against them.7 The government is aided in
this task by FISA’s definition of international terrorism, which has an extremely vague and potentially
loose internationality requirement.8 An expansive interpretation of this requirement could be used to
subject what might properly be considered domestic terrorist groups to FISA surveillance.
FISA’s internationality requirement has been stretched into the domestic sphere
Harper, 14 – JD, University of Chicago (Nick, “FISA’s Fuzzy Line between Domestic and
International Terrorism” The University of Chicago Law Review [81:1123,
https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/81_3/Harper_CMT.pdf
Subsections (c)(1) and (c)(2) together limit the applicability of the provision to activities that are serious
violations of criminal law in the United States and that are intended to serve typical terrorist goals
(intimidating a population, influencing government policy, and so forth).63 Subsection (c)(3), however, is
the focus of this Comment, as its language regarding criminal activities that “transcend national
boundaries” defines the extent of the international nexus that is required to permit FISA surveillance.
This internationality requirement is FISA’s attempt to draw the line between domestic and
international terrorism.
This Part seeks to understand precisely where FISA draws the line between domestic and international
terrorist groups. It begins in Section A by considering the text and legislative history of FISA’s definition
of international terrorism. Section B then looks to a similar provision in the Antiterrorism Act to divine
how courts might apply the international terrorism provision in FISA. Finally, Section C locates the outer
boundary of FISA’s definition of international terrorism by examining the limited public record of two
modern FISA cases. This analysis finds minimal discernible international connections and therefore
argues that FISA’s definition of international terrorism has been stretched further into the domestic
sphere than was originally intended by Congress.
FISA’s line between domestic and international terrorism is blurry
Harper, 14 – JD, University of Chicago (Nick, “FISA’s Fuzzy Line between Domestic and
International Terrorism” The University of Chicago Law Review [81:1123,
https://lawreview.uchicago.edu/sites/lawreview.uchicago.edu/files/uploads/81_3/Harper_CMT.pdf
The House report provides the most thorough explanation of the legislature’s intended scope of the
international terrorism definition generally and the internationality requirement specifically. In fact,
given that courts faced with FISA challenges do not engage in public interpretations of this language,78
the House report may be the only authority that provides meaningful insight into this provision. The
report frames its analysis by noting that activities that transcend national boundaries must have a
“substantial international character.”79 It then proceeds to list several activities of otherwise-domestic
terrorist groups that would or would not meet this standard:
The fact that an airplane is hijacked while flying over Canada between Alaska and Chicago does not by
itself make the activity international terrorism. A domestic terrorist group which explodes a bomb in the
international arrivals area of a U.S. airport does not by this alone become engaged in international
terrorism. However, if a domestic group kidnaps foreign officials in the United States or abroad to affect
the conduct of that foreign government this would constitute international terrorism. If a domestic
group travels abroad and places a bomb in a foreign airplane, this too would be international
terrorism.80
This excerpt is not extraordinarily illuminating, but it does help establish some data points. First, the fact
that a hijacking of a domestic flight over Canadian airspace does not transcend national boundaries
indicates that the standard should not be satisfied by every activity that crosses a US border. At the
other end of the spectrum, travelling to a foreign destination to engage in terrorist activities does meet
the internationality requirement. The examples between these two extremes do not substantially
narrow the focus, although it appears that targeting politically salient international interests within the
United States creates a sufficient international nexus.
Beyond these examples, the House report further notes that a domestic terrorist group has a sufficient
international nexus if it receives “direction or substantial support” from a foreign government or
terrorist group.81 This support must be “material, technical, training, or other substantive support” of
the terrorist activities, rather than mere “moral or vocal support.”82 Finally, and importantly, the report
states that “[a]ctivities parallel to or consistent with the desires of a foreign power do not by themselves
satisfy the requirement that the foreign power is directing the domestic group.”83
Three general conclusions can be drawn from this report. First, it seems clear that the phrase “transcend
national boundaries” was not intended to reach as far as its plain meaning permits. As was noted, the
language could encompass any activities that go beyond US borders,84 but the House report seems to
envision a more substantial international connection. Second, while the examples might be seen as
establishing the outer boundaries of a necessary international nexus, the legislature left plenty of gray
area in which the government can operate. Third, this loose demarcation of the necessary international
nexus becomes more difficult to interpret with each passing year, as the Internet increasingly makes
international connections a part of everyday life.
US person definition
A US person is a citizen, corporation, or lawful permanent resident
Jordan, 6 - LL.M., New York University School of Law (2006); cum laude, Washington and
Lee University School of Law (2003) (David, “Decrypting the Fourth Amendment: Warrantless NSA
Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice Over Protocol” 47
B.C.L. Rev. 505 (2006), http://lawdigitalcommons.bc.edu/bclr/vol47/iss3/2
8 FISA's provisions require the government to obtain a FISA warrant when seeking to surveil a "United
States person." A U.S. person is defined as a U.S. citizen, a permanent resident, a corporation
incorporated in the United States, or an unincorporated association consisting of mostly U.S. citizens or
permanent residents. FISA, 50 U.S.C. § 1801(1) (2000).
AT: No brightline – speech
An agent of a foreign power isn’t determined by speech
Bedan, 7 - J.D. Candidate, Indiana University School of Law (Matt Echelon's Effect: The Obsolescence of
the U.S. Foreign Intelligence Legal Regime," Federal Communications Law Journal: Vol. 59: Iss. 2, Article
7. Available at: http://www.repository.law.indiana.edu/fclj/vol59/iss2/7
In addition to court-ordered surveillance, FISA permits the President to authorize electronic surveillance
without a court order for a period of up to one year, provided the Department of Justice ("DOJ") certifies
that the surveillance is: (1) only for foreign intelligence information; (2) targets only foreign powers or
their agents; and (3) there is no substantial likelihood that the surveillance will acquire the contents of
any communication to which a United States person is a party.29 In each of those cases, the Attorney
General is required to certify compliance with those conditions to the FISC.30 In addition, the Attorney
General is required to provide a semiannual report on the use of surveillance under overall compliance
to the House Permanent Select Committee on Intelligence as well as the Senate Select Committee on
Intelligence detailing the extent of surveillance being conducted without a court order.31
Under the statute, a U.S. person can be classified as an "agent of a foreign power" upon a finding that he
or she acts for a foreign power, is or may be involved in espionage for a foreign power, or is involved in
international terrorism. An important caveat to this definition is that no U.S. person can be classified as
an agent of a foreign power based solely on his participation in activities protected by the First
Amendment. 33
Surveillance
Surveillance violations
1nc control violation
Surveillance is monitoring with preventive intent
Lemos, 10 - Associate Professor at Faculty of Communication at Federal University of Bahia, Brazil
(Andre, ““Locative Media and Surveillance at the Boundaries of Informational Territories”,
http://www.irma-international.org/viewtitle/48348/
Although they often appear to be synonymous, it is important to distinguish between informational
control, monitoring and surveillance so that the problem can be better understood. We consider control
to be the supervision of activities, or actions normally associated with government and authority over
people, actions and processes. Monitoring can be considered a form of observation to gather
information with a view to making projections or constructing scenarios and historical records, i.e., the
action of following up and evaluating data. Surveillance, however, can be defined as an act intended to
avoid something, as an observation whose purposes are preventive or as behavior that is attentive,
cautious or careful. It is interesting to note that in English and French the two words “vigilant” and
“surveillance”, each of which is spelt the same way and has the same meaning in both languages, are
applied to someone who is particularly watchful and to acts associated with legal action or action by the
police intended to provide protection against crime, respectively. We shall define surveillance as actions
that imply control and monitoring in accordance with Gow, for whom surveillance "implies something
quite specific as the intentional observation of someone's actions or the intentional gathering of
personal information in order to observe actions taken in the past or future" (Gow. 2005. p. 8).
According to this definition, surveillance actions presuppose monitoring and control, but not all forms of
control and/or monitoring can be called surveillance. It could be said that all forms of surveillance
require two elements: intent with a view to avoiding/causing something and identification of
individuals or groups by name. It seems to me to be difficult to say that there is surveillance if there is no
identification of the person under observation (anonymous) and no preventive intent (avoiding
something). To my mind it is an exaggeration to say, for example, that the system run by my cell phone
operator that controls and monitors my calls is keeping me under surveillance. Here there is
identification but no intent. However, it can certainly be used for that purpose. The Federal Police can
request wiretaps and disclosure of telephone records to monitor my telephone calls. The same can be
said about the control and monitoring of users by public transport operators. This is part of the
administrative routine of the companies involved. Once again, however, the system can be used for
surveillance activities (a suspect can be kept under surveillance by the companies' and/or police safety
systems). Note the example further below of the recently implemented "Navigo "card in France. It
seems to me that the social networks, collaborative maps, mobile devices, wireless networks and
countless different databases that make up the information society do indeed control and monitor and
offer a real possibility of surveillance.
Violation – they curtail information gathering, not surveillance
Voting issue – for limits and ground. All information gathering is topical under their
interpretation and the negative loses security based disads and critiques
--2nc limits
Conflating surveillance with information gathering explodes limits and wrecks topic
education
Fuchs, 11 – Professor of Social Media at the University of Westminster's Centre for Social Media
Research (Christian, “New Media, Web 2.0 and Surveillance” Sociology Compass 5/2 (2011): 134–147,
10.1111/j.1751-9020.2010.00354.x, http://fuchs.uti.at/wp-content/uploads/Web20Surveillance.pdf
‘Living in ‘‘surveillance societies’’ may throw up challenges of a fundamental – ontological – kind’ (Lyon
1994, 19). Social theory is a way of clarifying such ontological questions that concern the basic nature
and reality of surveillance. An important ontological question is how to define surveillance. One can
distinguish neutral concepts and negative concepts.
For Max Horkheimer, neutral theories ‘define universal concepts under which all facts in the field in
question are to be subsumed’ (Horkheimer 1937 ⁄ 2002, 224). Neutral surveillance approaches define
surveillance as the systematic collection of data about humans or non-humans. They argue that
surveillance is a characteristic of all societies. An example for a well-known neutral concept of
surveillance is the one of Anthony Giddens. For Giddens, surveillance is ‘the coding of information
relevant to the administration of subject populations, plus their direct supervision by officials and
administrators of all sorts’ (Giddens 1984, 183f). Surveillance means ‘the collation and integration of
information put to administrative purposes’ (Giddens 1985, 46). For Giddens, all forms of organization
are in need of surveillance in order to work. ‘Who says surveillance says organisation’ (Giddens 1981,
xvii). As a consequence of his general surveillance concept, Giddens says that all modern societies are
information societies (Giddens 1987, 27; see also: Lyon 1994, 27).
Basic assumptions of neutral surveillance concepts are:
• There are positive aspects of surveillance.
• Surveillance has two faces, it is enabling and constrainig.
• Surveillance is a fundamental aspect of all societies.
• Surveillance is necessary for organization.
• Any kind of systematic information gathering is surveillance.
Based on a neutral surveillance concept, all forms of online information storage, processing and usage in
organizations are types of Internet surveillance. Examples include: the storage of company information
on a company website, e-mail communication between employees in a governmental department, the
storage of entries on Wikipedia, the online submission and storage of appointments in an e-health
system run by a hospital or a general practitioner’s office. The example shows that based on a neutral
concept of surveillance, the notion of Internet surveillance is fairly broad.
Negative approaches see surveillance as a form of systematic information gathering that is connected to
domination, coercion, the threat of using violence or the actual use of violence in order to attain certain
goals and accumulate power, in many cases against the will of those who are under surveillance. Max
Horkheimer (1947 ⁄ 1974) says that the ‘method of negation’ means ‘the denunciation of everything
that mutilates mankind and impedes its free development’ (Horkheimer 1947 ⁄ 1974, 126). For Herbert
Marcuse, negative concepts ‘are an indictment of the totality of the existing order’ (Marcuse 1941, 258).
The best-known negative concept of surveillance is the one of Michel Foucault. For Foucault,
surveillance is a form of disciplinary power. Disciplines are ‘general formulas of domination’ (Foucault
1977, 137). They enclose, normalize, punish, hierarchize, homogenize, differentiate and exclude
(Foucault 1977, 183f). The ‘means of coercion make those on whom they are applied clearly visible’
(Foucault 1977, 171). A person that is under surveillance ‘is seen, but he does not see; he is the object of
information, never a subject in communication’ (Foucault 1977, 200). The surveillant panopticon is a
‘machine of power’ (Foucault 2007, 93f).
In my opinion, there are important arguments speaking against defining surveillance in a neutral way:
1. Etymology: The French word surveiller means to oversee, to watch over. It implies a hierarchy and is
therefore connected to notions, such as watcher, watchmen, overseer and officer. Surveillance should
therefore be conceived as technique of coercion (Foucault 1977, 222), as ‘power exercised over him [an
individual] through supervision’ (Foucault 1994, 84).
2. Theoretical conflationism: Neutral concepts of surveillance put certain phenomena, such as taking
care of a baby or the electrocardiogram of a myocardial infarction patient, on one analytical level with
very different phenomena, such as preemptive state-surveillance of personal data of citizens for fighting
terrorism or the economic surveillance of private data or online behaviour by Internet companies
(Facebook, Google, etc.) for accumulating capital with the help of targeted advertising. Neutral concepts
might therefore be used for legitimatizing coercive forms of surveillance by arguing that surveillance is
ubiquitous and therefore unproblematic.
3. Difference between information gathering and surveillance: If surveillance is conceived as systematic
information gathering, then no difference can be drawn between surveillance studies and information
society studies and between a surveillance society and an information society. Therefore, given these
circumstances, there are no grounds for claiming the existence of surveillance studies as discipline or
transdiscipline (as argued, for example, by Lyon 2007)
4. The normalization of surveillance: If everything is surveillance, it becomes difficult to criticize coercive
surveillance politically.
Given these drawbacks of neutral surveillance concepts, I prefer to define surveillance as a negative
concept: surveillance is the collection of data on individuals or groups that are used so that control and
discipline of behaviour can be exercised by the threat of being targeted by violence. A negative concept
of surveillance allows drawing a clear distinction of what is and what is not Internet surveillance. Here
are, based on a negative surveillance concept, some examples for Internet surveillance processes
(connected to: harm, coercion, violence, power, control, manipulation, domination, disciplinary power,
involuntary observation):
• Teachers watching private activities of pupils via webcams at Harriton High School, Pennsylvania.
• The scanning of Internet and phone data by secret services with the help of the Echelon system and
the Carnivore software.
• Usage of full body scanners at airports.
• The employment of the DoubleClick advertising system by Internet corporations for collecting data
about users’ online browsing behaviour and providing them with targeted advertising.
• Assessment of personal images and videos of applicants on Facebook by employers prior to a job
interview.
• Watching the watchers: corporate watch systems, filming of the police beating of Rodney King (LA
1992), YouTube video of the police killing of Neda Soltan (Iran 2009).
There are other examples of information gathering that are oriented on care, benefits, solidarity, aid
and co-operation. I term such processes monitoring. Some examples are:
• Consensual online video sex chat of adults.
• Parents observing their sleeping ill baby with a webcam that is connected to their PC in order to be
alarmed when the baby needs their help.
• The voluntary sharing of personal videos and pictures from a trip undertaken with real life friends who
participated in the trip by a user.
• A Skype video chat of two friends, who live in different countries and make use of this communication
technology for staying in touch.
--xt – control violation
Surveillance requires linkage to decisions to use the data coercively to be meaningful –
defining it as data collection alone trivializes surveillance
Bennett, 5 – professor of political science at the University of Victoria (Colin, Global Surveillance and
Policing, edited by Elia Zureik and Mark Slater, p. 132-133)
Have I been the subject of surveillance or, more precisely, 'dataveillance' (Clarke 1989)? Again, the
literature would suggest that any capture of personal information (however benign) constitutes a
surveillance process. Surveillance, Lyon contends, is 'any collection and processing of personal data,
whether identifiable or not, for the purposes of influencing or managing those whose data have been
garnered.' It is simply the outcome of the 'complex ways in which we structure our political and
economic relationships' (2001: 2). Marx (1988) has also argued that there is a 'new surveillance' routine, everyday, invisible and pre-emptive. Linked to this broad definition is the power of classification
and sorting. It is a powerful means of creating and reinforcing social identities and divisions (Gandy
1993; Lyon 2003).
Without dissenting from these judgements, two insights suggest themselves as a result of the case
studies above. First, my personal data (so far as I know) has not been processed for any purpose beyond
that of ensuring that I am a valid passenger on the days and flights reserved. It has not been analysed,
subjected to any investigation, manipulated or used to make any judgement about me. No doubt, a
certain amount of data mining of de-identified information occurs within the industry to analyse general
travel patterns and demands. No doubt, had I not opted out under the Aeroplan privacy policy, my data
might have ended up with a variety of Aeroplan's partners, and I might have received related, and
unrelated, promotional materials.
It seems, however, that there is a fundamental difference between the routine capture, collection and
storage of this kind of personal information, and any subsequent analysis of that information from
which decisions (benign or otherwise) might be made about me. The new process for AP1/PNR analysis
serves to highlight the distinction. As a passenger, when I return to Canada, that information is
automatically transferred ahead of my arrival to the CCRA's Passenger Assessment Unit at the Canadian
airport, and it is systematically analysed. Anybody within a 'high-risk' category is then subject to further
investigation. The crucial process, therefore, is not the capture and transmission of the information,
but the prior procedures, and the assumptions that underpin them, about who is or is not a high-risk
traveller. Surveillance might be 'any collection and processing of personal data, whether identifiable or
not.' If we are to use such a broad definition, however, we need to find another concept to describe the
active intervention of human agents who then monitor that data to make decisions about individuals.
'Surveillance' conflates a number of distinct processes. To describe what has happened to me as
surveillance perhaps serves to trivialize the real surveillance to which some individuals, perhaps with
'risky' surnames and meal preferences, can be subjected during air travel.
Surveillance is the elimination of privacy with the explicit goal of changing individual
behavior – it’s distinct from ‘watching over’
Huey, 9 – assistant professor of sociology at the University of Western Ontario (Laura, Surveillance:
Power, Problems, and Politics. Hier, Sean P., and Greenberg, Joshua, eds. p. 221-222, ebrary
The past few years have witnessed incredible growth in the field of surveillance studies. Remarkably,
despite this growth, there is no consensus on what forms of human activity are encompassed by the
term “surveillance.” Derived from the French for watching over, surveillance encompasses the basic
activity of watching others. Brian Martin (1993, 115) uses surveillance in this sense when he describes it
as “keeping a close watch on others.” However, this basic definition has been variously expanded upon
and/or challenged. Gary Marx (1998), among others, suggests that there has been a notable shift in
what constitutes surveillance. Marx distinguishes between what he terms traditional surveillance,
involving close observation of a targeted individual (e.g., the police officer who trails a suspect), and the
new surveillance: technologies designed to systematically extract and collect personal data (e.g., the
database that collects, sorts, and creates data profiles of targeted individuals and groups). Whereas
traditional surveillance is an exceptional activity, proliferating technologies have made the new
surveillance a routine, everyday activity that is largely invisible to those people whom it targets. What
these two forms of surveillance share, however, is that each seeks to “eliminate privacy in order to
determine normative compliance or to influence the individual” (Marx 2003, 370).
For Colin Bennett (2005), such an understanding of surveillance is insufficient. Bennett argues that the
use of technology to systematically capture and analyze data must be understood in relation to
institutional, cultural, and political contexts and goals: an action alone does not constitute surveillance;
it does so only in relation to its stated uses and goals. To illustrate this point, Bennett distinguishes
between the mundane collection and use of his personal data when taking a flight to Toronto and the
experience of someone who has been targeted for close observation and special treatment by virtue of
his or her name or meal preferences. According to Bennett, then, understanding surveillance as the
simple act of watching over – the mother over the child, for example – “trivializes” its meanings, its
uses, and the experiences of its targets.
Most predictable - Information collection for control of the population is the only
unifying theme in diverse definitions of surveillance
Gill, 7 – professor of politics and security in the School of Social Science, Liverpool John Moores
University, UK (Peter, Reforming Intelligence: Obstacles to Democratic Control and Effectiveness,
Bruneau, Thomas C., and Boraz, Steven C., eds, ebrary)
Surveillance is a core concept in explaining modern governance. Though discussed in different ways by
social theorists such as Dandeker, Giddens, and Foucault, 2 there is a core of similarity in their definition
of surveillance, as constituted by two primary components: first, the gathering and storing of
information and, second, the supervision of people’s behavior. In other words, it is concerned with
knowledge and power. In contemporary Western social theory, surveillance is seen as the central aspect
both of the establishment of modern ‘‘sovereign’’ state forms and of the more recent decline of
sovereignty as it is replaced by ‘‘governance’’ (or, for Foucault, ‘‘governmentality’’), 3 including the
concomitant recognition of the significance of private forms of governance. Furthermore, studies of
non-Western societies show that surveillance is similarly central there: its philosophical basis may be
crucially different (for example, the rejection of individualism), but its core goals— understanding and
control— remain. 4 So, not surprisingly, global surveillance is argued by David Lyon to be an intrinsic
part of the general economic restructuring of capitalism that is referred to as globalization, 5 and post9/11 developments have served only to accelerate this already existing trend. 6
Surveillance requires a direct control relationship – otherwise ALL information
gathering is topical
Monahan, 10 - Associate Professor of Communication Studies at The University of North Carolina at
Chapel Hill (Torin, Critical Issues in Crime and Society : Surveillance in the Time of Insecurity, p. 8-9
ebrary) ICT = information and communication technologies
Surveillance Infrastructures
Surveillance has become a powerful, if dubious, symbol of national security. However, as with all
technologies, surveillance functions in a polyvalent way to mediate and regulate interactions among
people, organizations, and the built world. To the extent that information and communication
technologies (ICTs) have the capacity to capture and store data for retrieval and analysis, whether at a
later date or on the fly, they possess a modality for surveillance. Broadly defined, surveillance systems
are those that afford control of people through the identification, tracking, monitoring, or analysis of
individuals, data, or systems. The control element is crucial for determining whether surveillance is
occurring because otherwise all interactions with ICTs would constitute a surveillant relationship.
Surveillance is, by definition, about power. That being said, people are subject to surveillance
throughout their everyday lives and are often completely unaware of it. Moreover, one need not wait
until some exercise of control is felt in order to predict what systems have surveillance potential and
under what conditions surveillance might be asserted. Surveillance systems, seen as such, proliferate
throughout society: in urban infrastructures, transportation systems, cell phones, identification
documents, computer programs, frequent shopper cards, medical and consumer products, and much
more. Whether mobilized by the government, industry, employers, or peers, surveillance systems
modulate experiences of the world.
Surveillance requires data collection for a purpose – it must be acted upon – it’s
distinct from observation
Farrall, 9 – PhD dissertation at the University of Pennsylvania (Kenneth, “SUSPECT UNTIL PROVEN
GUILTY, A PROBLEMATIZATION OF STATE DOSSIER SYSTEMS VIA TWO CASE STUDIES: THE UNITED
STATES AND CHINA” Publicly accessible Penn Dissertations. Paper 51,
http://repository.upenn.edu/edissertations/51
DEFINING SURVEILLANCE
Surveillance, according to Ball & Webster (2003), involves the “observation, recording and
categorization of information about people, processes, and institutions.” Lyon (2004) offers a definition
of surveillance that is similar to Ball & Webster’s, but with an important addition. According to Lyon,
surveillance involves the “rationalized control of information within modern organizations, and involves
in particular processing personal data for the purposes of influence, management, or control” (p.
135).The key distinction here is that the information is gathered for a purpose and that that purpose
involves some form of action. Data that is simply gathered, but never acted upon or attended to by a
human being, does nothing.
Surveillance differs from the more general form, observation, in its more systematic nature. It is
practiced by institutions, not individuals. Using the language of cybernetics, I define surveillance in
society as the systematic production of informational feedback about people, processes and institutions
which facilitates the internal regulation of a social system. We can break down this feedback into two
branches: 1) the continuous flow of real-time information about the system in question to the regulator
and 2) the matrix of stored historical data about this system (memory) accessible to the regulator. While
the regulators of many simple cybernetic systems may operate without this second channel of feedback
3 , social systems and their institutions of surveillance have become very reliant on them.
--Excludes genetic surveillance
Collection of genetic information isn’t surveillance unless it’s used for a forensic
purpose
Epstein, 9 – Associate Professor of Law at Widener University School of Law (Jules, “"GENETIC
SURVEILLANCE"-THE BOGEYMAN RESPONSE TO FAMILIAL DNA INVESTIGATIONS” 2009 U. Ill. J.L. Tech. &
Pol'y 141 2009, Hein Online)
Beyond Professor Mnookin's stated concerns is the sound-bite derogation of familial DNA investigations,
made by other critics,' 59 as "lifelong genetic surveillance." The term "surveillance" is itself a mis-nomer,
as no one is watching or re-testing the profile once it is collected; rather, it is stored passively, and only
compared against new crime scene profiles uploaded into the database.160 This distinction is not
insignificant, as there is no ongoing examination of the sample to learn more about the individual.
Given the authoritarian, "Big Brother"' 61 connotation of lifelong surveillance, use of the terminology is
ill-advised.
The term is disproportionate for a second reason-the limited number of instances in which familial DNA
"searching" will even occur. Here, the more aggressive British experience is telling. "In 2004, . ..
approximately 20 familial searches had been undertaken. . . The reasons for this limited application
include a recognition of the novelty of the process and also the volume of partial matches it may
provide."' 62 Although the ever-increasing use of DNA database searches cannot be disputed, 163 the
likelihood of substantial familial searching has not been demonstrated. The only validity of the term
"genetic surveillance" is that of the risk of use of the stored DNA information for non-forensic purposes.
This concern, if valid, applies primarily to the individual in the database, and not (for the most part) to
relatives.
1nc – nonpublic information
Violation – the aff curtails the use of federal acquisition of public information – that’s
not surveillance, which requires that an expectation of privacy is violated
Bedan, 7 - J.D. Candidate, Indiana University School of Law (Matt, “Echelon's Effect: The Obsolescence of
the U.S. Foreign Intelligence Legal Regime," Federal Communications Law Journal: Vol. 59: Iss. 2, Article
7. Available at: http://www.repository.law.indiana.edu/fclj/vol59/iss2/7
The definition of surveillance, in pertinent form, is the acquisition of a communication either sent or
received by a "particular, known United States person who is in the United States," if the
communication was acquired by "intentionally targeting" that person, and if the circumstances are such
that they have a reasonable expectation of privacy. 53 Alternatively, "surveillance" also means the
acquisition of any communication to or from someone located in the United States, if the acquisition
occurs within the United States.54
It is clear from both FISA and Supreme Court precedent that an individual must have a reasonable
expectation of privacy for "surveillance" to occur. In United States v. Miller, the Supreme Court held that
individuals have no expectation of privacy in information held by a third party.55 Through the use of
National Security Letters, the FBI and the NSA routinely exploit this rule of law to acquire vast amounts
of personal information on U.S. citizens from private corporations, such as phone companies and
Internet service providers. 56 Because FISA's definition of surveillance fails to account for this practice,
the government is not required to get a warrant or make any certification of probable cause.
Considering how much the technological capacity of the private sector for gathering and retaining
personal information has increased in recent years, the privacy implications of government access to
this data are huge.
Voting issue –
1. limits – they explode the topic to cover governmental use of ALL types of
information, like height, weight, your facebook status or twitter accounts – it’s infinite
2. negative ground – ‘privacy bad’ is core ground on a surveillance topic, but their
interpretation completely avoids the link
--xt - nonpublic information
Domestic surveillance means the acquisition of non-public information – it’s distinct
from the broader ‘intelligence gathering’ and requires an expectation to privacy
Small, 8 - United States Air Force Academy (Matthew, “His Eyes are Watching You: Domestic
Surveillance, Civil Liberties and Executive Power during Times of National Crisis”
http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf
Before one can make any sort of assessment of domestic surveillance policies, it is first necessary to
narrow the scope of the term “domestic surveillance.” Domestic surveillance is a subset of intelligence
gathering. Intelligence, as it is to be understood in this context, is “information that meets the stated or
understood needs of policy makers and has been collected, processed and narrowed to meet those
needs” (Lowenthal 2006, 2). In essence, domestic surveillance is a means to an end; the end being
intelligence. The intelligence community best understands domestic surveillance as the acquisition of
nonpublic information concerning United States persons (Executive Order 12333 (3.4) (i)). With this
definition domestic surveillance remains an overly broad concept.
This paper’s analysis, in terms of President Bush’s policies, focuses on electronic surveillance;
specifically, wiretapping phone lines and obtaining caller information from phone companies. Section f
of the USA Patriot Act of 2001 defines electronic surveillance as:
[T]he acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire
or radio communication sent by or intended to be received by a particular, known United States person
who is in the United States, if the contents are acquired by intentionally targeting that United States
person, under circumstances in which a person has a reasonable expectation of privacy and a warrant
would be required for law enforcement purposes;
Adhering to the above definition allows for a focused analysis of one part of President Bush’s domestic
surveillance policy as its implementation relates to the executive’s ability to abridge certain civil
liberties. However, since electronic surveillance did not become an issue of public concern until the
1920s, there would seem to be a problem with the proposed analysis.
Considering an American citizen’s claim to a right to privacy, the proposed analysis is not limited to
electronic surveillance alone but rather includes those actions that would seek, or at least appear, to
abridge a civil liberty. The previously presented definition of electronic surveillance itself implies an
infringement into a person’s expected right, in this case the right is to privacy. Acknowledging the
intrusion inherent in the definition, the question of how far the president can push this intrusion
becomes even more poignant. As such, President Bush’s policies are not the sole subject of scrutiny, but
rather his supposed power to abridge civil liberties in the interest of national security. The first part of
the analysis, then, turns to a time where the national security of the United States was most at jeopardy,
during its fight for independence.
It requires the elimination of a privacy interest – otherwise they make all trivial uses
of information ‘surveillance’
Huey, 9 – assistant professor of sociology at the University of Western Ontario (Laura, Surveillance:
Power, Problems, and Politics. Hier, Sean P., and Greenberg, Joshua, eds. p. 221-222, ebrary
The past few years have witnessed incredible growth in the field of surveillance studies. Remarkably,
despite this growth, there is no consensus on what forms of human activity are encompassed by the
term “surveillance.” Derived from the French for watching over, surveillance encompasses the basic
activity of watching others. Brian Martin (1993, 115) uses surveillance in this sense when he describes it
as “keeping a close watch on others.” However, this basic definition has been variously expanded upon
and/or challenged. Gary Marx (1998), among others, suggests that there has been a notable shift in
what constitutes surveillance. Marx distinguishes between what he terms traditional surveillance,
involving close observation of a targeted individual (e.g., the police officer who trails a suspect), and the
new surveillance: technologies designed to systematically extract and collect personal data (e.g., the
database that collects, sorts, and creates data profiles of targeted individuals and groups). Whereas
traditional surveillance is an exceptional activity, proliferating technologies have made the new
surveillance a routine, everyday activity that is largely invisible to those people whom it targets. What
these two forms of surveillance share, however, is that each seeks to “eliminate privacy in order to
determine normative compliance or to influence the individual” (Marx 2003, 370).
For Colin Bennett (2005), such an understanding of surveillance is insufficient. Bennett argues that the
use of technology to systematically capture and analyze data must be understood in relation to
institutional, cultural, and political contexts and goals: an action alone does not constitute surveillance;
it does so only in relation to its stated uses and goals. To illustrate this point, Bennett distinguishes
between the mundane collection and use of his personal data when taking a flight to Toronto and the
experience of someone who has been targeted for close observation and special treatment by virtue of
his or her name or meal preferences. According to Bennett, then, understanding surveillance as the
simple act of watching over – the mother over the child, for example – “trivializes” its meanings, its
uses, and the experiences of its targets.
Even the broadest definition doesn’t include information provided with consent
Pounder 9 – PhD, Director, Amberhawk Training and Amberhawk Associates
(Chris, “NINE PRINCIPLES FOR ASSESSING WHETHER PRIVACY IS PROTECTED IN A SURVEILLANCE
SOCIETY,” Scholar)
This paper uses the term "surveillance" in its widest sense to include data sharing and the revealing of
identity information in the absence of consent of the individual concerned. It argues that the current
debate about the nature of a "surveillance society" needs a new structural framework that allows the
benefits of surveillance and the risks to individual privacy to be properly balanced.
Surveillance is not shared information
Hypponen 14 - computer security expert and columnist
(Mikko, http://www.brainyquote.com/quotes/quotes/m/mikkohyppo633646.html)
Governmental surveillance is not about the government collecting the information you're sharing
publicly and willingly; it's about collecting the information you don't think you're sharing at all, such as
the online searches you do on search engines... or private emails or text messages... or the location of
your mobile phone at any time.
Must be secret
Baker 5 – MA, CPP, CPO
(Brian, “Surveillance: Concepts and Practices for Fraud, Security and Crime Investigation,”
http://www.ifpo.org/wp-content/uploads/2013/08/surveillance.pdf)
Surveillance is defined as covert observations of places and persons for the purpose of obtaining∂
information (Dempsey, 2003). The term covert infers that the operative conducting the∂ surveillance is
discreet and secretive. Surveillance that maintains a concealed, hidden, undetected∂ nature clearly has
the greatest chance of success because the subject of the surveillance will act∂ or perform naturally.
Remaining undetected during covert surveillance work often involves∂ physical fatigue, mental stress,
and very challenging situations. Physical discomfort is an∂ unfortunate reality for investigators, which
varies from stinging perspiration in summer to hard∂ shivers during the winter.
Must be covert
IJ 98
(Info Justice, OPERATIONS, SURVEILLANCE AND STAKEOUT PART 1,
http://www.infojustice.com/samples/12%20Operations,%20Surveillance%20And%20Stakeout%20Part%
201.html)
Surveillance is defined as the systematic observation of persons, places, or things to obtain information.
Surveillance is carried out without the knowledge of those under surveillance and is concerned primarily
with people.
--third party data not topical
The Third Party Doctrine means individuals don’t have an expectation of privacy if
their data is available to third parties
Turner, 15 - Brad Turner is a graduate of Duke Law School and a practicing attorney in Ohio. (“When Big
Data Meets Big Brother: Why Courts Should Apply United States v. Jones to Protect People's Data” 16
N.C. J.L. & Tech. 377, January, lexis)
"Big Brother is Watching You." n1 Big Data n2 is fast becoming big business. n3 In an effort to target
consumers with advertisements that connect consumers with goods and services that they are likely to
buy, businesses track, collect, store, analyze, and share consumer data. n4 From smartphones n5 to
smart thermostats, n6 from customer loyalty cards n7 to in-store motion detectors, n8 from cookies n9
to web beacons n10 and beyond, n11 [*380] companies obtain people's data from every source
possible in an attempt to transform that data into consumer sales. n12
Of course, Big Data is valuable to more than just the private sector. Governments of all shapes and sizes
are quickly learning the potential value of obtaining and using Big Data. n13 Unlike business, however,
government cannot obtain huge troves of data about its citizens without raising the specter of Orwell's
Big Brother. n14 Recent revelations about the size and scope of the National Security Agency's ("NSA")
data-collection efforts, for example, have sparked a national debate about the propriety of the
government collecting huge quantities of highly-detailed data about its citizens. n15 In a post-9/11 age
when people conduct much of their daily lives online, Americans are understandably concerned about
whether our national security apparatus strikes the proper balance between national security and civil
liberties. n16
Thankfully, unlike the citizens in Orwell's 1984, n17 Americans have a tough, old friend to protect them
from Big Brother: the [*381] Fourth Amendment. n18 The Fourth Amendment's protections against
unreasonable searches and seizures have protected Americans' persons, papers, and effects for
generations. And in an age when people's lives are constantly being tracked, recorded, analyzed, and
shared by third parties, n19 its protections have never been more important.
The problem, exposed by the NSA's continued snooping, is a bit of Fourth Amendment jurisprudence
called the "Third-Party Doctrine." n20 Long ago, the Supreme Court said that a person has no reasonable
expectation of privacy in information that person knowingly exposes to others. n21 While such a policy
may have made sense at a time when ubiquitous government surveillance was a practical and political
impossibility, it makes little sense today. Nearly everything people do today becomes data. And nearly
every bit of data is shared, knowingly or unknowingly, voluntarily or involuntarily, with others. The script
has flipped: it is as difficult today for a person to avoid being tracked as it was thirty or forty years ago
for the government to track that same person. Thus, a once small and manageable exception to the
Fourth Amendment, the Third-Party Doctrine, now threatens to swallow whole the privacy guaranteed
by the Fourth Amendment.
As the institution that created the Third-Party Doctrine so many years ago, n22 courts have the duty to
ensure that it does not completely destroy privacy in the information age - an era where constant and
pervasive surveillance is the norm. This Article suggests that courts adopt the Klayman v. Obama n23
approach and hold that the Fourth Amendment applies to government [*382] acquisitions of Big Data,
including metadata. More specifically, courts should follow Justice Alito's reasoning in United States v.
Jones n24 to hold that government acquisitions of Big Data are searches subject to the reasonableness
requirements of the Fourth Amendment. Surely, if the government's collection of someone's global
positioning system ("GPS") data in Jones was intrusive enough to constitute a search, then so are
government acquisitions of Big Data.
Though such a holding would leave unresolved many challenging questions, such as whether the
collection of bulk data would require a warrant, it would be an important first step that would bring the
Fourth Amendment into the twenty-first century and enable the next generation of Americans to
conduct their lives without fear of unreasonable government searches and seizures of their data.
No data privacy exists whatsoever – companies track every activity consumers make
Turner, 15 - Brad Turner is a graduate of Duke Law School and a practicing attorney in Ohio. (“When Big
Data Meets Big Brother: Why Courts Should Apply United States v. Jones to Protect People's Data” 16
N.C. J.L. & Tech. 377, January, lexis)
II. Big Data and The Illusion of Privacy
Despite whatever Americans may believe or desire about privacy, their activities are far from private.
Every website visit, every hyperlink click, every Facebook message sent, and every YouTube video
watched is being tracked. n25 Even offline activities, like shopping, driving, walking, and exercising are
being tracked. n26 In the words of the Jurassic Park ranger tracked by a pack of velociraptors, n27 "We
are being hunted." n28 Instead of velociraptors hunting Americans for lunch, Americans are being
hunted for the purpose of advertising, or more generally, for the purpose of making money from their
data. Only, unlike the trained Jurassic Park ranger, many Americans do not know they are being hunted.
[*383] One scholar compared this to a two-way mirror: the end-user sees her own activities reflected in
the two-way mirror, and does not realize that on the other side, she is actually being observed by any
number of faceless, non-descript organizations that she probably does not even know exist. n29
A. Tracking Online Activities
Nearly everything a person does online is tracked in some way. Advertisers are looking for valuable ad
space, and companies with that space are eager to cash-in.
1. The Fundamentals of Online Tracking: Cookies, Website Activity Logs, Form Data, and Web Beacons
When a person visits a website, the website will place a "cookie" on the person's computer or electronic
device that tracks the person's activities on the website. n30 These cookies can be set to erase
themselves after the individual leaves the website - or not. n31 Persistent (multi-session) cookies stay
on a person's computer and can stay there until they expire, which can be months or even years. n32
Persistent cookies are the objects of code on a person's computer that enable a website to "remember"
a visitor so that a visitor need not, for example, re-enter her username and password each time she
wishes to log on to her email. n33 Typically, cookies [*384] can be read only by the website generating
the cookie. n34 That, however, is not always the case. Sometimes the cookie can be read by multiple
websites, permitting information-sharing between several different websites visited by the same
person. n35 Thankfully, cookies can be blocked, n36 although often at the cost of severely reduced
functionality. n37 New cookie-like technology dubbed "canvas fingerprinting," however, may be
"virtually impossible to block." n38
Cookies are not the only way an online entity can track a user's activities. Users are tracked in any
number of ways that do not require the ability to store a cookie on a user's computer or electronic
device. For example, websites n39 keep detailed activity logs of every visitor, n40 like an automatically
generated visitor log or guestbook. These logs gather raw user-data, like the accessing-device's IP
address, the access date and time, and cookie data, if it exists. n41 Software then reads and interprets
this raw data to provide the website operator with information about user behavior. n42 Of course, any
data directly entered by visitors into [*385] form fields, like name, contact information, etc., is stored in
the webserver's database. Cookie data, website activity log data, and form data can then be combined
and associated to build a comprehensive snapshot of a particular visitor's activity on the website. n43
Web beacons are another popular, very simple, and very effective way of tracking people's online
whereabouts without using a cookie. Each time someone visits a website embedded with a tracker's
web beacon, the tracker is notified, like a blip on a radar. n44 From the blips, the tracker can
surreptitiously track a visitor's online whereabouts across any website embedded with the beacon.
Embed enough web beacons into enough websites, and a tracker can learn a great deal about a visitor:
everything from the visitor's political ideology to the visitor's sexual preferences.
2. The Incentive to Track and Collect as Much Data as Possible - Big Data's Raison d'Etre
Hosting websites and providing services is not cheap, and it certainly is not free. To the pay the bills,
companies often sell ad space to online advertising agencies eager to reach a broader audience. n45
And when selling ad space pays the bills, information about the company's electronic visitors is very
valuable. The more information that advertising agency has about a particular company's electronic
visitors, the better the ad agency is able to [*386] display ads that influence those visitors. n46 The
more effective the ad, the more money the advertisement agency makes from its clients. n47 The more
money advertising agencies make from advertising on a particular electronic space, the more money the
host-company can charge for that ad space. n48
Such an information and data-driven system encourages ad space hosts, as well as the advertising
agencies that buy ad space, to collect as much personal data as possible from visitors. Though a
particular website may enjoy access to only its visitors' information, an advertising agency has access to
the visitor information of all of the electronic spaces where it displays ads (e.g., websites, smartphone
apps, software, console gaming systems, etc.). n49 The ability to compile data from so many different
sources helps advertising agencies create a three-dimensional, high-detailed image of any particular
visitor. n50 Complex algorithms [*387] then track that visitor's electronic movements and place
advertisements on websites, between songs, and before and during videos that are more likely to
influence the visitor. n51
Facebook and Google have become two of the most pervasive data-aggregating advertising agencies.
Google's AdSense advertisement system dwarfs most other online ad agencies, boasting more than two
million affiliates. n52 Facebook's advertising program is different, but just as massive. Facebook enjoys
access to the data of more than 950 million users. n53 Facebook records more than 2.5 billion status
updates, wall posts, photos, videos, and comments every day. n54 Facebook also collects data about
users visiting any platform that contains a Facebook "Like" button, whether the Facebook user clicks the
"Like" button or not. n55 One company estimates that these "Like" buttons exist on nearly one million
websites. n56 With access to so much high-quality data, it is no wonder why Google and Facebook are
able to target users and visitors with such eerily accurate web ads. n57
B. "Offline" Tracking
Going offline will not stop the hunt; people are tracked even when they think they are offline.
Smartphones, GPS systems, [*388] customer-loyalty cards, video cameras, and even radio frequency
identification ("RFID") devices track the whereabouts, purchasing habits, and seemingly offline activities
of Americans every single day, even though Americans may not realize it or approve.
1nc – technical means
Surveillance requires information collection through the use of technology
Odoemelam, 15 - Chika Ebere Odoemelam is with University of Western Ontario, London,
Ontario, Canada (“Adapting to Surveillance and Privacy Issues in the Era of
Technological and Social Networking” International Journal of Social Science and Humanity, Vol. 5, No. 6,
June 2015, http://www.ijssh.org/papers/520-H140.pdf)
According to an article by the United Nations Office on Drugs and Crime, (2009) [3], “Surveillance is the
collection or monitoring of information about a person or persons through the use of technology”. Thus,
from the above definition, one can see that surveillance involves a wide range of technology and
practices aimed at monitoring the activities of people possibly without their knowledge and permission.
For instance, there is audio surveillance which involves phone-tapping and listening devices, visual
surveillance which involves in-car video devices, hidden video surveillance, and closed-circuit television
camera (CCTV), tracking surveillance which includes global positioning systems (GPS) and mobile phones
and data surveillance which involves computer, internet and keystroke monitoring. The majority of the
above devices are constantly used to monitor people without their prior permission.
Furthermore, surveillance according to David Lyon (2007) [4] is “the focused, systematic and routine
attention to personal details for the purposes of influence, management, protection or direction”. The
above definition shows that surveillance is an instrument used by the authorities for the monitoring and
management of the activities of its citizenry. Thus, to achieve this objective, nations use electronic
communication technologies such as wiretapping telephone conversations, tracking people with
biometric data and using infrared cameras. In the same vein, marketing firms sometimes use social
media technologies such as Facebook, Twitter, blogs and instant messaging devices to collect data about
individual users, and in most cases, end up in violating the privacy of the users.
Violation – the aff curtails the use of physical searches, it’s distinct
Voting issue to preserve limits – search and seizure law should be a separate topic –
they explode surveillance into the entire body of Fourth Amendment jurisprudence
and make it impossible to predict or prepare for
--xt technical means
Observation from a distance---requires electronic equipment
Aydin 13 – PhD, Associate Professor
(Mehmet, “Perception of Surveillance: An Empirical Study in Turkey, USA, and China,” International
Journal of Business, Humanities and Technology, 3.4)
Information Technology (IT) transformation in government can be seen as a revolution in terms of
quality and∂ cost of public services. However, it is also a reality that governments’ use of IT may pose a
threat to civil rights∂ and liberties. In the last decade, there is an abundance of news in the media
regarding with the continuing assault∂ on citizens’ privacy arising from some Information Technology (IT)
applications. The most critical part of IT use∂ is related to surveillance activities. Surveillance is the
monitoring of the behavior, activities, or information for the∂ purpose of influencing, managing,
directing, or protecting (Lyon, 2007). In fact, surveillance is a highly∂ complicated issue with its positive
and negative sides. It generally involves observation of individuals or groups∂ by government
organizations. The word surveillance generally refers to observation from a distance by means of∂
electronic equipment (such as closed circuit television- CCTV), or interception of electronically
transmitted∂ information (such as Internet traffic or phone calls). These surveillance categories (CCTV,
Internet and telephone)∂ will also be the subject of this study. In the empirical part, attitudes of students
towards those technologies will be∂ analyzed in depth.
Requires distance and technology
KAB 15
(Cutting edge technology solutions, Surveillance System Services,
http://www.kabcomputers.com/Services/Security-and-Surveillance-System-Services.htm)
Surveillance Systems (CCTV)
KAB Computer Services offers several surveillance services. By definition, system surveillance is the
process of monitoring the behavior of people, objects or processes within systems for conformity to
expected or desired norms in trusted systems for security or social control. The word surveillance is
commonly used to describe observation from a distance by means of electronic equipment or other
technological means.
Typical Surveillance System Services:
Closed Circuit Television (CCTV)
Surveillance Cameras
Hidden or Covert Cameras
GPS Tracking (Real-Time and Data Loggers)
Surveillance requires the use of technical means
Odoemelam, 15 - Chika Ebere Odoemelam is with University of Western Ontario, London,
Ontario, Canada (“Adapting to Surveillance and Privacy Issues in the Era of
Technological and Social Networking” International Journal of Social Science and Humanity, Vol. 5, No. 6,
June 2015, http://www.ijssh.org/papers/520-H140.pdf)
Still contributing in the definition of surveillance, Gary T. Marx, (2002) [7], adds to the definition of
surveillance by describing it as “The use of technical means to extract or create personal data. This may
be taken from individuals or contexts”. The above definition suggests that those that have the power or
authority, such as police and other members of law enforcement agencies, can carry out surveillance
activities beyond what individuals disclose to them and without their prior notice or permission. Hence,
to carry out such operations in the context, law enforcement agents look at patterns and settings of
relationships while using surveillance technologies, such as data profiling of individuals.
Surveillance is scrutiny through technical means to create or extract personal data –
most predictable because it best reflects current government practice
Marx, 4 – Professor Emeritus from M.I.T. (Gary, “Some Concepts that may be Useful in Understanding
the Myriad Forms and Contexts of Surveillance, Intelligence and National Security,” 19:2, 226-248, DOI:
10.1080/0268452042000302976
WHAT IS SURVEILLANCE?
The dictionary definition of surveillance as it is applied to many contemporary new forms such as video,
computer dossiers, electronic location and work monitoring, drug testing and DNA analysis is woefully
inadequate or worse.7 For example in the Concise Oxford Dictionary surveillance is defined as ‘close
observation, especially of a suspected person’. Yet today many of the new surveillance technologies are
not ‘especially’ applied to ‘a suspected person’. They are commonly applied categorically. In broadening
the range of subjects the term ‘a suspected person’ takes on a different meaning. In a striking
innovation, surveillance is also applied to contexts (geographical places and spaces, particular time
periods, networks, systems and categories of person), not just to a particular person whose identity is
known beforehand.
The dictionary definition also implies a clear distinction between the object of surveillance and the
person carrying it out and a non-co-operative relationship. In an age of servants listening behind closed
doors, binoculars and telegraph interceptions, that separation made sense. It was easy to distinguish the
watcher from the person watched. Yet self-surveillance, cosurveillance and reciprocal surveillance have
emerged as important themes, often blurring the easy distinction between agent and subject of
surveillance. Well-publicised warnings that surveillance might be present seek to create self-restraint. A
general ethos of self-surveillance is also encouraged by the availability of home products such as those
that test for alcohol level, pregnancy, AIDS and other medical conditions.
Nor does the traditional definition capture contemporary cases of ‘cooperative’ parallel or comonitoring, involving the subject and an external agent in which the former voluntarily sends a remote
message (as with location and some implanted physiological monitoring devices). Individuals may agree
to wear badges and have transmitters for toll roads or as anti-theft means installed on their cars. They
may join programmes that invite police to search their vehicles if driven late at night. Many bio-metric
forms involve some degree of co-operation, or at the least, implicit co-operation by the failure to take
steps to block transmission.
The border between the watched and the watcher may also be blurred in that there can be a continuous
transmission link between sender and receiver as with brain waves or scents. The sender and receiver
are in one sense electronically joined. It may be difficult to say where the subject stops and the agent
begins. As with questions of copyright and electronic media, new issues of the ownership and control of
property appear. Such transmissions are ‘personal’ but leave the person’s body and control. The line
between what is public and private is hazy in such settings.
The term ‘close observation’ also fails to capture contemporary practices. Surveillance may be carried
out from afar, as with satellite images or the remote monitoring of communications and work. Nor need
it be ‘close’ as in detailed – much initial surveillance involves superficial scans looking for patterns of
interest to be pursued later in greater detail. It is both farther away and closer than the conventional
definition implies.
The dated nature of the definition is further illustrated in its seeming restriction to visual means as
implied in ‘observation’. The eyes do contain the vast majority of the body’s sense receptors and the
visual is a master metaphor for the other senses (for example, saying ‘I see’ for understanding or being
able to ‘see through people’). Indeed, ‘seeing through’ is a convenient short-hand for the new
surveillance.
To be sure the visual is usually an element of surveillance, even when it is not the primary means of data
collection (for example, written accounts of observations, events and conversations, or the conversion
to text or images of measurements from heat, sound or movement). Yet to ‘observe’ a text or a printout
is in many ways different from a detective or supervisor directly observing behaviour. The eye as the
major means of direct surveillance is increasingly joined or replaced by hearing, touching and smelling.
The use of multiple senses and sources of data is an important characteristic of much of the new
surveillance.
A better definition of contemporary forms of surveillance is needed. The new forms of surveillance
involve scrutiny through the use of technical means to extract or create personal data, whether from
individuals or contexts. The data sought may or may not be known by the subject, who may be willing or
unwilling to have it discovered or revealed. It may involve revealed information for which verification is
sought.
The use of ‘technical means’ to extract and create the information implies the ability to go beyond what
is offered to the unaided senses or voluntarily reported. Many of the examples involve an automated
process and most extend the senses by using material artefacts or software of some kind, but the means
for rooting out can also be sophisticated forms of deception as with undercover operations, ruses and
pretexts. The use of ‘contexts’ along with ‘individuals’ recognises that much modern surveillance also
looks at settings and patterns of relationships. Systems as well as persons are of interest.
This definition excludes the routine, non-technological surveillance that is a part of everyday life such as
looking before crossing the street or seeking the source of a sudden noise or of smoke. An observer on a
nude beach or police interrogating a co-operative suspect would also be excluded, because in these
cases the information is volunteered and the unaided senses are sufficient.
I use the more neutral and broader verb ‘scrutinise’ rather than ‘observe’ (with its tilt toward the visual)
in the definition because the nature of the means (or the senses involved) suggests sub-types and issues
for analysis that ought not to be foreclosed by a definition. For example how do visual, auditory, text
and other forms of surveillance compare with respect to factors such as intrusiveness or validity? In
addition much surveillance is automated and hence ‘observation’ (if that is what it is by a machine, is of
a different sort).
While the above definition captures some common elements among new surveillance means,
contemporary tactics are enormously varied.8 There is need for a conceptual language that brings some
parsimony and unity to the vast array of old and new surveillance activities and which can permit more
systematic comparisons and explanations. The next section suggests dimensions that can be used to
categorise the means aspect of surveillance.
--AT: Physical surveillance is topical
Surveillance requires information gathering from a distance – even if physical
surveillance is part of it, that just means observation not searches
Shahabuddin, 15 - JD, Chapman University Dale E. Fowler School of Law (Madiha, ““The More Muslim
You Are, the More Trouble You Can Be”:1 How Government Surveillance of Muslim Americans2 Violates
First Amendment Rights” Chapman Law Review [Vol. 18:2)
Professor Christopher Slobogin defines surveillance as “government efforts to gather information about
people from a distance, usually covertly and without entry into private spaces.”21 Surveillance as a
general phenomenon is then broken down into three categories: 1) communications surveillance, which
is “the real-time interception of communications”; 2) physical surveillance, which is “the real-time
observation of physical activities”; and 3) transaction surveillance, which is the “accessing [of] recorded
information about communications, activities, and other transactions.”22 According to Slobogin, since
9/11, “the United States government has been obsessed, as perhaps it should be, with ferreting out
national security threats,” but “more than occasionally it has also visited significant intrusion on large
numbers of law-abiding citizens—sometimes inadvertently, sometimes not.”23 Within the context of
national security, intelligence gathering24 of pattern occurrences in neighborhoods and communities is
intended to “analyze broad or meaningful trends” as a means of assessing the validity and likelihood of a
national security threat.25
Such intelligence gathering, however, armed with a prejudicial purpose can result in “selective
surveillance” that imposes burdens on Muslim Americans’ First Amendment rights, further alienating
this particular community from the government.26 The surveillance of Muslim Americans operates
along a similar, yet covert, vein of the “Broken Windows”27 theory of policing. Developed by James Q.
Wilson and George L. Kelling, this theory posits that when a community riddled with violence and crime
becomes less tolerant of the minor causes of social disorder, a decrease in violent crime will result.28
Implementation of the Broken Windows theory has resulted in aggressive “zero tolerance policing” in
New York City, with its stated goal being to increase misdemeanor arrests on the streets in an effort to
reduce other, more violent crime.29 While there has been much social science research conducted to
test the Broken Windows theory, “there is no reliable empirical support for the proposition that disorder
causes crime or that broken-windows policing reduces serious crime.”30
--AT: Overlimits
Technological surveillance is broad – multiple examples
Odoemelam, 15 - Chika Ebere Odoemelam is with University of Western Ontario, London,
Ontario, Canada (“Adapting to Surveillance and Privacy Issues in the Era of
Technological and Social Networking” International Journal of Social Science and Humanity, Vol. 5, No. 6,
June 2015, http://www.ijssh.org/papers/520-H140.pdf)
V. TYPES OF SURVEILLANCE
The advent of advanced forms of technology has made our lives more prone to public scrutiny today, in
the 21st century. The concept of a surveillance society whereby our everyday private lives are being
monitored and recorded by the authorities is no longer news. Since the September 2001 terrorists
attack in the United States, the assault on our privacy by security agents using sophisticated surveillance
programs or privacy-invading devices has been a constant presence in the news media. The availability
of wireless communications, computers, cameras, sensors, GPS, biometrics, and other technologies is
growing silently in our midst.
According Christopher Parsons (2011) [10], “When we send messages to one another online, when we
browse web pages and send e-mail, our communications are typically unencrypted, that is, they are in a
form that can be easily read”. Because our communications are unencrypted, everyone who uses online
technology or other forms of communications is vulnerable to surveillance. Our online and offline
communications are constantly being monitored and are under surveillance by the “appropriate”
authorities. As a result, it is possible for our privacy to be violated without our consent because of our
reliance on technology. There is a huge privacy issue in relation to digital and other forms of
communications all over the globe, especially when telecommunications companies install equipment
that could be used for covert surveillance and even modification of our communications.
Moreover, various forms of surveillance abound that could be blamed for bringing our lives out of the
private domain and into the public sphere. These forms of surveillance include.
A. E-mail Surveillance
This is related to the monitoring of both encrypted and unencrypted electronic messages or
communications of individuals by government agencies. The government does this by ordering Internet
Service Providers (ISP) to inspect their user's communications data, both encrypted and unencrypted.
According to the New York Times (June 16, 2009) [11] article, “The National Security Agency is facing
renewed scrutiny over the extent of its domestic surveillance program, with critics in Congress saying its
recent intercepts of the private telephone calls and e-mail messages of Americans are broader than
previously acknowledged, current and former officials said”. The above statement suggests that we are
living in a surveillance society, and that the challenges society will face in adapting it as a way of life are
enormous and potentially overwhelming.
B. Telephone Tracking Surveillance
The recent claims that US intelligence agencies have been monitoring the mobile phone conversations
of German Chancellor, Angela Merkel, as well as those of over seventy million French citizens, is a strong
example of telephone surveillance.
According to an article, Der Spiegel (2013) [12] reporting on information obtained from former NSA
worker Edward Snowden, “Merkel's mobile number had been listed by the NSA's Special Collection
Service (SCS) since 2002 and may have been monitored for more than 10 years”. This information makes
it obvious that the surveillance business observes no boundaries and a respects no individual. In
surveillance, everybody is a suspect irrespective of one's position in the society. Surveillance is
sometimes carried out by tapping the targets' communications with high-tech surveillance equipment,
thus threatening their right to privacy as guaranteed by the International Covenant on Civil and Political
Rights. Disclosures of this nature will continue to raise fundamental questions around the world about
how to effectively protect our privacy and our personal data from unauthorized surveillance. For
instance, if companies are handing over customer data or access to their equipment without
authorization, those businesses may well have broken the law by violating the privacy of their
customers.
C. Other Forms of Surveillance
According to Christian Fuschs (2010) [13], other forms of surveillance include:
1) Scanning the fingerprints of visitors entering the United States.
2) The use of speed cameras for identifying speeders which involves state power.
3) Electronic monitoring bracelets for prisoners in an open prison system.
4) Scanning of Internet and phone data by secret services.
5) Usage of full body scanners at airports.
6) Biometric passports containing digital fingerprints.
7) CCTV cameras in public places for the prevention of crime and terrorism.
8) Assessment of customer shopping behaviour with the help of loyalty cards.
9) Data collection in marketing research.
10) Assessment of personal images and videos of applicants
on Facebook by employers prior to a job interview.
11) Passenger Name Record (PNR) data transfer in the aviation industry.
12) Corporations spying on employees, or union members.
1nc – people not places violation
Surveillance is the focused, systematic and routine collection of personal details – it
excludes surveillance of places
Keiber, 14 – PhD dissertation for the Graduate Program in Political Science at Ohio State (Jason, “The
Surveillance of Individuals in International Politics”
https://etd.ohiolink.edu/!etd.send_file?accession=osu1397573412&disposition=inline
The study of surveillance has its own discipline, yet it is relatively new. The field of Surveillance Studies
“covers a huge range of activities and processes, but what they have in common is that, for whatever
reason, people and populations are under scrutiny.”65 A representative definition of “surveillance” is:
“the focused, systematic and routine” collection and analysis of “personal details for purposes of
influence, management, protection or direction.66
Various elements of the definition deserve attention. First, surveillance is focused and routine. This
suggest it is, at the very least, purposive, and incidental acquisition of data would not count as
surveillance proper. Second, it includes both collection and analysis. Note also that collection entails the
activity of gathering information as well as the storage of it. Storage, for example of data in a database,
is an important component of surveillance because it enables those conducting surveillance to keep
track of information over time and recall that information when needed. Analysis is included because
often the collected data does not speak for itself. For example most information is classified (sorted) as
it gets stored, and classification is itself a form of analysis. Moreover, technology increasingly enables
automated data analysis and data mining to discover patterns and novel information. Third, according to
the definition above different actors can conduct surveillance—governments, corporations, civic
organizations, parents, etc. For my purposes the focus will be on governmental forms of surveillance.
Finally, surveillance is about people. Students of international politics may pause here—what about
surveillance of material things like missile sites and nuclear enrichment facilities. Surveillance Studies,
which has roots in sociology and human geography, is primarily interested in surveillance as a social and
political phenomenon. That being said, sometimes surveillance of objects can provide a lot of
information about what certain people are doing. This is well within the purview of surveillance studies.
For an IR example, IAEA monitoring of gas centrifuges is similar to workplace monitoring intended to
check whether or not employees are doing their job. On the other hand there is some material-focused
surveillance which Surveillance Studies doesn’t address. For example satellites and seismic and
atmospheric monitoring constantly operate to detect nuclear detonations, but this is activity that
Surveillance Studies is not too interested in.
Voting issue to ensure predictable limits. Surveillance already covers a huge range of
activities – including surveillance of places explodes the topic and skirts the core
controversies of surveillance studies
--xt people violation
Surveillance is defined as ‘social sorting’---the deliberate collection of personal
information for the purpose of management, protection or detection
Tucker and Wang 14 – *PhD, Professor of Computer Science, **PhD, Professor @ U Portsmouth
(Victoria and John, “On the Role of Identity in Surveillance,” http://arxiv.org/pdf/1408.3438.pdf)
David Lyon has emphasised a general conception of surveillance, which he has characterised∂ as “the
focused, systematic and routine attention to personal details for purposes of influence,∂ management,
protection or detection” (2007a: 14). Furthermore, “this attention to personal∂ details is not random,
occasional or spontaneous; it is deliberate and depends on certain∂ protocol and techniques” (ibid.).
Lyon (2003, 2007b) has emphasised the significance of∂ considering contemporary surveillance as social
sorting. He defined the term to mean the∂ “focus on the social and economic categories and the
computer codes by which personal data∂ is organized with a view to influencing and managing people
and populations” (Lyon, 2003:∂ 2). Social sorting has become the main purpose of surveillance, since
surveillance today is∂ overwhelmingly about personal data.∂ The rise of surveillance leads to an
emphasis on monitoring the behaviours from selected∂ individuals, through groups of people, to the
entire population. The growth and effectiveness∂ of the monitoring are made possible by all sorts of new
technologies, especially software∂ technologies. However, surveillance as social sorting is becoming
increasingly significant,∂ not merely because of the abundance and availabilities of new technological
devices. Rather,∂ these devices are required because of the increasing number of perceived and actual
risks,∂ and consequently, the desire to monitor the behaviour of the entire population (cf. Lyon,∂ 2003).
Systematic observation and identification of particular attributes of individuals
Tucker and Wang 14 – *PhD, Professor of Computer Science, **PhD, Professor @ U Portsmouth
(Victoria and John, “On the Role of Identity in Surveillance,” http://arxiv.org/pdf/1408.3438.pdf)
Indeed, surveillance is about data and essential to contemporary surveillance practices are∂ software
technologies and hardware devices that collect, store and process data. Currently,∂ the growth and
effectiveness of surveillance are made possible by all sorts of new∂ technologies, especially software
technologies. They are increasingly becoming a natural∂ component of our everyday life as various forms
of surveillance practices are routinely built∂ into our physical and virtual environments. Surveillance is a
process of data gathering that∂ involves the systematic observation of behaviours and individuals, and
the identification of∂ the ones that are deemed to have specific attributes (see: Figure 1).
Systematic observation of persons
Wang 11 – PhD, Vice President for Information Services and Chief Information Officer for the RF
(Hao, “Protecting Privacy in China,” p. 27)
Surveillance is defined as the systematic investigation or monitoring of the actions or communications of
one or more persons. Traditionally, surveillance has been undertaken by physical means, such as
guarding prisons. In recent decades, it has been enhanced through image amplification devices such as
high-resolution satel¬lite cameras.6"1 Most of them are readily available in China today. However, some
of them are also privacy invasive. They render current Chinese legal protections seriously inadequate.
These devices may include: (I) microphones or listening devices that can be concealed; (2) miniature
tape recorders; (3) hidden cameras such as cell phone cameras; (4) hidden monitors that operated by
remote control; (5) infrared devices enabling photographs to be taken at night; (6) miniature
transmitters; and so on.
People
Nawawi 15 – PhD, Lecturer of Future Public Health Professionals
(Wan, “Surveillance Methods of Reducing Pilferage Problems in Foodservice Operation,” J. Basic. Appl.
Sci. Res., 5(1)91-94, 2015)
Nowadays, pilferage becomes one of the issues that are affecting the foodservice establishment. One of
the∂ methods that can help to reduce pilferage problem is through surveillance. According to Advanced
English∂ Dictionary, surveillance is defined as “a close watch keeps on a person, especially someone
suspected of∂ criminal activities”. This means, surveillance is the continuous monitoring of an individual
under supervision. In∂ the food service industry, the employee theft frequently occurred and it gives bad
effect to this industry [8]. So,∂ the surveillance is very important in order to reduce employee theft and it
can be done using the technology or by∂ humans.
General surveillance definitions
Limits good - surveillance
Narrow definitions are preferable---otherwise ‘surveillance’ is completely unlimited
Walby 5 – PhD, Associate Professor, University of Winnipeg, Department of Criminal Justice
(Kevin, “Institutional Ethnography and Surveillance Studies: An Outline for Inquiry,” Surveillance &
Society 3(2/3): 158-172)
The emerging transdisciplinary field of surveillance studies suffers from an overabundance of
speculative theorizing and a dearth of rigorous empirical research. Of course, many monographs,
articles, and reports tangentially related to the study of surveillance are based on social scientific
practice, and many of the classic works that constitute surveillance studies itself are not purely
speculative but engage through research with the social world they investigate (see, for instance, Rule,
1973; Braverman, 1974; Marx, 1988). Researching surveillance involves “watching” and needs to be
accompanied by an ethics of honesty, sympathy and respect as it regards researchers and their
respondents. Still, there is no overarching method in this area of study. Nor should there be only one
overarching method. When we use the word “surveillance” we often forget how amazingly diverse the
forms, linkages, and processes captured by the word are. That surveillance is a signifier referring to faceto-face supervision, camera monitoring, TV watching, paparazzi stalking, GPS tailing, cardiac
telemonitoring, the tracking of commercial/internet transactions, the tracing of tagged plants and
animals, etc., points to an impossible and always receding signified. Nevertheless, we need to refer to
these processes, and at present time surveillance is the term. We also need ways of inquiring into these
processes. The search is on for the methods of inquiry needed to give surveillance studies continuity and
legitimacy in the sport de combat of social science.
Reject broad definitions of surveillance – they prevent rigorously analyzing the topic
Jobard, 8 – Center of Sociological Research on Penal Institutions (Fabien, Law and Deviance, Volume 10 :
Surveillance and Governance. Deflem, Mathieu, ed, p. 77 ebrary)
The term surveillance raises a lexical difficulty which complicates its theoretical implications as well as
its empirical specification. Narrowly understood, it refers to the set of processes and measures through
which the State is informed of the activities of a person or of a group of persons while avoiding
repressive action, either because no offence has actually been identified or because the government
prefers, for one reason or another, to be discrete (Fijnaut & Marx, 1995; Sharpe, 2000). Yet, Michel
Foucault’s seminal work Surveiller et punir was translated into English under the title Discipline and
Punish (Foucault, 1977). In this latter disciplinary understanding, the notion of surveillance has to do
with a much broader field (Deleuze, 1988). It ceases to be a mere policing tool among many others in
the State’s policing arsenal, and instead becomes a regime of ‘‘governmentality’’ combining and
articulating different technologies, strategies, and governmental rationalities (Rose & Miller, 1992).
Accordingly, surveillance becomes a notion to describe a specific way through which human behavior is
apprehended, and hence ensure predictability, calculability, and ‘‘governability’’ (Gandy, 1993; Lyon,
1994; Wood, 2003). Here, of course, we find ourselves following a path opened by Foucault (1988) and
followed by many others since (for instance Rose, 2000).
However, whether one understands the notion of surveillance in its narrow sense, as a mere set of
disparate means within a governmental apparatus, or, on the contrary, as the basis for the constitution
of a governmentality regime which relies on spotting, identification, and control, using number of
techniques, devices, and processes, in both cases, the risk is that surveillance becomes an ‘‘all-terrain’’
notion which has less and less to do with the ground realities of its implementation. As David Garland
(1997) strongly underlines, the notion of surveillance could then lead directly to a variant of
reductionism: applicable to too many situations, it would, at the same time, suppress the empirical
specificities of each one. This inclination is all the more detrimental that, in polishing the ruggedness of
reality, it contributes to neglecting the uniqueness of the organizational methods and the institutional
layouts, the various types of intervention, and of the stocks of knowledge precisely meant to define the
‘‘surveillance society.’’ Yet, if there were one systematic observation to report, it would be the
multiplicity and variability of the devices of surveillance. Each of these devices adapts to specific
constellations, which have characteristic social, spatial, and temporal indicators, and are defined by the
nature of the threats and the risks that operate inside of them. The differences from one constellation
to another are what deserve particular attention.
Federal surveillance laws
Surveillance laws refer to FISA, the NSA, the Right to Financial Privacy Act, and the Fair
Credit Reporting Act
Congressional Record, 13 (Text of S.1599, a bill to amend the Patriot Act, 10/29, p. S7630)
(2) SURVEILLANCE LAW.—The term ‘‘surveillance law’’ means any provision of any of the following:
(A) The Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et seq.).
(B) Section 802(a) of the National Security Act of 1947 (50 U.S.C. 436(a)).
(C) Section 2709 of title 18, United States Code.
(D) Section 1114 of the Right to Financial Privacy Act of 1978 (12 U.S.C. 3414(a)(5)(A)).
(E) Subsection (a) or (b) of section 626 of the Fair Credit Reporting Act (15 U.S.C. 1681u(a), 1681u(b)).
(F) Section 627(a) of the Fair Credit Reporting Act (15 U.S.C. 1681v(a)) (as in effect on the day before the
date of the enactment of this Act).
AT: Lyon definition
Topical exceptions exist to general standards for surveillance
Lyon, 7 – David Lyon directs the Surveillance Studies Centre, is a Professor of Sociology, holds a Queen’s
Research Chair and is cross-appointed as a Professor in the Faculty of Law at Queen's University in
Kingston, Ontario (SURVEILLANCE STUDIES: AN OVERVIEW, p. 13-16)
Defining surveillance
Before going any further, I should make clear what is meant by surveillance. Although the word
'surveillance' often has connotations of surreptitious cloak-and-dagger or undercover investigations into
individual activities, it also has some fairly straightforward meanings that refer to routine and everyday
activity. Rooted in the French verb surveiller, literally to 'watch over', surveillance refers to processes in
which special note is taken of certain human behaviours that go well beyond idle curiosity. You can
'watch over' (or, more clumsily, 'surveill') others because you are concerned for their safety; lifeguards
at the edge of the swimming pool might be an example. Or you can watch over those whose activities
are in some way dubious or suspect; police officers watching someone loitering in a parking lot would be
an example of this kind of surveillance.
Surveillance always has some ambiguity, and that is one of the things that make it both intriguing and
highly sensitive. For example, parental concern and care for children may lead to the adoption of some
surveillance technologies in order to express this. But at what point does this become an unacceptable
form of control? Does the answer depend on whether or not the offspring in question are aware that
they are being tracked, or is the practice itself unethical by some standards? At the same time, putting
the question this way assumes that people in general are wary, if not positively spooked, when they
learn that others may be noting their movements, listening to their conversations or profiling their
purchase patterns. But this assumption is not always sound. Many seem content to be surveilled, for
example by street cameras, and some appear so to relish being watched that they will put on a display
for the overhead lenses, or dis- close the most intimate details about themselves in blogs or on
webcams.
So what is surveillance? For the sake of argument, we may start by saying that it is the focused,
systematic and routine attention to per- sonal details for purposes of influence, management,
protection or direction. Surveillance directs its attention in the end to individuals (even though
aggregate data, such as those available in the public domain, may be used to build up a background
picture). It is focused. By systematic, I mean that this attention to personal details is not random,
occasional or spontaneous; it is deliberate and depends on certain protocols and techniques. Beyond
this, surveillance is routine; it occurs as a 'normal' part of everyday life in all societies that depend on
bureaucratic administration and some kinds of information technology. Everyday surveillance is endemic
to modern societies. It is one of those major social processes that actually constitute modernity as such
(Giddens 1985).
Having said that, there are exceptions. Anyone who tries to present an 'overview' has to admit that
particular circumstances make a difference. The big picture may seem over-simplified but, equally, the
tiny details can easily lose a sense of significance. For example, not all surveillance is necessarily focused.
Some police surveillance, for instance, may be quite general - a 'dragnet' - in an attempt somehow to
narrow down a search for some likely suspects. And by the same token, such surveillance may be fairly
random. Again, surveillance may occur in relation to non-human phenomena that have only a secondary
relevance to 'personal details'. Satellite images may be used to seek signs of mass graves where
genocide is suspected or birds may be tagged to discover how avian flu is spread. Such exceptions are
important, and add nuance to our understanding of the big picture. By looking at various sites of
surveillance, and exploring surveillance in both 'top-down' and 'bottom-up' ways, I hope to illustrate
how such variations make a difference to how surveillance is understood in different contexts.
The above definition makes reference to 'information technology', but digital devices only increase the
capacities of surveillance or, sometimes, help to foster particular kinds of surveillance or help to alter its
character. Surveillance also occurs in down-to-earth, face-to- face ways. Such human surveillance draws
on time-honoured practices of direct supervision, or of looking out for unusual people or behaviours,
which might be seen in the factory overseer or in neighbourhood watch schemes. Indeed, to accompany
the most high-tech systems invented, the US Department of Homeland Security still conscripts ordinary
people to be the 'eyes and ears' of government, and some non-professional citizen-observers in Durban,
South Africa have been described by a security manager (without irony) as 'living cameras' (Hentschel
2006).
But to return to the definition: it is crucial to remember that surveillance is always hinged to some
specific purposes. The marketer wishes to influence the consumer, the high school seeks efficient ways
of managing diverse students and the security company wishes to insert certain control mechanisms such as PIN (personal identification number) entry into buildings or sectors. So each will garner and
manipulate data for those purposes. At the same time, it should not be imagined that the influence,
management or control is necessarily malign or unsocial, despite the frequently negative connotations
of the word 'surveillance'. It may involve incentives or reminders about legal requirements; the
management may exist to ensure that certain entitlements - to benefits or services - are correctly
honoured and the control may limit harmful occurrences.
On the one hand, then, surveillance is a set of practices, while, on the other, it connects with purposes.
It usually involves relations of power in which watchers are privileged. But surveillance often involves
participation in which the watched play a role. It is about vision, but not one-sidedly so; surveillance is
also about visibility. Contexts and cultures are important, too. For instance, infra-red technologies that
reveal what is otherwise shrouded in darkness help to alter power relations. But the willing selfexposure of blog-writers also helps to change the contours of visibility. To use infra-red devices to see
into blog- writers' rooms at night would infringe personal rights and invade private spaces. But for blogwriters to describe their nocturnal activities online may be seen as an unexceptional right to free
expression.
Lyon’s definition has so many exceptions it’s not useful
Sparrow, 13 - LEAP Encryption Access Project (Elijah, “Digital Surveillance”, chapter in Global
Information Society Watch 2014,
giswatch.org/sites/default/files/gisw2014_communications_surveillance.pdf
It is no easy task to pinpoint what we mean when we say “surveillance”. As a first approximation, David
Lyon defines surveillance as “the focused, systematic, and routine attention to personal details for
purposes of influence, management, protection, or direction.” This definition tries to convey the way in
which surveillance has historically functioned as a necessary aspect of maintaining modern society,1 for
example, in sorting citizens from non-citizens, the sick from the healthy, the credit worthy from the
credit risks. He then immediately goes on to note that surveillance is often not focused, systematic or
routine at all – for example, in the case of dragnet surveillance that captures information from the
digital communication of everyone without any evidence of its efficacy. What are we to make of
surveillance in a digital age, where the capture and processing of personal information by powerful
actors is not just routine but ubiquitous? Increasingly, surveillance does not seem an activity undertaken
for simple “influence, management, protection or direction”, but instead seems to be much more,
constituting the core security strategy of many nation-states and the core business model for the largest
internet firms, credit card companies, and advertisers.
Most historians of surveillance likely agree with Lyon’s assertion that “digital devices only increase the
capacities of surveillance or, sometimes, help to foster particular kinds of surveillance or help to alter its
character.”2 It is worthwhile, however, to ask what precisely is different about “digital”, and how this
transformation of surveillance scale and character might represent something substantially new.
AT: Dictionary definition of surveillance
Dictionary definitions don’t reflect the actual federal practice of surveillance
Marx, 4 – Professor Emeritus from M.I.T. (Gary, “Some Concepts that may be Useful in Understanding
the Myriad Forms and Contexts of Surveillance, Intelligence and National Security,” 19:2, 226-248, DOI:
10.1080/0268452042000302976
WHAT IS SURVEILLANCE?
The dictionary definition of surveillance as it is applied to many contemporary new forms such as video,
computer dossiers, electronic location and work monitoring, drug testing and DNA analysis is woefully
inadequate or worse.7 For example in the Concise Oxford Dictionary surveillance is defined as ‘close
observation, especially of a suspected person’. Yet today many of the new surveillance technologies are
not ‘especially’ applied to ‘a suspected person’. They are commonly applied categorically. In broadening
the range of subjects the term ‘a suspected person’ takes on a different meaning. In a striking
innovation, surveillance is also applied to contexts (geographical places and spaces, particular time
periods, networks, systems and categories of person), not just to a particular person whose identity is
known beforehand.
The dictionary definition also implies a clear distinction between the object of surveillance and the
person carrying it out and a non-co-operative relationship. In an age of servants listening behind closed
doors, binoculars and telegraph interceptions, that separation made sense. It was easy to distinguish the
watcher from the person watched. Yet self-surveillance, cosurveillance and reciprocal surveillance have
emerged as important themes, often blurring the easy distinction between agent and subject of
surveillance. Well-publicised warnings that surveillance might be present seek to create self-restraint. A
general ethos of self-surveillance is also encouraged by the availability of home products such as those
that test for alcohol level, pregnancy, AIDS and other medical conditions.
Nor does the traditional definition capture contemporary cases of ‘cooperative’ parallel or comonitoring, involving the subject and an external agent in which the former voluntarily sends a remote
message (as with location and some implanted physiological monitoring devices). Individuals may agree
to wear badges and have transmitters for toll roads or as anti-theft means installed on their cars. They
may join programmes that invite police to search their vehicles if driven late at night. Many bio-metric
forms involve some degree of co-operation, or at the least, implicit co-operation by the failure to take
steps to block transmission.
The border between the watched and the watcher may also be blurred in that there can be a continuous
transmission link between sender and receiver as with brain waves or scents. The sender and receiver
are in one sense electronically joined. It may be difficult to say where the subject stops and the agent
begins. As with questions of copyright and electronic media, new issues of the ownership and control of
property appear. Such transmissions are ‘personal’ but leave the person’s body and control. The line
between what is public and private is hazy in such settings.
The term ‘close observation’ also fails to capture contemporary practices. Surveillance may be carried
out from afar, as with satellite images or the remote monitoring of communications and work. Nor need
it be ‘close’ as in detailed – much initial surveillance involves superficial scans looking for patterns of
interest to be pursued later in greater detail. It is both farther away and closer than the conventional
definition implies.
The dated nature of the definition is further illustrated in its seeming restriction to visual means as
implied in ‘observation’. The eyes do contain the vast majority of the body’s sense receptors and the
visual is a master metaphor for the other senses (for example, saying ‘I see’ for understanding or being
able to ‘see through people’). Indeed, ‘seeing through’ is a convenient short-hand for the new
surveillance.
To be sure the visual is usually an element of surveillance, even when it is not the primary means of data
collection (for example, written accounts of observations, events and conversations, or the conversion
to text or images of measurements from heat, sound or movement). Yet to ‘observe’ a text or a printout
is in many ways different from a detective or supervisor directly observing behaviour. The eye as the
major means of direct surveillance is increasingly joined or replaced by hearing, touching and smelling.
The use of multiple senses and sources of data is an important characteristic of much of the new
surveillance.
A better definition of contemporary forms of surveillance is needed. The new forms of surveillance
involve scrutiny through the use of technical means to extract or create personal data, whether from
individuals or contexts. The data sought may or may not be known by the subject, who may be willing or
unwilling to have it discovered or revealed. It may involve revealed information for which verification is
sought.
The use of ‘technical means’ to extract and create the information implies the ability to go beyond what
is offered to the unaided senses or voluntarily reported. Many of the examples involve an automated
process and most extend the senses by using material artefacts or software of some kind, but the means
for rooting out can also be sophisticated forms of deception as with undercover operations, ruses and
pretexts. The use of ‘contexts’ along with ‘individuals’ recognises that much modern surveillance also
looks at settings and patterns of relationships. Systems as well as persons are of interest.
This definition excludes the routine, non-technological surveillance that is a part of everyday life such as
looking before crossing the street or seeking the source of a sudden noise or of smoke. An observer on a
nude beach or police interrogating a co-operative suspect would also be excluded, because in these
cases the information is volunteered and the unaided senses are sufficient.
I use the more neutral and broader verb ‘scrutinise’ rather than ‘observe’ (with its tilt toward the visual)
in the definition because the nature of the means (or the senses involved) suggests sub-types and issues
for analysis that ought not to be foreclosed by a definition. For example how do visual, auditory, text
and other forms of surveillance compare with respect to factors such as intrusiveness or validity? In
addition much surveillance is automated and hence ‘observation’ (if that is what it is by a machine, is of
a different sort).
While the above definition captures some common elements among new surveillance means,
contemporary tactics are enormously varied.8 There is need for a conceptual language that brings some
parsimony and unity to the vast array of old and new surveillance activities and which can permit more
systematic comparisons and explanations. The next section suggests dimensions that can be used to
categorise the means aspect of surveillance.
Surveillance is intentional, systematic, individual focused
Surveillance is intentional, systematic, and focused on individuals
Richards, 13 - Professor of Law, Washington University School of Law (Neil, “THE DANGERS OF
SURVEILLANCE” HARVARD LAW REVIEW [Vol. 126:1934, SSRN)
What, then, is surveillance? Scholars working throughout the English-speaking academy have produced
a thick descriptive literature examining the nature, causes, and implications of the age of surveillance. 6
Working under the umbrella term of “surveillance studies,” these scholars represent both the social
sciences and humanities, with sociologists making many of the most significant contributions.7
Reviewing the vast surveillance studies literature, Professor David Lyon concludes that surveillance is
primarily about power, but it is also about personhood.8 Lyon offers a definition of surveillance as “the
focused, systematic and routine attention to personal details for purposes of influence, management,
protection or direction.”9 Four aspects of this definition are noteworthy, as they expand our
understanding of what surveillance is and what its purposes are. First, it is focused on learning
information about individuals. Second, surveillance is systematic; it is intentional rather than random or
arbitrary. Third, surveillance is routine — a part of the ordinary administrative apparatus that
characterizes modern societies.10 Fourth, surveillance can have a wide variety of purposes — rarely
totalitarian domination, but more typically subtler forms of influence or control.11
Surveillance is data collection
Surveillance is the collection of data for administrative purposes
Allmer, 12 - Lecturer in Social Justice at the University of Edinburgh, Scotland (Thomas, Towards a
Critical Theory of Surveillance in Informational Capitalism, p. 24-25, ebrary)
Anthony Giddens (1985, 172-197; 1995, 169-181) defines surveillance as “symbolic material that can be
stored by an agency or collectivity” and as “the supervision of the activities of subordinates” (Giddens
1995, 169). He primarily sees surveillance as a phenomenon of the nation-state: “Surveillance as the
mobilizing of administrative power – through the storage and control of information – is the primary
means of the concentration of authoritative resources involved in the formation of the nation-state.”
(Giddens 1985, 181) While Foucault’s negative and powerful understanding of surveillance is criticized, a
neutral notion of surveillance is discussed. Surveillance is seen as documentary activities of the state, as
information gathering and processing, as collection, collation and coding of information, and as records,
reports and routine data collection for administrative and bureaucratic purposes of organizations. The
nation-state began to keep these official statistics from its beginning and to “include the centralized
collation of materials registering births, marriages and deaths; statistics pertaining to residence ethnic
background and occupation; and … ‘moral statistics’, relating to suicide, delinquency, divorce and so
on.” (Giddens 1985, 180)
Surveillance is data collection for population management
Allmer, 12 - Lecturer in Social Justice at the University of Edinburgh, Scotland (Thomas, Towards a
Critical Theory of Surveillance in Informational Capitalism, p. 25, ebrary)
Similar to Giddens, Christopher Dandeker (1990) describes surveillance as form of information gathering
and administrative organization of modernity. “The term surveillance is not used in the narrow sense of
‘spying’ on people but, more broadly, to refer to the gathering of information about and the supervision
of subject populations in organizations.” (Dandeker 1990, vii)
Surveillance is purely data collection about individuals or groups
Allmer, 12 - Lecturer in Social Justice at the University of Edinburgh, Scotland (Thomas, Towards a
Critical Theory of Surveillance in Informational Capitalism, p. 26, ebrary)
Computer scientist Roger Clarke (1988, 498-499; 505f.) defines surveillance as “the systematic
investigation or monitoring of the actions or communications of one or more persons. Its primary
purpose is generally to collect information about them, their activities, or their associates. There may be
a secondary intention to deter a whole population from undertaking some kinds of activity.” (Clarke
1988, 499) For Clarke, surveillance and dataveillance are neither negative nor positive as it depends on
the situation. “I explicitly reject the notion that surveillance is, of itself, evil or undesirable; its nature
must be understood, and society must decide the circumstances in which it should be used”. (Clarke,
1988, 498f.) Although many dangers and disadvantages of surveillance in general and dataveillance in
particular are mentioned, benefits like physical security of people and financial opportunities in both
public (social welfare and tax) and private (insurance and finance) sector are listed as well.
Surveillance doesn’t require control
Allmer, 12 - Lecturer in Social Justice at the University of Edinburgh, Scotland (Thomas, Towards a
Critical Theory of Surveillance in Informational Capitalism, p. 26, ebrary)
Based on Baudrillard, William Bogard (1996, 1ff.) focuses on the simulation of hypersurveillant control in
telematic societies. He defines bureaucratic surveillance as “information gathering and storage systems
(accounting, recording, and filing mechanisms) and the various devices for encoding and decoding that
information (impersonal, standardized rules governing its access, use, and dissemination).” (Bogard
1996, 1f.) He argues that surveillance ranges between absolute control in disciplined societies and the
absence of control in non-disciplined societies. Bogard (2006, 97-101) understands surveillance as
decentralized networks, where monopolized power and control of information become more
impossible. Surveillance is both a mode of oppressed capture and a mode of lines flight of “escape,
deterritorialization, indetermination and resistance” (Bogard 2006, 101).
Surveillance is the administration and control of information – includes birth, marriage
and death certificates
Odoemelam, 15 - Chika Ebere Odoemelam is with University of Western Ontario, London,
Ontario, Canada (“Adapting to Surveillance and Privacy Issues in the Era of
Technological and Social Networking” International Journal of Social Science and Humanity, Vol. 5, No. 6,
June 2015, http://www.ijssh.org/papers/520-H140.pdf)
Anthony Giddens (1984) [8], provided a definition of surveillance based on administration, explaining
that “surveillance as the mobilising of administrative power-through the storage of and control of
information-is the primary means of the concentration of authoritative resources involved in the
formation of nation-state”. Through the above definition, Giddens explains that the modern state uses
surveillance and information gathering mechanisms such as those related to births, marriages, deaths
and other demographic figures, as a means of exerting its authority, power and influence on the society
as the only instrument of enforcing control on its citizens. As a result, surveillance has become a
universal phenomenon that exists in every sphere of all human endeavours.
Includes retrospective surveillance
Surveillance includes retrospective surveillance
Gibson, 14 – UK barrister (Bryan, Criminal Justice : A Beginner’s Guide, p. 71, ebrary)
In its expanded meaning, the term surveillance is now regularly applied to forms of retrospective
surveillance, as where the records of a bank, supermarket or internet provider are accessed under legal
powers or must be disclosed following a ‘suspicious activity report’ (SAR). In modern times extensive
duties have been placed on banks, lawyers, accountants and others with access to the monetary
dealings of others to make SARs, particularly concerning potential money laundering, which has
significant connections to organized crime, illegal drugs, the sex industry, tax evasion and trafficking of
all kinds.
Includes political surveillance
Political surveillance is government recording of groups engaged in First Amendment
expression
Fisher, 4 - Associate Professor of Law and Director, Center for Social Justice, Seton Hall Law School
(Linda, “GUILT BY EXPRESSIVE ASSOCIATION: POLITICAL PROFILING, SURVEILLANCE AND THE PRIVACY
OF GROUPS” ARIZONA LAW REVIEW [Vol. 46:621)
This Section examines the governmental and associational interests implicated in surveillance of First
Amendment activity, employing the Supreme Court’s decisions on associational rights beginning with
NAACP and culminating with Dale. Although surveillance issues are generally analyzed solely under the
Fourth Amendment, political surveillance should be analyzed primarily under the stricter standards of
the First Amendment because it is directed at political and religious speech. At the point of convergence
of the First and Fourth Amendments, the reasonableness restrictions of the latter inform analysis, but
the compelling state interest standard of the First Amendment should govern; otherwise, expressive
activity is not adequately and consistently protected.152 To be consistent, First Amendment standards
should govern across the board, regardless of whether a search or seizure might occur.
Moreover, the Fourth Amendment does not cover much of the investigative activity involved in political
surveillance, either because no potential search or seizure is involved, or because individuals in a group
setting do not have the requisite “reasonable expectation of privacy.”153 Even so, the First Amendment
protects these individuals and groups from unjustified investigations that intrude upon their lawful
expressive activity.154
Political surveillance is defined as an array of techniques employed by government agents to investigate
and record the political and religious beliefs and activities of those engaged in First Amendment
expression, ranging from infiltrating and disrupting organizational leadership to observing and recording
public events.155 Note that the definition does not include terrorism investigations that are not based
on First Amendment expression.
Includes library records
The Patriot Act provision allowing monitoring of library records is ‘domestic
surveillance’
Small, 8 - United States Air Force Academy (Matthew, “His Eyes are Watching You: Domestic
Surveillance, Civil Liberties and Executive Power during Times of National Crisis”
http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf
The USA Patriot Act provided much of the latitude under which President Bush operated. Section 203 of
the act allowed the government to intercept oral, wire and electronic communications related to
terrorism. The act failed to detail what exactly “communications related to terrorism” are, giving the
executive a large umbrella of protection. Section 212 amends section 2702 of Title 18-Crimes and
Criminal Procedure allowing government entities to require communications companies to release
customer information. This section superseded Title II of the ECPA. The Act also expanded the scope of
the FBI’s domestic surveillance by allowing the Bureau to monitor library checkout lists and internet use.
More importantly, the American public favored the act.15 Even today support still remains for the act.16
As such, the president did not act outside the public mandate but merely did what he saw fit to ensure
national security.
Includes physical searches
Surveillance includes physical searches
Byrd, 6 – U.S. Senator (S.2362, Senate bill introduced to establish the National Commission on
Surveillance Activities and the Rights of Americans, 3/2, gpo.gov)
(6) the term ‘‘surveillance’’ means any electronic surveillance, physical search, use of a pen register or
trap and trace device, order for the production of any tangible item, or surveillance activity for which a
Federal or State government agent is required to obtain a warrant, before or after engaging in the
activity; and
(7) the term ‘‘warrantless surveillance program’’ means a program of warrantless surveillance
conducted inside the United States by any Federal or State agency.
Includes prisons / detention centers
Includes prisons or detention centers
Torpey, 7 - CUNY Graduate Center (John, “Through Thick and Thin: Surveillance after 9/11”
Contemporary Sociology, volume 36, n 2,
https://www.academia.edu/2796689/A_Symposium_on_Surveillance_Studies
What is “surveillance”? The term evokes suspicion and opprobrium because it suggests a violation of our
autonomy, our freedom to move about and to do as we wish, and this indeed it does—in the putative
interests of public order, commercial transparency, and personal security. Students of surveillance often
make a distinction between visible and invisible forms—the possibility that my keystrokes are being
recorded as I write this, for example, as opposed to the readily identifiable security cameras that have
become increasingly ubiquitous features of everyday life, at least in the richer parts of the world.
One might, however, make a further distinction between “thin” and “thick” forms of surveillance. Thin
surveillance monitors our movements, our business transactions, and our interactions with government,
but generally without constraining our mobility per se. Thick surveillance, on the other hand, involves
confinement to delineated and often fortified spaces, in which observation is enhanced by a limitation
of the range of mobility of those observed. There tend to be significant differences in the social groups
supervised by the two forms of surveillance. Although today everyone is subjected to thin surveillance
to some degree, it disproportionately affects the non-poor, whose actions and transactions must be
facilitated as well as regulated. Access to certain spaces may be limited by thin means that require the
wherewithal or the proper identity, to be sure, but departure from those spaces is normally voluntary
and at the pleasure of the person in question.
In contrast, thick surveillance disproportionately affects the poor, because it is they who are
disproportionately institutionalized; the element of free movement characteristic of thin surveillance is
sharply reduced, if not eliminated altogether. Thick surveillance occurs in prisons, military brigs, POW
and refugee camps, and similar environments. Probation, parole, surveillance via electronic tracking
devices, children’s welfare agencies, boarding schools and the like comprise thin variants of thick
surveillance. They do not necessarily restrict movement, but they may do so, and in any case they
involve a more evident narrowing of freedom than thin surveillance does. While those subjected to thick
surveillance are also subject to the thin variety, they are less likely to be exposed to thin surveillance
than the non-poor because their means—and hence their actions and transactions— tend to be more
limited. In short, supervision and confinement by the state tend to be much more immediate realities
for these groups than they are for the non-poor, whose actions and transactions tend more routinely to
be outside the purview of the state—but under that of commercial surveillance schemes.
Includes disease surveillance
US code includes disease surveillance as surveillance
Murray, 9 – J.D. Candidate, Georgetown University Law Center (Craig, “Implementing the New
International Health Regulations: The Role of the WTO's Sanitary and Phytosanitary Agreement”
Georgetown Journal of International Law, questia)
Another U.S. sanitary measure partly based on the need for surveillance is APHIS's list of requirements
for "approval to export ... [an] animal" to the United States. (206) Requestors must provide a great deal
of information about their country, including the "infrastructure of the veterinary services," (207) the
disease status of the region, (208) its laboratory capability, (209) and the "type and extent of disease
surveillance in the region," including whether the region has an active or passive surveillance system.
(210) Title 9 of the Code of Federal Regulations defines "surveillance" as "[s]ystems to find, monitor, and
confirm the existence or absence of a restricted disease agent or agents in livestock, poultry and other
animals." (211) a An "active" surveillance system relies on systemic affirmative collection and testing of
samples. (212) "Passive" surveillance consists of mandatory reporting of public health events, but the
regulatory agency does not actively "seek out and monitor a restricted disease agent." (213) This APHIS
regulation is a sanitary measure, within the meaning of the SPS Agreement, since it is meant to protect
the health of humans and animals in the U.S. from animal-based diseases. Evidently, the exporting
country's surveillance and regulatory infrastructure are significant to APHIS's determination of whether
or not to allow importation of food from that country.
Disease detection and response are both ‘surveillance’
Leahy, 2k – US Senator (16344 CONGRESSIONAL RECORD—SENATE July 26, 2000, gpo.gov)
By way of background, the term ‘‘surveillance’’ covers four types of activities: detecting and reporting
diseases; analyzing and confirming reports; responding to epidemics; and reassessing longer-term
policies and programs. I will touch on these categories in a bit more detail, as they illustrate the need for
reform.
In the detection and reporting phase, local health care providers diagnose diseases and then report the
existence of pre-determined ‘‘notifiable’’ diseases to national or regional authorities. The accurate
diagnosis of patients is obviously crucial, but it can be very difficult as many diseases share symptoms. It
is even more difficult in developing countries, where public health professionals have less access to the
newest information on diseases.
In the next stage of surveillance, disease patterns are analyzed and reported diseases are confirmed.
This process occurs at a regional or national level, and usually involves lab work to confirm a doctor’s
diagnosis. From the resulting data, a response plan is devised. Officials must determine a number of
other factors as well, such as the capability of a doctor to make an accurate diagnosis. Unfortunately, in
many developing countries this process can take weeks, while the disease continues to spread.
When an epidemic is identified, various organizations must determine how to contain the disease, how
to treat the infected persons, and how to inform the public about the problem without causing panic.
Forty-nine percent of internationally significant epidemics occur in complex emergency situations, such
as overcrowded refugee camps. Challenges in responding to epidemics are mainly logistical—getting the
necessary treatment to those in need.
Finally, in assessing the longer-term health policies and programs, surveillance teams can provide
information on disease patterns, health care priorities, and the allocation of resources. However,
information from developing countries is often unreliable.
Disease surveillance applies to individuals
Federal Register, 12 (Federal Register /Vol. 77, No. 247 /Wednesday, December 26, 2012 / Proposed
Rules, gpo.gov)
Surveillance. Under this NPRM, HHS/ CDC is proposing to define ‘‘surveillance’’ as the temporary
supervision by a public health official (or designee) of an individual or group, who may have been
exposed to a quarantinable communicable disease, to determine the risk of disease spread. We are
proposing to update the term ‘‘surveillance’’ to more accurately reflect current practice and to clarify
that, just as with quarantine and isolation, this public health measure is applicable to individuals and
groups of individuals.
Includes health surveillance
Domestic surveillance includes public health surveillance
Brennan, 2 - American Medical Informatics Association (Patricia,“AMIA Recommendations for National
Health Threat Surveillance and Response” Journal of the American Medical Informatics Association, 3/1,
DOI: http://dx.doi.org.proxy.lib.umich.edu/10.1136/jamia.2002.0090204 204-206
Throughout this news report the term surveillance is defined as “the ongoing systematic collection,
analysis, and interpretation of outcome-specific data for use in the planning, implementation and
evaluation of public health practice.”1
Members of the AMIA National Health Threats Task Force have attended many important meetings over
the past few months with key government, state, and local officials to discuss the needs of the U.S.
Health care system, especially in the development and implementation of stronger information
technology solutions. AMIA representatives at these meetings included J. Marc Overhage, MD, PhD; W.
Edward Hammond, PhD; Michael Wagner, MD, PhD; Luis G. Kun, PhD; William A. Yasnoff, MD, PhD;
AMIA Executive Director, Dennis Reynolds; and others.
The Task Force has assisted AMIA in the development of bioterrorism information resources for the
AMIA Web site. These resources include:
▪ Daily updates to articles in the news related to current activity in the areas of information technology
implementation, bioterrorism, and governmental policy discussion and implementation
▪ Links to pertinent government, state, local, association/society, and other sites that provide the latest
information
▪ Posting of scientific articles and recent reports related to information technology in bioterrorism
defense
▪ Congressional activity and testimony
The Primary Care Informatics Working Group of AMIA addressed information technology requirements
for effective primary care surveillance and rapid response throughout the United States. In special
sessions held at the AMIA 2001 Annual Symposium, presentations were made on bioterrorism and the
requirements for primary care physicians in the United States to provide essential surveillance. The
following key points were derived from the presentations:
▪ Primary care providers are the U.S. “frontline forces” for bioterrorism surveillance, detection, and
immediate care.
▪ Hospitals and emergency departments in the United States are often filled to capacity under normal
traffic and do not have the current ability to assume the task of evaluating, in the general population,
flu-like syndromes for anthrax exposure or other conditions that may first present as abnormal
epidemics of common symptoms.
▪ Effective bioterrorism surveillance is a complex task to which there are multiple approaches, including
mechanistic, laboratory, and sentinel surveillance.
▪ Voluntary reporting of surveillance data is problematic, especially if a condition does not appear or if
the reporting process involves significant time and resources outside the normal practices of a physician.
Based on the key points, the following recommendations were made by members of the PCIWG:
Every primary care physician in the United States should be provided now with information on
bioterrorism surveillance and detection using our current resources, especially in anticipation of the flu
season, both to provide appropriate care and to avoid enormous unnecessary panic and health care
expense.
Every primary care physician in the United States should have and use a fully functional electronic
medical record (EMR) with standardized clinical data for current and future domestic surveillance
against biological, chemical, and nuclear weapons on civilian populations.
▪ The EMRs must “fit” the primary care environment to be effective
▪ The data obtained must be available for epidemiologic surveillance regionally and nationally while
protecting patient confidentiality.
▪ Relevant expert knowledge and decision support at the point of care must be linked to the EMR.
▪ Development of such EMRs requires a national commitment to defining standards to which industry
can respond.
▪ Primary care acquisition and implementation of such EMRs requires funding mechanisms.
The Primary Care Informatics Working Group offers its expertise to work with all health care
organizations, public health officials, the Department of Defense, other agencies, vendors, payers, and
the public (patients) to assist in the development of a comprehensive and integrated plan.
The collection and dissemination of health data is surveillance
Pascrell, 14 – US Congressional Representative (H. R. 4251, House bill introduced to direct the Secretary
of Health and Human Services, acting through the Director of the Centers for Disease Control and
Prevention, to establish a surveillance system regarding traumatic brain injury, and for other purposes,
gpo.gov)
(5) SURVEILLANCE.—The term ‘‘surveillance’’ means the ongoing, systematic collection, analysis,
interpretation, and dissemination of data (other than personally identifiable information) regarding a
health-related event for use in public health action to reduce morbidity and mortality and to improve
health.
Surveillance is the collection and analysis of public health data
GAO, 2k – US General Accounting Office (“WEST NILE VIRUS OUTBREAK Lessons for Public Health
Preparedness GAO/HEHS-“ September, gpo.gov
Rapid and accurate diagnosis of disease outbreaks is essential for many reasons. It can help contain an
outbreak quickly by allowing health officials to implement appropriate control or prevention measures
and provide the most effective treatment for those who are affected. Rapid and accurate diagnosis is
essential not only for the public at large, but also for health care workers and others who work with
patients and laboratory samples. Accurate diagnosis is also important in providing information that
could help determine whether the outbreak could have been deliberate—an act of bioterrorism. Public
health officials use the term “surveillance” to denote the ongoing effort to collect, analyze, and interpret
health-related data so that public health actions can be planned, implemented, and evaluated.
Includes quarantines
Rothstein, 8 – University of Maryland (William, The American Historical Review, Vol. 113, No. 4 (October
2008), Book review of Searching Eyes: Privacy, the State, and Disease Surveillance in America, JSTOR
Surveillance is defined as “the ongoing, name-based reporting of cases of disease to state and local
health departments” (p. xvii). The uses of surveillance include investigation and tracking of cases of
disease, contact tracing, quarantine, treatment, program development and evaluation, epidemiological
studies of disease patterns, and sanitary inspections. Each use has raised privacy concerns.
--health surveillance distinct from monitoring
Surveillance is continuous---that’s distinct from monitoring
Hiremath 11 – MD, Dentistry
(SS, “Textbook of Preventive and Community Dentistry,” p. 18)
Monitoring is "the performance and analysis of routine measurements aimed at detecting changes in
the environment or health status of population" such as monitoring air pollution, water quality; growth
and nutritional status, etc. Surveillance is defined as "continuous scrutiny of the factors that determine
the occurrence and distribution of disease and other conditions of ill-health", such as epidemiological
surveillance, demographic surveillance, nutritional surveillance, etc. Surveillance provides information
about new and changing trends in the health status of a population, feedback which may be expected to
modify the policy and the system itself and lead to redefinition of objectives, and timely warning of
public health disasters so that interventions can be mobilized.
‘Ongoing’
Mohr 98 – MD, Professor of Medicine, Biometry and Epidemiology and Director of the Environmental
Biosciences Program
(Lawrence, “Biomarkers: Medical and Workplace Applications,” p. 389)
[this is the beginning of the google view]
vcillance" exams, the exam is also a medical "screening" exam. The distinction is more than semantics.
Surveillance is defined by Last (1983) as:
"... ongoing scrutiny, generally using methods distinguished by their practicability, uniformity, and
frequently their rapidity, rather than by complete accuracy. Its main purpose is to detect changes in
trend or distribution in order to initiate investigative- or control measures."
Must be continuous---anything else dilutes the core meaning of the term
John 13 – PhD, MBBS
(T Jacob, “Textbook of Pediatric Infectious Diseases,” p. 12)
True public health surveillance has two characteristics— continuity in time and coverage in space. If
there are gaps, infectious agents may cause sporadic cases or even outbreaks undetected by the
designated stair. Collection of data on the incidence or prevalence of non-infectious diseases is through
other methods—such as case registries, surveys of population samples, cumulating hospital statistics,
etc. However, many use the term surveillance, inexactly, for other forms of data collection on health
conditions, risk factors, etc. or for discontinuous collection of data on infectious diseases. In other
words, the term surveillance is often loosely used for various methods of collection of data, diluting its
definitional meaning. Therefore, it will be difficult now to restrict its usage strictly according to
definition. In each context it is necessary to redefine surveillance or at least understand that the term is
not used according to the precise definition.
--not health research
It’s distinct from research
Chamberland 1 – MD, MPH
(Mary, “Blood Safety and Surveillance,” p. 424)
Surveillance is defined as "the ongoing systematic collection, analysis, and interpretation of health data,
closely integrated with the timely dissemination of these data both to those providing the data and to
those who can apply the data to control and prevention programs" (4). While surveillance is distinct
from epidemiological research, the two are often complementary (5). Epidemiological research studies
usually start with a specific hypothesis to be tested, are conducted in a well-defined population, and are
often time-limited; in addition, the data are complete. In contrast, surveillance data are often used to
identify or describe a problem, identify cases for epidemiological research, monitor temporal trends, or
estimate the magnitude of a problem. Surveillance usually encompasses many more individuals than
might be enrolled in a research studs. As a consequence, data collected by surveillance, which can either
be active or passive, are usually less complete, less detailed, and more open-ended than research data.
Importantly, surveillance programs provide an infrastructure or network, such that in the event i I Lin
unusual case report or an acute problem, even if not related to the surveillance program, an established
methodology is in place for communicating information directly to public health authorities.
Includes nutritional surveillance
Surveillance includes collecting data about nutrition
Kelly, 81 – Trinity College, Dublin (A. “A FOOD AND NUTRITIONAL SURVEILLANCE SYSTEM FOR IRELAND”
Journal of the Statistical and Social Inquiry Society of Ireland, Vol. XXIV, Part III, 1980/81, pp. 135-170,
proquest)
Strategies to detect, control and prevent problems of human nutrition require accurate, reliable and upto-date information on a wide range of causal and contributing factors. Hence, an operational definition
of surveillance (proposed by Nichman and Lane, 1977) entails — " . . . the continuous collection,
analysis, dissemination, and utilization of data relating to the nutrition and health status of population
groups, the availability and consumption of food to these groups, and the status of variables which may
have direct or indirect effects on both nutrition status and food consumption". Thus, the specific
objectives of the surveillance system may be summarised in the following three points:—
(i) To identify and characterise those variables which provide information on past, contemporary and
future nutrition conditions:
(ii) To assess the nutritional status of the population, in particular those sectors of it who are identified
as being at risk:
(iii) To provide a basis from which decisions on policy, regarding preventive and promotive aspects of
nutrition, can be made, and possibly to enable inferences about interrelationships between production,
consumption and utilisation to be empirically tested.
Includes occupational health and safety
Surveillance includes occupational hazards and health surveillance
Koh, 3 - D Koh, Head, Dept of Community, Occupational and Family Medicine, Medical Faculty, National
University of Singapore (“Surveillance in occupational health” Occupational and Environmental
Medicine60.9 (Sep 2003): 705-10, 633., proquest)
A definition of surveillance is as follows: "surveillance (ser-va'lens) noun. 1. Close observation of a
person or group, especially one under suspicion. 2. The act of observing or the condition of being
observed" (The American Heritage Dictionary of the English Language, 3rd edition, Houghton Mifflin
Company, 1992).
The term "surveillance" is derived from the French word meaning "to watch over". In public health,
surveillance was originally developed as part of efforts to control infectious diseases, but the principles
of surveillance can potentially be applied to other problems such as chronic diseases (loi example,
cancer and coronary heart disease), social problems (for example, drug addiction), and the threat of
bioterrorism.1
Surveillance is a core activity in the practice of occupational health. Two broad groups of surveillance arc
commonly performed-hazard surveillance and health surveillance. While the focus of the former is
hazards at the workplace, the latter type of surveillance pertains to the health of a person of group of
workers. Both have important roles in occupational health practice and arc complementary.
The focus of this paper will be on chemical and biological exposures and related diseases. In many
countries, occupational health concerns include psychosocial and ergonomic issues in the work
environment and related problems and adverse health outcomes. These issues will not be addressed in
detail in this paper, but surveillance programmes for such concerns have been developed, for instance,
in Nordic countries.
HAZARD SURVEILLANCE
Hazard surveillance has been defined as "the process of assessing the distribution of, and the secular
trends in, use and exposure levels of hazards responsible for disease and injury".2 For this type of
surveillance to be considered, a clear "exposure-health outcome" relation must already have been
established. The surveillance of hazards should result in action to reduce exposure in work- places
where indicated. This will eventually reduce the disease burden arising from hazardous exposures.
Hazard surveillance can be incorporated into part of an existing national or regional system used for
other purposes, for example, registries of usage of toxic substances or discharges of hazardous
materials, or information collected by regulatory agencies to check for compliance. One example of this
is the carcinogen registry in Finland.3 Regulatory authorities in many other countries have registries of
factories or work processes.4 Another approach is to have exposure surveys or inspections. In some
countries such as the USA, periodic national occupational exposure surveys arc conducted.1 This is often
based on a representative sample of defined workplaces or processes. Another method of hazard
surveillance is the recording of hazardous occurrences in specific occupational groups, such as
needlestick or sharps injuries among health care workers.5 At the individual workplace, computer
software packages containing exposure databases, can be used to assist in hazard surveillance.
There are several advantages and benefits of hazard surveillance. Firstly, the surveillance of hazards
eliminates the need to wait for disease to occur before taking steps for prevention. This is a
considerable advantage, as many occupational illnesses take time to develop.
Secondly, the activity of identifying single hazards is generally easier than the detection of disease.
Diseases, which have long latent periods, may also have multifactorial aetiologies-thus diagnosis can be
complex. The focus on hazards ensures a direct attention to preventable causes of the disease.
However, while monitoring of individual hazards is easier to implement, integrated exposure databases
and surveillance systems for combined exposures potentially offer a greater promise for improving
health and safety at work.6 As not every exposure results in disease, hazardous situations would be
expected to have a higher frequency of occurrence. This allows an opportunity to monitor trends or
observe emerging patterns in exposure to workplace hazards. The information can be used to predict or
project future disease burdens where prevention is not adequate.
Confidentiality of health information may pose a threat to public health surveillance.7 But unlike health
surveillance, in hazard surveillance confidentiality of records that infringe on individual privacy is not an
issue. However, there could be a practical difficulty with hazard surveillance in dealing with
confidentiality of trade secrets and propriety information on the amount and composition of chemicals
used in different industrial processes.
HEALTH SURVEILLANCE
Health surveillance can either take the form of periodic clinical and/or physiological assessment of
individual workers, or the public health review of the health status of groups of workers. For the
individual, the rationale is to detect adverse health effects resulting from occupational exposures at as
early a stage as possible, so that appropriate preventive measures can be instituted promptly. This is a
form of secondary prevention. The findings from health surveillance can be used to indicate the absence
of a significant hazard, the adequacy of control measures, individuals at increased risk, baseline medical
data, benchmarks for preventive action, and opportunities to provide health education. Another
function is to quantify the incidence and prevalence of occupational and work related disease.
The criteria for health surveillance are:
(1) If it is not possible in practice to further reduce exposure to a known hazard-for example, in
situations where the presence of the hazard is essential or inherent to the work process, and no other
feasible alternatives are available. There may be an ethical dilemma involved in considering what
constitutes an essential part of an industrial process versus the extent of acceptable risk to those who
have to be exposed in the course of their work.
(2) If the relation between the extent of exposure required to produce a health effect is not well
defined, as in exposure to sensitiscrs and carcinogens. For sensitisers, a level of exposure may be
required to sensitise an individual, but the triggering dose necessary to elicit an effect in those already
sensitised may be very small and much lower than the sensitising dose. For carcinogens, it is uncertain
what long term effects may ensue at the cellular level from exposure to small amounts of a known
carcinogen. The body's defence mechanisms may be able to eliminate cellular effects from exposure to
low doses of carcinogens, but the dose which results in a change that initiates the carcinogenic process
irreversibly is often not well determined.
Includes monitoring employees
Surveillance is a way to monitor and control employees
Odoemelam, 15 - Chika Ebere Odoemelam is with University of Western Ontario, London,
Ontario, Canada (“Adapting to Surveillance and Privacy Issues in the Era of
Technological and Social Networking” International Journal of Social Science and Humanity, Vol. 5, No. 6,
June 2015, http://www.ijssh.org/papers/520-H140.pdf)
Also surveillance according to Ogura Toshimaru (2006) [9], “surveillance refers to an activity which
enables the nation state, or capitalist formations like corporations, to manage a population”. The above
definition entails a way of monitoring employee performance by employers of labour for their own
selfish purposes and maximum benefit. It is a form of control imposed by the owners of the means of
production as a way of further enslaving their employees for their own benefit and profit.
Includes places
Surveillance of territory is still surveillance of people
Keiber, 14 – PhD dissertation for the Graduate Program in Political Science at Ohio State (Jason, “The
Surveillance of Individuals in International Politics”
https://etd.ohiolink.edu/!etd.send_file?accession=osu1397573412&disposition=inline
Under the understanding that “[s]urveillance directs its attention in the end to individuals”67 there is a
lacuna in the Surveillance Studies literature that an IR focus helps bring to light. Because Surveillance
Studies is primarily interested in domestic activity it takes one important thing for granted—territory. A
domestic bias in the literature treats the state’s access to people as a fait accompli. There are however
cases in which the state cannot penetrate its own territory (or, in the international context, the territory
of other states) effectively enough to closely monitor individuals. That is, sometimes the state is not
present enough to even know where individuals are to monitor them. As a result states may monitor
territory as a means by which to understand people. U.S. aerial surveillance along the Mexican border is
an example of this. The surveillance of territory is still surveillance that “directs its attention in the end
to individuals.”
Surveillance includes land and virtual spaces
Keiber, 14 – PhD dissertation for the Graduate Program in Political Science at Ohio State (Jason, “The
Surveillance of Individuals in International Politics”
https://etd.ohiolink.edu/!etd.send_file?accession=osu1397573412&disposition=inline
The discussion of territory can be generalized in a useful way. IR’s sensitivity to states’ desire for security
and certainty suggests that the state should focus on any domain in which individuals may be conspiring
to harm the state. Surveillance can be applied to any environment in which individuals operate. This
includes land and virtual spaces. Scholars of Surveillance Studies would not object to this. I am merely
highlighting a point that doesn’t get emphasized in the literature. This leads me to the following
definition of ‘surveillance’:
State-led surveillance involves the collection, analysis and storage of information about people, their
activity, and their environments for the purposes of influence and intervention.
Persons places and things
IJ 98
(Info Justice, OPERATIONS, SURVEILLANCE AND STAKEOUT PART 1,
http://www.infojustice.com/samples/12%20Operations,%20Surveillance%20And%20Stakeout%20Part%
201.html)
Surveillance is defined as the systematic observation of persons, places, or things to obtain information.
Surveillance is carried out without the knowledge of those under surveillance and is concerned primarily
with people. Surveillance is further divided into mobile or stationary. Mobile surveillance can be either
by foot or from a moving vehicle. A stationary surveillance is often called a “stakeout”. Foot
surveillance, vehicular surveillance and stationary surveillance all have the same objective. That is to
obtain the necessary objective, which may differ in each type of surveillance. For example information,
a person, a place or piece of land, or a thing such as a plane, a building, nuclear or chemical weapons
held by a felon who would destroy the world.
Includes National ID
Real ID
Milberg 12 – JD Candidate
(Debra, “The National Identification Debate: “REAL ID” and Voter Identification,” I/S: A JOURNAL OF
LAW AND POLICY FOR THE INFORMATION SOCIETY)
A. LACK OF REAL BENEFITS TO NATIONAL SECURITY
Advocates of a more open immigration system are especially concerned about REAL ID. The focus of
many immigration advocacy groups is to build support for public policies that are fair and supportive to
immigrants and refugees entering the United States.29 These groups feel that the Act will prevent
people fleeing persecution from obtaining relief, deny immigrants their day in court when the
government makes a mistake, and actually undermine American security more than it would help.30
In response to the argument that REAL ID is necessary for national security, immigration and privacy
proponents claim that it will actually hinder the American security process.31 By setting federal
eligibility requirements for driver licenses, REAL ID will undermine national security by pushing
immigrants deeper into the shadows and forcing many to drive without licenses. Thus, this bill limits,
rather than expands, government data about individuals in this country.
Many privacy advocates also argue that REAL ID does little to improve national security. Privacy
proponent Jim Harper argues that a national ID represents a transfer of power from individuals to
institutions, and that such a transfer threatens liberty, enables identity fraud, and subjects people to
unwanted surveillance.32 Instead of a uniform, government-controlled identification system, Harper
calls for a competitive, responsive identification and credentialing industry that meets the mix of
consumer demands for privacy, security, anonymity, and accountability.33 Identification should be a
risk-reducing strategy in a social system, Harper concludes, not a rivet to pin humans to governmental or
economic machinery.34
National ID
Tucker and Wang 14 – *PhD, Professor of Computer Science, **PhD, Professor @ U Portsmouth
(Victoria and John, “On the Role of Identity in Surveillance,” http://arxiv.org/pdf/1408.3438.pdf)
Besides these technologies deliberately created for surveillance purposes, surveillance is often
intentionally included in various everyday technologies, such as couriers who deliver packages,
inspectors who collect data and operators in call centres. Individuals who work with ICT systems have
long been aware that the systems that they use in their work are also intended to be a source of data
about their performance – complete recordings of the transactions are made.
In social media sites, such as Facebook, Twitter, Instagram and YouTube, various forms of technologies
are used to gather personal data. For example, geotagging is one of the latest forms of tagging that
allows real-time surveillance. Often, geotagging is used in (i) searching social media postings on sites by
location and finding individuals; and then (ii) exploring their profiles to find out their private information
(e.g., home address and phone number) (Smyser and Holt, 2012). In the Android world, an app called
eBlaster Mobile can be used to watch over phone usage of children or employees by (i) monitoring text
messaging, voice, and Web surfing activity on the Android device; and (ii) logging the physical location of
the smartphone (Bradley, 2011).
In more extreme cases, social rules and norms can be approximated by algorithmic formulae to search
for deviance automatically, and even render deviance from the roles and norms impossible. For
example, various cybercommunities are places where ‘dataveillance’ (van der Ploeg, 2003: 71) is
endemic – every word typed and every movement made can be observed, recorded, stored in digital
files, and replayed and examined in the future. Actually, in theory, it is perfectly possible to turn the
world of the Internet into a digital panopticon, where surveillance can reach perfection, at least in
principle (Wang et al., 2011).
Identity is a core part of existing and developing surveillance practices. The Identity Card Act 2006 is a
very good example. The core of this act is the National Identity Register (NIR) of which identity cards are
a physical manifestation. The Act’s definition of ‘identity’ refers to ‘full name, other names by which an
individual might previously have been known, gender, date and place of birth and external
characteristics of his that are capable of being used for identifying him’ (UK Government, 2006: 2). It
introduces a major restructuring of the way identification functions in the UK – identity becomes
associated with a singular centralised authoritative documentary source.
Download