Jo Oh Constitution Neg

advertisement
I negate. Resolved: The United States ought to prioritize the pursuit of national
security objectives above the digital privacy of its citizens.
The 4th Amendment: “The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated.”
Observation 1: Aff has an inherent burden to advocate national security objectives.
Therefore, Aff must prove whatever he defends as national security objective truly is
U.S. national security objective with a legitimate government claim or reliable
definition.
Observation 2: To negate means to prove something wrong. Therefore, if I disprove
Aff, I am negating.
if Aff just defends national security, he A) is not only being untopical, but also B) being unfair because the only way the neg can
prepare for this debate is based on the resolution.
(Read only when my opponent has terrorist impacts) There is a clear distinction between the national security and the pursuit
of the national security objectives; unless my opponent proves that ______ is one of the main objectives of the U.S. national
security with a legitimate government claim, my opponent’s entire case falls since he is being untopical. Therefore, the Aff
must defend the pursuit of national security objectives, not simply the national security.
Observation 3: The Aff must defend NSA because a) it is the most recent and realworld example of the United States upholding national security over digital privacy
and b) discussing about NSA is key to education since it is what the topic literature
is mostly about.
My value is morality since the word “ought” implies moral obligation
There are 3 justifications
1. Although this topic does talk about national security and digital privacy, we first have to look
to morality since the resolution asks a question of moral obligation through the use of word
“ought,” therefore explaining why we need to pursue those values. Therefore, morality is an
apriority to any other values under this resolution.
2. It precludes any value that is desirable since morality always comes into the discussion
when determining an action is good or bad. Thus, achieving morality means achieving good,
which is an ultimate goal for both the society and individuals.
3. The reason we act depends on the internal moral values we have; we can never make an
action without being dependent on our moral internals. It is the only weighing mechanism
that explains why we exist.
There are 2 justifications:
First, legal force provides reciprocal and binding motivation for respecting abstract
moral rules. Jürgen Habermas1:
An autonomous morality
provides only fallibilistic procedures for the justification of norms and
actions. The high degree of cognitive [where] uncertainty is heightened by the contingencies connected
with the context-sensitive application of highly abstract rules [applied] to complex situations
that are to be described as appropriately and completely, in all relevant aspects, as possible.36 Furthermore, there is a
motivational weakness corresponding to this cognitive one. Every post-traditional morality demands a distantiation from the
1
Jürgen Habermas, Law and Morality, The Tanner Lectures on Human Values, October 1, 1986. SM
unproblematical background of established and taken-for- granted forms of life. Moral judgments, decoupled from concrete
ethical life (Sittlichkeit), no longer immediately carry the motivational power that converts judgments into actions. The more
that morality is internalized and made autonomous, the more it retreats into the private sphere. In all spheres of action where
conflicts and pressures for regulation call for unambiguous, timely, and binding decisions, legal
norms must absorb
the contingencies that would emerge if matters were left to strictly moral
guidance. The complementing of morality by coercive law can itself be morally justified. In this connection K. O. Apel
speaks of the problem of the warranted expectation of an exacting universalistic morality. 37 That is, even morally
well-justified norms may be warrantedly expected only of those who can expect
that all others will also behave in the same way. For only under the condition of a general
observance of norms do reasons that can be adduced for their justification count. Now, if a practically effective bindingness
cannot be generally expected from moral insights, [Therefore,]
adherence to corresponding norms is
reasonable, from the perspective of an ethic of responsibility, only if they are enforced, that is, if they
acquire [by] legally binding force. Important characteristics of positive law become intelligible if we conceive of
[the] law from this angle of compensate[es]ing for the weaknesses of an autonomous
morality. [because] L[l]egal norms borrow their binding force from the
government’s potential for sanctions. They apply to what Kant calls the external aspect of action, not to
motives and convictions, which cannot be controlled. Moreover, the professional administration of written, public, and
systematically elaborated law relieves legal subjects of the effort that is demanded from moral persons when they have to
resolve their conflicts on their own. And finally, positive law owes its conventional features to the fact that it can be enacted
and altered at will by the decisions of a political legislature. This dependence on politics also explains the instrumental aspect
of law. Whereas moral norms are always ends in them- selves, legal norms are also means for realizing political goals. That is,
they serve not only the impartial settlement of conflicts of action but also the realization of political programs. Collective goalattainment and the implementation of policies owe their binding force to the form of law. In this respect, law stands between
politics and morality. This is why, as Dworkin has shown, in judicial discourse, arguments about the application and
interpretation of law are intrinsically connected with policy arguments as well as with moral arguments.
Legal force is the foundation of the government’s power and the guideline for how it
functions; it grants government power to give sanctions and maintain peace. Strong
government power is crucial in achieving morality because the social norms society
defines as moral cannot be enforced without it; an anarchy will simply be the
outcome. If morality were inconsistent with constitutional obligation, it would
require the nation to literally act against itself.
I contend that taking away U.S. citizens’ digital privacy in pursuit of national security
violates the 4th amendment.
Donohue2 writes:
The National
Security Agency’s recently revealed surveillance programs undermine the purpose of
the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the
Fourth Amendment’s guarantee against unreasonable search and seizure. And
they underscore the dangers of growing executive power. The intelligence community has a
history of overreaching in the name of national security. In the mid-1970s, it came to light that, since the 1940s, the NSA had
been collecting international telegraphic traffic from companies, in the process obtaining millions of Americans’ telegrams that
were unrelated to foreign targets. From 1940 to 1973, the CIA and the FBI engaged in covert mail-opening programs that
violated laws prohibiting the interception or opening of mail. The agencies also conducted warrantless “surreptitious entries,”
breaking into targets’ offices and homes to photocopy or steal business records and personal documents. The Army Security
Agency intercepted domestic radio communications. And the Army’s CONUS program placed more than 100,000 people under
surveillance, including lawmakers and civil rights leaders. After an extensive investigation of the agencies’ actions, Congress
passed the 1978 Foreign Intelligence Surveillance Act (FISA) to limit sweeping collection of intelligence and create rigorous
oversight. But 35 years later, the NSA is using this law and its subsequent amendments as legal grounds to run even more
invasive programs than those that gave rise to the statute. We’ve learned that in April, the Foreign Intelligence Surveillance
Laura K. Donohue, [Professor of Law at Georgetown Law and the Director of Georgetown’s Center on National Security and
the Law] “NSA Surveillance may be legal – but it’s unconstitutional,” The Washington Post, June 21st, 2013. SM
2
Court (FISC) ordered Verizon to provide information on calls made by each subscriber over a three-month period. Over the
past seven years, similar orders have been served continuously on AT&T, Sprint and other telecommunications providers.
Another program, PRISM, disclosed by the Guardian and The Washington Post, allows the NSA and the FBI to obtain online
data including e-mails, photographs, documents and connection logs. The information that can be assembled about any one
person — much less organizations, social networks and entire communities — is staggering: What we do, think and believe.
The government defends the programs’ legality, saying they comply with FISA and its amendments. It [would] may be right,
but only because FISA has ceased to [be] provide a meaningful constraint. Under the traditional FISA, if the government wants
to conduct electronic surveillance, it must make a classified application to a special court, identitying or describing the target.
It must demonstrate probable cause that the target is a foreign power or an agent thereof, and that the facilities to be
monitored will be used by the target. In 2008, Congress added section 702 to the statute, allowing the government to use
electronic surveillance to collect foreign intelligence on non-U.S. persons it reasonably believes are abroad, without a court
order for each target. A U.S. citizen may not intentionally be targeted. To the extent that the FISC sanctioned PRISM, it may be
consistent with the law. But it
is disingenuous to suggest that millions of Americans’ emails, photographs and documents are “incidental” to an investigation
targeting foreigners overseas. The telephony metadata program raises similar concerns. FISA did not
originally envision the government accessing records. Following the 1995 Oklahoma City bombing, Congress allowed
applications for obtaining records from certain kinds of businesses. In 2001, lawmakers further expanded FISA to give the
government access to any business or personal records. Under section 215 of the Patriot Act, the government no longer has to
prove that the target is a foreign power. It need only state that the records are sought as part of an investigation to protect
against terrorism or clandestine intelligence. This means that FISA can now be used to gather records concerning individuals
who are neither the target of any investigation nor an agent of a foreign power. Entire databases — such as telephony
metadata — can be obtained, as long as an authorized investigation exists. Congress didn’t pass Section 215 to allow for the
wholesale collection of information. As Rep. F. James Sensenbrenner Jr. (R-Wis.), who helped draft the statute, wrote in the
Guardian: “Congress intended to allow the intelligence communities to access targeted information for specific investigations.
How can every call that every American makes or receives be relevant to a specific investigation?” As
a
constitutional matter, the Supreme Court has long held that, where an
individual has a reasonable expectation of privacy, search and seizure may
occur only once the government has obtained a warrant, supported by
probable cause and issued by a judge. The warrant must specify the places to be searched and items to
be seized. There are exceptions to the warrant requirement. In 1979 the court held that the use of a pen register to record
numbers dialed from someone’s home was not a search. The court suggested that people who disclose their communications
to others assume the risk that law enforcement may obtain the information. More than three decades later, digitization and the
explosion of social-network technology have changed the calculus. In the ordinary course of life, third parties obtain massive
amounts of information about us that, when analyzed, have much deeper implications for our privacy than before. As for
Section 702 of FISA, the
Supreme Court has held that the Fourth Amendment does not protect foreigners from
searches conducted abroad. But it has never recognized a foreign intelligence exception to
the warrant requirement when foreign-targeted searches result in the
collection of vast stores of citizens’ communications. Americans reasonably expect that their
movements, communications and decisions will not be recorded and analyzed by the government. A majority of the Supreme
Court seems to agree. Last year, the court considered a case involving 28-day GPS surveillance. Justice Samuel Alito suggested
that in most criminal investigations, long-term monitoring “impinges on expectations of privacy.” Justice Sonia Sotomayor
recognized that following a person’s movements “reflects a wealth of detail about her familial, political, professional, religious,
and sexual associations.” [The FISC is supposed to operate as a check. But it is a secret court, notorious for its low rate of denial.
From 1979 to 2002, it did not reject a single application]. Over the past five years, out of nearly 8,600 applications, only two
have been denied. Congress has an opportunity to create more effective checks on executive power. It could withdraw Sections
215 and 702 and introduce new measures to regulate intelligence collection and analysis. There are many options. James
Madison put it best: “In framing a government which is to be administered by men over men, the great difficulty lies in this:
you must first enable the government to control the governed; and in the next place oblige it to control itself.”
Download