2015 NDI 6WS - Neg PICs Core Exports PICs Questions: - PICing out of a specific country – not sure what the net benefit would be? Dangerous tech would be checked by the econ compet. Exemption or the sunset review… Cards talking about what country to not export to = a long list 1NC 1NC Shell - Pakistan Text: The President of the United States should issue an Executive Order curtailing government surveillance of exports from the United States by minimizing export control lists through a sunset principled review process and by establishing an economic competitiveness exemption except in the context of exports to Pakistan Solves the entire aff but maintaining controls on Pakistan is key to prevent illicit militarization Douglas M. Stinnett and Bryan R. Early 11 (Academic Advisor at the Center for Policy Research-University at Albany and Faculty Expert in Economic Sanctions, “Complying by Denying: Explaining Why States Develop Nonproliferation Export Controls”, August 3rd 2011, http://onlinelibrary.wiley.com/doi/10.1111/j.1528-3585.2011.00436.x/full) Weapons of mass destruction programs rely upon a combination of items and technologies that have weapon-specific uses and those that also have legitimate civilian applications, so-called “dual-use” items. For example, triggered spark gaps can be used both as triggering devices to detonate nuclear weapons and as part of medical lithotripters used to break up kidney stones. Legitimate trade in dual-use goods can be quite profitable, making it potentially costly for governments to restrict such trade. Governments therefore tend to impose fewer restrictions on the trade of many dual-use items than they impose on items like munitions and some chemical weapons precursors, which have dedicated security applications.2 In a trend deeply troubling to policymakers and experts in global trade and security, recent selfdisclosures and IAEA investigations reveal how some states acquired dual-use material and technology through legal trade, only to use these items illicitly in the production and dissemination of WMD. The cases of Iraq in the 1990s, Libya, Iran, North Korea, and Pakistan reflect this pattern (Jones 2006). In each case, dense webs of state and nonstate actors, operating on both sides of the law, deceived businesses into contributing technology to WMD programs. The programs depended heavily on imported items that were largely acquired using legitimate commercial channels as cover (Cupitt, Grillot, and Murayama 2001). Yet, in all these cases, the failure of supplier states to control dual-use material proved to be the critical link to illicit proliferation. The importance of dual-use technology is further demonstrated in several recent empirical studies by Kroenig (2009b) and Fuhrmann (2009b), which show that the supply of technology has been a critical determinant of nuclear proliferation. Given the importance of trade in dual-use technology, this study shifts the emphasis from the small number of states that directly engage in proliferation to the larger set of states that are the sources of the necessary dual-use goods and technology. Numerous studies of nuclear proliferation focus on the demand for weapons (Sagan 1996/1997; Singh and Way 2004; Hymans 2006; Jo and Gartzke 2007; Solingen 2007), but very few address the supply of critical technology (Gartzke and Kroenig 2009). Only recently have scholars begun to conduct systematic studies of the supply-side of nuclear proliferation, by explaining the causes of trade in dual-use items (Fuhrmann 2008), transfers of sensitive nuclear technology (Kroenig 2009a), and civilian nuclear cooperation agreements (Fuhrmann 2009a). 1NC Shell – India Text: The President of the United States should issue an Executive Order curtailing government surveillance of exports from the United States by minimizing export control lists through a sunset principled review process and by establishing an economic competitiveness exemption except in the context of exports to India. CP solves the aff but restricting dual use goods towards India is key to check proliferation – Indian proliferation inevitably causes Pakistan to expand its own program intensifying a nuclear arms race Albright et al, 11 (David Albright, Paul Brannan, and Andrea Stricker, “Case Study - Man Charged with Exporting U.S. Goods to Pakistan’s Nuclear Program”, Institute for science and international security, April 14th, http://isis-online.org/isis-reports/detail/man-charged-with-exporting-u.s.-goods-to-pakistansnuclear-program/) In addition, the administration recommended that India be invited to join the Nuclear Suppliers Group (NSG). will need to significantly strengthen its nonproliferation credentials. In May 2009, a senior U.S. State Department official noted during a discussion with NSG members that India needed to strengthen its export controls and nonproliferation measures ahead of becoming a member of the NSG, and that the United States would be hard on India if it did not. If the United States fails to create safeguards against the transfer of dual-use goods imported by civil, space, and defense entities to India’s nuclear weapons program, this policy risks facilitating India’s expansion and improvement of its nuclear weapons arsenal and the means to deliver them. That will inevitably provoke Pakistan into further expanding its own nuclear weapons program, intensifying the ongoing and dangerous nuclear arms race in the South Asia region. This Before it is invited to join the NSG, India announcement unfortunately marks a further reversal of a decades-long policy toward India which prevented sensitive equipment sales to a country with nuclear weapons outside the Nuclear Non-Proliferation Treaty (NPT). It sets a poor precedent for NPT non-nuclear weapon states and those with nuclear weapons outside the NPT, while undermining the central bargain of the NPT. This policy appears to downplay India’s flawed nonproliferation record. The country has leaked sensitive centrifuge design information, illicitly procured goods for its nuclear weapons programs, and not adequately enforced export controls. Increasing India’s access to dual-use technology before the Indian government fixes these problems increases the likelihood that some of this technology could leak out through its poorly implemented controls. 1NC Net Benefits Pakistan – India War Pakistani militarization exacerbates conflicts with India – mutually assured destruction doesn’t check conflict Paul S. Kapur 07 (professor in the Department of National Security Affairs at the Naval Postgraduate School, “Do Nuclear Weapons Stabilize South Asian Militarized Crises? Evidence from the 1990 Case” January 24 th, http://www.tandfonline.com/doi/abs/10.1080/14799850490961099?queryID=%24%7BresultBean.queryID%7D#.VbfT1PlViko) while nuclear weapons have at times had important cautionary effects on Indian and Pakistani decision makers, proliferation has played a role in fomenting a number of the very crises that scholars credit nuclear weapons with defusing. Moreover, it is not clear that nuclear deterrence was essential to preventing some of these crises from escalating to the level of outright war. I illustrate my argument with evidence from the period when India and Pakistan were acquiring nascent nuclear weapons capabilities. I show that during the late 1980s, Pakistan’s emerging nuclear capacity emboldened Pakistani decision makers to provide extensive support to the emerging insurgency against Indian rule in Jammu and Kashmir. In early 1990, India responded with large-scale force deployments along the Line of Control and International Border, in an attempt to stem militant infiltration into Indian territory, and potentially to intimidate Pakistan into abandoning its Kashmir policy. Pakistan countered with large deployments of its own, and the result was a major Indo-Pakistani militarized standoff. Although scholars have credited Pakistani nuclear weapons with deterring India from attacking This article takes a less sanguine view of nuclear weapons’ impact on South Asian militarized crises. It argues that Pakistan during this crisis, the preponderance of available evidence suggests that Indian leaders never seriously considered striking Pakistan, and therefore were not in fact deterred from launching a war in 1990. Thus nuclear weapons played an important role in fomenting a major Indo-Pakistani crisis during this period, but probably were not instrumental in preventing the crisis from escalating to the level of outright war. India and Pakistan war causes extinction Telegraph 13 (citing Ira Helfand and the International physicians for the Prevention of Nuclear War, India-Pakistan nuclear war could 'end human civilisation', 10 December 2013, http://www.telegraph.co.uk/news/worldnews/asia/pakistan/10507342/India-Pakistan-nuclear-warcould-end-human-civilisation.html A nuclear war between India and Pakistan would set off a global famine that could kill two billion people and effectively end human civilization, a study said Tuesday. Even if limited in scope, a conflict with nuclear weapons would wreak havoc in the atmosphere and devastate crop yields, with the effects multiplied as global food markets went into turmoil, the report said. The Nobel Peace Prize-winning International Physicians for the Prevention of Nuclear War and Physicians for Social Responsibility released an initial peer-reviewed study in April 2012 that predicted a nuclear famine could kill more than a billion people. In a second edition, the groups said they widely underestimated the impact in China and calculated that the world's most populous country would face severe food insecurity. "A billion people dead in the developing world is obviously a catastrophe unparalleled in human history. But then if you add to that the possibility of another 1.3 billion people in China being at risk, we are entering something that is clearly the end of civilization," said Ira Helfand, the report's author. Helfand said that the study looked at India and Pakistan due to the longstanding tensions between the nucleararmed states, which have fought three full-fledged wars since independence and partition in 1947. Prolif Relaxed dual-use export control regimes increases the risk of proliferation – Pakistan proves Rizwana Abbasi 12 (PhD in International Security and Nuclear Non-proliferation from the University of Leicester, “Studies in the History of Religious and Political Pluralism, Volume 7 : Pakistan and the New Nuclear Taboo : Regional Deterrence and the International Arms Control Regime”, Published by Peter Lang, May 2012 Export control regimes are under challenge because of globalization, one consequence of which has been the easy exchange and transfer of knowledge and the flow of dual-use technologies. Rapid technological advance – bringing a decrease in the value of old technology and an increase in the supply of discarded technology – increases the risk of the proliferation of nuclear-related material and technologies. There is a spread of destabilizing technologies that could fall into wrong hands. In the past, there were few states selling dual-use technology but in today’s world a large number of states and firms are supplying high tech dual-use machinery. Such technologies increase the threat of proliferation. The majority of Asian states also do not have legislation on the re-export of products and material nor any effective transshipment controls. 29 Problems traced to Pakistan are just one aspect of these developments. This part of the study diagnoses the main loopholes in the existing multilateral export control regime. The behaviour of states such as Pakistan directly links with the global developments. Prolif and development of nuclear weapons are the single greatest threat to the world – allows terrorists to access the weapons Bob Graham and Jim Talent 08 (a former U.S. senator from Florida, is chairman of the congressionally established Commission on the Prevention of WMD Proliferation and Terrorism and former U.S. senator from Missouri, is vice chairman of the WMD Commission and Distinguished Fellow at the Heritage Foundation, “Nuclear proliferation endangers world stability”, September 15, http://www.heritage.org/research/commentary/2008/09/nuclear-proliferation-endangers-world-stability During the first presidential debate in 2004, President Bush and Sen. John Kerry agreed -- as stated by the president -- that "the single, largest threat to American national security today is nuclear weapons in the hands of a terrorist network." Yet despite that consensus, the subject of weapons of mass destruction proliferation has quickly disappeared from the national agenda. Few comments or questions on this issue have been posed to the presidential candidates, even though preventing WMD proliferation should be on the short list of priorities for a McCain or Obama White House. And it rarely appears on polls of the most urgent concerns of citizens. So, in 2008, after seven years in which there have been no successful terrorist attacks inside the country, why not relax? Here are the reasons: Terrorists have continued to demonstrate the intent to acquire a WMD capability. As Director of National Intelligence Admiral Michael McConnell said in his Sept. 10, 2007, testimony to the Senate Homeland Security and Governmental Affairs Committee, "al Qaeda will continue to try to acquire and employ chemical, biological, radiological, or nuclear material in attacks and would not hesitate to use them if it develops what it deems is sufficient capability." The potential human toll of an attack utilizing weapons of mass destruction is appalling. On a normal workday, half a million people crowd the area within a half-mile radius of Times Square. A noon detonation of a nuclear device in Midtown Manhattan would kill them all. Another attack -particularly with WMD -- would have a devastating impact on the American and the world economies. As former U.N. Secretary General Kofi Annan warned, a nuclear terrorist attack would push "tens of millions of people into dire poverty," creating "a second death toll throughout the developing world." The environment for the use of nuclear and biological weapons has changed. Although Russia is doing a better job of securing its stockpiles and therefore is less of a threat, North Korea and Iran have taken its place. North Korea has gone from two bombs worth of plutonium to an estimated ten. Iran has gone from zero centrifuges spinning to more than 3,000. In what some have termed a "nuclear renaissance," many nations are now seeking commercial nuclear power capacity that will add to the inventory of nations and scientists who could extend their interest to nuclear weapons. With the nuclear surprises we've experienced in Iran, Syria and North Korea, it is clear that current nonproliferation regimes and mechanisms can no longer be certain to prevent more nuclear proliferation or the theft of bomb-usable materials. Biologists are creating synthetic DNA chains of diseases which have been considered extinct, such as the 1918 influenza virus that killed over 40 million people. The potential of using these laboratory-developed strains against an unaware and noninoculated population is ominous. There is the necessity of engaging the American people. Unlike the Cold War, which was a superpower vs. superpower confrontation, the current asymmetric threat that would be dramatically escalated if the terrorists had access to nuclear or biological weapons. The incorrect claims regarding Saddam Hussein's Nonetheless, there was and is a real danger that al Qaeda will get a nuclear bomb and attack an American city. WMD and his collusion with al Qaeda have contributed to public skepticism. Nuclear Terrorism Risk of nuclear terrorism high in Pakistan – denial of dual-use tech is key to deter the threat Rizwana Abbasi 12 (PhD in International Security and Nuclear Non-proliferation from the University of Leicester, “Studies in the History of Religious and Political Pluralism, Volume 7 : Pakistan and the New Nuclear Taboo : Regional Deterrence and the International Arms Control Regime”, Published by Peter Lang, May 2012) Pakistan is fully alive to the threat of nuclear terrorism. Consistent with its national security interest, Pakistan has put in place legislative and regulatory frameworks and an organizational infrastructure to deal with the threat. International efforts against nuclear terrorism should be backed by an international consensus and based on a non-discriminatory approach. No state would be immune from the devastating consequences of an act of nuclear terrorism anywhere in the world. The objective of enhancing nuclear security should therefore be pursued in an inclusive manner. There is a need to review the approach of any set of arrangements which seeks to exclude non-NPT nuclear weapons states and which may result in a denial of dual-use technologies, including safety and security-related equipment. Pakistan should be made a full partner with the world community in the common endeavour against nuclear proliferation. Nuclear terrorism is an existential threat – draws countries in to war Robert Ayson 10 (Professor of Strategic Studies and Director of the Centre for Strategic Studies: New Zealand at the Victoria University of Wellington, “After a Terrorist Nuclear Attack: Envisaging Catalytic Effects,” Studies in Conflict & Terrorism, Volume 33, Issue 7, July 2010, Available Online to Subscribing Institutions via InformaWorld) A terrorist nuclear attack, and even the use of nuclear weapons in response by the country attacked in the first place, would not necessarily represent the worst of the nuclear worlds imaginable. Indeed, there are reasons to wonder whether nuclear terrorism should ever be regarded as belonging in the category of truly existential threats. A contrast can be drawn here with the global catastrophe that would come from a massive nuclear exchange between two or more of the sovereign states that possess these weapons in significant numbers. Even the worst terrorism that the twenty-first century might bring would fade into insignificance alongside considerations of what a general nuclear as long as the major nuclear weapons states have hundreds and even thousands of nuclear weapons at their disposal, there is always the possibility of a truly awful nuclear exchange taking place precipitated entirely by state possessors themselves. But these two nuclear worlds—a non-state actor nuclear attack and a catastrophic interstate nuclear exchange—are not necessarily separable. It is just possible that some sort of terrorist attack, and especially an act of nuclear terrorism, could precipitate a chain of events leading to a massive exchange of nuclear weapons between two or more of the states that possess them. In this context, today’s and tomorrow’s terrorist groups might assume the place allotted during the early Cold War years to new state possessors of small nuclear arsenals who were seen as raising the risks of a catalytic nuclear war between the superpowers started by third parties. These risks were considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the so-called n+1 war would have wrought in the Cold War period. And it must be admitted that problem. It may require a considerable amount of imagination to depict an especially plausible situation where an act of nuclear terrorism could lead to such a massive inter-state nuclear war. For in the event of a terrorist nuclear attack on the United States, it might well be wondered just how Russia and/or China could plausibly be brought into the picture, not least because they seem unlikely to be fingered as the most obvious state example, sponsors or encouragers of terrorist groups. They would seem far too responsible to be involved in supporting that sort of terrorist behavior that could just as easily threaten them as well. Some possibilities, however remote, do suggest themselves. For example, how might the United States react if it was thought or discovered that the fissile material used in the act of nuclear terrorism had come from Russian stocks,40 and if for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that nuclear material to a particular country might not be the debris resulting from a nuclear explosion would be “spread over a wide area in tiny fragments, its radioactivity makes it detectable, identifiable and collectable, and a wealth of information can be obtained from its analysis: the efficiency of the explosion, the materials used and, most important … some indication of where the nuclear material came from.”41 Alternatively, if the act of nuclear terrorism came as a complete surprise, and American officials refused to believe that a terrorist group was fully responsible (or responsible at all) suspicion would shift immediately to state possessors. Ruling out Western ally countries like the United Kingdom and France, and probably Israel and India as well, authorities in Washington would be left with a a case of science fiction given the observation by Michael May et al. that while very short list consisting of North Korea, perhaps Iran if its program continues, and possibly Pakistan. But at what stage would Russia and China be definitely ruled out in this high stakes game if the act of nuclear terrorism occurred against a backdrop of existing tension in Washington’s relations with Russia and/or China, and at a time when threats had already been traded of nuclear Cluedo? In particular, between these major powers, would officials and political leaders not be tempted to assume the worst? Of course, the chances of this occurring would only seem to increase if the United States was already involved in some sort of limited armed conflict with Russia and/or China, or if they were confronting each other from a should a nuclear terrorist attack occur in Russia or China during a period of heightened tension or even limited conflict with the United States, could Moscow and Beijing resist the pressures that might rise domestically to consider the United States as a possible perpetrator or encourager of the attack? distance in a proxy war, as unlikely as these developments may seem at the present time. The reverse might well apply too: 2NC 2NC Solvency CP solves the entire aff – but the President should maintain current requirements on countries with an international terrorism threat Rizwana Abbasi 12 (PhD in International Security and Nuclear Non-proliferation from the University of Leicester, “Studies in the History of Religious and Political Pluralism, Volume 7 : Pakistan and the New Nuclear Taboo : Regional Deterrence and the International Arms Control Regime”, Published by Peter Lang, May 2012) In exercising his authority to export controls, the President is directed to establish and maintain lists of items subject to control, lists of foreign persons or end-uses subject to control, licensing criteria and licensing alternatives – such as advanced notice in lieu of licensing, and compliance and enforcement measures. It expands the definition of dual-use items to include those that could be used for cyber or terrorist attacks. The legislation establishes penalties consistent with the IEEPA penalties (see above). The legislation also directs the President to establish an inter-agency Transfer Policy Committee to identify strategic threats requiring export controls and to implement policies to counter those threats. This committee is also charged with regularly reviewing the control list and establishing and maintaining a licensing system. The legislation requires the President to maintain current license requirements on countries supporting international terrorism , as well as current sanctions regarding missile proliferation and chemical and biological weapons proliferation. It also reauthorizes the anti-boycott provisions from the EAA. 2NC AT: Perm Do Both The permutation is impossible – you can’t reduce and maintain export controls on Pakistan simultaneously – make the aff explain what the world of the permutation would look like Severance - the function of the plan is to reduce export controls on all countries – doing both severs the function of reducing controls on Pakistan. Severance perms are a voting issue – makes the aff a moving target because they can spike out any disads or counterplans and it’s impossible to be neg. 2NC AT: Perm do the CP Severs the function of the plan – aff fiats export controls to be reduced on all countries and by maintaining controls on Pakistan – they sever out of the function of curtailing export controls on Pakistan 2NC AT: Other Countries Export Europe has export controls for dual use tech on Pakistan – UK proves UK Export Control Organization 14, (Department for Business, Innovation & Skills, Foreign & Commonwealth Office, HM Treasury and Export Control Organisation, “Current arms embargoes and other restrictions”, September 11th 2014, https://www.gov.uk/current-arms-embargoes-and-other-restrictions) Implications for exporters The UK will not issue an export licence for small arms and light weapons , components or ammunition unless the ECOWAS Commission has issued an exception to its moratorium. You can find out about the current ECOWAS restrictions in arms embargo on West African States. Restrictions on non-conventional and dual-use items As of 10 UK reviewed its policy towards nuclear-related exports to India. Restrictions on nuclear exports to Pakistan remain in force. Implications for exporters Exporters can apply for an export control licence for their goods. All applications will be considered by the UK government in line with the provisions of the Consolidated Criteria for UK and EU Arms Exports. Find out the details of restrictions on exports of non-conventional and dual-use items to India and Pakistan in export embargo on nuclear goods to India or Pakistan. November 2008 the 2NC NB - Prolif Reducing export controls only stimulates the proliferation of WMDs – doesn’t hurt the economy Strom Thurmond 98, (US Senator from South Carolina, “U.S. Export Control and Nonproliferation Policy and the Role and Responsibility of the Department of Defense: Hearing Before the Committee on Armed Services”, October 1st 1998) The most important thing to recognize about export controls is that they work. They buy the time needed to turn a country off the nuclear weapon path. Argentina and Brazil agreed to give up nuclear weapons in part of the costs that export controls imposed upon them. In Iraq, documents discovered by the United Nations inspectors showed that export controls on dual-use equipment seriously hampered the Iraqi nuclear weapon design team. The Iraqis spent time and money making crucial items that they could not import. The same controls also stopped Iraq’s drive to make a medium-range missile. In addition, these controls are now hampering India’s effort to build an ICBM and will hamper the efforts of both India and Pakistan to weaponize their nuclear arsenals. But how much do export controls cost? Are they a drag on the U.S. economy? How many jobs are at stake? The total American economy was about 6.7 trillion dollars in 1994, the last year for which I have been able to find complete only two tenths of 1 percent ($10.7 billion) even went through Commerce Department licensing. Only $141 million in application were denied –which is less than one hundredth of 1 percent of the U.S. economy. Export control is not a jobs issue. It is a security issue. It has only a microscopic effect on employment. Reducing export controls will not stimulate the U.S. economy; it will only stimulate the proliferation of weapons of mass destruction. What about the end of the cold war? Does that mean that export controls are less important? If anything, they are more important. With bipolar stability gone, regional tensions are growing. These tensions stimulate the appetite for weapons of mass destruction. The nuclear and missile arms race has just shifted into high gear in South export licensing data. Of that, Asian and is continuing in the Middle East. It is illogical to say that because the Cold War is over, proliferation is the main international threat, and that export controls, which are one of the best ways of containing that threat, should be reduced. the lesson of Iraq was that export controls need to be stronger instead of weaker. But today’s export controls are only a shadow of Since 1988, applications to the Commerce Department have dropped by roughly 90%. Cases have fallen from nearly 100,000 in 1989 to 8,705 in 1996 and 11,472 in 1997. The reason is simple: fewer items are controlled In fact, what they were before the Gulf War, when Saddam Hussein was buying the means to make his mass destruction war machine. that we have virtually given up export control as a foreign policy tool. 2NC NB – India Pakistan War Pakistan avoided attacking India in the past but an increase in military capabilities will lead to larger and more frequent militarized disputes S. Paul Kapur 09 (professor in the Department of National Security Affairs at the Naval Postgraduate School, “Dangerous Deterrent: Nuclear Weapons Proliferation and Conflict in South Asia”, 2009, https://books.google.com/books?id=bt3WMTNX5QoC&dq=india+reaction+to+pakistan+militarization&source=gbs_navlinks_s) In this chapter, I examine Indo-Pakistani security relations during the non-nuclear period from 1972 through 1989. I show that this period was largely peaceful; 186 of the 216 months during this period were completely free of militarized conflict. Militarized conflicts that did occur nonnuclear period was stable for two main reasons. First, India was satisfied with the territorial division of the subcontinent after its victory in the Bangladesh War and had no reason to undertake any aggression against Pakistan. Second, Pakistan was dissatisfied with the territorial division of the subcontinent following the Bangladesh War, particularly in Kashmir. However, in its weakened state, Pakistan could not risk any action to alter Kashmiri territorial boundaries and thus avoided confrontation with India. Despite the relative peace of the nonnuclear years, I show that several developments occurred during this period that would encourage renewed Indo-Pakistani conflict in the future. First, a process from 1972 through 1989 remained below the level of outright war. I argue that the of Islamization within Pakistan made the Kashmir dispute an even more important Pakistani national goal than it had been. Second, the Afghan War’s anti-Soviet guerrilla campaign offered Pakistan a model of low-intensity conflict (LIC) to employ against Indian Kashmir. Finally, Pakistan’s burgeoning nuclear weapons capability made pursuit of a LIC strategy in Kashmir less risky, protecting Pakistan against the possibility of all-out Indian retaliation. These factors would combine to make militarized disputes on the subcontinent more frequent and severe during the coming de facto and overt nuclear periods. FDA PIC 1NC 1NC Shell The Food and Drug Administration should substantially curtail surveillance of employees suspected of being whistleblowers with the exception of employees also suspected of committing fraud. Monitoring of FDA employees suspected of fraud is necessary to discover fraudulent activities and misconduct. Swaminathan and Avery 12 — Vandya Swaminathan, a J.D. Candidate at the University of California, Hastings College of the Law, and Matthew Avery, Associate at Baker Botts LLP, 2012(“FDA Enforcement of Criminal Liability for Clinical Investigator Fraud, Hastings Sci. and Tech, September 14th, Available Online at: http://hstlj.org/wp-content/uploads/2012/09/SwaminathanV4I2.pdf, Accessed: 7-28-2015) There are three mechanisms in place that should theoretically allow sponsors or FDA to discover any clinical investigator fraud: site monitoring, sponsor auditing, and FDA auditing. For site monitoring, the sponsor usually selects an appropriately trained individual to monitor the progress of the clinical investigation.71 Because the sponsor is responsible for ensuring that the clinical investigators’ obligations are being fulfilled, FDA recommends that the monitor periodically visit the clinical site to ensure the investigator is adequately performing his duties.72 Site monitors are supposed to review every piece of data generated by a clinical study and are considered the best line of defense against clinical investigator fraud.73 Sponsor auditing involves the sponsor of a clinical trial sending its own personnel to make sure an investigator is conducting a clinical trial in compliance with good clinical practice standards and other FDA regulations.74 Sponsors usually only conduct their own audits for larger clinical trials.75 Finally, FDA auditing is when the Agency sends its own monitors to inspect a clinical site and review data generated there. However, because of the FDA’s budgetary constraints, these audits are relatively sporadic and are typically reserved for pivotal Phase III trials. Lack of supervision causes proliferation of harmful drugs and prevents effective research on new drugs. Curtin and Relkin 7 — Teresa Curtin, an associate at Weitz & Luxenberg, P.C., a law firm that acts as plaintiffs’ counsel in pharmaceutical product liability litigations nationwide, including in many litigations mentioned in this Article. She holds a law degree from New York University School of Law where she was a Root Tilden Scholar a& Ellen Relkin, of counsel to Weitz & Luxenberg, P.C. and represents plaintiffs in pharmaceutical product liability and toxic tort cases. She is certified by the New Jersey Supreme Court as a Certified Civil Trial Attorney. She is an elected member of the American Law Institute, is a chair of the Toxic, Environmental and Pharmaceutical Torts Section of the American Association for Justice and a fellow of the Roscoe Pound Foundation, 2007 (“PREAMBLE PREEMPTION AND THE CHALLENGED ROLE OF FAILURE TO WARN AND DEFECTIVE DESIGN PHARMACEUTICAL CASES IN REVEALING SCIENTIFIC FRAUD, MARKETING MISCHIEF, AND CONFLICTS OF INTEREST, HOFSTRA Law Review, 2007, Available Online at: http://law.hofstra.edu/pdf/academics/journals/lawreview/lrv_issues_v35n04_cc4.curtinrelkin.35.4.final.pd f, Accessed: 7-28-2015) In the past decade, and prior to that, several widely used prescription medications have been removed from the market either voluntarily, or pursuant to FDA request, upon reports that such medicines were causing life threatening adverse effects, and in some cases deaths.28 Withdrawal is virtually never the result of the FDA initiating formal proceedings to remove a drug because, as the Director of New Drugs at the FDA, Dr. John Jenkins, recently acknowledged, in the context of an FDA expert advisory panel recommending an outright ban of over-the-counter pediatric cold products for children under the age of six, a forced withdrawal requiring a rulemaking process could take "many years" to carry out.29 The FDA has been criticized for taking "years to acknowledge risks to millions of patients that had been apparent to some researchers. 3 ° Judge Weinstein, in rejecting a pharmaceutical company's preemption defense noted that "[i]t is apparent ... that the FDA's own research is limited and that it relies heavily on the self-motivated representations and studies by the pharmaceutical industry,",31 suggesting that the "lack of adequate... [FDA] supervision of the pharmaceutical industry" is actually a factor to be considered in "the larger legal and factual context" in which the determination of fact and damages is made in 32 pharmaceutical tort cases. The removal of drugs from the market almost uniformly shows that there are "often important gaps in the ascertainment and reporting of adverse effects associated with prescription drugs, and the balance of information presented to physicians about the risks and benefits of medications may understate the former and inflate the latter. 33 The danger of hidden adverse drug effects is that even a relatively small risk of a serious adverse effect can translate into a high number of consumers killed or hurt by such adverse effects, due to the vast number of prescriptions written for popular drugs. For example, related to the selective COX-2 inhibitor drug Vioxx, at the time of its withdrawal, more than two million patients around the world were taking the drug, leading to an estimated 88,000 to 140,000 Americans suffering Vioxx-related heart attacks, strokes, and other serious medical problems.3 New antibiotics are key to prevent resistant pathogens and the spread of disease. Boucher 9 — Helen W. Boucher, Division of Geographic Medicine and Infectious Diseases, Tufts University and Tufts Medical Center, George H. Talbot, Talbot Advisors, John S. Bradley, Division of Infectious Diseases, Rady Children's Hospital , Division of Infectious Diseases, Harbor—University of California at Los Angeles (UCLA) Medical Center, John E. Edwards, Los Angeles Biomedical Research Institute, Torrance, The David Geffen School of Medicine at UCLA , David Gilbert, Division of Infectious Diseases, Providence Portland Medical Center and Oregon Health Sciences University, Louis B.Rice, Medical Service, Louis Stokes Cleveland Veterans Administration Medical Center, Cleveland, Ohio, Department of Medicine, Case Western Reserve University School of Medicine, Michael Scheld, Department of Medicine, University of Virginia School of Medicine, Brad Spellberg, Department of Medicine, Johns Hopkins University School of Medicine,, and John Bartlett, 2009 (“Bad Bugs, No Drugs: No ESKAPE! An Update from the Infectious Diseases Society of America,” Clinincal Infectious Diseases, Vol 48, January 1st, Available Online at: http://cid.oxfordjournals.org/content/48/1/1.full.pdf+html, Accessed: 7-28-2015) The number of antibacterials in phase 2 or 3 of clinical development remains disappointing, and the absence of agents designed to treat infection due to resistant gram-negative bacilli places patients with these infections in danger. At this time, there are no systemically administered antimicrobials in advanced development that have activity against either a purely gram-negative spectrum or bacteria already resistant to all currently available antibacterials. Ascertaining the true number of compounds in development remains challenging. Although PhRMA reported 388 medicines and vaccines in testing, 83 of which are antibacterials, we found significantly fewer than 83 new molecular entities in advanced clinical development. Because no comprehensive survey of antibiotic development was undertaken before the IDSA's reports of 2004 and 2006 [12, 14], we cannot determine whether the 388 medications and vaccines reported in development by PhRMA—or even just the new, systemic antibacterials listed in the present report—reflect an increase or decrease in the development pipeline over the past few years. What is certain is that the number of new antibacterials that make it through the complete development process and ultimately receive FDA approval has precipitously decreased over the past 25 years. Indeed, we found a 75% decrease in systemic antibacterials approved by the FDA from 1983 through 2007, with evidence of continued decrease in approvals, even during the most recent 5-year period (2003–2007) [3]. These data do not suggest a significant recent increase in antibacterial development. Recent reports about the decrease in discovery research efforts in large pharmaceutical companies and the decrease in antibacterial trials, most notably “early phase” clinical trials, further highlight the diminishing industry focus on antibacterial drug research and development [89, 90]. Only 5 major pharmaceutical companies—GlaxoSmithKline, Novartis, AstraZeneca, Merck, and Pfizer—still have active antibacterial discovery programs, and the number of antibacterial trials registered at ClinicalTrials.gov decreased between 2005 and 2007 [89, 90]. We do observe some small signs of success. The approval of doripenem is encouraging; its increased in vitro potency against P. aeruginosa may translate into clinical advantage. Positive results in phase 3 studies for telavancin, ceftobiprole (although not for the VAP subset in the HAP studies), and cethromycin are encouraging, although the regulatory delays are troubling. Several compounds in early development appear promising, but phase 2 clinical studies are not yet under way. We found evidence of potentially increased interest among large pharmaceutical companies in the recent announcements of collaborations between Mpex Pharmaceuticals and GlaxoSmithKline, Novexel and Forest Laboratories, and Protez and Novartis [37, 91, 92]. These relationships reflect some signs of renewed investment interest that must be nurtured very carefully if we hope to see a productive pipeline. Looking forward over the next 5–10 years, it is possible that the number of approved antibacterials will plateau at a level similar to that of the past 5 years (i.e., ∼1 drug per year). It is critical to emphasize that focusing on just the number of approved antibacterials does not necessarily “tell the full story” of the overall clinical impact of the new drugs. New antimicrobials should provide clear advances in treatment of infection, compared with already available therapies. As in our earlier report, the number of truly novel compounds with a new mechanism of action remains small. Most antibacterial drugs that are currently in the late-stage pipeline do not augur a major advance in our ability to treat infection due to resistant pathogens, and the overall number of compounds in development to treat gram-negative infection is small. The fact that much of the discovery effort is based in Japan is also noteworthy [27]. The IDSA is concerned about the lack of an active international drugdiscovery infrastructure and the attendant consequences—in particular, the decrease in US- and European-based antibacterial discovery infrastructure. Pandemics spread like wildfire and cause extinction — only resistance monitoring solves in the necessary timeframe. Ferguson et al 6 — Neil M. Ferguson, Derek A. T. Cummings, Christophe Fraser, James C. Cajka, Philip C. Cooley, and Donald S. Burke, Department of Infectious Disease Epidemiology, Faculty of Medicine, Imperial College London, Department of International Health, Johns Hopkins Bloomberg School of Public Health, 2006 (“Strategies for mitigating an influenza pandemic,” Nature, April 26th, Available Online at: http://www.nature.com/nature/journal/v442/n7101/full/nature04795.html#B3, Accessed: 7-26-2015) Once a new pandemic virus starts to be transmitted in a country, interventions must be targeted for maximum impact. Applying the type of intensive control strategies envisaged for containing a pandemic at source6 is impractical as infection will constantly be reseeded in a country by visitors (see Supplementary Information). Clinical cases are clearly then the first priority for any more-targeted approach, as prompt treatment with antivirals reduces clinical severity and infectiousness18 (see Supplementary Information). Our results indicate that only very rapid treatment can significantly reduce transmission (Fig. 2c, d), because cases are at their most infectious soon after symptoms develop (seeSupplementary Information). For the high transmissibility scenario, same-day treatment of 90% of cases reduces cumulative attack rates from 34% to 29% and peak daily attack rates from 1.9% to 1.6%, with an antiviral stockpile sufficient to treat 25% of the population (the size many countries have ordered19) being adequate to implement the policy. If treatment is delayed by 1 day, the cumulative attack rate for the high transmissibility scenario increases to 32% (meaning that a 29% stockpile is needed), and the peak daily attack rate to 1.9%. The impact of treatment on the peak daily attack rate at the height of the epidemic is always greater than that on overall attack rates. Assuming that more than 50% of infections result in clinical illness requiring treatment would increase the required stockpile (see Supplementary Information). A real threat to the effectiveness of antiviral-based mitigation policies would be if resistant strains arose with transmissibility close to the wild-type level20. Such strains have not yet been detected, but resistance monitoring during a pandemic will be essential. 2NC/1NR Extensions 2NC— Overview The CP solves abuses against whistleblowers while preventing instances of misconduct within the FDA— this allows for more effective research toward new antibiotics and prevents disease spread. Only the CP provides the most sustainable method for FDA practices —that’s Swaminathan and Avery. Monitoring of fraud suspects assures good clinical practices and prevents misuse of data. George and Buyse 15 — Stephen L George, Department of Biostatistics & Bioinformatics, Duke University School of Medicine, and Marc Buyse, IDDI (International Drug Development Institute) Inc, 2015 (“Data fraud in clinical trials,” Clinical Investigation, 2015, Available Online at: http://www.futurescience.com/doi/pdf/10.4155/cli.14.116, Accessed: 7-28-2015) Detection of fraud is one aspect of data quality assurance in clinical trials [58]. As part of good clinical practice, trial sponsors are required to monitor the conduct of clinical trials. The aim of monitoring clinical trials is to ensure the patients’ well-being, compliance with the approved protocol and regulatory requirements, and data accuracy and completeness [59]. Baigent et al. [60] draw a useful distinction between three types of trial monitoring: oversight by trial committees, on-site monitoring and central statistical monitoring, and argue that the three types of monitoring are useful in their own right to guarantee the quality of the trial data and the validity of the trial results. Oversight by trial committees is especially useful to prevent or detect errors in the trial design and interpretation of the results. On-site monitoring is especially useful to prevent or detect procedural errors in the trial conduct at participating centers (e.g., whether informed consents have been signed by all patients or legally acceptable representatives). Statistical monitoring is especially useful to detect data errors, whether due to faulty equipment, sloppiness, incompetence or fraud. 2NC — Solvency No solvency deficit — there is a distinction between whistleblowers and employees who commit fraud. Whistleblowers release sensitive information about clinical practices while fraud constitutes careless work practices, intentionally falsifying data, and other types of misconduct. CP solves —good-faith whistleblowers are protected while those who engage in misconduct are punished. Ankier 2 — Dr. SI Ankie, Ankier Associates, 2002 (“Dishonesty, Misconduct and Fraud in Clinical Research: an International Problem,” The Journal of International Medical Research, 2002, Available Online at: http://imr.sagepub.com/content/30/4/357.full.pdf, Accessed: 7-28-2015) The Food and Drug Administration (FDA) regulates scientific studies in human subjects that are designed to develop evidence of the safety and efficacy of investigational drugs, biological products or medical devices. Its authority derives from the Federal Food, Drug, and Cosmetic Act (1938) as supplemented by subsequent amendments,49 with GCP regulations being established by Title 21 of the Code of Federal Regulations. The remit of the Division of Scientific Investigations of the FDA includes evaluation of the integrity of the clinical data on which product approvals are based (personal communication from Carolyn Hommel, Consumer Safety Officer, Division of Scientific Investigations [HFD-45], Office of Medical Policy, Center for Drug Evaluation and Research, US Food and Drug Administration).50 All parties involved in biomedical research are encouraged to report promptly any breaches of GCP, scientific misconduct or negligent actions by researchers. The FDA does not use the term ‘whistleblower’ in its database and has no explicit regulations regarding those who report misconduct. Subject to applicable regulations, the good-faith whistleblower is entitled to receive conditional legal protection against retaliation51 if they disclose (to the Office of Research Integrity) allegations of scientific misconduct in research being funded by the US Public Health Services. Moreover, a private citizen may also seek to expose false or fraudulent claims for federal funds by bringing a so-called ‘Qui Tam’ suit. As a Downloaded from imr.sagepub.com at NORTHWESTERN UNIV/SCHL LAW on July 28, 2015 361 SI Ankier Misdemeanours in clinical research: an international problem reward for being a whistleblower (also termed a ‘relator’), they receive a significant proportion of any recovered funds while also being entitled to protection against retaliation.52 2NC — Impact Pandemics hurt national security, are magnified quickly in urban areas, and are difficult to contain. Goldsman et al 13 —David Goldsman, Georgia Institute of Technology Michael Edesess, City University of Hong Kong, Kwok-Leung Tsui and Zoie Shui-Yee Wong, City University of Hong Kong, 2013 (“Tracking Infectious Disease Spread for Global Pandemic Containment,” AI and Health, November/December, Available Online at: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6733224, Accessed: 7-28-2015) Infectious disease pandemics present serious threats to global health and can potentially impact national security.1 The Asian-Pacifi c region is often the epicenter of emerging infectious diseases, having given rise to recent outbreaks of avian fl u, Asian fl u, and Severe Acute Respiratory Syndrome (SARS). In 2003, SARS affected 29 countries, resulting in 8,096 infections and 774 deaths.2 This outbreak demonstrated that increased population density and mobility can play important roles in the spread of emerging infectious diseases and could potentially lead to future pandemics. According to the United Nations Newsletter,3 by 2030 the world’s urban population is estimated to reach 8 billion people and the number of city dwellers is expected to grow to 5 billion. People living in urban areas are constantly in close contact, and urban populations experience a vastly different lifestyle than suburban populaces. Mass gatherings of people in confined spaces and interconnected contacts can increase the probability of spreading infectious diseases.4 Even for the same swine fl u strain, it has been suggested that the basic reproductive number (a measure of how quickly the disease spreads) in New York City would be greatly different than that found in Mexico City, due to differences in population density, environment, demographics, and behavioral factors.5 Taking the 2003 SARS outbreak as an example, we can identify several items of strategic importance. First, the SARS coronavirus at hospital wards critically threatened the lives of healthcare workers and other patients;4 and so it’s of the utmost necessity to quickly quantify the risk of infectious disease spread within high-risk healthcare facilities to contain the outbreak at the earliest stages. Additionally, today’s ubiquitous airplane passenger traffic6 and other modes of public transportation result in fast disease movement and variable disease transmission rates, all of which must be taken onto account in any analysis. Further, modeling of detailed community interaction dynamics increases a public health organization’s ability to contain a potential strain at its origin.7 Traditional influenza simulations typically focus on large-scale populations with a generalized and homogeneous individual contact structure. They often overlook crucial regional variations when constructing community structures and thus are inadequate to replicate the true contact dynamics in the highpopulation and high-density environments common in urban areas. Moreover, largescale stochastic models tend to be computationally ineffi cient if detailed agent dynamics are taken into account; and usually those systems don’t provide user-friendly and user-adaptable interfaces. We envision a systematic, quantitative, and easy-to-use approach for tracking infectious disease spread that can realistically explain critical social contacts and population movements in urban areas. Apart from the health economics implications,8 such modeling approaches can enable preemptive detection, identification, and comprehension of pandemic outbreaks, as well as scientific justifications for mitigation strategies, such as social distancing, biosecurity screening, and quarantines. AT: Perm Perm fails — even a reduction on fraud monitoring lets employees skirt restrictions and fake data —that’s Curtin and Relkin. FDA employees have a massive incentive to manipulate data—fraud is inevitable absent surveillance. Curtin and Relkin 7 — Teresa Curtin, an associate at Weitz & Luxenberg, P.C., a law firm that acts as plaintiffs’ counsel in pharmaceutical product liability litigations nationwide, including in many litigations mentioned in this Article. She holds a law degree from New York University School of Law where she was a Root Tilden Scholar a& Ellen Relkin, of counsel to Weitz & Luxenberg, P.C. and represents plaintiffs in pharmaceutical product liability and toxic tort cases. She is certified by the New Jersey Supreme Court as a Certified Civil Trial Attorney. She is an elected member of the American Law Institute, is a chair of the Toxic, Environmental and Pharmaceutical Torts Section of the American Association for Justice and a fellow of the Roscoe Pound Foundation, 2007 (“PREAMBLE PREEMPTION AND THE CHALLENGED ROLE OF FAILURE TO WARN AND DEFECTIVE DESIGN PHARMACEUTICAL CASES IN REVEALING SCIENTIFIC FRAUD, MARKETING MISCHIEF, AND CONFLICTS OF INTEREST, HOFSTRA Law Review, 2007, Available Online at: http://law.hofstra.edu/pdf/academics/journals/lawreview/lrv_issues_v35n04_cc4.curtinrelkin.35.4.final.pd f, Accessed: 7-28-2015) What these drugs’ debacles convincingly demonstrate is that the current FDA scheme is not protecting public health and safety, leading to what one recent commentator recently noted would be “the serious concerns raised by a system that would tolerate both tort preemption and regulatory failure.”54 After all, what impact are multi-million dollar fines when a product is considered to be a potential blockbuster product, with global sales exceeding $586 million in 2000, growth of 84%, and with forecast sales of $1 billion for the next year?55 Or when a product is by far a company’s most profitable drug, with sales of $4.2 billion a year?56 In such situations, the effects of a product withdrawal can go beyond an immediate loss in product sales and impact the company’s long term revenue potential.57 From the authors’ practical experience in involvement in numerous pharmaceutical cases over the years, the sad result is that corporate executives may continue aggressive marketing campaigns and negotiating with the FDA for approval of additional uses or higher approved dosages of blockbuster drugs at the time that internal documents show the company knew or should have known that patients are developing life-threatening conditions as a result of using a company’s product. These executives’ bonuses are tied to year-end revenues and they may very well be at another company by the time that the health concerns relating to a product come to light. AT: No Fraud Now Researchers have a large incentive to commit fraud to meet FDA standards but do so at the expense of at the expense of drug safety. Swaminathan and Avery 12 — Vandya Swaminathan, a J.D. Candidate at the University of California, Hastings College of the Law, and Matthew Avery, Associate at Baker Botts LLP, 2012(“FDA Enforcement of Criminal Liability for Clinical Investigator Fraud, Hastings Sci. and Tech, September 14th, Available Online at: http://hstlj.org/wp-content/uploads/2012/09/SwaminathanV4I2.pdf, Accessed: 7-28-2015) Pharmaceutical researchers arguably have many incentives to commit fraud due to the unique challenges they face bringing their products to market. Before a pharmaceutical company can sell a single pill, it must first spend hundreds of millions of dollars showing that what is inside the pill is safe for a patient to take and effective at treating a particular disease.12 To show that a new drug is safe and effective, drug companies typically hire medical doctors to conduct clinical drug trials, in which these so-called clinical investigators oversee the testing of the new drug on hundreds to thousands of patients.13 However, the drug discovery process has a high failure rate,14 and enormous costs are associated with the identification, development, and testing of new drug candidates. Because of the huge investments involved, many drug researchers are under intense pressure to achieve positive results during clinical trials.16 Furthermore, drug researchers face additional pressure to achieve positive results as quickly as possible. The initial investment for drug trials is very high and, as fewer research dollars become available, drug researchers find themselves in stiff competition with other researchers to get and keep these dollars based on initial results.17 These scenarios can lead to a conflict of interest for drug researchers, where the goal of accurately measuring the safety and efficacy of a drug is at odds with the need to show positive results in order to keep the money from grants flowing in.18 Unfortunately, some clinical investigators succumb to these pressures by falsifying the results of their studies and submitting fraudulent data to FDA. By hiding data that shows that a drug is unsafe or ineffective, a clinical investigator may be able to convince his industry sponsor, and ultimately FDA, to allow the sale of a potentially dangerous product. Consequently, it is important that FDA be able to deter such conduct by prosecuting clinical investigators who submit fraudulent data to the Agency. Fraud among FDA researchers is high now —misconduct surveillance is key to solve. George and Buyse 15 — Stephen L George, Department of Biostatistics & Bioinformatics, Duke University School of Medicine, and Marc Buyse, IDDI (International Drug Development Institute) Inc, 2015 (“Data fraud in clinical trials,” Clinical Investigation, 2015, Available Online at: http://www.futurescience.com/doi/pdf/10.4155/cli.14.116, Accessed: 7-28-2015) Despite these difficulties, there have been numerous attempts over the years to assess the prevalence or incidence of misconduct via surveys, audits and other methods, with conflicting results and conclusions. In a background paper prepared for an ORI conference on research integrity summarizing the literature on research misconduct, the reported estimated incidence of research misconduct ranged over several orders of magnitude [9]. At one end of the scale, based on confirmed cases of fraud (using the narrow PHS definition of fabrication, falsification or plagiarism) a crude estimate of 0.01% (one in 10,000 active scientists) is obtained. A review of routine audits of leukemia trials conducted by the Cancer and Leukemia Group B, one of the multicenter cancer clinical trial groups sponsored by the National Cancer Institute, reported an incidence of fraud of 0.25% [10]. Similarly, a report of audits in the United Kingdom revealed that only 0.40% of the contributed datasets were fraudulent [11]. In the first 10 years of reports from the Office of Research Integrity, there were 136 findings of scientific misconduct (again using the PHS definition); 36 (26%) of these were in clinical trials or other clinical research) [12]. On the other hand, surveys of scientists and medical investigators routinely report rather high levels of misconduct or knowledge of misconduct. These surveys generally fall into one of two types: those that ask about knowledge of misconduct, presumably by others, and those that directly ask about misconduct by those being surveyed. The former provide revealing information about perception of misconduct but do not provide any reliable information about the true incidence; the latter provide direct, but biased, estimates of incidence because of the negative incentives for self-reporting. Examples of the first type include a survey of members of the American Association for the Advancement of Science (AAAS) in which 27% of the scientists reported having encountered some type of misconduct [13]; a survey of research coordinators in which 19% of respondents reported first-hand knowledge of misconduct within the previous year – and that only 70% of these were reported [14]; a study of Norway medical investigators in which 27% of investigators knew of instances of fraud [15]; a survey of members of the International Society of Clinical Biostatistics, in which over 50% of respondents knew of fraudulent reports [16]; a survey of medical institutions in Britain in which more than 50% of respondents knew or suspected misconduct among institutional colleagues [17]; and a survey of New Scientist readers, in which a remarkable 92% knew of or suspected scientific misconduct by colleagues Foreign Students PICs China 1nc Text: The United States federal government should limit the scope of Student & Exchange Visitor Information System to the exclusive monitoring of Chinese students. {insert china brain drain da} **2nc Solvency** ISIS solvency The Counterplan eliminates monitoring on middle eastern students—solves hearts and mind—no reason China is key . STEM solvency The counterplan is sufficient to solve the aff--- even if China forms a large group of foreign students, other countries fill in. They have ev that foreign students are necessary, but no ev drawing a brightline about how many we need. India, Russia, Saudi arabia, Brazil, and more all fill in for the Chinese. Here’s comparative ev—way more Indian students go into Stem—we’ll insert a graph too Dutta 14 [Saptarishi is a reporter for Quartz in India. He was previously with The Wall Street Journal covering general news. September 2014. “The key differences between Indian and Chinese students studying in the US” http://qz.com/258353/the-key-difference-between-indian-and-chinese-studentsstudying-in-the-us///jweideman] As for choice of disciplines, technical programs, known as STEM (short for science, technology, engineering and mathematics) are a clear favorite for Indian students. Around 32% of Indian students are enrolled in engineering programs, compared with just 17% of Chinese students. In fact, Hyderabad is the top source of STEM students in the US with 20,840 students (though the city’s figures might be inflated by other factors). Overall, nontechnical programs are more popular among Chinese students, with 61% of them enrolling in non-tech subjects like business and marketing. Indian students’ love of technical subjects isn’t surprising, given India’s thriving outsourcing industry. The country has more computer programmers than Silicon Valley. Brazil solves Kohli 14 [Sonali is a reporter for Quartz covering education and diversity. She was most recently an Atlantic Media editorial fellow at Quartz, and before that a metro reporter at the Los Angeles Register and the Orange County Register. November 2014. “Why Iran and Brazil are sending more college students to the US” http://qz.com/296952/why-iran-and-brazil-are-sending-more-college-students-to-theus///jweideman] The government of Brazil is also sending its college students to the US, but specifically for STEM education. The Brazil Scientific Mobility Program is only for undergraduates, but it’s had the added effect of increasing graduate student enrollment in the US as well, Bhandari says. The program launched in 2011 and also funds intensive English study. There were 13,286 Brazilians studying in US colleges in 2013-2014; 38.3% were undergraduates and 23.5% graduate students. Brazil’s scholarship program helps in building its work force, which is “critical to their national development,” Bhandari says. Indian and Iranian students are more likely to enter STEM Ayres 14 [Alyssa, senior fellow for India, Pakistan, and South Asia at the Council on Foreign Relations. 11/18/14, “India and U.S. Higher Education: Strong Indian Presence In The United States, But Americans Studying In India Still Meager” http://www.forbes.com/sites/alyssaayres/2014/11/18/india-and-u-shigher-education-strong-indian-presence-in-the-united-states-but-americans-studying-in-india-stillmeager///jweideman] As the Open Doors fact sheet on India shows, India was the number one place of origin for foreign students in the United States for eight years, from the 2001-02 survey year through 2008-09. In 2009-10, however, China surpassed India as a place of origin, with more than 127,000 students in the United States that year compared with India’s nearly 105,000. The number of students from India then began to dip slightly, dropping to below 100,000 by 2012-13, although it was still the number two place of origin. By comparison, students from China have been rapidly increasing in numbers such that for the 2013-14 year just released, there were close to 275,000 Chinese students in the United States. An overwhelming number of Indian students in the United States are at the graduate level, 59.5%. Just 12.3% of the Indian students here are undergrads, and 27% are pursuing optional practical training (a year of work preceding or following degree completion). This profile differs substantially from the breakdown of Chinese students in the United States, of whom 40% are undergrads, 42% are graduate level and 12.2% are carrying out optional practical training. More interestingly, 78.6% of the Indian students in the United States are in the “STEM” (Science, Technology, Engineering, Math) fields. The only country sending a higher proportion of its students in the STEM fields is Iran, with 79.6%. I was surprised that the number of Indian students in business is just 11.7%. Every other field of study tracked by Open Doors clocks in at 3% or less for Indian students: the social sciences, just 2.7%; fine arts, 1.4%; humanities, a mere 0.5%, as was education. This means the average Indian student in the United States is highly likely to be in a STEM graduate degree program. **AT: relations** AT: internal link Their internal link concludes neg Chang 14 [Anthony, Writer for the Diplomat. 6/20/14, “Is Overseas Study Helping US-China Relations?” http://thediplomat.com/2014/06/is-overseas-study-helping-us-china-relations///jweideman] Both the number and growth of Chinese students at American universities is one of the more startling phenomena in higher education. A welcome one, too: study abroad would seem to promise a future where U.S.-China relations might be characterized by greater firsthand knowledge of American culture among the Chinese. By generating greater understanding, their experience in the U.S. should also expand their sense of common interests, brightening prospects for cooperation between the world’s main powers. While few would object to such a future as a goal of foreign policy, how realistic is it? Unsentimental Education Let’s start with the numbers: the Institute of International Education reports there were more than 235,000 Chinese students in the U.S. during the 2012/2013 academic year, a 21 percent increase from the year prior, making China the number one source of foreign students in America for four years running. Nearly half of these students are studying either business or engineering; adding math and the hard sciences would account for over two-thirds. These are ultimately more applied subjects that tend to be less popular among other international students, let alone among Americans: in 2011/2012, for instance, only 16 percent of U.S. bachelor’s degrees were conferred in these fields. Of course, it isn’t just academic majors that determine the character of study abroad, but even so, there are few indications Chinese students’ experiences are especially representative, independent of what their coursework looks like. That means less class participation, less involvement in extracurricular activities, and fewer friendships with Americans, even compared with other foreign students, despite the fact most American consider all these things inseparable elements of university life. And if Chinese students’ time abroad isn’t reflective of that broader U.S. experience, then one should ask to what extent their studies are really maximizing their understanding of America. Given that Chinese numbers have surged only recently, it might be unrealistic to expect this kind of integration so quickly. Plus, these challenges can face students no matter where they originally come from, especially places where university culture may differ dramatically. But the stakes involved in helping China’s youth obtain a more representative view of the U.S. are frankly higher, and both the number of international students (not to mention the tuition they often pay in full) can actually make it harder for universities to take their acculturation seriously. The more Chinese choose to study in America, the more tempting it becomes to measure success by the revenue they bring than educational quality, even as these students find it easier to spend their days with compatriots. Mandarin Is the (Distant) Future (Maybe) At the same time, educational exchange is a two-way street. While more and more Chinese arrive on U.S. campuses, there is no comparable trend in the other direction, making one question just how well America’s next generation will know the Chinese. In 2011/2012, fewer than 15,000 Americans were hitting the books in China, a mere two percent increase from the previous year, and only half the number studying abroad in Italy. And among this already small group, only 2,200 of them are actually pursuing a degree in China, a number that encompasses programs taught in English. Even high-profile initiatives like the Schwarzman Scholars program – a kind of Rhodes Scholarship to attend Tsinghua University – will have all its courses taught in English, despite the program’s founder saying, “In the 21st century, China has few requirements. is no longer an elective course.” Yet here is a course that currently US-Relations Thumpers Cyberespionage, political tensions, and national security concerns hamper USChina S&T trade Suttmeier 14 (Richard P. Suttmeier, Dr. Richard P. Suttmeier is a Professor of Political Science, Emeritus, at the University of Oregon. He has written widely on science and technology development issues in China, “Trends in U.S.-China Science and Technology Cooperation: Collaborative Knowledge Production for the Twenty-First Century?”, Research Report Prepared on Behalf of the U.S.-China Economic and Security Review Commission, September 11, 2014, http://origin.www.uscc.gov/sites/default/files/Research/Trends%20in%20USChina%20Science%20and%20Technology%20Cooperation.pdf) Technology Leakage and Security Concerns For the most part, the government-to-government relationship is not a conduit for the transfer of sensitive technologies, especially technologies embedded in physical artifacts. The fact that the relationship does involve training and visits to U.S. laboratories, however, ensures that knowledge transfers occur. U.S. concerns over the course of the last decade about “deemed exports” and “human embodied” transfers of sensitive scientific knowledge or technology have led technical agencies to put in place mechanisms to vet visiting scientists and engineers. 74 Overall, however, the government-to-government relationship is much less a conduit for technology transfer than commercial relations or academic channels. Security concerns have become far more prevalent in the relationship now than in the past, in large part due to various political tensions between the two countries and China’s rise as a commercial and potential military competitor. Allegations of cyberespionage activities made by both sides against the other further highlight the increasing prevalence of information security issues. In particular, concerns over Chinese espionage and technology acquisition strategies have led to greater wariness in the conduct of relations on the U.S. side in the face of reports from several agencies that Chinese interests in scientific collaboration seem to be targeted at specific fields and facilities where China hopes to enhance capabilities.75 A less-than-transparent state secrecy legal environment on the Chinese side has led to limitations on data sharing under certain protocols. This has led to U.S. frustrations over the conduct of field research in ways that are inconsistent with the culture of scientific openness with which U.S. officials and investigators are familiar.76 As a further sign of deepening security concerns on the Chinese side, the recently formed Central National Security Commission has included science and technology as one of 11 areas for which state security must be strengthened. 77 How this development will affect U.S.-China cooperation remains to be seen. From a Chinese perspective, U.S. export controls and visa processes (though much improved) are also manifestations of a security consciousness that is not always consistent with open scientific practices. A recent controversy over the prohibition of Chinese participation in the NASA Ames Research Center meeting to discuss the findings from the Kepler interplanetary survey mission illustrates this tension. 78 It has long been assumed by the U.S. side that Chinese intelligence agencies play a key role in identifying technology acquisition targets, which are then shared with civilian S&T agencies as well as national security agencies.79 Since this report is being prepared on an unclassified, open source basis, it is not possible to determine the extent to which such technology acquisition targeting enters into the S&T relationship under the Agreement other than to note that several U.S. agencies have expressed concern during interviews with the author about what appears to be Chinese targeting of selected laboratories and fields of study for cooperative activities.80 Several recent cases do illustrate that S&T cooperation, as discussed further below, is not immune to espionage.81 Aff does not overcome S&T nationalism in dual-use tech transfer- national security concerns Suttmeier 14 (Richard P. Suttmeier, Dr. Richard P. Suttmeier is a Professor of Political Science, Emeritus, at the University of Oregon. He has written widely on science and technology development issues in China, “Trends in U.S.-China Science and Technology Cooperation: Collaborative Knowledge Production for the Twenty-First Century?”, Research Report Prepared on Behalf of the U.S.-China Economic and Security Review Commission, September 11, 2014, http://origin.www.uscc.gov/sites/default/files/Research/Trends%20in%20USChina%20Science%20and%20Technology%20Cooperation.pdf) But while the stakes are rising, questions about the modalities of relationships in S&T are also becoming more complex. Research and innovation today are frequently characterized by the shortened time between scientific discovery and technological application. Scientific research is therefore seldom far from commercial application and from the emergence of dual-use technologies having both commercial and military applications. Concerns among business enterprises, universities, and governments for protecting proprietary knowledge, or knowledge of relevance to national security, have been heightened. Thus, the win-win, positive-sum assumptions about cooperation in science have become complicated by the fact that the development of commercial and national security applications of new knowledge often introduce competitive pressures and the possibility of zero-sum outcomes. National governments continue to adopt policies designed to capture value from scientific and technological advances and enhance national capabilities for research and innovation, even as they expand international cooperation. Both China and the United States exhibit these tensions between "science and technology nationalism" and "science and technology globalism"; the relationship between the countries is an especially rich case of how these tensions are managed. Trade frictions and export controls are an alt cause Xinbo 11 [Wu Xinbo, a 2006–07 Jennings Randolph senior fellow at the United States Institute of Peace, is currently professor and deputy director at the Center for American Studies and associate dean at the School of International Relations and Public Affairs, Fudan University. 2011. “China and the United States Core Interests, Common Interests, and Partnership” http://www.usip.org/sites/default/files/SR277.pdf//jweideman] The financial crisis originated in the United States in the fall of 2008 and revealed many shortcomings in the current world economy at both the microeconomic and macroeconomic levels, from the slack financial oversight in the United States and the dereliction of duty by international financial institutions to the American public’s overspending and China’s oversaving of foreign currency. Since the crisis, the greatest challenge has been in securing strong, sustainable, and balanced global economic growth—a key goal agreed upon at the third Group of Twenty (G-20) financial summit, held in Pittsburgh in September 2009. China and the United States must act cooperatively to advance this goal, and both countries can play important and unique roles in the process. They are the world’s two largest economies. In 2010, they together contributed over 40 percent to the growth of the global economy.11 Moreover, as the largest developed and developing countries, the development models of the United States and China, respectively, affect countries in their own categories. Finally, it is in both Chinese and U.S. interests to secure strong, sustainable, and balanced global growth, given the two economies’ high degree of interdependence as well as their deep integration with the world economy generally. Sino-U.S. economic cooperation must occur unilaterally, bilaterally, and multilaterally. Unilaterally, China—as it already started to do during the financial crisis—should further boost its domestic consumption to adjust its long-pursued export-oriented development model. It also should base its economic growth more on technological progress and gradually reduce its dependence on low-end manufacturing industries, which have consumed too many resources and heavily polluted the environment. For its part, perhaps obviously, the United States must get its public to save more and borrow less—a task that is as important as it is difficult. As the Obama administration has realized, it is also necessary to emphasize the real economy (such as the manufacturing industry, dealing with material products) and reduce reliance on the virtual economy (such as finance, dealing with nonmaterial products). Bilaterally, both China and the United States should resist the temptation of trade protectionism. Since President Obama’s first year in office, trade frictions between China and the United States have risen remarkably,12 and with high unemployment rates as well as the Obama administration’s political ties to trade unions, protectionist pressure is felt strongly and acutely. However, a trade war with China would hurt the U.S. economy in many ways, from reducing the import of products of U.S. companies that have relocated their production bases to China to suspending China’s buying and holding of U.S. treasury bonds. Sino- U.S. trade has been largely complementary and generally does not threaten major domestic industries on both sides. These should not be sacrificed in trying to alleviate domestic economic problems, particularly on the U.S. side. Robust bilateral trade is crucial to the healthy development of Sino-U.S. economic relations and underpins bilateral political relations as well. Direct investment is an important part of bilateral economic ties. U.S. investment in China started in 1980 and reached $59.65 billion by 2008 in accumulative terms. Despite the financial crisis, U.S. companies invested in 1,530 projects in China in 2009, with an actual utilization of about $2.56 billion.13 However, starting in 2009, U.S. companies began to complain loudly about the changing investment environment in China.14 Given the importance of foreign direct investment (FDI) to China’s economic development, it is essential that their legitimate concerns are addressed seriously. Meanwhile, fueled by the world’s largest foreign currency reserve and endorsed by the government’s go-abroad strategy, Chinese firms recently have sought opportunities for overseas investment more actively. In 2009, Chinese direct investment in the United States reached $620 million,15 a figure that is relatively small compared with U.S. direct investment in China, but increasing rapidly, as one recent research pointed out, “FDI from China to the United States is now more than doubling annually.”16 Yet Chinese investors do not regard the investment environment in the United States as encouraging. After the passage of the Foreign Investment and National Security Act of 2007, the U.S. Department of the Treasury promulgated its rules of implementation in November 2008, involving regulations pertaining to mergers, acquisitions, and takeovers by foreign persons. It has subjected to review transactions involving infrastructure, energy, and crucial technologies affecting U.S. national security, and has also set strict rules on foreign investment. In the eyes of Chinese companies, the new regulations create many obstacles to foreign investors.17 More generally, from the failed bidding of the China National Offshore Oil Company (CNOOC) for U.S. oil company Unocal in 200518 to the recent controversy over Chinese steel company Anshan Iron and Steel Group’s investment plan in a U.S. steel plant,19 Chinese investors are increasingly concerned about the political and security influences on the U.S. opposition to Chinese investment. Given the real and potential benefits of Chinese FDI in the United States, such as creating more job opportunities and reducing bilateral trade imbalances, Chinese investors should not be deterred by investment protectionism in the United States, institutionally or culturally. U.S. export control to China is another area for improvement. Since the 1950s, China has been a main target of U.S. export control. However, since the improvements in Sino-U.S. ties starting in the 1970s, U.S. export control policy toward China has been adjusted many times. The issue became more salient in recent years due partly to the George W. Bush administration’s stepped-up export control measures against China and partly to the growing trade imbalance between the two countries. China deems strengthened U.S. export control as unfair, since it is probably the only major U.S. trading partner to be brought under such strict restrictions. Beijing complains that it usually takes three months to half a year and sometimes even eighteen months to obtain a license for exports to China, much more lengthy than in other countries, such as Germany and Japan, where two or three weeks to a month is enough. Besides, in the process of obtaining an export license, reviews will be carried out by the U.S. concerned authorities whenever necessary, and additional clauses on end-user are attached in commercial contracts.20 **Perm/Theory** PCP The counterplan is functionally and textually competitive—it limits the scope of the bill instead of full legislative repeal which is plan minus. Curtial means to eliminate Ackerman 14 (Spencer, national security editor for Guardian US. A former senior writer for Wired, “Failure to pass US surveillance reform bill could still curtail NSA powers,” October 3rd, 2014, Two members of the US House of Representatives are warning that a failure to pass landmark surveillance reform will result in a far more drastic curtailment of US surveillance powers – one that will occur simply by the House doing nothing at all. As the clock ticks down on the 113th Congress, time is running out for the USA Freedom Act, the first legislative attempt at reining in the National Security Agency during the 9/11 era. Unless the Senate passes the stalled bill in the brief session following November’s midterm elections, the NSA will keep all of its existing powers to collect US phone records in bulk, despite support for the bill from the White House, the House of Representatives and, formally, the NSA itself. But supporters of the Freedom Act are warning that the intelligence agencies and their congressional allies will find the reform bill’s legislative death to be a cold comfort. On 1 June 2015, Section 215 of the Patriot Act will expire. The loss of Section 215 will deprive the NSA of the legal pretext for its bulk domestic phone records dragnet. But it will cut deeper than that: the Federal Bureau of Investigation will lose its controversial post-9/11 powers to obtain vast amounts of business records relevant to terrorism or espionage investigations. Those are investigative authorities the USA Freedom Act leaves largely untouched. Section 215’s expiration will occur through simple legislative inertia, a characteristic of the House of Representatives in recent years. Already, the House has voted to sharply curtail domestic dragnet surveillance, both by passing the Freedom Act in May and voting the following month to ban the NSA from warrantlessly searching through its troves of international communications for Americans’ identifying information. Legislators are warning that the next Congress, expected to be more Republican and more hostile to domestic spying, is unlikely to reauthorise Section 215. Severence is a voting issue—makes the aff a moving target and kills negative strategy—voter for fairness and education PDB Perm do both links to the net benefit—full repeal stops the monitoring of students from China— causes brain drain. They are mutually exclusive—you cannot limit the scope of a repealed act. ME Note The cp doesn’t in any way solve the isis advantage 1nc Text: The United States federal government should limit the scope of Student & Exchange Visitor Information System to the exclusive monitoring of Khazakstani, Afghanistani, Iraqi, Syrian, Iranian, and Saudi Arabian students. Solves the first advantage—No ev that middle eastern students are key to STEM. {insert terror da/links from original case neg} **2nc: Solvency** 2nc- Stem The Counterplan is sufficient to solve the whole aff—they no logical reason why Middle eastern students are necessary to solve stem--- BRICS students fill in. The CP solves china and India—That’s more than sufficient Kohli 14 [Sonali is a reporter for Quartz covering education and diversity. She was most recently an Atlantic Media editorial fellow at Quartz, and before that a metro reporter at the Los Angeles Register and the Orange County Register. November 2014. “Why Iran and Brazil are sending more college students to the US” http://qz.com/296952/why-iran-and-brazil-are-sending-more-college-students-to-theus///jweideman] There were 274,439 students from China enrolled at US universities in 2013-2014. The country is still responsible for sending the most students to the US, largely because the demand for higher education is greater than the number of seats available in quality institutions in China. China is trying to build a system of excellent higher education, which is somewhat reflected in the dip in growth of Chinese international students coming to the US (though China still makes up 31% of all US international students). China has actually seen a tiny decrease in the number of graduate students this year compared to years past, according to a recent report from the Council of Graduate Schools. The 1% dip isn’t enough to be significant, but it’s notable that this follows a 3% decrease in graduate students the previous year, and could indicate that China is having some success in its attempts to improve higher education, says Jeff Allum, the director of research and policy analysis at the Council of Graduate Schools. China has a growing middle class, including many one-child families who want to provide the best education that money can buy for that child, says Rajika Bhandari, the deputy vice president for research and evaluation at the Institute of International Education. India For the last school year, India accounted for 11.6% of all international students in the US, with 102,673 students. This is the first overall increase of Indian students in the last few years, which is likely attributable to a few factors, Bhandari says. Firstly, there is a growing college- and- graduate-aged population in India, and like China, India does not have the educational infrastructure to provide quality, graduate-level education to every student who wants it; the prestigious Indian Institutes of Technology have an acceptance rate of less than 2%. The economy has also helped students make the move to the US—the Indian rupee stabilized against the dollar toward the end of 2013, which gave students more financial flexibility to study in the US, Bhandari tells Quartz. Lastly, the UK, another large destination for Indian students, saw a sharp drop in Indian students after it complicated immigration policies and raised tuition, Bhandari says. Most of the growth in Indian students is coming at the graduate level. In 2013-14, 12.3% of Indian students in the US were undergraduate students, 59.5% were graduate students, and 27% were in optional practical training, which allows foreign students to work for up to a year in their field of study before or after they graduate. Bhandari says the high number of graduate students is likely due to the fact that many of those students are coming for a STEM education, and US universities provide considerable financial aid for such graduate programs. **Theory/Perm** PCP The counterplan is functionally and textually competitive—it limits the scope of the bill instead of full legislative repeal which is plan minus. Curtial means to eliminate Ackerman 14 (Spencer, national security editor for Guardian US. A former senior writer for Wired, “Failure to pass US surveillance reform bill could still curtail NSA powers,” October 3rd, 2014, Two members of the US House of Representatives are warning that a failure to pass landmark surveillance reform will result in a far more drastic curtailment of US surveillance powers – one that will occur simply by the House doing nothing at all. As the clock ticks down on the 113th Congress, time is running out for the USA Freedom Act, the first legislative attempt at reining in the National Security Agency during the 9/11 era. Unless the Senate passes the stalled bill in the brief session following November’s midterm elections, the NSA will keep all of its existing powers to collect US phone records in bulk, despite support for the bill from the White House, the House of Representatives and, formally, the NSA itself. But supporters of the Freedom Act are warning that the intelligence agencies and their congressional allies will find the reform bill’s legislative death to be a cold comfort. On 1 June 2015, Section 215 of the Patriot Act will expire. The loss of Section 215 will deprive the NSA of the legal pretext for its bulk domestic phone records dragnet. But it will cut deeper than that: the Federal Bureau of Investigation will lose its controversial post-9/11 powers to obtain vast amounts of business records relevant to terrorism or espionage investigations. Those are investigative authorities the USA Freedom Act leaves largely untouched. Section 215’s expiration will occur through simple legislative inertia, a characteristic of the House of Representatives in recent years. Already, the House has voted to sharply curtail domestic dragnet surveillance, both by passing the Freedom Act in May and voting the following month to ban the NSA from warrantlessly searching through its troves of international communications for Americans’ identifying information. Legislators are warning that the next Congress, expected to be more Republican and more hostile to domestic spying, is unlikely to reauthorise Section 215. Severence is a voting issue—makes the aff a moving target and kills negative strategy—voter for fairness and education PDB Perm do both links to the net benefit—full repeal doesn’t monitor students from the Middle East. They are mutually exclusive—you cannot limit the scope of a repealed act. Prison Abolition PICs 1NC 1NC -- KKK Plan except for members of the KKK SPLC 15 (Southern Poverty Law Center, law firm which advocates for social justice and has had a series of court successes, “Church of the National Knights of the Ku Klux Klan,” 2015, http://www.splcenter.org/get-informed/intelligence-files/groups/church-of-the-national-knights-of-the-kuklux-klan)//ghs-VA Once one of the largest and most active Klan groups in America, the Church of the National Knights of the Ku Klux Klan has more recently gained a kind of "Keystone Kops" reputation on the white supremacist scene for its bumbling ways. As disorganized as the Indiana-based group may be, it is still dangerous, as evidenced by a 2001 murder and plot linked to National Knights members in North Carolina. In Its Own Words "What We Believe. The WHITE RACE: The irreplaceable hub of our nation, our Christian Faith, and the high levels of Western Culture and Technology." — Nation Knights website "Our God, we as KLANSMAN acknowledge our dependence on You and Your loving kindness toward us. May our gratitude be full and constant and inspire us to walk in Your ways. Let us never forget that each Klansman, by his conduct and spirit determines his own destiny, good or bad. May he forsake the bad and strive for the good as truly being in the image of God. Keep us in the powerful bond and fraternal Union of Klannish fidelity towards one another and devoted loyalty to this, our great Klan movement. Let us remember that the crowning glory of a Klansman is to serve his race, his community, his nation and his own high principles. God save our Race and help us to be free people, masters of our own destiny." — "Klansman Kreed," National Knights website Background The National Knights of the Klu Klux Klan formed in 1960 as a response to the growing civil rights movement. Originally a collection of splintered Klan groups from several southern states, this loose confederation quickly grew into one of the largest Klan groups in the nation. According to the Anti-Defamation League, the National Knights coordinated a series of cross burnings across the South (reportedly more than 1,000) on March 26, 1960, and claimed between 10,000 and 15,000 members. From 1963 until his death in 1993, James R. Venable served as the imperial wizard, or national leader, of the National Knights. A Georgia lawyer whose ancestors owned the legendary Stone Mountain near Atlanta — the site of the 1915 rally that inaugurated the so-called "second era" Klan — Venable used the mountaintop and nearby family land for annual rallies that drew members from the National Knights but also other Klan factions. In 1993, the year he died, Venable appointed Railton Loy, a former railroad worker who goes by the Klan name Ray Larsen, to take over as the next imperial wizard. Under Loy's leadership, the National Knights continued to hold rallies at the group's new headquarters outside of South Bend, Ind. But unlike in the past, attendance at these events was sparse. Just 35 supporters showed up for a May 5, 2001, rally, for instance, while over 200 people attended a nearby counter-protest, according to the South Bend Tribune. Even worse than the low turnouts, these events often proved embarrassing for National Knights, leading to tangles with the law. After the 2001 rally was over, as police escorted the Klan members to their cars and away from the counter-protesters, Klansmen could not remember where they parked. In the confusion, a fight with counter-protesters began that resulted in eight arrests, including that of Loy's son, Grand Dragon (or state leader) Richard Loy. It didn't stop there. Local newspaper coverage of the rally used the elder Loy's real name instead of his preferred alias, Ray Larsen. After Loy allegedly called a reporter, demanding that she use his alias and asking where she lived, he was charged with misdemeanor telephone harassment. Then, the next month, two sheriff's deputies in Williamson County, Texas, were fired after they tried to recruit a fellow officer with an application touting "White Supremacy." Dept. David Gay, 44, and Sgt. Greg Palm, 29, had both worked for the sheriff's office for more than four years. The National Knights really lived up to their "Keystone Kops" reputation when Railton and Richard Loy hosted what was widely billed as a "Christmas unity rally" on Dec. 8, 2002, at the younger Loy's Osceola, Ind., farm. They hoped to bring together various factions of the contentious world of professional racists, and indeed, they drew members of two far larger groups — the American Knights of the Ku Klux Klan and the Aryan Nations, which sent its then-propaganda chief, August Kreis. Close to 50 people gathered for the Saturday afternoon dinner and cross burning. As hungry racists filed into the shed where food was being served, it quickly became apparent that the Loys had forgotten a critical fact: Large numbers of Klansmen are followers of Christian Identity, a racist and anti-Semitic theology that holds that Jews are biologically Satanic and whites are the true Israelites — meaning, according to Identity adherents' reading of the Bible, that whites can't eat pork. When guest Klansmen strolled into the shed and were confronted by a dead pig that by all accounts was barely cooked, several Klansmen and Aryan Nations members recoiled with horror. The situation became even more ridiculous. As the gathered haters circulated and clucked about the culinary faux pas — and while a red-suited "Klanta Klaus" worked the crowd nearby — some got to wondering why Rick Loy had a badly swollen lip and two missing front teeth. Soon enough, the story came out, provoking a fresh round of mirth. After being presented with a riot shield that was alleged to be bulletproof, Loy had apparently decided to put the matter to a test, firing a round into the shield at close range. Unsurprisingly, the bullet ricocheted off the shield — which stood up to the tryout admirably — and hit Loy in the mouth. Things got worse still. As the climactic moment of the afternoon arrived, Klansmen struggled to set up a giant swastika to burn. It collapsed on the ground. Finally, the Nazi symbol was burned where it lay. Then it was time for the cross. It quickly became apparent that it wasn't going to be possible to get the cross upright for burning — at least not the way it had been constructed. In the end, someone had the bright idea of sawing about 12 feet off the wooden cross' bottom, after which it, too, was finally lit. Not long afterward, the rally then came to an end, and its embarrassed participants headed for home. Despite its sometimes comical stumbles, the National Knights remains a potentially violent and dangerous group. This fact became obvious on Jan. 1, 2003, when Glen Gautier, a member of the National Knights, confessed to authorities his role in the brutal murder of another Klan member. By his own account, Gautier, who was 50 at the time, had carried out the killing with three other members of two separate but allied Klan chapters, or "klaverns," that roamed the backwoods of semi-rural central North Carolina in 2001, stealing guns, making bombs, plotting murders, and carrying out at least one. His confession triggered parallel state murder and federal gunrunning cases, which have since dragged on for years. In the end, two members of the National Knights pleaded guilty in 2006 to charges in connection with a plot to blow up the Johnston County, N.C., courthouse and kill Sheriff Steve Bizzell, and were sentenced to a year in federal prison after cooperating with authorities. Two months later, in December, a judge found Klan boss and alleged ringleader Charles Barefoot incompetent to stand trial for orchestrating the murder of a fellow Klansman suspected of informing to police. 1NC -- Serial Killers Do the plan except for serial killers Raue 13 (Tom, leader on a U.S. Union Board, “Tearing down the walls,” October 22, 2013, http://honisoit.com/2013/10/tearing-down-the-walls/)//ghs-VA A focus on social programs and wealth redistribution would prevent many crimes, and a system focused on rehabilitation rather than punishment would prevent minor criminals becoming serious ones. However, when it comes to very serious crimes, it is hard to see alternatives to a prison system. Educating people about respect and consent is a better approach to rape prevention than punishment after the fact, but some people will never get the message. Most murderers can be rehabilitated, but there are rare serial killers who will always commit violence if they are left to their own devices. David stresses that prisons do more harm than good for most prisoners, but that there are some “career criminals” who are “unimaginable in society”. 1NC -- Police Officers Plan except for cops convicted of police brutality Vitale 15 (Alex S, associate professor of sociology at Brooklyn College, “2 Very Different Ways to Punish Killer Cops,” MAY 5, 2015, http://www.thenation.com/article/two-very-different-ways-punishkiller-cops/)//ghs-VA Sending killer cops to jail will undoubtedly produce a kind of short-term catharsis for the many victims of police misconduct and those that support them. It may produce some sense of much needed justice for the family and friends of Freddie Gray, but will it really make them any safer or reduce the power or predilections of police to go on victimizing poor people of color? There will also likely be some kind of short-term deterrent effect; officers will certainly start properly seat-belting prisoners they are transporting. But it is unlikely to bring an end to mass criminalization and the disrespect and violence that inevitably go with it. We cannot have a kinder and gentler war on drugs, crime, and disorder. 2NC --- KKK 2NC---Solvency Overview The counterplan solves the case -- the basis of their deconstruction argument is that black people are always paradigmatically seen as criminal – the counterplan resolves the petty crime justification which their Alexander evidence identifies as the core reason black people are able to be locked up but doesn’t allow those who commit acts of racial violence free. 2NC -- Serial Killers 2NC---Solvency Overview The counterplan solves the case – the basis of their deconstruction argument is that black people are always paradigmatically seen as criminal – the counterplan resolves the petty crime justification which their Alexander evidence identifies as the core reason black people are able to be locked up. 2NC -- Police Officers 2NC---Solvency Overview The counterplan solves the case -- we let those who have historically been surveilled out of jail and keep those who surveil and have enacted violence on marginalized bodies from causing more violence 2NC -- George Zimmerman Zimmerman shouldn’t get released -- some people deserve to stay in jail Jalen 13 (JV, blogger located in California, “The Zimmerman Trial Through An Abolitionist Lens,” 712-2013, http://www.postbourgie.com/2013/07/12/the-zimmerman-trial-through-an-abolitionistlens/)//ghs-VA Dead weight seems to hang in the air as we wait for the verdict in the trial of George Zimmerman. My fears and hopes feel hinged on each shallow exhale as I sit at the kitchen table, sifting through articles, nibbling oatmeal, talking heads muted. Like many people I know, I’ve been angry. The murder of Trayvon Martin has been about a young person who was presumed suspicious, followed, and shot in the chest on his way back to his father’s house after stepping out for a snack. It is surely about that. But it has also been about black men everywhere who are read as a threat. It has been about the ease with which the police took Zimmerman’s word when he said he acted in selfdefense, and those weeks he lived regular life after having murdered someone in cold blood. It’s especially about these facts when considered in relationship to how many black and brown people go to prison for comparatively minuscule reasons: shoplifting a candy bar, driving a little bit fast, firing a warning shot during an abusive encounter. We have consistently been told that this is “not about race,” perhaps strategically, perhaps not. But of course — in a country where there is a $2 million bounty on the head of a black woman for allegedly killing a police officer, while a police officer who participated in the harassment and murder of a black man in front of the world on a BART platform is serving in the army — it is about race. However, it’s about race in ways other than the egregious dissimilarities between treatment of black life and white life. It’s also about the colors of the punishment system, and how we think through our relationship to it as a whole. As a person who is against the carceral state, I have struggled with my feelings about the Zimmerman trial. If I truly believe in prison abolition, then it cannot, seemingly, be a sometimes commitment. As I await the jury, heart in stomach, I am trying to think about how this whole situation could have gone differently through an abolitionist lens. What if, when people became outraged that Zimmerman was “roaming free,” they had demanded transformative justice rather than arrest? What if, rather than sitting there dopily, George Zimmerman would have had to explain himself to Tracy Martin and Sybrina Fulton? A friend of mine who advocates community conflict resolution, even to the point of violence, suggests George Zimmerman deserved to get whatever may or may not have come to him without state intervention. Are these our alternatives? What do we want? It feels easier to think about prison abolition when we confront all the damage the punishment system — which includes laws, their enforcement, and the multiple institutions and relationships involved in those practices — does to people’s lives. As the United States is home to 5% of the world’s population and 25% of the world’s prison population, the severity of the problem is blatant. As we consider the disproportionate number of black and brown people who are targeted by surveillance and other punitive procedures, the violence is clear. But if we also acknowledge that the institution itself cannot be redeemed, then that means working against its domination, even — and particularly — in cases like Zimmerman’s, when we may not be sympathetic to the potentially incarcerated. Everyday abolition has to be about thinking of ways to address conflict and harm outside of the punishment system, on a regular basis. I’m asking you to think with me about the ways that this may be possible. If George Zimmerman is convicted, perhaps there will be a moment of joy for a lot of people across the country: here, this apparently unapologetic man who murdered a teenage boy, will be locked away for some years. He will, maybe, feel regret or fear or hurt in prison. But, for each George Zimmerman, how many black, brown, trans, gender noncomforming, undocumented, or homeless people will also be locked away? And for what we might deem far lesser reasons? How many people with disabilities or medical needs will be confined to some kind of institution, be it called a prison or a hospital? Privacy Amendment CP 1NC 1NC Shell Text: The United States federal government should propose an amendment to the Constitution expressly guaranteeing the right to informational privacy A constitutional amendment builds on state momentum to ordain privacy as a fundamental right – only this prevents circumvention by resulting in strict judicial scrutiny Jeffrey M. Shaman 6, B.A. from the Pennsylvania State University, J.D. from the University of Southern California, and LL.M. from Georgetown University, where he was a Keigwin Graduate Fellow. teaches Constitutional Law, State Constitutional Law, and First Amendment Freedom of Speech, member of the American Law Institute, the American Society of Legal History, and the U.S. Association of Constitutional Law, 2006, “THE RIGHT OF PRIVACY IN STATE CONSTITUTIONAL LAW”, p.1010-1012, http://org.law.rutgers.edu/publications/lawjournal/issues/37_4/Shaman.pdf) ****states say yes – will pass Whatever theory is used to formulate it, the right of privacy must be connected to a constitutional provision in order to have status as a constitutional right. In the federal system, the right of privacy, at one time located within the penumbra emanating from several constitutional provisions,278 has been established as an aspect of “liberty” within the protection of the Due Process Clause of the Fourteenth Amendment.279 In the state systems, a variety of provisions have been evoked as the constitutional source of the right of privacy. A number of states have ruled that a right of privacy is encompassed by the protection of “liberty” afforded by a due process clause, a law of the land clause, or other constitutional provisions that forbid the exercise of arbitrary power over individual liberty.280 In fact, the term “privacy” frequently is used interchangeably with the term “liberty,” and courts regularly have turned to constitutional guarantees of liberty to embrace the right of privacy.281 State constitutional guarantees of equality also may be relied on as a source of protection for the right of privacy. In some states, a right of privacy has been found implicit in constitutional provisions declaring, “All persons are by nature free and independent, and have certain natural and inalienable rights,”282 or stating, “The enumeration of rights in this constitution shall not be construed to deny or impair others retained by, and inherent in, the people.”283 In more recent times, five states have amended their constitutions to expressly guarantee the right of privacy.284 Finally, as described before, some states have declined to tie the right of privacy to a single specific constitutional provision, preferring instead to use the penumbra theory to designate privacy as an animating value that underlies different parts of the state constitution.285 The enactment of constitutional provisions expressly guaranteeing a right of privacy has the effect of ordaining privacy as a fundamental right. Privacy may also be endowed as a fundamental right by recognizing it as such under a more general constitutional provision, such as a provision guaranteeing that liberty may not be denied arbitrarily or without due process of law. While fundamental rights are not absolute, they may not be restricted unless the government can demonstrate that it has extremely strong justification for doing so. Any law that impinges upon a fundamental right will be subject to strict judicial scrutiny and will be struck down unless the government can show that the law is necessary to accomplish a compelling state interest. Strict scrutiny is one of three methods that the courts use to review the constitutionality of legislation. At the other extreme lies minimal scrutiny— sometimes referred to as “rationality review” because it requires only that legislation possess a modicum of rationality to be constitutional. Under minimal scrutiny, legislation is presumed constitutional and will not be struck down unless shown to bear no rational relationship to any legitimate state interest. In practice, there are two varieties of minimal scrutiny, the most common of which is completely deferential to the legislature and reduces minimal scrutiny to virtually no scrutiny at all, providing nothing more than a pretense of rationality to legislation. The other form of minimal scrutiny, which makes an occasional appearance, also is deferential, but not completely so. It renders the review of legislation a bit more genuine. Strict scrutiny is not the only tier of heightened intermediate scrutiny operates somewhere between strict and minimal scrutiny. While strict scrutiny starts off with a finger on one side of the scale and minimal scrutiny starts off with a judicial review; an intermediate tier also exists. As its name indicates, finger on the other side of the scale, intermediate scrutiny supposedly starts off with an equal balance. While strict scrutiny asks if there is a compelling state interest and minimal scrutiny asks only if there is a valid state interest, intermediate scrutiny asks for something in between—an important or substantial state interest. While strict scrutiny asks if the legislative means are absolutely necessary to accomplish the ends, and minimal scrutiny asks only if the means are reasonably related to the ends, intermediate scrutiny requires a close, though not perfect, fit between the means and ends of legislation. Minimal scrutiny operates by granting deference to the legislature, but under strict or intermediate scrutiny such deference is inappropriate either because the legislation under review is tainted by a suspicious property (such as racial or gender bias) or because it impinges upon the exercise of a basic right (such as the right to vote) of constitutional magnitude—in other words, a fundamental right. Hence, the designation of privacy as a fundamental right, either expressly or implicitly, is extremely consequential because it brings into play strict judicial scrutiny of legislative action. Once privacy is recognized as a fundamental right within the protection of strict scrutiny, it then becomes extremely important to define the right of privacy to determine exactly what activities it encompasses, which accordingly will be entitled to the highest degree of constitutional protection. 2NC 2NC Solvency The CP is key to protecting the right to privacy Jeffrey Rosen 14, an American academic and commentator on legal affairs, “Madison’s Privacy Blind Spot,” 1/18/14, http://www.nytimes.com/2014/01/19/opinion/sunday/madisons-privacy-blind-spot.html?_r=0 In practice, the neo-Madisonian distinction between surveillance by the government and surveillance by Google makes little sense. It is true that, as Judge Pauley concluded, “People voluntarily surrender personal and seemingly private information to transnational corporations which exploit that data for profit. Few think twice about it.”¶ But why? Why is it O.K. for AT&T to know about our political, religious and sexual associations, but not the government?¶ You might say there is a difference between political and cultural information. If the government knows you attended a Rand Paul rally, it could punish you by auditing your tax returns. But if AT&T knows, it might send you an ad for a Tea Party Tax Day protest. ¶ That distinction is unconvincing. Once data is collected by private parties, the government will inevitably demand access.¶ More fundamentally, continuously tracking my location, whether by the government or AT&T, is an affront to my dignity. When every step I take on- and off-line is recorded, so an algorithm can predict if I am a potential terrorist or a potential customer, I am being objectified and stereotyped, rather than treated as an individual, worthy of equal concern and respect.¶ Justice Louis Brandeis, the greatest defender of privacy in the 20th century, recognized this when he equated “the right to be let alone” with offenses against honor and dignity.¶ What Americans may now need is a constitutional amendment to prohibit unreasonable searches and seizures of our persons and electronic effects, whether by the government or by private corporations like Google and AT&T.¶ Perhaps even Madison, who unsuccessfully proposed a preamble to the Constitution declaring “that all power is originally rested in, and consequently derived from the people,” and that all people have basic natural rights, including “the enjoyment of life and liberty” and the right of “pursuing and obtaining happiness and safety,” might have realized that our rights to enjoy liberty, and to obtain happiness and safety at the same time, are threatened as much by corporate as government surveillance.¶ In any event, it is clear that, to keep us secure against the 21st-century version of the general warrants that so alarmed Madison and the other founders, America needs a robust debate about amending the Constitution to meet the exigencies of our electronic age.¶ There must be a change in current legislation to safe guard privacy. It’s the only way to protect fundamental rights David Wright 13, Trilateral founder and Managing Partner, “Integrating privacy and ethical impact assessments,” 2013, http://web.a.ebscohost.com.turing.library.northwestern.edu/ehost/detail/detail?sid=19dc2617-dc92-4b65-aedea9c94253e4fc%40sessionmgr4005&vid=2&hid=4112&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=a9h&AN=92875759 ,2013 One important point to derive from the above discussion is that privacy and ethics are somewhat intertwined. Privacy is both a fundamental right as well as an ethical issue. This intertwining makes it plausible, and even desirable or ne- cessary, to assess privacy risks and ethical issues together. In addition to the intertwining of privacy and ethics, tech- nology and privacy have also been two intertwined notions that must be addressed together.2 Technology is a social practice embodying the capacity of societies to transform themselves by creating the possibility to create and ma- nipulate not only physical objects, but also symbols, cultural forms and social relations. In turn, privacy de- scribes a vital and complex aspect of these social relations. Thus, technology influences people’s understanding of privacy, and people’s understanding of privacy is a key factor in defining the direction of technological develop- ment. Either policy-making takes this rich and nuanced interplay between technology and privacy into account, or we run the risk of failing to govern the current, concomitant, technology and privacy revolution. With the ‘technology revolution(s)’ of the last decades (ranging from the internet to genetics), the notion of privacy has started a new journey. For instance, there is R&D on information and communication technologies (ICT) implants, with which it becomes possible that a technologically ‘enhanced’ body communicates with nearby computers and exchanges data (Bo¨ hle et al. 2013). There are scientific development in genomics and proteomics that call for reconsidering the concept of ‘personal information’ (Taylor 2012), not to mention issues raised by technologies such as biometrics, smart sur- veillance systems and neurotechnology (Finn et al. 2011). However, it becomes clear that many of the privacy problems produced by new technologies can no longer be adequately assessed and addressed with revised data pro- tection approaches alone. With the advent of new technologies such as next-generation biometrics, DNA sequencing and human enhancement technologies, the data being collected moves from simply describing a person to being an inherent part of the person (Hallinan et al. 2013). All these challenges make it necessary not only to broaden data protection procedures and regulations but also to take other human values and rights into account to support policy-makers and decision-takers to better balance countervailing interests. Constitution solves, legislature failure Elbert Lin 2, Solicitor General of West Virginia, June 2002 “Prioritizing Privacy: A Constitutional Response to the Internet” Berkeley Technology Law Journal Volume 17 | Issue 3 Article 5, http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1383&context=btlj) A constitutional right would also avoid many of the criticisms surrounding statutory solutions. Critics consider the mandatory, top down approach of statutes stifling and overbearing. 222 Others argue a statute would be crippled by its inapplicability to new technologies. 22 3 Statutes are also easily swept aside by a changing public sentiment 2 94 and unable to compensate for other important values, such as the First Amendment.225 In contrast, the decision to invoke one's constitutional right ultimately lies with the individual. Constitutional protections are not tied to specific technologies; their applicability is based on judicial interpretation and thus can 226 adapt to new technologies. Finally, one of the greatest advantages of a constitutional right is that it is permanent and inalienable, solid against fickle public sentiment, 227 but that beyond a certain point, its scope is sub- 228 ject to judicial interpretation. This has allowed major constitutional rights, such as the First Amendment and the Establishment Clause, to coexist. 229 2NC AT: Courts Key The Supreme Court is a mess – they’re political flip-floppers that are too ambivalent to ensure a decisive ruling Shaman 6 Jeffrey M. , B.A. from the Pennsylvania State University, J.D. from the University of Southern California, and LL.M. from Georgetown University, where he was a Keigwin Graduate Fellow. teaches Constitutional Law, State Constitutional Law, and First Amendment Freedom of Speech, member of the American Law Institute, the American Society of Legal History, and the U.S. Association of Constitutional Law, 2006, “THE RIGHT OF PRIVACY IN STATE CONSTITUTIONAL LAW”, p.984-987, http://org.law.rutgers.edu/publications/lawjournal/issues/37_4/Shaman.pdf) On occasion, the Court has turned to the past as a source of fundamental rights. Thus, in Moore v. City of East Cleveland, a 1977 decision, the plurality opinion concluded that the right to live together in an extended family was fundamental because it was a liberty “deeply rooted in this Nation’s history and tradition.”87 Some years later, a reluctant majority of the Court would again look to history in order to “assume” that under the Due Process Clause, an individual possessed a right to bodily integrity, which encompassed the right to refuse unwanted medical treatment.88 History, though, can be a double-edged sword, wielded either to accept rights on the basis of their historical pedigree or reject them on the ground that they are not firmly established in our history and tradition. An example of the latter occurred in a 1989 decision, Michael H. v. Gerald D., ruling that a biological father did not have a right to visit his child because no such right could be found in the traditions of our society. 89 And in Washington v. Glucksberg, the Court ruled an individual did not have a right to physician-assisted suicide, once the Court countenanced a different aspect of privacy by ruling, in Stanley v. Georgia, that the private possession of obscene material cannot constitutionally be made a crime, even though distribution of the material may be proscribed.91 The decision in Stanley was based on the First Amendment again because none could be found in the traditions of our society.90 In 1969, right of an individual to receive information and ideas which, in the Court’s view, takes on an added dimension in the privacy of a person’s own home.92 As the Court put it, “If the First Stanley recognized that the concept of privacy may comprehend a spatial element involving sanctity of the home, an interest related to, though not the same as, the right of individual autonomy.94 In a case involving another component of the First Amendment, freedom of association, the Court Amendment means anything, it means that a State has no business telling a man, sitting alone in his own house, what books he may read or what films he may watch.”93 Thus, suggested that because the Bill of Rights was designed to secure individual liberty, it should afford substantial protection for the formation and preservation of “certain kinds of highly personal relationships.”95 As the Court explained, the constitutional shelter granted to these relationships reflects the realization that individuals draw much of their emotional enrichment from close ties with others. “Protecting these relationships from unwarranted state interference therefore safeguards the ability independently to define one’s identity that is central to any concept of liberty.”96 Regard for personal relationships or the sanctity of the home, however, was shunted aside in Bowers v. Hardwick, a 1986 decision, in which the Court once again turned to history to cut short the reach of the Due Process Clause, ruling by a vote of 5-4, that the right of privacy does not encompass the right of a consenting adult to engage in homosexual conduct, even in the privacy of his or her home.97 In upholding the constitutionality of a Georgia criminal law prohibiting sodomy, the majority opinion drew a strict distinction “between family, marriage, or procreation on the one hand and homosexual activity on the other.”98 Taking a historical approach to constitutional such a right was neither “deeply rooted in this Nation’s history and tradition”99 nor “implicit in the concept of ordered liberty.”100 Seventeen years later, however, Bowers was overruled by a 6-3 majority in Lawrence v. Texas, in which the Court held that a Texas sodomy statute making it a interpretation, the Court refused to give constitutional countenance to a right to engage in homosexual conduct because, in the Court’s reading of history, crime for two persons of the same sex to engage in intimate sexual relations was a violation of the Due Process Clause.101 Indeed, in Lawrence, not only did the Court decisively overrule Bowers, 102 it also apologized for it, saying that Bowers was unjustly demeaning to gay and lesbian persons.103 And the Court devoted a good part of its opinion in Lawrence to explaining why it believed that Bowers had been wrongly decided.104 In Lawrence, the Court dismissed the historical approach that had been taken in Bowers, noting that the historical record was more complex than understood in Bowers, and that the Court’s historical analysis in Bowers was open to considerable doubt.105 More importantly, the Court thought that the Bowers majority did not take sufficient account of more recent historical developments: “In all events we think that our laws and traditions in the past half century are of most relevance here.”106 Significantly, that more recent tradition showed an emerging awareness that liberty provides substantial protection to adult persons in deciding how to conduct their private lives in matters pertaining to sex.107 In other words, more recent history showed a trend toward recognizing that the sexual life of consenting adults was a private matter that should be beyond the realm of state authority, at least state criminal authority.108 The Court further explained that the liberty component of the Due Process Clause protects persons from unwarranted government intrusions into a dwelling or other private places and also protects other spheres of our lives and existence, outside the home, where the State should not be a dominant presence.109 The Court affirmed that “Freedom extends beyond The instant case involves liberty of the person both in its spatial and more transcendent dimensions.”110 Quoting Casey, the Court once again spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct. proclaimed, “These matters, involving the most intimate and personal choices a person may make in a lifetime, choices central to personal dignity and autonomy, arecentral to the liberty protected by the Fourteenth Amendment.”11 The Supreme Court has yet to develop a consistent theory to determine the scope of the right of privacy under the Fourteenth Amendment. Today, some of the Justices on the high Court believe in adhering strictly to an historical approach which encompasses only those rights that are “deeply rooted in this Nation’s history and tradition” or “implicit in the concept of ordered liberty.”112 Other Justices, though, are more forward looking; they see history as an ongoing phenomena and constitutional interpretation as an evolving process that comprehends the recognition of new rights that are central to personal dignity and autonomy. Although the right of privacy is firmly established as a fundamental right under the Fourteenth Amendment to the Federal Constitution, the Supreme Court remains ambivalent about the right of privacy, embracing it with fervor in one case, rejecting it in another. As a result, the Court’s decisions concerning privacy are marked by inconsistency, leaving the scope of the right of privacy under the Federal Constitution far from certain. Courts and existing amendment reinterpretations fail Nicole Tutrani 10, Law Clerk to the Honorable Henry Coke Morgan, Jr. at the Eastern District of Virginia, “The “Right to Privacy” and its Constitutional Evolution: The Ninth and Fourteenth Amendments”, November 20, 2010, https://www.regent.edu/admin/stusrv/writingcenter/docs/APSA7thedSamplePaper(PoliticalScienceStudentWriter'sManual).pdf) In summation, most twentieth-century Supreme Court opinions regarding the “right to privacy” as derived from the Ninth are inherently flawed. The original intent of both the Ninth and Fourteenth Amendments do not allow for the liberties the Court has taken in their interpretation. The Ninth Amendment, which was intended to protect the states against a latitude of governmental interpretation, has instead become the Supreme Court’s perpetual grab bag of rights in the service of changing social morality. As a states’ rights amendment, provisions from the Ninth Amendment are also logically un-incorporable to the states through the Fourteenth. Decisions, such as Amendment Griswold v. Connecticut, Roe v. Wade, and Lawrence v. Texas are prime examples of how the original meaning of these amendments has been ignored. Although it is not unreasonable to assume a “right to privacy” as provided for by the first eight amendments, recent interpretations of this right have resulted in an incredibly flawed body of case law. It would seem that the Constitution is evolving in such a way that it no longer protects the peoples’ liberty; rather, it answers their demands for the expansion of license based on an ever-changing social order. 2NC AT: Perm Do Both Perm Do Both – still links to the net benefit – any inclusion of court action means _________________ is triggered. 2NC AT: Circumvention/Rollback Amendments won’t be rolled back or circumvented -also a solvency deficit to aff Vermeule 4 Adrian , John H. Watson Professor of Law, “Constitutional Amendments and the Constitutional Common Law”, University of Chicago Public Law & Legal Theory Working Paper No. 73, 2004, http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1072&context=public_law_and_legal_theory, AB) On this view, it is an illusion that constitutional common law incurs lower decision costs in the long run , even if a given change may be more easily implemented through adjudication in the short run. Although at any given time it is less costly to persuade five Justices to adopt a proposed constitutional change than to obtain a formal amendment to the same effect, the former mode of change incurs higher decision costs over time, because common-law constitutionalism allows greater conflict in subsequent periods. A benefit of formal amendments, then, is to more effectively discourage subsequent efforts by constitutional losers to overturn adverse constitutional change. Precisely because the formal amendment process is more costly to invoke, formal amendments are more enduring than are judicial decisions that update constitutional rules;83 so losers in the amendment process will less frequently attempt to overturn or destabilize the new rules, in subsequent periods, than will losers in the process of common-law constitutionalism. This point does not necessarily suppose that dissenters from a given amendment come to agree with the enacting supermajority’s judgment, only that they accept the new equilibrium faute de mieux. Obviously more work might be done to specify these intuitions, but it is at least plausible to think that the simplest view, on which formal amendments incur decisionmaking costs that exceed their other benefits, is untenably crude. The overall picture, rather, is a tradeoff along the following lines. Relative to common-law constitutionalism, the Article V process requires a higher initial investment to secure constitutional change. If Mueller is right, however, constitutional settlements produced by the Article V process will tend to be more enduring over time than is judicial updating, which can be unsettled and refought at lower cost in subsequent periods. SSRA PICs Amash-Conyers CP Note Use all relevant cards from the terror da to make this CP work. Make sure to add a plank to the counterplan to solve internet if that advantage is read. There are a bunch of other aff answers that apply already in the terror da file. 1nc CP Text: The United States federal government should establish a prohibition on government required electronic surveillance backdoors pass the Amash-Conyers amendment to Defense Appropriations (insert advantage counterplan to internet) The Counterplan limits the collection of domestic-domestic calls but allows domestic-foreign calls Martin 13 [Kate Martin, Director, Center for National Security Studies. 7/23/13, “Amash-Conyers amendment to Defense Appropriations to stop bulk collection of Americans’ telephone metadata.” http://democrats.judiciary.house.gov/sites/democrats.judiciary.house.gov/files/images/CNSSAnalysis.pdf/ /jweideman] The Amash-Conyers amendment would prohibit the NSA from bulk collection of telephone meta-data on Americans under section 215 of the Patriot Act, 50 U.S.C. 1861. (The text is below.) • The NSA would still be permitted to use section 215 to obtain the telephone metadata on any American who is the subject of an investigation “to protect against international terrorism or clandestine intelligence gathering activities.” As Representative Sensenbrenner has pointed out, Congress never intended to authorize the bulk collection of Americans’ telephone meta-data under section 215 when it required that the tangible things sought under 215 be limited to those relevant to an authorized investigation. • Restoring Congress’ original understanding of the limits of 215 by enacting the Amash-Conyers amendment would still leave the NSA and FBI many means to obtain telephone meta-data on individual Americans. The FBI can use a National Security Letter to obtain such data in secret, including data on domestic to domestic calls without any court order. Section 702, the 2008 Foreign Intelligence Amendments Act, 50 U.S.C. 1881(a) also permits the bulk collection in real time of Americans’ overseas telephone calls (and emails) including the meta-data associated therewith, so long as the government is targeting foreigners abroad. And the penregister trap and trace authorities in the FISA also permit the real-time collection of telephone meta-data of Americans’ domestic to domestic calls. • The current bulk telephone meta-data collection was apparently begun as part of the NSA’s warrantless wiretapping programs under the previous administration. It apparently began with no court authorization. After public disclosure of the NSA program by The New York Times in December, 2005, the government apparently sought and received sometime in 2006 0r 2007, a FISA court order permitting the bulk collection of domestic telephone meta-data. • One of the key features of this program is that it allows the collection of meta-data on all of Americans’ domestic to domestic phone calls – not just domestic to foreign calls – and the creation of a database of such calls. One of its key uses apparently is to do “chain-link” analysis for 3 hops for each number which the database is queried about. While the NSA has repeatedly stated that it only queries the 215 domestic call database 300 times a year, each one of those queries apparently asks for all the phone numbers of individuals 3 hops away from the original suspect–an enormous number of Americans with no connection to terrorism (Testimony of John C. Inglis, Deputy Director, National Security Agency, House Judiciary Committee, July 17, 2013). As The Washington Post reported, General Alexander apparently determined that the way to provide intelligence support to American troops fighting in Iraq was to collect every minute piece of information about everyone there. “Rather than look for a single needle in the haystack, his approach was, ‘Let’s collect the whole haystack,’” . . . “Collect it all, tag it, store it. . . . (“For NSA chief, terrorist threat drives passion to ‘collect it all,’ observers say,” Ellen Nakashima and Joby Warrick, The Washington Post, July 14, 2013) Solves terrorism Executive Office 13 [Administration White Paper. August 9, 2013. “BULK COLLECTION OF TELEPHONY METADATA UNDER SECTION 215 OF THE USA PATRIOT ACT “ http://fas.org/irp/nsa/bulk-215.pdf//jweideman] One of the greatest challenges the United States faces in combating international terrorism and preventing potentially catastrophic terrorist attacks on our country is identifying terrorist operatives and networks, particularly those operating within the United States. Detecting threats by exploiting terrorist communications has been, and continues to be, one of the critical tools in this effort. It is imperative that we have the capability to rapidly identify any terrorist threat inside the United States. One important method that the Government has developed to accomplish this task is analysis of metadata associated with telephone calls within, to, or from the United States. The term “metadata” as used here refers to data collected under the program that is about telephone calls but does not include the content of those calls. By analyzing telephony metadata based on -3- telephone numbers or other identifiers associated with terrorist activity, trained expert analysts can work to determine whether known or suspected terrorists have been in contact with individuals in the United States. International terrorist organizations and their agents use the international telephone system to communicate with one another between numerous countries all over the world, including to and from the United States. In addition, when they are located inside the United States, terrorist operatives make domestic U.S. telephone calls. The most analytically significant terrorist-related communications are those with one end in the United States or those that are purely domestic, because those communications are particularly likely to identify suspects in the United States—whose activities may include planning attacks against the homeland. The telephony metadata collection program was specifically developed to assist the U.S. Government in detecting communications between known or suspected terrorists who are operating outside of the United States and who are communicating with others inside the United States, as well as communications between operatives within the United States. In this respect, the program helps to close critical intelligence gaps that were highlighted by the September 11, 2001 attacks Nuclear terror is feasible and likely – high motivation Matthew Bunn 15, Professor of Practice at Harvard University's John F. Kennedy School of Government, Nickolas Roth, Research Associate at the Project on Managing the Atom in the Belfer Center for Science and International Affairs at Harvard Kennedy School, “Reducing the risks of nuclear theft and terrorism,” from Routledge Handbook of Nuclear Proliferation and Policy ed. Joseph F. Pilat and Nathan E. Busch, 5/15/15, pp. 419-420 But we now live in an age that includes a few groups intent on inflicting large-scale destruction to achieve more global objectives. In the 1990s, the japanese terror cult Anni Shinrikyo first sought to buy nuclear weapons in Russia, then to make them themselves, before turning to biological weapons and the nerve gas they ultimatelv used in the Tokyo subways.¶ Starting also in the 19905, al Qaeda repeatedly sought nuclear materials and the expertise needed to make them into a nuclear bomb. Ultimately, al Qaeda put together a focused program reporting directly to Ayman al-Zawahiri (now head of the group), which progressed as far as carrying out crude but sensible conventional explosive tests for the nuclear program in the desert of Afghanistan.‘ ¶ The killing of Osama bin Laden and the many other blows against al Qaeda have surely reduced the risk that al Qaeda could put together and carry through a nuclear bomb project. But by how much? The core organization of al Qaeda has proved resilient in the past.There is every reason to believe Al-Zawahiri remains eager to inflict destruction on a nuclear scale. Indeed, despite the large number of al Qaeda leaders who have been killed or captured, nearly all of the key players in al Qaeda’s nuclear program remain alive and at large - including Abdel Aziz al-Masri, an Egyptian explosives expert who was al Qaeda’s “nuclear CEO." No one knows what capabilities a secret cell of al Qaeda may have managed to retain or build. And regional affiliates and other groups in the broader violent Islamic extremist movement — particularly some of the deadly Pakistani terrorist groups — may someday develop the capability and intent to follow a similar path.¶ North Caucasus terrorist groups sought radiological weapons and threatened to sabotage nuclear reactors.There is significant, though less conclusive, evidence that they sought nuclear weapons as well — particularly confirmation from senior Russian officials that two teams were caught carrying out reconnaissance at Russian nuclear weapon storage sites, whose very locations are a state secret.¶ More fundamentally, with at least two, and probably three, groups having gone down this path in the past twenty-five years, there is no reason to expect they will be the last. The danger of nuclear terrorism will remain as long as nuclear weapons, the materials needed to make them, and terrorist groups bent on large-scale destruction co-exist. Terrorism causes extinction---hard-line responses are key Nathan Myhrvold '13, Phd in theoretical and mathematical physics from Princeton, and founded Intellectual Ventures after retiring as chief strategist and chief technology officer of Microsoft Corporation , July 2013, "Stratgic Terrorism: A Call to Action," The Lawfare Research Paper Series No.2, http://www.lawfareblog.com/wp-content/uploads/2013/07/Strategic-Terrorism-Myhrvold-7-32013.pdf Several powerful trends have aligned to profoundly change the way that the world works. Technology ¶ now allows stateless groups to organize, recruit, and fund ¶ themselves in an unprecedented fashion. That, coupled ¶ with the extreme difficulty of finding and punishing a stateless group, means that stateless groups are positioned to be ¶ lead players on the world stage. They may act on their own, ¶ or they may act as proxies for nation-states that wish to ¶ duck responsibility. Either way, stateless groups are forces ¶ to be reckoned with.¶ At the same time, a different set of technology trends ¶ means that small numbers of people can obtain incredibly ¶ lethal power. Now, for the first time in human history, a ¶ small group can be as lethal as the largest superpower . Such ¶ a group could execute an attack that could kill millions of ¶ people. It is technically feasible for such a group to kill billions of people, to end modern civilization—perhaps even ¶ to drive the human race to extinction. Our defense establishment was shaped over decades to ¶ address what was, for a long time, the only strategic threat ¶ our nation faced: Soviet or Chinese missiles. More recently, ¶ it has started retooling to address tactical terror attacks like ¶ those launched on the morning of 9/11, but the reform ¶ process is incomplete and inconsistent. A real defense will ¶ require rebuilding our military and intelligence capabilities from the ground terrorism has ¶ received relatively little attention in defense agencies, and ¶ the efforts that have been launched to combat this existential threat seem fragmented.¶ History suggests what will happen. The only thing that shakes America out of complacency is a direct threat from a determined adversary that confronts us with our shortcomings by repeatedly attacking us or hectoring us for decades. up. Yet, so far, strategic AT: Circumvention/perception Solves perception and no No circumvention—oversight, accountability, and legally limiting MPAC 13 [Muslim Public Affairs Council. Non-profit interest group. 6/24/13, “Amash-Conyers Amendment: Opportunity for Transparency” http://www.mpac.org/programs/governmentrelations/amash-conyers-amendment-opportunity-for-transparency.php//jweideman] The amendment seeks to end the NSA’s blanket surveillance on American citizens’ telephone records unless there is an active investigation open. The amendment ends the blanket collection by: No longer authorizing the government to hold a pool of metadata on every phone call of every American; Permitting the government to continue to acquire business records and other “tangible things” that are actually related to an authorized counterterrorism investigation, and; Imposing more robust judicial oversight on NSA’s surveillance in order to make sure the NSA does not violate Americans’ civil liberties. President Barack Obama’s Press Secretary Jay Carney responded to the amendment by opposing “the current effort in the House to hastily dismantle one of our intelligence community’s counterterrorism tools.” While the White House sees the amendment as a blunt approach to the issue and welcomes an “informed, deliberative and open process,” our nation has not yet been afforded the opportunity to debate the intelligence tool. national security and privacy concerns are very complicated and nuanced,” said Hoda Elshishtawy, MPAC’s Legislative and Policy Analyst. “When dealing with these concerns, Americans need to feel comfortable that an intelligence program like this has a transparent oversight process so that any misuse and abuse is avoided.” Support for open dialogue on surveillance comes from people on both sides of the aisle. Lee “Our Hamilton, Director of the Center on Congress at Indiana University recently wrote, “The Obama administration has said it welcomes a debate on these issues. But it has not enabled that debate: the discussion has been thrust upon the administration because of the recent leaks.” AT: CT Doesn’t Solve It’s try-or-die for counter-terrorism – empirics are meaningless in the context of prevention Rachel Brand 14, Senior Advisor to the U.S. Chamber Litigation Center and member of the Privacy and Civil Liberties Oversight Board, "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," 1/23/14, https://www.pclob.gov/library/215-Report_on_the_Telephone_Records_Program.pdf test for whether the program’s potential benefits justify its continuation cannot be simply whether it has already been the key factor in thwarting a previously unknown terrorist attack. Assessing the benefit of a preventive program such as this one requires a longer-term view.¶ The overwhelming majority of the data collected under this program remains untouched, unviewed, and unanalyzed until its destruction. But its immediate availability if it is needed is the program’s primary benefit. Its usefulness may not be fully realized until we face another large-scale terrorist plot against the United States or our citizens abroad. But if that happens, analysts’ ability to very quickly scan historical records from multiple service providers to establish connections (or avoid wasting precious time on futile leads) could be critical in thwarting the plot.¶ Evidence suggests that if the data from the Section 215 program had been available prior to the attacks of September 11, 2001, it could have been instrumental in preventing those attacks.693 The clear implication is that this data could help the government thwart a future attack. Considering this, I cannot recommend shutting down the program without an adequate alternative in place, especially in light There is no easy way to calculate the value of this program. But the of what I view to be the relatively small actual intrusion on privacy interests. Death counts don’t quantify efficacy – domestic surveillance confers numerous strategic benefits Elizabeth Cook 14, member of the Privacy and Civil Liberties Oversight Board, "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," 1/23/14, https://www.pclob.gov/library/215Report_on_the_Telephone_Records_Program.pdf Finally, I have a different view from the Board as to the efficacy and utility of the Section 215 program. Although the Report program might be valuable for reasons other than preventing a specific terrorist attack, the tone and focus of the Report make clear that the Board does believe that to be the most important (and possibly the only) metric. I consider this conclusion to be unduly narrow. Among other things, in today’s world of multiple threats, a tool that allows investigators to triage and focus on those who are more likely to be doing harm to or in the United States is both good policy and potentially privacy-protective. Similarly, a tool that allows investigators to more fully understand our adversaries in a relatively nimble way, allows investigators to verify and reinforce intelligence gathered from other programs or tools, and provides “peace of mind,” has value.¶ I purports to consider whether the would, however, recommend that the NSA and other members of the Intelligence Community develop metrics for assessing the efficacy and value of intelligence programs, particularly in relation to other tools and programs. The natural tendency is to focus on the operation of a given program, without periodic reevaluations of its value or whether it could be implemented in more privacy-protective ways. Moreover, the natural tendency of the government, the media, and the public is to ask whether a particular program has allowed officials to thwart terrorist attacks or save identifiable lives. Periodic assessments would not only encourage the Intelligence Community to continue to explore more privacy protective alternatives, but also allow the government to explain the relative value of programs in more comprehensive terms. I hope that our Board will have the opportunity to work with the Intelligence Community on such an effort. 2nc: Phone link Telephony metada solves terrorism—communications targeting Brand et al 14 [Rachel Brand 14, Senior Advisor to the U.S. Chamber Litigation Center and member of the Privacy and Civil Liberties Oversight Board, "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," 1/23/14, https://www.pclob.gov/library/215Report_on_the_Telephone_Records_Program.pdf//jweideman] The threat of terrorism faced today by the United States is real. While the core group of Al Qaeda that planned the 9/11 attacks from Afghanistan largely has been decimated by military action, recent years have seen the rise of new al Qaeda affiliates in other nations plotting operations against the United States and Europe. President Obama described the emergence of these groups in a speech last May on the dangers currently posed by international terrorism: “From Yemen to Iraq, from Somalia to North Africa, the threat today is more diffuse, with Al Qaeda’s affiliates in the Arabian Peninsula — AQAP — the most active in plotting against our homeland.”534 Most of these affiliates presently are focused on executing attacks in their own regions, but such attacks can claim U.S. lives in addition to wreaking devastation on residents of the nations where they occur. Moreover, failed attacks against the United States, such as the attempted 2009 Christmas Day airplane bombing and the attempted 2010 Times Square bombing, serve as a reminder that foreign terrorist organizations continue to pose a danger to residents of this nation. Political upheavals in the Middle East, meanwhile, threaten to create opportunities for safe havens where new terrorist affiliates can plan attacks. At the same time, the United States has seen evidence that radicalized individuals inside this country with connections to foreign extremists can carry out horrifying acts of violence, as appears to have been the case with the shooting at Fort Hood in Texas and the bombing of the Boston Marathon.535 Thus, while al Qaeda’s core group has not carried out a successful attack on U.S. soil since 2001 and is less capable of doing so, and while the violence now being attempted by emergent terrorist affiliates has not yet approached the scope of the 9/11 attacks, the danger posed to the United States by international terrorism is by no means over.536 Communications are essential to the facilitation of a terrorist attack against the United States, but awareness of those same communications can permit the United States to discover and thwart the attack. A key challenge — and a key opportunity — facing those who are tasked with preventing terrorism is that would-be terrorists utilize the same communications networks as the rest of the world. Identifying the communications of individuals plotting terrorism within those networks, without intruding on the communications of law-abiding individuals, is a formidable task. This challenge is compounded by the fact that terrorists, aware that attempts are being made to uncover their communications, may employ a range of measures to evade those efforts and keep their plans secret. III. Capabilities Provided by the NSA’s Bulk Collection of Telephone Records Because communication by telephone is useful, if not indispensable, in the coordination of terrorist efforts, wouldbe terrorists can be expected to employ this method of communication in planning and carrying out their violent attacks. Records of telephone calls therefore can serve as a trail helping counterterrorism investigators piece together the networks of terrorist groups and the patterns of their communications. Ultimately, such analysis can support the intelligence community’s efforts to identify and locate individuals planning terrorist attacks and to discover and disrupt those attacks before they come to fruition. The NSA’s wholesale collection of the nation’s telephone records, under the authority granted by the FISA court pursuant to Section 215, is but one method of gathering and analyzing telephone records for counterterrorism purposes. As described below, this method offers certain logistical advantages that may not be available through other means of gathering calling records. The broad scale of this collection, however, even when combined with strict rules on the use of the records obtained, carries serious implications for privacy and civil liberties. Link: SSRA SSRA gets rid of all phone monitoring Williams 15 [Lauren, Staff writer for Think Progress. March, 24 2015. “House Members Move To Repeal The Patriot Act With Strongest Anti-Surveillance Bill To Date” http://thinkprogress.org/election/2015/03/24/3638234/house-members-move-repeal-patriot-act-strongestanti-surveillance-bill-date///jweideman] Overshadowed by congressional budget talks, Reps. Mark Pocan (D-WI) and Thomas Massie (R-KY) quietly introduced the strongest anti-surveillance bill to date that would strip the government of much of its spying power. “This isn’t just tinkering around the edges, it’s a meaningful overhaul that makes sure the meaningless surveillance of emails and cell phones are done away with,” Pocan said in a briefing for congressional staffers Tuesday. The Surveillance State Repeal Act, or HR 1466, aims to repeal the Patriot Act, including the controversial telephony metadata collection program, and strip many of the surveillance permissions granted under the Foreign Intelligence Surveillance Act amendments passed under President George W. Bush in 2008. Title iii CP 1nc CP Text: The United States federal government should establish a prohibition on government required electronic surveillance backdoors, repeal the FISA Amendments Act of 2008, and repeal all portion of the USA Patriot Act with the exception of Title Three of the USA Patriot Act. Perm Do Both – still include “SSRA”s repeal of Title 3 of the Patriot Act Perm Do CP – Textually and Functionally sever out of “Surveillance State Repeal Act” Terrorist financing is the biggest danger—Title 3 solves safe havens and money-laundering Baldwin 2 [Professor Fletcher N. Baldwin, Jr.Chesterfield Smith Professor of Law Director, The Centre For International Financial Crimes Studies Levin College of Law University of Florida. 2002. “MONEY LAUNDERING COUNTERMEASURES WITH PRIMARY FOCUS UPON TERRORISM AND THE USA PATRIOT ACT 2001” https://www.imf.org/external/np/leg/sem/2002/cdmfl/eng/baldwin.pdf//jweideman] Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism1 , euphemistically the USA Patriot Act 2001, is in direct response to terrorism world-wide as noted in United Nations Security Council Resolution 1373. The USA Patriot Act followed Congressional authorization of September 14, 2001 granting broad power to the executive to seek out and destroy terrorists. The Act is, in part, 1) intended to complement and support the military campaign in Afghanistan and elsewhere and 2) allocate to law enforcement more realistic weapons and user friendly laws to fight terrorists and terrorists funding. The two goals require a broad redesign of the United States Bank Secrecy Act and its subsequent amendments.2 The USA Patriot Act (hereinafter: the Act) defines terrorism and focuses upon enhancing domestic security by implementing legislation involving, among other things, computer privacy, electronic surveillance, warrants to trap and trace, no knock searches, and extra-territorial search warrants. The Act also implicates matters involving immigration and borders including bulk cash smuggling. More importantly, in Title III there are over forty complex new banking and other money transmitting regulations impacting upon extra-territoriality, off-shore correspondent banking, underground banking, as well as new predicate crimes complementing the crime of money laundering, and agency sharing.3 Much of the focus of the Act is international money laundering and anti-terrorism financing. The focus derives from the extreme danger the modern terrorist poses to the infrastructure, the national defense, and the International economic system. 2 Title III, of the Act, as well as the subsequent rules promulgated thereunder by the Treasury Department, impacts upon the illicit money trails, foreign bank correspondent accounts, foreign person private banking accounts, savings associations, credit unions, casinos and others similarly situated. In brief, Title III grants to the Secretary of the Treasury extensive powers to impose special measures against any foreign financial institution, regardless of jurisdictional considerations. The Act permits forfeiture of proceeds even if the crime took place on foreign soil as long as the proceeds from the illicit act were transferred to or invested in the United States. The specific crimes include any crime of violence, bribing of a public official, embezzlement of public funds, munitions smuggling, or any offense which if committed in Title III permits in rem forfeiture of funds where illicit funds are transferred from a correspondent bank account to an interbank account and the illicit funds account is traceable to funds originally deposited in a foreign bank or other financial institution holding the account. Under the Act, the foreign bank from which the funds are forfeited has no standing in a United States court to contest the United States would subject the perpetrator to extradition or criminal prosecution. Of significant importance, the forfeiture. Only the “owner” of the funds account in the foreign bank has standing. Significant problems and conflicts may develop within the foreign bank’s home jurisdiction if there is a mandated duty to pay depositors. The United States Congress in Title III is also attempting for the first time to regulate the underground banking systems such as Hawala, or Hundi. On October 26, 2001 President Bush signed the Patriot Act into law4 With the apparent lack of political will that existed prior to September 11, 2001 no longer 3 an obstacle federal law enforcement has moved quickly to begin the implementation of the Act. The goal was, and is, to penetrate the heart of the terrorist organizational machine, or as author Peter L. Bergen termed it: Holy War, Inc.5 The goals of the Act implicate and require international cooperation, re-designation of internal laws, and enhanced cross-border cooperation. Without international To be successful, terrorist as well as organized crime operations require sturdy support internationally and otherwise6 “user-friendly” states citizens, and institutions are a necessity. Banks, citing bank secrecy; nations, citing sovereignty concerns; and elected public officials, citing freedom from governmental financial controls; intentionally or unintentionally created safe havens for the transfer and hiding of the illicit funds and profits of organized crime and organized terrorists. Funds gathered within lax jurisdictions are funneled to terrorist cells around the world. Lax banking regulations and poor financial oversight provides stepping stones and networks for the financing of terrorist activity. Law enforcement world-wide had noted increased activity by terrorist groups, cooperation, the Act will lose most of its intended impact. II LEGISLATIVE HISTORY but had received little governmental support in their efforts.7 Reading such recent works as Holy War, Inc., one has reason to speculate that there was very little political will to encourage law enforcement to conduct an all-out assault upon the financial networking of organized terrorist groups such as al-Qaeda.8 Nevertheless, who could have ever envisioned the catastrophic acts of September 11, 2001? The events of September 11, 2001, appear to have changed the political posturing mileau. In the United States, the recognition of vulnerability to, and threat of, future acts resulted 4 in the USA Patriot Act. The Act, controversial to be sure, nevertheless signaled support from previously silent elected and appointed officials for the efforts of law enforcement in the transnational arena. Governments, democratic and otherwise, have now signaled their approval and support for an all-out assault upon the holdings of terrorist groups. Key to solve nuclear terror Luna 14 [David M. Luna Senior Director for Anticrime Programs, Bureau of International Narcotics and Law Enforcement Affairs. November 18, 2014 “Remarks to NATO Advance Research Workshop: Neutralizing Radicalized Threat Networks, Disrupting WMD Illicit Traffickers and Targeting Corrupt Facilitators” http://traccc.gmu.edu/wp-content/uploads/2014/11/NATO-notes.pdf//jweideman] Illicit Trafficking: A Threat to the Legal Economy and Global Security Now let me address the dangers of traditional forms of WMD and the perils posed to the international community by illicit trafficking networks. It is often said that where there is money to be made in illicit markets and the illegal economy, criminals will be very entrepreneurial to oversee and regulate the trading and selling of contraband. This was certainly true for the A.Q. Khan network in Pakistan as it supplied North Korea and Libya with expertise, technology, and materials to their WMD program. This brings me to the linkage with another theme of our discussion today. As underscored earlier, we know that ISIL, Al-Qaeda, and other terrorist groups want to inflict as much damage as they can to innocent communities and their sworn enemies. In fact, Osama bin Laden in his earlier years with alQaeda had stressed to his jihadist followers that it was a “religious duty” to seek and secure WMD as part of their campaigns of terror. As potential customers and end-users of WMD, ISIL, al-Qaeda, and others, will remain interested in trying to obtain these powerful weapons to maximize catastrophic harm. To achieve their nefarious terror goals, these groups will likely need to resort to illicit trafficking channels, where corruption, criminals, and black market facilitators come together across supply and demand vectors to obtain WMD. Their success can only be achieved if we let our guard down. In the past, we have seen how determined terrorists have obtained mustard and sarin gas, ricin, anthrax, missiles, and other WMD by exploiting corrupt or other vulnerable channels including in countries that have massive stockpiles of WMD or states that are on the verge of great instability and insecurity including Libya, Syria, North Korea, and states of the former Soviet Union. An Unholy Trinity: Corruption, Criminality, and Terror As Dr. Louise Shelley, Director of the Terrorism, Transnational Crime, and Corruption Center (TraCCC), George Mason University, has enlightened us in her recent book “Dirty Entanglements: Corruption Crime, and Terrorism”: “ The understanding of financial flows, the role of facilitators from the legitimate economy, and the centrality of particular routes and nodes are crucial to addressing the problem. By focusing only on the crime and terror components, while ignoring the centrality of corruption, it is not possible to effectively address the threat of WMD proliferation, or the possibility of attack. Analysis of the dirty entanglements will be crucial to preventing future attacks.” In a world of convergence, how difficult is our challenge to combat WMD proliferation amidst the entangled webs of corruption, criminality and terrorism? First, when we realize that nuclear, biological, and radiological materials inhabit many sections of our lives, we begin to comprehend the complex task very quickly. From hospitals to the smoke detectors in this room, the use of these materials can benefit our everyday lives. However, when used for malicious purposes, nuclear and radioactive materials pose a dangerous and disruptive threat to everyone. It is because of the potential of this new black market niche that organized criminals have gravitated to seek profit based on demand. This is basic economics: if there’s a product in high demand, then there will be suppliers working to procure and sell it at a profit. It just so happens that in this case, the product that terrorists and criminals want is closely guarded and extremely dangerous. In Lyudmila Zaitseva and Kevin Hand’s 2003 article “Nuclear Smuggling Chains,” they describe the three main types of actors involved in the illegal movement of nuclear material: the suppliers, the intermediaries, and the endusers. I want to focus particularly on the suppliers and intermediaries—let’s call them facilitators, because they are the ones who enable the illicit use of nuclear material, and the ones that we should be most concerned about. Facilitators can be almost anyone—from organized criminals who traffic hazardous material across borders, to radiology technicians in the hospital, to a corrupt general in a nation’s army who wants to bolster his own paycheck. Anyone who has access to nuclear materials has the potential to be a facilitator or a complicit actor in the illicit trafficking supply chain of WMD proliferation. Following the break-up of the Soviet Union, we saw nuclear scientists from around the postSoviet landscape smuggling material out of their labs and attempting to sell it on the black market. They had suffered a loss of reputation and status in the new post-communist Russia, but most importantly they had lost a degree of financial security. These scientists believed that there was a profitable market for nuclear materials that they could tap into. This perception holds as well for other facilitators—that there’s a huge money-making opportunity out there in trafficking of WMD and hazardous materials. These are among the challenges we face today. As long as facilitators believe that there is a market for nuclear and radiological materials or weapons of mass destruction—regardless of whether there actually is—this will place even greater importance on the integrity of those tasked with guarding such materials. The potential for corruption and blackmail is high: the stakes are higher. Terrorism causes extinction---hard-line responses are key Nathan Myhrvold '13, Phd in theoretical and mathematical physics from Princeton, and founded Intellectual Ventures after retiring as chief strategist and chief technology officer of Microsoft Corporation , July 2013, "Stratgic Terrorism: A Call to Action," The Lawfare Research Paper Series No.2, http://www.lawfareblog.com/wp-content/uploads/2013/07/Strategic-Terrorism-Myhrvold-7-32013.pdf Several powerful trends have aligned to profoundly change the way that the world works. Technology ¶ now allows stateless groups to organize, recruit, and fund ¶ themselves in an unprecedented fashion. That, coupled ¶ with the extreme difficulty of finding and punishing a stateless group, means that stateless groups are positioned to be ¶ lead players on the world stage. They may act on their own, ¶ or they may act as proxies for nation-states that wish to ¶ duck responsibility. Either way, stateless groups are forces ¶ to be reckoned with.¶ At the same time, a different set of technology trends ¶ means that small numbers of people can obtain incredibly ¶ lethal power. Now, for the first time in human history, a ¶ small group can be as lethal as the largest superpower . Such ¶ a group could execute an attack that could kill millions of ¶ people. It is technically feasible for such a group to kill billions of people, to end modern civilization—perhaps even ¶ to drive the human race to extinction. Our defense establishment was shaped over decades to ¶ address what was, for a long time, the only strategic threat ¶ our nation faced: Soviet or Chinese missiles. More recently, ¶ it has started retooling to address tactical terror attacks like ¶ those launched on the morning of 9/11, but the reform ¶ process is incomplete and inconsistent. A real defense will ¶ require rebuilding our military and intelligence capabilities from the ground up. Yet, so far, strategic terrorism has ¶ received relatively little attention in defense agencies, and ¶ the efforts that have been launched to combat this existential threat seem fragmented.¶ History suggests what will happen. The only thing that shakes America out of complacency is a direct threat from a determined adversary that confronts us with our shortcomings by repeatedly attacking us or hectoring us for decades. **2nc: Solvency** AT: Title 3 k2 advantage Not key to solvency—Title 3 is only anti-laundering requirements Freis 11 [James H, Director of the Financial Crimes Enforcement Network at the Treasury department. 11/18/11, “Finding that the Islamic Republic of Iran is a Jurisdiction of Primary Money Laundering Concern” http://www.treasury.gov/press-center/pressreleases/Documents/Iran311Finding.pdf//jweideman] On October 26, 2001, the President signed into law the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (the “USA PATRIOT Act”), Public Law 107-56. Title III of the USA PATRIOT Act amends the anti-money laundering provisions of the Bank Secrecy Act (“BSA”), codified at 12 U.S.C. 1829b, 12 U.S.C 1951-1959, and 31 U.S.C. 5311-5314 and 5316-5332, to promote prevention, detection, and prosecution of international money 2 laundering and the financing of terrorism. Regulations implementing the BSA appear at 31 CFR Chapter X. 2nc: Title 3 solves internet Title 3 improves internet freedom Smith et al 2 [Marcia S. Smith, Jeffrey W. Seifert, Glenn J. McLoughlin, and John Dimitri Moteff Resources, Science, and Industry Division at EPIC. Congressional Report. March 4, 2002. “The Internet and the USA PATRIOT Act: Potential Implications for Electronic Privacy, Security, Commerce, and Government” https://epic.org/privacy/terrorism/usapatriot/RL31289.pdf//jweideman] Title III responds to concernsthat more can be done to prevent, detect, and prosecute international money laundering and the financing of terrorism. Over time, these provisions may affect ecommerce broadly, and electronic fund transfers specifically. Electronic government (e-government) could be affected by the Act in both positive and negative ways. The intense focus on improving data collection and information sharing practices and systems may contribute to the establishment of government-wide technical standards and best practices that could facilitate the implementation of new and existing e-government initiatives. It could also promote the utilization of secure Web portals to help ensure the data integrity of transactions between the government and citizens and business. However, concern about potential abuses of data collection provisions could dampen citizen enthusiasmfor carrying out Although the Act does not explicitly address electronic commerce (e-commerce), many of the law’s provisions may impact it. In particular, electronic transactions with the government. AT: decapitation Decapitation fails—anti-financing is key Dietz 10 [Rebekah, NAVAL POSTGRADUATE SCHOOL. “ILLICIT NETWORKS: TARGETING THE NEXUS BETWEEN TERRORISTS, PROLIFERATORS, AND NARCOTRAFFICKERS” December 2010. http://www.dtic.mil/dtic/tr/fulltext/u2/a536899.pdf//jweideman] In addition to creating a more cohesive, whole-of-government approach to catching these criminals from multiple angles, there is one important lesson to draw from this analysis of all three networks: follow the money. Money is the key that makes each network tick, whether it is financially motivated or not . In each case, these networks could not operate without a steady cash flow. They utilize remarkably similar techniques to conceal and move their capital. If the U.S. government were able to synchronize efforts on just one platform, I recommend it be in tracking and prosecuting illicit finance. Bankers are largely able to avoid prosecution because law enforcement fails to expose evidence of their involvement in dirty money.335 As former federal agent, Robert Mazur, writes in his recent New York Times op-ed, the U.S. government needs an elite multiagency task force to identify institutions and businesses that facilitate illicit finance around the globe.336 Because banks and front companies often engage in multiple illicit activities, a detailed database for all types of unlawful financial transactions could help identify important linkages that might otherwise be overlooked by network-specific bureaucracies. Stemming the flow of dirty would restrict the stream of illegal commodities and severely hinder the operations of organizations and individuals that threaten national and international security. It is clear that a strategy based exclusively on decapitation is not effective in any of the three networks—terrorist, proliferation or narcotics. While targeting a drug kingpin or terrorist figurehead may appear to be the clear course, this “leadership interdiction” is not sustainable in a complex adaptive system that is able to adjust to changing circumstances.337 Targeted kill/capture missions are an important part of an overall strategy, but SNA is not an adequate tool in and of itself to prosecute them. SNA is an extremely useful instrument—a way to visualize the actors in any given network—but cannot adequately explain the motivations of individual actors or how their personalities affect the overall organization. Algorithms that attempt to identify the most “important” network members based on different quantifications do not sufficiently describe the extent to which these individuals affect network operations. I recommend that analysts pay serious attention to network leadership and personalities, even if their involvement in the appears purely charismatic. Their ability to inspire, influence, manipulate and enable others for their personal gains can be significant, and, in some cases, targeted “leadership interdiction” may be the most effective way to stop them. A2 Terror Now Terrorism is getting lower and lower The Nation 15 [April 27, 2015 http://nation.com.pk/national/27-Apr-2015/terrorism-incidents-witness-a-decline-in-2015 “Terrorism incidents witness a decline in 2015”] (Vaibhav) Terrorism incidents throughout the country witnessed a substantial decline as compared to previous years. According to official documents, around 252 incidents of terror occurred since January 1, 2015 till date in which 139 citizens and 51 security men were martyred. The documents revealed that in the past 5 years, a total of 8520 terror incidents occurred in which 28779 people were killed. In 2010, 2061 incidents of terror occurred in which 502 security men were killed and 1454 civilians lost their lives. In 2011, 1680 incidents of terror occurred in which 948 civilians and 408 security men were killed. In 2012, 1316 incidents occurred in which 347 security men and 816 civilians were killed In 2013, 1571 incidents claimed lives of 555 security men and 1239 civilians. According to the report in 2014, 1640 incidents of terror occurred in which 434 security men and 672 civilians were martyred. **Impact** 2nc: solves terror Title 3 is key to preventing terrorist financing Weiss 13 [Martin A. Weiss, Coordinator Analyst in International Trade and Finance Foreign Affairs, Defense, and Trade Division. August 3, 2005. “Terrorist Financing: U.S. Agency Efforts and InterAgency Coordination” https://www.fas.org/sgp/crs/terror/RL33020.pdf//jweideman] Title III of the USA PATRIOT Act. In the wake of the terrorist attacks of September 11, 2001, Congress passed the USA PATRIOT Act.36 Congress devoted Title III of this act to combating terrorist financing.37 Given that funds used to finance terrorist activities are often not derived from illegal activities, prosecution for funding terrorist activities under the pre-USA PATRIOT Act money laundering laws was difficult. Title III, however, made providing material support to a foreign terrorist organization a predicate offense for money laundering prosecution under section 1956 of Title 18 of the U.S. Code.38 Under Title III, the Treasury Secretary may require domestic financial institutions to undertake certain “special measures” if the Secretary concludes that specific regions, financial institutions, or transactions outside of the United States are of primary money laundering concern.39 In addition to retaining more specific records on financial institutions, these special measures include obtaining information on beneficial ownership of accounts and information relating to certain payable-through40 and correspondent accounts.41 The Treasury Secretary is also empowered to prohibit or restrict the opening of these payable-through and correspondent accounts,42 and U.S. financial institutions are required to establish internal procedures to detect money laundered through these accounts.43 In addition, financial institutions and broker-dealers are prohibited from maintaining correspondent accounts for foreign “shell banks,” i.e., banks that have no physical presence in their supposed home countries.44 Institutions are subject to fines of up to $1 million for violations of these provisions.45 Title III allows for judicial review of assets seized due to suspicion of terroristrelated activities and the applicability of the “innocent owner” defense,46 although the government is permitted in such cases to submit evidence that would not otherwise be admissible under the Federal Rules of Evidence, if following those rules would jeopardize national security.47 Title III also allows for jurisdiction over foreign persons and financial institutions for prosecutions under sections 1956 and 1957 of Title 18 of the U.S. Code.48 The USA PATRIOT Act permits forfeiture of property traceable to proceeds from various offenses against foreign nations.49 The act also permits forfeiture of accounts held in a foreign bank if that bank has an interbank account in a U.S. financial institution; in essence, law enforcement officials are authorized to substitute funds in the interbank account for those in the targeted foreign account.50 Forfeiture is also authorized for currency reporting violations and violations of BSA prohibitions against evasive structuring of transactions.51 Title III requires each financial institution to establish an anti-money laundering program, which at a minimum must include the development of internal procedures, the designation of a compliance officer, an employee training program, and an independent audit program to test the institution’s anti-money laundering program.52 In order to allow for meaningful inspection of financial institutions’ AML efforts, Title III requires financial institutions to provide information on their AML compliance within 120 hours of a request for such information by the Treasury Secretary.53 Also, financial institutions applying to merge under the Bank Holding Act or the Federal Deposit Insurance Act must demonstrate some effectiveness in combating money laundering.54 Financial institutions are allowed to include suspicions of illegal activity in written employment references regarding current or former employees.55 Title III extends the Suspicious Activity Reports filing requirement to brokerdealers,56 and gives the Treasury Secretary the authority to pass along SARs to U.S. intelligence agencies in order to combat international terrorism.57 Anyone engaged in a trade or business who receives $10,000 cash in one transaction must file a report with the Treasury Department’s Financial Crimes Enforcement Network (FinCEN) identifying the customer and specifying the amount and date of the transaction.58 In addition, the USA PATRIOT Act makes it a crime to knowingly conceal more than $10,000 in cash or other monetary instruments and attempt to transport it into or outside of the United States. This offense carries with it imprisonment of up to five years, forfeiture of any property involved, and seizure of any property traceable to the violation.59 Significantly, the USA PATRIOT Act requires financial institutions to establish procedures so that these institutions can verify the identities and addresses of customers seeking to open accounts, and check this information against governmentprovided lists of known terrorists.60 Title III also allows the Treasury Secretary to promulgate regulations that prohibit the use of concentration accounts to disguise the owners of and fund movements in bank accounts.61 Under Title III, FinCEN has statutorily-based authority to conduct its duties within the Treasury Department.62 Significantly, the act requires FinCEN to maintain a highly secure network so that financial institutions can file their BSA reports electronically.63 2nc: Prolif Impact Title 3 solves proliferation Zarate 9 [Juan C. Zarate. Senior Adviser, Transnational Threats Project and Homeland Security and Counterterrorism Program at CSIS. October 2009. The Washington Quarterly. “Harnessing the Financial Furies: Smart Financial Power and National Security” http://www.artisresearch.com/articles/Zarate_Harnessing_Financial_Furies.pdf//jweideman] The United States supplemented these tools by implementing Section 311 of the PATRIOT Act, which allowed the secretary of treasury to apply regulatory measures to financial entities, jurisdictions, and classes of transactions identified as ‘‘primary money laundering concerns.’’ The U.S. Department of Treasury used this authority aggressively between 2003 and 2005 as part of a ‘‘bad bank initiative’’ to isolate those financial institutions around the world facilitating an assortment of illicit financial activity. The use of this regulatory tool in 2005 against Banco Delta Asia a private bank in Macau that was facilitating money laundering, proliferation, and counterfeiting on behalf of the North Korean regime served as a way to notify the international financial community of the ongoing practices of concern by this financial entity and Pyongyang. The use of targeted financial sanctions and related international focus has also expanded to issues such as proliferation finance and high-level or regime corruption, often referred to as ‘‘kleptocracy.’’ In the United States, the president’s signing of executive order 13382 on June 29, 2005, provided the domestic legal and regulatory framework to expand this paradigm to proliferation financing, which has been used to identify front companies from China, North Korea, and Russia engaged in suspect proliferation activities.5 As seen in the Iran-related sanctions at the UN and by Europe and the United States, there is a growing reliance on targeted sanctions and broader financial warnings to help pressure the Iranian regime by isolating those entities and activities possibly engaged in the development of a nuclear weapons program. The use of such tools against autocratic regimes and leadership in countries such as Burma, Belarus, Liberia, Sudan, Syria, and Zimbabwe has also served to expand ongoing efforts in the EU and the United States to deter and prevent large-scale corruption. The power of this marketbased financial isolation was made evident in 2005 against North Korea. 48 THE WASHINGTON QUARTERLY/ j OCTOBER 2009 Juan C. Zarate The increasing use of these tools has spawned a new line of business within governments and the private sector focused on developing, analyzing, and using financial data and information to understand vulnerabilities and to prevent their exploitation by illicit networks of concern. In the United States, the Office of Terrorism and Financial Intelligence was established within the Department of Treasury in 2004, with a dedicated intelligence office charged with developing financial information and analysis within the intelligence community for potential use by policymakers and the private sector. The effects of these sanctions were amplified by private lawsuits from victims of terrorism, which served as de facto sanctions on those individuals, companies, and financial institutions implicated in the lawsuits. The deterrent power of such lawsuits was seen most vividly in the case of victims of Hamas terror, whose threats of suits against institutions willing to provide financial services to Hamas entities effectively shut down Hamas’ access to banks such as Arab Bank PLC and Cairo Amman Bank, especially after Hamas took over the Gaza strip. The reliance on financial information and targeted financial sanctions to identify and isolate rogue actors from the financial system is a hallmark of the last eight years, with a broadening expansion of these powers. Though there are limitations and challenges to the use of such power and the information that can be used or shared, there is no question that such sanctions and related regulatory and prosecutorial actions remain a cornerstone of the international community’s approach to using financial power and influence to affect a wide range of national security concerns. Integrating the International Financial Community and Private Sector A key dimension of this new paradigm is the central role and influence of the private sector for issues of international security import. There has been an enormous anti-money laundering/counterterrorist financing regulatory burden placed on financial and commercial actors since September 11. Governments have relied more and more on the ability of financial institutions to act as protective gatekeepers to the financial system by identifying, reporting, and preventing the use of financial facilities by transnational actors and criminals of concern. The international banking community has grown acutely sensitive to the business risks attached to illicit financial activity and has taken steps to avoid the taint of such activities being facilitated through their institutions. Sensitivity by this communitythe primary gatekeepers to international commerce and capitalhas been the amplifying element that has motivated private sector actors to cease problematic or suspect business relationships, even absent government mandate or requirements. The legitimate international financial community will ultimately act based on its own business interests, which is aligned with the interests of governments desiring to isolate rogue financial actors. In this post-September 11 environment, there is a natural convergence between the interests of responsible governments and the financial community to protect the integrity of the international financial system. This sensitivity to both commercial and reputational risks has been shaped in large part by increased anti-money laundering regulatory scrutiny at a global level, well-publicized enforcement actions by national governments, lawsuits brought on by victims of terror, and the explosion of available information sources on terrorist financing and transnational threats of concern (credible or otherwise) that form part of the required review and due diligence by compliance officers around the world. These factors have amplified the perceived risks of illicit financial activity assessed by financial institutions as worth avoiding at all costs. This has led to some distortions and unintended consequences such as diminishing access to the international financial system by smaller, yet legitimate, entities unable to prove their bona fides or ability to vet customers to larger financial institutions. There is no better example of this dynamic than the efforts by the United States and other governments over the past four years to identify and isolate the illicit and dangerous financial activity of the regimes in North Korea and Iran. Government actions have spurred banks to make independent cost-benefit determinations leading to closing accounts and ending banking relationships with North Korean as well as Iranian organizations and front companies, shipping lines, and pass-through and shell account holders. In this field and in others related to issues of international security import, the financial community, for better or for worse, has become the frontline actor in the quest to protect the integrity of the financial system and to isolate rogue and illicit financial activityUnleashing the Financial Furies... With few concrete levers to influence rogue regimes in Pyongyang, Tehran, and elsewhere, the United States will continue to rely heavily on this new brand of financial suasion to isolate those engaged in activities that threaten both national security and the integrity of the financial system. In this new paradigm, actors bring this financial isolation on themselves given the nature of their illicit or suspect activities and the manner by which they try to hide or mask the ultimate purposes of their financial dealings. ... Against North Korea The power of this market-based financial isolation was made evident in 2005 against North Korea. As part of a strategic pressure campaign, the U.S. Department of Treasury issued a domestic regulation in September 2005, under Section 311 of the PATRIOT Act, ordering U.S. financial institutions to close any correspondent accounts for Banco Delta Asia, a small private bank in Macau. This bank was facilitating money laundering, proliferation, and counterfeiting on behalf of the North Korean regime. The regulation cut the bank off from the U.S. financial system. More importantly, what appeared to be a simple unilateral regulation against a private bank unleashed the market-based financial furies against North Korea. Banks in Asia and Europe stopped doing business with Pyongyang, ultimately denying North Korea access to the international financial system. North Korean bank accounts were closed, their transnational commercial transactions were cancelled, and their officials’ financial activities were carefully scrutinized. Without further prompting from governments or the UN, the private sector reacted in this manner based on their own commercial interests. No bank wanted to be seen as the North Korean regime’s bank of choice when the regime was engaged in both illicit and dangerous commercial activity, which would then put the financial institution’s own access to the U.S. and international financial systems in jeopardy. The pressure hurt the North Korean regime. Pyongyang scrambled to regain access to their money and accounts around the world while trying to undo the official damage done to its reputation in the international financial community. The key state actors, including China, had no incentive to block the full effect of the market reaction. On the contrary, they did not want their banks or financial reputation caught up in the taint of North Korean illicit financial activity. This pressure became the primary leverage for the United States to press North Korea’s return to the Six-Party negotiating table, which it eventually did in late 2006. With the Six-Party Talks reassembled, the international financial squeeze was gently loosened, though a direct link was never officially acknowledged. In the face of North Korean recalcitrance and belligerence, this type of financial smart power is being leveraged again, with the elements of a financial pressure campaign emerging. The UN adopted Security Council resolution 1874 on June 12, 2009, serving as a rejuvenated international baseline to ramp up financial pressure, along with an amplified arms ban and a new system for inspection of North Korean cargo.6 This was quickly followed on June 18, 2009, by the U.S. Department of Treasury advising the financial community of the dangers of doing business with North Korea and the threat to the integrity of the financial system, given the likelihood of continued deceptive and criminal activities. That advisory also listed 17 North Korean banks whose commercial he use of such institutions by the regime to evade sanctions, engage in proliferation activities, and in broader illicit activity. Late in June and July 2009, the Departments of State and Treasury designated three North Korean commercial entities tied to the regime’s missile proliferation and nuclear weapons programs. North Korea’s suspect activitiesproliferation, sanctions evasion, counterfeiting, drug trafficking, and smugglingprovide the continued seeds of their own isolation. These revelations and sanctions will be the heart of this new pressure campaign against Pyongyang. Along with Japan and South Korea, the United States will use North Korea’s recalcitrance and illicit behavior to drive public and private sector efforts to stop North Korea’s international commercial activity critical to the development of their weapons program, financing, and potential proliferation. Over time, this will include public and private threats of sanctions, regulatory actions, or public revelations against those financial institutions that If fully realized, it will also include a more aggressive use of targeted financial sanctions and regulatory actions, including an aggressive campaign to uncover and freeze leadership assets. As leadership assets are critical to regime loyalty, an international campaign to freeze those assets would build tension and suspicion within the leadership’s ranks. continue to do business with suspect North Korean entities and officials. Prolif leads to extinction Kroenig ’12, Council on Foreign Relations Stanton Nuclear Security Fellow and Georgetown University assistant professor of government Matthew, “The History of Proliferation Optimism: Does It Have A Future?”, http://www.npolicy.org/article.php?aid=1182&tid=30 The spread of nuclear weapons poses a number of severe threats to international peace and U.S. national security including: nuclear war, nuclear terrorism, emboldened nuclear powers, constrained freedom of action, weakened alliances, and further nuclear proliferation. This section explores each of these threats in turn.¶ ¶ Nuclear War. The greatest threat posed by the spread of nuclear weapons is nuclear war. The more states in possession of nuclear weapons, the greater the probability that somewhere, someday, there is a catastrophic nuclear war. A nuclear exchange between the two superpowers during the Cold War could have arguably resulted in human extinction and a nuclear exchange between states with smaller nuclear arsenals, such as India and Pakistan, could still result in millions of deaths and casualties, billions of dollars of economic devastation, environmental degradation, and a parade of other horrors.¶ To date, nuclear weapons have only been used in warfare once. In 1945, the United States used one nuclear weapon each on Hiroshima and Nagasaki, bringing World War II to a close. Many analysts point to sixtyfive-plus-year tradition of nuclear non-use as evidence that nuclear weapons are unusable, but it would be naïve to think that nuclear weapons will never be used again. After all, analysts in the 1990s argued that worldwide economic downturns like the great depression were a thing of the past, only to be surprised by the dot-com bubble bursting in the later 1990s and the Great Recession of the late Naughts.[53] This author, for one, would be surprised if nuclear weapons are not used in my lifetime.¶ Before reaching a state of MAD, new nuclear states go through a transition period in which they lack a secure-second strike capability. In this context, one or both states might believe that it has an incentive to use nuclear weapons first. For example, if Iran acquires nuclear weapons neither Iran, nor its nuclear-armed rival, Israel, will have a secure, second-strike capability. Even though it is believed to have a large arsenal, given its small size and lack of strategic depth, Israel might not be confident that it could absorb a nuclear strike and respond with a devastating counterstrike. Similarly, Iran might eventually be able to build a large and survivable nuclear arsenal, but, when it first crosses the nuclear threshold, Tehran will have a small and vulnerable nuclear force.¶ In these pre-MAD situations, there are at least three ways that nuclear war could occur. First, the state with the nuclear advantage might believe it has a splendid first strike capability. In a crisis, Israel might, therefore, decide to launch a preemptive nuclear strike to disarm Iran’s nuclear capabilities and eliminate the threat of nuclear war against Israel. Indeed, this incentive might be further increased by Israel’s aggressive strategic culture that emphasizes preemptive action. Second, the state with a small and vulnerable nuclear arsenal, in this case Iran, might feel use ‘em or loose ‘em pressures. That is, if Tehran believes that Israel might launch a preemptive strike, Iran might decide to strike first rather than risk having its entire nuclear arsenal destroyed. Third, as Thomas Schelling has argued, nuclear war could result due to the reciprocal fear of surprise attack.[54] If there are advantages to striking first, one state might start a nuclear war in the belief that war is inevitable and that it would be better to go first than to go second. In a future Israeli-Iranian crisis, for example, Israel and Iran might both prefer to avoid a nuclear war, but decide to strike first rather than suffer a devastating first attack from an opponent. ¶ Even in a world of MAD, there is a risk of nuclear war. Rational deterrence theory assumes nuclear-armed states are governed by rational leaders that would not intentionally launch a suicidal nuclear war. This assumption appears to have applied to past and current nuclear powers, but there is no guarantee that it will continue to hold in the future. For example, Iran’s theocratic government, despite its inflammatory rhetoric, has followed a fairly pragmatic foreign policy since 1979, but it contains leaders who genuinely hold millenarian religious worldviews who could one day ascend to power and have their finger on the nuclear trigger. We cannot rule out the possibility that, as nuclear weapons continue to spread, one leader will choose to launch a nuclear war, knowing full well that it could result in self-destruction.¶ One does not need to resort to irrationality, however, to imagine a nuclear war under MAD. Nuclear weapons may deter leaders from intentionally launching full-scale wars, but they do not mean the end of international politics. As was discussed above, nuclear-armed states still have conflicts of interest and leaders still seek to coerce nuclear-armed adversaries. This leads to the credibility problem that is at the heart of modern deterrence theory: how can you threaten to launch a suicidal nuclear war? Deterrence theorists have devised at least two answers to this question. First, as stated above, leaders can choose to launch a limited nuclear war.[55] This strategy might be especially attractive to states in a position of conventional military inferiority that might have an incentive to escalate a crisis quickly. During the Cold War, the United States was willing to use nuclear weapons first to stop a Soviet invasion of Western Europe given NATO’s conventional inferiority in continental Europe. As Russia’s conventional military power has deteriorated since the end of the Cold War, Moscow has come to rely more heavily on nuclear use in its strategic doctrine. Indeed, Russian strategy calls for the use of nuclear weapons early in a conflict (something that most Western strategists would consider to be escalatory) as a way to de-escalate a crisis. Similarly, Pakistan’s military plans for nuclear use in the event of an invasion from conventionally stronger India. And finally, Chinese generals openly talk about the possibility of nuclear use against a U.S. superpower in a possible East Asia contingency.¶ Second, as was also discussed above leaders can make a “threat that leaves something to chance.”[56] They can initiate a nuclear crisis. By playing these risky games of nuclear brinkmanship, states can increases the risk of nuclear war in an attempt to force a less resolved adversary to back down. Historical crises have not resulted in nuclear war, but many of them, including the 1962 Cuban Missile Crisis, have come close. And scholars have documented historical incidents when accidents could have led to war.[57] When we think about future nuclear crisis dyads, such as India and Pakistan and Iran and Israel, there are fewer sources of stability that existed during the Cold War, meaning that there is a very real risk that a future Middle East crisis could result in a devastating nuclear exchange. UQ: Banking Banking is booming Conerly 15 [Bill, Forbes contributor. 1/12/2015. “Banking Forecast 2015: Earnings Headed Up” http://www.forbes.com/sites/billconerly/2015/01/12/banking-forecast-2015-earnings-headedup///jweideman] Banks should do well in 2015, thanks to economic growth and higher interest rates, which will boost spreads even for liability-sensitive banks. The economy will expand throughout 2015 (as described in more detail in Economic Forecast 2015-2017), prompting the Federal Reserve to boost short-term interest rates in the spring or summer. It is a good environment for credit quality, though most bank loans are now in very good condition. Loan volumes will improve, and this is a major positive for commercial banks. Consumers will continue to grow their credit, but only in pace with their overall income. Look for four-to-five percent consumer loan growth. The big gains will be in commercial and real estate loans. Commercial and industrial loans have three triggers: accounts receivable, inventories and capital spending. Receivables will grow along with the overall economy, about five percent. Inventories will probably grow just a little faster, as inventories grow or contract on more than a one-for-one basis with the overall economy. Capital spending, however, will be the largest force for greater C&I volumes. Businesses are loosening their purse strings and will do so even more in 2015. Real estate lending will improve markedly on the residential side. With the boom’s excess supply nearly worked off, new housing construction must match the needs of a growing population, meaning at least a 20 percent gain in starts. Non-residential activity will only grow modestly, though, as vacancy rates are still pretty high in most markets. AT: Warming Long timeframe- it will take hundreds of years for the Earth to change past the tipping point Iacurci 14 (Jenna Iacurci, Journalist for Nature World News, University of Connecticut, Nature World News, http://www.natureworldnews.com/articles/8232/20140724/scientists-identify-possible-tipping-point-of-global-warming.htm, 7/24/14, 7/5/15, MEM) According to the research, synchronization of climate variability in the North Pacific and North Atlantic Oceans is that tipping point - where rapid melting of ice and further warming may become irreversible. This is what happened a few hundred years before the rapid warming that took place at the end of the last ice age about 15,000 years ago. The study, published this week in the journal Science, suggests that this combined ocean warming may have forced the Earth's climate past the point of no return. "Synchronization of two major ocean systems can amplify the transport of heat toward the polar regions and cause larger fluctuations in northern hemisphere climate," lead author Summer Praetorius, a doctoral student in marine geology at Oregon State, said in a press release. "This is consistent with theoretical predictions of what happens when Earth's climate reaches a tipping point." For those nervous about our current predicament with global warming, Praetorius is quick to point out that this research doesn't necessarily mean that the same thing will happen in the future, "but we cannot rule out that possibility," she said. Over a period of 10 years, the OSU team examined marine sediment cores recovered off southeast Alaska. These geologic records of climate change portrayed a detailed history of changing temperatures on a scale of decades to centuries over many thousands of years. They found that once the North Pacific and North Atlantic were in sync with each other, they began to change more and more until both oceans experienced an abrupt warming event of several degrees within a few decades. "As the systems become synchronized, they organized and reinforced each other, eventually running away like screeching feedback from a microphone," explained co-author Alan Mix, a professor in OSU's College of Earth, Ocean, and Atmospheric Sciences. "Suddenly you had the combined effects of two major oceans forcing the climate instead of one at a time." Mix notes that a tipping point for climate change can happen at any time, but it's likely that the Earth's climate system will take hundreds or even thousands of years to change in response. IPCC model was flawed- warming not harmful and distracts us from other causes of environmental degradation Bastasch 3/24 (Michael Bastasch, Reporter at The Daily Caller News Foundation, “IPCC runs from claims that global warming will cause mass extinctions”, http://dailycaller.com/2014/03/24/ipcc-runs-from-claims-that-global-warming-will-causemass-extinctions/, 3/24/14, 7/7/15, MEM) But Der Spiegel reports that the IPCC is shying away from such claims and gives no concrete numbers for how many plant and animal species could be at risk if global temperatures increased. While the IPCC does say that the pace of global warming is making it hard for some species to adapt, the lack of basic data makes it impossible for there to be any hard evidence to back up this claim. Zoologists actually fear that the focus on global warming has drawn attention away from issues that actually cause extinctions, like destruction of natural habitats. “Monoculture, over-fertilization or soil destruction destroy more species than several degrees temperature rise ever assets,” University of Rostock zoologist Ragnar Kinzelbach told Der Spiegel. **Perm/Theory** Competition The plan gets rid of the whole patriot act—CP is plan minus Hattem 15 [Julian, staff writer for the Hill. 3/24/15, “House effort would completely dismantle Patriot Act” http://thehill.com/policy/technology/236769-house-effort-would-completely-dismantle-patriotact//jweideman] A pair of House lawmakers wants to completely repeal the Patriot Act and other legal provisions to dramatically rein in American spying. Reps. Mark Pocan (D-Wis.) and Thomas Massie (R-Ky.) on Tuesday unveiled their Surveillance State Repeal Act, which would overhaul American spying powers unlike any other effort to reform the National Security Agency. “This isn’t just tinkering around the edges,” Pocan said during a Capitol Hill briefing on the legislation. “This is a meaningful overhaul of the system, getting rid of essentially all parameters of the Patriot Act.” The bill would completely repeal the Patriot Act, the sweeping national security law passed in the days after Sept. 11, 2001, as well as the 2008 FISA Amendments Act, another spying law that the NSA has used to justify collecting vast swaths of people's communications through the Internet. It would also reform the secretive court that oversees the nation’s spying powers, prevent the government from forcing tech companies to create “backdoors” into their devices and create additional protections for whistleblowers. “Really, what we need are new whistleblower protections so that the next Edward Snowden doesn’t have to go to Russia or Hong Kong or whatever the case may be just for disclosing this,” Massie said. Third Party PIC 1NC 1NC Shell The Federal Judiciary should presume that warrants are required for the Federal Government to obtain all electronically stored data for the purpose of surveillance in the United States with the exception of public health data. Electronic data on public health is necessary to prevent disease outbreak —only the rapid response times of electronic data solve bioterrorism. Bravata et al 4 — Dena M. Bravata, Kathryn M. McDonald, Wendy M. Smith, Chara Rydzak, Herbert Szeto, David L. Buckeridge, Corinna Haberland, and Douglas K. Owens, e University of California, San Francisco–Stanford Evidence-based Practice Center and Center for Primary Care and Outcomes Research, Stanford University School of Medicine, Stanford, California; Veterans Affairs Palo Alto Healthcare System, 2004 (“Systematic Review: Surveillance Systems for Early Detection of Bioterrorism-Related Diseases,” Annals of Internal Medicine, June 1st, Available Online at: http://annals.org/article.aspx?articleid=717496, Accessed: 7-24-2015) Considerable controversy remains about the best methods of data analysis and presentation to facilitate public health decision making based on surveillance data. Most surveillance systems routinely analyze the data by calculating rates of cases over time. Few included reports described the methods for calculating the expected rate of disease or for setting thresholds to determine when the observed rate differs significantly from expected. Several authors described methods for stochastically modeling the spread of communicable disease (206–210). The use of these methods may allow for more accurate determination of the expected rates of disease and deviations from expected. Some of the surveillance systems designed specifically for bioterrorism (for example, ESSENCE) routinely perform both temporal and spatial analyses. The routine application of advanced space–time analytic methods may detect aberrations in bioterrorism surveillance data with greater sensitivity, specificity, and timeliness. However, no published report has evaluated whether a surveillance system that uses both temporal and spatial analyses is probably more timely or sensitive than a system that performs only temporal analyses. We need evaluations of surveillance systems that specifically evaluate various methods of presenting surveillance data to public health officials to determine which methods best facilitate decision making. Bioterrorism leads to extinction —the threat of bioterror is growing rapidly due to new technology. Casadevall 12 — Arturo Casadevall, Department of Microbiology and Immunology and the Division of Infectious Diseases of the Albert Einstein College of Medicine, 2012 (“The future of biological warfare,” Microbial Biotechnology, March 21st, Available Online at: http://onlinelibrary.wiley.com/doi/10.1111/j.1751-7915.2012.00340.x/full, Accessed: 7-25-2015) The realization that a handful of envelopes containing B. anthracis in 2001 was sufficient to cause widespread panic, and precipitated the first evacuation of the houses of the US government since the war of 1812, provided a clear demonstration of the power of cheap biological weapons. In an age of terrorism biological weapons are perfectly suited for asymmetric warfare where the relatively low costs of producing such weapons combined with their potential for amplification through communicability have a disproportionately strong effect on targeted populations. Consequently, biological weapons are likely to remain very attractive to terrorists and fringe groups like millennial sects. Thus the near horizon is likely to witness continued concern about low intensity use of biological weapons fashioned around known pathogenic microbes such as Salmonella spp. and B. anthracis, which have already been used in terrorism. The scene on the far horizon is much harder to discern simply because the current rapid the pace of technological advance suggests that new technologies are likely to be developed in coming years that will completely change the landscape for biological warfare offensive and defensive possibilities. Even without envisioning new biological agents, such as those that could be generated by synthetic biology, the technology already exists for significantly enhancing the lethality of biological weapons. The introduction of antimicrobial resistance genes into bacterial agents could significantly enhance their lethality by reducing treatment options. In this regard, it is relatively easy to generateB. anthracis resistant to first line antimicrobial therapies such as ciprofloxacin (Athamna et al., 2004). The efficacy of vaccines can be circumvented by genetically modifying agents to express immune modifier genes that interfere with the immune response as was demonstrated by the expression of IL-4 in ectromelia virus (Jackson et al., 2001). It is noteworthy that microbial modifications to increase lethality is only one possible outcome for engineering biological weapons since these could also be designed to incapacitate instead of kill. Given the enormous universe of microbial threats, the power of modern biology to enhance the microbial virulence and the high likelihood that biological weapons will continue to threaten humanity one must face the question of how best to protect society. The sheer number of threats and the availability of technologies to modify microbes to defeat available countermeasures suggest that any attempt to achieve defence in depth using microbe-by-microbe approaches to biodefence is impractical and ineffective. 2NC/1NR Extensions 2NC Overview The aff restores privacy protections of sensitive information regardless of who owns the server and expands the requirement for warrants to “all the information collected by machines over the Internet” — that’s their Collins evidence. Only the CP provides the most rapid and accurate means of preventing disease outbreaks and pandemics—timeframe and efficiency is key. Bean and Martin 01 — Nancy H. Bean, Chief of Biostatistics and Information Management Branch and project leader of the Laboratory Information Tracking System in the National Center for Infectious Diseases, Centers for Disease Control and Prevention, and Stanley M. Martin, the former Chief of the Biostatistics and Information Management Branch and former project leader of the Laboratory Information Tracking System at the National Center for Infectious Diseases, Centers for Disease Control and Prevention, 2001 (“Implementing a Network for Electronic Surveillance Reporting from Public Health Reference Laboratories: An International Perspective,” Emerging Infectious Diseases, Sep-Oct, Available Online at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2631881/, Accessed: 7-24-2015) Electronic surveillance systems meet three broad surveillance objectives: they generate hypotheses, monitor trends, and detect clusters and outbreaks (11). Electronic data transmission enables these objectives to be met very rapidly and often more accurately than with other reporting systems, thus extending the benefits to actually controlling the spread of illness. While the information needs for tomorrow and capacities to meet them can change overnight, the underlying surveillance principles and objectives are constant. Generating Hypotheses One role of surveillance is to provide hypothesisgenerating data (e.g., demographic characteristics of patients, risk factors for illness, or antimicrobial resistance patterns of infecting organisms). Surveillance databases should not be expected to provide answers to all questions about a particular disease or topic but to comprise a minimum data set to suggest hypotheses about events under surveillance. Monitoring Trends Surveillance systems that collect consistent data over extended periods can provide valuable information about spatial, temporal, and demographic changes in disease incidence. For example, the emergence or reemergence of pathogens, changes in antimicrobial resistance, or changes in target populations can be detected rapidly by examining electronic surveillance data. Information on trends or patterns provides a reliable basis for decision making about preventing and controlling disease. Before the initiation of electronic reporting, surveillance data may have signaled only that a cluster had occurred; this signal was often of little value in outbreak control since the outbreak may have been over before it was recognized. Detecting clusters often depended on alert laboratorians or epidemiologists recognizing increases in disease occurrence on the basis of their increased workload or their memory rather than actual data. With electronic reporting, data can be transmitted so rapidly that an outbreak can be detected and investigated while it is ongoing and interventions can be implemented. Statistical evaluations of surveillance data reported electronically can be more timely and accurate, and they will have greater value in detecting and curtailing outbreaks early (5,10,12-16). 2NC Solvency Extension No solvency deficit —private health information is still protected but public health data, which is key to preventing bioterrorism must remain available at a moment’s notice —that’s Bravata. Public health surveillance protects privacy rights regardless of warrant requirements —no solvency deficit. Stoto 8 — Michael A. Stoto, Professor of Health Services Administration and Population Health, Georgetown University School of Nursing & Health Studies, 2008 (“Public Health Surveillance in the Twenty-First Century: Achieving Population Health Goals While Protecting Individuals’ Privacy and Confidentiality,” The Georgetown Law Journal, Vol 96, Available Online at: http://georgetown.lawreviewnetwork.com/files/pdf/96-2/Stoto.PDF, Accessed: 7-24-2015) Traditional public health surveillance programs monitor disease using prespecified case definitions and employ manual data collection, human decision making, and manual data entry.54 In contrast, current electronic surveillance systems employ sophisticated information technology and statistical methods to gather and process large amounts of data and display the information for decision makers in a timely way. For instance, syndromic surveillance systems assume that during an attack or a disease outbreak, people will first develop symptoms, then stay home from work or school, attempt to self-treat with over-thecounter (OTC) products, and eventually see a physician with nonspecific symptoms, all days before they are formally diagnosed and reported to the health department.55 To identify such behaviors, syndromic surveillance systems regularly monitor existing data for sudden changes or anomalies that might signal a disease outbreak.56 Syndromic surveillance systems have been developed to include data on school and work absenteeism, sales of OTC products, calls to nurse hotlines, and counts of hospital emergency room (ER) admissions or reports from primary physicians for certain symptoms or complaints.57 The possibility “of earlier detection and more rapid response to a bioterrorist event has tremendous intuitive appeal,”58 but there are practical concerns about the use of these systems in state and local public health practice. In statistical terms there is a relatively narrow window between what can be detected in the first few days and what is obvious.59 As a result, the statistical value of syndromic surveillance for detecting bioterrorist attacks has not yet been demonstrated.60 In addition, syndromic surveillance’s success “depends on local health departments’ ability to respond effectively.”61 When a syndromic surveillance system sounds an alarm, health departments typically wait a day or two to see if the number of cases continues to remain high or if a similar signal is found in other data sources. Doing so, of course, reduces both the timeliness and sensitivity of the original system. If the health department decides that an epidemiological investigation is warranted, it may begin by identifying those who are ill and talking to their physicians. If this does not resolve the matter, additional tests must be ordered and clinical specimens gathered for laboratory analysis. Health departments might also choose to initiate active surveillance by contacting physicians to see if they have seen similar cases.62 2NC Disease/Pandemics Impact Pandemics spread like wildfire and cause extinction — only resistance monitoring solves in the necessary timeframe. Ferguson et al 6 — Neil M. Ferguson, Derek A. T. Cummings, Christophe Fraser, James C. Cajka, Philip C. Cooley, and Donald S. Burke, Department of Infectious Disease Epidemiology, Faculty of Medicine, Imperial College London, Department of International Health, Johns Hopkins Bloomberg School of Public Health, 2006 (“Strategies for mitigating an influenza pandemic,” Nature, April 26th, Available Online at: http://www.nature.com/nature/journal/v442/n7101/full/nature04795.html#B3, Accessed: 7-26-2015) Once a new pandemic virus starts to be transmitted in a country, interventions must be targeted for maximum impact. Applying the type of intensive control strategies envisaged for containing a pandemic at source6 is impractical as infection will constantly be reseeded in a country by visitors (see Supplementary Information). Clinical cases are clearly then the first priority for any more-targeted approach, as prompt treatment with antivirals reduces clinical severity and infectiousness18 (see Supplementary Information). Our results indicate that only very rapid treatment can significantly reduce transmission (Fig. 2c, d), because cases are at their most infectious soon after symptoms develop (seeSupplementary Information). For the high transmissibility scenario, same-day treatment of 90% of cases reduces cumulative attack rates from 34% to 29% and peak daily attack rates from 1.9% to 1.6%, with an antiviral stockpile sufficient to treat 25% of the population (the size many countries have ordered19) being adequate to implement the policy. If treatment is delayed by 1 day, the cumulative attack rate for the high transmissibility scenario increases to 32% (meaning that a 29% stockpile is needed), and the peak daily attack rate to 1.9%. The impact of treatment on the peak daily attack rate at the height of the epidemic is always greater than that on overall attack rates. Assuming that more than 50% of infections result in clinical illness requiring treatment would increase the required stockpile (see Supplementary Information). A real threat to the effectiveness of antiviral-based mitigation policies would be if resistant strains arose with transmissibility close to the wild-type level20. Such strains have not yet been detected, but resistance monitoring during a pandemic will be essential. 2NC Bioterror Impact Bioterror is possible and likely. Cairns 8 — John Cairns, Jr., 2008 (“PUTTING BIOTERRORISM IN PERSPECTIVE,” Bioterrorism and Biological Warfare, 2008, Available Online at: https://vtechworks.lib.vt.edu/bitstream/handle/10919/25010/cairns_bioterrorism_in_perspective.pdf?sequ ence=1&isAllowed=y, Accessed: 7-25-2015) The risk of terrorism cannot be reduced to zero. Living on an overcrowded planet with less resources per capita daily (1.5 million more people added each week) means that terrorism is a reality that people must learn to live with. Approximately 3 billion people are inadequately nourished, poorly housed, and have inadequate medical care. The wealth gap between most people and the ultra-rich has increased markedly in the 21st century and may continue to do so. This situation will probably produce quite a few terrorists who have had a family member suffer because food, housing, and medical care were too expensive. In the United States, especially following the publication of the general public and their political representatives insisted they be told the “safe” concentration of various chemical substances, especially pesticides. Investigators could show that exposure under particular test conditions for a specific length of time for a particular compound would often result in no observable effects. However, a few individuals of a species may be more sensitive to a particular compound than the limited number of organisms in the actual tests. Moreover, conditions outside the laboratory may be different in some areas than the conditions used in the tests. Using scientifically validated concentrations of chemicals that produced no-observable effects has dramatically reduced, but not eliminated, risk. The same approach is true for bioterrorism, and all other types of terrorism, but risk can never be reduced to zero in a multivariate, dynamic Earth. Just living is a risky activity, but it is far preferable to the alternative. AT: Public Health Surveillance Bad Public health surveillance is ethically justified regardless of violations of privacy to further the greater good and to protect individuals’ basic interest. Lee 13 — Lisa M. Lee, Ph.D., M.S. () Office of Surveillance, Epidemiology, and Laboratory Services, Centers for Disease Control and Prevention, 2014 (“Health Information in the Background: Justifying Public Health Surveillance Without Patient Consent,” Emerging Pervasive Information and Communication Technologies, May 9th, Available Online at: http://link.springer.com/chapter/10.1007/978-94-007-6833-8_3, Accessed: 7-25-2015) Rubel, finding no adequate guide to the conflicts between privacy and public health surveillance, takes a “basic interests” approach to justifying the collection of public health data without patient consent (Rubel 2012). The foundation for this approach is Rawls’s view that persons living in a pluralistic society have basic interests regardless of their conception of a good life and that therefore supersede personal interests based solely on their conception of a good life (Rawls 2001). 52 L.M. Lee Health, maximized in large part through public health, is one of these interests, and unless another person’s basic interests are at stake, activities that promote society’s basic interests are generally justifiable, perhaps obligatory. Rubel offers several conditions that temper the permissibility of public health interventions that promote health as a basic interest, and calls this the “unreasonable exercise argument” (Rubel 2012, p. 12). This argument allows for conditions where persons could justify a privacy claim over a public health good, specifically where there are important personal interests the exercise of which would not unreasonably burden the basic health interest. Using this approach, Rubel argues that public health interventions – including public health surveillance – that are necessary to further the basic interest of health are justified when implementation does not impose on another person’s basic interests. 3.5 Conclusion Collecting and using data without one’s knowledge or consent does not always constitute an ethical affront. In the context of health – considered a human right by some, a basic interest by others – pursuing the best possible outcomes is not possible on an individual level; population health is critical for individual health and the role of public health surveillance in population health is indispensable. The role of a government in protecting and enhancing the health of its people, thus meeting a basic interest of its population, is clear when the activities necessary are those that individuals cannot implement themselves. In a pluralistic society there will be disparate views on how much information the government ought to collect and store about its citizens, but there is no argument that it is possible to collect, store, and use public health surveillance data under ethical circumstances to better the health of a nation. Health officials are responsible and put individual’s privacy first despite political pressures. Richards 9 — Edward P. Richards J.D, M.P.H, Harvey A. Peltier Professor of Law and Director, Program in Law, Science, and Public Health at the Paul M. Herbert Law Center, Louisiana State University, 2009 (“DANGEROUS PEOPLE, UNSAFE CONDITIONS: THE CONSTITUTIONAL BASIS FOR PUBLIC HEALTH SURVEILLANCE,” The Journal of Legal Medicine, 2009, Available Online at: http://biotech.law.lsu.edu/Articles/ULGM_A_369622_O.pdf, Accessed: 7-25-2015) There have been few abuses of public health administrative searches. Public health authorities, if anything, have been too reticent to use proper surveillance techniques. Although some of this reticence is because of concerns about being seen as violating individual rights, most of it stems from lack of staff and other resources.113 Despite the push on public health preparedness since the terrorist attacks on September 11, 2001, health departments around the United States continue to suffer budget and staff cuts. The impacts of these cuts are exacerbated by legislatures pushing ever-increasing responsibilities on health departments without providing the budgets or staff to carry out these new tasks.114 The hardest issue for public health policy makers is to avoid pressures to transform public health agencies into extensions of the Department of Homeland Security. As we have seen from the adoption of Draconian emergency powers laws, it is more difficult to maintain a balance between individual rights and community protection than to attempt to satisfy political pressures by swinging wildly between extreme positions.115 AT: Public Trust I/L The CP builds trust — the public expects fast action on health threats. Lee 13 — Lisa M. Lee, Ph.D., M.S. () Office of Surveillance, Epidemiology, and Laboratory Services, Centers for Disease Control and Prevention, 2014 (“Health Information in the Background: Justifying Public Health Surveillance Without Patient Consent,” Emerging Pervasive Information and Communication Technologies, May 9th, Available Online at: http://link.springer.com/chapter/10.1007/978-94-007-6833-8_3, Accessed: 7-25-2015) Scientific justification of data collection for the public good is well documented (Brown 2000; Carrel and Rennie 2008; Tu et al. 2004; Verity and Nicoll 2002). Data are needed for scientific and medical research, such as development of chemotherapies or methods of infection control, as well as biobehavioral research that informs behavioral influences on health. Data are also needed to support a learning health system (Friedman et al. 2010) – a health system that improves by learning from itself by establishing a system of quality improvement that combines health services research and comparative effectiveness analyses of routinely collected clinical data. The aim of the learning health system is to improve both quality and efficiency of health care for all patients. In addition to improving clinical medicine for individuals, medical data are needed to drive recognition of public health threats, implement appropriate interventions, and evaluate effectiveness of action for communities and populations. Public health surveillance data are the foundation of all public health action. The public expects public health officials to act swiftly to reduce morbidity and mortality as much as possible. To do so, officials must ensure the unbiased, complete, representative, and timely collection of information from the populations they serve. The legal justification for public health data collection has a long history and is clear. Often it occurs in the ‘background’ of the health system with reportable disease notifications sent to local or state health officials by health care providers without individual patient consent per state laws (see Sect. 3. AT: Perm Perm fails— It links to the net benefit since the aff still uses warrants for public health surveillance—this destroys solvency. 1) Uncertainty —the aff creates a presumption against warrants and toward curbing public health surveillance. Even if some warrants are allowed uncertainty still fails in safeguarding against bioterror. 2) Delays— the warrant process causes massive delays and ramps up costs. Richards 9 — Edward P. Richards J.D, M.P.H, Harvey A. Peltier Professor of Law and Director, Program in Law, Science, and Public Health at the Paul M. Herbert Law Center, Louisiana State University, 2009 (“DANGEROUS PEOPLE, UNSAFE CONDITIONS: THE CONSTITUTIONAL BASIS FOR PUBLIC HEALTH SURVEILLANCE,” The Journal of Legal Medicine, 2009, Available Online at: http://biotech.law.lsu.edu/Articles/ULGM_A_369622_O.pdf, Accessed: 7-25-2015) The Court recognized that requiring Fourth Amendment warrants would make it difficult to carry out public health inspections. In particular, the Fourth Amendment model fails for preventive inspections, where the inspection is to discover public health threats rather than to respond to complaints about known threats. The Fourth Amendment does not allow screening for crime, but screening is key to public health.57 The Fourth Amendment model is also resource intensive, which raises the cost of enforcement. When a warrant is constitutionally required, cost is not an issue,58 but when there is no constitutional requirement for full criminal law due process protections, costs are a valid consideration.59 Thus, the Court was unwilling to burden public health officials with the costs and delays inherent in the Fourth Amendment warrant process. The compromise takes place in the area warrant arena. In these cases, which involve building inspections, the court has held that if the owner refused entry, the public health inspector would need to get a warrant from a judge. But rather than having to show the judge individualized probable case for a specific building, the inspector would need to show only a reasonable rationale for the inspection, the legal basis for the inspection,60 and the area covered by the warrant.61 For example, a warrant for fire inspections could be based on time period, such as yearly inspections, the statute or rule allowing such inspections, and a geographical or other method of determining which buildings would be inspected. This single warrant would be good for all of the buildings being inspected, obviating any specific knowledge of conditions or the identity of the owners of specific buildings. **Aff Answers** Exports PICs AT: Net Benefits 2AC L/ to Politics Counterplan links to politics – maintaining export controls is uniquely unpopular Douglas M. Stinnett and Bryan R. Early 11 (Academic Advisor at the Center for Policy Research-University at Albany and Faculty Expert in Economic Sanctions, “Complying by Denying: Explaining Why States Develop Nonproliferation Export Controls”, August 3 rd 2011, http://onlinelibrary.wiley.com/doi/10.1111/j.1528-3585.2011.00436.x/full) Combating proliferation through export controls has many of the characteristics of a collective action problem. First, it can be economically or politically costly. Implementing and administering export controls will impose financial costs on industry due to administrative burdens (Cupitt et al. 2001) and lost market share for exports (Beck and Gahlaut 2003). Restricting the transfer of sensitive technology can also hinder the pursuit of foreign policy goals by some states. Recent research on the supply-side of proliferation demonstrates that states transfer nuclear technology to further their strategic objectives. Fuhrmann (2009a), for example, concludes that states use civilian nuclear cooperation agreements as a means of strengthening friends and allies and pursuing strategic objectives. AT: Militarization NB Impact of DA inevitable – other states will just export the tech Douglas M. Stinnett and Bryan R. Early 11 (Academic Advisor at the Center for Policy Research-University at Albany and Faculty Expert in Economic Sanctions, “Complying by Denying: Explaining Why States Develop Nonproliferation Export Controls”, August 3rd 2011, http://onlinelibrary.wiley.com/doi/10.1111/j.1528-3585.2011.00436.x/full) The problem of compliance with nonproliferation norms stems from this combination of costly compliance and unevenly distributed benefits. States may be tempted to free ride in order to achieve strategic goals or maintain exports markets while letting others shoulder the burden of addressing global security. Bergenäs (2008), in particular, notes that implementing export controls has the features of a tragedy of the commons. In restricting the trade of dual-use technology, there is always the possibility of “undercutting,” which occurs when a government denies approval for the export of an item to a particular party only to have another government approve that same transaction to that party (Gahlaut and Zaborsky 2004). Thus, states may not view export controls as worthwhile when the likelihood of undercutting is high. If enough suppliers of a controlled good defect, the efforts of those states imposing export controls may have little effect on proliferators’ ability to acquire what they seek. No reason US is uniquely key – Pakistan will get its dual use tech from Europe – empirics prove Rizwana Abbasi 12 (PhD in International Security and Nuclear Non-proliferation from the University of Leicester, “Studies in the History of Religious and Political Pluralism, Volume 7 : Pakistan and the New Nuclear Taboo : Regional Deterrence and the International Arms Control Regime”, Published by Peter Lang, May 2012) By March 1979, Pakistan faced a new challenge, when the CIA informed the US government that Pakistan was busy on a centrifuge plant to produce weapons-grade uranium. Britain and the United States tightened their export regulations. When the CIA, in coordination with other intelligence agencies, prepared a report on Kahuta, Malik reveals that Pakistan had already acquired all the material and components needed for the enrichment plant. The export control policies were weak, security at the global level was lax, and the dual-use technology which Pakistan acquired was not covered by the Zangger Committee or the Nuclear Suppliers Group (NSG) list. Riffat Hussain, Hans Blix, James Acton, and others interviewed for this study admitted that this was indeed the case. Khan himself stated that it was not possible for us to make each and every piece of equipment or component within the country. Attempts to do so would have killed the project in the initial stage. We devised a strategy by which we would go all out to buy everything that we needed in the open market to lay the foundation of a good infrastructure and would then switch over to indigenous production as and when we had to. 144 He further stated, ‘my long stay in Europe and intimate knowledge of various countries and their manufacturing firms was an asset. Within two years we had put up working prototypes of centrifuges and were going at full speed to build the facilities at Kahuta’. 145 When interviewed, General Ehsan revealed that it was lust for money and greed which made foreign firms sell dual-use technology to Pakistan. Khan states: we received many letters and telexes and people chased us with figures and details of equipment they had sold to Almelo, Capenhurst etc. They literally begged us to buy their equipment. We bought what we considered suitable for our plant and very often asked them to make changes and modifications according to our requirements. One should realise that all this equipment was what we call conventional technology. It was normal chemical process and vacuum technology equipment which had a thousand and one uses in other disciplines. 146 Indeed, ‘almost all the equipment in Kahuta was imported from Europe’. 147 Khan had full authority, independently, to import the required technology to complete his goal of building centrifuges at the Kahuta plant. Furthermore, lax security at FDO, loopholes and inadequate guidelines of the London Club, and inadequate export regulations gave Khan a capability to reach the international market for making any necessary purchases. Khan was staying ahead of Western export control laws, in order to circumvent export restrictions and was able to procure much-needed technology and components from the international market. Indian and Pakistani nuclear facilities are far behind and they get their tech from other countries Gary Milhollin 02 (founder of the Wisconsin Project on Nuclear Arms Control, “The Use of Export Controls to Stop Proliferation”, April 15th 2002, http://www.iranwatch.org/our-publications/speech/use-export-controls-stop-proliferation) Both India and Pakistan have tested nuclear weapons, but still have progress to make. Both countries are trying to develop missiles with longer ranges, and smaller warheads to mount on these missiles. This will require better guidance systems, testing equipment, machine tools, and high-speed computers. Both countries will continue to try to procure these items. Both India and Pakistan have developed their nuclear and missile programs almost exclusively with imports. Virtually every element of the programs in both countries have been imported or based on foreign designs. India's plutonium comes from reactors supplied by Canada that run on heavy water imported from China, Russia and Norway through a German broker. The United States also sold heavy water to India. India's rockets use solid fuel stages copied from U.S. designs, liquid fuel stages based on Russian and French designs, and a guidance system developed with help from Germany. Pakistan's nuclear warheads use a Chinese design and are fueled with enriched uranium made with help from China, Germany, Switzerland and other countries. Pakistan's missiles come from China and North Korea. In the future, we must expect India to develop the ability to deliver nuclear weapons by surface ships, submarines and longrange bombers as well as long-range missiles. Pakistan can now produce its own short-and medium-range missiles and has nuclear capable F-16 fighter-bombers from America. Each country will continue to have enough nuclear warheads to inflict immense damage on the other. In a nuclear war, India would lose its high-tech industry, and lose its bid to be seen as a significant actor on the world stage - the opposite of what India's nuclear weapons appear designed to achieve. Pakistan could lose its status as an independent nation. Solvency Deficit 2AC Transparency The only way to solve the aff is through greater transparency – all states should be treated equally or it turns the aff - causes mistrust and kills relations Rizwana Abbasi 12 (PhD in International Security and Nuclear Non-proliferation from the University of Leicester, “Studies in the History of Religious and Political Pluralism, Volume 7 : Pakistan and the New Nuclear Taboo : Regional Deterrence and the International Arms Control Regime”, Published by Peter Lang, May 2012) Secondly, dual-use technologies are critical. There is a need to address sensitive technologies more clearly, the case of dual-use technology, all states should be treated equally. There is need for greater transparency in nuclear export controls. Export control measures undertaken through the ZC and the NSG should be open and transparent. These measures should be promoted within a framework of dialogue and cooperation among those states which participate in negotiations with non-party states. The NSG countries pursue a cartel policy (the ‘no undercutting’ principle), while Pakistan and India are expected to follow the NSG guidelines without having been made beneficiaries of the ‘no undercutting’ principle. The question arises as to why these non-NPT states should be expected to put themselves at a commercial and to consider their registration carefully. In disadvantage in the trade of dual-use technologies? Also with no information regarding denials – as NSG states share denial notices only among themselves – states like Pakistan, even if they wanted to, cannot take informed decisions regarding the export of dual-use technology. The implementation of NSG export controls requires better sharing of best practice at the international level. Perms 2AC Perm DB Perm do the plan and the counterplan – it’s not severance because the specification of maintaining controls of Pakistan is a mandate of the counterplan so it includes all of the plan and part of the CP 2AC Perm do the CP Perm do the CP – it’s an example of the way the plan can be done – and it’s justifies <insert PICs bad> FDA PIC Aff 2AC—Whistleblowers Solve Whistleblowers provide key info on fraud suspects and prevent harmful use of FDA data. Davis and Abraham 13 —Courtney Davis, senior lecturer in sociology, and John Abraham, professor of sociology, 2013 (“Is there a cure for corporate crime in the drug industry?,” BMJ, February 6th, Available Online at: http://www.bmj.com/content/bmj/346/bmj.f755.full.pdf, Accessed: 7-28-2015) Nearly 30 years ago, Braithwaite’s Corporate crime in the Pharmaceutical Industry showed that unethical and corrupt behaviour was endemic in the sector. Sadly, there is growing evidence that little has changed. Recent research suggests that violation of the law continues to be widespread. Most new medicines offer little or no therapeutic advantage over existing products, so promotion plays a huge role in achieving market share. In a crowded and competitive marketplace the temptation for companies to resort to misleading claims is great. According to Gøtzsche (doi:10.1136/bmj.e8462),1 as of July 2012, nine of the 10 largest drug companies were bound by corporate integrity agreements under civil and criminal settlements or judgments in the United States. The corporate activity that has led to recent government investigations has involved unethical and unlawful practices that are well beyond mere administrative offences. Whistleblowers’ and other “insider” accounts in the US typically include allegations that companies systematically planned complex marketing campaigns to increase drug sales, which involved illegal and fraudulent activities. These included active promotion of off label, or otherwise inappropriate, use of drugs, despite company knowledge that such use could seriously harm patients.2 2AC—No Impact Pandemics are unlikely — new technology and better medical practices prevent spread. Song 14 — Liting Song, Hope Biomedical Research, PostDoc Position, University of Toronto 2014 (“It is Unlikely That Influenza Viruses Will Cause a Pandemic Again Like What Happened in 1918 and 1919,” Frontiers in Public Health, May 7th, Available Online at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4019839/, Accessed: 7-28-2015) Nowadays, we travel faster, and we travel more frequently and globally, and we have more complicated social activities and lifestyles, thereby increasing the chances of viral mutation; and we realize that influenza viruses are even easier to reassort, recombine, and mutate in nature than many other RNA viruses. However, we are now living in a technologically, economically, and socially much better and advanced society. I believe influenza virus infections are controllable and preventable, with the increased population health and immunity, with the WHO Global Influenza Surveillance and Response System, and with standard/routine epidemiological practices, and with new effective anti-viral agents and vaccines in production in the future. Now, I first predict that influenza viruses will unlikely again cause a pandemic on a level comparable to what happened in 1918 and 1919. Hopefully, one day we could consider a strategy to produce a universal vaccine that can prevent people from infections of all influenza virus strains, or we could produce some very effective anti-influenza virus drugs; then influenza would not be a problem anymore. We should learn lessons from the mistakes we made in the past. It is reasonable and necessary to be cautious about influenza viruses, but overreactions or catastrophic reactions should be avoided in the future. My opinion is anti-traditional; the purpose of this article is to influence public health policy, and to save some of the limited resources and money for more important diseases like heart diseases, cancer, diabetes, AIDS, hepatitises, and tuberculosis (15). Foreign Students PICs China 2ac- S/D STEM China is the most important country for US STEM Lane and Kinser 13 [Jason E. Lane and Kevin Kinser @ The Nelson A. Rockefeller Institute of Government, the public policy research arm of the State University of New York, conducts fiscal and programmatic research on American state and local governments. May 2013. “The US Relies Heavily on Foreign Students to Support STEM Fields and the Knowledge Economy: Could the Foreign Talent Bubble Burst?” http://www.rockinst.org/observations/lanej/2013-05Is_Bubble_Bursting.aspx//jweideman] There has been much talk recently in the United States about a higher education bubble bursting. The growing student loan debt is a big bubble that’s about to pop, if it hasn’t already. Some pundits and politicians in the United States have also begun to point to increasing costs and continued high unemployment as an indicator that higher education writ large is creating a new bubble. Only time will tell if these trends are part of a new norm or if these booms are soon to be busts. One other bubble that has gotten less attention, however, may be on the verge of popping. And if it does, it could have a transformative effect on higher education and the nation’s knowledge economy. Colleges and universities in the United States have become increasingly reliant on international students to fill Science, Technology, Engineering, and Mathematics (STEM)-related graduate programs and support their STEM-related research agendas and patent generation. Moreover, because demand among foreign students for a U.S. degree seems unlimited, many colleges and universities have seen them as a quick fix for offsetting lagging interest among domestic students in graduate education, especially in STEM fields. These international students represent real revenues and significant enrollments. According to the latest data from National Center for Educational Statistics, international students account for around 10 percent of all graduate enrollments (compared to about 3 percent in undergraduate programs). In many fields, programs would not be viable if not for the significant international enrollment they draw. Many pay full fees and those that don’t are critical for supporting external grant funding that provides an important source of funding for universities — funding that often relies on international graduate students as research assistants and postdocs. Much like the easy-to-obtain loans prevalent before the housing market crash in 2008, international students have been considered a triple-A investment with reliable returns. But a recent report from the Council of Graduate Schools (CGS) reveals that the credit line may be starting to dry up. The number of international applications to graduate school increased by only 1 percent this year, following three consecutive years of about 10 percent growth. Maybe a 1 percent growth rate is not that alarming — especially following so many years of near double-digit growth. It’s probably only a small blip that will rebound next year, right? Perhaps. But we think the 1 percent increase could be a leading indicator of a more troublesome future and we think state and university leaders would be wise to consider the implications. First, international graduate students provide a substantial amount of talent in science and engineering — the fields that tend to drive the knowledge economy. The National Science Foundation (NSF) reports that 84 percent of foreign students who earned doctoral degrees in the period of 2001-11 did so in high-demand areas in the fields of science and engineering. The NSF also reports that the percentage of science and engineering doctorates awarded to foreign students peaked at 41 percent in 2007. About 35 percent of postdocs are temporary visa holders. Finally, according to a report by the Partnership for a New American Economy, foreign students, postdocs, and other nonfaculty researchers were behind 54 percent of the patents issued by universities in 2011. This means that any “blip” in international student enrollments will disproportionately affect the areas of science and engineering. Second, about half of all foreign applicants are from one nation: China. In fact, the NSF reports that about 40 percent of all foreign students who received doctoral degrees from 2001-11 came from China. According to the CGS report, applications to graduate school from China declined by 5 percent. This is a dramatic reversal following seven consecutive years of double-digit increases in Chinese applications. In an ideal scenario, the proportion of applications would be distributed among enough nations that a downturn in one country is offset by an increase in another. And, in fact, the decline in Chinese applications was offset by a 20 percent increase in applications from India. But that is only shifting, not diversifying, the source. In fact, the NSF data reveals that individuals from China, India, and South Korea account for half of all doctoral degrees in science and engineering awarded to foreign visa holders. When most foreign applicants come from just a few source countries, what happens when those students suddenly start deciding to go somewhere else? 1ar S/D- STEM Chinese students are key to the economy Freifelder 14 [Jack, China Daily USA. Citing data from the Brookings Institution. 9/1/14, “China makes up largest share of foreign students in US” http://usa.chinadaily.com.cn/epaper/201409/01/content_18522649.htm//jweideman] China remains by far the largest source country for foreign students coming to the US for higher education, according to a new report from the Brookings Institution. From 2008 to 2012, more than 1.1 million foreign students attended school in the US, and China comprised the largest portion of that group, with 285,000 students entering the US with F-1 student visas, showed the new study The Geography of Foreign Students in US Higher Education: Origins and Destinations on Aug 29. During that time foreign students studying in the US contributed more than $21 billion in tuition and close to $13 billion in living costs to the American economy. But just 45 percent of these students extended their visas after graduation and got jobs in the US. "Chinese students are coming to the US to study in fields that are highly sought out, and to get the skills to compete in this global economy," Neil G. Ruiz, an associate fellow at Brookings, who wrote the new study, told China Daily. "China is special because the numbers are so large, but a lot of foreign students are coming from newly-emerging cities in China, like Nanjing, Guangzhou, Wuhan, etc," Ruiz said, "so Beijing and Shanghai are not the only cities that these students are coming from because of the high demand for an American education." The report shows that two-thirds of foreign students are studying in "STEM (science, technology, engineering and math) or business, management and marketing fields," compared to 48 percent of their US counterparts. "America has a lot of top universities and the US takes in 21 percent of all foreign students studying abroad," Ruiz said. "Students will continue to want to come to the US because it is a center of research and development, and our universities have research facilities in all types of fields." Foreign students attending colleges and universities in the United States bring significant amounts of money to the US economy, but more can be done to encourage their interest in remaining in the US post-graduation, the report says. A decrease in Chinese applications is the worst situation possible ICEF 13 [ICEF organises international student recruitment workshops, makes student recruitment management software and offers recruitment consulting services. 2013. “American graduate schools see alarming drop in applications from Chinese students” http://monitor.icef.com/2013/04/american-graduateschools-see-alarming-drop-in-applications-from-chinese-students///jweideman] The 5% decrease among Chinese students may result in a huge blow to many American universities, since as of a year ago, Chinese students accounted for half of all foreign applicants to American graduate schools and one-third of those enrolled. Other countries contributing to percentage declines in US graduate school applications this spring are South Korea and Taiwan (-13% each) and Mexico (-11%). These source countries are often prioritised in national and institutionspecific recruitment targeting, so the decreases here are also very notable. Debra W. Stewart, president of the Council of Graduate Schools, is on record as being very concerned about the Chinese drop in particular, calling it “disturbing” and “precipitous” … “a post-9/11 kind of drop.” She attributed at least part of the decrease to a restricted funding environment for students attending US schools, and said: “ As a country, we simply can’t afford to maintain obstacles to international graduate study, especially as other countries are decreasing these barriers for highly qualified students.” Relations A/O The plan solves U.S. China Relations Chang 14 [Anthony, Writer for the Diplomat. 6/20/14, “Is Overseas Study Helping US-China Relations?” http://thediplomat.com/2014/06/is-overseas-study-helping-us-china-relations///jweideman] Both the number and growth of Chinese students at American universities is one of the more startling phenomena in higher education. A welcome one, too: study abroad would seem to promise a future where U.S.-China relations might be characterized by greater firsthand knowledge of American culture among the Chinese. By generating greater understanding, their experience in the U.S. should also expand their sense of common interests, brightening prospects for cooperation between the world’s main powers. While few would object to such a future as a goal of foreign policy, how realistic is it? Unsentimental Education Let’s start with the numbers: the Institute of International Education reports there were more than 235,000 Chinese students in the U.S. during the 2012/2013 academic year, a 21 percent increase from the year prior, making China the number one source of foreign students in America for four years running. Nearly half of these students are studying either business or engineering; adding math and the hard sciences would account for over two-thirds. These are ultimately more applied subjects that tend to be less popular among other international students, let alone among Americans: in 2011/2012, for instance, only 16 percent of U.S. bachelor’s degrees were conferred in these fields. Of course, it isn’t just academic majors that determine the character of study abroad, but even so, there are few indications Chinese students’ experiences are especially representative, independent of what their coursework looks like. That means less class participation, less involvement in extracurricular activities, and fewer friendships with Americans, even compared with other foreign students, despite the fact most American consider all these things inseparable elements of university life. And if Chinese students’ time abroad isn’t reflective of that broader U.S. experience, then one should ask to what extent their studies are really maximizing their understanding of America. Given that Chinese numbers have surged only recently, it might be unrealistic to expect this kind of integration so quickly. Plus, these challenges can face students no matter where they originally come from, especially places where university culture may differ dramatically. But the stakes involved in helping China’s youth obtain a more representative view of the U.S. are frankly higher, and both the number of international students (not to mention the tuition they often pay in full) can actually make it harder for universities to take their acculturation seriously. The more Chinese choose to study in America, the more tempting it becomes to measure success by the revenue they bring than educational quality, even as these students find it easier to spend their days with compatriots. Mandarin Is the (Distant) Future (Maybe) At the same time, educational exchange is a two-way street. While more and more Chinese arrive on U.S. campuses, there is no comparable trend in the other direction, making one question just how well America’s next generation will know the Chinese. In 2011/2012, fewer than 15,000 Americans were hitting the books in China, a mere two percent increase from the previous year, and only half the number studying abroad in Italy. And among this already small group, only 2,200 of them are actually pursuing a degree in China, a number that encompasses programs taught in English. Even high-profile initiatives like the Schwarzman Scholars program – a kind of Rhodes Scholarship to attend Tsinghua University – will have all its courses taught in English, despite the program’s founder saying, “In the 21st century, China is no longer an elective course.” Yet here is a course that currently has few requirements. Absent mutual understanding, US-China war is inevitable and goes nuclear Fisher 11 [Max Fisher is a former writer and editor at The Atlantic. Currently a journalist at VOX. 10/31/11, “5 Most Likely Ways the U.S. and China Could Spark Accidental Nuclear War” http://www.theatlantic.com/international/archive/2011/10/5-most-likely-ways-the-us-and-china-couldspark-accidental-nuclear-war/247616///jweideman] After 10 years of close but unproductive talks, the U.S. and China still fail to understand one another's nuclear weapons policies, according to a disturbing report by Global Security Newswire. In other words, neither the U.S. nor China knows when the other will or will not use a nuclear weapon against the other. That's not due to hostility, secrecy, or deliberate foreign policy -- it's a combination of mistrust between individual negotiators and poor communication; at times, something as simple as a shoddy translation has prevented the two major powers from coming together. Though nuclear war between the U.S. and China is still extremely unlikely, because the two countries do not fully understand when the other will and will not deploy nuclear weapons, the odds of starting an accidental nuclear conflict are much higher. Neither the U.S. nor China has any interest in any kind of war with one other, nuclear or non-nuclear. The greater risk is an accident. Here's how it would happen. First, an unforeseen event that sparks a small conflict or threat of conflict. Second, a rapid escalation that moves too fast for either side to defuse. And, third, a mutual misunderstanding of one another's intentions. This three-part process can move so quickly that the best way to avert a nuclear war is for both sides to have absolute confidence that they understand when the other will and will not use a nuclear weapon. Without this, U.S. and Chinese policy-makers would have to guess -- perhaps with only a few minutes -- if and when the other side would go nuclear. This is especially scary because both sides have good reason to err on the side of assuming nuclear war. If you think there's a 50-50 chance that someone is about to lob a nuclear bomb at you, your incentive is to launch a preventative strike, just to be safe. This is especially true because you know the other side is thinking the exact same thing. In fact, even if you think the other side probably won't launch an ICBM your way, they actually might if they fear that you're misreading their intentions or if they fear that you might over-react; this means they have a greater incentive to launch a preemptive strike, which means that you have a greater incentive to launch a preemptive strike, in turn raising their incentives, and on and on until one tiny kernel of doubt can lead to a full-fledged war that nobody wants. The U.S. and the Soviet Union faced similar problems, with one important difference: speed. During the first decades of the Cold War, nuclear bombs had to be delivered by sluggish bombers that could take hours to reach their targets and be recalled at any time. Escalation was much slower and the risks of it spiraling out of control were much lower. By the time that both countries developed the ICBMs that made global annihilation something that could happen within a matter of minutes, they'd also had a generation to sort out an extremely clear understanding of one another's nuclear policies. But the U.S. and China have no such luxury -- we inherited a world where total mutual destruction can happen as quickly as the time it takes to turn a key and push a button. The U.S. has the world's second-largest nuclear arsenal with around 5,000 warheads (first-ranked Russia has more warheads but less capability for flinging them around the globe); China has only about 200, so the danger of accidental war would seem to disproportionately threaten China. But the greatest risk is probably to the states on China's periphery. The borders of East Asia are still not entirely settled; there are a number of small, disputed territories, many of them bordering China. But the biggest potential conflict points are on water: disputed naval borders, disputed islands, disputed shipping lanes, and disputed underwater energy reserves. These regional disputes have already led to a handful of small-scale naval skirmishes and diplomatic stand-offs. It's not difficult to foresee one of them spiraling out of control. But what if the country squaring off with China happens to have a defense treaty with the U.S.? There's a near-infinite number of small-scale conflicts that could come up between the U.S. and China, and though none of them should escalate any higher than a few tough words between diplomats, it's the unpredictable events that are the most dangerous. In 1983 alone, the U.S. and Soviet Union almost went to war twice over bizarre and unforeseeable events. In September, the Soviet Union shot down a Korean airliner it mistook for a spy plane; first Soviet officials feared the U.S. had manufactured the incident as an excuse to start a war, then they refused to admit their error, nearly pushing the U.S. to actually start war. Two months later, Soviet spies misread an elaborate U.S. wargame (which the U.S. had unwisely kept secret) as preparations for an unannounced nuclear hit on Moscow, nearly leading them to launch a preemptive strike. In both cases, one of the things that ultimately diverted disaster was the fact that both sides clearly understood the others' red lines -- as long as they didn't cross them, they could remain confident there would be no nuclear war. ME S/D ISIS Can’t solve the ISIS advantage—The counterplan is massive discrimination against middle eastern students that plummets goodwill—that’s Zeman S/D and link turn The aff solves extremism, and the Middle East is the growing in importance to US STEM IIE 14 [The Institute of International Education. Non-Profit. 11/17/14, “Open Doors 2014: International Students in the United States and Study Abroad by American Students are at All-Time High” http://www.iie.org/Who-We-Are/News-and-Events/Press-Center/Press-Releases/2014/2014-11-17-OpenDoors-Data//jweideman] “International education is crucial to building relationships between people and communities in the United States and around the world. It is through these relationships that together we can solve global challenges like climate change, the spread of pandemic disease, and combatting violent extremism,” said Evan M. Ryan, Assistant Secretary of State for Educational and Cultural Affairs. “We also need to expand access to international education for students from more diverse backgrounds, in more diverse locations of study, getting more diverse types of degrees. Only by engaging multiple perspectives within our societies can we all reap the numerous benefits of international education - increased global competence, self-awareness and resiliency, and the ability to compete in the 21st century economy,” Assistant Secretary Ryan remarked. “International experience is one of the most important components of a 21st century education, and study abroad should be viewed as an essential element of a college degree,” said IIE’s President Dr. Allan E. Goodman. “ Learning how to study and work with people from other countries and cultures also prepares future leaders to contribute to making the world a less dangerous place." In 2013/14, there were 66,408 more international students enrolled in U.S. higher education compared to the previous year. While students from China and Saudi Arabia together account for 73 percent of the growth, a wider range of countries contributed to the increase, with India, Brazil, Iran and Kuwait together accounting for an additional 18 percent of growth. The number of The fastest growing student populations in the United States in 2013/14 were from Kuwait, Brazil, and Saudi Arabia, all countries whose governments are investing heavily in scholarships for international studies, to develop a globally competent workforce. The fastest growing region this year was the Middle East and North Africa, with an increase of 20 percent in students enrolled in U.S. higher education. There were eight percent Indian students increased by 6 percent to 102,673, reversing a three-year trend of declining numbers of Indian students at U.S. campuses. more students from Latin America and the Caribbean, which has benefited from support from 100,000 Strong in the Americas, a public-private partnership led by the U.S. State Department. Students from Asia increased by 8 percent as well, driven by a 17 percent increase from China. Privacy Amendment CP Solvency Deficits 2AC Courts Key Supreme Court good for wide-spread informational privacy protections Michael P Seng 85, co-executive director of The John Marshall Law School Fair Housing Legal Support Center and Fair Housing Legal Clinic, “THE CONSTITUTION AND¶ INFORMATIONAL PRIVACY, OR HOW¶ SO-CALLED CONSERVATIVES¶ COUNTENANCE GOVERNMENTAL¶ INTRUSION INTO A PERSON'S PRIVATE¶ AFFAIRS”, 1985, http://library.jmls.edu/pdf/ir/lr/jmlr18/49_18JMarshallLRev871(1984-1985).pdf, AB) Although the Supreme Court has not closed the door to a right¶ to informational privacy, its acceptance of the concept has been¶ somewhat less than enthusiastic. The Court has given limited recognition¶ to the right to be free from governmental disclosure, but¶ its rejection of an independent interest in one's honor and reputation ¶ has made its support of this right somewhat tentative. The¶ Court's failure to recognize any limits to government surveillance¶ and data gathering beyond those contained in the fourth amendment¶ is troublesome, especially given the clear intent of the conservatives¶ on the Court to cut back on the protections accorded by¶ the fourth amendment. 122 Consequently, the right to informational¶ privacy in the United States may actually lag behind what is articulated¶ by international standards¶ While reliance on state law may provide some protection¶ against invasions by state and local governments and by private¶ groups and individuals, it leaves the federal government free from¶ such restraints. It is the proliferation of federal bureaucracies and¶ law enforcement schemes that pose perhaps the biggest threat to¶ privacy interests today. Legislation can provide some protection,¶ but legislation is always dependent upon the popular will and is unlikely¶ to provide a check if the majority is willing to tolerate an¶ invasion. This of course means that the privacy rights of minorities¶ will always be in jeopardy. While Americans are generally concerned¶ about their privacy, 12 3 many people are willing to put up ¶ with some intrusions in order to enforce their own moral standards¶ upon the whole. 124¶ Conservatives on the Supreme Court may couch their opinions¶ in terms of judicial restraint and deference to Congress and the¶ states, but this is only a camouflage. No matter how they express¶ themselves they have made a value judgment that the Constitution¶ provides little or no protection to the individual against governmental¶ intrusions. The conservatives on the Court may not be saying¶ they like invasions of privacy, but they are in effect giving their¶ blessing to legislators or bureaucrats who want to intrude into private¶ affairs on one pretext or another. Just as the post-Civil War¶ Supreme Court proclaimed itself powerless to stop segregation and¶ thereby ushered in the "Separate but Equal" era,125 so might the¶ conservatives on this Court be ushering in an era of "Big Brother."¶ It is entirely true that recognition of a constitutional right to¶ information privacy will require the Court to reconcile the right¶ with freedom of the press and the public's right to know, but this¶ should not be a deterrent. In fact, this is the reason we have federal¶ judges whose pay and tenure is protected. It is their job under our¶ Constitution to make these decisions. Federal judges one way or¶ another do decide the underlying substantive issues.126 They either¶ do so explicitly in a well written opinion which tries to balance or¶ reconcile the particular values presented, or they do so implicitly¶ when they duck the issues and talk about judicial restraint and federalism. ¶ Whichever way they proceed, the judges do decide and¶ should be held accountable for the substantive results which flow¶ there from. The Supreme Court is key to provide a model for lower courts and executive action Timothy Azarchs 14, Law Clerk at the IRS, University of Pennsylvania, “Informational Privacy: Lessons from Across the Atlantic,” 2014, http://scholarship.law.upenn.edu/jcl/vol16/iss3/5/, Ideally, the legislature would provide clearly defined privacy rights that protect individuals from infringements by the executive. If a general privacy right existed, the Equal Protection Clause could provide at least some protection to minority groups whose privacy is singled out. But in the absence of such a law, executive actors may act with impunity in circuits that have not found a constitutional right. And in the absence of any guidance from the Supreme Court, circuit courts continue to reach disparate results based on intuition instead of coherent principles. Following the European model, the Supreme Court could provide clear guidance to the lower courts on how and when to review executive action. “Legitimate expectations of privacy” would allow actions clearly authorized by statute to escape scrutiny altogether because there can be no legitimate expectation that a statute will not be enforced. But “legitimate expectations” would give the lower courts something more concrete to guide them than the hypothetical right and conflicting opinions they have now. Government action could receive deferential review appropriate to the reality that collecting and disseminating information can often be very useful to the government, but courts could still punish the egregious violations like purposeless disclosure of rape details,163 HIV status,164 or sex tapes.165 And recognition that informational privacy is an important right could affect the Court’s decision-making when it balances that right against others.166 Regardless of what the legislature does, the law would benefit from a clear statement by the Court that the Constitution protects informational, and not just decisional, privacy. Supreme Court adapts to technologies – Congressional approaches are too reactionary Rebecca M. Lee 12, leader of an ISP project on the ALI’s Restatement of Information Privacy Principles. Editor of the Yale Journal of Law and Technology, co-founder of a reading group on Internet law and policy, intellectual property legal assistant and at the Federal Communications Commission, “CONTESTED CONTROL:¶ European Data Privacy Laws and the Assertion of Jurisdiction¶ Over American Businesses”, May 9 2012, https://s3.amazonaws.com/citpsite/teaching/certificate/RMLThesis.pdf, AB)¶ Constitutional privacy protections also took shape in the twentieth century. Because¶ constitutional privacy protections apply only against the government, they are not discussed ¶ in great detail here. However, these Supreme Court decisions are illustrative of the¶ connection between technological innovation and the challenges of adapting and applying¶ existing legal principles to provide protection against emerging privacy threats.42 ¶ In Olmstead v. United States (1928), the Supreme Court held that the Fourth¶ Amendment did not require the government to obtain a search warrant before conducting¶ telephone wiretapping surveillance because wiretapping did not entail search or seizure.43 ¶ The Court later overturned Olmstead in Katz v. United States (1967), holding that the government wrongly wiretapped the defendant in a phone booth, where he had a ¶ “reasonable expectation of privacy.”44 The Court thus created a new, context-dependent¶ protection against governmental violations of privacy beyond physical search and seizure.45¶ In Griswold v. Connecticut (1965), the Supreme Court ruled against a governmental ban ¶ on contraceptives, establishing protection for decisional privacy. Despite the absence of an ¶ explicit mention of privacy in the Constitution, the Court reasoned that a right to privacy¶ emanated from the penumbra of the Bill of Rights and created a new legal foundation for¶ privacy protections. In Roe v. Wade (1973), the Court held that this right to privacy also¶ protected a woman’s decision to have an abortion from governmental interference.46¶ In Whalen v. Roe (1977), the Supreme Court upheld the constitutionality of New York ¶ statutes requiring the collection of prescription medication information. However, the Court¶ also recognized that the right to privacy embodied in the Bill of Rights also includes an ¶ interest in “avoiding disclosure of personal matters,”47 or informational self-determination.¶ Since Whalen, the Court had not expanded on or clarified the right to informational privacy¶ with respect to the government until recently. In United States vs. Jones (2012), the Court ruled ¶ that the Fourth Amendment prevented police from attaching a global positioning system¶ (GPS) device to a suspect’s car without a search warrant¶ In the late twentieth century, the growth of computers, digital databases, and early¶ ICTs led to increasing Congressional and regulatory awareness of commercial informational privacy issues. However, American commercial data privacy policy regime is primarily reliant¶ on market forces and self-regulation to protect privacy. Regulation through federal statutes¶ and administrative policies play a secondary, complementary role.¶ As James Whitman rightly argues, “[T]here are, on the two sides of the Atlantic, two¶ different cultures of privacy, which are home to different intuitive sensibilities, and which¶ have produced two significantly different laws of privacy.” 49 The American policy approach¶ to commercial data privacy is the product of a distinctly American legal, social, and political¶ culture of privacy. In the United States, privacy is traditionally conceptualized as a liberty¶ interest (as opposed to a dignity interest) in maintaining a sphere or zone of privacy that is¶ protected from intrusion, especially by the government.50 This conception of privacy reflects¶ distrust of the government and greater confidence in the market to respect privacy. In¶ addition to influencing the target of privacy protections, governmental distrust strengthens¶ societal reluctance to state regulation of commercial data privacy. The First Amendment and ¶ the cultural importance of freedom of speech further constrain the government’s ability to¶ regulate commercial data privacy. In American jurisprudence, freedoms of speech and access¶ to information supersede privacy claims when the two interests conflict.¶ Thus the American culture of privacy has resulted in limited regulation of¶ commercial data privacy through legislation. In Lessig’s terms, the market is the primary¶ regulator of informational privacy in the United States. The American government’s role in¶ protecting informational privacy from commercial abuses is limited and takes two forms.¶ First, the Federal Trade Commission (FTC) monitors industry compliance with stated¶ privacy practices to improve consumer information accuracy and facilitate the market for privacy. This policy approach reflects and reifies the conception of commercial¶ informational privacy as a consumer interest, as opposed to a fundamental human right. The¶ corollary is that personal data can be traded off, like a commodity, for economic gain or¶ other benefits including the use of free web services. In order to carry out this calculus,¶ consumers need accurate information about how businesses collect, process, and ¶ disseminate personal data. Second, the government protects privacy in special cases through¶ sectoral federal statutes, which apply only to specific industries or types of sensitive personal¶ data.¶ The following federal informational privacy laws bear several important¶ characteristics. First, the American approach to legislating informational privacy protection is¶ ad hoc and reactive. Instead of attempting to anticipate and avert privacy threats, Congress¶ tends to pass legislation in response to privacy issues after their materialization. Second,¶ many of the federal statutes incorporate a limited or diluted version of the FIPs. Protection¶ is often limited to a few specific activities, like collection or disclosure.51 Lastly and most ¶ importantly, federal informational privacy laws are sectoral and protect data in specific highstakes ¶ contexts, complementing the default market-based mode of regulation for all other¶ types of data. There is no comprehensive commercial informational privacy statute. 2AC AT: Lower Courts Lower Courts Fail Timothy Azarchs 14, Law Clerk at the IRS, University of Pennsylvania, “Informational Privacy: Lessons from Across the Atlantic,” 2014, http://scholarship.law.upenn.edu/jcl/vol16/iss3/5/, It is easy to understand why the lower courts have been eager to find a constitutional protection of privacy. But leaving the interpretation up to the lower courts is a flawed solution. Without guidance on the scope or even the existence of the right, the lower courts have produced a morass of conflicting positions and left a hazy line that tells neither the government agent contemplating action nor the victim contemplating suit what side of that line a given action falls on. Without higher authority, many circuits are reluctant to extend the right as far as is deserved. 2AC Amendment Fails Legislative action fails – doesn’t protect minorities, unenforced, and vague Timothy Azarchs 14, Law Clerk at the IRS, University of Pennsylvania, “Informational Privacy: Lessons from Across the Atlantic,” 2014, http://scholarship.law.upenn.edu/jcl/vol16/iss3/5/, However, legislative action is not always effective at protecting disfavored minority groups.103 The majority may wish to oust these outsiders, or it may simply lack the motivation to overcome the inertia of the legislative process. For instance, it might be easier to pass a law that allowed the government to collect information about immigrants— ostensibly because they are more likely to be terrorists or drug runners—than to pass a law that protects homosexuals from disclosure of their sexual orientations. The right to privacy is fundamentally a minority protection, allowing a sphere of autonomous decision-making and freedom from the fear of the majority’s ridicule of one’s personal choices. To lay the burden of protecting this right at the feet of the majority suffers from the same problems as asking the majority to decide whether one might engage in consensual homosexual relations or join the communist party.104 Recognition by the courts that informational privacy is an important right with constitutional dimensions could help ensure that the courts will scrutinize such infringements, whether affirmatively enacted by the legislature or committed by the executive in the absence of legislative protections. The idea that so important a right can exist on so shaky a ground–or indeed not exist at all—is fundamentally problematic. In addition, these gaps in legislative protections for the right to privacy have persisted for a very long time, and it is not altogether clear that the gears are turning to close them now.105 Even if legislative clarity is preferable to judicial clarity, one clear answer from the Supreme Court is preferable to twelve vague ones from the circuits. The current uncertainty has several detrimental effects. First, insofar as there is a “correct” answer to the question, a circuit split implies that one side or the other is “incorrect.” Either constitutional rights are being underenforced in jurisdictions that improperly narrow the right, or nonexistent rights are being enforced in jurisdictions that improperly broaden it. Second, this assumed, but unconfirmed, right leaves the lower courts, government actors, and potential claimants with little guidance. As Justice Scalia suggested in his concurrence in NASA v. Nelson, this encourages an endless stream of hopeful plaintiffs to flood the courts with claims that are different on one or another dimension from decided cases because they have no grounds on which to determine whether those differences are relevant.106 A vague right may therefore result in even more litigation than a broad but clear one. Another possibility is that, for fear of prosecution, government agencies will be unwilling to cross a boundary whose location is uncertain and will be deterred from beneficial policies that approach but do not step over that boundary.107 The question should be settled, one way or the other, and the Supreme Court may be the only institution that can settle it. 2AC Amendment Backfires Explicit constitutional right to privacy backfires Mary Fan 12, Professor of Law at the University of Washington, “CONSTITUTIONALIZING INFORMATIONAL PRIVACY BY ASSUMPTION”, 3/2012, https://www.law.upenn.edu/journals/conlaw/articles/volume14/issue4/Fan14U.Pa.J.Const.L.953(2012).pd f, It is high time to call out the assumption for the hazy moral intuition that it is and situate the moral intuition in law, and as law, insofar as it is supportable. Resting a protection—even a hazy hypothetical protection—on a moral intuition is dangerous from a pragmatic as well as principled perspective. Moral intuitions are akin to “naïve theories” and heuristics— error-prone and intuition-guided generalizations—that suffer from the manifold cognitive biases identified in the judgment and decision making literature.18 Status quo bias is an example of a cognitive bias with the potential to chill policy innovations if we persist in an intuitive, feels-wrong approach to determining violations.19 New ideas rouse vague feelings of unease and disquiet because they disrupt the status quo, to which we are intuitively attached. We cannot always trust and use as a guide the affective sense that a particular policy seems disquieting in the change it wreaks. Moreover, inability to distinguish the chaff risks demeaning an important guide and principle for understanding what the liberty explicitly safeguarded by the Constitution means. This Article argues that the work of privacy as a constitutional concept is to adapt the idea of liberty in times of social change. Insofar as constitutionally relevant, the idea of informational privacy helps further define, and should be informed by, the freedoms safeguarded in the Constitution, such as the protections for liberty under procedural and substantive due process. There is a principled reason for distinguishing between the cases of HIV and sexual orientation outings by the state with the aim of marring employment, family, and friendships and cases where state employees want a job representing an important public trust but do not want to get drug tested like the rest of us. And it is more than the crude rule of thumb that we know a violation when we feel it. Perms 2AC Perm DB Perm do both solves and shields the link to the net benefit – no reason why a constitutional amendment can’t be passed along with the Supreme Court ruling the Constitution contains a right to informational privacy in the 4th amendment AT: Net Benefits 2AC L/ to Politics CP links to politics – inclusion of action taken by Congress risks triggering the link to politics – only the plan avoids it – using the courts isn’t perceived in the political process The plan is ridiculously capital-intensive Albert 14 (Richard Albert, Associate Professor at Boston College Law School, "Constitutional Disuse or Desuetude: The Case of Article V." Boston University Law Review 94, (2014): 1029-., http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1758&context=lsfp, AB) “Nothing is ‘easy,’” writes Henry Paul Monaghan, “about the processes prescribed by Article V.”112 Scholars today describe the requirements of Article V as practically impossible to meet.113 For instance, Bruce Ackerman views Article V as establishing a “formidable obstacle course.”114 Sanford Levinson argues that “ Article V, practically speaking, brings us all too close to the Lockean dream (or nightmare) of changeless stasis,”115 and that it is “the Constitution’s most truly egregious feature.”116 Rosalind Dixon has described the “virtual impossibility of formal amendment to the Constitution under Article V.”117 Jeffrey Goldsworthy observes that “the supermajoritarian requirements of Article V are so onerous as to be arguably undemocratic, by making it much too easy for minorities to veto constitutional amendments.”118 Vik Amar explains that Article V establishes “particular and cumbersome processes.”119 And Richard Fallon laments that “[e]ven under the best of circumstances, the requirement that three-fourths of the states must ratify constitutional amendments makes it nearly impossible to achieve significant change in our written Constitution through the Article V process.”120 Article V, in short, is seen as a dead end. This is not a new perspective on the difficulty of successfully using Article V. Writing in 1885, Woodrow Wilson decried the “cumbrous machinery of formal amendment erected by Article Five.”121 Even earlier, at the adoption of the Constitution, John DeWitt doubted whether it would ever be possible to amend the Constitution using Article V: “[W]ho is there to be found among us, who can seriously assert, that this Constitution, after ratification and being practiced upon, will be so easy of alteration?”122 DeWitt believed states would have views too different to meet Article V’s required supermajority threshold: Where is the probability that three fourths of the States in that Convention, or three fourths of the Legislatures of the different States, whose interests differ scarcely in nothing short of everything, will be so very ready or willing materially to change any part of this System, which shall be to the emolument of an individual State only?123 The answer, he predicted, was that formal amendment would be rare. Links to Circumvention 2AC It’s unpopular – this link turns the aff and causes circumvention Albert 14 (Richard Albert, Associate Professor at Boston College Law School, "Constitutional Disuse or Desuetude: The Case of Article V." Boston University Law Review 94, (2014): 1029-., http://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1758&context=lsfp, AB) Political parties and increased political polarization may have exacerbated the difficulty of Article V. As American political parties have become nearly evenly divided across both the federal and state governments over the last two generations, writes David Kyvig, “divisions within society together with the requirements of Article V frustrated every attempt to bring about fundamental change.”132 Kyvig adds that the close balance between political parties and among the forces of federalism alongside the “centripetal power of the federal government and the centrifugal strength of the states” have combined to inhibit agreement on formal amendment.133 Daryl Levinson and Rick Pildes observe that political parties in the United States “today are both more internally ideologically coherent and more sharply polarized than at any time since the turn of the twentieth century.”134 Rick Pildes connects the onset of today’s hyperpolarized politics to the adoption of the Voting Rights Act of 1965: [T]his polarization reflects the deep structural and historical transformation in American democracy unleashed in 1965 by the enactment of the VRA. That moment began the process of ideologically realigning the political parties and of purifying them, so that both parties are far more ideologically coherent, and differentiated from each other, than at any time in many generations. The culmination of that historical transformation – which can be seen as the maturation or full realization of American democracy – is today’s hyperpolarized partisan politics.135 Pildes concludes that “[t]he reality is that the era of highly polarized, partisan politics will endure for some time to come.”136 This only complicates an already difficult formal amendment process that relies on strong supermajorities across both the federal and state institutions. Nevertheless, as Christopher Eisgruber cautions, measuring amendment difficulty is itself difficult because amendment difficulty turns “upon a number of cultural considerations, such as the extent to which state politics differ from national politics and the extent to which people are receptive to or skeptical about the general idea of constitutional amendment.”137 The difficulty of measuring amendment difficulty has not discouraged scholars from comparing amendment difficulty across nations. In such measures, the United States has ranked among the most difficult to amend.138 SSRA PICs Amash-Conyers CP 2ac S/D The Counterplan solves none of the aff—it doesn’t dismantle the legal architecture for surveillance which opens the door to executive circumvention. The cp leaves databases and old data in place Martin 13 [Kate Martin, Director, Center for National Security Studies. 7/23/13, “Amash-Conyers amendment to Defense Appropriations to stop bulk collection of Americans’ telephone metadata.” http://democrats.judiciary.house.gov/sites/democrats.judiciary.house.gov/files/images/CNSSAnalysis.pdf/ /jweideman] Enacting this amendment will not leave the NSA “in the dark.” As outlined above, there are other existing authorities that allow the collection of call data and such data is apparently already being kept by many of the major telephone companies for at least a year. Moreover, the government apparently already has an existing data-base of this information on millions if not billions of Americans’ phone calls going back at least five years. This amendment does not address the retention or use of that database. AT: Telephony metadata key Telephone data collection doesn’t solve terror—new studies Nakashima 14 [Ellen Nakashima Reporter for the Washington Post. Cites a study by the New America Foundation, a Washington-based nonprofit group. 1.12.14, “NSA phone record collection does little to prevent terrorist attacks, group says” https://www.washingtonpost.com/world/national-security/nsaphone-record-collection-does-little-to-prevent-terrorist-attacks-group-says/2014/01/12/8aa860aa-77dd11e3-8963-b4b654bcc9b2_story.html//jweideman] An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone records by the National Security Agency “has had no discernible impact on preventing acts of terrorism.” In the majority of cases, traditional law enforcement and investigative methods provided the tip or evidence to initiate the case, according to the study by the New America Foundation, a Washington-based nonprofit group. The study, to be released Monday, corroborates the findings of a White House-appointed review group, which said last month that the NSA counterterrorism program “was not essential to preventing attacks” and that much of the evidence it did turn up “could readily have been obtained in a timely manner using conventional [court] orders.” Under the program, the NSA amasses the metadata — records of phone numbers dialed and call lengths and times — of virtually every American. Analysts may search the data only with reasonable suspicion that a number is linked to a terrorist group. The content of calls is not collected. The new study comes as President Obama is deliberating over the future of the NSA’s bulk collection program. Since it was disclosed in June, the program has prompted intense debate over its legality, utility and privacy impact. Senior administration officials have defended the program as one tool that complements others in building a more complete picture of a terrorist plot or network. And they say it has been valuable in knocking down rumors of a plot and in determining that potential threats against the United States are nonexistent. Director of National Intelligence James R. Clapper Jr. calls that the “peace of mind” metric. In an opinion piece published after the release of the review group’s report, Michael Morell, a former acting CIA director and a member of the panel, said the program “needs to be successful only once to be invaluable.” The researchers at the New America Foundation found that the program provided evidence to initiate only one case, involving a San Diego cabdriver, Basaaly -Moalin, who was convicted of sending money to a terrorist group in Somalia. Three co-conspirators were also convicted. The cases involved no threat of attack against the United States. “The overall problem for U.S. counterterrorism officials is not that they need vaster amounts of information from the bulk surveillance programs, but that they don’t sufficiently understand or widely share the information they already possess that was derived from conventional law enforcement and intelligence techniques,” said the report, whose principal author is Peter Bergen, director of the foundation’s National Security Program and an expert on terrorism. In at least 48 instances, traditional surveillance warrants obtained from the Foreign Intelligence Surveillance Court were used to obtain evidence through intercepts of phone calls and e-mails, said the researchers, whose results are in an online database. More than half of the cases were initiated as a result of traditional investigative tools. The most common was a community or family tip to the authorities. Other methods included the use of informants, a suspicious-activity report filed by a business or community member to the FBI, or information turned up in investigations of non-terrorism cases. Links to ptx The amendment links to politics O’Keefe 13 [Ed, staff writer for the Washington Post. 6/24/13, “Plan to defund NSA phone collection program defeated” http://www.washingtonpost.com/blogs/post-politics/wp/2013/07/24/plan-to-defundnsa-phone-collection-program-has-broad-support-sponsor-says///jweideman] A controversial proposal to restrict how the National Security Agency collects telephone records failed to advance by a narrow margin Wednesday, a victory for the Obama administration, which has spent weeks defending the program since media leaks sparked international outrage about the agency’s reach. Lawmakers voted 217 to 205 to defeat the proposal by an unlikely political pairing: Rep. Justin Amash (R-Mich.), a 33-year-old libertarian who often bucks GOP leadership and Rep. John Conyers (D-Mich.), an 84-year old liberal stalwart and the chamber’s second longest-serving member. Usually divergent in their political views, they joined forces in recent weeks in response to revelations about the NSA’s ability to collect telephone and Internet records that were leaked by Edward Snowden, a former NSA contractor who is seeking asylum in Russia. Speaker John A. Boehner (R-Ohio), who as head of the House rarely votes on legislation, voted against the amendment. The plan would restrict how the NSA can collect bulk phone records and metadata under the Patriot Act. Agency officials would be able to continue collecting telephone records, but only for people connected to relevant ongoing investigations. The proposal also would require that secret Foreign Intelligence Surveillance Act (FISA) court opinions be made available to lawmakers and that the court publish summaries of each opinion for public review. Conyers said the proposal “would curtail the ongoing dragnet collection and storage of the personal records of innocent Americans.” House Intelligence Committee Chairman Mike Rogers (R-Mich.) blasted the Amash-Conyers proposal Wednesday, calling it "inflammatory and certainly misleading." In an interview with a Michigan radio station , Rogers said that Amash was trying "to take advantage, at any rate, of people's anger" over various scandals such as the IRS investigation of conservative groups and the killing of the U.S. ambassador to Libya in Benghazi. Other Republicans agreed that the amendment would jeopardize ongoing counterterrorism operations. Rep. Tom Cotton (R-Ark.), a U.S. Army veteran who served tours of duty in Iraq and Afghanistan, said the amendment “takes a leaf blower and blows away the entire haystack.” Title iii CP S/D: Internet Title 3 causes law enforcement overreach and wrecks internet innovation Smith et al 2 [Marcia S. Smith, Jeffrey W. Seifert, Glenn J. McLoughlin, and John Dimitri Moteff Resources, Science, and Industry Division at EPIC. Congressional Report. March 4, 2002. “The Internet and the USA PATRIOT Act: Potential Implications for Electronic Privacy, Security, Commerce, and Government” https://epic.org/privacy/terrorism/usapatriot/RL31289.pdf//jweideman] However, some have raised concerns that Title III (as well as other provisions) may have a broader scope than many of its supporters intend.17 While many are concerned that the civil liberties of individuals may be compromised if law enforcement officials extend their reach, Title III may also have implications for a wide range of e-commerce activities. It is unlikely that the Act will immediately affect retail e-commerce (e.g., online catalogue orders) or business-to-business e-commerce (e.g., the use of the Internet for inventory ordering and management). While these forms of e-commerce are growing very rapidly, to date they have not been identified as being particularly susceptible to misuse by terrorists. Retail e-commerce and business-to-business e-commerce require verifiable information between parties that may include names, addresses, credit card numbers and other information, and can be traced relatively easily. However, some observers have not ruled out terrorists using existing e-commerce exchanges to facilitate their activities in the future.18 Title 3 is internet surveillance Smith et al 2 [Marcia S. Smith, Jeffrey W. Seifert, Glenn J. McLoughlin, and John Dimitri Moteff Resources, Science, and Industry Division at EPIC. Congressional Report. March 4, 2002. “The Internet and the USA PATRIOT Act: Potential Implications for Electronic Privacy, Security, Commerce, and Government” https://epic.org/privacy/terrorism/usapatriot/RL31289.pdf//jweideman] There are a number of provisions in the USA PATRIOT Act that are relevant to e-government interests. E-government involves using information technology, and especially the Internet, to improve the delivery of government services to citizens, business, and other government agencies.27 Most of these provisions are independent of one another, reflecting the often disparate and disconnected nature of e-government initiatives. Many of the provisions in the USA PATRIOT Act related to e-government focus on government-to-government (G2G) relationships, both within the federal government, and between federal, state, local, and foreign governments. Fewer of the provisions focus on government-to-business (G2B) or government-to customer (G2C) interactions. The relevant provisions can be found in titles III, IV, VII, IX, and X, and are briefly discussed in turn. ! Section 361 supercedes Treasury Order Number 105-08, establishes the Financial Crimes Enforcement Network (FinCEN) in statute, and charges the bureau with, among other things, establishing a financial crimes communication center to facilitate the sharing of information with law enforcement authorities. This section also requires FinCEN to maintain a government-wide data access service for information collected under anti-money laundering reporting laws, information regarding national and international currency flows, as well as information from federal, state, local, and foreign agencies and other public and private sources. ! Section 362 seeks to enhance cooperation between the federal government and the banking industry by directing the Security of Treasury to establish a “highly secure network” in FinCEN to enable financial institutions to file reports required by the Bank Secrecy Act and receive alerts regarding suspicious activities electronically. S/D EU relations Title 3 can’t access EU privacy internal links JonesDay 7 [Ranked among the world's most integrated law firms and best in client service, Jones Day has locations in centers of business and finance throughout the world. Written by Robert Graves. 2007 “Extraterritorial Application of the USA PATRIOT Act” http://www.jonesday.com/files/News/2df0b6051cc3-4729-ae61-a0305551bbe5/Presentation/NewsAttachment/742ac421-2ea3-4f3f-b275a25219eb8eee/Foreign%20Bank%20Compliance%20with%20PATRIOT%20Act.pdf//jweideman] The effort of the U.S. government to expand its subpoena powers over records held abroad has created privacy concerns, particularly in Europe, where data protection is tightly regulated. The U.S. has no general law of financial privacy analogous to the various European laws implemented pursuant to the European Data Protection Directive. The Right to Financial Privacy Act18 protects against intrusion by the federal government without due process, but the private market is regulated only lightly by a variety of statutes that operate primarily on the basis of notice and opt-out. The landmark Supreme Court case of United States v. Miller, 425 U.S. 435 (1976), held that the U.S. Constitution does not provide for a right to financial privacy. Lawmakers reacted swiftly, drafting the Right to Financial Privacy Act, which provided limited protection against government access to customer financial records held by financial institutions. Regulation of financial data transferred among private entities is far more limited. The Fair Credit Reporting Act19 states the circumstances in which financial data collected by consumer reporting agencies may be disseminated to third parties. In limited circumstances, companies may share information regarding a customer’s transactions with third parties without giving notice to the customer. A broader range of information may be provided to affiliated companies. The Electronic Funds Transfer Act20 gives consumers using electronic fund transfer systems the right to require financial institutions to provide information concerning disclosure of their account information to third parties. The Fair and Accurate Credit Transactions Act, which amended provisions of the Fair Credit Reporting Act, prohibits affiliated companies from sharing customer information for marketing solicitation unless the consumer is provided clear and conspicuous notification and an opportunity to opt-out. Europeans are worried about financial information requirements ROTENBERG 11 [MARC ROTENBERG, EXECUTIVE DIRECTOR, ELECTRONIC PRIVACY INFORMATION CENTER. 2011. “CYBERSECURITY AND DATA PROTECTION IN THE FINANCIAL SECTOR” Hearing before Congress. http://www.gpo.gov/fdsys/pkg/CHRG112shrg72701/pdf/CHRG-112shrg72701.pdf//jweideman] We are in a global economy with global businesses. Particularly with the Internet, people are purchasing products all around the world and a lot of customer data moves around the world, particularly now that we have cloud computing services that are offered in many different jurisdictions. We have actually worked with the Administration to urge the development of a comprehensive framework for privacy protection, and there is interest. In fact, part of the White House cybersecurity strategy talks about the need to strengthen privacy safeguards for commercial data flows, particularly between the United States and Europe. We hope they will go further for many of the reasons that you have outlined. The Europeans are also concerned about what happens to their financial data. There is a need to establish there a common framework with clear legal protections. And I think what you are reading now about the data breaches, of course, it is not just customers in the U.S., it is people all around the world. Now, the other question you raise, Senator, is also key in this area. 2ac: Title 3 ineffective Title 3 fails to stop terrorism and curbs freedom Rockett 8 [James M. co-chairs Bingham s Financial Institutions Corporate and Regulatory Group. He is a prominent banking lawyer who has spent more than 30 years exclusively representing banking and financial services clients. 2008. “FINANCIAL SERVICES AND E-COMMERCE THE UNDUE BURDENS OF THE BANK SECRECY ACT” PDF//jweideman] This brings us to another question about the whole BSA/AML construct and that is: why has this been sold to the American public in such a disingenuous manner? The American public largely believes the PATRIOT Act was passed under anti-terrorism rubric. In fact, the banking system is not and will never be an effective vehicle to combat terrorist financing. The 9/11 terrorists used approximately $500,000 over a period of several years to finance their horrifying acts. During that time hundreds of trillions of dollars flowed through the banks of this country. There were no characteristics or patterns that would have distinguished the 9/11 terrorists from any other foreign students in the U.S. who received money from home and paid tuition and living expenses with those funds. Nothing that U.S. banks are now being required to do will actually identify terrorists; that job must be done by old-fashioned investigative work by intelligence agencies. And we could certainly craft laws that will allow them access to financial records if they have good cause to suspect terrorist financing is taking place . What this highlights is what I will call the “equivalency” flaw of the current BSA/AML construct. By this I mean that the laws and regulations and the manner of their enforcement make no distinction between, and basically equate terrorist financing with, maintaining an account for Augusto Pinochet10 or a common crime, such as check kiting or a Ponzi scheme.11 It is one thing to say that we are preventing terrorist financing by setting up this elaborate, costly, intrusive bank account spying network; it is quite another to burden our society with a blatantly ineffective regulatory scheme in order to prevent current or former foreign government officials from maintaining U.S. bank accounts. That could be handled much like Office of Financial Asset Control regulations. And to have check kites or Ponzi schemes governed by the same rules is just plain silly. Finally, the American public has to be told candidly that every financial transaction that they undertake is being monitored for suspicious characteristics and anything that they do that is out of pattern is reported to the government. At a time when financial privacy has become a rallying cry, our citizens should know the truth about the unprecedented government scrutiny of their financial activities by deputizing their banks to indiscriminately spy on them. And this spying 74 E n g a g e Volume 6, Issue 2 is not limited to “terrorist financing;” it is a general spy network that reports any unusual financial activity to the of abuse inherent in such a scheme. Back some 30 years ago, a quaint regulation called Reg Q allowed banks to give out toasters to new customers who opened bank accounts. How far we have come? Now, under the guise of the USA PATRIOT Act, the Bank Secrecy Act and the AML regulations, instead of toasters banks are required to give customers the equivalent of ankle bracelets to monitor their every move. This is not progress and should not be viewed as consistent with the freedoms that the U.S. Constitution was established to protect. 2ac: Banking turn Kills the economy and banking Rockett 8 [James M. co-chairs Bingham s Financial Institutions Corporate and Regulatory Group. He is a prominent banking lawyer who has spent more than 30 years exclusively representing banking and financial services clients. 2008. “FINANCIAL SERVICES AND E-COMMERCE THE UNDUE BURDENS OF THE BANK SECRECY ACT” PDF//jweideman] Adverse Economic Impact of AML Environment The consequences of this lack of balance are predictable but need to be examined. First, and most obviously, banks are incurring enormous compliance costs. These are not small amounts of money that can be easily absorbed. Our largest banks are investing tens of millions of dollars each and mid-size and community banks are spending proportionately even more on everything: regulatorily required technology systems, compliance personnel, training account officers and new account clerks and tellers and loan officers and branch personnel, internal auditors, external consultants, independent auditors, executive management time, directors’ time’ monitoring accounts and financial transactions by customers; and filing largely meaningless SARs with the government. These monies are being taken from banks and their shareholders, under threat of regulatory enforcement penalties or even criminal prosecution, without any recompense from the government. These are not traditional “costs of doing business” nor are they routine processes of compliance that with time will be regularized. These are law enforcement expenses that should rightfully be borne by the government. Secondly, and even more importantly, the impact of the Bank Secrecy Act and Title III on the U.S. economy is staggering. This is a fact that has not been examined with any scholarly precision and is probably immeasurable in real dollars. But, cost structures of this magnitude have to be passed on to the users of banking services either directly or indirectly. These costs are also putting U.S. banks in an uncompetitive position in the rapidly globalizing world of financial services. There is also a significant but unquantifiable loss of foreign investment in the United States. Because of enhanced due diligence on foreignoriginated transactions, many foreigners have become increasingly reluctant to do personal business or invest in the United States. This trend is rapidly accelerating and will only be greatly exaggerated by the Treasury Department’s proposal to force U.S. financial institutions to collect and turn over data related to crossborder wire transfers.7 This also comes at a time when the U.S. economy is most vulnerable and can least afford such a foreign pullback. However it is not just the American consumer of banking services, or foreign investors, or the banks themselves that are paying the price. An entire industry of money services businesses is being driven out of the banking system and, in most instances, affecting those who can least afford it: the poor migrant and immigrant workers who come to the U.S. to perform labor at low wages and who want to cash a check or send funds back home to their families. Despite the Financial Crimes Enforcement Network (FinCEN) and the bank regulators having protested that they do not intend to create this result, the facts speak for themselves: money transmitters are viewed as “high risk” customers and the enhanced due diligence requirements are so onerous that bankers are faced with the Hobson’s choice of either undertaking ongoing monitoring (of not just the bank customer but the customer’s customer) at great expense or risking regulatory enforcement action. The only prudent decision is to withdraw from providing banking services to such money transmitters.8 But the money transmitters aren’t alone in being deemed to be “high risk.” In a list that on its face is preposterous, the bank regulators have identified the following “high risk” banking customers: · Foreign banks · Money Services Businesses (currency dealers or exchangers, check cashers, money transmitters, and issuers, sellers, or redeemers of travelers’ checks, money orders and stored value cards) · Non-bank financial institutions (casinos (tribal and nontribal), card clubs, brokers and dealers in securities) · Senior foreign political figures and their family members and close associates · Non-resident aliens and accounts of foreign persons · Foreign corporations with transaction accounts, particularly offshore corporations in high-risk geographies · Deposit brokers, particularly foreign deposit brokers · Cash intensive businesses (e.g., convenience stores, restaurants, retail stores, liquor stores, cigarette distributors, privately owned ATM operators, vending machine operators, and parking garages) · Non-governmental organizations and charities (domestic and foreign) · Professional service providers (attorneys, accountants, doctors, real estate brokers) · Import-export companies · Jewelry, gem and precious metal dealers · Travel agencies · Car, boat and airplane dealerships With this guidance for “high risk” is there any wonder banks are filing hundreds and thousands of useless SARs which are ignored by the very government that mandates them?9 Each new SAR builds an even denser haystack in which the needle becomes more imperceptibility embedded. And, if and when a terrorist attack actually takes place, somewhere an ignored SAR will be languishing among the hundreds of thousands of SARs filed because of the current indiscriminate regulatory environment. Expanded financial sector activity solves warming Mazzeo and Dlugolecki et al 2 [Michael J. Mazzeo is an Associate Professor in the Department of Strategy, and a Faculty Associate at Northwestern University's Institute for Policy Research. He serves on the editorial board of the Review of Industrial Organization. With guidance from UNEP Finance Initiatives Project Coach Dr. Andrew Dlugolecki. 2002. “Climate Change & The Financial Services Industry” http://www.kellogg.northwestern.edu/faculty/mazzeo/htm/sp_files/021209/(4)%20Innovest/Innovest%20 Publications/Innovest_UNEP2_10_15_02.pdf//jweideman] History teaches us that for politically-driven market systems to function effectively, financial institutions must play a prominent role in the market evolution process. From the creation of initial demand for an underlying good or service (as in the U.S. SO2 market in the 1990s), to the promulgation of transaction regulations, the protection of property rights and enforceable legal ownership provisions, and the requirement for transparency and disclosure, the finance sector has a critical role to play in creating the right conditions for market-based, commodity-oriented solutions to thrive3. Valuable experience in creating markets around the energy sector has already been acquired, so that commentators believe that the process of developing a mature market for carbon may take as little as five years (see Figure 2). As Module I showed, policymakers are now united in their belief that market solutions will play a pivotal role in whatever course of strategy national and regional lawmakers take, whether this is the Kyoto Protocol; the voluntary carbon intensity method (as advanced by the U.S.); “Contraction and Convergence”. And for market solutions to function effectively, financial institutions must play a full and active role in their development and operation (see box insert). From discussions with financial institutions and other GHG market specialists during the course of this study, the following suggestions can be made on how financial institutions can effectively deliver market solutions to the climate change problem: o Helping to structure and monitor an efficient market system by working with securities and exchange regulators, actuaries, accountants and other agents of the financial markets o Meeting statutory responsibilities and voluntary commitments to look at social and environmental issues and in doing so focus greater attention on climate change as an analytical factor. o Working to create other conditions crucial to the formation of an efficient emissions trading system i.e., a standardized “commodity”; standardized trade characteristics, organized exchanges, etc. o Creating and providing products and services that contribute towards adaptation and mitigation efforts (such as weather derivatives and catastrophe bonds) o Reexamining the extent to which fiduciary duties may necessitate examining potential sector and company risk relating to climate change, and factoring this into their proxy voting strategies. o Managing their own property risks arising from extreme weather events and pursuing leadership in areas such as energy efficiency within their own property portfolio. Moreover, financial institutions have a key role to play in advising companies and investors on the potential market risks associated with climate change and government GHG regulation, in the raising of finance for GHG projects, in structuring deals for potential vendors and purchasers of emissions credits, and in developing solutions to manage financing risks. Indeed, banks and insurance companies are used to dealing with highly complex issues, and over the years have developed carefully conceived, proprietary quantitative risk management methodologies to help them characterize and value complex risk scenarios. Climate change will result in extinction- IPCC agrees Snow 15 [Anthony McMichael receives funding from The National Health and Medical Research Council. He is affiliated with The Climate Institute. Colin Butler receives funding from the Australian Research Council. He is co-director of the NGO Benevolent Organisation for Development, Health and Insight. Helen Louise Berry receives funding from the National Health and Medical Research Council and the Australian Research Council. She is a member of the Australian Labor Party.March 31, 2014 http://www.smh.com.au/environment/climatechange/climate-change-could-make-humans-extinct-warns-health-expert-20140330-35rus.html “Climate change could make humans extinct, warns health expert”] (Vaibhav) The Earth is warming so rapidly that unless humans can arrest the trend, we risk becoming ''extinct'' as a species, a leading Australian health academic has warned. Helen Berry, associate dean in the faculty of health at the University of Canberra, said while the Earth has been warmer and colder at different points in the planet's history, the rate of change has never been as fast as it is today. ''What is remarkable, and alarming, is the speed of the change since the 1970s, when we started burning a lot of fossil fuels in a massive way,'' she said. ''We can't possibly evolve to match this rate [of warming] and, unless we get control of it, it will mean our extinction eventually.'' Professor Berry is one of three leading academics who have contributed to the health chapter of a Intergovernmental Panel on Climate Change (IPCC) report due on Monday. She and co-authors Tony McMichael, of the Australian National University, and Colin Butler, of the University of Canberra, have outlined the health risks of rapid global warming in a companion piece for The Conversation, also published on Monday. The three warn that the adverse effects on population health and social stability have been ''missing from the discussion'' on climate change. ''Human-driven climate change poses a great threat, unprecedented in type and scale, to wellbeing, health and perhaps even to human survival,'' they write. They predict that the greatest challenges will come from undernutrition and impaired child development from reduced food yields; hospitalisations and deaths due to intense heatwaves, fires and other weather-related disasters; and the spread of infectious diseases. They warn the ''largest impacts'' will be on poorer and vulnerable populations, winding back recent hard-won gains of social development programs. Projecting to an average global warming of 4 degrees by 2100, they say ''people won't be able to cope, let alone work productively, in the hottest parts of the year''. They say that action on climate change would produce ''extremely large health benefits'', which would greatly outweigh the costs of curbing emission growth. A leaked draft of the IPCC report notes that a warming climate would lead to fewer cold weatherrelated deaths but the benefits would be ''greatly'' outweighed by the impacts of more frequent heat extremes. Under a high emissions scenario, some land regions will experience temperatures four to seven degrees higher than pre-industrial times, the report said. While some adaptive measures are possible, limits to humans' ability to regulate heat will affect health and potentially cut global productivity in the warmest months by 40 per cent by 2100. Body temperatures rising above 38 degrees impair physical and cognitive functions, while risks of organ damage, loss of consciousness and death increase sharply above 40.6 degrees, the draft report said. Farm crops and livestock will also struggle with thermal and water stress. Staple crops such as corn, rice, wheat and soybeans are assumed to face a temperature limit of 40-45 degrees, with temperature thresholds for key sowing stages near or below 35 degrees, the report said. XT: solves warming A strong finance sector is key to warming resiliency and mitigation Bowman 14 [HR Business Partner at Apple Past Director, Human Resources at Novelis, General Manager, Human Resources at Porsche Cars North America, Vice President of Human Resources at Abbott... Education Vanderbilt University - Owen Graduate School of Management, Harvard University. May 8 2014, “DEVELOPMENT AND GLOBAL SUSTAINABILITY: THE CASE FOR ‘CORPORATE CLIMATE FINANCE’” http://www.hcs.harvard.edu/~res/2014/05/development-and-globalsustainability-the-case-for-corporate-climate-finance///jweideman] In short, moving to a low-carbon global economy and increasing climate resilience in developing nations will require significant capital outside of normal government channels and beyond business as usual. Indeed it will involve one of the largest market and economic transitions in modern global society. Given this reality, the finance sector has a key role to play in helping address climate change in terms of assisting developing countries with adaptation. Public finance actors, such as the World Bank and the newly created Green Climate Fund, tend to take the spotlight here. Far less attention has been given to the potential of and processes for directly engaging private finance sector actors as positive societal change-agents. Specifically, transnational private sector financial actors that are headquartered in developed countries are global economic gatekeepers and financial intermediaries, making them critical actors in the transition to a low-carbon global economy. They comprise insurers (especially re-insurers), institutional investors (especially pension funds) and banks. The potential of these private finance actors to assist climate change adaptation in developing nations and also the shift to a low-carbon economy globally has been largely unnoticed by scholars and policy-makers. The purpose of this article is to demonstrate that we need to start paying attention now. Public Climate Finance The role of financial capital in addressing climate change becomes clear by examining its relevance to sustainable development and ‘the environment’ more generally. Financial support for projects and technological innovation will almost always have environmental effects of some kind whether adverse or beneficial. Wholesale decisions regarding future development often arise in the finance sector; so this is where future pressures on the environment begin. As Richardson notes: “[i]f sustainable development is understood to imply, among other things, maintenance of natural and human-made capital for posterity, the role of capital markets must be recognized as pivotal to this goal.” (2006:309) Since the 2007 Bali Action Plan, international action on climate finance has centered on the provision of financial aid by developed countries to developing countries via public (usually multilateral or bilateral) institutions to build their resilience against climate variability (e.g. Chaum et al. 2011; Brahmbhatt 2011; Fankhauser and Burton 2011) and facilitate mitigation. For example, Climate Investment Funds are managed by the World Bank and implemented jointly with regional developing banks, which can leverage support from developed countries and buy-down the costs of low-carbon technologies in developing countries. Another option is the Green Climate Fund (GCF), a new multilateral fund that was agreed by Parties at the 2010 UNFCCC conference as an operating entity of the UNFCCC’s financial mechanism. The GCF’s purpose “is to promote, within the context of sustainable development, the paradigm shift towards low-emission and climate-resilient development pathways by providing support to developing countries to help limit or reduce their greenhouse gas emissions and to adapt to the unavoidable impacts of climate change.” (Green Climate Fund 2014). It will do this by allocating funds pledged by developed nations – US$100 billion per year by 2020 – to both mitigation and adaptation activities in developing nations, especially the most vulnerable (Cancun Agreements, Decision 1, CP16). The GCF is still under construction; its Board will aim to decide essential matters of how the GCF will receive, manage, programme and disburse funds in May 2014 (Green Climate Fund 2014). There is no doubt that multilateral efforts are vital. In particular, the GCF is a most welcome and timely global initiative; however, there are at least two initial concerns. First, looking at the sums of money cited in the Introduction, US$100 billion is insufficient to meet the task at hand. Due to the limited availability of public funds, investments at scale will also require private sector funding. To this end, the GCF employs a Private Sector Facility (PSF) to promote the participation of private sector actors in developing countries, particularly “small and medium-sized enterprises and local financial intermediaries.” (Green Climate Fund 2013:1). Private sector entities (like Google or Coca Cola) can provide funds through the GCF’s External Affairs division, alongside public contributions. This raises the second concern: that a vital opportunity to directly engage the private finance sector will be missed under these arrangements. Neither the PSF nor the External Affairs (donations) division will capture or engage multinational and transnational financial intermediaries, such as a large U.S. pension fund or a European bank. Why does this matter? Private finance sector actors are economic gatekeepers with access to large and multiple pools of money and the innate ability to move it around. Their raison d’être is to make intermediating decisions about where money (as an asset, debt or equity) comes from and where it flows to (via sourcing, allocation and advisory processes). In short, they have a central role to play in climate change efforts because, as noted by Lord Stern, “reducing emissions and adjusting to climate change involves investment and risk” (UNEPFI 2007:2). XT: Warming impact Warming is the only existential risk Deibel ’07 [Prof IR @ National War College Terry, “Foreign Affairs Strategy: Logic for American Statecraft,” Conclusion: American Foreign Affairs Strategy Today. PDF//jweideman] Finally, there is one major existential threat to American security (as well as prosperity) of a nonviolent nature, which, though far in the future, demands urgent action. It is the threat of global warming to the stability of the climate upon which all earthly life depends. Scientists worldwide have been observing the gathering of this threat for three decades now, and what was once a mere possibility has passed through probability to near certainty. Indeed not one of more than 900 articles on climate change published in refereed scientific journals from 1993 to 2003 doubted that anthropogenic warming is occurring. “In legitimate scientific circles,” writes Elizabeth Kolbert, “it is virtually impossible to find evidence of disagreement over the fundamentals of global warming.” Evidence from a vast international scientific monitoring effort accumulates almost weekly, as this sample of newspaper reports shows: an international panel predicts “brutal droughts, floods and violent storms across the planet over the next century”; climate change could “literally alter ocean currents, wipe away huge portions of Alpine Snowcaps and aid the spread of cholera and malaria”; “glaciers in the Antarctic and in Greenland are melting much faster than expected, and…worldwide, plants are blooming several days earlier than a decade ago”; “rising sea temperatures have been accompanied by a significant global increase in the most destructive hurricanes”; “NASA scientists have concluded from direct temperature measurements that 2005 was the hottest year on record, with “Earth’s warming climate is estimated to contribute to more than 150,000 deaths and 5 million illnesses each year” as disease spreads; “widespread bleaching from Texas to Trinidad…killed broad swaths of corals” due to a 21998 a close second”; degree rise in sea temperatures. “The world is slowly disintegrating,” concluded Inuit hunter Noah Metuq, who lives 30 miles from the Arctic Circle. “They call it climate change…but we just call it breaking up.” From the founding of the first cities some 6,000 years ago until the beginning of the industrial revolution, carbon dioxide levels in the atmosphere remained relatively constant at about 280 parts per million (ppm). At present they are accelerating toward 400 ppm, and by 2050 they will reach 500 ppm, about double pre-industrial levels. Unfortunately, atmospheric CO2 lasts about a century, so there is no way immediately to reduce levels, only to slow their increase, we are thus in for significant global warming; the only debate is how much and how serous the effects will be. As the newspaper stories quoted we are already experiencing the effects of 1-2 degree warming in more violent storms, spread of disease, mass die offs of plants and animals, species extinction, and threatened inundation of low-lying countries like the Pacific nation of Kiribati and the Netherlands at a warming of 5 degrees or less the Greenland and West Antarctic ice sheets could disintegrate, leading to a sea level of rise of 20 feet that would cover North Carolina’s outer banks, swamp the southern third of Florida, and inundate Manhattan up to the middle of Greenwich Village. above show, Another catastrophic effect would be the collapse of the Atlantic thermohaline circulation that keeps the winter weather in Europe far warmer than its latitude would otherwise allow. Economist William Cline once estimated the damage to the United States alone from moderate levels of warming at 1-6 percent of GDP annually; severe warming could cost 13-26 percent of GDP. But the most frightening scenario is runaway greenhouse warming, based on positive feedback from the buildup of water vapor in the atmosphere that is both caused by and causes hotter surface temperatures. Past ice age transitions, associated with only 5-10 degree changes in Faced with this specter, the best one can conclude is that “humankind’s continuing enhancement of the natural greenhouse effect is akin to playing Russian roulette with the earth’s climate and humanity’s life support system. At worst, says physics professor Marty Hoffert of New York University, “we’re just going to burn everything up; we’re going to heat the atmosphere to the temperature it was in the Cretaceous when there were crocodiles at the poles, and then everything will collapse.” During the Cold War, astronomer Carl Sagan average global temperatures, took place in just decades, even though no one was then pouring ever-increasing amounts of carbon into the atmosphere. popularized a theory of nuclear winter to describe how a thermonuclear war between the Untied States and the Soviet Union would not only destroy both countries but Global warming is the post-Cold War era’s equivalent of nuclear winter at least as serious and considerably better supported scientifically. Over the long run it puts dangers from terrorism and traditional military challenges to shame. It is a threat not only to the security and prosperity to the United States, but potentially to the continued existence of life on this planet possibly end life on this planet. AFF UQ: Banks Growth is limited by regulatory constraints Smith and Eckenrode 15 [Kenny Smith, Vice chairman at Deloitte outlook firm. Jim Eckenrode, Executive director at delloitte. 2015. “2015 banking outlook: boosting profitability amidst new challenges” www2.deloitte.com/content/dam/Deloitte/global/Documents/Financial-Services/gx-us-fsioutlook-banking-final.pdf//jweideman] Focus for 2015 Despite an improving economy, new liquidity and capital constraints will create major headwinds for profitability in 2015, making balance sheet optimization a top priority. This is particularly so for the largest banks, which have to comply with the LCR rule in 2015. These institutions will have to hold enough liquid assets to weather 30 days of serious market stress. As a result, their balance sheets will be burdened with more low-yielding assets. This pressure and low loan originations have already resulted in a greater share of securities on banks’ balance sheets, as shown in Figure 5. To minimize the pressure on NIM, firms will look to control funding costs by replacing wholesale funds with retail deposits. This pattern may in turn lead to higher interest expenses. These conflicting pressures in combination with the potential for lower asset yields may compress margins despite rising interest rates.6 Yet, as interest rates rise, we could see a reversal in recent trends with deposits flowing into higher interest accounts (Figure 6). Third Party PIC Aff Answers 2AC — No Solvency No solvency — electronic data creates overload and massive cost overruns for public health institutions. Lenert and Sundwall 12 — Leslie Lenert, with the Department of Medicine, and David N. Sundwall, with the Department of Family and Preventive Medicine, School of Medicine, 2012 (“Public Health Surveillance and Meaningful Use Regulations: A Crisis of Opportunity,” U.S National Library of Medicine, March, Available Online at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3487683/, Accessed: 7-26-2015) Meaningful use regulations pose a significant challenge for public health officials: they require public health institutions to be able to receive data transmissions in forms specified by ONC. This is likely to become a substantial problem because of the many types of health information technology (IT) systems, the number of different providers, the relative immaturity of standards, and the costs of becoming compliant with these requirements. If public health departments are not able to support connectivity, health care providers and hospitals in their jurisdiction are exempted from requirements to provide data to these departments.2 Furthermore, meaningful use requirements are designed to evolve rapidly: in stage 2, scheduled to begin in 2014, public health departments are expected to be able to receive data regularly from clinical providers for notifiable conditions, immunizations, and syndromic surveillance. In stage 3, beginning in 2015, electronic health records systems with new capabilities, such as the ability to work with public health alerting systems and on-screen “buttons” for submitting case reports to public health are envisioned.4 Public health departments will be required not just to upgrade their systems once, but also to keep up with evolving changes in the clinical care system prompted by meaningful use regulations. The size of the task facing public health departments to manage receipt of data from the clinical care system is daunting. With more than 5000 individual hospitals (> 3700 independent hospitals)5 and more than 230 000 physician practices in the United States,6 each of which might require a unique connection to 1 or more public health departments at the state and local levels, the task of building an integrated infrastructure is significant. Even with anticipated consolidation of practices and hospitals through health information exchanges, it will be costly and difficult. Furthermore, the requirement for continual evolution of the types of communications proposed for meaningful use adds to the problem. Each connection between public health departments and clinical care providers may need to be revised several times as requirements evolve. Where are state and local public health departments to find the funds to adapt their IT systems to this massive and constantly evolving data stream? 1AR- No Solvency Surveillance data overloads public health departments and prevents solvency —they don’t have sufficient infrastructure or resources to deal with electronic data. Lenert and Sundwall 12 — Leslie Lenert, with the Department of Medicine, and David N. Sundwall, with the Department of Family and Preventive Medicine, School of Medicine, 2012 (“Public Health Surveillance and Meaningful Use Regulations: A Crisis of Opportunity,” U.S National Library of Medicine, March, Available Online at: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3487683/, Accessed: 7-26-2015) Data from a recent survey by the Association of State and Territorial Health Officers suggest that public health departments are ill prepared to meet even the initial requirements for surveillance systems.7 Fewer than 45% of state health departments reported being ready to test receiving meaningful use data on syndromic surveillance. Rates of reported readiness for testing of notifiable diseases and immunization data were higher, but additional work is needed. The most common obstacle, as might be expected (37 of 48 respondents), is a lack of funding. The benefits of upgrading to be able to receive messages from meaningful use are not clear: one survey respondent said, Updating our [ELR] infrastructure … will cost over $100 000 including re-certification… . Updating … will not provide any real benefit to us as the Public Health Department.7(p13) Local health departments likely face even greater challenges in responding to meaningful use. A recent National Association of City and County Health Officials survey of local health departments found that 72% identified insufficient funding among their top 3 barriers to system development.8 However, money is not the only problem. Lack of time or resources to divert from current programs and responsibilities was a top barrier to system development for 55% of survey respondents. A further problem is growth in the volume of data that will come to the public health systems. Estimates from the Indiana Health Information Exchange suggest that automation of reporting for notifiable diseases will increase the volume of reported diseases about 4 to 10 times over that of manual reporting.9 New systems and work flows will be needed to process these reports, for example, automating access to electronic medical records to facilitate case investigation. Increases in the volume of data for syndromic systems could be much greater. Many local agencies with functional systems only receive syndromic data from a few hospitals in their jurisdiction. Demands on immunization registries also will increase, because providers are essentially mandated to report immunizations to registries, potentially overwhelming existing infrastructure. New kinds of capabilities are also envisioned for later stages of meaningful use, such as linking electronic health records with chronic disease registries, buttons for reporting of notifiable diseases, and vaccine forecasting.4Therefore, public health readiness for meaningful use requires more than a 1-time investment: it requires ongoing upgrades of public health infrastructure. 2AC — No Impact Bioterrorism is unlikely and alt causes to solvency — hard to access to technology and alarmism disprove. Leitenberg 9 — Milton Leitenberg, Swedish Institute of International Affairs and the Center for International Studies Peace Program at Cornell University, and he has been a Senior Fellow at CISSM, 2009 (“THE SELF-FULFILLING PROPHECY OF BIOTERRORISM,” Nonproliferation Review, March, Available Online at: http://cns.miis.edu/npr/pdfs/161_review_leitenberg.pdf, Accessed: 7-272015) The intellectual history of touting the bioterrorist threat is a dubious one. It began in 1986 with an attack on the validity of the BWC by Douglas Feith, then an assistant to Richard Perle in President Ronald Reagan’s Defense Department and more recently undersecretary of defense for policy until August 2005. Feith introduced the idea that advances in the microbiological sciences and the global diffusion of the relevant technology heighten the threat of BW use. Though advances in molecular genetics and globalization increased drastically by 2008 in comparison to 1986, the number of states that maintain offensive BW programs has not. And despite the global diffusion of knowledge and technology, the threat of terrorist networks creating BW is low. But the invocation of overly alarmist themes continues. In 2005, Tara O’Toole, chief executive officer and director of the Center for Biosecurity at the University of Pittsburgh Medical Center, said, ‘‘This is not science fiction. The age of Bioterror is now.’’31 It hardly comes as a surprise to learn that the office of Vice President Cheney was the driving force behind the Bush administration’s emphasis on bioterrorism.32 But one vital point missed by Clark is that Cheney was influenced by, among other things, the very same ‘‘Dark Winter’’ scenario with which Clark opens his book. The other influences on Cheney were a veritable hysteria of fears and phantoms in the White House following the 9/11 and the Amerithrax attacks, several of which concerned the potential of terrorist use of BW and which reportedly led Cheney to believe he might soon become a victim.33 What must be noted is that although Al Qaeda’s interest in BW failed, the group’s efforts were specifically provoked by the severely overheated discussion in the United States about the imminent dangers of bioterrorism. A message from Ayman al-Zawahiri to his deputy on April 15, 1999, noted that ‘‘we only became aware of them [BW] when the enemy drew our attention to them by repeatedly expressing concerns that they can be produced simply with easily available materials.’’34 (In a similar vein, terrorism expert Brian Jenkins of the RAND Corporation has been at pains to point out that, ‘‘We invented nuclear terror.’’)35 If in the coming decades we do see a successful attempt by a terrorist organization to use BW, blame for it can be in large part pinned on the incessant scaremongering about bioterrorism in the United States, which has emphasized and reinforced its desirability to terrorist organizations. No bioterrorism — four failed incidents disprove and future attacks are unlikely. Leitenberg 9 — Milton Leitenberg, Swedish Institute of International Affairs and the Center for International Studies Peace Program at Cornell University, and he has been a Senior Fellow at CISSM, 2009 (“THE SELF-FULFILLING PROPHECY OF BIOTERRORISM,” Nonproliferation Review, March, Available Online at: http://cns.miis.edu/npr/pdfs/161_review_leitenberg.pdf, Accessed: 7-272015) Finally, the history of attempts by non-state actors to develop or use biological agents has been remarkably limited. The significant episodes are all well known, and Clark, a research scientist and professor of immunology, briefly summarizes them in Bracing for Armageddon? The first was the use of Salmonella, a bacterium that causes diarrhea, in the United States in 1984 by the Rajneeshshee cult, in The Dalles, Oregon, in a failed attempt to influence a local election. The second was Aum Shinrikyo’s 19901993 failed effort to obtain and culture strains of Clostridium botulinum and Bacillus anthracis and disperse the resulting products. The group never succeeded in obtaining a pathogenic strain of either organism, and its culturing and dispersal efforts also came to naught. The third was the effort by Al Qaeda in Afghanistan between 1997 and 2001 to obtain a pathogenic culture of B. anthracis and to initiate work with the organism. Once again, the effort failed, as the organization was unable to obtain a pathogenic strain of B. anthracis. Al Qaeda’s work was incompetent in the extreme and had barely advanced beyond early speculation by the time a joint allied military team raided and occupied its facilities in December 2001. The last significant episode was the dispersal of a purified, dry powder preparation of B. anthracis sent through the U.S. postal system to multiple addressees in September and October 2001*the so-called Amerithrax incidents. The Al Qaeda and the Amerithrax events are the most significant. The barely initiated, rudimentary, and failed attempt by Al Qaeda is important because of the nature of the group*a true international terrorist organization with a wide organizational THE SELF-FULFILLING PROPHECY OF BIOTERRORISM 99 structure, demonstrated initiative, and a record of successful, albeit conventional, attacks. The Amerithrax attacks are significant because of the nature of the material prepared and the perpetrator; the mailings demonstrate what a professional is capable of, but identifying the perpetrator was essential to explaining who could make such a product and under what conditions. In other words, identification would provide critical insight into both the likelihood of international terrorist organizations developing similar capabilities and how quickly such a threat could emerge. It is notable that since the interruption of the Al Qaeda BW project in December 2001, there are no indications that the group has resumed those efforts.24 (Accounts of Al Qaeda offshoot groups in the United Kingdom, France, or Iraq producing ricin are all spurious.) There have also been no publicly identified indications that any other international terrorist group has initiated the development of BW agents in the intervening years 2AC — Public Health Surveillance Bad Public health practices ignore privacy in the interest of national security —this undermines democracy and hurts disease prevention. Bayer and Fairchild 10 — Ronald Bayer, Professor, Center for the History and Ethics of Public Health, Columbia University's Mailman School of Public Health, and Amy Fairchild, Associate Professor and Chair, Department of Sociomedical Sciences, Columbia University's Mailman School of Public Health, 2010 (“ When Worlds Collide: Health Surveillance, Privacy, and Public Policy,” Social Research, Vol 77, September 1st, Available Online at: http://web.a.ebscohost.com.turing.library.northwestern.edu/ehost/pdfviewer/pdfviewer?sid=134f036b3bfa-496f-a0d2-6b5df6c6260b%40sessionmgr4002&vid=1&hid=4104, Accessed: 7-27-2015) And yet privacy advocates remained uneasy about the apparent political consensus over public health surveillance. They argued that good public health and the protection of privacy need not be in tension. Indeed, proponents of privacy in the latter part of the twentieth century have invoked instrumental claims when warning of the consequences of intrusions on what they viewed as sacrosanct domains. They have When Worlds Collide 925 sought to demonstrate that limits on the confidentiality of the doctorpatient relationship would subvert not only clinical care but also the pubhc's health. In the context of anxieties about how national security considerations could narrow the purchase of privacy, Janlori Goldman wrote that The codification of vague promises that power will not be abused and good judgment will be employed ignores the historical lesson that during a crisis, privacy and civil liberties are given little weight in the balancing of competing law enforcement, national security, and commercial interests. Preserving public health and protecting privacy can— and must—go hand in hand (Goldman 2005:526). But alarm has extended beyond the issue of national defense. There are anxieties, too, about efforts to draw clinical medicine and public health into a closer relationship. Arguing for the most stringent protections of surveillance data, privacy advocates assert that it essential to address the question of whether an effective public health program always requires the use of personally identifiable reports. The conventions of public health surveillance dating firom the beginning of the twentieth century need not determine how we confront the challenges of the twenty-first. Finally, there were, they have argued, no necessary trade-offs between a robust commitment to privacy and good public health practice. An alternative view, one that we hold, sees the tension between privacy and the need to know on the part of public health agencies as enduring even if it is not always expressed in bitter controversy. On this view, it is the open recognition of tensions that holds out the prospect for recognizing both the claims of privacy and public health. The vitality of democratic communities requires an ongoing effort to negotiate and renegotiate the boundaries between privacy, society's "limiting principle," and public health, which at its best has sought to expand the role of govemment as a guardian against disease and suffering SOX PIC Negative 1NC Text: The United States federal government should no longer apply the Sarbanes Oxley Act of 2002 to small businesses valued at $75 million or less. The counterplan solves the entire Aff – it removes SOX surveillance regulations on small business but maintains them on large corporations – this is the best balance Grinberg 07 (The Impact of Sarbanes Oxley Act 2002 on Small Firms , http://digitalcommons.pace.edu/cgi/viewcontent.cgi?article=1055&context=honorscollege_theses) Although SOX has restored investor confidence, it has been more disadvantageous for small firms in comparison to large and medium-size firms. The SEC acknowledges that implementing SOX for small firms is a much harder task; therefore, the SEC gave a one-year extension to small businesses.4 Furthermore, after receiving many complaints about the Act, the SEC created an advisory committee to investigate SOX’s effect on small public firms. The committee suggested that the SEC grant a one year extension to small firms because the firms were having trouble finding funds to establish necessary controls required by SOX.5 Therefore, the SEC was considering giving small firms that have up to $75 million in market capitalization an additional one year extension that would extend the compliance deadline to July 2007.6 The committee’s consideration is in line with the findings of many studies which conclude that SOX benefits large public firms, but inhibits and stifles small public firms. The high cost of SOX implementation is financially draining many small firms. The Sarbanes Oxley Act doesn’t make a distinction between large-cap billion-dollar companies and small-cap, $75-million companies.7 Therefore, the Act requires all public companies to comply with the same regulations. The act doesn’t take into consideration that small companies aren’t as complex in organizational structure as large companies. Since large corporations have more complex business models, they have more complicated accounting practices; therefore, in order to ensure the efficiency of their operations, large firms already have a lot of controls in place that are required by SOX. On the other hand, smaller companies have simpler organization structures and, thus, have simpler accounting practices, which generate simpler financial statements. These small firms require less internal controls. Therefore, since small companies have simpler business models and less complicated accounting practices, they shouldn’t be subject to the same internal controls and external auditing requirements of large companies. In addition, Mr. Wolkoff, chairman & CEO of the American Stock Exchange, a public exchange that caters mostly to small and mid-size firms with market capitalization between $50 million and $500 million, points out that majority of corporate scandals have occurred in large corporations with “thousands of unsuspecting shareholders, and their securities were the bulk of many retirement/pension accounts.”8 However, small companies don’t have such investor interests and are usually owned by the entrepreneurs who started the companies, their families, and public shareholders that are not out to cheat themselves.9 Therefore, although shareholder interests should be protected, SOX regulations aren’t needed for smaller firms that have simple business structures and a small number of shareholders that are unlikely to defraud themselves. On the other hand, SOX requirements should be tailored to company size and be designed to improve the profitability and efficiency of smaller companies instead of placing them at a competitive disadvantage and stumping their growth by requiring them to spend excessive amounts of money and time on implementing regulations. Specifically, keeping SOX regulatory scheme in place on large corporations is critical to prevent mass fraud Hanna 14,(http://www.forbes.com/sites/hbsworkingknowledge/2014/03/10/the-costs-and-benefits-ofsarbanes-oxley/, Associate Editor at Harvard Business School, The Costs And Benefits Of SarbanesOxley) Despite high initial costs of the internal control mandate, evidence shows that it has proved beneficial. “Markets have been able to use the information to assess companies more effectively, managers have improved internal processes, and the internal control testing has become more cost-effective over time,” according to Srinivasan. and investment in research and growth. Another concern that the act would shrink the number of IPOs has not been borne out either; in fact, the pricing of IPOs post-SOX became less uncertain. The cost of being a publicly traded company did cause some firms to go private, but research shows these were primarily organizations that were smaller, less liquid, and more fraudprone. “Yes, SOX may have cut off public market financing to these companies, but the question is whether it was appropriate for them to be in public markets in the first place,” Srinivasan says. “That is a value judgment, to be sure. But it may not be a bad thing if certain companies are restricted in their access to financing, simply because loss of trust in public capital markets has big consequences for the entire economy.” A 2005 survey by the Financial Executives Research Foundation found that 83 percent of large company CFOs agreed that SOX had increased investor confidence, with 33 percent agreeing that it had reduced fraud. That kills the economy Troxell 14, (http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Global-LeadershipLearning-From-History/2014/07/15, Research Professor of National Security and Military Strategy, with the Strategic Studies Institute, U.S. Army War College, Op-Ed: Global Leadership — Learning From History) World War I was botched on the front end and the back end. The failure to achieve a just and lasting peace in 1919 led to the outbreak of World War II. Economic distress during the interwar years resulted in the rise of fascist states and easily rekindled the embers of nationalist revanchism. President Woodrow Wilson’s 14 points were not adhered to, including the all-important point 3: “the removal, as far as possible, of all economic barriers and the establishment of an equality of trade conditions among all nations consenting to the peace and associating themselves for its maintenance.” In terms of post-war economic relations, the opposite occurred as nations scrambled to respond to the 1929 crash. Nations participated in a series of competitive devaluations and enacted crippling tariffs, sending the global economy into a death spiral. Our second major commemoration of this summer is the Bretton Woods conference, convened shortly after the D-Day landings and well before the end of World War II. It was focused on creating a post-war international regime based on rules designed to govern the global economy. Following the collapse of the Soviet empire, these rules now govern the vast majority of the globally interconnected economy. The results of this conference point to the importance of institutional arrangements to monitor and support the global economy, including the International Monetary Fund (IMF) and the European Bank of Reconstruction and Development, better known today as it has evolved into the World Bank (WB); and the commitment to free trade. Conference attendees initially debated the creation of the International Trade Organization, which at the time proved to be a bridge too far, and thus they settled on the General Agreement on Tariffs and Trade (GATT). Through a series of multinational negotiating rounds and agreements, culminating in the creation of the World Trade Organization (WTO) in 1995, GATT, and now the WTO, have succeeded in broad tariff reductions and a dramatic increase in global trade. The liberal world economy, based on open markets and free trade, and managed by rules-based, international monetary and trade regimes, has furthered both individual and collective interests and promoted international cooperation. When it comes to the support for international institutions, the President is correct in highlighting their importance. But some of that support should also be expressed in action, particularly as it relates to the global economy. Once again the President is right to focus on the “key source of American strength: a growing economy,” and there is nothing wrong with domestic nation building, but only if it does not replace an equal emphasis on the management and continued engagement in geoeconomic affairs. 2NC Solvency Fraud erodes small firms – Hurts the economy Bhasin 13, (Bang College of Business, KIMEP University, Almaty, Republic of Kazakhstan, “Corporate Accounting Fraud: A Case Study of Satyam Computers Limited,” March 2013, Open Journal of Accounting) Organizations of all types and sizes are subject to fraud. On a number of occasions over the past few decades, major public companies have experienced financial reporting fraud, resulting in turmoil in the capital markets, a loss of shareholder value, and, in some cases, the bankruptcy of the company itself. Although, it is generally accepted that the SarbanesOxley Act has improved corporate governance and decreased the incidence of fraud, recent studies and surveys indicate that investors and management continue to have concerns about financial statement fraud. For example: found that financial statement fraud, while representing less than five percent of the cases of Survey participants estimated that the typical organization loses 5% of its revenues to fraud each year. Applied to the 2011 Gross World Product, this figure translates to a potential projected annual fraud loss of more than $3.5 trillion. The median loss caused fraud in its report, was by far the most costly, with a median loss of $1.7 million per incident. by the occupational fraud cases in our study was $140,000. More than one-fifth of these cases caused losses of at least $1 million. The frauds reported to us lasted a median of 18 months before being detected. Small Businesses are Key to economic Growth Bagley 12, (http://www.forbes.com/sites/rebeccabagley/2012/05/15/small-businesses-big-impact/, president and CEO of NorTech, an organization that strengthens Northeast Ohio's economic vitality, Small Businesses = Big Impact) small businesses are the engines of job creation in the United States. Their value and the role they play in our economy is sometimes underestimated because, they are in fact, small. But the truth is there’s nothing small about the impact they have on our economy. According to Entrepreneur Magazine there are between 25 million and 27 million small businesses in the U.S. that account for 60 to 80 percent of all U.S. jobs. And, a recent study by Paychex, says that small businesses produce 13 times more patents that larger firms. So, how do we ensure small businesses are getting the resources they need to grow? What can we do to not only help them succeed, but thrive in an ever changing economy? Providing the right climate for entrepreneurial firms to succeed, including access to capital and business advisors can be extremely valuable. Smart regulations and tax structures can also give small businesses a boost and better chance of survival. We often hear that The good news is there are programs and support organizations around the country trying to help small businesses gain the tools they need to be sustainable and profitable ventures. For example, last week I attended an event to mark the launch of Goldman Sachs 10,000 Small Businesses initiative in Cleveland, Ohio the 7th city to become part of the program. The investment firm and its foundation are taking an integrated approach to help small businesses around the country create jobs and economic opportunity by providing them with greater access to business education, financial capital, and business support services. The goal is to help established small businesses get to the next level, as opposed to other programs that focus on supporting only start-ups and aspiring entrepreneurs. There is also an emphasis on diversity and selecting businesses that are representative of the communities that the program serves. According to a Goldman Sachs Small businesses play a vital role in creating jobs and growth in America’s economy. Through 10,000 Small Businesses we are providing the skills, capital and mentoring small businesses need to grow, create jobs and build more prosperous neighborhoods. This unique program is tailored to each spokesperson, “ local market by an outstanding team of local partners led be leading community colleges. Already we are seeing 10,000 Small Businesses participants increasing revenues and creating jobs.” Goldman Sachs’ $500 million program is aimed at reaching 10,000 small businesses nationwide. A $15 million investment in the City of Cleveland will help companies gain access to business classes at community colleges, like Cuyahoga Community College, as well as other opportunities for grants or loans. SOX PIC Aff Answers Movement in Squo prove the CP Non-Inherent Loten 11, (Bill Seeks to Ease Sarbanes-Oxley for Small Firms, http://blogs.wsj.com/incharge/2011/09/26/bill-seeks-to-ease-sarbanes-oxley-for-small-firms/is a New York-based reporter for The Wall Street Journal, where he writes about startups, entrepreneurship and small business) In a bid to lower barriers to capital for fast-growth companies, House legislation unveiled last week would allow small businesses to opt out of costly internal-control measures under the SarbanesOxley Act for up to 10 years after going public. The Startup Expansion Investment Act, introduced by Rep. Ben Quayle (R., Ariz.), would temporarily exempt companies with market valuations below $1 billion from section 404 of the act. The current market-cap threshold to be exempt is $75 million. Small firms have long complained about onerous compliance costs under the act, known as SOX, which was put in place nearly a decade ago after widespread accounting scandals erupted at Enron, WorldCom and other large, publicly-traded companies. Among other measures, section 404 requires all public companies to seek an outside audit of internal controls, adding as much as $1 million in costs for small companies, according to a recent survey by Protiviti, a global risk and business consulting firm. Since its inception, delays and temporary reprieves have largely shielded these firms from the act’s tougher measures. Quayle’s bill would create a permanent 10-year window. “Access to the public capital markets is vital for a company to expand and hire new workers,” Quayle said in a statement. Similar measures were recently proposed in the Startup Act of 2011, unveiled in July by the Ewing Marion Kauffman Foundation, a Kansas City, Mo., research group. Robert Litan, the group’s vice president of research, said in a statement that Quayle’s bill was “an important step as we try to increase the number of companies that go public” and create jobs. Supporters of Sarbanes-Oxley say the law is necessary to protect shareholders from lax corporate accounting and fraud. Turn – Small Corps. Exploit SOX by intentionally being valued under $75 Million Gao 08, Unintended Consequences of Granting Small Firms Exemptions from Securities Regulation: Evidence from the Sarbanes-Oxley Act, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1014054, Associate Professor of Accounting at the University of Illinois at Chicago College of Business Administration) Second, we document a heretofore unrecognized consequence of SOX – non-accelerated filers keeping their public float below $75 million. Prior studies suggest SOX can change a firm’s costbenefit tradeoff of participating in U.S. public capital markets (Engel et al., 2007; Leuz et al., 2007; Piotroski and Srinivasan, 2007; Hostak et al., 2007; and Gao, 2007). Our results indicate that for firms remaining public, SOX also altered their incentives to grow. Lower growth has social welfare implications if it affects employment, wealth creation, and real investment. Finally, we provide additional evidence on the economic consequences of SOX and in particular, its Section 404 provisions on internal controls, for small public companies. A common theme emerging from prior studies is that SOX more adversely affects small firms (Engle et al., 2007; Leuz et al., 2007; and Piotroski and Srinivasan, 2007). Our findings add to this literature and are consistent with the view that Section 404 of SOX imposes net costs on small businesses (e.g. Ribstein, 2002; Gordon, 2003; Romano, 2005; Holmstrom and Kaplan, 2003).