NSL AFF - UMKC Summer Debate Institute

advertisement
NSL AFF
1ac
Plan: The United States federal government should change National Security Letter
policy to allow judicial review of non-disclosure requirements, mandate that agencies
discard non-relevant information gathered from subpoenas, and require subpoena
requests to use the articulable and reasonable facts standard.
Advantage 1: Separation of Powers
NSLs have massively expanded in the status quo- PATRIOT Act reforms have made
them easier for the FBI to use- this has caused widespread abuse of power
Wells in 2012 (Desirae L. Wells, “NATIONAL SECURITY LETTERS: WHY REFORM IS NECESSARY”,
LexisNexis.com, Yeshiva University 2012, 18 pgs., Database, 6/28/15,
http://www.lexisnexis.com.proxy.library.umkc.edu/hottopics/lnacademic/)
As part of the Reauthorization Act of 2006, Congress directed
the Department of Justice (DOJ), Office of the Inspector
General (OIG) to review the effectiveness and use, including any improper or illegal use of NSLs issued by the DOJ. The OIG
issued two Reports. n74 The first in 2007 addressed the FBI's use of NSLs for calendar years 2003 through 2005. The second in 2008 addressed
the FBI's use of NSL for calendar year 2006. The OIG Reports
confirmed that the Patriot Act transformed NSLs into a
much more frequently employed investigatory tool. Specifically it stated that "the FBI issued approximately
8,500 requests in 2000 the year prior to the passage of the Patriot Act and after the passage of the
Patriot Act, the number of NSL requests increased to approximately 39,000 in 2003, 56,000 in 2004 and 47,000
in 2005. n75 The Reports made a distinction between NSLs and NSL Requests - a single NSL may contain multiple requests for information. The
OIG Reports specified that the 39,000 requests in 2003 were contained in approximately 12,000 letters and the 47,000 requests in 2005 were
contained in 19,000 letters. n76 According to the OIG Reports, there were 3 main reasons for the dramatic increase in the number of NSL requests issued starting in 2003. n77 First,
the Patriot Act eliminated the requirement that an NSL be issued only if
"there are specific and articulable facts giving reason to believe that the person or entity to whom the
information sought [*230] pertains is a foreign power or an agent of a foreign power." n78 Instead, the
information need only be "relevant to an authorized investigation to protect against international
terrorism or clandestine activities," n79 a much lower standard. Second, previously a NSL had to be approved by a
senior FBI official at FBI headquarters but NSLs could now be authorized by Special Agents in Charge at FBI field
offices. As a result, approval is no longer a lengthy process and generally takes only two to five days. n80 Third, in 2003, the
Attorney General issued revised guidelines governing the use of NSLs in FBI national security investigations (the "NSI Guidelines"). The
revised NSI guidelines permit NSLs to be issued during preliminary investigations; under the old
guidelines NSLs could only be issued during full investigations. n81 The OIG Reports found that in addition to significantly
underreporting the number of NSL requests issued, the FBI failed in a number of other significant ways as well. According to the reports, the
agency under-reported violations arising from the use of NSLs; sought information not permitted by the
statute; issued NSLs without proper authorization; issued over 700 "exigent letters" requesting the type of information
covered by § 2709 without following the process for obtaining an NSL; and repeatedly failed to properly adhere to the
FBI's own internal documentation requirements for approval of an NSL. n82
Recent reforms fail- they are non-binding and contain multiple loopholes
Sledge, Matt 02/05/15 (Huffington Post ‘The Gaping Hole In Obama's FBI Surveillance Reform’http://www.huffingtonpost.com/2015/02/04/national-security-letter-reform_n_6617572.html)
The federal government this week announced a reform to an investigative tool that gives the FBI sweeping
surveillance power. But a target of that surveillance said the change appears to leave investigators with vast
power to snoop -- in secret. The FBI uses national security letters to force business owners to hand over
records on their customers, as long as the records are related to a national security investigation. No court approval is
needed, and the FBI can impose a gag order on recipients, forbidding them from revealing even the
existence of a letter. The gag orders can last a lifetime. But on Tuesday, as part of surveillance reforms made in the
wake of National Security Agency leaker Edward Snowden's revelations, the Office of the Director of National Intelligence
announced that national security letter gag orders will now expire after three years, or when an
investigation ends. The new rules contain a gaping exception, however: FBI agents can essentially write
themselves a permission slip to keep a national security letter secret past the deadline, as long as they
receive approval from supervisors. "This exception is essentially full discretion to FBI officials," said Andrew
Crocker, a legal fellow at the Electronic Frontier Foundation. "It is an exception that doesn't have a lot of standards associated with it. This is
kind of the problem with the (national security letter) statute to begin with." For years, Crocker and other lawyers at the privacy watchdog have
been fighting to force the federal government to reveal in court the name of a phone company challenging one gag order. A federal district
judge handed the foundation a major victory in 2013, ruling that the gag order violates the First Amendment's right to free speech. The case -which stems from a 2011 government order -- has remained on appeal since then. The FBI has wielded national security letters for decades, but
the authority to do so was vastly expanded by the post-9/11 Patriot Act. Department of Justice inspector general reports released since then
have documented widespread abuse of the letters. But the
bureau keeps using them, to the tune of 21,000 letters in
the 2012 fiscal year. Because the recipients of all those letters are often barred by the gag orders from speaking out,
their voices in the debate has been silenced. That changed a little in 2010, when Nicholas Merrill was finally able to reveal as
the result of a long court battle that his small Internet service provider had received a letter -- in 2004. Merrill was back in court in December,
trying to force the government to allow him to reveal what it had sought (he never supplied them with any of data after the government
backed down on its original request, but that portion of the gag order still stands). If the reforms announced this week have affected his case,
Merrill wrote to HuffPost in an email, "nobody has told me." He said the government has shown no sign of surrender in trying to block him from
speaking out. The
White House last year rejected a review panel's proposal to make national security letters
subject to court order. Administration counterterrorism adviser Lisa Monaco heralded the minor changes to some national security
letters' gag orders in a statement on Tuesday. Merrill was unimpressed. "The issue at hand is that the government doesn't want me to discuss
what was in the third page of the (national security letter) I received, namely, the types of data they demanded (and I did not hand over),"
Merrill wrote. "The problem with not being able to discuss that openly, is that is the heart of the public policy issue -- what kinds of information
can the government get on an innocent citizen without a warrant, or even any suspicion of wrongdoing."
Unchecked executive power over surveillance undermines the fourth amendment and
separation of powers- lack of judicial review ensures overreach
Kenneth R. Logsdon in 2008, J.D., University of Illinois College of Law, UNIVERSITY OF ILLINOIS
JOURNAL OF LAW, TECHNOLOGY & POLICY 2008 U. Ill. J.L. Tech. & Pol'y 409, lexis
The electronic surveillance that the United States Government has participated in post-9/11 implicates
several constitutional principles: namely, the First Amendment, Fourth Amendment, and the constitutional
doctrine of separation of powers. n173 As stated by the First Amendment and Supreme Court decree, if a statute allows for any
governmental discretion in limiting speech, like that found in the PA and PA II, such discretion must be subject to objective standards. n174
Regarding the Fourth Amendment, the Executive has relied upon AUMF and Article II to argue it has the constitutional authority to operate the
TSP. n175 However, current statutes already provide contingencies for a state of war; nevertheless, there has been no official declaration of
war. n176 Furthermore, the
Supreme Court has explicitly stated that the Executive Branch cannot circumvent
the Fourth Amendment even in a time of war. n177 According to the constitutional doctrine of separation
of powers, the Executive Branch's authority is greatest when Congress explicitly allows an [*426] action,
and it is at its lowest ebb when the Executive Branch takes any action incompatible with the expressed
or implied will of Congress. n178 In addition, the Executive Branch must respect the Judicial Branch's
constitutional authority, and any attempt by the Executive Branch to limit judicial review and discretion
is an infringement upon such authority. n179 A. First Amendment The First Amendment of the United States Constitution
states, "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom
of speech ... ." n180 This fundamental right cannot easily be dispensed with, and when Congress implements a statute allowing governmental
discretion to limit speech, that discretion must be limited by objective criteria. n181 Both the PA and PA II allow governmental discretion in the
administration of a nondisclosure request; thus, they must be limited by objective criteria. n182 The Supreme Court of the United States has
devised a test when such discretion is present, in order to prevent the dangers associated with censorship. n183 This test, known as the
Freedman test, states: the government must exercise its discretion within a system that allows for "procedural safeguards designed to obviate
the dangers of a censorship system."... (1) any restraint in advance of judicial review may be imposed only for "a specified brief period," (2) any
further restraint prior to "a final judicial determination on the merits" must be limited to "the shortest fixed period compatible with sound
judicial resolution," and (3) the burden of going to court to suppress the speech and the burden of proof once in court must rest on the
censoring government. n184 Prior to PA II, both the first and second factors under the Freedman test would have likely failed; however,
changes made in PA II implemented additional judicial safeguards not present in PA. n185 Even so, the third factor of the Freedman test still is
not satisfied under the newly enacted PA II. n186 Particularly, factor three of the Freedman test requires that the burden of proof in the
suppression of speech rest upon government. n187 Problematically, title 18, section 2709(c) of the United States Code "grants broad discretion
to the FBI to completely restrict constitutionally protected speech on the basis of its [*427] content, and it places the burden of challenging this
restriction in court solely on the NSL recipient ... ." n188 The government's response to First Amendment criticism focuses largely on ostensibly
analogous statutes that have avoided abrogation by the courts. n189 In particular, the government focuses on statutes that allow it to apply
wiretaps, pen registers, and FISA subpoenas. n190 To bolster this argument, these statutes also do not have the same broad ability of judicial
review as that prescribed by the PA II. n191 However, those statutes differ from those prescribing use of NSLs because the court authorizes the
search ex ante and provides judicial safeguards after the search has concluded. n192 Additionally, both the wiretap and pen register statutes
"imply that communications providers might be free to discuss wiretaps and pen registers, as well as their knowledge of underlying criminal
investigations, after those investigations are completed." n193 The ability of the government to restrict speech in grand jury cases well after the
time period in which it was necessary has also been found to be unconstitutional. n194 A law prohibiting grand jury witnesses from disclosing
their testimony after the jury term has ended violates the First Amendment to the United States Constitution. n195 On the other hand, a law
preventing grand jury witnesses from revealing their testimony post-jury term is acceptable, so long as the criminal investigation of the crime
continues. n196 Conversely, the revisions provided by PA II regarding NSLs "continues to authorize nondisclosure orders that permanently
restrict an NSL recipient from engaging in any discussion related to its receipt of the NSL," thus, violating the First Amendment. n197 1.
Executive Action Post-9/11 and the First Amendment n198 England's history of the freedom of speech and press is intertwined with the scope
of a search and seizure. n199 "This history was, of course, part of the [*428] intellectual matrix within which our own constitutional fabric was
shaped. The Bill of Rights was fashioned against the background of knowledge that unrestricted power of search and seizure could also be an
instrument for stifling liberty of expression." n200 The TSP created by the Executive Branch may be one such instance where the government's
ability to search electronic communications will have a direct impact on one's proclivity to freely express himself or herself. n201 Though this
observation may seem hyperbolic, "history abundantly documents the tendency of Government - however benevolent and benign its motives to view with suspicion those who most fervently dispute its policies... . Protections become the more necessary when the targets of official
surveillance may be those suspected of unorthodoxy in their political beliefs." n202 B. Fourth Amendment n203 "The warrant requirement
[within the Fourth Amendment] has been a valued part of our constitutional law for decades ... . It is not an inconvenience to be somehow
"weighed' against the claims of police efficiency." n204 1. Executive Action Post-9/11 and the Fourth Amendment The
warrant
requirement is an important functional element of restrained governance to prevent even wellintentioned, yet over-enthusiastic, governmental officials, from exceeding their constitutional
boundaries. n205 Yet, the aforementioned TSP was created because the Executive Branch believed such efficiencies were necessary, and
current surveillance laws inadequate, to protect American citizens from future terrorist attacks. n206 The Executive Branch argued this
efficiency is necessary in a state of war, which we are currently in. n207 Specifically, the Executive Branch stated the Congressional authority to
fight against terrorism, as found in AUMF, is all [*429] that is needed to justify such an expansive surveillance program. n208 However, the
AUMF is not a declaration of war, but Congressional "authorization" to use force. n209 If the Executive Branch is going to argue it has "war
powers" to implement the TSP, should not such an assertion require an actual declaration of war? Furthermore, even if such a declaration were
granted by Congress, would that justify the Executive Branch in ignoring a FISA provision (a mere Congressional act) that explicitly states what
actions are allowed by the President in a time of war? If not, how would it be remotely possible for the Executive Branch to have the
constitutional authority to disregard the Fourth Amendment? "The Bill of Rights of the United States Constitution must be applied despite
authority granted by the AUMF." n210 Significantly, these constitutional restrictions are also applicable to the Executive Branch's constitutional
powers embedded in Article II. n211 If this were not so, then Congress's attempt to restrain the Executive Branch's actions during war, as found
within FISA, is an unconstitutional Congressional infringement upon Article II. n212 Hitherto, "there does not appear to be any precedent even
vaguely on point - that is, where Congress legislated in an area within its legislative authority and it was nonetheless held by the Supreme Court
that the President had inherent authority to act contrary to the statute." n213 The argument that Article II of the United States Constitution
allows the Executive Branch to avoid adhering to restrictions within the Bill of Rights, in a time of war, was erroneous when proclaimed by the
Nixon Administration and is equally erroneous today. n214 In fact, the only Supreme Court case addressing the use of wiretaps for national
security purposes is United States v. U.S. District Court. n215 In this case, the Supreme Court concluded that domestic electronic surveillance to
further the Executive Branch's obligation to protect national security is insufficient to circumvent the Fourth Amendment. n216 In summary,
the Supreme Court of the United States recently and concisely declared: Striking the proper constitutional balance here is of great importance
to the Nation during this period of ongoing combat. But it is equally [*430] vital that our calculus not give short shrift to the values that this
country holds dear or to the privilege that is American citizenship. It is during our most challenging and uncertain moments that our Nation's
commitment to due process is most severely tested; and it is in those times that we must preserve our commitment at home to the principles
for which we fight abroad. n217 C. Separation of Powers When
the Founding Fathers gathered together to create a new
nation they did so with the knowledge of history and with the intent to create a government that would
restrain itself. n218 In so doing, they devised a Constitution that created three branches of government with each part assigned distinct
functions and requisite powers. n219 Though each branch was separate, they were coequal and "while
independent of the others, the workings of each were integrated as a whole ... to guarantee that lasting
stability demands that each branch honors its own bounds of authority, and those of the others." n220
Succinctly stated, "our national experience teaches that the Constitution is preserved best when each part of
the Government respects both the Constitution and the proper actions and determinations of the other
branches." n221 Recent legislation sought to rectify constitutional deficiencies and explicitly allow the
Executive Branch the ability to perform surveillance without a warrant. n222 This legislation, known as the
Protect America Act of 2007, was enacted in August 2007 and allowed the Executive Branch to electronically surveil a
suspected terrorist reasonably believed to be outside the United States for up to one year without a
warrant and provided immunity to telecommunication providers that assisted the government in doing
so. n223 However, Congress was cautious with such a grant of power and built in a sunset provision that automatically nullified the law at the
end of 180 days if there was no subsequent congressional action. n224 Congress did not act and the law sunset February 17, 2008. n225
Nevertheless, notwithstanding Congressional
prudence to build in a sunset provision, such explicit
authorization does not ameliorate the aforementioned constitutional criticism. n226
NSLs are uniquely key- they represent the most sweeping and permanent surveillance
power of the PATRIOT act by allowing the FBI to have unfettered access to any
individual’s personal records.
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
But despite the extensive proceedings, congressional
debates and decisions have often been superficial and
uninformed—resulting in policies that unnecessarily weakened investigations, compromised privacy rights, or both.
Members of Congress, unfortunately, have few incentives to conduct thoughtful formulation of
surveillance policy. They face little political risk from bolstering security at the expense of privacy,
because the loss of privacy directly and immediately affects a relatively small number of people—those
under investigation. In terms of electoral rewards, oversight of the executive does not compete well with legislating, let alone fundraising or
speechmaking.7 And all too often, members of Congress have greater interest in scoring partisan points or defending their party’s president
than in conducting careful performance evaluations. In addition to the deficient incentives, Congress has structural weaknesses that have
undermined the ability to strike an intelligent, democratically sanctioned balance between security and individual rights. Looking at how
Congress developed and evaluated the Patriot Act over the last decade, we see five varieties of defective policymaking, with major
consequences for the results. 1. Casual treatment of crucial provisions To begin with, Congress
has failed to give serious, careful
attention to some of the most important provisions in the legislation. When the Patriot Act was first being drafted in
the immediate aftermath of 9/11, Republicans on the House Judiciary Committee insisted that surveillance provisions include four-year sunsets,
requiring reauthorization votes in 2005—an approach readily endorsed by the committee’s Democratic minority.8 Because deliberations were
conducted in haste, the committee wanted the new investigative tools to be reexamined in a less turbulent atmosphere. They worried that
relatively lax rules for seizing private records and conducting electronic surveillance could lead to fishing expeditions and violations of privacy
rights. Instead of adopting the House approach, however, Congress
acted on a Senate bill drafted in part by the Bush
administration. Lawmakers placed sunsets on most, but not all, investigative provisions.9 In fact, they
overlooked perhaps the most problematic tool in the bill—national security letters—and made it
permanent from the start.10 National security letters are a type of administrative subpoena—issued by the
Federal Bureau of Investigation (FBI) on its own authority, without judicial supervision.11 They allow investigators to
seize a person’s communication records, banking receipts, and credit information, without having to
show evidence that the target is a spy or terrorist.12 In effect, agents can use these letters to gather
records on anyone they choose. Because the subpoenas come with no requirement to discard non-relevant information, the FBI
has sometimes collected the records of innocent Americans and kept them indefinitely.13 In an extraordinary
failure of legislative deliberation, not a single member of Congress mentioned national security letters during
the floor debates in 2001. Nor did any member raise concerns about the government’s prolonged retention of non-relevant
information during the reauthorization debates four years later. This failure to discuss national security letters was in our
view the most severe deficiency in deliberations on the Patriot Act. If the Act created risks of privacy
violations and fishing expeditions, it was mainly through these administrative subpoenas . Only in late 2005,
when the Washington Post revealed that the FBI was issuing more than 30,000 national security letters per year—“a hundredfold increase over
historic norms”—did some members of Congress raise concerns.14 Even then, many Republicans dismissed the report and showed greater
interest in defending the Bush administration than in determining whether privacy violations had occurred. Eventually,
an
independent audit confirmed the Post story. Between 2003 and 2005, the FBI had issued about 140,000
national security letters and had seized private documents on almost 24,000 U.S. persons.15 These records
were added to searchable databanks, accessible to 17,000 federal agents.16 However, by the time these findings were
released in 2007, the Patriot Act had long since been reauthorized, without change in the national security letters provision. As we
discuss later, although greater controls were eventually placed on the letters, Congress played almost no role in instituting the changes.
Unchecked executive discretion risks escalation in times of conflict-it encourages preemption and rash decision making
Holmes, 2009 Holmes, Stephen. "The Brennan Center Jorde Symposium on Constitutional Law: In
Case of Emergency: Misunderstanding Tradeoffs in the War on Terror." California Law Review, Inc
(2009): n. pag. Web. 28 June 2015
When faced with a serious threat to national security, the most aggressive response will not always be
the most effective response. In a bullfight, the bull loses the contest not because it is insufficiently aggressive, but rather because the
matador, through provocative gestures, uses the wounded beast's aggressive impulses and impaired vision against it, repeatedly luring it into
futilely and exhaustingly charging a phantom target. n108 Any
system that defends unmonitored executive discretion
exposes itself to the danger that the executive officials who happen to be in power at the time will
feel that inaction is psychologically intolerable or, by sheer bad luck, will have a bias toward
aggressive action that, while psychologically satisfying (not to mention electorally advantageous), in no way corresponds to
the requirements of the situation. n109 [*346] Because those who attacked the United States violated an absolute international
ban on terrorism, American authorities may have been tempted to avenge the injury - an eye for an eye - by violating an equally absolute
international ban on torture. After suffering a severe blow inflicted by an avowed enemy, the surviving victims of an attack are often obsessed
with reestablishing an image of themselves as active rather than passive. They have to "do something" without giving too much thought to the
specific consequences of the actions they undertake. This suggests, once again, that cruelly coercive interrogation may have been embraced
less for the tactical information it promised to disgorge than for its independent psychological appeal. All of its practical consequences were not
necessarily coolly considered. Such speculations are admittedly impossible to prove or disprove. But they are plausible enough to justify
skepticism about the claim that harsh interrogation was embraced solely for the pragmatic reason alleged, namely to extract intelligence to
prevent a follow-up nuclear sneak attack against the United States. Electoral, as opposed to national-security, considerations may also have
contributed to the embrace of interrogation techniques that departed sharply from preexisting rules. The
lack of genuine metrics of
success in the war on terror makes it inherently difficult to prove to voters that their government has
undertaken the most effective course of action. Such politically unsustainable uncertainty may, as
mentioned, pressure policymakers into seeking or fabricating pseudo-metrics. This is especially true when
American policymakers could not demonstrate that their actions are eliminating more terrorists than they are producing. But the Bush
administration and its supporters could always point out that Amnesty International, Human Rights First, the ACLU, and other liberalhumanitarian organizations were screaming about torture. These organizations' vehement expressions of outrage strongly [*347] suggested
that the Bush administration was going to extreme lengths - pulling out all the stops - to protect the country. The pernicious idea of a libertysecurity tradeoff, once again, lent a spurious plausibility to the mind-game being played.
Checks and balances are the only way to prevent groupthink and escalatory
interventions- unilateral decision-making ensures conflict
Fleischman 10 – Matthew Fleischman, associate in the New York office of McKool Smith. Prior to
joining the firm, he was an associate at Debevoise & Plimpton LLP. J.D. Candidate at NYU School of Law,
Magna Cum Laude at SLU, “A Functional Distribution of War Powers”, New York University Journal of
Legislation and Public Policy, 13 N.Y.U. J. Legis. & Pub. Pol'y 137, Lexis
While Nzelibe and Yoo's model is clearly plausible, it misses certain critical
institutional constructs. Their analysis attempts to
determine which branch is the more effective agent in this principal-agent problem; however, they fail to realize that the institutional
design is not an either-or choice. n96 The whole notion of separation of powers or checks and balances is rooted in the
idea of having one agent checking the other agent. n97 The system's design "promotes deliberation among multiple
agents, which encourages them to reveal private information that might otherwise remain hidden." n98 While there
is little empirical evidence on the value of deliberation, Professor James Fishkin has found evidence that "significant shifts in opinion"
take place after participating in public policy deliberations. n99 Studies [*152] such as this one show that there is
value to deliberating. Thus, there must be something unique and different about war powers that justifies abandoning the traditional
and effective means of coming to a decision. The first argument offered by Nzelibe and Yoo reasons that presidents tend to be held more
democratically accountable for foreign policy than Congress and should therefore be given significant power in this area, and asserts that ex
post congressional action is sufficient to mitigate the effects of poor decisions. n100 First of all, while
the President may be seen as
powers arena, that does not mean that congressional actors are immune from
being held democratically accountable for the decision to engage in significant armed conflict. n101 Beyond overestimating
the negative accountability effects of going to war, Nzelibe and Yoo fail to account for the numerous benefits from
going to war. Professors Cecil Crabb and Pat Holt observed that "once a president has made a foreign affairs decision that becomes known
the key decision maker in the war
to the public, he automatically receives the support of at least 50 percent of the American people, irrespective of the nature of the decision."
n102 This is commonly known as the "rally
around the flag" effect. n103 This surge of patriotic sentiment is temporary, n104 but
very real. When this sentiment evaporates, the President can react in a multitude of ways. While accountability can breed prudence, it
can also lead to "gambling for resurrection." n105 This is an [*153] agency problem in which leaders prolong
unsuccessful wars in the hope that the tides of war will eventually turn, saving the leader's legacy. n106 Ultimately, unilateral Executive
action does garner increased accountability, but can lead to short-term political gain and an unwillingness to concede defeat. Furthermore, ex
post congressional constraints on presidential actions are insufficient. The fact is, "ex post congressional involvement
can only terminate some presidential mistakes and can never recover the sunk costs of bad presidential decisions." n107
Not only are there sunk costs, but "even some opponents of the initial decision to go to war recognize that overly hasty withdrawal
could be a poor policy at later stages." n108 Ex post decisions are made in response to a new status quo, one in which use of the
power of the purse can be viewed as endangering troops n109 or giving America a weaker image abroad. n110 The second way in which
Nzelibe and Yoo
justify expansive executive powers is by arguing that the President has superior information to
allowing for a second opinion on the same information will reduce the likelihood of poor
decision making, while not positively or negatively impacting the quality of the information in and of itself. n112 Therefore, Type I
errors n113 are less likely when Congress is consulted. Nzelibe and Yoo cite the Iraq War as proof that intelligence
failures can occur with or without congressional involvement. n114 However, it could instead be argued that the failure was caused by
"executive manipulation of information to exaggerate a threat." n115 The problem was not the informational asymmetry, but
rather the use of that information. One logical solution to this problem would be to increase the information gathering and
interpreting capabilities of Congress. Nzelibe and Yoo mistakenly take the Executive's informational advantage as
a given when it is entirely alterable. [*154] Therefore, the information advantage can be lessened, which would greatly diminish
Congress. n111 Yet,
the odds of Type I errors. Any shift in an independent variable should lead to a corresponding shift in the causal variable. In this case, to the
extent that the frequency of Type I errors is correlated with informational disparities, correcting the disparities should negate the odds of Type I
errors occurring. The third functional argument presented by Nzelibe and Yoo concerns the relative value of signaling to different regime types.
n116 Given that they advocate for a President-First approach, but concede that congressional
authorization has value in
disputes between democratic states, n117 there is no real disagreement about the value of congressional authorization in these
disputes. That leaves conflicts between democratic nations and rogue states or terrorist organizations as the lone area where
the two sides disagree on this issue. Even before one can question this distinction, the definition of a rogue nation must be determined. Nzelibe
and Yoo leave this task to the President. Nzelibe and Yoo
political pressure, n118 but
believe that the leaders of rogue states are insulated from domestic
this is simply not true, as "all leaders are answerable to some coalition of domestic
political forces on which their power and political survival rests. Failure in conflict and war helps shorten the tenure of such leaders." n119
All leaders pursue a rational strategy to maintain power. n120 Wars occur when political leaders attempt to rally the masses
behind a national cause via aggressive rhetoric and policies. Thus, all leaders, whether of rogue nations or of first world countries, are subject to
popular pressure and suffer consequences at home for losing wars. Nonetheless, elected presidents
are more concerned with
national support and are therefore more likely to engage in such rhetoric and promote war, since it has been shown to
increase the approval rating of presidents. n121 [*155] On the other hand, the Legislature has more localized interests and
would be resistant to using such rhetoric. Localized interests are not rallied by promoting a national identity or a national battle
but by catering to a smaller community's needs and interests. Because of the political advantages gained by a president going to war
and the Legislature's inclination to shirk the issue, n122 unilateral presidential action is likely to lead to an overly
aggressive position on military engagements. Therefore, congressional involvement should decrease the
likelihood of Type I errors with respect to all regimes. The totality of the analysis suggests that deliberation decreases
the likelihood of Type I errors. This type of deliberation cannot occur within the Executive branch alone. While the
president consults with staffers and cabinet secretaries, they are likely to "succumb to groupthink, as it has been
called - the overt and subtle pressures driving group cohesiveness that can distort the decision-making process." n123 When a group
decides upon a view, dissent becomes difficult and there is pressure to reject alternatives. n124 Furthermore, even before coalescing
around a particular opinion, executive staffers are likely to possess policy preferences. Type II errors (not entering "good" wars)
would only be more likely under the Congress-First approach if Congress were more likely than the Executive to be
opposed to good wars. However, since research shows that Congress is likely to approve most wars
independent of circumstances n125 that is highly unlikely to be the case. But there is no reason to believe that
Congress has any aversion to good wars. n126 Ultimately, a Congress-First system would decrease Type I errors and
have little impact on Type II errors when dealing with traditional warfare, and it is the institutional design that would better
accommodate functionalists' concerns and desires.
Advantage 2: Global Democracy
NSLs are an end-run around the constitution and status quo measures to limit them
fail
Froomkin, 2-19—Dan, has served as the senior Washington correspondent and bureau chief for The
Huffington Post and as editor of WashingtonPost.com. The Intercept, “FBI Flouts Obama Directive to
Limit Gag Orders on National Security Letters,” https://firstlook.org/theintercept/2015/02/19/fbi-floutsobama-directive-limit-gag-orders-national-security-letters/
Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run
around the Fourth Amendment since 2001 has been something called a National Security Letter. FBI
agents can demand that an Internet service provider, telephone company or financial institution turn over its records
on any number of people — without any judicial review whatsoever — simply by writing a letter that
says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such
letters a year; by the latest count, it still issues about 60 a day. The letters look like this: <image> Recipients are legally required to comply —
but it doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever.
That’s because National Security Letters almost always come with eternal gag orders. Here’s that part: That
means the NSL process
utterly disregards the First Amendment as well. More than a year ago, President Obama announced that he was
ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real
need for further secrecy.” And on Feb. 3, when the Office of the Director of National Intelligence announced a handful of baby steps resulting
from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to
cap the gag orders: In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter
nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close. Continued
nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the
statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is
appropriate. Despite the use of the word “now” in that first sentence, however, the
FBI has yet to do any such thing. It has
not announced any such change, nor explained how it will implement it, or when. Media inquiries were greeted with stalling and,
finally, a no comment — ostensibly on advice of legal counsel. “There is pending litigation that deals with a lot of the same questions you’re
asking, out of the Ninth Circuit,” FBI spokesman Chris Allen told me. “So for now, we’ll just have to decline to comment.” FBI lawyers are
working on a court filing for that case, and “it will address” the new policy, he said. He would not say when to expect it. There is indeed a
significant case currently before the federal appeals court in San Francisco. Oral arguments were in October. A decision could come any time.
But in that case, the Electronic Frontier Foundation (EFF), which is representing two unnamed communications companies that received NSLs, is
calling for the entire NSL statute to be thrown out as unconstitutional — not for a tweak to the gag. And it has a March 2013 district court ruling
in its favor. “The gag is a prior restraint under the First Amendment, and prior restraints have to meet an extremely high burden,” said Andrew
Crocker, a legal fellow at EFF. That means going to court and meeting the burden of proof — not just signing a letter. Or as the Cato Institute’s
Julian Sanchez put it, “To
have such a low bar for denying persons or companies the right to speak about
government orders they have been served with is anathema. And it is not very good for accountability.”
In a separate case, a wide range of media companies (including First Look Media, the non-profit digital media venture that produces The
Intercept) are supporting a lawsuit filed by Twitter, demanding the right to say specifically how many NSLs it has received. But simply releasing
companies from a gag doesn’t assure the kind of accountability that privacy advocates are saying is required by the Constitution. “What the
public has to remember is a NSL is asking for your information, but it’s not asking it from you,” said Michael German, a former FBI agent who is
now a fellow with the Brennan Center for Justice. “The
vast majority of these things go to the very large
telecommunications and financial companies who have a large stake in maintaining a good relationship
with the government because they’re heavily regulated entities.” So, German said, “the number of NSLs that
would be exposed as a result of the release of the gag order is probably very few. The person whose records are
being obtained is the one who should receive some notification.” A time limit on gags going forward also raises the question of whether past
gag orders will now be withdrawn. “Obviously there are at this point literally hundreds of thousands of National Security Letters that are more
than three years old,” said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back
you go, “it becomes increasingly implausible that a significant percentage of those are going to entail some dire national security risk.” The
NSL program has a troubled history. The absolute secrecy of the program and resulting lack of
accountability led to systemic abuse as documented by repeated inspector-general investigations, including
improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, requests for information based on First
Amendment protected activity, “after-the-fact” blanket NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or
“calling circle” information without any determination that the telephone numbers were relevant to authorized national security investigations.
Obama’s own hand-selected “Review Group on Intelligence and Communications Technologies” recommended in
December 2013 that NSLs should only be issued after judicial review — just like warrants — and that any gag
should end within 180 days barring judicial re-approval. But FBI director James Comey objected to the
idea, calling NSLs “a very important tool that is essential to the work we do.” His argument evidently prevailed with Obama.
NSLs have managed to stay largely under the American public’s radar. But, Crocker says, “pretty much every time I bring it up and give the
thumbnail, people are shocked. Then you go into how many are issued every year, and they go crazy.”
We’re on the brink—unfettered Executive makes democracy collapse inevitable
Yglesias, 3-2—Matthew, Executive Editor @ Vox, former Magna Cum Laude grad @ Harvard and
editor-in-chief of The Harvard Independent. “American democracy is doomed,” Vox,
www.vox.com/2015/3/2/8120063/american-democracy-doomed
America's constitutional democracy is going to collapse. Some day — not tomorrow, not next year, but probably sometime before
runaway climate change forces us to seek a new life in outer-space colonies — there is going to be a collapse of the legal and political
order and its replacement by something else. If we're lucky, it won't be violent. If we're very lucky, it will lead us to
tackle the underlying problems and result in a better, more robust, political system. If we're less lucky, well, then, something worse will happen. Very few people
agree with me about this, of course. When
I say it, people generally think that I'm kidding. America is the richest,
most successful country on earth. The basic structure of its government has survived contested elections
and Great Depressions and civil rights movements and world wars and terrorist attacks and global
pandemics. People figure that whatever political problems it might have will prove transient — just as
happened before. "Rather than everyone being wrong about the state of American politics, maybe everyone is right" But voiced in another
register, my outlandish thesis is actually the conventional wisdom in the United States. Back when
George W. Bush was president and I was working at a liberal magazine, there was a very serious
discussion in an editorial meeting about the fact that the United States was now exhibiting 11 of the 13
telltale signs of a fascist dictatorship. The idea that Bush was shredding the Constitution and trampling on congressional prerogatives was
commonplace. When Obama took office, the partisan valence of the complaints shifted, but their basic tenor
didn't. Conservative pundits — not the craziest, zaniest ones on talk radio, but the most serious and well-regarded — compare Obama's immigration moves to
the actions of a Latin-American military dictator. In the center, of course, it's an article of faith that when right and left talk like this they're simply both wrong.
These are nothing but the overheated squeals of partisans and ideologues. At
the same time, when the center isn't complaining
about the excessively vociferous complaints of the out-party of the day, it tends to be in full-blown panic
about the state of American politics. And yet despite the popularity of alarmist rhetoric, few people act
like they're actually alarmed. Accusations that Barack Obama or John Boehner or any other individual
politician is failing as a leader are flung, and then abandoned when the next issue arises. In practice, the
feeling seems to be that salvation is just one election away. Hillary Clinton even told Kara Swisher
recently that her agenda if she runs for president is to end partisan gridlock. It's not going to work. The
breakdown of American constitutional democracy is a contrarian view. But it's nothing more than the
view that rather than everyone being wrong about the state of American politics, maybe everyone is
right. Maybe Bush and Obama are dangerously exceeding norms of executive authority. Maybe legislative
compromise really has broken down in an alarming way. And maybe the reason these complaints persist across different
administrations and congresses led by members of different parties is that American politics is breaking
down. The perils of presidential democracy To understand the looming crisis in American politics, it's useful to think about Germany, Japan, Italy, and Austria.
These are countries that were defeated by American military forces during the Second World War and given constitutions written by local leaders operating in close
collaboration with occupation authorities. It's striking that even though the US Constitution is treated as a sacred text in America's political culture, we did not push
any of these countries to adopt our basic framework of government. This wasn't an oversight. In a 1990 essay, the
late Yale political scientist
Juan Linz observed that "aside from the United States, only Chile has managed a century and a half of
relatively undisturbed constitutional continuity under presidential government — but Chilean
democracy broke down in the 1970s."
The exact reasons for why are disputed among scholars — in part because you can't just randomly assign different governments to people. One issue here is that American-style systems are much more
common in the Western Hemisphere and parliamentary ones are more common elsewhere. Latin-American countries have experienced many episodes of democratic breakdown, so distinguishing Latin-American cultural attributes from institutional characteristics is difficult. Still, Linz offered several reasons why presidential
systems are so prone to crisis. One particularly important one is the nature of the checks and balances system. Since both the president and the Congress are directly elected by the people, they can both claim to speak for the people. When they have a serious disagreement, according to Linz, "there is no democratic principle on
the basis of which it can be resolved." The constitution offers no help in these cases, he wrote: "the mechanisms the constitution might provide are likely to prove too complicated and aridly legalistic to be of much force in the eyes of the electorate." In a parliamentary system, deadlocks get resolved. A prime minister who lacks
the backing of a parliamentary majority is replaced by a new one who has it. If no such majority can be found, a new election is held and the new parliament picks a leader. It can get a little messy for a period of weeks, but there's simply no possibility of a years-long spell in which the legislative and executive branches glare at
each other unproductively. But within a presidential system, gridlock leads to a constitutional trainwreck with no resolution. The United States's recent government shutdo wns and executive action on immigration are small examples of the kind of dynamic that's led to coups and putsches abroad. There was, of course, the
American exception to the problems of the checks-and-balances system. Linz observed on this score: "The uniquely diffuse character of American political parties — which, ironically, exasperates many American political scientists and leads them to call for responsible, ideologically disciplined parties — has something to do with
it." For much of American history, in other words, US political parties have been relatively un-ideological and un-disciplined. They are named after vague ideas rather than specific ideologies, and neither presidents nor legislative leaders can compel back-bench members to vote with them. This has often been bemoaned
(famously, a 1950 report by the American Political Science Association called for a more rigorous party system) as the source of problems. It's also, according to Linz, helped avert the kind of zero-sum conflicts that have torn other structurally similar democracies apart. But that diffuse party structure is also a thing of the past. A
short history of American polarization American politics is much more polarized today than it was 25 or 50 years ago. But not everyone buys the theory that today's era of party polarization spells big trouble. Political scientist Jonathan Bernstein argues that it's "not some sort of freakish un-American phenomenon." The real
exception, Bernstein says, the middle of the twentieth century, when the parties weren't polarized. Polarization is the norm, he says, and he's right. A long line of research starting with Keith Poole and Howard Rosenthal, political scientists at the University of Georgia and New York University respectively, records all
congressional votes and then analyzes the types of political coalitions that emerge. This system, known as DW-NOMINATE, lets you measure the degree of party polarization precisely. When Democrats all vote one way and Republicans all vote the other way, politics is highly polarized. When votes frequently scramble the
parties, it is less polarized. What this research shows is that the steady march toward polarization over the past generation is a return to a situation that existed during an earlier period. The story here, like so much in American politics, is race. Southern Democrats had a range of views on non-racial issues but monolithically
supported white supremacy and held together in the Democratic Party to maximize their leverage in Congress. The result was that the Democratic Party included Northern liberals who supported civil rights and Southern conservatives who supported segregation. So polarization temporarily went away in Congress. But as
segregation receded as an issue in American politics, the parties slowly but surely sorted themselves by ideology, and so today, there is no Republican in Congress more liberal than the most conservative Democrat, or vice-versa. American politics has re-polarized. According to Bernstein, this change may be discomfiting but it's
nothing to worry about. American politics has been polarized before and it was fine. What this story of reversion misses is the crucial role of ideology. Polarization and ideology are clearly related concepts, but simply counting congressional votes doesn't really tell us what those votes were about. Georgetown University
Professor Hans Noel greatly improved our understanding of the relationship between the two by extending the DW-NOMINATE methodology to people who aren't elected officials. For his book Political Parties and Political Ideologies in America, Noel constructs ideological space scores for writers and political pundits — people
who address the same issues as elected officials but who are not serving on Capitol Hill. What he found is that while Gilded Age members of Congress voted in a highly partisan way, their voting didn't reflect any polarization of ideas evident in broader American society. As Charles Calhoun, a leading scholar of Gilded Age politics
has written, the main concern of actual members of Congress was not policy, but "patronage power, the privilege of placing one's political friends and supporters in in subordinate offices." In other words, a member of Congress would get to distribute federal jobs and contracts to his supporters and in exchange the beneficiaries
of his patronage would support his party's ticket at all levels. For this reason, the obscure-sounding job of customs collector of the Port of New York was important enough in the 1870s that Chester A. Arthur leapt from it to the Vice Presidency. The first real filibuster was held over Whig efforts to assign a printing contract to
friendly companies. "Since the president and Congress are elected by the people, they can both claim to speak for the people" Even though party discipline was strict in these days, it was not really about much beyond who held the spoils. Over the course of the 1920s, 1930s, and 1940s the rise of progressive and liberal ideology
and the formation of a conservative ideology to counter it upended this system. So much so that by the 1970s it had become common to observe that American political parties were in decline. University of California Irvine political scientist Martin Wattenberg achieved the apogee of this literature with his 1985 classic The
Decline of Political Parties in America (since updated in five subsequent editions), citing the waning influence of party professionals, the rise of single-issue pressure groups, and an attendant fall in voter turnout. But as historian Sam Rosenfeld writes, under-the-hood changes in the process for selecting presidential nominees and
Congressional leaders "ultimately helped to create a newly receptive institutional setting for issue-based activism within the parties," leading to the parties' reconstitution around modern ideological lines. Today's partisan polarization, in other words, is not the same as its Gilded Age predecessor. The old polarization was about
control over jobs and money — the kind of thing where split-the-difference compromises are easiest. That polarization was eventually undermined by a new politics built around principles. For decades, politicians found themselves cross-pressured between their commitments to a national party network and to various
ideological causes. Today, however, politicians are no longer cross-pressured. We have strong Gilded Age-style parties, but organized around questions of principle rather than questions of patronage. You can take this theory too far, of course. There have been moments in American life where questions of principle sharply split
American politics. We had ideological parties (or at least one) in the 1850s when the anti-slavery Republican Party rose to the fore. But the example is not enormously encouraging — the constitutional process collapsed and we had four years of civil war, hundreds of thousands of deaths, and then, even after a Union victory,
white supremacy was re-established in the South through a two-decade campaign of terrorism. The Honduras scenario Not all breakdowns of constitutional processes are as violent as the American Civil War. For a less catastrophic, more realistic view of the kind of thing that could happen here, it's useful to look to some lessfamiliar but more-recent events in Honduras. Back in late 2008, left-wing President Manuel Zelaya was locked in persistent conflict with an opposition-controlled congress. With neither side able to prevail within the context of the existing system, Zelaya decided he wanted to add a fourth question to the upcoming November
2009 election. In addition to voting for president, congress, and municipal offices, Zelaya would ask the voters whether they wanted to hold a constituent assembly to re-write the constitution — presumably to allow him to run for re-election. Unfortunately for Zelaya, Honduras' existing constitution made no provision for rewriting the constitution by plebiscite. Consequently, in March 2009, Zelaya determined that the solution was to hold another plebiscite. On June 28, Hondurans would go to the polls to vote in a non-binding referendum on whether the constitutional question should be added to the November ballot. This, he hoped, would give
him the democratic legitimacy needed to go forward with the constitutional revision. Zelaya's opponents in congress, evidently con cerned that the president would win, sued. They won a court case enjoining the president against holding the referendum. Zelaya pressed ahead regardless. In Honduras, the military typically assists
with election logistics, so Zelaya ordered the army to begin distributing ballots. General Romeo Vásquez Velásquez, the chief the Honduran military, refused to comply. On May 24, Zelaya fired the general. Several other commanders quit in solidarity. The Supreme Court ruled that the dismissal was unconstitutional. Throughout
June, the constitutional process essentially broke down with protests and counter-protests dominating the capital. On June 28, the military deposed Zelaya in a coup, retroactively justified by a back-dated Supreme Court ruling. Roberto Micheletti, the president of the National Congress, was installed in his stead. Manuel Zelaya
addresses his supporters after his ouster from office. (Alfredo Estrella/AFP/Getty Images) The military quickly handed power over to a new group of civilians. The coup was legitimated by the National Congress and the Supreme Court. And its perpetrators argued with some justification that there was no constitutional
alternative. Zelaya was trying to circumvent the rules, so they had no choice but to circumvent them too in response. The deadlock was ultimately resolved by force rather than legal procedure. Zelaya did not have enough support to amend the constitution through the existing process, and Honduras' constitutional system
created no legal mechanism for impeachment of a president. The Supreme Court arbitrarily ruled that Zelaya's effort to circumvent the amendment process via referendum was illegal, while Congress' effort to circumvent the impeachment process was fine. There were quite a few injuries as protesters clashed with security
forces, but no massive bloodshed. Honduras' coup is worth paying attention to not because the exact same scenario is likely to play out in the United States, but because it reveals how genuinely difficult it is to maintain constitutional politics in a presidential system. Presidents feel themselves to be accountable for steering the
nation. And all the evidence indicates that the public and the media do in fact hold presidents broadly accountable for national outcomes. Throughout the United States' 2012 presidential campaign, for example, it was universally assumed that good news for the American economy (or for America more broadly) would redound
to Barack Obama's benefit even though control of policymaking was split between the White House and a GOP-dominated Congress. As Obama put it in a November 2014 press conference, "people are going to ask for greater accountability and more responsibility from me than from anybody else in this town." The problem is
the president is not only held accountable for things that are in part outside his ability to control (gas prices, Ebola, or shark attacks) but for things that are actually under the control of his political adversaries. "I'm the guy who's elected by everybody," concluded Obama, "and they want me to push hard to close some of these
divisions, break through some of the gridlock, and get stuff done." If you're going to be held accountable for outcomes, in other words, then you'd better act. In a parliamentary system, this is simply democratic accountability in action. A head of government who strongly believes the nation needs actions the legislature won't
United States, of
course, is a long way from a coup. What we are witnessing instead is a rise in what Georgetown University
Professor Mark Tushnet labeled "constitutional hardball" in a 2004 article. Constitutional hardball describes
legal and political moves "that are without much question within the bounds of existing constitutional
doctrine and practice but that are nonetheless in some tension with existing pre-constitutional
understanding." In other words, moves that do not violate the letter of the law, but do trample on our
conventional understanding of how it is supposed to work. Tushnet's article is vital reading today in part because the different
approve can dissolve parliament and hold a new election to decide the issue. In Honduras' presidential system, the very act of trying to schedule a vote to resolve the deadlock was itself unconstitutional.
Constitutional hardball The
partisan context in which it was written can help shock people out of their entrenched positions. His lead example is from the George W. Bush administration, when
liberals were concerned about the president taking power away from Congress. Tushnet describes the "strained" argument offered by Republican senators in 2005
that Democratic Party filibusters of Bush's judicial nominees violated the constitution. At the time, of course, Democrats found the view that Republicans might
simply ban the use of filibusters for this purpose outrageous. "The filibuster serves as a check on power," said Harry Reid, "that preserves our limited government."
Joe Biden called the Republicans' attempt to end the fillibuster "an example of the arrogance of power." But ultimately the hardball tactic for ending filibusters was
used by Democrats in 2013 to halt Republican obstruction of Obama's nominees. Republicans, Reid said, "have done everything they can to deny the fact that
Obama had been elected and then reelected." He argued he had no choice but to abandon a principle that just a few years ago he said was crucial to preserving
American liberty. Meanwhile, Republicans who had supported the 2005 effort to weaken the filibuster executed a perfect flip-flop in the other direction. Tushnet's
other example from the mid-2000s — Texas' decision to redraw congressional district boundaries to advantage Republicans between censuses — seems almost
adorably quaint by the standards of the Obama era. From its very first months, Obama's
presidency has been marked by essentially
nothing but constitutional hardball. During the Bush years, Democratic senators sporadically employed a variety of unusual delaying tactics to
stymie his agenda. In 2009, Mitch McConnell and Senate Republicans retaliated by using tons of them, constantly. Suddenly filibustering went from something a
Senate minority could do to something it did on pretty much all motions. George Washington University congressional scholar Sarah Binder observes that "leaders
in the 1970s rarely felt compelled to file for cloture [to break filibusters], averaging fewer than one per month in some years" while in recent years Reid has filed
over once per week. As Jim Manley, a former aid to the Democratic Senate leadership, explained to The Atlantic, the obstruction not only prevented many of
Obama's more controversial measures from becoming law; it also drastically altered the process of even routine governance. Say you want to break a filibuster. On
Monday, you file cloture on a motion to proceed for a vote on Wednesday. Assuming you get it, your opponents are allowed 30 hours of debate post-cloture on the
motion to proceed. That takes you to Friday, and doesn't cover amendments. The following Monday you file cloture on the bill itself, vote Wednesday, then 30
more hours of debate, and suddenly two weeks have gone by, for something that's not even controversial. As a political strategy, McConnell's tactics were
vindicated by the 2010 midterms, which showed that making the president look partisan, clumsy, and inept was a winning strategy. Republicans in Congress
subsequently moved beyond unusual acts of obstruction to an unprecedented use of the statutory debt ceiling into a vehicle for policymaking. Traditionally a bit of
oddball American political theater immortalized in a funny West Wing scene, in 2011 the GOP threatened to provoke an unfathomable financial and constitutional
crisis unless the Obama administration agreed to sweeping spending cuts. Again, there was nothing illegal about what Republicans in Congress did here — it was
just, in its intent and its scope, unprecedented. And it's fairly clear that these actions, while consistent with Republican Party electoral success, have not exactly
produced a well-respected legislature. Congressional approval ratings are so low — and have been for so long — that it's become a subject of pollster humor. In
2013, Public Policy Polling found that congress was less popular than Genghis Khan, traffic jams, cockroaches, or Nickelback. In a less joking spirit, Gallup finds that
the voters have less confidence in Congress than any other American institution, including big business, organized labor, banks, or television news. As relations with
Congress have worsened, the Obama administration has
set about expanding executive authority over domestic policy to
match Bush-era unilateralism in the national security domain. This came to the fore most publicly with Obama's decision to
protect millions of unauthorized migrants from deportation without congressional agreement. "The practical issue would be not so much what is legal, but what
people would actually tolerate" As Vox's Andrew Prokop has argued, the pattern is actually much broader. Obama's handling of K-12 education policy is in some
ways an even more paradigmatic example of constitutional hardball. The George W. Bush-era education law No Child Left Behind laid out penalties for state
education systems that didn't meet certain, rather unrealistic, targets. The law's authors assumed that when the law came up for reauthorization, the targets would
be changed. In case Congress didn't act in time, the Secretary of Education also had the authority to issue waivers of the penalties. Since Congress no longer really
functions, there has been no reauthorization of the law. So the Obama administration has issued waivers — but only to states that implement policy changes
ordered by the Department of Education. University of Chicago political scientist William Howell told Prokop this was a "new frontier" for executive policymaking.
Yale Law School's Bruce Ackerman says Obama used "a waiver provision for modest experiments and transformed it into a platform for the redesign of the statute."
Obama's actions are clearly legal — but they are just as clearly a decision to creatively exploit the letter of the law to vastly expand the scope of executive power
over the law. Those who like these actions on their merits comfort themselves with the thought that these uses of executive power are pretty clearly allowed by the
terms of the existing laws. This is true as far as it goes. But it's also the case that Obama (or some future president) could have his political opponents murdered on
the streets of Washington and then issue pardons to the perpetrators. This would be considerably more legal than a Zelaya-style effort to use a plebiscite to
circumvent congressional obstruction — just a lot more morally outrageous. In either case, however, the practical issue would be not so much what is legal, but
what people, including the people with guns, would actually tolerate. Raising the stakes America's escalating game of constitutional hardball isn't caused by
personal idiosyncratic failings of individual people. Obama has made his share of mistakes, but the
fundamental causes of hardball politics
are structural, not personal. Personality-minded journalists often argue that a warmer executive would
do a better job of building bridges to congress. But as Duke University's Brendan Nyhan points out, "Bill
Clinton's more successful outreach to his opponents didn't keep him from getting impeached. Likewise,
George W. Bush was more gregarious than Obama, but it didn't make him any more popular among
Democrats once the post-9/11 glow had worn off."
There's a reason for this, and it gets to the core of who really runs American politics. In a democratic society, elected officials are most directly accountable to the people
who support them. And the people who support them are different than the people who don't care enough about politics to pay much attention, or the people who support the other side. They are more ideological, more partisan, and they want to see the policies they sup port passed into law. A leader who abandons his core
supporters because what they want him to do won't be popular with most voters is likely, in modern American politics, to be destroyed in the next primary election. The amateur ideological activists who eroded the power of the party professionals in the 1970s are now running the show. While Gilded Age activists traded
support for patronage jobs, modern-day activists demand policy results in exchange for support. Presidents need to do everything within their legal ability to deliver the results that their supporters expect, and their opponents in Congress need to do everything possible to stop them. At one point, Republican congressional
leaders were highly amenable to passing an immigration reform bill and the Obama administration insisted it had no means of circumventing the legislative process. But under pressure from their respective bases, Republicans found it impossible to compromise and Obama decided he had better find a way to go around
Congress. It is true that the mass public is not nearly as ideological as members of Congress. But the mass public is not necessarily active in democratic politics, either. Emory's Alan Abramowitz finds that "the American public has become more consistent and polarized i n its policy preferences over the past several decades." He
also writes that "this increase in consistency and polarization has been concentrated among the most politically engaged citizens." This rise in ideological activism has a number of genuinely positive impacts. It makes politics less corrupt. The least-polarized state legislatures in America are in places like Rhode Island and
Louisiana, bastions of corruption rather than good government. It's not a coincidence that the Tea Party surge led to the end of earmarked appropriations. But it heightened executive-legislative conflict and leads to what Linz termed "the zero-sum character of presidential elections." Bush and Gore shake hands in December
2000, after their remarkably orderly contested election was resolved. (Tannen Maury/AFP/Getty Images) Looking back at Bush's election in 2000, one of the most remarkable things is how li ttle social disorder there was. The American public wanted Al Gore to be president, but a combination of the Electoral College rules, poor
ballot design in Palm Beach County, and an adverse Supreme Court ruling, put Bush in office. The general presumption among elites at the time was that Democrats should accept this with good manners, and Bush would respond to the weak mandate with m oderate, consensus-oriented governance. This was not in the cards.
Not because of Bush's personal qualities (if anything, the Bush family and its circle are standard-bearers for the cause of relative moderation in the GOP), but because the era of the "partisan presidency" demands that the president try to implement the party's agenda, regardless of circumstances. That's how we got drastic tax
cuts in 2001. If the Bush years shattered the illusion that there's no difference between the parties, the Obama years underscore how much control of the White House matters in an era of gridlock. The broadly worded Clean Air Act, whose relevant provisions passed in 1970, has allowed Obama to be one of the most
consequential environmental regulators of all time — even though he hasn't been able to pass a major new environmental bill. He's deployed executive discretion over immigration enforcement on an unprecedented scale. And he's left a legacy that could be rapidly reversed. A future Republican administration could not only
turn back these executive actions, but substantially erode the Affordable Care Act. The lessons of the 2000 and 2008 elections make it unnerving to imagine a Bush-Gore style recount occurring in 2014's political atmosphere. The stakes of presidential elections are sky-high. And the constitutional system provides no means for a
compromise solution. There can be only one president. And once he's in office he has little reason to show restraint in the ambitions of the legislative — or non-legislative — agenda he pursues. In the event of another disputed election, it would be natural for both sides to push for victory with every legal or extra-legal means at
their disposal. Indeed, we ought to consider possibilities more disastrous than a repeat of the 2000 vote. What if a disputed presidential election coincided with a Supreme Court vacancy? What if the simultaneous deaths of the president and vice president brought to power a House Speaker from the opposite party? What if
neither party secured a majority of electoral votes and a presidential election wound up being decided by a vote of the lame duck House of Representatives? What if highly partisan state legislatures start using their constitutional authority to rig the presidential contest? A system of undisciplined or non-ideological political
parties has many flaws, but it is at least robust to a variety of shocks. Our current party alignment makes for a much more brittle situation, in which one of any number of crises where democratic norms and constitutional procedures diverge could bring us to a state of emergency. A flawed system The idea that America's
reality is that despite its durability, it has rarely functioned well
by the standards of a modern democracy. The party system of the Gilded Age operated through systematic corruption. The less polarized era
constitutional system might be fundamentally flawed cuts deeply against the grain of our political culture.
But the
that followed was built on the systematic disenfranchisement of African-Americans. The newer system of more ideological politics has solved those problems and
seems in many ways more attractive. But over the past 25 years, it's set America on a course of paralysis and crisis — government shutdowns, impeachment, debt
ceiling crises, and constitutional hardball. Voters, understandably, are increasingly dissatisfied with the results and confidence in American institutions has been
generally low and falling. But rather
than leading to change, the dissatisfaction has tended to yield wild electoral
swings that exacerbate the sense of permanent crisis. "The best we can hope for is that when the crisis does come, Americans will
put a better system in place" As dysfunctional as American government may seem today, we've actually been
lucky. No other presidential system has gone as long as ours without a major breakdown of the
constitutional order. But the factors underlying that stability — first non-ideological parties and then non-disciplined ones —
are gone. And it's worth considering the possibility that with them, so too has gone the American exception to the rule of presidential breakdown. If we seem
to be unsustainably lurching from crisis to crisis, it's because we are unsustainably lurching from crisis to crisis. The breakdown may not
be next year or even in the next five years, but over the next 20 or 30 years, will we really be able to resolve every one of these high-stakes showdowns without
making any major mistakes? Do you really trust Congress that much? The best we can hope for is that when the crisis does come, Americans will have the wisdom
to do for ourselves what we did in the past for Germany and Japan and put a better system in place.
This is not limited to domestic politics- unfettered executive authority sends a signal
internationally that undermines constitutional principles
Louis Fisher in 2009 is a specialist in constitutional issues with the Law Library of the Library of
Congress, Presidential Studies Quarterly 39, no. 2 (June), Presidential Power in National Security: A
Guide to the President-Elect
Respect for the Constitution and joint action with Congress provide the strongest possible signal to
both enemies and allies. By following those principles, other countries understand that U.S. policy has a broad
base of support and is not the result of temporary, unilateral presidential actions that divide the
country and are likely to be reversed. National security is strengthened when presidents act in concert
with other branches and remain faithful to constitutional principles. In periods of emergency and
threats to national security (perceived or real), the rule of law has often taken a backseat to presidential
initiatives and abuses. Although this pattern is a conspicuous part of American history, it is not necessary to repeat the same mistakes
every time. Faced with genuine emergencies, there are legitimate methods of executive action that are
consistent with constitutional values. There are good precedents from the past and a number of bad
ones. In response to the 9/11 terrorist attacks, the United States largely decided to adopt the bad ones.
The responsibility for this damage to the Constitution lies primarily with the executive branch, but illegal and
unconstitutional actions cannot occur and persist without an acquiescent Congress and a compliant judiciary. The Constitution’s
design, relying on checks and balances and the system of separation of powers, was repeatedly ignored
after 9/11. There are several reasons for these constitutional violations. Understanding them is an essential first step in
returning to, and safeguarding, the rule of law and constitutional government.
Democratic transitions are hanging in the balance---only empowering checks on
executive power through rule of law can tip the scales
CJA 4 The Center for Justice and Accountability, Amici Curiae in support of petitioners in Al Odah et al. v
USA, "Brief of the Center for Justice and Accountability, the International League for Human Rights, and
Individual Advocates for the Independence of the Judiciary in Emerging Democracies," 3-10, Lexis
Many of the newly independent governments that have proliferated over the past five decades have
adopted these ideals. They have emerged from a variety of less-than-free contexts, including the end of European colonial rule in the 1950's and 1960's, the end of the Cold War
and the breakup of the former Soviet Union in the late 1980's and 1990's, the disintegration of Yugoslavia, and the continuing turmoil in parts of Africa, Latin America and southern Asia.
Some countries have successfully transitioned to stable and democratic forms of government that protect
individual freedoms and human rights by means of judicial review by a strong and independent judiciary. Others have suffered the rise of
tyrannical and oppressive rulers who consolidated their hold on power in part by diminishing or abolishing the role of the judiciary. And still others
hang in the balance, struggling against the onslaught of tyrants to establish stable, democratic
governments. In their attempts to shed their tyrannical pasts and to ensure the protection of individual
rights, emerging democracies have consistently looked to the United States and its Constitution in
fashioning frameworks that safeguard the independence of their judiciaries . See Ran Hirschl, The Political Origins of Judicial Empowerment
through Constitutionalization: Lessons from Four Constitutional Revolutions, 25 Law & Soc. Inquiry 91, 92 (2000) (stating that of the “[m]any countries . . . [that] have engaged in fundamental
Establishing judicial review
by a strong and independent judiciary is a critical step in stabilizing and protecting these new
democracies. See Christopher M. Larkins, Judicial Independence and Democratization: A Theoretical and Conceptual Analysis, 44 Am. J. Comp. L. 605, 605-06 (1996) (describing the
constitutional reform over the past three decades,” nearly all adopted “a bill of rights and establishe[d] some form of active judicial review”).
judicial branch as having "a uniquely important role" in transitional countries, not only to "mediate conflicts between political actors but also [to] prevent the arbitrary exercise of government
power; see also Daniel C. Prefontaine and Joanne Lee, The Rule of Law and the Independence of the Judiciary, International Centre for Criminal Law Reform and Criminal Justice Policy (1998)
countries in transition from
dictatorships and/or statist economies recognize the need to create a more stable system of governance, based on the
rule of law."), available at http://www.icclr.law.ubc.ca/Publications/Reports/RuleofLaw. pdf (last visited Jan. 8, 2004). Although the precise form of government differs among
("There is increasing acknowledgment that an independent judiciary is the key to upholding the rule of law in a free society . . . . Most
countries, “they ultimately constitute variations within, not from, the American model of constitutionalism . . . [a] specific set of fundamental rights and liberties has the status of supreme law,
is entrenched against amendment or repeal . . . and is enforced by an independent court . . . .” Stephen Gardbaum, The New Commonwealth Model of Constitutionalism, 49 Am. J. Comp. L.
707, 718 (2001). This phenomenon became most notable worldwide after World War II when certain countries, such as Germany, Italy, and Japan, embraced independent judiciaries following
their bitter experiences under totalitarian regimes. See id. at 714- 15; see also United States v. Then, 56 F.3d 464, 469 (2d Cir. 1995) (Calabresi, J., concurring) (“Since World War II, many
countries have adopted forms of judicial review, which — though different from ours in many particulars — unmistakably draw their origin and inspiration from American constitutional theory
It is a trend that continues to this
day. It bears mention that the United States has consistently affirmed and encouraged the establishment of
independent judiciaries in emerging democracies. In September 2000, President Clinton observed that "[w]ithout the rule of law,
and practice. See generally Mauro Cappelletti, The Judicial Process in Comparative Perspective (Oxford: Clarendon Press, 1989).”).
elections simply offer a choice of dictators. . . . America's experience should be put to use to advance
the rule of law, where democracy's roots are looking for room and strength to grow." Remarks at Georgetown University Law School, 36 Weekly Comp. Pres. Doc. 2218
(September 26, 2000), available at http://clinton6.nara.gov/2000/09/2000-09-26- remarks-by-president-at-georgetown-international-lawcenter. html. The United States acts on
these principles in part through the assistance it provides to developing nations. For example, the United States requires that any country seeking assistance through the
Millenium Challenge Account, a development assistance program instituted in 2002, must demonstrate, among other criteria, an "adherence to the rule of law." The White House noted that
the rule of law is one of the "essential conditions for successful development" of these countries. See
http://www.whitehouse.gov/infocus/developingnations (last visited Jan. 8, 2004).12
Consensus of experts agree that democracies reduce militarized conflict- it outweighs
alternate causes
Allan Dafoe in 2011, is a Ph.D. candidate in the Travers Department of Political Science @ Berkeley,
Statistical Critiques of the Democratic Peace: Caveat Emptor, American Journal of Political Science, Vol.
55, No. 2, April 2011, Pp. 247–262
The “democratic peace”—the inference that democracies rarely fight each other—is one of the most
important and empirically robust findings in international relations (IR).1 The apparent empirical association2
between joint democracy3 and peace has been debated and challenged since its first discovery by political scientists to the present (Gartzke
2007). Scholars have argued that this empirical association is in fact a product of other confounding factors, such as Cold War alliances (Farber
and Gowa 1997; Gowa 1999), satisfaction with the regional status quo (Kacowicz 1995), shared foreign policy interests (Gartzke 1998, 2000),
unmeasured factors such as dyad-specific effects (Green, Kim, and Yoon 2001), stable borders (Gibler 2007), and capital openness and
development (Gartzke 2007; Gartzke and Hewitt 2010). Despite the
large number of serious challenges, most current
quantitative analyses continue to find a substantial, robust, and statistically significant association
between joint democracy and the absence of militarized conflict. This article will analyze a recent challenge to the
democratic peace (Gartzke 2007), situate it in the context of other statistical challenges to the democratic peace, and show that the democratic
peace persists as a compelling finding. In so doing, this article also identifies new features of the democratic peace. It is important to be clear
about what this empirical association implies about international politics. Despite the robustness of this result to different model specifications,
this observational finding by itself does not prove that it is characteristics of democracies—such as regular
competitive elections, constraints on the executive, liberal norms, or civil rights—that make these countries more peaceful
toward each other. Even less does it prove that the forceful spread of democracy in particular regions of the world will reduce the
frequency or severity of wars. Justifying causal claims such as these exclusively using analyses of observational data requires the leverage of
strong assumptions. It is for this reason that there is less agreement about the actual causal mechanisms of the democratic peace than that
around the underlying explanandum. Scholars have proposed that the democratic peace arises because of shared norms (Maoz and Russett
1993), restraint on democratic leaders (Bueno de Mesquita et al. 1999), more credible communication through transparency (Schultz 1998) or
domestic audience costs (Fearon 1994; Tomz 2007; Weeks 2008), greater capacity to reach stable bargains (Lipson 2003), and other possible
causal pathways. On the other hand, it may not be a “democratic” characteristic at all that accounts for the peace, but some other co-occurring
or preceding factor, such as shared strategic circumstances, shared political systems, capitalism, prosperity, liberal economic norms, or other
factors.
Nonetheless, the democracy-peace empirical association remains of paramount importance
because, despite our best attempts to “control for” other possible correlates of this peace, the fact
that two countries are democratic remains strongly associated with them having peaceful relations .
Furthermore, under relatively modest assumptions this apparently peaceful proclivity seems unlikely to
have arisen by chance (that is, the finding is “statistically significant”). This empirical association is foundational to a vast
literature testing, refining, and extending theories about the apparent relationship between regime type and peace. Thus it matters greatly
whether this association is robust to potential confounders (for reviews of this literature, see George and Bennett 2004; Ray 1995).
Plan: The United States federal government should change National Security Letter
policy to allow judicial review of non-disclosure requirements, mandate that agencies
discard non-relevant information gathered from subpoenas, and require subpoena
requests to use the articulable and reasonable facts standard.
Solvency
Congress is key- only a statutory requirement mandating judicial oversight and
stronger checks can prevent abuse- anything else lacks permanence
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
It is debatable whether the U.S. government, overall, has struck a defensible balance between
enhancing security and protecting civil liberties. We have seen the implementation of expansive
surveillance programs, and we have reason to believe that other important surveillance operations remain classified and
undisclosed.39 It is even possible that the executive has withheld eavesdropping activities from Congress. But if recent accounts by
Intelligence members are accurate, we have also seen that agents follow multiple court procedures— first
by seeking judicial approval to seize records and then by obtaining separate, highly targeted approval to examine records. Most of the
very few members of Congress who have closely monitored the FISA process believe that it includes
reasonable safeguards. Still, the policymaking system has been overly secretive, dominated by the
executive, and slow to identify gaps in privacy protections. We suggest both changes to the Patriot Act
and, more important, changes to the institutional arrangements for making decisions on surveillance policy.
The most obvious and immediate need is to place permanent restrictions on national security letters .
Congress should pass legislation mandating that authorities discard all non-relevant information
captured with administrative subpoenas. The Obama administration has already implemented this policy through a Justice
Department directive. But until it becomes a statutory requirement, either the current or a succeeding
administration could easily cancel this safeguard and allow agents, as they did in the Bush
administration, to stockpile personal information of innocent Americans. Since this reform merely
codifies current practice, a permanent safeguard would protect privacy without creating new
investigative obstacles.
Judicial oversight and implementation of the ‘specific and articulable facts’ standard
are necessary to restore separation of powers and 4th amendment protections.
Kenneth R. Logsdon in 2008, J.D., University of Illinois College of Law, UNIVERSITY OF ILLINOIS
JOURNAL OF LAW, TECHNOLOGY & POLICY 2008 U. Ill. J.L. Tech. & Pol'y 409, lexis
The Executive Branch has also neglected the Fourth Amendment standard of individual suspicion when
it sought to use NSLs to request an entire database of information, rather than information on a
particular individual. n274 To restore the standard of individual suspicion, the Reform Act provides that an
NSL must contain "specific and articulable facts providing reason to [*436] believe that the records"
pertain to an individual. n275 That is, the individual must be a suspected agent of a foreign power or
"pertain to an individual who has been in contact with, or otherwise directly linked to, a suspected agent
of a foreign power." n276 The NSL provision, within the PA, states the government may acquire information about an entity that is
relevant to an ongoing investigation. n277 Further protections within the Reform Act relate to what the government can acquire. In particular,
the Reform Act allows the government the ability to acquire only: (A) The name of the customer or subscriber. (B) The address of the customer
or subscriber. (C) The length of the provision of service by such provider to the customer or subscriber (including start date) and the types of
service utilized by the customer or subscriber. (D) The telephone number or instrument number, or other subscriber number or identifier, of
the customer or subscriber, including any temporarily assigned network address. (E) The means and sources of payment for such service
(including any credit card or bank account number). (F) Information about any service or merchandise orders, including any shipping
information and vendor locations. (G) The name and contact information, if available, of any other wire or electronic communications service
providers facilitating the communications of the customer or subscriber. n278 Conversely, the PA requires an electronic communications
provider to "comply with a request for subscriber information and toll billing records information, or electronic communication transactional
records in its custody or possession." n279 The Reform
Act's explicit enumeration of what can be acquired avoids
inherent ambiguities found within the PA provision. To bolster this argument, the Reform Act explicitly states that NSLs
"issued pursuant to this section shall not require the production of local or long distance telephone records or electronic communications
transactional information not listed." n280 Accordingly, these modifications allow the government little room to apply an NSL to an entire
database and ideally prevent the government from acquiring broad categories of information. B. First Amendment Protections and Judicial
Overview Restored As previously discussed, PA II remedied several constitutional deficiencies found within the PA, but not all. Thus, three
constitutional deficiencies remain. First, the recipient of a nondisclosure request bears the [*437]
burden of proof that the government is unreasonably suppressing speech. n281 Second, NSLs "continue[] to
authorize nondisclosure orders that permanently restrict an NSL recipient from engaging in any
discussion related to its receipt of the NSL." n282 Third, "if, at the time of the petition [to review a nondisclosure
request], the Attorney General ... certifies that disclosure may endanger the national security of the United
States ... such certification shall be treated as conclusive." n283 The Reform Act provides solutions for all
three issues. Regarding the suppression of speech via a nondisclosure request, the government "may apply for an order
prohibiting disclosure that the Federal Bureau of Investigation has sought or obtained access to
information or records under this section for not more than 180 days after the order is issued." n284 A
further limitation provides that an "application for an order pursuant to this subsection must state specific and
articulable facts giving the applicant [government] reason to believe that disclosure ... sought ... will
result in" several specified risks. n285 Conveniently, these two provisions also provide safeguards that prevent
a nondisclosure request from becoming permanent. n286 Regarding judicial review, the Reform Act establishes
that "[a] person prohibited by law from disclosing information about the [NSL] may file ... a petition for
the court to set aside the nondisclosure requirement. Such petition ... may be based upon any failure of the nondisclosure
requirement to comply with this section or upon any constitutional or other legal right." n287 Additionally, only the court will have the
authority to set aside a nondisclosure requirement. n288 V. Conclusion James Madison's
assertion that great difficulties lie
in creating a government that controls the citizenry and itself is no less true today. In furtherance of that
goal, the main body of the Constitution enumerates three independent, but co-equal, branches of the
federal government. Further, the Bill of Rights of the United States Constitution provides several individual liberties the government
must respect in the implementation of the law. Among these liberties are an American citizen's right to speech and privacy, as per the First and
Fourth Amendments respectively. Nonetheless, as early as the Civil War, the
United States Government has continually
infringed upon those rights via electronic monitoring programs [*438] directed towards the general public.
Regrettably, this monitoring activity has accelerated since the tragic terrorist attacks against the
American public on 9/11. This acceleration has been instigated by the Executive Branch's insistence that such power is found within
either the AUMF or Article II of the United States Constitution. However, constitutional restrictions found within the First
Amendment, Fourth Amendment, and the doctrine of separation of powers refute such claims. Additionally,
Supreme Court precedent, the history of wartime surveillance in the United States, and principles of
statutory construction all fail to sustain the Executive Branch's extraordinary claim of authority. Accordingly,
drastic measures are necessary to control the current power and ability of the Executive Branch while
maintaining the tools necessary for the government to protect the American people from a future
terrorist attack. In so doing, it is recommended a modified application of the National Security Letters
Reform Act of 2007 be adopted by both houses of Congress. If this achievement is realized, it has the potential of
restoring First and Fourth Amendment protections, and the Judicial Branch's constitutional authority,
which have contributed to the greatness of the United States of America over the past 200 years.
We must have congressional oversight- allowing the executive to reform itself
empirically fails and ensures expansion of surveillance
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
After audits belatedly revealed significant problems with both national security letters and business-records orders,
Congress made
little effort to improve the Patriot Act. Instead, it essentially looked away and allowed the executive to
rewrite the rules for seizing private information. Many legislators agreed that the FBI should be required to discard captured
materials not linked to terrorism suspects or foreign spies. In 2007 and again in 2009, Democrats offered multiple bills that added this
requirement to national security letters.24 However, even though Democrats had large majorities in Congress, they allowed these bills to die in
committee and instead deferred to the Obama administration. Eventually, Justice
Department officials drafted rules
requiring agents to delete all non-relevant information gathered with national security letters.25 It is
unclear why Congress passed the buck to the Obama administration. But by doing so, it gave the
executive the latitude to loosen or eliminate these rules at some later point. Congress also failed to revisit the
business-records provision. Initially, it appeared that lawmakers were willing to ignore security concerns and let six-month processing delays of
court orders hamper investigations. However, recent leaks about NSA programs indicate that Congress
had in effect simply turned
the entire issue over for secret policymaking by the executive branch. Recently, The Guardian reported that the
Bush administration in 2006, without public disclosure, had adopted a radical reinterpretation of the
business-records provision to authorize the daily collection of all domestic phone records.26 These data, or
“metadata” as they are termed, include the phone numbers of callers and receivers, the length and time of
calls, and sometimes the locations of phone participants. Originally, the businessrecords provision granted far more
limited authority. It allowed investigators to capture private materials on the basis of a court order in a specified terrorism case.27 The Bush
administration decided that such an order could be used to capture all communication logs from a specific phone carrier, such as Verizon or
AT&T. Authorities could now scoop up tens of millions of phone records with a single order issued by the FISA Court. The
Bush
administration first briefed members of Congress about the metadata program in 2006.28 Yet aside from two
senators, Mark Udall (D-CO) and Ron Wyden (D-OR), no one objected to the NSA dragnet or the drastic modifications
to the business-records provision.29 By letting Bush’s reinterpretation (subsequently maintained by
Obama) go unchallenged, Congress abdicated its legislative role and allowed the executive to develop
new surveillance law unilaterally.
CASE
Inherency
Even though the FBI has enacted some changes, they still lack basic judicial oversight
Weinstein in 2015 (Brett Weinstein; Washington University School of Law, “Legal Responses and
Countermeasures to National Security Letters”, Lexisnexis.com, 2015 Washington University Journal of
Law & Policy, 34 pgs., Database,
http://www.lexisnexis.com.proxy.library.umkc.edu/hottopics/lnacademic)
On February 3, 2015, Director of National Intelligence James Clapper announced changes to government
surveillance policies which implement the reforms outlined by President Obama in January, 2014. n122
Among them, In response to the President's new direction, the FBI will now presumptively terminate National
Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated
investigation or the investigation's close. [*239] Continued nondisclosures orders beyond this period are
permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory
standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why
continued nondisclosure is appropriate. n123 In other words, although NSLs statutorily may continue to be
issued with a perpetual gag order, the FBI will adopt a policy whereby it sometimes voluntarily
terminates the gag order after three years. This change, while an improvement over the previous policy
of allowing all gag orders to stand in perpetuity, does not implement the changes recommended by the
President's Review Group on Intelligence and Communications Technologies or dragnet surveillance
opponents. The new policy "doesn't address concerns that NSL gag orders lack adequate due process
protections, lack basic judicial oversight, and may violate the First Amendment." n124
SOP Advantage
NSLs up now
NSLs have increased dramatically since their inception
Clarke et al in 2013 (Richard, National Coordinator for Security, “Report and Recommendations of
The President’s Review Group on Intelligence and Communications Technologies”, The Review Group on
Intelligence and Communication Technologies,
https://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf)
Although NSLs were initially used sparingly, the FBI issued 21,000 NSLs in Fiscal Year 2012, primarily for
subscriber information. NSLs are most often used early in an investigation to gather information that might link suspected terrorists or spies to
The PATRIOT Act of 2001 significantly expanded the FBI’s
authority to issue NSLs. First, the PATRIOT Act authorized every Special Agent in Charge of any of the
Bureau’s 56 field offices around the country to issue NSLs. NSLs therefore no longer have to be issued by
high-level officials at FBI headquarters.
each other or to a foreign power or terrorist organization.
The number of NSL requests has exploded because the Patriot Act lowered standards
for usage.
Andrew E. Nieland in 2006 A.B., Harvard College, 1997; J.D., Cornell Law School, 2007, NATIONAL
SECURITY LETTERS AND THE AMENDED PATRIOT ACT, CORNELL LAW REVIEW,
http://www.lawschool.cornell.edu/research/cornell-law-review/upload/Nieland.pdf
Over the years, the FBI has repeatedly sought to expand the circumstances under which its agents could
issue NSLs.5 Congress delivered a particularly robust expansion in section 505 of the USA PATRIOT Act of
2001 (Patriot Act),6 which allowed the FBI to issue an NSL in circumstances roughly comparable to those
in which a federal prosecutor could obtain a grand jury subpoena.7 After the Patriot Act’s passage, the
number of NSLs issued apparently8 exploded— from “hundreds” between 1978 to 2001,9 to perhaps
“more than 30,000” per year from 2002 to 2005.10
FBI sends nearly 48,000 more letters per year after the Patriot Act, 60 every dayReview Group Reports
Electronic Frontier Foundation, no date, “National Security Letters FAQ” Electronic Frontier
Foundation, https://www.eff.org/issues/national-security-letters/faq
How many NSLs have been issued? Over 300,000 NSLs have been issued in the past 10 years alone. The
most NSLs issued in a single year was 56,507 in 2004. In 2013, President Obama’s Intelligence Review
Group reported; that the government continues to issue an average of nearly 60 NSLs every day. By
contrast, in 2000 (the year before the passage of the USA PATRIOT Act that loosened NSL standards),
8,500 NSLs were issued.
The scope of NSLs are overreaching and unwarranted
Wells 12 (Desirae L. Wells, “NATIONAL SECURITY LETTERS: WHY REFORM IS NECESSARY”,
LexisNexis.com, Yeshiva University 2012, 18 pgs., Database, 6/28/15,
http://www.lexisnexis.com.proxy.library.umkc.edu/hottopics/lnacademic/)
A National Security Letter ("NSL") is a form letter signed by an FBI Agent, with no judicial approval,
compelling disclosure of sensitive information held by banks, credit companies, telephone carriers and
Internet Service Providers. NSLs provide the Government with an extraordinary power and are
controversial because of this extraordinary power. This power has been expanded under the Patriot Act.
There has been much opposition to NSLs. Some argue that NSLs are an "unreasonable" search and
seizure of customer records and thus a violation of the Fourth Amendment; the scope of NSLs is
overreaching and unwarranted; NSLs are coercive in nature and the requirement of secrecy is
dangerous; and most importantly, the lack of judicial oversight is unconstitutional. Essentially,
opponents argue that we must not impede on our constitutional rights in the name of "protecting the
country from terrorists."
The FBI issued over 24,000 National Security Letters on over 14,000 people in
2010
Dilanian, 2011 Ken. "A Key Sept. 11 Legacy: More Domestic Surveillance." Los Angles Times. The Los
Angles Time, 29 Aug. 2011. Web. 29 June 2015.
WASHINGTON - Internet entrepreneur Nicholas Merrill was working in his Manhattan office when an FBI agent in a trench coat arrived with an
envelope. It was fall 2004, and federal investigators were using new legal authority they had acquired after Sept. 11, 2001. Merrill ran a small
Internet service provider with clients including IKEA, Mitsubishi and freelance journalists. The agent handed Merrill a document called a
National Security Letter, which demanded that he turn over 16 categories of detailed records on one of his customers. The letter wasn't signed
by a judge or prosecutor. It instructed him to tell no one. "Not even my lawyer? Not even my business partners?" Merrill asked. The agent
shrugged and left. Merrill had gotten a rare glimpse of the secret domestic intelligence gathering that is one of the most significant legacies of
9/11. Determined to ferret out terrorist plots, U.S. law enforcement and intelligence agencies now collect, store and analyze vast quantities of
digital data produced by law-abiding Americans. The data mining receives limited congressional oversight, rare judicial review and almost no
public scrutiny. Because of new laws and technologies, authorities track and eavesdrop on Americans as they never could before, hauling in
billions of bank records, travel receipts and other information. In several cases, they have wiretapped conversations between lawyers and
defendants, challenging the long- established legal principle that attorney-client communication is inviolate. Advocates say the expanded
surveillance has helped eliminate vulnerabilities identified after the 9/11 attacks. Some critics, unconvinced, say the snooping undermines
privacy and civil liberties and leads inevitably to abuse. They argue that the new systems have weakened security by burying investigators in
irrelevant information. "We are caught in the middle of a perfect storm in which every thought we communicate, every step we take, every
transaction we enter into is captured in digital data and is subject to government collection," said Fred H. Cate, a professor at the Indiana
University Maurer School of Law who has written extensively on privacy and security and who testifies frequently before Congress. A robust
debate on the new intelligence gathering has been impossible, for the simple reason that most of the activity is officially secret. In lawsuits
alleging improper eavesdropping, the Justice Department has invoked state secrecy to prevent disclosure of classified information and systems.
In May, two members of the Senate Intelligence Committee said Americans would be disturbed if they knew about some of the government's
data gathering procedures. However, Sens. Ron Wyden, D-Ore., and Mark Udall, D-Colo., said they are prohibited from revealing the facts.
"When the American people find out how their government has secretly interpreted" surveillance law, "they will be stunned and they will be
angry," Wyden said. The National Security Agency, which eavesdrops on foreign targets, once had to get a court-approved warrant to monitor a
U.S. citizen's communications over wires that traverse the United States. Now, the agency is free to vacuum up communications by Americans
and foreigners alike, as long as the target of the surveillance is a foreigner. Exactly what records are kept and how they are used is not well
understood, even by lawmakers who oversee the intelligence agencies, said Rep. Rush D. Holt, D-N.J., who chaired the now-expired Select
Intelligence Oversight Panel. "The NSA finds it pretty easy to snow members of Congress by confusing them," Holt said. Officials from the FBI
and NSA say they follow strict rules to avoid abuses. However, in
2007, the Justice Department's inspector general found
that the FBI had engaged in "serious misuse" of its authority to issue National Security Letters, claiming
urgency in cases where when none existed Such letters, a kind of administrative subpoena, are key to
the increased surveillance. Courts have ruled that the government doesn't need a search warrant, which
requires a judge's approval, to obtain records held by "third parties," such as hotels, banks, phone companies or
Internet providers. So the government has used National Security Letters to get the data, issuing 192,500 of
the letters between 2003 and 2006, according to an audit by the Justice Department inspector general.
The numbers have dropped sharply since then, but the FBI issued 24,287 National Security Letters last
year for data on 14,212 Americans. That's up from a few thousand letters a year before 2001. "It used to
be the case that if the government wanted to find out what you read and what you wrote, it would have
to get a warrant and search your home," said Daniel J. Solove, a law professor at George Washington
University and the author of numerous books and articles on privacy law. Now, "it just obtains your Amazon purchase
records, your Facebook posts, your Internet browsing history - without you even knowing." There is nothing
necessarily wrong with that, advocates argue. "As we put more data in the cloud, as we share more data online, we become less shocked when
the police have access to it," said Stewart Baker, a former NSA general counsel and policy chief at the Department of Homeland Security.
Privacy activists disagree. "I think it's a world of difference between what a person decides to post publicly and what the FBI collects about
them secretly," said Gregory Nojeim, senior counsel at the Center for Democracy & Technology, a Washington-based civil liberties group. U.S.
intelligence officials insist that the new surveillance powers have been crucial to stopping terrorist plots. They cite the case of Najibullah Zazi,
an Afghan-American who planned to bomb New York City subways in 2009. Warrants were obtained under the Foreign Intelligence Surveillance
Act, or FISA, to search Zazi's vehicle and eavesdrop on his calls. The evidence was used to secure his guilty plea to terrorism charges. Unlike a
search warrant in a criminal case, obtaining a FISA warrant does not require convincing a judge that there is probable cause to believe a crime
was committed. Instead, the government must show probable cause that the target is an agent of a foreign power, whether a diplomat,
terrorist or spy. Because of the different legal standard, information gathered from FISA warrants tended not to be used in criminal cases a
decade ago. Now that line has been blurred. In the Zazi case, the wiretapped conversations were revealed during pretrial discovery and are
believed to have helped persuade the defendant to plead guilty. "Zazi is a very good example of the melding of intelligence authorities and
criminal authorities," said a senior law enforcement official, speaking on condition of anonymity. "We needed to move quickly, and we never
could have done it like that" before Sept. 11. The Zazi case revealed another new reality. Earlier this year, the government disclosed that it had
recorded 43 conversations between Zazi's co-defendant, Adis Medunjanin, and his lawyer, Robert Gott-lieb. With rare exceptions, such
conversations are off-limits to investigators in criminal cases - unless they obtain a FISA warrant. FISA warrants also enabled the FBI to bug the
phones and break into the home of Oregon lawyer Brandon Mayfield, a convert to Islam, after a faulty FBI fingerprint analysis linked him to the
2004 Madrid train bombings, which killed nearly 200 people. The FBI initially refused to tell Mayfield or his family why or where he was being
held. He wasn't released until Spanish authorities announced that the fingerprint belonged to an Algerian suspect. Two years later, the U.S.
government formally apologized to Mayfield and paid him a reported $2 million settlement. A federal judge later ruled in Mayfield's favor that
provisions of the USA Patriot Act, allowing the FBI to use FISA to conduct "surveillance and searches of American citizens without satisfying the
probable-cause requirements of the Fourth Amendment," were unconstitutional. The government appealed, and the ruling was overturned in
2009. By then, the Obama administration had largely embraced the surveillance strategies and systems developed under President George W.
Bush. Bush gave the National Security Agency authority to eavesdrop on Americans communicating with foreigners abroad without first
obtaining a FISA warrant, deeming the process too slow to foil unfolding plots. As a U.S. senator, Obama condemned the so-called "wireless
wiretapping" after The New York Times made it public in 2005. However, when he ran for president in 2008, Obama voted for legislation that
granted retroactive legal immunity to telecommunications companies that had secretly helped the government eavesdrop. The law also
retroactively legalized other forms of surveillance, former intelligence officials say, including "bulk" monitoring that allows the government to
intercept all email traffic between America and a range of suspect email addresses in, say, Pakistan. The government's goal is "to find the kind
of patterns that maybe will lead them to evidence of some kind of terrorist plot, and maybe thereafter they can then zero in on a suspect," said
Joel Margolis, a regulatory consultant for Subsentio, a Colorado firm that helps telecommunications companies comply with law enforcement
requests. "It's just the opposite of what we've done in our tradition of law, where you start with a suspect." Privacy advocates say the
government should acknowledge how many Americans have had their communications intercepted in recent years. However, after Democrats
on the House Intelligence Committee requested that information, the Obama administration responded in July that it was "not reasonably
possible to identify the number." MCT photo Nick Merrill, who ran an Internet service provider, received an FBI National Security letter
demanding one of his client's Internet records. He successfully fought the demand in court. Merrill got a rare glimpse, though, of the secret
domestic intelligence gathering that is one of the most significant legacies of 9/11.
Squo Reforms Fail
Reforms Not in Place Now– FBI taking too long on gag orders
Fisher in 2015 (Dennis, “Confusion Reigns Over FBI’s Plans for National Security Letter Gag Orders”,
Threat Post, https://threatpost.com/confusion-reigns-over-fbis-plans-for-national-security-letter-gagorders/111494)
Recently, the Office of the Director of National Intelligence issued a report disclosing the intelligence community’s progress in addressing the
changes that Obama asked the various agencies to make in their collection and analysis programs. In
the report, the ODNI said that
the FBI would change the length of time the NSL gag orders run. “In response to the President’s new
direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the
earlier of three years after the opening of a fully predicated investigation or the investigation’s close,”
the report says. “Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant
Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why
continued nondisclosure is appropriate.”
However, in a letter unsealed this week, an attorney from the
Department of Justice said that the bureau is still considering how that process is going to work. “The
FBI is in the process of formulating and drafting guidelines for the implementation of the policy
described in the Report. Because this process is not yet complete, the potential applicability of the new
policy to the NSLs at issue in the above-referenced appeals remains to be determined. We will advise the Court
when this additional information becomes available,” Katherine T. Allen, an attorney in the civil division at the DoJ wrote in the letter. The
confusion on how the FBI plans to handle NSL gag orders in the future is not sitting well with the EFF,
which is involved in some law suits regarding the use of the letters. “The government should not be
telling everyone that reforms are in place “now,” when the truth is something different,” Nadia Kayyali
of the EFF wrote in a blog post. “Even if this new policy was actually implemented, it would not solve the
deep constitutional problems with National Security Letters.”
Reforms Not in Place Now – FBI issued reports on supposed reforms that did not
happen
Kayyali in 3/5/15 (Nadia, “Government "Clarifies" Its Stance on NSL Gag Orders”, Electronic Frontier
Foundation, https://www.eff.org/deeplinks/2015/03/government-clarifies-its-stance-nsl-gag-orders)
If you've been following our national security letter cases,
you know that the government had to retract a statement
made before the Ninth Circuit that minimized the devastating effect of these gag orders. Unfortunately, it
seems that wasn't the last time the government made a misleading statement about gag orders. In its
Signals Intelligence Reform 2015 Anniversary Report, the government proudly announced to the world:
"[T]he FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier
of three years after the opening of a fully predicated investigation or the investigation’s close." (emphasis
added). This might lead you to believe that the government's purported reforms were in place. Not so
much. In a February 12 letter to the Ninth Circuit, unsealed yesterday, the government explained: The
FBI is in the process of formulating and drafting guidelines for the implementation of the policy
described in the Report. Because this process is not yet complete, the potential applicability of the new policy to the NSLs at issue in
the above-referenced appeals remains to be determined. We will advise the Court when this additional information becomes available. The
government should not be telling everyone that reforms are in place "now," when the truth is
something different.
Current reforms of NSLs do not go far enough- they are voluntary and still allow openended investigations that bypass judicial and congressional oversight
Brett Weinstein in J.D. (2015), Washington University School of Law; B.A. (2010), Legal Responses
and Countermeasures to National Security Letters, Washington University Journal of Law & Policy 47
Wash. U. J.L. & Pol'y 217
In 2011, on behalf of an unnamed NSL recipient, the
Electronic Frontier Foundation (EFF) brought a new challenge to
NSLs in In Re National Security Letter. n65 On March 14, 2013, the District Court for [*229] the Northern District of California
granted the petition and declared that the nondisclosure provisions of the NSL statutes are not sufficiently narrowly tailored to serve
compelling governmental interests in national security without unduly burdening speech protected by the First Amendment. n66 This court also
agreed with the Mukasey decision and found that the provisions of NSL statutes which mandate the standard of review and level of deference
applied to the government certifications were violative of the First Amendment and separation of powers principles. n67 The
court also
ruled that the nondisclosure portion of the statute was not severable in that NSLs could not achieve
their function without the nondisclosure order, and therefore the entire statute, including the
underlying power to obtain customer records, is unenforceable. n68 The government appealed. n69 Since
this ruling declaring the NSL statutes illegal, Google has tried and failed at least twice to avoid
complying with them. n70 [*230] Challenges have also been mounted against other statutes purporting to allow the government to
collect electronic communications information without a warrant. Klayman v. Obama n71 and ACLU v. Clapper n72 concern the warrantless
collection of so-called "metadata" n73 pursuant to 50 U.S.C.A. § 1861, otherwise known as Section 215 of the PATRIOT Act. n74 Section 215
permits the government to obtain metadata records related to foreign [*231] intelligence through an ex parte appearance before the FISC. n75
Bulk collection under Section 215 is premised upon the third party doctrine described in Smith v. Maryland. n76 In a marked shift, the District
Court for the District of Columbia in Klayman v. Obama found that Smith v. Maryland and the third party doctrine were not controlling and
therefore did not extinguish the expectation of privacy a person has when using a telephone company or ISP. n77 Accordingly, the court held
that Section 215 is likely unconstitutional. n78 The court based its decision on United States v. Jones, the vastly altered technological landscape
since the Supreme Court handed down Smith, and the scale of the mass surveillance presented by the case. n79 In contrast, ACLU v. Clapper,
handed down by the District Court for the Southern District of New York just days after Klayman v. Obama, raised the same question regarding
the constitutionality of mass metadata collection under Section 215 and came to the opposite decision. n80 The court found that Smith and the
third party doctrine are controlling and bar an attack on Section 215 based on the reasonable expectation of privacy. n81 A District Court in the
District of Ohio held similarly in Smith v. Obama. n82 [*232] Crucially, the NSL statutes rely upon the same exception to the Fourth Amendment
as bulk collection under Section 215: the third party doctrine established by Smith. n83 If the third party doctrine is overturned or ruled
inapplicable to Section 215, it should be overturned or ruled inapplicable to the even more relaxed standards of NSLs. Should both opinions be
affirmed on appeal (or should they both be reversed), the issue will be ripe for Supreme Court review. n84 II. Disclosure of Aggregate Statistics
of Issued NSLs Customers of businesses that collect user data and records expect that data to be kept private unless permission is granted for
the data to be shared, or unless the government has proper legal authority to obtain them. The secrecy of NSLs undermines that trust because
customers do not know how frequently a business passes its data or records on to the government. This problem is particularly acute for
companies with business models that emphasize the security of housing data in the cloud - storage on dispersed, third party servers rather than
the customers' own servers. Even prior to the disclosures in June of 2013 by NSA contractor Edward Snowden revealing the extent of US
governmental surveillance, n85 several American technology companies began to issue "transparency reports" to allow the public to discern
how frequently the government requests and gains access to private data through search warrants and court subpoenas. n86 In March of 2013,
Google, with the government's permission, began to publish broad ranges of figures describing the number of NSLs it has received [*233]
annually. n87 Following Edward Snowden's disclosures, many more companies sought to make clear that their cooperation with the
government is compulsory, and that requests for information are not frequent or routine. n88 AOL, Apple, Facebook, Google, LinkedIn,
Microsoft, and Yahoo recently signed an open letter in support of a bill entitled the USA Freedom Act. n89 The letter focuses primarily on the
issue of transparency, namely, allowing these companies to disclose more information about what data the government has requested of them.
n90 The Act aims to rein in dragnet collection of data, n91 increase transparency of the FISC, provide companies the ability to release
information regarding FISA requests, and create an independent constitutional advocate to argue cases before the FISC. n92 The bill would also
require unclassified reports on NSLs, including "aggregate number of requests relating to US persons, non-US persons, persons subject to
national security investigation, persons [*234] linked to a subject of a national security investigation, and persons not subject to an
investigation or linked to a subject of an investigation." n93 Although the bill failed in the Senate on November 18, 2014, in a 58-42 vote,
Senator Patrick Leahy has committed to continue working towards its passage. n94 On June 11, 2013, Google asked the Attorney General and
FBI for permission to publish more explicitly the number and scope of secret subpoenas, including NSLs and FISA requests. n95 When the
government refused to allow such disclosures, Google filed a motion seeking a declaratory judgment of its right to publish aggregate
information about the subpoenas, such as the total number of requests for data received and users of accounts encompassed within such
requests. n96 Shortly thereafter Microsoft filed a similar motion. n97 Yahoo, Facebook, and LinkedIn filed motions seeking the same
declaratory judgment in September. n98 Moreover, Apple stated that it [*235] would file an amicus brief with the Ninth Circuit in support of
greater transparency regarding NSLs. n99 On January 17, 2014, President Obama announced reforms to the various surveillance activities
revealed by Snowden. Among them, Obama pledged that with regard to NSLs, Secrecy will not be indefinite, so that it will terminate within a
fixed time unless the government demonstrates a real need for further secrecy. We will also enable communications providers to make public
more information than ever before about the orders that they have received to provide data to the government. n100 On January 27, 2014, the
Obama administration announced that it would allow aggregate numbers of secret data requests to be disclosed pursuant to Executive Order
13526, § 3.1(c) to settle the filed motions and create a new framework for reporting on national surveillance requests. n101 According to a
letter written by James M. Cole, Deputy Attorney General (DAG Letter), going forward, the settling companies and all others may begin
reporting the number of NSLs (and FISA orders) received in bands of 1,000. Further, each company may also report the number of accounts
affected collectively by the NSLs (and FISA orders), in ranges of 1,000. n102 Companies may publish the figures once every six months, with a
[*236] six-month delay in reporting periods. n103 There is a two-year delay for any "new capability"-any new type of service a company offers.
n104 Alternatively, a company may report the total number of all "national security process" received, including all NSLs and FISA orders (and
the total number of "customer selectors" - i.e., accounts), reported as a single number in bands of 0-249 and thereafter in bands of 250. n105
The exception allowing for perpetual gag orders when "the government demonstrates a real need for further secrecy" is a loophole that may
render the announced changes meaningless. n106 Opponents of dragnet government surveillance generally felt that the reforms announced by
the President did not go far enough. n107 Twitter, for instance, decried the improvements as not meaningful. n108 Indeed, in October of 2014,
Twitter filed a lawsuit seeking declaratory judgment that it has the right to publish a Transparency Report that does not follow the framework
established in the DAG [*237] Letter. n109 Twitter alleged that the government prohibits services like Twitter "from providing their own
informed perspective as potential recipients of various national security-related requests." n110 Twitter explained that it submitted a draft
Transparency Report to the government, but after five months, the government informed Twitter that "information contained in the
[transparency] report is classified and cannot be publicly released" because it does not comply with the DAG Letter framework. n111 The
complaint stated that the government's "position forces Twitter either to engage in speech that has been preapproved by government officials
or else to refrain from speaking altogether." n112 Specifically, Twitter objects to the requirement that the first interval that can be reported
ranges from 0-249, precluding an announcement that Twitter has received zero NSLs. n113 Twitter's argument mirrors many of the arguments
made in In Re National Security Letter with a few additions. n114 Like the plaintiff in that case, Twitter claims "The nondisclosure and judicial
review provisions of 18 U.S.C. § 2709(c) are facially unconstitutional under the First Amendment." n115 It also claims that 18 U.S.C. § 2709(c) is
unconstitutional as applied to Twitter. n116 Like the plaintiffs in In Re National Security Letter, Twitter claims that altering of the standard of
review for NSLs represents a violation of separation of powers principles. n117 Twitter additionally claims that the DAG Letter violates the
Administrative Procedure Act for a variety of reasons, including [*238] that it "represents a final agency action not in accordance with law."
n118 In seeking dismissal, the government has responded that the DAG Letter itself does not limit Twitter's ability to publish its Transparency
Report. n119 Instead, "any such restrictions stem from other authority, including statutory law such as FISA, applicable orders and directives
issued through the [FISC], and from any applicable nondisclosure agreements." n120 The government explained that on "January 27, 2014, the
Director of National Intelligence declassified certain aggregate data concerning national security legal process so that recipients of such process
could reveal aggregate data," and the DAG Letter merely defines what may be published following this declassification. n121 The outcome of
this case may help to clarify not only which statistics companies may disclose in the interests of transparency, but whether warrant canaries,
discussed below, are legal. On February 3, 2015, Director of National Intelligence James Clapper announced changes to government
surveillance policies which implement the reforms outlined by President Obama in January, 2014. n122 Among them, In
response to the
President's new direction, the FBI will now presumptively terminate National Security Letter
nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or
the investigation's close. [*239] Continued nondisclosures orders beyond this period are permitted only if
a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for
nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued
nondisclosure is appropriate. n123 In other words, although NSLs statutorily may continue to be issued with a
perpetual gag order, the FBI will adopt a policy whereby it sometimes voluntarily terminates the gag
order after three years. This change, while an improvement over the previous policy of allowing all gag orders to
stand in perpetuity, does not implement the changes recommended by the President's Review Group on
Intelligence and Communications Technologies or dragnet surveillance opponents. The new policy
"doesn't address concerns that NSL gag orders lack adequate due process protections, lack basic
judicial oversight, and may violate the First Amendment." n124
Reforms of NSL procedures have failed- requests keep going up, with numerous cases
of abuse and failure to follow procedure
DESIRAE L. WELLS in 2012, JD from Brooklyn Law and an LLM (in Intellectual Property) from Benjamin
N. Cardozo School of Law. She is currently a Vice President at Bank of America/Merrill Lynch, working in
the areas of Corporate Law, Intellectual Property and Securities Law, NATIONAL SECURITY LETTERS:
WHY REFORM IS NECESSARY, 2012 Cardozo L. Rev. De Novo 216, lexis
Subsequently, as a result of the Ashcroft and Gonzalez litigation,
Congress attempted to fix the NSL statutes when it
passed the USA Patriot Improvement and Reauthorization Act of 2005 (the "Reauthorization Act"). n65 The NSL
statute amendments were driven both by sensitivity to an administrative desire for more explicit enforcement authority, n66 and by judicial
developments which had raised questions as to the statutes' constitutional vitality as written. n67 The statutes then came with open-ended
nondisclosure provisions which barred recipients from disclosing the fact or content of the NSL - ever or to anyone. Yet, they featured neither a
penalty provision should the confidential requirement be breached nor, in most cases, an enforcement mechanism should a NSL obligation be
ignored (the original FCRA statute alone had an explicit judicial enforcement component). The amendments created a judicial enforcement
mechanism and a judicial review procedure for both the requests and accompanying nondisclosure requirements. n68 They established specific
penalties for failure to comply with the nondisclosure requirements - a new crime punishable up to 5 years in prison for "willful disclosure of an
NSL with intent to obstruct an investigation." n69 Yet, they made it clear that the nondisclosure requirements did not preclude a recipient from
consulting an attorney. n70 Under
the NSL statutes' amendments in the Reauthorization Act, , businesses could
challenge NSLs, but they really had no incentive to do so. The costs of providing the records are far less
than hiring a [*229] lawyer to challenge the requests. The requests are secret, so customers never learn of
them, thus providers cooperating with the government are never forced to justify compliance. Also, the
companies that comply have immunity, so even if a customer found out that her records were shared,
she has no remedy against the company that disclosed the records, regardless of whether the disclosure was justified
or not. These amendments also provided a process to ease the nondisclosure requirement. n71 Libraries were
no longer subject to NSLs except to the extent they provided email access, but bookstores and sites like Amazon.com were still covered. Finally,
the amendments expanded Congressional oversight, n72 and called for Inspector General's audits of use of NSL authority. n73 As part of the
Reauthorization Act of 2006, Congress directed the Department of Justice (DOJ), Office of the Inspector General (OIG) to review the
effectiveness and use, including any improper or illegal use of NSLs issued by the DOJ. The OIG issued two Reports. n74 The first in 2007
addressed the FBI's use of NSLs for calendar years 2003 through 2005. The second in 2008 addressed the FBI's use of NSL for calendar year
2006. The OIG Reports confirmed that the
Patriot Act transformed NSLs into a much more frequently employed
investigatory tool. Specifically it stated that "the FBI issued approximately 8,500 requests in 2000 the
year prior to the passage of the Patriot Act and after the passage of the Patriot Act, the number of NSL
requests increased to approximately 39,000 in 2003, 56,000 in 2004 and 47,000 in 2005. n75 The Reports made a distinction
between NSLs and NSL Requests - a single NSL may contain multiple requests for information. The OIG Reports specified that the 39,000
requests in 2003 were contained in approximately 12,000 letters and the 47,000 requests in 2005 were contained in 19,000 letters. n76
According to the OIG Reports, there were 3 main reasons for the dramatic increase in the number of NSL
requests issued starting in 2003. n77 First, the Patriot Act eliminated the requirement that an NSL be
issued only if "there are specific and articulable facts giving reason to believe that the person or entity to whom the
information sought [*230] pertains is a foreign power or an agent of a foreign power." n78 Instead, the information need only be
"relevant to an authorized investigation to protect against international terrorism or clandestine activities," n79 a much
lower standard. Second, previously a NSL had to be approved by a senior FBI official at FBI headquarters but
NSLs could now be authorized by Special Agents in Charge at FBI field offices. As a result, approval is no longer a
lengthy process and generally takes only two to five days. n80 Third, in 2003, the Attorney General issued revised guidelines governing the
use of NSLs in FBI national security investigations (the "NSI Guidelines"). The revised NSI guidelines permit NSLs to be issued
during preliminary investigations; under the old guidelines NSLs could only be issued during full investigations. n81 The OIG
Reports found that in addition to significantly underreporting the number of NSL requests issued, the
FBI failed in a number of other significant ways as well. According to the reports, the agency under-reported
violations arising from the use of NSLs; sought information not permitted by the statute; issued NSLs without proper
authorization; issued over 700 "exigent letters" requesting the type of information covered by § 2709 without following the process for
obtaining an NSL; and repeatedly failed to properly adhere to the FBI's own internal documentation
requirements for approval of an NSL. n82 The OIG Reports also provided a glimpse at how the individual NSL statutes were
practically used and why they were considered so valuable to investigators. In the case of an ECPA NSL statute, the Reports explained that:
Through NSLs, an FBI field office obtained telephone billing records and subscriber information about an
investigative subject in a counterterrorism case. The information obtained identified the various telephone numbers with
which the subject had frequent contact. Analysis of the telephone records enabled the FBI to identify a group of individuals residing in the same
vicinity as the subject. The FBI initiated investigations on these individuals to determine if there was a terrorist cell operating in the city... n83
Headquarters and field personnel told us that the principal objective of the most frequently used type of [*231] NSL - ECPA NSLs seeking
telephone billing records, email records or subscriber information - is to develop evidence to support applications for FISA orders. n84 The RFPA
NSL statute also affords authorities access to a wide range of information (bank transactions records v. telephone transaction records): The FBI
conducted a multi-jurisdictional counterterrorism investigation of convenience store owners in the United States who allegedly sent funds to
known Hawaladars (persons who use the Hawala money transfer system in lieu of or parallel to traditional banks) in the Middle East. The funds
were transferred to suspected Al Qaeda affiliates. The possible violations committed by the subjects of these cases included money laundering,
sale of untaxed cigarettes, check cashing fraud, illegal sale of pseudoephedrine (the precursor ingredient used to manufacture
methamphetamine), unemployment insurance fraud, welfare fraud, immigration fraud, income tax violations, and sale of counterfeit
merchandise. n85 The FBI issued NSLs for the convenience store owners' bank account records. The records showed that two persons received
millions of dollars from the subjects and that another subject had forwarded large sums of money to one of these individuals. The bank analysis
identified sources and recipients of the money transfers and assisted in the collection of information on targets of the investigation overseas.
n86 With respect to the FCRA NSL statutes, the OIG Reports added: The Supervisor of a counterterrorism squad told us that the FCRA NSL
statutes enable the FBI to see "how their investigative subjects conduct their day-to-day activities, how they get their money, and whether they
are engaged [*232] in white collar crime that could be relevant to their investigations". n87 The
Reports found that the FBI relied
on unauthorized "exigent letters" to demand telephone billing records and subscriber information. The FBI
entered into contracts with three telephone companies to obtain information outside of the NSL process through exigent letters. Over 700
exigent letters were issued to the three companies between March 2003 and December 2005. There were sometimes no open investigations
tied to the exigent letter requests. Even though the exigent letters stated that "subpoenas requesting this information have been submitted to
the U.S. Attorney's Office who will process and serve them formally as expeditiously as possible", the OIG could not confirm one instance in
which a subpoena had been submitted to any United States Attorney's Office before the exigent letter was sent to the telephone companies.
n88 The
Reports also provided some startling statistics. There were 143,074 requests for information
from 2003-2005, approximately half concerning U.S. citizens. None of the information obtained by NSLs
was required to be destroyed even after the information was determined to concern innocent
Americans. There were 3,000 different telephone numbers that the FBI requested information on, and telecommunications companies
turned over, in false emergencies under so-called "exigent" circumstances, in the complete absence of legal authority. The Reports noted that
during the same period, there
were 34,000 law enforcement and intelligence agents who had unfettered,
nearly limitless access to phone records collected through NSLs. There were 11,100 different phone numbers whose
subscriber information was turned over to the FBI in response to only nine NSLs. In stark contrast to the volume of information collected, the
FBI made a mere forty-three confirmed criminal referrals to prosecutors after issuing an NSL. Nineteen involved fraud, seventeen were
immigration related and seventeen were for money laundering. Only one of the 143,074 persons' information collected through NSLs resulted
in a terror-related conviction that the Inspector General was able to confirm with material support. Finally, while
noting the
significant challenges and major structural changes the FBI was facing during the period covered and the
lack of any misuse rising to the level of criminal misconduct, the OIG Reports nonetheless concluded
that the FBI used NSLs in violation of applicable NSL statutes, Attorney General Guidelines and internal
FBI policies.
At: Reforms Solve
FBI ignores agency reforms or rules– even after IG reports, there is repetition of past
abuses
Sinnar 2013, Shirin Sinnar (Assistant Professor of Law, Stanford Law School), May 2013, “Protecting
Rights from Within? Inspectors General and National Security Oversight”, Stanford Law Review
The final, and arguably most important, dimension of rights oversight is the revision of agency rules to
prevent future abuses, whether through improving agency processes or imposing new "substantive"
constraints on agency discretion. The most significant "substantive" reform that resulted directly from IG
oversight is the termination of the use of exigent letters, which the FBI ordered following the DOJ IG's
first report on NSLs. n279 In addition, the CIA IG interrogations report possibly contributed to a decision not to waterboard further
detainees, although based on the public record it is difficult to separate out the effect of the IG report from the more public pressure resulting
from the infamous Abu Ghraib scandal. Apart
from these effects, the IG reports seem to have created more
procedural reform and oversight than substantive change, and largely left executive agencies with the
broad legal discretion to repeat past abuses. Both DOJ IG reviews resulted in the reform of agency
processes that could improve decisionmaking and compliance with existing rules. The reports called for
better processes for inter-and intra-agency consultation, improved training and guidance to staff, increased
internal legal oversight of agency actions, and better recordkeeping to facilitate evaluations of legal
compliance. n280 Following [*1071] the September 11 detainees report, the FBI agreed with an IG recommendation to use more objective
criteria, such as watch list status, to designate detainees as subjects of investigative interest, responding to the arbitrary manner by which
many innocent post-9/11 detainees were deemed threats. n281 The IG credited agencies with a relatively high level of compliance with its
recommendations. n282 Some
of these recommendations, and the resulting dialogue between the IG and host agencies in
addressing them, employed a level of technical detail unthinkable in judicial interventions or congressional
committee oversight: for instance, the IG and FBI went back and forth over whether, to accurately
report the impact of NSLs on U.S. citizens, a field in an NSL database tracking citizenship status should default to "U.S. citizen,"
default to "non-U.S. citizen," or require FBI agents to affirmatively record a target's citizenship. n283 Despite these strengthened
internal controls, the IG reviews often preserved broad agency discretion in ways that could arguably
lead to a repetition of the earlier abuses. IG investigations rarely led to significant rights-protective
"substantive" constraints on agency discretion, such as measures that would prevent an agency from engaging in a practice,
require a higher substantive threshold before an agency could undertake an action (such as a higher standard for individual suspicion before
employing an investigative tool), or require court approval for a contested practice. In
some cases, this outcome may have
been defensible based on the IG's findings. For instance, in the first NSL review, the DOJ IG concluded
both that the FBI had violated the law but also that NSLs contributed significantly to terrorism
investigations n284 - suggesting no obvious answer to whether the permissive Patriot Act standard for
issuing NSLs appropriately resolved liberty-security tradeoffs. But even where the DOJ IG viewed limitations on agency
discretion as the optimal reform, the IG review did not lead to that result. In its final report on exigent letters, the DOJ IG
recommended that Congress regulate the agency's ability to ask phone companies to voluntarily disclose
customer records, warning that new reliance on a previously unused statutory provision could lead to
renewed circumvention of the NSL requirements. n285 This request was unusual: the DOJ IG appears to direct its
recommendations overwhelmingly [*1072] to the Department of Justice, not Congress. n286 Nonetheless, Congress has not acted on the IG's
proposal, leaving the FBI with an even broader basis for seeking voluntary disclosures than it had previously claimed. Thus,
the FBI's
broad discretion to obtain personal records without a court order remains intact - even expanded -
despite three critical IG reviews. In responding to the critiques, the FBI successfully framed the problem as one of inadequate
procedures and implementation, rather than excessive power, and could then claim it had fixed the problem with better internal controls. n287
Ultimately, Congress reauthorized expiring provisions of the Patriot Act, n288 and declined to act on separate legislation to establish judicial
oversight over NSLs n289 or a new sunset provision on their use. n2902
National Security Letter Reform Still Contains Loopholes
Sledge in 2015 (Matt, “The Gaping Hole In Obama's FBI Surveillance Reform”, The Huffington Post,
http://www.huffingtonpost.com/2015/02/04/national-security-letter-reform_n_6617572.html)
But on Tuesday, as part of surveillance reforms made in the wake of National Security Agency leaker Edward Snowden's revelations,
the
Office of the Director of National Intelligence announced that national security letter gag orders will
now expire after three years, or when an investigation ends. The new rules contain a gaping exception,
however: FBI agents can essentially write themselves a permission slip to keep a national security letter
secret past the deadline, as long as they receive approval from supervisors. "This exception is essentially full
discretion to FBI officials," said Andrew Crocker, a legal fellow at the Electronic Frontier Foundation. "It is an exception that doesn't
have a lot of standards associated with it. This is kind of the problem with the (national security letter)
statute to begin with."
Even with orders to stop, the FBI continues to issue gag orders
Froomkin in 2015 (Dan Froomkin, “FBI Flouts Obama Directive to Limit Gag Orders on National
Security Letters”, Firstlook.org, First Look Media, 02/19/15, Website, 6/27/15,
https://firstlook.org/theintercept/2015/02/19/fbi-flouts-obama-directive-limit-gag-orders-nationalsecurity-letters/)
Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run
around the Fourth Amendment since 2001 has been something called a National Security Letter. FBI agents can
demand that an Internet service provider, telephone company or financial institution turn over its
records on any number of people — without any judicial review whatsoever — simply by writing a letter
that says the information is needed for national security purposes. The FBI at one point was cranking out
over 50,000 such letters a year; by the latest count, it still issues about 60 a day. Recipients are legally required to comply — but it
doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever.
That’s because National Security Letters almost always come with eternal gag orders. That means the NSL process
utterly disregards the First Amendment as well. More than a year ago, President Obama announced that he was ordering the
Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a
real need for further secrecy.” And on Feb. 3, when the Office of the Director of National Intelligence
announced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the
most concrete was — finally — to cap the gag orders: In response to the President’s new direction, the FBI will now
presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after
the opening of a fully predicated investigation or the investigation’s close. Continued nondisclosures orders beyond this period
are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has
Despite the use of the word “now” in that first sentence, however,
the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when. Media inquiries
were greeted with stalling and, finally, a no comment — ostensibly on advice of legal counsel.
justified, in writing, why continued nondisclosure is appropriate.
The FBI has failed to report the majority of NSL violations
Sinnar in 2013 (Shirin Sinnar; Assistant Professor of Law at Stanford Law School, “Protecting Rights
from Within? Inspectors General and National Security Oversight”, LexisNexis.com, 65 Stan. L. Rev.
1027, 2013; The Board of Trustees of Leland Stanford Junior University, 49 pgs., Database, 6/28/15,
http://www.lexisnexis.com.proxy.library.umkc.edu/hottopics/lnacademic/)
When Congress passed the Patriot Act six weeks after the September 11 attacks, it made it significantly easier for the FBI to
issue National Security Letters - administrative orders not requiring a judge's authorization - to obtain
consumer records from phone companies, Internet providers, credit agencies, and financial institutions. n98
The new rules permitted the FBI to issue NSLs so long as the information sought was "relevant" to an
international terrorism investigation without demonstrating that the information pertained to a foreign
[*1045] power, and authorized a broader range of FBI officials to approve them. n99 In late 2005 and early 2006, as
Congress debated reauthorizing sunset provisions of the Patriot Act, Justice Department officials insisted
that rigorous oversight over NSLs already existed and that no allegation of abuse had been substantiated. n100 Congress
subsequently renewed expiring Patriot Act provisions, while requiring the DOJ IG to review the
effectiveness and use of NSLs, "including any improper or illegal use." n101 That statutory mandate led to
three highly critical reports from DOJ IG Fine on the FBI's use of NSLs and other investigative tools. n102 In numerous
instances, the IG concluded, the FBI used NSLs in violation of statutes or internal guidelines, n103 but had failed to
report the "overwhelming majority" of possible intelligence violations "through the self-reporting mechanism established 25 years
ago to identify and address such violations." n104 Most damning, the IG found that the FBI had circumvented even the
relatively lenient NSL requirements in issuing "exigent letters": these letters asked phone companies to
hand over customer records outside standard legal processes by citing "exigent" circumstances, even
where no emergency existed, and falsely stated that the agency had already requested grand jury
subpoenas for the same information. n105 The FBI had even obtained phone records by scribbling
requests on post-it notes or taking "quick peeks" at the computer screens of phone company personnel stationed at FBI headquarters. n106 The IG
attributed the use of these extralegal processes to "numerous, repeated, significant management
failures" implicating even the "FBI's most senior officials." n107
The NSLs secrecy has allowed the FBI to abuse its power; they have been using it to
hide their mistakes
Froomkin in 2015 (Dan Froomkin, “FBI Flouts Obama Directive to Limit Gag Orders on National
Security Letters”, Firstlook.org, First Look Media, 02/19/15, Website, 6/27/15,
https://firstlook.org/theintercept/2015/02/19/fbi-flouts-obama-directive-limit-gag-orders-nationalsecurity-letters/)
The NSL program has a troubled history. The absolute secrecy of the program and resulting lack of
accountability led to systemic abuse as documented by repeated inspector-general investigations,
including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL
statutes, requests for information based on First Amendment protected activity, “after-the-fact” blanket NSLs
to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information
without any determination that the telephone numbers were relevant to authorized national security
investigations.
President Obama abuses special executive powers.
FSRN Editor. 2014 "Yale Law School Panel Takes Stock of Government Overreach and Secrecy." FSRN.
Free Speech Radio News, 3 Apr. 2014. Web. 01 July 2015.
Members of the Senate Intelligence Committee voted this afternoon to declassify parts of a report on
CIA interrogation techniques. Even before the vote, the CIA torture report made headlines after revelations that the agency
had accessed a restricted network used by Senate staffers to prepare and store the document. Senators who were
otherwise tepid in response to revelations of widespread government spying and suspicionless
surveillance of the U.S. general public reacted strongly to the invasion of the Senate staff network. While some hope that
alleged spying on Senators will provide an impetus for review and reform of the surveillance powers granted by Congress to the
nation’s intelligence agencies, others are looking to the next generation of top lawyers to take on the matter. Earlier this week, the
Yale Law School hosted a forum featuring prominent critics of the surveillance program and of government overreach. Melinda
Tuhus reports from New Haven Audio Player 00:0000:00Use Up/Down Arrow keys to increase or decrease volume. Download
Perhaps one of the biggest revelations to come to widespread public attention as a result of the massive
document leak by former NSA contractor Edward Snowden is the extent to which lawmakers have
approved measures to make suspicionless surveillance lawful. Much of the surveillance apparatus has
been built up and empowered in secret. Former presidential candidate and long-time public advocacy attorney
Ralph Nader says President Barack Obama has continued to wield special executive powers – behavior
which became a hallmark of the George W. Bush administration. “These are not episodic, this is not just
one violation,” argues Nadar. “Watch: secret law, secret courts, secret evidence, secret killings, secret
snooping on attorney/client communications. Secret unutterable expenditures of taxpayer money for
quagmires abroad. Secret redaction, secret prisons, and watch this one: redacted sections of published
judicial decisions. Some of the legal decisions upholding the government’s surveillance program are based on a classified
interpretation of a section of the Patriot Act. Senate Intelligence Committee member Senator Ron Wyden has repeatedly said that
Americans would be stunned to learn the full extent of surveillance powers authorized by this secret interpretation, but he cannot
provide concrete details or examples without breaking the law. Bruce Fein, a high-ranking Justice Department official during the
Reagan administration, notes that intelligence officials have been able to get away with lying to Congress during public hearings.
“And what about Congress? That’s not an impeachable offense, to lie under oath and mislead the American people?!” he asked,
referring to testimony by Obama’s Director of National Intelligence, James Clapper. “No. He’s still serving. We have as our Director
of National Intelligence, who’s entrusted with secrets about us, a known perjurer, remains in office, untarnished, public reputation
there. Where’s all the newspapers calling for his resignation? Silence.” Clapper confirmed in a letter sent last week to Senator
Wyden that U.S. persons have been targeted by the surveillance program – something he had earlier and categorically denied.
Fein, who also worked under the acting attorney general in the early 1970s to write a paper outlining a rationale for impeachment of
President Richard Nixon, says Obama is exercising a dangerous level of executive power without adequate checks. “This president
has authority to kill anyone on the planet, to play prosecutor, judge, jury and executioner, if he decides, in secret, that the target of
the Predator drone – could be another instrument of death, doesn’t have to be a Predator drone – is an imminent threat to U.S.
national security.” Fein added the process “is not subject to review by Congress, it’s not subject to review by courts, it’s not subject
to review by the American people. It is limitless.” The Obama administration has also cracked down on whistleblowers like no other.
Jesselyn Radack leads the national security and human rights branch of the Government Accountability Project, founded in 1975 to
protect whistleblowers. She previously worked in the Justice Department in the G.W. Bush administration, but resigned after working
on the case of John Walker Lindh, the so-called “American Taliban.” She held a position that the War on Terror could not be used to
justify the denial of basic rights – like access to legal counsel – to US citizens. Her superiors disagreed. She also found her emails
documenting her position had been mysteriously purged. “I managed to resurrect more than a dozen emails, including the one
documenting the FBI’s ethical misconduct in its interrogation of John Walker Lindh,” said Radack. “I wrote a memo to my boss, and I
attached the emails, and made a copy for myself in case they disappeared again, and I gave her the memo, and I resigned. I said I
don’t fully what’s going on here but I am not going to be a part of this.” As the audience of future lawyers applauded, she added that
her decision was based in following the rule of law without bending them in politically convenient circumstances. The experience
made her a whistleblower, but Radack is adamant that “leaking is not a crime in this country. You have a First Amendment right to
go to the press, and what I gave the press was completely unclassified.” Radack was put on the no-fly list and couldn’t get a job in
her field for several years. But she said the experience made her realize she wanted to spend the rest of her life defending
whistleblowers. She now serves as legal counsel for Edward Snowden, who is living in Russia under temporary asylum. “It says a
lot about democracy that a whistleblower now has to leave the country – that is the safest way to make a disclosure without getting
caught up in the legal system – is to leave the country to do so. What does that say about us?” She said the Snowden case is part
of a wider war on information going on in the country, against whistleblowers, journalists, hactivists and others who dissent from the
government party line. The speakers at the Yale Law School forum said they hope to encourage law students to question authority
and defend those who stand up for the law in the U.S., even when the highest officials flout it.
DS undermines SOP
Unchecked executive power over surveillance undermines the fourth amendment and
separation of powers- lack of judicial review ensures overreach
Kenneth R. Logsdon in 2008, J.D., University of Illinois College of Law, UNIVERSITY OF ILLINOIS
JOURNAL OF LAW, TECHNOLOGY & POLICY 2008 U. Ill. J.L. Tech. & Pol'y 409, lexis
The electronic surveillance that the United States Government has participated in post-9/11 implicates
several constitutional principles: namely, the First Amendment, Fourth Amendment, and the constitutional
doctrine of separation of powers. n173 As stated by the First Amendment and Supreme Court decree, if a statute allows for any
governmental discretion in limiting speech, like that found in the PA and PA II, such discretion must be subject to objective standards. n174
Regarding the Fourth Amendment, the Executive has relied upon AUMF and Article II to argue it has the constitutional authority to operate the
TSP. n175 However, current statutes already provide contingencies for a state of war; nevertheless, there has been no official declaration of
war. n176 Furthermore, the
Supreme Court has explicitly stated that the Executive Branch cannot circumvent
the Fourth Amendment even in a time of war. n177 According to the constitutional doctrine of separation
of powers, the Executive Branch's authority is greatest when Congress explicitly allows an [*426] action,
and it is at its lowest ebb when the Executive Branch takes any action incompatible with the expressed
or implied will of Congress. n178 In addition, the Executive Branch must respect the Judicial Branch's
constitutional authority, and any attempt by the Executive Branch to limit judicial review and discretion
is an infringement upon such authority. n179 A. First Amendment The First Amendment of the United States Constitution
states, "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom
of speech ... ." n180 This fundamental right cannot easily be dispensed with, and when Congress implements a statute allowing governmental
discretion to limit speech, that discretion must be limited by objective criteria. n181 Both the PA and PA II allow governmental discretion in the
administration of a nondisclosure request; thus, they must be limited by objective criteria. n182 The Supreme Court of the United States has
devised a test when such discretion is present, in order to prevent the dangers associated with censorship. n183 This test, known as the
Freedman test, states: the government must exercise its discretion within a system that allows for "procedural safeguards designed to obviate
the dangers of a censorship system."... (1) any restraint in advance of judicial review may be imposed only for "a specified brief period," (2) any
further restraint prior to "a final judicial determination on the merits" must be limited to "the shortest fixed period compatible with sound
judicial resolution," and (3) the burden of going to court to suppress the speech and the burden of proof once in court must rest on the
censoring government. n184 Prior to PA II, both the first and second factors under the Freedman test would have likely failed; however,
changes made in PA II implemented additional judicial safeguards not present in PA. n185 Even so, the third factor of the Freedman test still is
not satisfied under the newly enacted PA II. n186 Particularly, factor three of the Freedman test requires that the burden of proof in the
suppression of speech rest upon government. n187 Problematically, title 18, section 2709(c) of the United States Code "grants broad discretion
to the FBI to completely restrict constitutionally protected speech on the basis of its [*427] content, and it places the burden of challenging this
restriction in court solely on the NSL recipient ... ." n188 The government's response to First Amendment criticism focuses largely on ostensibly
analogous statutes that have avoided abrogation by the courts. n189 In particular, the government focuses on statutes that allow it to apply
wiretaps, pen registers, and FISA subpoenas. n190 To bolster this argument, these statutes also do not have the same broad ability of judicial
review as that prescribed by the PA II. n191 However, those statutes differ from those prescribing use of NSLs because the court authorizes the
search ex ante and provides judicial safeguards after the search has concluded. n192 Additionally, both the wiretap and pen register statutes
"imply that communications providers might be free to discuss wiretaps and pen registers, as well as their knowledge of underlying criminal
investigations, after those investigations are completed." n193 The ability of the government to restrict speech in grand jury cases well after the
time period in which it was necessary has also been found to be unconstitutional. n194 A law prohibiting grand jury witnesses from disclosing
their testimony after the jury term has ended violates the First Amendment to the United States Constitution. n195 On the other hand, a law
preventing grand jury witnesses from revealing their testimony post-jury term is acceptable, so long as the criminal investigation of the crime
continues. n196 Conversely, the revisions provided by PA II regarding NSLs "continues to authorize nondisclosure orders that permanently
restrict an NSL recipient from engaging in any discussion related to its receipt of the NSL," thus, violating the First Amendment. n197 1.
Executive Action Post-9/11 and the First Amendment n198 England's history of the freedom of speech and press is intertwined with the scope
of a search and seizure. n199 "This history was, of course, part of the [*428] intellectual matrix within which our own constitutional fabric was
shaped. The Bill of Rights was fashioned against the background of knowledge that unrestricted power of search and seizure could also be an
instrument for stifling liberty of expression." n200 The TSP created by the Executive Branch may be one such instance where the government's
ability to search electronic communications will have a direct impact on one's proclivity to freely express himself or herself. n201 Though this
observation may seem hyperbolic, "history abundantly documents the tendency of Government - however benevolent and benign its motives to view with suspicion those who most fervently dispute its policies... . Protections become the more necessary when the targets of official
surveillance may be those suspected of unorthodoxy in their political beliefs." n202 B. Fourth Amendment n203 "The warrant requirement
[within the Fourth Amendment] has been a valued part of our constitutional law for decades ... . It is not an inconvenience to be somehow
"weighed' against the claims of police efficiency." n204 1. Executive Action Post-9/11 and the Fourth Amendment The
warrant
requirement is an important functional element of restrained governance to prevent even wellintentioned, yet over-enthusiastic, governmental officials, from exceeding their constitutional
boundaries. n205 Yet, the aforementioned TSP was created because the Executive Branch believed such efficiencies were necessary, and
current surveillance laws inadequate, to protect American citizens from future terrorist attacks. n206 The Executive Branch argued this
efficiency is necessary in a state of war, which we are currently in. n207 Specifically, the Executive Branch stated the Congressional authority to
fight against terrorism, as found in AUMF, is all [*429] that is needed to justify such an expansive surveillance program. n208 However, the
AUMF is not a declaration of war, but Congressional "authorization" to use force. n209 If the Executive Branch is going to argue it has "war
powers" to implement the TSP, should not such an assertion require an actual declaration of war? Furthermore, even if such a declaration were
granted by Congress, would that justify the Executive Branch in ignoring a FISA provision (a mere Congressional act) that explicitly states what
actions are allowed by the President in a time of war? If not, how would it be remotely possible for the Executive Branch to have the
constitutional authority to disregard the Fourth Amendment? "The Bill of Rights of the United States Constitution must be applied despite
authority granted by the AUMF." n210 Significantly, these constitutional restrictions are also applicable to the Executive Branch's constitutional
powers embedded in Article II. n211 If this were not so, then Congress's attempt to restrain the Executive Branch's actions during war, as found
within FISA, is an unconstitutional Congressional infringement upon Article II. n212 Hitherto, "there does not appear to be any precedent even
vaguely on point - that is, where Congress legislated in an area within its legislative authority and it was nonetheless held by the Supreme Court
that the President had inherent authority to act contrary to the statute." n213 The argument that Article II of the United States Constitution
allows the Executive Branch to avoid adhering to restrictions within the Bill of Rights, in a time of war, was erroneous when proclaimed by the
Nixon Administration and is equally erroneous today. n214 In fact, the only Supreme Court case addressing the use of wiretaps for national
security purposes is United States v. U.S. District Court. n215 In this case, the Supreme Court concluded that domestic electronic surveillance to
further the Executive Branch's obligation to protect national security is insufficient to circumvent the Fourth Amendment. n216 In summary,
the Supreme Court of the United States recently and concisely declared: Striking the proper constitutional balance here is of great importance
to the Nation during this period of ongoing combat. But it is equally [*430] vital that our calculus not give short shrift to the values that this
country holds dear or to the privilege that is American citizenship. It is during our most challenging and uncertain moments that our Nation's
commitment to due process is most severely tested; and it is in those times that we must preserve our commitment at home to the principles
for which we fight abroad. n217 C. Separation of Powers When
the Founding Fathers gathered together to create a new
nation they did so with the knowledge of history and with the intent to create a government that would
restrain itself. n218 In so doing, they devised a Constitution that created three branches of government with each part assigned distinct
functions and requisite powers. n219 Though each branch was separate, they were coequal and "while
independent of the others, the workings of each were integrated as a whole ... to guarantee that lasting
stability demands that each branch honors its own bounds of authority, and those of the others." n220
Succinctly stated, "our national experience teaches that the Constitution is preserved best when each part of
the Government respects both the Constitution and the proper actions and determinations of the other
branches." n221 Recent legislation sought to rectify constitutional deficiencies and explicitly allow the
Executive Branch the ability to perform surveillance without a warrant. n222 This legislation, known as the
Protect America Act of 2007, was enacted in August 2007 and allowed the Executive Branch to electronically surveil a
suspected terrorist reasonably believed to be outside the United States for up to one year without a
warrant and provided immunity to telecommunication providers that assisted the government in doing
so. n223 However, Congress was cautious with such a grant of power and built in a sunset provision that automatically nullified the law at the
end of 180 days if there was no subsequent congressional action. n224 Congress did not act and the law sunset February 17, 2008. n225
Nevertheless, notwithstanding Congressional
prudence to build in a sunset provision, such explicit
authorization does not ameliorate the aforementioned constitutional criticism. n226
Government Surveillance Undermines Separation of Powers- no checks and balances
Reynolds 14 Glenn Harlan Reynolds, February 10, 2014, “NSA spying undermines separation of powers:
Column”, USA Today, http://www.usatoday.com/story/opinion/2014/02/10/nsa-spying-surveillance-congresscolumn/5340281/
Most of the worry about the National Security Agency's bulk interception of telephone calls, e-mail and the like has centered around threats to
privacy. And, in fact, the evidence suggests that if you've got a particularly steamy phone- or Skype-sex session going on, it just might wind up
being shared by voyeuristic NSA analysts. But most Americans figure, probably rightly, that the NSA isn't likely to be interested in their stuff.
(Anyone who hacks my e-mail is automatically punished, by having to read it.) There is, however, a class of people who can't take that
disinterest for granted: members of Congress and the judiciary. What they have to say is likely to be pretty interesting to anyone with a political
ax to grind. And the
ability of the executive branch to snoop on the phone calls of people in the other
branches isn't just a threat to privacy, but a threat to the separation of powers and the Constitution. As
the Framers conceived it, our system of government is divided into three branches -- the executive,
legislative and judicial -- each of which is designed to serve as a check on the others. If the president gets out of
control, Congress can defund his efforts, or impeach him, and the judiciary can declare his acts unconstitutional. If Congress passes
unconstitutional laws, the president can veto them, or refuse to enforce them, and the judiciary, again, can declare them invalid. If the judiciary
gets carried away, the president can appoint new judges, and Congress can change the laws, or even impeach.
But if the federal
government has broad domestic-spying powers, and if those are controlled by the executive branch
without significant oversight, then the president has the power to snoop on political enemies, getting an
advantage in countering their plans, and gathering material that can be used to blackmail or destroy
them. With such power in the executive, the traditional role of the other branches as checks would be
seriously undermined, and our system of government would veer toward what James Madison in The
Federalist No. 47 called "the very definition of tyranny,"that is, "the accumulation of all powers,
legislative, executive, and judiciary, in the same hands." That such widespread spying power exists, of course, doesn't
prove that it has actually been abused. But the temptation to make use of such a power for self-serving political ends is likely to be very great.
And, given the secrecy surrounding such programs, outsiders might never know. In fact, given the compartmentalization that goes on in the
intelligence world, almost everyone at the NSA might be acting properly, completely unaware that one small section is devoted to gather
political intelligence. We can hope, of course, that such abuses would leak out, but they might not. Rather than counting on leakers to protect
us, we need strong structural controls that don't depend on people being heroically honest or unusually immune to political temptation, two
characteristics not in oversupply among our political class. That means that
the government shouldn't be able to spy on
Americans without a warrant — a warrant that comes from a different branch of government, and
requires probable cause. The government should also have to keep a clear record of who was spied on,
and why, and of exactly who had access to the information once it was gathered. We need the kind of
extensive audit trails for access to information that, as the Edward Snowden experience clearly
illustrates, don't currently exist. In addition, we need civil damages — with, perhaps, a waiver of
governmental immunities — for abuse of power here. Perhaps we should have bounties for whistleblowers, too, to help
encourage wrongdoing to be aired. Is this strong medicine? Yes. But widespread spying on Americans is a threat to
constitutional government. That is a serious disease, one that demands the strongest of medicines.
NSL = Overreach
NSLs cause unnecessary intrusions on privacy while failing to enhance security- speed
leads to ineffective investigations
DESIRAE L. WELLS in 2012, JD from Brooklyn Law and an LLM (in Intellectual Property) from Benjamin
N. Cardozo School of Law. She is currently a Vice President at Bank of America/Merrill Lynch, working in
the areas of Corporate Law, Intellectual Property and Securities Law, NATIONAL SECURITY LETTERS:
WHY REFORM IS NECESSARY, 2012 Cardozo L. Rev. De Novo 216, lexis
However,
there were many effective arguments against using administrative subpoenas/NSLs in the
context of a criminal or foreign intelligence investigation. Use of NSLs in this context are more likely to
lead to unjustified intrusions of privacy; n40 seem to replicate and expand existing NSL authority, without an
explanation as to why additional authority is needed; n41 and lack the judicial safeguards that accompany
the issuance of a search warrant, probable cause and issuance by a neutral magistrate, among other things.
n42 NSLs generally lack the safeguards that accompany the issuance of a grand jury subpoena in that
NSLs are ordinarily not subject to a motion to quash or to the necessary participation of an Assistant
United States Attorney. n43 As compared to NSLs issued via government agencies, the extensive powers available to the grand jury are
justified in part because the grand jury acts as a buffer against the abuse of governmental authority. n44 On a financial level, NSLs
can be extremely expensive and disruptive for the person or entity to whom they are addressed long
before the thresholds of overbreadth or oppression (the point at which a subpoena will not be [*225] enforced) are
reached. n45 Further, they are subject to easy abuse when they are issued against third parties who may
have little interest in contesting legitimacy; n46 who are granted immunity from civil liability for the
disclosures; n47 and who are subject to the permanent gag orders precluding disclosure to targets who
might otherwise contest the abuse. n48 Finally, NSLs are frequently sought for their speed, an environment
which often breeds mistakes. n49
NSLs key- Slippery Slope
The amended national security letter law is a key step in expanding FBI authority- it
will lead to unfettered FBI subpoena power.
Andrew E. Nieland in 2006 A.B., Harvard College, 1997; J.D., Cornell Law School, 2007, NATIONAL
SECURITY LETTERS AND THE AMENDED PATRIOT ACT, CORNELL LAW REVIEW,
http://www.lawschool.cornell.edu/research/cornell-law-review/upload/Nieland.pdf
The NSL authority applies in a third context: the realm of national security and counterterrorism.232 The main problem with the parity and
harmonization arguments233 is their faulty premise. To justify a given policy, parity must exist: A terrorism investigation must be substantially
similar to either the “past crimes” investigations and prosecutions by federal prosecutors, or the civil investigations in which agencies deploy
administrative subpoenas. Even the FBI, however, insists that investigations and prosecutions are different in significant ways.234 The
secrecy of the investigation is far more important while actually obtaining a conviction is often far less
important.235 And given the judiciary’s general lack of national security expertise, the use of judicial review to prevent abuse of compulsory
process would be less effective, or even counterproductive, than in the civil or criminal contexts.236 As a result, the new intrusions
that the NSL authority represents—intrusions whose real significance is only beginning to be felt—must
be justified on their own terms and not by analogizing to the realms of civil and criminal processes. Such
justifications are particularly important because the FBI wants more than just the expanded NSL
authority. In a sense, the expanded NSL authority is simply a further slide down the slope toward a
comprehensive administrative subpoena power for the FBI. The George W. Bush Administration has
already lobbied for such power, and, in recent years, legislators have introduced bills that would confer it.237
Not surprisingly, the administration and legislators support such power with the same efficiency and parity arguments used in the NSL context.
One Justice Department official, testifying before a Senate Subcommittee, called the lack of an FBI administrative subpoena “illogical,” an
“anomaly” whose change would “level the playing field between terrorism investigations and other criminal investigations.”238 And
advocates will undoubtedly use the expanded NSL statutes to argue for such a change—if the FBI has
this power for one type of information, why not grant it for another? This Note does not aim to discuss the merits of a
more robust administrative subpoena power for the FBI. But the amended Patriot Act brings the FBI one step closer to
that power. Thus far, the NSL debate has obscured this significant change rather than underscored it. When
Congress passed the Patriot Act in 2001, it was aware that its actions could have unintended and adverse consequences. As a result, it included
sunset and oversight requirements for some of the Act’s more radical provisions.239 The
amendments to the NSL statutes had
no sunset requirement, likely because Congress failed to apprehend the significance of those
changes.240 By 2006, however, the importance of those changes was painfully obvious. Although Congress
demanded an audit of the NSL authority, it failed to couple this oversight requirement with a sunset
provision.241 This regrettable omission sharply diminishes the likelihood that Congress will act to create a
more efficient and benign NSL statute once it has the knowledge allowing it to do so. Instead, if the history
described here is any guide, further increases in the FBI’s compulsory power will come about not through
deliberation, but by default.
Overreach on Brink- Obama
Obama abuses executive orders- he picks and chooses which issues to act on, and
contradicts himself
Pollak on 2/4/14 (Joel B, editor-in-chief at breitbart.com and obtained J.D. from Harvard Law School,
“THREE WAYS OBAMA'S EXECUTIVE ORDERS ARE THE WORST OF ANY PRESIDENT”, Breitbart.com,
http://www.breitbart.com/big-government/2014/02/04/ruth-marcus-obama-executive-order/)
Complaints about executive orders, Marcus suggests, are just “politics dressed up in constitutional clothing, to be put on and off depending on
which party holds the White House.” I can say with confidence, as someone who never voted for George W. Bush and resented his expansion of
the executive, that Obama is in another league entirely. There
are three basic ways in which Obama’s behavior exceeds
that of any his predecessors. The first is that Obama is using executive orders and actions to alter his
own legislation. It’s one thing to claim that you are forced to act because Congress will not. It’s quite another thing to re-write the law
after Congress has done what you asked–and after you have offered, time and time again, to entertain formal amendments to the legislation.
Obama has simply invoked executive authority to cover up his own errors. That’s unprecedented. The
second way in which Obama’s abuse of executive power is different is that he has done it to prevent the
legislature from acting. It is now widely acknowledged that the president issued his “Dream Act by fiat” in 2012 not just because
Congress wouldn’t pass his version of immigration reform, but to outflank Sen. Marco Rubio (R-FL)80% , who was preparing his own version,
embarrassing Obama among Latino voters. Such pettiness is rare. The
third way in which Obama’s behavior is unusual is
that he commands sweeping executive power on some issues while arguing, on other issues, that he has
no power to act. The president’s recent speech about the NSA surveillance programs is a prime example
of such self-contradiction. There is no constitutional doctrine behind the president’s executive orders,
actions, and omissions: there is just pure, cynical political expediency. A final note. Marcus, like other apologists for
President Obama’s power grabs, compares his actions to those of President Abraham Lincoln when he issued the Emancipation Proclamation. It
is an absurd comparison, one chosen to flatter Obama’s failing pseudo-heroic image. If anything, Obama’s executive excesses tend to make us
less free. He is not governing in the tradition of Lincoln, but that of Woodrow Wilson–and doing far worse.
Overreach U/mines Demo
Deference to the executive undermines the rule of law
Louis Fisher in 2009 is a specialist in constitutional issues with the Law Library of the Library of
Congress, Presidential Studies Quarterly 39, no. 2 (June), Presidential Power in National Security: A
Guide to the President-Elect
The framers did not depend solely on the presidency or federal courts to protect individual rights and
liberties. They distrusted human nature and chose to place their faith in a system of checks and balances
and separated powers. The rule of law finds protection when political power is not concentrated in a
single branch and when all three branches exercise the powers assigned them, including the duty to
resist encroachments of another branch. The rule of law is always at risk when Congress and the
judiciary defer to claims and assertions by executive authorities. That is the lesson of the last two
centuries and particularly of the past seven years.
Recent actions by the executive actions show a staggering disregard for SOP
Whitehouse, 2008 Whitehouse, Sheldon. "Executive Overreaching in Surveillance of Americans." New
Jersey Law Journal (2008): n. pag. New Jersey Law Journal. New Jersey Law Journal, 4 Jan. 2008. Web. 1
July 2015.
In August, at the behest of the Bush administration, Congress hastily passed the so-called Protect America Act, which significantly
expanded the president's powers to spy on Americans. It did this by removing from the definition of "electronic surveillance," the key
determinant for Foreign Intelligence Surveillance Act protections, wiretapping of any person "reasonably believed to be outside the
United States." When the Senate takes up this legislation again, we need to correct this and other mistakes made in August - above
all, by reasserting the role of Congress and the courts in the conduct of surveillance on American citizens. Why is this so vital?
For years, the Office of Legal Counsel in the
U.S. Department of Justice has been issuing highly classified legal opinions related to surveillance. As a
Because of what this administration does when it thinks no one is looking.
member of the Senate Intelligence Committee, I was given access to those opinions, and I have spent hours poring over them.
Sitting in that secure room, I was dismayed and amazed. I was able to have my notes quoting three legal propositions from those
memos declassified. They
are: ¿ "An executive order cannot limit a President. There is no constitutional
requirement for a President to issue a new executive order whenever he wishes to depart from the
terms of a previous executive order. Rather than violate an executive order, the President has instead
modified or waived it." ¿ "The President, exercising his constitutional authority under Article II, can
determine whether an action is a lawful exercise of the President's authority under Article II." ¿ "The
Department of Justice is bound by the President's legal determinations." These propositions signal an
astoundingly broad assertion of executive authority, and a staggering disregard for basic principles of
separation of powers, and the structure of our government. Let's start with theory No. 1. The Protect America
Act provides zero statutory restrictions on the president's ability to wiretap, at will, Americans abroad - even
soldiers in Iraq. The only restriction on this power is Section 2.5 of Executive Order 12333, of Dec. 4, 1981, on U.S. Intelligence
Activities, as amended, which limits surveillance of U.S. persons to those the attorney general determines to be foreign powers or
agents of a foreign power. If the first theory stands, the
only thing standing between Americans traveling overseas
and a government wiretap is an executive order that this president believes he is under no obligation to
obey, and may secretly disregard. If executive orders are our only protection, it matters a lot when this administration says the
president doesn't have to follow them, or tell anyone when he's breaking them. That is why Congress' role is so important now.
Unless Congress acts, nothing legally prevents this president from wiretapping Americans traveling abroad. Legal theory No.
2:
The president, according to the Bush OLC, has Article II power to determine what the scope of his Article
II powers are. This bald statement runs up against the Supreme Court's 200-year-old decision in Marbury
v. Madison, which states it is "emphatically the province and duty of the judicial department to say what the law is." According to
this president, he decides what the law is. There is an eerie parallel here to the "signing statements" the Bush administration has so
prolifically issued, which assert executive power to rewrite legislation, without going to a court for a determination of the statute's
validity. Finally, remember theory No. 3: "The Department of Justice is bound by the President's legal determinations." We are a
nation of laws, not of men. Our attorney general swears an oath to defend the Constitution and the laws of the United States, not to
obey the president. That oath is not compatible with a president who tells the Department of Justice what the law is. At least in my
opinion, the presidential authority to appoint the attorney general does not strip the attorney general of the duties that are the
product of his office, and which may fall into conflict with doing the president's bidding. The overheated view of executive power
revealed by these secret opinions shows why Congress cannot put the authority to wiretap Americans, whenever they step outside
America's borders, under the exclusive control and supervision of this president. We do not allow it when Americans are here at
home; we should not allow it when they travel abroad. The protections
afforded Americans by our country's checks
and balances, by congressional legislation and oversight, and by judicial approval and review, are simple
and longstanding. Americans deserve these protections wherever on God's green earth they may travel.
Executive Power = War
Unchecked executive discretion risks escalation in times of conflict- we need checks
and balances
Holmes, 2009 Holmes, Stephen. "The Brennan Center Jorde Symposium on Constitutional Law: In
Case of Emergency: Misunderstanding Tradeoffs in the War on Terror." California Law Review, Inc
(2009): n. pag. Web. 28 June 2015
When faced with a serious threat to national security, the most aggressive response will not always be
the most effective response. In a bullfight, the bull loses the contest not because it is insufficiently aggressive, but rather because the
matador, through provocative gestures, uses the wounded beast's aggressive impulses and impaired vision against it, repeatedly luring it into
futilely and exhaustingly charging a phantom target. n108 Any
system that defends unmonitored executive discretion
exposes itself to the danger that the executive officials who happen to be in power at the time will
feel that inaction is psychologically intolerable or, by sheer bad luck, will have a bias toward
aggressive action that, while psychologically satisfying (not to mention electorally advantageous), in no way corresponds to
the requirements of the situation. n109 [*346] Because those who attacked the United States violated an absolute international
ban on terrorism, American authorities may have been tempted to avenge the injury - an eye for an eye - by violating an equally absolute
international ban on torture. After suffering a severe blow inflicted by an avowed enemy, the surviving victims of an attack are often obsessed
with reestablishing an image of themselves as active rather than passive. They have to "do something" without giving too much thought to the
specific consequences of the actions they undertake. This suggests, once again, that cruelly coercive interrogation may have been embraced
less for the tactical information it promised to disgorge than for its independent psychological appeal. All of its practical consequences were not
necessarily coolly considered. Such speculations are admittedly impossible to prove or disprove. But they are plausible enough to justify
skepticism about the claim that harsh interrogation was embraced solely for the pragmatic reason alleged, namely to extract intelligence to
prevent a follow-up nuclear sneak attack against the United States. Electoral, as opposed to national-security, considerations may also have
contributed to the embrace of interrogation techniques that departed sharply from preexisting rules. The
lack of genuine metrics of
success in the war on terror makes it inherently difficult to prove to voters that their government has
undertaken the most effective course of action. Such politically unsustainable uncertainty may, as
mentioned, pressure policymakers into seeking or fabricating pseudo-metrics. This is especially true when
American policymakers could not demonstrate that their actions are eliminating more terrorists than they are producing. But the Bush
administration and its supporters could always point out that Amnesty International, Human Rights First, the ACLU, and other liberalhumanitarian organizations were screaming about torture. These organizations' vehement expressions of outrage strongly [*347] suggested
that the Bush administration was going to extreme lengths - pulling out all the stops - to protect the country. The pernicious idea of a libertysecurity tradeoff, once again, lent a spurious plausibility to the mind-game being played.
Executive Power = Escalation/Miscalc
Lack of checks and balances ensures conflicts escalate- singular decision making is
more prone to miscalculation
Adler 8 – David Gray, Professor of Political Science at Idaho State University, “The Judiciary and
Presidential Power in Foreign Affairs: A Critique”, 6-1,
http://www.freerangethought.com/index.php?option=com_content&task=blogsection&id=6&Itemid=4
1
{11} The
structure of shared powers in foreign relations serves to deter abuse of power, misguided
policies, irrational action, and unaccountable behavior.[31] As a fundamental matter, emphasis on joint
policymaking permits the airing of sundry political, social, and economic values and concerns. Such a
structure wisely ensures that the ultimate policies will not merely reflect the private preferences or the
short-term political interests of the President.[32] {12} Of course, this arrangement has come under fire in
the postwar period on a number of policy grounds. Some have argued, for example, that fundamental political and technological
changes in the character of international relations and the position of the United States in the world have rendered obsolete an eighteenth
century document designed for a peripheral, small state in the European system of diplomatic relations. Moreover, it
has been asserted
that quick action and a single, authoritative voice are necessary to deal with an increasingly complex,
interdependent, and technologically linked world capable of almost instantaneous massive destruction.
Extollers of presidential dominance also have contended that only the President has the qualitative
information, the expertise, and the capacity to act with the necessary dispatch to conduct U.S. foreign
policy.[33] {13} These policy arguments have been reviewed, and discredited, elsewhere; space limitations
here permit only a brief commentary.[34] Above all else, the implications of U.S. power and action in the
twentieth century have brought about an even greater need for institutional accountability and
collective judgment than existed two hundred years ago. The devastating, incomprehensible
destruction of nuclear war and the possible extermination of the human race demonstrate the need for
joint participation in any decision to initiate war. Moreover, most of the disputes at stake between the
executive and legislative branches in foreign affairs have virtually nothing to do with the need for rapid
response to crisis. Rather, they are concerned only with routine policy formulation and execution, a classic
example of the authority exercised under the separation of powers doctrine.[35] {14} Nevertheless, these joint functions have been
fused by the executive branch and have become increasingly unilateral, secretive, insulated from public
debate, and hence unaccountable.[36] In the wake of Vietnam, Watergate, and the Iran-contra scandal,
unilateral executive behavior has become ever more difficult to defend. Scholarly appraisals have
destroyed arguments about intrinsic executive expertise and wisdom in foreign affairs and the alleged
superiority of information available to the President.[37] Moreover, the inattentiveness of presidents to
important details and the effects of "groupthink" that have dramatized and exacerbated the relative
inexperience of various presidents in international relations have also devalued the extollers'
arguments. Finally, foreign policies, like domestic policies, are reflections of values. Against the strength of democratic principles, recent
occupants of the White House have failed to demonstrate the superiority of their values in comparison to those of the American people and
their representatives in Congress. {15} The
assumption of foreign affairs powers by recent presidents represents a
fundamental alteration of the Constitution that is both imprudent and dangerous. We turn now to an
examination of the judiciary's contribution to executive hegemony in foreign affairs.
Checks Solve SOP
Strong institutional checks on the executive are the only way to improve decision
making in counterterrorism efforts- deliberation ensures better information and a
pragmatic approach
Holmes, 2009 Holmes, Stephen. "The Brennan Center Jorde Symposium on Constitutional Law: In
Case of Emergency: Misunderstanding Tradeoffs in the War on Terror." California Law Review, Inc
(2009): n. pag. Web. 28 June 2015.
Far from being a carefully calibrated response to the terrorist threat, the executive-discretion agenda
exaggerates the upsides and discounts the downsides of unregulated executive discretion. The "game"
of counterterrorism cannot be successfully conducted by ad hoc decisions made in defiance of all rules
and outside of all institutionalized decision-making procedures, practices, and institutions. Rulegoverned counterterrorism is both feasible and desirable for several reasons. First, public officials
perform best, even during emergencies, when forced to give reasons for their actions. Second, the
temptation to react viscerally and mimetically rather than strategically to the mass murder of innocent
civilians is almost impossible to resist without strong guidelines laid down in advance. Third, likeminded individuals, if allowed to make vital national-security decisions in virtual isolation, tend to fixate
on one salient feature of a complex threat environment, neglecting equally lethal dangers and failing to
consider the unintended consequences of their own remedial actions. And fourth, it is essential in a
democracy to minimize, if not altogether eliminate, incentives for public officials to feign urgency and
necessity in the face of a threat that cannot easily be observed by anyone outside the security
apparatus of the state. Because the spectrum of threats which national-security agencies must monitor
and manage remains extremely complex, and because national-security assets are invariably scarce,
counterterrorism decisions can increase security in one dimension only by opening up security
vulnerabilities along other dimensions. Risk-risk tradeoffs are often close calls and should therefore be
undertaken with deliberate speed, not hastily after dissenters are intimidated with fictional accounts of
the need to make consequential decisions instantaneously and without considering known facts,
consulting knowledgeable experts, and hearing different points of view. The difficulty and gravity of
security-security tradeoffs, obscured by the misleading focus on liberty-security tradeoffs, is perhaps the
most important argument against [*355] leaving decision making in the area of counterterrorism to the
unchecked discretion of a few individuals, operating inside a bunker insulated from outside criticism and
dissent. For this and other reasons, the indispensability of rules and protocols in ordinary emergencies
can provide an important clue and point of reference for counterterrorism theorists and strategists.
Rules such as the individualization of culpability and procedures such as obligatory reason-giving, far
from "tying hands," can help liberate counterterrorism policy from the rigidities that inevitably plague
partisan-political reactions to national-security emergencies. They do not guarantee success, of course.
But adversarial procedures and the presumption of innocence are more likely than unfettered executive
discretion to promote a pragmatic approach to the management of risk, including flexible and factminded adaptation to an obscure, amorphous, evolving, and still deadly serious threat.
Democracy Adv
Exec Power u/mines Demo- Spillover
Executive power undermines Democracy and the Constitution, power grabs will
always carry over to the next presidency-empirics prove.
Nelson, Dana D. Bad for Democracy: How the Presidency Undermines the Power of the People. U of
Minnesota Press, 2008.
But this is not just a simple summary of the Bush—Cheney—Rumsfeld— Wolfowitz philosophy for dealing with political opposition. Rather, it
draws on a deep and relatively unnoticed tradition of expanding presidential powers that began in the age of George Washington. This
expansion has come at times through the ambitions, machinations, and moxie of individual presidents — some of them impressively gifted
governmental and political leaders, It has also come through the active and passive consent of citizens, the courts, and Congress.
Because
the president has come to symbolize both our democratic process and our national power, we tend to
see him simultaneously as democracy’s heart (he will unify the citizenry) and its avenging sword (he will protect
us from all external threats). Those beliefs, inculcated in us from our earliest days in school, reinforced by both
popular culture and media coverage of government, politics, and foreign affairs, make us want to give
the president more power, regardless of the constitutional checks and balances we also learned to treasure as
schoolchildren. Every now and then, a president reaches too far. Then Congress, or the judiciary, or the
citizenry reacts, mobilizing to take back some of the powers of the presidency. The habit in such moments is to
blame the individual president who provoked the immediate reaction, ignoring history and turning a
naive eye to the future. The fact is, ever since the office was invented, presidents have been appealing to how it
serves as a symbol of national strength and domestic unity, and to its function as a focal point for foreign policy, to claim more powers
for the office than those it was explicitly granted by the Constitution. Especially since the administration of Franklin D.
Roosevelt, when the executive branch and federal bureaucracy underwent a massive expansion, every president has worked to
extend presidential powers in ways that the Constitution’s framers would likely have viewed as alarming
and profoundly compromising to their ideals and aims. When citizens and government officials focus their response to
presidential power grabs by aiming it at a single president, they effectively fail to check the problem because the next president will (as history
tells us) repeat the grabs—and will almost surely keep the powers. Whenever a
president succeeds at a power grab, he
establishes a precedent that the next president can refer to as he (and maybe someday, she) makes yet another
incremental grab for powers that the framers allocated to another branch.
Exec Power u/mines Demo
Addition to executive power directly conflicts with Democratic power- taking it away
and depoliticizing citizens
Nelson, Dana D. Bad for Democracy: How the Presidency Undermines the Power of the People. U of
Minnesota Press, 2008.
Presidentialism has trained us for this conclusion, and insofar as it succeeds, it works to undermine our democratic
proclivities and skill building. Baldly put, presidentialism has been bad for democracy. Despite the particular
virtues and leadership skills of some presidents, presidentialism works against peoples’ civic cultivation of democratic
skills. It trains us to want the president to take care of democracy for us instead of remembering that democracy, properly
defined, is our job. Presidentialism depoliticizes citizens, making us less inclined to think and, thus, less
likely to participate in self-governing. Presidentialism encourages people to see democracy as a winner-take-all endeavor in world
politics as well as in the domestic sphere, an arena where presidential candidates go mano a mano and then when the winner ascends to office,
the losers (and his supporter- constituents) fade from view. This teaches citizens to see negotiation and compromise as the weakness, not the
strength, of democracy. Presidentialism trains people to see democracy as being both led and symbolized by a single person, a strong leader
standing for a strong consensus, instead of remembering that disagreement is a productive working principle for democracy. In this way,
presidentialism makes people fundamentally un comfortable with one of the most important motors for political freedom and agency. It leads
us to see and thus to overemphasize democracy as unity, instead of helping us remember that a decently functioning disunity can provide
better solutions and make an even stronger nation. The civically trained desire to see the U.S. president as “the most powerful man in the
world” has had the effect of allowing individual presidents incrementally and steadily to increase the power of that branch, most recently in the
aftermath of 9/II, when Congress gave to the executive their branch’s right to supervise war powers (a constitutional power that Congress has
in fact not exercised since December 8, 1941). In this sense, presidentialism
is colonizing democracy for its own powers
and purposes, depending on the people to keep believing that the executive’s power is somehow our
power instead of recognizing that the truth is exactly the opposite. Whether particular presidents are
good or not, the increase of presidential power concretely diminishes our democracy, by taking prestige
as well as power from what was historically denominated the “people’s branch,” the legislature, and ultimately
by taking it away from the people. No single person can make democratic decisions, since democracy gets its vitality from people
negotiating their differences to find positive solutions. And even if we account for the fact that presidents seldom make
decisions without drawing on the resources and counsel of their cabinet, the fact is, members of their cabinet are neither elected by nor
accountable to U.S. citizens.
Exec Power Brink- Collapse coming
We’re on the brink—unfettered Executive makes democracy collapse inevitable
Yglesias, 3-2—Matthew, Executive Editor @ Vox, former Magna Cum Laude grad @ Harvard and
editor-in-chief of The Harvard Independent. “American democracy is doomed,” Vox,
www.vox.com/2015/3/2/8120063/american-democracy-doomed
America's constitutional democracy is going to collapse. Some day — not tomorrow, not next year, but probably sometime before
runaway climate change forces us to seek a new life in outer-space colonies — there is going to be a collapse of the legal and political
order and its replacement by something else. If we're lucky, it won't be violent. If we're very lucky, it will lead us to
tackle the underlying problems and result in a better, more robust, political system. If we're less lucky, well, then, something worse will happen. Very few people
agree with me about this, of course. When
I say it, people generally think that I'm kidding. America is the richest,
most successful country on earth. The basic structure of its government has survived contested elections
and Great Depressions and civil rights movements and world wars and terrorist attacks and global
pandemics. People figure that whatever political problems it might have will prove transient — just as
happened before. "Rather than everyone being wrong about the state of American politics, maybe everyone is right" But voiced in another
register, my outlandish thesis is actually the conventional wisdom in the United States. Back when
George W. Bush was president and I was working at a liberal magazine, there was a very serious
discussion in an editorial meeting about the fact that the United States was now exhibiting 11 of the 13
telltale signs of a fascist dictatorship. The idea that Bush was shredding the Constitution and trampling on congressional prerogatives was
commonplace. When Obama took office, the partisan valence of the complaints shifted, but their basic tenor
didn't. Conservative pundits — not the craziest, zaniest ones on talk radio, but the most serious and well-regarded — compare Obama's immigration moves to
the actions of a Latin-American military dictator. In the center, of course, it's an article of faith that when right and left talk like this they're simply both wrong.
These are nothing but the overheated squeals of partisans and ideologues. At
the same time, when the center isn't complaining
about the excessively vociferous complaints of the out-party of the day, it tends to be in full-blown panic
about the state of American politics. And yet despite the popularity of alarmist rhetoric, few people act
like they're actually alarmed. Accusations that Barack Obama or John Boehner or any other individual
politician is failing as a leader are flung, and then abandoned when the next issue arises. In practice, the
feeling seems to be that salvation is just one election away. Hillary Clinton even told Kara Swisher
recently that her agenda if she runs for president is to end partisan gridlock. It's not going to work. The
breakdown of American constitutional democracy is a contrarian view. But it's nothing more than the
view that rather than everyone being wrong about the state of American politics, maybe everyone is
right. Maybe Bush and Obama are dangerously exceeding norms of executive authority. Maybe legislative
compromise really has broken down in an alarming way. And maybe the reason these complaints persist across different
administrations and congresses led by members of different parties is that American politics is breaking
down. The perils of presidential democracy To understand the looming crisis in American politics, it's useful to think about Germany, Japan, Italy, and Austria.
These are countries that were defeated by American military forces during the Second World War and given constitutions written by local leaders operating in close
collaboration with occupation authorities. It's striking that even though the US Constitution is treated as a sacred text in America's political culture, we did not push
any of these countries to adopt our basic framework of government. This wasn't an oversight. In a 1990 essay, the
late Yale political scientist
Juan Linz observed that "aside from the United States, only Chile has managed a century and a half of
relatively undisturbed constitutional continuity under presidential government — but Chilean
democracy broke down in the 1970s."
The exact reasons for why are disputed among scholars — in part because you can't just randomly assign different governments to people. One issue here is that American-style systems are much more
common in the Western Hemisphere and parliamentary ones are more common elsewhere. Latin-American countries have experienced many episodes of democratic breakdown, so distinguishing Latin-American cultural attributes from institutional characteristics is difficult. Still, Linz offered several reasons why presidential
systems are so prone to crisis. One particularly important one is the nature of the checks and balances system. Since both the president and the Congress are directly elected by the people, they can both claim to speak for the people. When they have a serious disagreement, according to Linz, "there is no democratic principle on
the basis of which it can be resolved." The constitution offers no help in these cases, he wrote: "the mechanism s the constitution might provide are likely to prove too complicated and aridly legalistic to be of much force in the eyes of the electorate." In a parliamentary system, deadlocks get resolved. A prime minister who lacks
the backing of a parliamentary majority is replaced by a new one who has it. If no such majority can be found, a new election is held and the new parliament picks a leader. It can get a little messy for a period of weeks, but there's simply no possibility of a years-long spell in which the legislative and executive branches glare at
each other unproductively. But within a presidential system, gridlock leads to a constitutional trainwreck with no resolution. The United States's recent government shutdowns and executive action on immigration are small examples of the kind of dynamic that's led to coups and putsches abroad. There was, of course, the
American exception to the problems of the checks-and-balances system. Linz observed on this score: "The uniquely diffuse character of American political parties — which, ironically, exasperates many American political scientists and leads them to call for responsible, ideologically disci plined parties — has something to do with
it." For much of American history, in other words, US political parties have been relatively un-ideological and un-disciplined. They are named after vague ideas rather than specific ideologies, and neither presidents nor legislative leaders can compel back-bench members to vote with them. This has often been bemoaned
(famously, a 1950 report by the American Political Science Association called for a more rigorous party system) as the source of problems. It's also, according to Linz, helped avert the kind of zero-sum conflicts that have torn other structurally similar democracies apart. But that diffuse party structure is also a thing of the past. A
short history of American polarization American politics is much more polarized today than it was 25 or 50 years ago. But not everyone buys the theory that today's era of party polarization spells big trouble. Political scientist Jonathan Bernstein argues that it's "not some sort of freakish un-American phenomenon." The real
exception, Bernstein says, the middle of the twentieth century, when the parties weren't polarized. Polarization is the norm, he says, and he's right. A long line of research starting with Keith Poole and Howard Rosenthal, political scientists at the University of Georgia and New York University respectively, records all
congressional votes and then analyzes the types of political coalitions that emerge. This system, known as DW-NOMINATE, lets you measure the degree of party polarization precisely. When Democrats all vote one way and Republicans all vote the other way, politics is highly polarized. When votes frequently scramble the
parties, it is less polarized. What this research shows is that the steady march toward polarization over the past generation is a return to a situation that existed during an earlier period. The story here, like so much in American politics, is race. Southern Democrats had a range of views on non-racial issues but monolithically
supported white supremacy and held together in the Democratic Party to maximize their leverage in Congress. The result was that the Democratic Party included Northern liberals who supported civil rights and Southern conservatives who supported segregation. So polarization temporarily went away in Congress. But as
segregation receded as an issue in American politics, the parties slowly but surely sorted themselves by ideology, and so today, there is no Republican in Congress more liberal than the most conservative Democrat, or vice-versa. American politics has re-polarized. According to Bernstein, this change may be discomfiting but it's
nothing to worry about. American politics has been polarized before and it was fine. What this story of reversion misses is the crucial role of ideology. Polarization and ideology are clearly related concepts, but simply counting congressional votes doesn't really tell us what those votes were about. Georgetown University
Professor Hans Noel greatly improved our understanding of the relationship between the two by extending the DW-NOMINATE methodology to people who aren't elected officials. For his book Political Parties and Political Ideologies in America, Noel constructs ideological space scores for writers and political pundits — people
who address the same issues as elected officials but who are not serving on Capitol Hill. What he found is that while Gilded Age members of Congress voted in a highly partisan way, their voting didn't reflect any polarization of ideas evident in broader American society. As Charles Calhoun, a leading scholar of Gilded Age politics
has written, the main concern of actual members of Congress was not policy, but "patronage power, the privilege of placing one's political friends and supporters in in subordinate offices." In other words, a member of Congress would get to distribute federal jobs and contracts to his supporters and in exchange the beneficiaries
of his patronage would support his party's ticket at all levels. For this reason, the obscure-sounding job of customs collector of the Port of New York was important enough in the 1870s that Chester A. Arthur leapt from it to the Vice Presidency. The first real filibuster was held over Whig efforts to assign a printing contract to
friendly companies. "Since the president and Congress are elected by the people, they can both claim to speak for the people" Even though party discipline was strict in these days, it was not really about much beyond who held the spoils. Over the course of the 1920s, 1930s, and 1940s the rise of progressi ve and liberal ideology
and the formation of a conservative ideology to counter it upended this system. So much so that by the 1970s it had become common to observe that American political parties were in decline. University of California Irvine political scientist Martin Wattenberg achieved the apogee of this literature with his 1985 classic The
Decline of Political Parties in America (since updated in five subsequent editions), citing the waning influence of party professionals, the rise of single-issue pressure groups, and an attendant fall in voter turnout. But as historian Sam Rosenfeld writes, under-the-hood changes in the process for selecting presidential nominees and
Congressional leaders "ultimately helped to create a newly receptive institutional setting for issue-based activism within the parties," leading to the parties' reconstitution around modern ideological lines. Today's partisan polarization, in other words, is not the same as its Gilded Age predecessor. The old polarization was about
control over jobs and money — the kind of thing where split-the-difference compromises are easiest. That polarization was eventually undermined by a new politics built around principles. For decades, politicians found themselves cross-pressured between their commitments to a national party network and to various
ideological causes. Today, however, politicians are no longer cross-pressured. We have strong Gilded Age-style parties, but organized around questions of principle rather than questions of patronage. You can take this theory too far, of course. There have been moments in American life where questions of principle sharply split
American politics. We had ideological parties (or at least one) in the 1850s when the anti-slavery Republican Party rose to the fore. But the example is not enormously encouraging — the constitutional process collapsed and we had four years of civil war, hundreds of thousands of deaths, and then, even after a Union victory,
white supremacy was re-established in the South through a two-decade campaign of terrorism. The Honduras scenario Not all breakdowns of constitutional processes are as violent as the American Civil War. For a less catastrophic, more realistic view of the kind of thing that could happen here, it's useful to look to some lessfamiliar but more-recent events in Honduras. Back in late 2008, left-wing President Manuel Zelaya was locked in persistent conflict with an opposition-controlled congress. With neither side able to prevail within the context of the existing system, Zelaya decided he wanted to add a fourth question to the upcoming November
2009 election. In addition to voting for president, congress, and municipal offices, Zelaya would ask the voters whether they wanted to hold a constituent assembly to re-write the constitution — presumably to allow him to run for re-election. Unfortunately for Zelaya, Honduras' existing constitution made no provision for rewriting the constitution by plebiscite. Consequently, in March 2009, Zelaya determined that the solution was to hold another plebiscite. On June 28, Hondurans would go to the polls to vote in a non-binding referendum on whether the constitutional question should be added to the November ballot. This, he hoped, would give
him the democratic legitimacy needed to go forward with the constitutional revision. Zelaya's opponents in congress, evidently concerned that the president would win, sued. They won a court case enjoining the president against holding the referendum. Zelaya pressed ahead regardless. In Honduras, the military typically assists
with election logistics, so Zelaya ordered the army to begin distributing ballots. General Romeo Vásquez Velásquez, the chief the Honduran military, refused to comply. On May 24, Zelaya fired the general. Several other commanders quit in solidarity. The Supreme Court ruled that the dismissal was unconstitutional. Throughout
June, the constitutional process essentially broke down with protests and counter-protests dominating the capital. On June 28, the military deposed Zelaya in a coup, retroactively justified by a back-dated Supreme Court ruling. Roberto Micheletti, the president of the National Congress, was installed in his stead. Manuel Zelaya
addresses his supporters after his ouster from office. (Alfredo Estrella/AFP/Getty Images) The military quickly handed power over to a new group of civilians. The coup was legitimated by the National Congress and the Supreme Court. And its perpetrators argued with some justification that there was no constitutional
alternative. Zelaya was trying to circumvent the rules, so they had no choice but to circumvent them too in response. The deadlock was ultimately resolved by force rather than legal procedure. Zelaya did not have enough support to amend the constitution through the existing process, and Honduras' constitutional system
created no legal mechanism for impeachment of a president. The Supreme Court arbitrarily ruled that Zelaya's effort to circumvent the amendment process via referendum was illegal, while Congress' effort to circumvent the impeachment process was fine. There were quite a few injuries as protesters clashed with security
forces, but no massive bloodshed. Honduras' coup is worth paying attention to not because the exact same scenario is likely to play out in the United States, but because it reveals how genuinely difficult it is to maintain constitutional politics in a presidential system. Presidents feel themselves to be accountable for steering the
nation. And all the evidence indicates that the public and the media do in fact hold presidents broadly accountable for national outcomes. Throughout the United States' 2012 presidential campaign, for example, it was universally assumed that good news for the American economy (or for America more broadly) would redound
to Barack Obama's benefit even though control of policymaking was split between the White House and a GOP-dominated Congress. As Obama put it in a November 2014 press conference, "people are going to ask for greater accountability and more responsibility from me than from anybody else in this town." The problem is
the president is not only held accountable for things that are in part outside his ability to control (gas prices, Ebola, or shark attacks) but for things that are actually under the control of his political adversaries. "I'm the guy who's elected by everybody," concluded Obama, "and they want me to push hard to close some of these
divisions, break through some of the gridlock, and get stuff done." If you're going to be held accountable for outcomes, in other words, then you'd better act. In a parliamentary system, this is simply democratic accountability in action. A head of government who strongly believes the nation needs actions the legislature won't
Constitutional hardball The United States, of
course, is a long way from a coup. What we are witnessing instead is a rise in what Georgetown University
Professor Mark Tushnet labeled "constitutional hardball" in a 2004 article. Constitutional hardball describes
legal and political moves "that are without much question within the bounds of existing constitutional
doctrine and practice but that are nonetheless in some tension with existing pre-constitutional
understanding." In other words, moves that do not violate the letter of the law, but do trample on our
conventional understanding of how it is supposed to work. Tushnet's article is vital reading today in part because the different
approve can dissolve parliament and hold a new election to decide the issue. In Honduras' presidential system, the very act of trying to schedule a vote to resolve the deadlock was itself unconstitutional.
partisan context in which it was written can help shock people out of their entrenched positions. His lead example is from the George W. Bush administration, when
liberals were concerned about the president taking power away from Congress. Tushnet describes the "strained" argument offered by Republican senators in 2005
that Democratic Party filibusters of Bush's judicial nominees violated the constitution. At the time, of course, Democrats found the view that Republicans might
simply ban the use of filibusters for this purpose outrageous. "The filibuster serves as a check on power," said Harry Reid, "that preserves our limited government."
Joe Biden called the Republicans' attempt to end the fillibuster "an example of the arrogance of power." But ultimately the hardball tactic for ending filibusters was
used by Democrats in 2013 to halt Republican obstruction of Obama's nominees. Republicans, Reid said, "have done everything they can to deny the fact that
Obama had been elected and then reelected." He argued he had no choice but to abandon a principle that just a few years ago he said was crucial to preserving
American liberty. Meanwhile, Republicans who had supported the 2005 effort to weaken the filibuster executed a perfect flip-flop in the other direction. Tushnet's
other example from the mid-2000s — Texas' decision to redraw congressional district boundaries to advantage Republicans between censuses — seems almost
adorably quaint by the standards of the Obama era. From its very first months, Obama's
presidency has been marked by essentially
nothing but constitutional hardball. During the Bush years, Democratic senators sporadically employed a variety of unusual delaying tactics to
stymie his agenda. In 2009, Mitch McConnell and Senate Republicans retaliated by using tons of them, constantly. Suddenly filibustering went from something a
Senate minority could do to something it did on pretty much all motions. George Washington University congressional scholar Sarah Binder observes that "leaders
in the 1970s rarely felt compelled to file for cloture [to break filibusters], averaging fewer than one per month in some years" while in recent years Reid has filed
over once per week. As Jim Manley, a former aid to the Democratic Senate leadership, explained to The Atlantic, the obstruction not only prevented many of
Obama's more controversial measures from becoming law; it also drastically altered the process of even routine governance. Say you want to break a filibuster. On
Monday, you file cloture on a motion to proceed for a vote on Wednesday. Assuming you get it, your opponents are allowed 30 hours of debate post-cloture on the
motion to proceed. That takes you to Friday, and doesn't cover amendments. The following Monday you file cloture on the bill itself, vote Wednesday, then 30
more hours of debate, and suddenly two weeks have gone by, for something that's not even controversial. As a political strategy, McConnell's tactics were
vindicated by the 2010 midterms, which showed that making the president look partisan, clumsy, and inept was a winning strategy. Republicans in Congress
subsequently moved beyond unusual acts of obstruction to an unprecedented use of the statutory debt ceiling into a vehicle for policymaking. Traditionally a bit of
oddball American political theater immortalized in a funny West Wing scene, in 2011 the GOP threatened to provoke an unfathomable financial and constitutional
crisis unless the Obama administration agreed to sweeping spending cuts. Again, there was nothing illegal about what Republicans in Congress did here — it was
just, in its intent and its scope, unprecedented. And it's fairly clear that these actions, while consistent with Republican Party electoral success, have not exactly
produced a well-respected legislature. Congressional approval ratings are so low — and have been for so long — that it's become a subject of pollster humor. In
2013, Public Policy Polling found that congress was less popular than Genghis Khan, traffic jams, cockroaches, or Nickelback. In a less joking spirit, Gallup finds that
the voters have less confidence in Congress than any other American institution, including big business, organized labor, banks, or television news. As relations with
Congress have worsened, the Obama administration has
set about expanding executive authority over domestic policy to
match Bush-era unilateralism in the national security domain. This came to the fore most publicly with Obama's decision to
protect millions of unauthorized migrants from deportation without congressional agreement. "The practical issue would be not so much what is legal, but what
people would actually tolerate" As Vox's Andrew Prokop has argued, the pattern is actually much broader. Obama's handling of K-12 education policy is in some
ways an even more paradigmatic example of constitutional hardball. The George W. Bush-era education law No Child Left Behind laid out penalties for state
education systems that didn't meet certain, rather unrealistic, targets. The law's authors assumed that when the law came up for reauthorization, the targets would
be changed. In case Congress didn't act in time, the Secretary of Education also had the authority to issue waivers of the penalties. Since Congress no longer really
functions, there has been no reauthorization of the law. So the Obama administration has issued waivers — but only to states that implement policy changes
ordered by the Department of Education. University of Chicago political scientist William Howell told Prokop this was a "new frontier" for executive policymaking.
Yale Law School's Bruce Ackerman says Obama used "a waiver provision for modest experiments and transformed it into a platform for the redesign of the statute."
Obama's actions are clearly legal — but they are just as clearly a decision to creatively exploit the letter of the law to vastly expand the scope of executive power
over the law. Those who like these actions on their merits comfort themselves with the thought that these uses of executive power are pretty clearly allowed by the
terms of the existing laws. This is true as far as it goes. But it's also the case that Obama (or some future president) could have his political opponents murdered on
the streets of Washington and then issue pardons to the perpetrators. This would be considerably more legal than a Zelaya-style effort to use a plebiscite to
circumvent congressional obstruction — just a lot more morally outrageous. In either case, however, the practical issue would be not so much what is legal, but
what people, including the people with guns, would actually tolerate. Raising the stakes America's escalating game of constitutional hardball isn't caused by
personal idiosyncratic failings of individual people. Obama has made his share of mistakes, but the
fundamental causes of hardball politics
are structural, not personal. Personality-minded journalists often argue that a warmer executive would
do a better job of building bridges to congress. But as Duke University's Brendan Nyhan points out, "Bill
Clinton's more successful outreach to his opponents didn't keep him from getting impeached. Likewise,
George W. Bush was more gregarious than Obama, but it didn't make him any more popular among
Democrats once the post-9/11 glow had worn off."
There's a reason for this, and it gets to the core of who really runs American politics. In a democratic society, elected officials are most directly accountable to the people
who support them. And the people who support them are different than the people who don't care enough about politics to pay much attention, or the people who support the other side. They are more ideological, more partisan, and they want to see the policies they support passed into law. A leader who abandons his core
supporters because what they want him to do won't be popular with most voters is likely, in modern American politics, to be destroyed in the next primary election. The amateur ideological activists who eroded the power of the party professionals in the 1970s are now running the show. While Gilded Age activists traded
support for patronage jobs, modern-day activists demand policy results in exchange for support. Presidents need to do everything within their legal ability to deliver the results that their supporters expect, and their opponents in Congress need to do everything possible to stop them. At one point, Republican congressional
leaders were highly amenable to passing an immigration reform bill and the Obama administration insisted it had no means of circumventing the legislative process. But under pressure from their respective bases, Republicans found it impossible to compromise and Obama decided he had better find a way to go around
Congress. It is true that the mass public is not nearly as ideological as members of Congress. But the mass public is not necessarily active in democratic politics, either. Emory's Alan Abramowitz finds that "the American public has become more consistent and polarized in its policy preferences over the past several decades." He
also writes that "this increase in consistency and polarization has been concentrated among the most politically engaged citizens." This rise in ideological activism has a number of genuinely positive impacts. It makes politics less corrupt. The least-polarized state legislatures in America are in places like Rhode Island and
Louisiana, bastions of corruption rather than good government. It's not a coincidence that the Tea Party surge led to the end of earmarked appropriations. But it heightened executive-legislative conflict and leads to what Linz termed "the zero-sum character of presidential elections." Bush and Gore shake hands in December
2000, after their remarkably orderly contested election was resolved. (Tannen Maury/AFP/Getty Images) Looking back at Bush's election in 2000, one of the most remarkable things is how little social disorder there was. The American public wanted Al Gore to be president, but a combination of the Electoral College rules, poor
ballot design in Palm Beach County, and an adverse Supreme Court ruling, put Bush in office. The general presumption among elites at the time was that Democrats should accept this with good manners, and Bush would respond to the weak mandate with moderate, consensus-oriented governance. This was not in the cards.
Not because of Bush's personal qualities (if anything, the Bush family and its circle are standard-bearers for the cause of relative moderation in the GOP), but because the era of the "partisan presidency" demands that the president try to implement the party's agenda, regardless of circumstances. That's how we got drastic tax
cuts in 2001. If the Bush years shattered the illusion that there's no difference between the parties, the Obama years underscore how much control of the White House matters in an era of gridlock. The broadly worded Clean Air Act, whose relevant provisions passed in 1970, has allowed Obama to be one of the most
consequential environmental regulators of all time — even though he hasn't been able to pass a major new environmental bill. He's deployed executive discretion over immigration enforcement on an unprecedented scale. And he's left a legacy that could be rapidly reversed. A future Republican administration could not only
turn back these executive actions, but substantially erode the Affordable Care Act. The lessons of the 2000 and 2008 elections make it unnerving to imagine a Bush-Gore style recount occurring in 2014's political atmosphere. The stakes of presidential elections are sky-high. And the constitutional system provides no means for a
compromise solution. There can be only one president. And once he's in office he has little reason to show restraint in the ambitions of the legislative — or non-legislative — agenda he pursues. In the event of another disputed election, it would be natural for both sides to push for victory with every legal or extra-legal means at
their disposal. Indeed, we ought to consider possibilities more disastrous than a repeat of the 2000 vote. What if a disputed presidential election coincided with a Supreme Court vacancy? What if the simultaneous deaths of the president and vice president brought to power a House Speaker from the opposite party? What if
neither party secured a majority of electoral votes and a presidential election wound up being decided by a vote of the lame duck House of Representatives? What if highly partisan state legislatures start using their constitutional authority to rig the presidential contest? A system of undisciplined or non-ideological political
parties has many flaws, but it is at least robust to a variety of shocks. Our current party alignment makes for a much more brittle situation, in which one of any number of crises where democratic norms and constitutional procedures diverge could bring us to a state of emergency. A flawed system The idea that America's
reality is that despite its durability, it has rarely functioned well
by the standards of a modern democracy. The party system of the Gilded Age operated through systematic corruption. The less polarized era
constitutional system might be fundamentally flawed cuts deeply against the grain of our political culture.
But the
that followed was built on the systematic disenfranchisement of African-Americans. The newer system of more ideological politics has solved those problems and
seems in many ways more attractive. But over the past 25 years, it's set America on a course of paralysis and crisis — government shutdowns, impeachment, debt
ceiling crises, and constitutional hardball. Voters, understandably, are increasingly dissatisfied with the results and confidence in American institutions has been
generally low and falling. But rather
than leading to change, the dissatisfaction has tended to yield wild electoral
swings that exacerbate the sense of permanent crisis. "The best we can hope for is that when the crisis does come, Americans will
put a better system in place" As dysfunctional as American government may seem today, we've actually been
lucky. No other presidential system has gone as long as ours without a major breakdown of the
constitutional order. But the factors underlying that stability — first non-ideological parties and then non-disciplined ones —
are gone. And it's worth considering the possibility that with them, so too has gone the American exception to the rule of presidential breakdown. If we seem
to be unsustainably lurching from crisis to crisis, it's because we are unsustainably lurching from crisis to crisis. The breakdown may not
be next year or even in the next five years, but over the next 20 or 30 years, will we really be able to resolve every one of these high-stakes showdowns without
making any major mistakes? Do you really trust Congress that much? The best we can hope for is that when the crisis does come, Americans will have the wisdom
to do for ourselves what we did in the past for Germany and Japan and put a better system in place.
Democratic liberalism is backsliding now---the US model of an unrestrained executive
causes collapse
Larry Diamond 9, Professor of Political Science and Sociology @ Stanford, “The Impact of the Global
Financial Crisis on Democracy”, Presented to the SAIS-CGD Conference on New Ideas in Development
after the Financial Crisis, Conference Paper that can be found on his Vita
Concern about the future of democracy is further warranted by the gathering signs of a democratic
recession, even before the onset of the global economic recession. During the past decade, the global expansion of
democracy has essentially leveled off and hit an equilibrium While freedom (political rights and civil liberties) continued to expand
throughout the post-Cold War era, that progress also halted in 2006, and 2007 and 2008 were the worst consecutive years for freedom since the end of the Cold
War, with the number of countries declining in freedom greatly outstripping the number that improved. Two-thirds
of all the breakdowns of
democracy since the third wave began in 1974 have occurred in the last nine years, and in a number of
strategically important states like Russia, Nigeria, Venezuela, Pakistan and Thailand. Many of these countries have
not really returned to democracy. And a number of countries linger in a twilight zone between democracy and
authoritarianism. While normative support for democracy has grown around the world, it remains in
many countries, tentative and uneven, or is even eroding under the weight of growing public cynicism about corruption and the
self-interested behavior of parties and politicians. Only about half of the public, on average, in Africa and Asia meets a rigorous, multidimensional test of support for
democracy. Levels of distrust for political institutions—particularly political parties and legislatures, and politicians in general—are very high in Eastern Europe and
Latin America, and in parts of Asia. In
many countries, 30-50 percent of the public or more is willing to consider some
authoritarian alternative to democracy, such as military or one-man rule. And where governance is bad or elections are rigged and the public
cannot rotate leaders out of power, skepticism and defection from democracy grow. Of the roughly 80 new democracies that have emerged
during the third wave and are still standing, probably close to three-quarters are insecure and could run some risk of
reversal during adverse global and domestic circumstances. Less at risk—and probably mostly consolidated—are the more established
developing country democracies (India, Costa Rica, Botswana, Mauritius), and the more liberal democracies of this group: the ten postcommunist states that have
been admitted to the EU; Korea and Taiwan; Chile, Uruguay, Panama, Brazil, probably Argentina; a number of liberal island states in the Caribbean and Pacific.
This leaves about 50 democracies and near democracies—including such big and strategically important
states as Turkey, Ukraine, Indonesia, the Philippines, South Africa, certainly Pakistan and Bangladesh,
and possibly even Mexico—where the survival of constitutional rule cannot be taken for granted. In some of
these countries, like South Africa, the demise of democracy would probably come, if it happened, not as a result of a blatant
overthrow of the current system, but rather via a gradual executive strangling of political pluralism and freedom, or
a steady decline in state capacity and political order due to rising criminal and ethnic violence. Such circumstances would also swallow
whatever hopes exist for the emergence of genuine democracy in countries like Iraq and Afghanistan
and for the effective restoration of democracy in countries like Thailand and Nepal.
Checks Solve Democratic Transitions
Democratic transitions are hanging in the balance---only empowering checks on
executive power through rule of law can tip the scales
CJA 4 The Center for Justice and Accountability, Amici Curiae in support of petitioners in Al Odah et al. v
USA, "Brief of the Center for Justice and Accountability, the International League for Human Rights, and
Individual Advocates for the Independence of the Judiciary in Emerging Democracies," 3-10, Lexis
Many of the newly independent governments that have proliferated over the past five decades have
adopted these ideals. They have emerged from a variety of less-than-free contexts, including the end of European colonial rule in the 1950's and 1960's, the end of the Cold War
and the breakup of the former Soviet Union in the late 1980's and 1990's, the disintegration of Yugoslavia, and the continuing turmoil in parts of Africa, Latin America and southern Asia.
Some countries have successfully transitioned to stable and democratic forms of government that protect
individual freedoms and human rights by means of judicial review by a strong and independent judiciary. Others have suffered the rise of
tyrannical and oppressive rulers who consolidated their hold on power in part by diminishing or abolishing the role of the judiciary. And still others
hang in the balance, struggling against the onslaught of tyrants to establish stable, democratic
governments. In their attempts to shed their tyrannical pasts and to ensure the protection of individual
rights, emerging democracies have consistently looked to the United States and its Constitution in
fashioning frameworks that safeguard the independence of their judiciaries . See Ran Hirschl, The Political Origins of Judicial Empowerment
through Constitutionalization: Lessons from Four Constitutional Revolutions, 25 Law & Soc. Inquiry 91, 92 (2000) (stating that of the “[m]any countries . . . [that] have engaged in fundamental
Establishing judicial review
by a strong and independent judiciary is a critical step in stabilizing and protecting these new
democracies. See Christopher M. Larkins, Judicial Independence and Democratization: A Theoretical and Conceptual Analysis, 44 Am. J. Comp. L. 605, 605-06 (1996) (describing the
constitutional reform over the past three decades,” nearly all adopted “a bill of rights and establishe[d] some form of active judicial review”).
judicial branch as having "a uniquely important role" in transitional countries, not only to "mediate conflicts between political actors but also [to] prevent the arbitrary exercise of government
power; see also Daniel C. Prefontaine and Joanne Lee, The Rule of Law and the Independence of the Judiciary, International Centre for Criminal Law Reform and Criminal Justice Policy (1998)
countries in transition from
dictatorships and/or statist economies recognize the need to create a more stable system of governance, based on the
rule of law."), available at http://www.icclr.law.ubc.ca/Publications/Reports/RuleofLaw. pdf (last visited Jan. 8, 2004). Although the precise form of government differs among
("There is increasing acknowledgment that an independent judiciary is the key to upholding the rule of law in a free society . . . . Most
countries, “they ultimately constitute variations within, not from, the American model of constitutionalism . . . [a] specific set of fundamental rights and liberties has the status of supreme law,
is entrenched against amendment or repeal . . . and is enforced by an independent court . . . .” Stephen Gardbaum, The New Commonwealth Model of Constitutionalism, 49 Am. J. Comp. L.
707, 718 (2001). This phenomenon became most notable worldwide after World War II when certain countries, such as Germany, Italy, and Japan, embraced independent judiciaries following
their bitter experiences under totalitarian regimes. See id. at 714- 15; see also United States v. Then, 56 F.3d 464, 469 (2d Cir. 1995) (Calabresi, J., concurring) (“Since World War II, many
countries have adopted forms of judicial review, which — though different from ours in many particulars — unmistakably draw their origin and inspiration from American constitutional theory
It is a trend that continues to this
day. It bears mention that the United States has consistently affirmed and encouraged the establishment of
independent judiciaries in emerging democracies. In September 2000, President Clinton observed that "[w]ithout the rule of law,
elections simply offer a choice of dictators. . . . America's experience should be put to use to advance
the rule of law, where democracy's roots are looking for room and strength to grow." Remarks at Georgetown University Law School, 36 Weekly Comp. Pres. Doc. 2218
(September 26, 2000), available at http://clinton6.nara.gov/2000/09/2000-09-26- remarks-by-president-at-georgetown-international-lawcenter. html. The United States acts on
these principles in part through the assistance it provides to developing nations. For example, the United States requires that any country seeking assistance through the
and practice. See generally Mauro Cappelletti, The Judicial Process in Comparative Perspective (Oxford: Clarendon Press, 1989).”).
Millenium Challenge Account, a development assistance program instituted in 2002, must demonstrate, among other criteria, an "adherence to the rule of law." The White House noted that
the rule of law is one of the "essential conditions for successful development" of these countries. See
http://www.whitehouse.gov/infocus/developingnations (last visited Jan. 8, 2004).12
US is key- Signals other Demos
Violation of separation of powers undermines US security decisions by signaling lack
of robust support and legitimacy
Louis Fisher in 2009 is a specialist in constitutional issues with the Law Library of the Library of
Congress, Presidential Studies Quarterly 39, no. 2 (June), Presidential Power in National Security: A
Guide to the President-Elect
Respect for the Constitution and joint action with Congress provide the strongest possible signal to
both enemies and allies. By following those principles, other countries understand that U.S. policy has a broad
base of support and is not the result of temporary, unilateral presidential actions that divide the
country and are likely to be reversed. National security is strengthened when presidents act in concert
with other branches and remain faithful to constitutional principles. In periods of emergency and
threats to national security (perceived or real), the rule of law has often taken a backseat to presidential
initiatives and abuses. Although this pattern is a conspicuous part of American history, it is not necessary to repeat the same mistakes
every time. Faced with genuine emergencies, there are legitimate methods of executive action that are
consistent with constitutional values. There are good precedents from the past and a number of bad
ones. In response to the 9/11 terrorist attacks, the United States largely decided to adopt the bad ones.
The responsibility for this damage to the Constitution lies primarily with the executive branch, but illegal and
unconstitutional actions cannot occur and persist without an acquiescent Congress and a compliant judiciary. The Constitution’s
design, relying on checks and balances and the system of separation of powers, was repeatedly ignored
after 9/11. There are several reasons for these constitutional violations. Understanding them is an essential first step in
returning to, and safeguarding, the rule of law and constitutional government.
Demo !- War
Consensus of experts agree that democracies reduce militarized conflict- it outweighs
alternate causes
Allan Dafoe in 2011, is a Ph.D. candidate in the Travers Department of Political Science @ Berkeley,
Statistical Critiques of the Democratic Peace: Caveat Emptor, American Journal of Political Science, Vol.
55, No. 2, April 2011, Pp. 247–262
The “democratic peace”—the inference that democracies rarely fight each other—is one of the most
important and empirically robust findings in international relations (IR).1 The apparent empirical association2
between joint democracy3 and peace has been debated and challenged since its first discovery by political scientists to the present (Gartzke
2007). Scholars have argued that this empirical association is in fact a product of other confounding factors, such as Cold War alliances (Farber
and Gowa 1997; Gowa 1999), satisfaction with the regional status quo (Kacowicz 1995), shared foreign policy interests (Gartzke 1998, 2000),
unmeasured factors such as dyad-specific effects (Green, Kim, and Yoon 2001), stable borders (Gibler 2007), and capital openness and
development (Gartzke 2007; Gartzke and Hewitt 2010). Despite the
large number of serious challenges, most current
quantitative analyses continue to find a substantial, robust, and statistically significant association
between joint democracy and the absence of militarized conflict. This article will analyze a recent challenge to the
democratic peace (Gartzke 2007), situate it in the context of other statistical challenges to the democratic peace, and show that the democratic
peace persists as a compelling finding. In so doing, this article also identifies new features of the democratic peace. It is important to be clear
about what this empirical association implies about international politics. Despite the robustness of this result to different model specifications,
this observational finding by itself does not prove that it is characteristics of democracies—such as regular
competitive elections, constraints on the executive, liberal norms, or civil rights—that make these countries more peaceful
toward each other. Even less does it prove that the forceful spread of democracy in particular regions of the world will reduce the
frequency or severity of wars. Justifying causal claims such as these exclusively using analyses of observational data requires the leverage of
strong assumptions. It is for this reason that there is less agreement about the actual causal mechanisms of the democratic peace than that
around the underlying explanandum. Scholars have proposed that the democratic peace arises because of shared norms (Maoz and Russett
1993), restraint on democratic leaders (Bueno de Mesquita et al. 1999), more credible communication through transparency (Schultz 1998) or
domestic audience costs (Fearon 1994; Tomz 2007; Weeks 2008), greater capacity to reach stable bargains (Lipson 2003), and other possible
causal pathways. On the other hand, it may not be a “democratic” characteristic at all that accounts for the peace, but some other co-occurring
or preceding factor, such as shared strategic circumstances, shared political systems, capitalism, prosperity, liberal economic norms, or other
factors.
Nonetheless, the democracy-peace empirical association remains of paramount importance
because, despite our best attempts to “control for” other possible correlates of this peace, the fact
that two countries are democratic remains strongly associated with them having peaceful relations.
Furthermore, under relatively modest assumptions this apparently peaceful proclivity seems unlikely to
have arisen by chance (that is, the finding is “statistically significant”). This empirical association is foundational to a vast
literature testing, refining, and extending theories about the apparent relationship between regime type and peace. Thus it matters greatly
whether this association is robust to potential confounders (for reviews of this literature, see George and Bennett 2004; Ray 1995).
Alt causes can’t explain it- the establishment of democracies is uniquely responsible
for decreasing global conflict
Allan Dafoe in 2011, is a Ph.D. candidate in the Travers Department of Political Science @ Berkeley,
Statistical Critiques of the Democratic Peace: Caveat Emptor, American Journal of Political Science, Vol.
55, No. 2, April 2011, Pp. 247–262
A venerable lineage of scholars and thinkers have advanced arguments related to the democratic peace,
including Georg Wilhelm Friedrich Hegel, Immanuel Kant, and Woodrow Wilson (Ray 1995, 4–6; Kant [1795] 1969). Scholars have
proposed and tested a variety of propositions, such as whether democracies are less violent toward their own citizens
(Rummel 1983) or against all other states (Rousseau et al. 1996). However, by far the most well-established proposition is
that democracies are less likely to engage in violent conflict with each other. It is this apparent
empirical association between democratic dyads and peace that makes up the foundation of the
democratic peace research program. The dyadic democratic peace has faced many challenges, most of which
can be categorized as either (1) raising concerns of potential confounding or (2) questioning the independence of the data and hence the
statistical significance of results. Concerns about the possibility of confounding have been present in the earliest works on the democratic
peace. Scholars
have sought to control for the possibility that the democratic peace is a spurious
association driven by factors such as contiguity and distance, economic growth and wealth, the balance of military
capabilities, alliance ties, and political stability. The most prominent criticism of confounding is that the democratic peace is a spurious
association arising from underlying realist factors, such as alliance structures, the Cold War, or other shared foreign policy interests (Farber and
Gowa 1995; Gowa 1999). However,
the introduction ofcontrol variables for all of these potential confounders
into regression analyses has on the whole failed to remove the significant association between dyadic
democracy and peace (Gartzke 1998, 2000; Kacowicz 1995; Lemke and Reed 1996; Maoz and Abdolali 1989; Maoz and Russett 1993;
Oneal and Russett 1999b; Ray 1995; Rousseau et al. 1996; Russett 1993; Russett and Oneal 2001; Russett, Oneal, and Davis 1998; Signorino and
Ritter 1999; Small and Singer 1976; Thompson and Tucker 1997). A more recent lineage of challenges emphasizing omitted confounders, closely
related to Gartzke’s (2007) critique, develops the argument that economic processes, such as the rise of commercial liberalism or increases in
economic interdependence, are responsible for peaceful interstate relations, and that these factors correlate with or cause democracy. These
studies have presented persuasive evidence that measures of economic factors strongly associate with conflict dynamics, and even account for
some of the democratic peace. For example, Mousseau, Hegre, and Oneal (2003), building from Mousseau (2000), have shown that
economically developed dyads are less likely to engage in militarized disputes, and that the democratic peace is conditional on the level of
wealth in the dyad. More recently, Mousseau, using the per capita purchase of life insurance as a measure of the presence of a contractintensive economy (CIE), makes the stronger claim that “economic development, [particularly] contract-intensive development, appears to
account for [the democratic peace]” (2009, 53). This
stream of research has identified an important set of factors that
condition the democracy-peace association; however, contrary to the stronger claims made, this
literature does not as yet pose a fundamental statistical challenge to the democratic peace. Mousseau,
Hegre, and Oneal (2003, 297) note that the interaction between regime type and wealth only renders the democracypeace association
insignificant for the poorest democratic countries. In their sample, this includes only 9% of the democratic dyads (Democracy > 6), and they
note that by 1992 all democratic dyads are above this wealth threshold. Mousseau (2009) reports that the democratic peace is no longer
significant when both dyads lack contractintensive economies (oneCIE = 0). However, as Russett (2010) also points out, only 26% of the
democratic dyads in Mousseau’s sample have no CIEs; for the other 74% of the democratic dyads Mousseau’s analyses find a significant
association between democracy and peace. Thus, while Mousseau (2009) and related research have identified an important conditioning factor
of the democratic peace, as with the realist critiques this set of work has not yet provided a compelling operationalization of a confounding
factor that explains away the democratic peace.5
Demo !- War/Economy
Democracies are the best form of government; promote peace and economic
prosperity
Lagon, 2011-- Adjunct Senior Fellow for Human RightsLagon, Mark P. "Promoting Democracy: The Whys and Hows for the
United States and the International Community." Council on Foreign Relations. Council on Foreign Relations, Nov. 2011. Web. 31 May 2015.
Stakes in Democracy Furthering democracy is often dismissed as moralism distinct from U.S. interests or mere lip service to build support for
strategic policies. Yet there
are tangible stakes for the United States and indeed the world in the spread of
democracy—namely, greater peace, prosperity, and pluralism. Controversial means for promoting
democracy and frequent mismatches between deeds and words have clouded appreciation of this truth.
Democracies often have conflicting priorities, and democracy promotion is not a panacea. Yet one of the few truly robust findings in
international relations is that established democracies never go to war with one another. Foreign policy
“realists” advocate working with other governments on the basis of interests, irrespective of character, and suggest that this approach best
preserves stability in the world. However, durable stability flows from a domestic politics built on consensus and peaceful competition, which
more often than not promotes similar international conduct for governments. There has long been controversy about whether democracy
enhances economic development. The dramatic growth of China certainly challenges this notion. Still, history will likely show
that
democracy yields the most prosperity. Notwithstanding the global financial turbulence of the past three years, democracy’s
elements facilitate long-term economic growth. These elements include above all freedom of expression and learning to
promote innovation, and rule of law to foster predictability for investors and stop corruption from stunting growth. It is for that reason
that the UN Development Programme (UNDP) and the 2002 UN Financing for Development Conference in Monterey, Mexico,
embraced good governance as the enabler of development. These elements have unleashed new emerging powers
such as India and Brazil and raised the quality of life for impoverished peoples. Those who argue that economic development will eventually
yield political freedoms may be reversing the order of influences—or at least discounting the reciprocal relationship between political and
economic liberalization. Finally,
democracy affords all groups equal access to justice—and equal opportunity
to shine as assets in a country’s economy. Democracy’s support for pluralism prevents human assets—including religious and
ethnic minorities, women, and migrants—from being squandered. Indeed, a shortage of economic opportunities and outlets for grievances has
contributed significantly to the ongoing upheaval in the Middle East. Pluralism is also precisely what is needed to stop violent extremism from
wreaking havoc on the world. Evolving U.S. Policy To say there are major interests in democracy’s “enlargement”—that central concept in both
national security strategy blueprints of the Clinton presidency—does not settle what role the United States should play and what policy tools
are appropriate. These are the questions not of why but of how. A look at waves of U.S. policy since World War II offers apt lessons. After
World War II, the United States played a significant role in deepening and widening democracy in Western
Europe. The United States encouraged European integration to stabilize the West European democracies, and NATO was
a bulwark within which Italy, West Germany, Portugal, and Spain democratized. Later, after the Cold War, the
twin institutions of NATO and an integrated Europe together created powerful incentives for emerging East European democracies to join
Western multilateral institutions.
Democracy !- Laundry List
Democracy preserves human life
Carnegie Commission on Preventing Deadly Conflict ‘95 (October, "Promoting Democracy in
the 1990's," http://wwics.si.edu/subsites/ccpdc/pubs/di/1.htm)
Nuclear, chemical, and biological weapons continue to proliferate. The very source of life on Earth, the
global ecosystem, appears increasingly endangered. Most of these new and unconventional threats
to security are associated with or aggravated by the weakness or absence of democracy, with its
provisions for legality, accountability, popular sovereignty, and openness. LESSONS OF THE
TWENTIETH CENTURY The experience of this century offers important lessons. Countries that govern
themselves in a truly democratic fashion do not go to war with one another. They do not aggress
against their neighbors to aggrandize themselves or glorify their leaders. Democratic governments do
not ethnically "cleanse" their own populations, and they are much less likely to face ethnic
insurgency. Democracies do not sponsor terrorism against one another. They do not build weapons
of mass destruction to use on or to threaten one another. Democratic countries form more reliable,
open, and enduring trading partnerships. In the long run they offer better and more stable climates
for investment. They are more environmentally responsible because they must answer to their own
citizens, who organize to protest the destruction of their environments. They are better bets to honor
international treaties since they value legal obligations and because their openness makes it much more
difficult to breach agreements in secret. Precisely because, within their own borders, they respect
competition, civil liberties, property rights, and the rule of law, democracies are the only
reliable foundation on which a new world order of international security and prosperity can be
built.
Democracy solves all impacts – empirical studies prove democratic governments
resolve conflicts peacefully
Ndulo, Professor of Law @ Cornell, 3(Muno Ndulo, Advocate of the Supreme Court of Zambia;
Professor, Cornell Law School; Director, Institute for African Development, Cornell University, 2003,
Indiana Journal of Global Legal Studies, Lexis)
A 1993 study of 233 internal conflicts around the world, concluded that democracies had a far better record of
peacefully managing such conflicts than alternative systems. 54 The empirical fact that democracies are far less likely to go to war
with each other than other regimes further substantiates the relationship between poverty and conflict, and their impact on the democratization process.
Authoritarian or totalitarian systems simply do not have the institutions by which conflicts in society can be
peacefully expressed and resolved. Dictatorships generally try to deal with conflicts by ignoring or denying them, or by
suppressing them using state coercive apparatus. While such methods may indeed control conflicts (albeit usually at a severe
cost), they [End Page 323] generally cannot resolve them. 56 The implication of fundamental issues such as identity and
cultural integrity in such conflicts means that almost nothing short of mass expulsions or genocide will make the conflicts disappear. It is generally believed
that the ethnic conflict that erupted in the former Yugoslavia in 1990, for example, had been suppressed for almost fifty years during the years of communism, but
was always present and unresolved. 57 An
authoritarian system can present an illusion of short-term stability through
its use of coercive state power to suppress dissent, but is unlikely to sustain that stability over the long
term. In contrast, it is argued that under a democracy, disputes that arise are likely to be processed, debated, and
reacted to, rather than resolved definitively and permanently. 58 In short, democracy operates as a conflict management
system. As Harris and Reilly have observed, it is this ability to handle conflicts without having to suppress them or be engulfed by them that distinguishes
democratic governance from authoritarian rule. 59 This does not by any means suggest that democracy is perfect, or that the mere establishment of democratic
governance will itself lead to the settlement or prevention of conflicts. There are a number of cases in which democratic institutions are hastily "transplanted" to
post-conflict societies without taking root or with a subsequent resumption of hostilities—as in the cases of Burundi, Cambodia and Liberia. 60 But it is equally true
that these cases offer many lessons as to how deals are struck and which choices are of crucial importance to building a sustainable outcome. 61 Democracy is often
messy and difficult, but it is also the best hope for building sustainable solutions to most conflicts in the world. However, democratic institutions have to be strong
enough to function effectively and fairly. They can only be strong where the economic conditions are such that they can be sustained.
Democracy Up
Democracy still resilient even in global economic crisis
David and Carothers ’10 Zachary Davis and Thomas Carothers, March 2010, “The Economic Crisis
and Democracy: a Year Later”, Carnegie Endowment for International Peace, Zachary Davis is a junior
fellow in the Democracy and Rule of Law Program at the Carnegie Endowment for International Peace.
Thomas Carothers is the vice president for studies at the Carnegie Endowment for International Peace.
http://carnegieendowment.org/files/2010-03-economy-democracy.pdf
When the global economic crisis erupted in late 2008, many observers expressed concern that it would
undermine global democracy. The Economist Intelligence Unit, for example, warned that the recession
could turn the “recent halt in democratization…into a retreat.”i And Larry Diamond wrote concerning
democracy that “thanks to the global economic crisis … things may get worse before it gets better.”ii
Now that a year has passed, what does the record show? Although the economic crisis has certainly
caused widespread economic suffering, it appears that democracies, even struggling ones, are
demonstrating more resilience to the crisis than many predicted. Democracies certainly did not avoid
political consequences of the economic downturn. Frustrated citizens voted out incumbents in more
than 35 percent of the elections in 2009, including long-term ruling parties in Iceland, Japan, and El
Salvador. Although it is difficult to prove definitively, it is likely that the crisis greatly contributed to
popular discontent with incumbents. Moreover, some countries experienced severe political crises
caused at least in part because of the global recession. In Latvia, massive street protests over the
government’s handling of the downturn forced the prime minister and several other government
officials to resign. Greece’s acute fiscal challenges have resulted in widespread public anger and distrust
of the government. Yet even in the nations hardest hit by the crisis, democratic institutions have
demonstrated resilience. Anger has largely been channeled to the ballot box. When it has spilled into
the streets, it has stayed within certain limits. Democracy did suffer reversals in several places in 2009.
In Honduras, accumulated tensions reflecting a deep polarization over basic political visions between
the executive and other parts of the political establishment resulted in a coup against President Manuel
Zelaya. Similarly, in Madagascar, the legally-elected president was unconstitutionally ousted by a
political rival who had gained the support of the army. And in Niger, President Tandja dissolved the
National Assembly and announced the assumption of 2 emergency powers in what was widely
suspected to be an attempt to illegally extend his rule. The economic crisis did not, however, appear to
play a direct or significant role in these political disputes, which instead were rooted in ideological or
personalistic factions. Why were democracies largely able to weather the storms of the global
recession? The most important factor explaining democratic resilience is the inherent nature of
democracies themselves. Despite their many imperfections, democratic systems provide citizens at least
some ability to express frustration peacefully through open debate and elections. This increases the
likelihood that citizens may continue to accept the political system as legitimate even when the
economic performance of the country suffers. Autocratic systems, on the other hand, may be more
vulnerable to recessions, at least when they have traditionally relied either on successful economic
performance or subsidies to the poor for legitimacy. When economic contraction occurs, popular
support for the regime can quickly fade. Without the release valve of democratic institutions,
autocracies are forced to quell unrest with increasingly heavy-handed tactics, often making the survival
of the regime ever more precarious. Yet like democracies, few autocracies have shown signs of systemic
vulnerability as a result of the current economic crisis. Iran has certainly experienced significant internal
unrest, but it appears to be more a result of electoral fraud and existing social tensions concerning the
nature of the Islamic Republic than because of the economic contraction, although economic friction
may have contributed to the impact. Tightening the screws on what political space does exist, and
employing other heightened methods of control, seems to be working so far for most autocracies. The
political stability of all types of political systems is somewhat surprising given the high degree of social
upheaval that occurred in the wake of the Great Depression in the 1930s. However, a number of factors
suggest why this crisis has been less politically disruptive than its predecessor. First, the crisis turned out
to be less severe than predicted. Partly due to swift and decisive government action in many nations,
the worst potential outcomes of the crisis were averted. It is possible that a more sustained and
substantial global economic recession would have overwhelmed the ability of many weak nations to
contain social unrest. Second, concerns that the discrediting of U.S-style capitalism would lead to a guiltby-association discrediting of democracy have proven unfounded. Indeed, despite early bluster,
alternatives to capitalism have not gained much traction. Many countries are trying to strengthen their
regulatory systems, but are not throwing out capitalism altogether. Third, many governments, including
fragile democracies, may have avoided some of the blame for the consequences of the crisis because of
its clear origin in the U.S. financial markets. With such a useful bogeyman, weak governments could
more ably dampen populist ire. Ultimately, it may be that one year is too early to accurately measure
the full effect of the economic crisis on global democracy. Many of the consequences of the crisis may
take longer to surface or are less immediately evident. Economic inequality and government corruption
tend to increase during recessions and both weaken the quality of and popular support for democracy.
The increased popular dissatisfaction with democracy in Eastern 3 Europe is an example of long-term
trouble the recession may inflict. In Ukraine, Hungary, and Bulgaria, for example, only 21 percent of the
population is satisfied with the way democracy is working in their country, with more than 70 percent in
each country naming corruption as a significant problem.iii despite such challenges, global democracy
has been less damaged than many would have predicted a year ago. Many fragile democracies will
continue to struggle to provide the economic growth and opportunity that citizen’s desire, but this
period of severe economic dislocation and suffering has not, so far at least, produced a negative political
tide.
Democracies survive financial crisisDiamond 11 Larry Diamond, January 2011, “The Impact of Economic Crisis; Why Democracies
Survive”, The Journal of Democracy, http://www.journalofdemocracy.org/article/impact-economiccrisis-why-democracies-survive
As an analysis of recent electoral results shows, the world’s emerging democracies are weathering the
global economic crisis surprisingly well. There are three main reasons behind democracy’s resilience
during the downturn. First, the countries hardest hit economically by the financial crisis have mostly
been the wealthy, industrialized democracies or the new European market economies, which are now
consolidated and deeply institutionalized. Second, in the newer and weaker democracies, the effect of
economic turbulence has been the defeat of democratically elected governments but not the demise of
democracy. And third, the breakdowns of democracy that have been occurring largely predate the onset
of the global recession and are due to bad internal governance, not unfavorable global conditions.
A2 Democracy Bad Examples
Democracy failed in the Middle East because of the ways it was implemented- not democracy itself
Lagon, 2011-- Adjunct Senior Fellow for Human Rights Lagon, Mark P. "Promoting Democracy: The
Whys and Hows for the United States and the International Community." Council on Foreign Relations.
Council on Foreign Relations, Nov. 2011. Web. 31 May 2015.
After 9/11, President George W. Bush elevated democratization in the Middle East as a strategic
priority. This apt aim, however, was undermined by several factors: the association of democracy
promotion with military intervention in Iraq (which did not yield democracy with ease); the use of harsh
counterterrorism measures that undercut the symbolism of freedom; the tendency to flinch when
likely winners of elections were worrisome (such as in the Palestinian territories); and the failure to meet
democracy rhetoric with action in places like Egypt and Pakistan.
Solvency
Solvency- Congressional Checks
Congress should require that seizures of personal records target specific suspects,
curtail access to phone records, and mandate institutional oversight of executive
activities
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
U.S. policymakers in the post-9/11 world face difficult choices between striving for higher levels of
security and protecting civil liberties. Recent leaks about vast surveillance programs have raised fears that
the government is using powerful tools to invade the privacy of millions of Americans. Because the Patriot Act
provides a legal basis for this surveillance, it is widely held responsible for undermining constitutional rights. Based on our ongoing research on
the Patriot Act, we
demonstrate major failures in congressional policymaking on domestic surveillance.
Although Congress has generally sought to balance concerns for security and civil liberties, poorly
deliberated decisions have undermined both values. In addition, Congress generally failed to provide for
appropriate reviews of investigative methods. And when it finally identified problems with surveillance
tools, it passively allowed the executive to develop solutions. The current controversies over domestic
spying stem from the exploitation of this largely unstructured discretion by the Bush and Obama administrations.
We make recommendations for both substantive policy and institutional reforms. Congress should
restrict seizures of personal records by requiring that they target specific suspects. It should set explicit
legislative policies on investigators’ access to phone records. And it should undertake institutional
reforms—on both the legislative and executive sides—to enhance advocacy of privacy interests, to
improve monitoring and assessment of investigative activities, and to strengthen congressional
participation in areas requiring secrecy.
Checks and balances are key- self policing fails
Center for Democracy and Technology ’08 5/14/08, “Legislation Needed to Correct Widespread
Errors in Use of National Security Letters” https://cdt.org/insight/legislation-needed-to-correctwidespread-errors-in-use-of-national-security-letters/
In response to the Inspector General’s March 2007 report, the FBI issued detailed guidance setting some
new internal requirements for NSLs. The guidance puts in place useful procedures – and training
programs have been conducted – that will make it less likely that FBI agents seek with NSLs information
they are not entitled to receive. The procedures also make it less likely that agents will use NSLs to seek
information without having first opened an investigation. They will also make it more likely that when
the recipient of an NSL turns over more information than was requested, the information is returned or
destroyed if it is irrelevant, rather than being retained in an FBI database and shared widely within the
government. However, internal reforms cannot fix the most egregious problems the IG has identified, all
of which flow from the lack of any external checks and balances. The IG found that reviews of NSL
requests conducted by supervisory FBI attorneys were insufficient. In some instances, for example, the
supervisor’s approval memo was inconsistent with the case agent’s request, suggesting that
supervisors were not carefully reading case agent claims. Even more tellingly, the IG expressed concern
that mid-level supervisors in FBI field offices were reluctant to turn down NSL requests for fear of
antagonizing their supervisor — the head of the field office. Most importantly, the IGalso found that the
FBI had used NSLs to circumvent the FISA Court’s refusal to authorize surveillance on First Amendment
grounds. While the IG didn’t say so, his report shows that self-policing doesn’t work. The only way to
truly address the problems posed by NSLs is to legislate traditional checks and balances, under which a
judge must approve governmental access to sensitive information, under a tighter standard than mere
relevance.
Solvency- Congress is key
Congress should place permanent restrictions on national security letters-it would
curb executive over-reach and create verifiable limits to surveillance
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
It is debatable whether the U.S. government, overall, has struck a defensible balance between
enhancing security and protecting civil liberties. We have seen the implementation of expansive
surveillance programs, and we have reason to believe that other important surveillance operations remain classified and
undisclosed.39 It is even possible that the executive has withheld eavesdropping activities from Congress. But if recent accounts by
Intelligence members are accurate, we have also seen that agents follow multiple court procedures— first
by seeking judicial approval to seize records and then by obtaining separate, highly targeted approval to examine records. Most of the
very few members of Congress who have closely monitored the FISA process believe that it includes
reasonable safeguards. Still, the policymaking system has been overly secretive, dominated by the
executive, and slow to identify gaps in privacy protections. We suggest both changes to the Patriot Act
and, more important, changes to the institutional arrangements for making decisions on surveillance policy.
The most obvious and immediate need is to place permanent restrictions on national security letters .
Congress should pass legislation mandating that authorities discard all non-relevant information
captured with administrative subpoenas. The Obama administration has already implemented this policy through a Justice
Department directive. But until it becomes a statutory requirement, either the current or a succeeding
administration could easily cancel this safeguard and allow agents, as they did in the Bush
administration, to stockpile personal information of innocent Americans. Since this reform merely
codifies current practice, a permanent safeguard would protect privacy without creating new
investigative obstacles.
Congress is key- without oversight, surveillance will expand unilaterally by the
executive, and be subject to the whims of future presidents
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
Dramatic intelligence
leaks by National Security Agency (NSA) whistle blower Edward Snowden have revealed vast new eavesdropping by
American authorities, at home and abroad. The leaks revealed blanket collection of domestic phone records,
warrantless capture of emails from U.S internet companies, and wiretaps on offices of friendly foreign
governments and the European Union, among other things. The revelations have triggered widespread fears of an
Orwellian Big-Brother security establishment. The Los Angeles Times declared that Presidents George W. Bush and Barack Obama have
constructed “a brave new world of pervasive surveillance.”1 The Washington Times asserted that the Fourth Amendment has been effectively
“stripped out” of the Constitution by the executive.2 And a Bloomberg editorial questioned whether Americans are now “living in a police
state.”3 The legal basis for much of the surveillance comes from the Patriot Act. This
law has attracted controversy since its
passage in 2001, and the current scandal has resurrected old concerns.4 By many accounts, Congress, in a moment of
panic after the September 11 attacks, cast aside longstanding constitutional limits on government investigators. Now the impression is that not
only the openly authoritarian Bush administration but also the supposedly civil libertarian Obama administration has aggressively implemented
a massively intrusive security regime. On the basis of our ongoing research on the Patriot Act, we show that the death of American privacy
rights has been greatly exaggerated. As a broad generalization, the Patriot Act has taken a balanced approach to the conflict between security
and privacy. Moreover, the Obama administration has apparently maintained effective and arguably sufficient limits on governmental intrusion.
Nevertheless, the
development of Patriot Act surveillance policy has not been a pretty picture. Congress has
ignored important information, overlooked major issues, and failed to learn from experience as it drafted, reviewed,
and amended the Act. On the one hand, as liberal critics fear, it has indeed tolerated massive violations of privacy
rights. On the other hand, however, it has also created pointless and costly barriers to investigations. Rather than keep working to get it right,
Congress eventually, by default, passed the buck to the executive branch, where presidential
administrations have developed policy solutions unilaterally and largely in secret, often expanding
surveillance powers. Whatever the current state of surveillance practice, it has not been decided
democratically, and it is not protected from secret, unilateral revision by future presidents.
We must have congressional oversight- allowing the executive to reform itself
empirically fails and ensures expansion of surveillance
Bendix and Quirk, 13—William Bendix is Assistant Professor of Political Science @ Keene State. Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and
Representation @ University of British Columbia. “Issues in Governance Studies Institutional Failure in
Surveillance Policymaking: Deliberating the Patriot Act,” Governance Studies @ Brookings, no 60, July,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymakin
g%20patriot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf,
After audits belatedly revealed significant problems with both national security letters and business-records orders,
Congress made
little effort to improve the Patriot Act. Instead, it essentially looked away and allowed the executive to
rewrite the rules for seizing private information. Many legislators agreed that the FBI should be required to discard captured
materials not linked to terrorism suspects or foreign spies. In 2007 and again in 2009, Democrats offered multiple bills that added this
requirement to national security letters.24 However, even though Democrats had large majorities in Congress, they allowed these bills to die in
committee and instead deferred to the Obama administration. Eventually, Justice
Department officials drafted rules
requiring agents to delete all non-relevant information gathered with national security letters.25 It is
unclear why Congress passed the buck to the Obama administration. But by doing so, it gave the
executive the latitude to loosen or eliminate these rules at some later point. Congress also failed to revisit the
business-records provision. Initially, it appeared that lawmakers were willing to ignore security concerns and let six-month processing delays of
court orders hamper investigations. However, recent leaks about NSA programs indicate that Congress
had in effect simply turned
the entire issue over for secret policymaking by the executive branch. Recently, The Guardian reported that the
Bush administration in 2006, without public disclosure, had adopted a radical reinterpretation of the
business-records provision to authorize the daily collection of all domestic phone records.26 These data, or
“metadata” as they are termed, include the phone numbers of callers and receivers, the length and time of
calls, and sometimes the locations of phone participants. Originally, the businessrecords provision granted far more
limited authority. It allowed investigators to capture private materials on the basis of a court order in a specified terrorism case.27 The Bush
administration decided that such an order could be used to capture all communication logs from a specific phone carrier, such as Verizon or
AT&T. Authorities could now scoop up tens of millions of phone records with a single order issued by the FISA Court. The
Bush
administration first briefed members of Congress about the metadata program in 2006.28 Yet aside from two
senators, Mark Udall (D-CO) and Ron Wyden (D-OR), no one objected to the NSA dragnet or the drastic modifications
to the business-records provision.29 By letting Bush’s reinterpretation (subsequently maintained by
Obama) go unchallenged, Congress abdicated its legislative role and allowed the executive to develop
new surveillance law unilaterally.
Legislation needed to pass for use of National Security Letters
Clarke et al in 2013 (Richard, National Coordinator for Security, “Report and Recommendations of
The President’s Review Group on Intelligence and Communications Technologies”, The Review Group on
Intelligence and Communication Technologies,
https://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf)
Fifth, nondisclosure
orders, which are used with 97 percent of all NSLs, interfere with individual freedom
and with First Amendment rights. Revelations about US surveillance have threatened to undermine the
US Internet freedom agenda. Countries that were previously criticized by the United States for excessive
surveillance have accused the US of hypocrisy. The secrecy vs. transparency issue also has serious repercussions
today for the freedom of the press. It is the responsibility of our free press to expose abuse, overreaching, waste, undue influence, corruption, and bad judgment on the part of our elected officials. A
robust and fearless freedom of the press is essential to a flourishing self-governing society. It will not do
for the press to be fearful, intimidated, or cowed by government officials. 81We recommend that: (1)
legislation should be enacted providing that, in the use of National Security Letters, section 215 orders, pen register
and trap-and-trace orders, 702 orders, and similar orders directing individuals, businesses, or other institutions to turn
over information to the government, non-disclosure orders may be issued only upon a judicial finding
that there are reasonable grounds to believe that disclosure would significantly threaten 27 the national security, interfere with an ongoing
investigation, endanger the life or physical safety of any person, impair diplomatic relations, or put at risk some other similarly weighty government or foreign
intelligence interest; (2) nondisclosure
orders should remain in effect for no longer than 180 days without judicial
re-approval; and (3) nondisclosure orders should never be issued in a manner that prevents the
recipient of the order from seeking legal counsel in order to challenge the order’s legality.
Solvency- Specific and articulable facts
Judicial oversight and implementation of the ‘specific and articulable facts’ standard
are necessary to restore separation of powers and 4th amendment protections.
Kenneth R. Logsdon in 2008, J.D., University of Illinois College of Law, UNIVERSITY OF ILLINOIS
JOURNAL OF LAW, TECHNOLOGY & POLICY 2008 U. Ill. J.L. Tech. & Pol'y 409, lexis
The Executive Branch has also neglected the Fourth Amendment standard of individual suspicion when
it sought to use NSLs to request an entire database of information, rather than information on a
particular individual. n274 To restore the standard of individual suspicion, the Reform Act provides that an
NSL must contain "specific and articulable facts providing reason to [*436] believe that the records"
pertain to an individual. n275 That is, the individual must be a suspected agent of a foreign power or
"pertain to an individual who has been in contact with, or otherwise directly linked to, a suspected agent
of a foreign power." n276 The NSL provision, within the PA, states the government may acquire information about an entity that is
relevant to an ongoing investigation. n277 Further protections within the Reform Act relate to what the government can acquire. In particular,
the Reform Act allows the government the ability to acquire only: (A) The name of the customer or subscriber. (B) The address of the customer
or subscriber. (C) The length of the provision of service by such provider to the customer or subscriber (including start date) and the types of
service utilized by the customer or subscriber. (D) The telephone number or instrument number, or other subscriber number or identifier, of
the customer or subscriber, including any temporarily assigned network address. (E) The means and sources of payment for such service
(including any credit card or bank account number). (F) Information about any service or merchandise orders, including any shipping
information and vendor locations. (G) The name and contact information, if available, of any other wire or electronic communications service
providers facilitating the communications of the customer or subscriber. n278 Conversely, the PA requires an electronic communications
provider to "comply with a request for subscriber information and toll billing records information, or electronic communication transactional
records in its custody or possession." n279 The Reform
Act's explicit enumeration of what can be acquired avoids
inherent ambiguities found within the PA provision. To bolster this argument, the Reform Act explicitly states that NSLs
"issued pursuant to this section shall not require the production of local or long distance telephone records or electronic communications
transactional information not listed." n280 Accordingly, these modifications allow the government little room to apply an NSL to an entire
database and ideally prevent the government from acquiring broad categories of information. B. First Amendment Protections and Judicial
Overview Restored As previously discussed, PA II remedied several constitutional deficiencies found within the PA, but not all. Thus, three
constitutional deficiencies remain. First, the recipient of a nondisclosure request bears the [*437]
burden of proof that the government is unreasonably suppressing speech. n281 Second, NSLs "continue[] to
authorize nondisclosure orders that permanently restrict an NSL recipient from engaging in any
discussion related to its receipt of the NSL." n282 Third, "if, at the time of the petition [to review a nondisclosure
request], the Attorney General ... certifies that disclosure may endanger the national security of the United
States ... such certification shall be treated as conclusive." n283 The Reform Act provides solutions for all
three issues. Regarding the suppression of speech via a nondisclosure request, the government "may apply for an order
prohibiting disclosure that the Federal Bureau of Investigation has sought or obtained access to
information or records under this section for not more than 180 days after the order is issued." n284 A
further limitation provides that an "application for an order pursuant to this subsection must state specific and
articulable facts giving the applicant [government] reason to believe that disclosure ... sought ... will
result in" several specified risks. n285 Conveniently, these two provisions also provide safeguards that prevent
a nondisclosure request from becoming permanent. n286 Regarding judicial review, the Reform Act establishes
that "[a] person prohibited by law from disclosing information about the [NSL] may file ... a petition for
the court to set aside the nondisclosure requirement. Such petition ... may be based upon any failure of the nondisclosure
requirement to comply with this section or upon any constitutional or other legal right." n287 Additionally, only the court will have the
authority to set aside a nondisclosure requirement. n288 V. Conclusion James Madison's
assertion that great difficulties lie
in creating a government that controls the citizenry and itself is no less true today. In furtherance of that
goal, the main body of the Constitution enumerates three independent, but co-equal, branches of the
federal government. Further, the Bill of Rights of the United States Constitution provides several individual liberties the government
must respect in the implementation of the law. Among these liberties are an American citizen's right to speech and privacy, as per the First and
Fourth Amendments respectively. Nonetheless, as early as the Civil War, the
United States Government has continually
infringed upon those rights via electronic monitoring programs [*438] directed towards the general public.
Regrettably, this monitoring activity has accelerated since the tragic terrorist attacks against the
American public on 9/11. This acceleration has been instigated by the Executive Branch's insistence that such power is found within
either the AUMF or Article II of the United States Constitution. However, constitutional restrictions found within the First
Amendment, Fourth Amendment, and the doctrine of separation of powers refute such claims. Additionally,
Supreme Court precedent, the history of wartime surveillance in the United States, and principles of
statutory construction all fail to sustain the Executive Branch's extraordinary claim of authority. Accordingly,
drastic measures are necessary to control the current power and ability of the Executive Branch while
maintaining the tools necessary for the government to protect the American people from a future
terrorist attack. In so doing, it is recommended a modified application of the National Security Letters
Reform Act of 2007 be adopted by both houses of Congress. If this achievement is realized, it has the potential of
restoring First and Fourth Amendment protections, and the Judicial Branch's constitutional authority,
which have contributed to the greatness of the United States of America over the past 200 years.
National security letters should be issued through judicial finding
Clarke et al in 2013 (Richard, National Coordinator for Security, “Report and Recommendations of
The President’s Review Group on Intelligence and Communications Technologies”, The Review Group on
Intelligence and Communication Technologies,
https://www.whitehouse.gov/sites/default/files/docs/2013-12-12_rg_final_report.pdf)
First, as already noted, NSLs are issued by FBI officials rather than by a judge or by a prosecutor in the
context of a grand jury investigation. Moreover, in 2008, the Inspector General disclosed that the FBI
had “issued [NSLs] . . . after the FISA Court, citing First Amendment concerns, had twice declined to sign
Section 215 orders in the same investigation. Fourth, the oversight and minimization requirements
governing the use of NSLs are much less rigorous than those imposed in the use of section 215 orders.
For all the well-established reasons for requiring neutral and detached judges to decide when government
investigators may invade an individual’s privacy, there is a strong argument that NSLs should not be
issued by the FBI itself. Although administrative subpoenas are often issued by administrative agencies,
foreign intelligence investigations are especially likely to implicate highly sensitive and personal information
and to have potentially severe consequences for the individuals under investigation. 80 “We recommend that statutes
that authorize the issuance of National Security Letters should be amended to permit the issuance of National
Security Letters only upon a judicial finding that: (1) the government has reasonable grounds to believe
that the particular information sought is relevant to an authorized investigation intended to protect “against international
terrorism or clandestine intelligence activities” and (2) like a subpoena, the order is reasonable in focus, scope, and breadth.
NSL Reform Act Solvency
The National Security Letter Reform Act solves for checks and balances, while still
fighting terrorism
Center for Democracy and Technology’08 5/14/08, “Legislation Needed to Correct Widespread
Errors in Use of National Security Letters” https://cdt.org/insight/legislation-needed-to-correctwidespread-errors-in-use-of-national-security-letters/
Two weeks ago, CDT testified before the Senate Judiciary Committee about the need for reform of NSLs
and in support of legislation that would establish meaningful checks and balances on this governmental
power. The National Security Letter Reform Act, S. 2088, goes to the core issue. First, it would separate
information that can now be obtained with an NSL into sensitive and less sensitive categories. The less
sensitive information — including information identifying a customer by name and address — would
continue to be available to the government by means of an NSL. However, the bill would tighten the
standard for issuing NSLs even for less sensitive information, to prevent fishing expeditions. Other, more
sensitive information, such as telephone dialing information, the ‘To” and “From” lines on email, and the
details of one’s checking and credit card transactions would require a court order. The bill would also
impose a time limit on the “gag orders” that normally accompany NSLs and would require that any gag
be narrowly tailored. The House counterpart, the National Security Letters Reform Act (H.R. 3189),
would not require judicial approval, but it would impose a time limit and tighter requirements on
issuance of gag orders. The House bill would also return to the pre-PATRIOT “agent of a foreign power”
standard for issuing NSLs. It would create a civil damages remedy against “any person issuing or
obtaining the issuing” of an NSL contrary to law. Both bills would require the Attorney General to issue
strong minimization procedures to protect irrelevant information pertaining to Americans. CDT supports
the bills on the ground that they would provide the government the tools it needs to prevent terrorism
while helping to ensure that those tools are subjected to appropriate checks and balances
Solvency- Con Oversight
It’s recommended that NSLs need a judicial review, just like warrants, be enacted, but
the FBI has been against it thus far.
Froomkin in 2015 (Dan Froomkin, “FBI Flouts Obama Directive to Limit Gag Orders on National
Security Letters”, Firstlook.org, First Look Media, 02/19/15, Website, 6/27/15,
https://firstlook.org/theintercept/2015/02/19/fbi-flouts-obama-directive-limit-gag-orders-nationalsecurity-letters/)
A time limit on gags going forward also raises the question of whether past gag orders will now be withdrawn. “Obviously there
are at this
point literally hundreds of thousands of National Security Letters that are more than three years old,”
said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back you go, “it
becomes increasingly implausible that a significant percentage of those are going to entail some dire
national security risk.” The NSL program has a troubled history. The absolute secrecy of the program and resulting
lack of accountability led to systemic abuse as documented by repeated inspector-general
investigations, including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL
statutes, requests for information based on First Amendment protected activity, “after-the-fact” blanket
NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information without
any determination that the telephone numbers were relevant to authorized national security
investigations. Obama’s own hand-selected “Review Group on Intelligence and Communications
Technologies” recommended in December 2013 that NSLs should only be issued after judicial review — just
like warrants — and that any gag should end within 180 days barring judicial re-approval. But FBI director
James Comey objected to the idea, calling NSLs “a very important tool that is essential to the work we do.” His argument
evidently prevailed with Obama. NSLs have managed to stay largely under the American public’s radar.
But, Crocker says, “pretty much every time I bring it up and give the thumbnail, people are shocked. Then you go into how many are
issued every year, and they go crazy.”
Legislation needed for NSLs- Widespread errors and violations
Center for Democracy and Technology ’08 5/14/08, “Legislation Needed to Correct Widespread
Errors in Use of National Security Letters” https://cdt.org/insight/legislation-needed-to-correctwidespread-errors-in-use-of-national-security-letters/
In reports issued in March 2007 and March 2008, the Department of Justice Inspector General (IG)
found widespread errors and violations in the FBI’s use of National Security Letters to obtain bank,
credit and communications records of U.S. citizens without judicial approval. CDT has called upon
Congress to establish checks and balances for such government access to sensitive information. National
Security Letters (NSLs) are simple form documents signed by officials of the FBI and other agencies
compelling disclosure of personal information without prior judicial authorization. NSLs can be served
on credit companies, telephone carriers, Internet Service Providers, and financial institutions. In October
2001, the PATRIOT Act dramatically weakened the standard for issuing NSLsby removing the
requirement that the records sought with the NSL pertain to an “agent of a foreign power” such as a
terrorist or a spy. The PATRIOT Act also eliminated the requirement that the government be able to
articulate the factual basis for its suspicion. Current law merely requires an FBI official to state – purely
for internal purposes — that the records are “relevant to” or “sought for” foreign counter intelligence or
terrorism purposes. Furthermore, an amendment adopted in 2003 dramatically expanded the
institutions subject to NSLs to include travel agencies, real estate agents, jewelers, the Postal Service,
insurance companies, casinos, car dealers and others. Among other things, the IG found that the FBI
issued NSLs when it had not even opened the investigation that is the only predicate for issuing an NSL.
It found that the FBI retains almost indefinitely the information it obtains with an NSL, even if the record
subject turns out to be innocent of any crime and of no intelligence interest. It also found that the
Attorney General had refused to adopt adequate “minimization” procedures designed to protect the
privacy of information about innocent Americans obtained with an NSL, even though an interagency
working group had recommended such procedures.
The Government need to put permanent regulations on NSLs, otherwise private data
will continue to be stored
Bendix et al in 2013 (William Bendix, Assistant Professor of Political Science at Keene State College; Paul
Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and Representation at
the University of British Columbia., “Institutional Failure in Surveillance Policymaking: Deliberating the Patriot Act”
Brookings.edu, Number 60; 6/13, 15 pgs., Website, 6/28/15,
http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymaking%20patri
ot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf)
The most obvious and immediate need is to place permanent restrictions on national security letters.
Congress should pass legislation mandating that authorities discard all non-relevant information
captured with administrative subpoenas. The Obama administration has already implemented this
policy through a Justice Department directive. But until it becomes a statutory requirement, either the
current or a succeeding administration could easily cancel this safeguard and allow agents, as they did in
the Bush administration, to stockpile personal information of innocent Americans. Since this reform
merely codifies current practice, a permanent safeguard would protect privacy without creating new
investigative obstacles.
Solvency- Pre 9/11 Standards
NSL Restrictions prior to 9/11 were effective
Sanchez ’14 Julian Sanchez, 1/9/14, “Can We Do Without National Security Letters?”, Just Security,
http://justsecurity.org/5351/national-security-letters/
If the NSL gag provisions can be weakened sufficiently to pass First Amendment muster, such a
compromise solution might represent the elusive “balance” between privacy interests and the need to
quickly evaluate leads in the initial phases of investigations. But the burden should be on the
intelligence community to establish that even more limited authority is genuinely necessary. The
absence of broad NSL powers prior to the Patriot Act does not appear to have been a major factor in the
failure to detect the 9/11 attacks, and the public has not been made aware of any cases where such easy
access to sensitive information has enabled the discovery of some plot or terror cell that would
otherwise have gone undetected. The claim that the FBI cannot investigate effectively without a tool
that has existed in its current form for roughly a decade should be seen as an extraordinary one—
demanding equally extraordinary evidence before we accept it.
A2 NEG
Terror
A2- Terror DA- Other issues trump
Even if surveillance is helpful for the war on terror, multiple other issues
prevent effective strategies
Holmes, 2009 (Holmes, Stephen. "The Brennan Center Jorde Symposium on Constitutional Law: In Case
of Emergency: Misunderstanding Tradeoffs in the War on Terror." California Law Review, Inc (2009): n.
pag. Web. 28 June 2015)
Even if the promoters of unfettered executive power were justified in associating legal rules with ineffectiveness during emergencies, their
single-minded obsession with circumventing America's allegedly "super-legalistic culture" n33 would need explaining. Let us stipulate, for the
sake of argument, that civil
liberties, due process, treaty obligations, and constitutional checks and balances
make national-security crises somewhat harder to manage. If so, they would still rank quite low among
the many factors that render the terrorist threat a serious one. None of them rivals in importance the
extraordinary vulnerabilities created by technological advances, especially the proliferation of compact
weapons of extraordinary destructiveness, in the context of globalized communication, transportation, and banking. None
of them compares to a shadowy, dispersed, and elusive enemy that cannot be effectively deterred. And
none of them is as constraining as the scarcity of linguistically and culturally knowledgeable personnel
and other vital national-security assets, including satellite coverage of battle zones, which the government must allocate in some
rational way in response to an obscure, evolving, multidimensional, and basically immeasurable threat. The curious belief that laws written for
normal times are especially important obstacles to defeating the terrorist enemy is based less on evidence and argument than on a hydraulic
reading of the liberty-security relationship. One particular implication of the hydraulic model probably explains the psychological appeal of a
metaphor that is patently inadequate descriptively: if the main thing preventing us from defeating the enemy is "too much law," then the
pathway to national security is easy to find; all we need to do is to discard [*318] the quaint legalisms that needlessly tie the executive's hands.
That this comforting inference is the fruit of wishful thinking is the least that might be said.
Cyber Terror
Cyber terrorism isn’t a threat
Libicki ‘13 [Martin C. Lib, Dr. Libicki has a PhD from the University of California, 8/14/13, Foreign Affairs, “Don’t Buy
Cyberhype”] Accessed Online: 7/01/15 https://www.foreignaffairs.com/articles/united-states/2013-0814/dont-buy-cyberhype
These days, most
of Washington seems to believe that a major cyberattack on U.S. critical infrastructure is
inevitable. In March, James Clapper, U.S. director of national intelligence, ranked cyberattacks as the greatest short-term threat to U.S.
national security. General Keith Alexander, the head of the U.S. Cyber Command, recently characterized “cyber exploitation” of U.S. corporate
computer systems as the “greatest transfer of wealth in world history.” And in January, a report by the Pentagon’s Defense Science Board
argued that cyber risks should be managed with improved defenses and deterrence, including “a nuclear response in the most extreme case.”
Although the risk of a debilitating cyberattack is real, the perception of that risk is far greater than it actually is.
No person has ever died from a cyberattack, and only one alleged cyberattack has ever crippled a piece
of critical infrastructure, causing a series of local power outages in Brazil. In fact, a major cyberattack of the kind intelligence
officials fear has not taken place in the 21 years since the Internet became accessible to the public. Thus, while a
cyberattack could theoretically disable infrastructure or endanger civilian lives, its effects would unlikely reach the scale U.S. officials have
warned of. The
immediate and direct damage from a major cyberattack on the United States could range
anywhere from zero to tens of billions of dollars, but the latter would require a broad outage of electric
power or something of comparable damage. Direct casualties would most likely be limited, and indirect
causalities would depend on a variety of factors such as whether the attack disabled emergency 911
dispatch services. Even in that case, there would have to be no alternative means of reaching first
responders for such an attack to cause casualties. The indirect effects might be greater if a cyberattack caused a large loss of
confidence, particularly in the banking system. Yet scrambled records would probably prove insufficient to incite a run on the banks.
Cyber-attacks reduces real world violence
Rid ‘13 [Thomas Rid, Thomas Rid is a professor in the Department of War Studies at King's College London, he also holds a PhD from
Humboldt University, 10/15/13, Foreign Affairs, “Cyberwar and Peace”] Accessed Online: 7/01/15
https://www.foreignaffairs.com/articles/2013-10-15/cyberwar-and-peace
In February 2011, then CIA Director Leon Panetta warned Congress that “the next Pearl Harbor could very well be a cyberattack.” And in late
2012, Mike McConnell, who had served as director of national intelligence under President George W. Bush, warned darkly that the United
the hype about everything “cyber”
has obscured three basic truths: cyberwar has never happened in the past, it is not occurring in the
present, and it is highly unlikely that it will disturb the future. Indeed, rather than heralding a new era of
violent conflict, so far the cyber-era has been defined by the opposite trend: a computer-enabled assault on political
violence. Cyberattacks diminish rather than accentuate political violence by making it easier for states,
groups, and individuals to engage in two kinds of aggression that do not rise to the level of war:
sabotage and espionage. Weaponized computer code and computer-based sabotage operations make it possible to
carry out highly targeted attacks on an adversary’s technical systems without directly and physically
harming human operators and managers. Computer-assisted attacks make it possible to steal data without placing
States could not “wait for the cyber equivalent of the collapse of the World Trade Centers.” Yet
operatives in dangerous envi
Constitution
We have a moral obligation to prevent violations of the constitution whenever
possible
Levinson 2k (Daryl Levinson, professor of law at University of Virginia, Spring 2000 UC Law Review)
Extending a majority rule analysis of optimal deterrence to constitutional torts requires some explanation, for we do not usually think of violations of constitutional rights in
Quite the opposite, constitutional rights are most commonly
conceived as deontological side-constraints that trump even utility-maximizing
government action. Alternatively, constitutional rights might be understood as serving
rule-utilitarian purposes. If the disutility to victims of constitutional violations often exceeds the social benefits derived from the rights-violating activity,
or if rights violations create long-term costs that outweigh short-term social benefits, then
terms of cost-benefit analysis and efficiency.
constitutional rights can be justified as tending to maximize global utility, even though this requires local
utility-decreasing steps. Both the deontological and rule-utilitarian descriptions imply that
the optimal level of constitutional violations is zero; that is, society would be better off,
by whatever measure, if constitutional rights were never violated.
MISC
National Security Letters have violated of the 1st amendment-internet giants feel
threatened
Mintz in 2014 (Howard Mintz, Staff Writer, “FBI surveillance letters weighed in San Francisco appeals
court”, 10/05/14, http://www.mercurynews.com/crime-courts/ci_26669760/fbi-surveillance-lettersweighed-san-francisco-appeals-court)
Long before Edward Snowden blew the lid off the government's widespread Internet snooping, an
unknown Bay Area
telecommunications company was striking back at an equally secretive but far more common tool in the
FBI's shadowy world of surveillance. This telecom had been the target in 2011 of a "national security letter," a
supersecret demand from the FBI for customer information in the name of fighting terrorism or foreign
spies on U.S. turf. Thousands of such letters are sent each year, allowing the FBI to bypass the courts to mine for investigative gold
without a warrant or even a public mechanism for recipients to object. But on Wednesday, a federal appeals court will consider
whether these letters, given expanded power and use under the post-9/11 Patriot Act, come at too high a cost -- an
unconstitutional gag on free speech. With Internet giants such as Google, Yahoo, Microsoft and
Facebook weighing in, the 9th U.S. Circuit Court of Appeals is reviewing the issue amid a broader legal
and policy debate over the government's national security investigative powers. The companies, which say
the letters infringe on free speech rights, have likewise been locking horns with the government over the
scope of the National Security Agency's surveillance programs allowing bulk collection of Internet data.
Advertisement San Francisco U.S. District Judge Susan Illston last year found that the letters, known as NSLs, violate
the First Amendment because they forbid the recipients from saying anything about them, including
publicly disclosing the mere fact they have received one. The telecom that has challenged the legality of the letters cannot
identify itself in the case because of the threat of federal prison, nor can its lawyers from the Electronic Frontier Foundation, the civil liberties
group handling the legal battle. Critics
of the letters say they are another example of the government going too
far with surveillance tools at the expense of the individual right to speak out against the government.
"The gag order says you not only have to turn over the information, but you can't complain about it, " said
UCLA law professor Eugene Volokh, who has filed a friend-of-the-court brief on behalf of the Internet Archive, which itself has received such
letters. Although the U.S. Justice Department considers the letters and their accompanying demand for secrecy vital to investigations,
Illston
said they are rife "with significant constitutional infirmities." The government has asked the appeals court
to overturn her ruling, which would bar the FBI from using the letters unless the Obama administration persuades Congress to modify
the Patriot Act to address the free-speech concerns. The letters are considered a linchpin of the federal domestic
surveillance program, even more so than the NSA's data collection, which is aimed primarily at overseas targets.
Between 2003 and 2011, the number of such letters issued by the FBI ranged between 16,511 and
56,507 a year, according to Justice Department figures. Government lawyers defend the constitutionality of the letters and
insist the gag provisions protect investigations. "Public disclosure of actions by the government to investigate terrorism and espionage may
allow individuals and groups ... to take steps to evade detection, destroy evidence, mislead investigators, conceal future terrorist and foreign
intelligence activities and speed plans for an attack," the Justice Department told the 9th Circuit. A
host of organizations have lined
up against the government, ranging from media groups to Silicon Valley companies such as Google and
Facebook. Those tech companies argue that their free-speech rights are violated when they are
prevented from revealing how much the government is relying on the letters to pry information from
them about customers. Lawyers for the telecom company at the center of the 9th Circuit case also point to a series of Inspector
General reports between 2007 and 2010 that found abuses in the FBI's reliance on the national security
letters and suggested Congress might need to create further checks on them, such as more court oversight. Before that happens, however,
the 9th Circuit and perhaps the U.S. Supreme Court will have to decide this latest clash over government surveillance powers. "As
a
practical matter, this affects a lot of people," said Cindy Cohn, the Electronic Frontier Foundation's legal director. "It's
domestic. These are the tools they use against Americans."
National security letters are unconstitutional– mainly because they undermine
separation of powers
EFF 2013(Electronic Frontier Foundation ,EFF is leading the fight against the NSA's illegal mass
surveillance program.,3-15-2013, "National Security Letters Are Unconstitutional, Federal Judge Rules,"
Electronic Frontier Foundation, https://www.eff.org/press/releases/national-security-letters-areunconstitutional-federal-judge-rules)
The controversial NSL provisions EFF challenged on behalf of the unnamed client allow the FBI to issue
administrative letters -- on its own authority and without court approval -- to telecommunications
companies demanding information about their customers. The controversial provisions also permit the
FBI to permanently gag service providers from revealing anything about the NSLs, including the fact that
a demand was made, which prevents providers from notifying either their customers or the public. The
limited judicial review provisions essentially write the courts out of the process. In today's ruling, the
court held that the gag order provisions of the statute violate the First Amendment and that the review
procedures violate separation of powers. Because those provisions were not separable from the rest of
the statute, the court declared the entire statute unconstitutional. In addressing the concerns of the
service provider, the court noted: "Petitioner was adamant about its desire to speak publicly about the
fact that it received the NSL at issue to further inform the ongoing public debate."
NSLs violate fourth amendment, FBI abuses them, and their reach could go farther
than we know- Judge Ruling and ACLU report
Harper 14 Lauren Harper, 1/10/14, “Powerful National Security Letters go largely Unchecked”,
https://nsarchive.wordpress.com/2014/01/10/powerful-national-security-letters-continue-to-golargely-unchecked/
The intelligence review group President Obama created to address surveillance concerns recently submitted recommendations for improving
the federal government’s surveillance programs. FBI director James B. Comey spoke out against one in particular, which proposed requiring
judicial approval for issuing national security letters (NSL). The document highlighted in today’s posting, an unclassified 2008 Department of
Justice Inspector on the FBI’s use of NSLs, helps contextualize both the FBI’s concerns altering one of its key investigative tools, and the serious
civil rights concerns that tool elicits.
Insufficient judicial oversight has been a long-standing concern with NSLs,
which demand business records from a wide array of organizations for national security investigations,
and its unsurprising to see them addressed by Obama’s intelligence review panel. The 2004 case Doe v. Ashcroft challenged
the constitutionality of the letters, specifically their non-disclosure provisions, and the resulting ruling
issued by Judge Victor Marrero found they NSLs violate the Fourth Amendment. This led to revisions of the USA
Patriot Act, allowing for greater judicial review and clarifications to the non-disclosure clauses. However, there are still no
requirements to seek approval or judicial review when sending an NSL, and the non-disclosure
provisions prevent the full extent of the NSL program from becoming known. A strong argument can be
made that even though the Patriot Act allows NSLs containing gag orders to continue being issued
without judicial approval, they are nevertheless unconstitutional because they violate the Fourth
Amendment’s prohibition on “unreasonable searches” of citizen’s “persons, houses, papers, and effects”
without a warrant issued only “upon probable cause, supported by Oath or affirmation, and particularly
describing the place to be searched, and the persons or things to be seized.” There is also the chance
that because the NSLs are secret law, their reach goes well beyond what we now know. Jude Marrero’s ruling
was one of the impetuses for the 2008 IG report, which was the second in a series addressing NSL-related concerns. The report underscores the
importance of NSL requests to the FBI, by far the largest employer of the letters, and their reluctance to change current practices. The report
notes that the FBI issued a total 192,499 NSL requests between 2003 and 2006 alone. The
reported “that the agency so
thoroughly abused the program that it truly had no idea how many letters had been issued. An audit of
the program also found that 60% of the audited files had no supporting documentation and that 22%
contained at least one unreported legal violation,” making the lack of oversight of the letters’ issuance
and the metadata they collect all the more alarming.
ACLU & Doe v Ashcroft shows us that National Security Letters are unconstitutionalthey go against the 1st amendment and the right to internet anonymity
Wentworth in 2004 (Donna Wentworth, Editor, “ACLU & Doe v. Ashcroft - the Good
Bits”,10/052004,https://www.eff.org/deeplinks/2004/10/aclu-doe-v-ashcroft-good-bits, 6/29/2015)
Last week brought an extraordinary victory for privacy and civil liberties: a federal district court struck
down a key power under the Electronic Communications Privacy Act (ECPA) and the USA PATRIOT Act.
Specifically, US District Court Judge Victor Marrero ruled that "National Security Letters" (NSLs) violate
the Constitution. The letters, issued directly by the Department of Justice (DoJ) without any court
oversight, can be used to demand sensitive communications records about citizens even if they are not
suspected of any crime. When an Internet Service Provider (ISP) receives an NSL, it is forbidden from
ever revealing its existence to anyone. Judge Marrero barred the DoJ from issuing any further NSLs and
found the gag provision to be an illegal prior restraint on protected speech. But that's not all. By
recognizing that the First Amendment's rights to anonymity and association could be violated by NSLs
seeking electronic communications transaction records from ISPs, the court significantly clarified privacy
protections for Internet users. Judge Marrero understood that records of "the anonymous message
boards to which a person logs on or posts, the electronic newsletters to which he subscribes, and the
advocacy websites he visits" are inextricably intertwined with protected speech. This means that judicial
review is required before the government can impinge upon not only the right to post anonymously, but
the right to read anonymously. Together with the court's holding that a "person who signs onto an
anonymous forum under a pseudonym...is surely entitled to a reasonable expectation of privacy," the
decision helps strengthen fundamental civil liberties in the Internet context, with implications far
beyond the administrative subpoenas at issue in the case.
Download