Courts AFF Updates - SpartanDebateInstitute

advertisement
Contents
Courts Updates ............................................................................................................................................. 2
Courts AFF Updates................................................................................................................................... 3
Congress Counterplan Answers: Court Key to Democracy .................................................................. 4
Human Rights Add-on ........................................................................................................................... 5
Courts NEG Updates ................................................................................................................................. 7
Human Rights Add-On Answers ............................................................................................................ 8
AFF Case Updates........................................................................................................................................ 10
Economy Updates ................................................................................................................................... 11
Economic Decline Impact Extensions.................................................................................................. 12
Economic Decline Impacts--Racism .................................................................................................... 17
Internet Advantage Extensions ............................................................................................................... 18
Internet Key to Economy Extensions .................................................................................................. 19
Internet Key to Tech............................................................................................................................ 26
Internet Solves Disease ....................................................................................................................... 28
Bigotry Advantage Extensions ................................................................................................................ 30
Bigotry Advantage is Utilitarian .......................................................................................................... 31
Legalism K Answer ...................................................................................................................................... 36
Terrorism DA Updates ................................................................................................................................ 38
Terrorism UQ: ISIS is losing now ........................................................................................................ 39
Links: NSA Surveillance Stops ISIS Attacks ......................................................................................... 40
Impacts: Bioweapons are Feasible/Possible ...................................................................................... 42
ISIS Impacts ......................................................................................................................................... 46
Terrorism Link Turns ................................................................................................................................... 50
Terror Link Turns ..................................................................................................................................... 51
Politics Link Turns........................................................................................................................................ 56
Politics Link Turn ..................................................................................................................................... 57
Terrorism Non-Uniques .............................................................................................................................. 60
Afro-Pessimism Links .................................................................................................................................. 64
Courts Updates
Courts AFF Updates
Congress Counterplan Answers: Court Key to Democracy
(--) Courts prevent democratic backsliding:
Sam Issacharoff, 7/1/2015 (American law professor @ NYU School of Law, “Fragile Democracies: An
Interview with Sam Issacharoff,” http://balkin.blogspot.com/2015/07/fragile-democracies-interviewwith-sam.html, Accessed 7/21/2015, rwg)
JB: You are one of the foremost experts on American election law. How did you get interested in the constitutional problems of emerging democracies? Sam
Issacharoff: Two events in the U.S. had the paradoxical effect of directing my attention abroad. The precipitating events were the debates over the trade-offs
between liberty and security in the wake of 9/11 and the role of the Court in resolving the contested presidential election of 2000. Each struck me as a familiar
point of crisis in democracies: a threat to the political openness of democratic politics, and a succession crisis and the risk of a vacuum of leadership. I realized that
I did not have a good command of how these matters were dealt with in countries that faced real threats to security more regularly. And, I watched with some
The
more I looked at newly minted democracies, as in Mexico and South Africa, the more I was struck by the
generalizable pattern of courts serving as stabilizing institutions during periods of what I would term
democratic fragility. JB: A key claim of the book is that courts can play an important role in keeping
emerging democracies from backsliding into authoritarianism and dictatorship. Why are courts able to do this? Sam Issacharoff:
The paradoxical claim of the book is that courts can help stabilize democracy at the moments when political power is
most contested. Since courts notoriously lack the power of the purse or the sword, the paradox is why there should be any expectation that they can play
amazement as the Mexican Supreme Electoral Tribunal handled the 2006 presidential election contest (their equivalent of Bush v. Gore) with relative ease.
this role. In many instances when courts have tried to intercede, they have failed catastrophically, with Peru and Russia as ready examples. But there are too many
counterexamples of courts
reining in political power and that demands some explanation. The main one offered in the book is that courts
help lower the stakes of what is up for grabs in any election. The problem of the post-colonial periods of state consolidation of
the twentieth century, and particularly the third wave of democracy after the fall of the Soviet Union, is that most of the new countries were democracies without a
well-established demos, to borrow from Joseph Weiler. An election in such circumstances risks becoming a one-shot referendum on who will hold state power to
do in the rivals. An earlier effort to lower the risk was based on consociationalism, formalized power sharing. The new efforts at democracy try to lower the
Constitutionalism is then entrusted to
courts that have strong powers of judicial review and offer an institutional ally to those that stand to
lose in the electoral process. This is a strategy I call “democratic hedging.”
downside risk by imposing a strong set of constitutional constraints on what governments can do.
(--) NSA surveillance crushes democracy:
JIMMY WALES and LILA TRETIKOV, 3/10/2015 (the founder of Wikipedia, is a board member of the
Wikimedia Foundation, of which Lila Tretikov is the executive director, “Stop Spying on Wikipedia
Users,” http://www.nytimes.com/2015/03/10/opinion/stop-spying-on-wikipedia-users.html?_r=2,
Accessed 7/22/2015, rwg)
SAN FRANCISCO — TODAY, we’re filing a lawsuit against the National Security Agency to protect the rights of the 500
million people who use Wikipedia every month. We’re doing so because a fundamental pillar of democracy is at
stake: the free exchange of knowledge and ideas. Our lawsuit says that the N.S.A.’s mass surveillance of
Internet traffic on American soil — often called “upstream” surveillance — violates the Fourth Amendment, which
protects the right to privacy, as well as the First Amendment, which protects the freedoms of expression and association. We also argue that
this agency activity exceeds the authority granted by the Foreign Intelligence Surveillance Act that Congress amended in 2008. Most people
search and read Wikipedia anonymously, since you don’t need an account to view its tens of millions of articles in hundreds of languages. Every
month, at least 75,000 volunteers in the United States and around the world contribute their time and passion to writing those articles and
keeping the site going — and growing. On our servers, run by the nonprofit Wikimedia Foundation, those volunteers discuss their work on
everything from Tiananmen Square to gay rights in Uganda. Many of them prefer to work anonymously, especially those who work on
controversial issues or who live in countries with repressive governments. These volunteers should be able to do their work without having to
worry that the United States government is monitoring what they read and write. Unfortunately, their anonymity is far from certain because,
using upstream surveillance, the N.S.A. intercepts and searches virtually all of the international text-based traffic that flows across the Internet
“backbone” inside the United States. This is the network of fiber-optic cables and junctions that connect Wikipedia with its global community of
readers and editors. As a result, whenever someone overseas views or edits a Wikipedia page, it’s likely that the N.S.A. is tracking that activity
— including the content of what was read or typed, as well as other information that can be linked to the person’s physical location and
possible identity. These activities are sensitive and private: They can reveal everything from a person’s political and religious beliefs to sexual
orientation and medical conditions. The notion that the N.S.A. is monitoring Wikipedia’s users is not, unfortunately, a stretch of the
imagination. One of the documents revealed by the whistle-blower Edward J. Snowden specifically identified Wikipedia as a target for
surveillance, alongside several other major websites like CNN.com, Gmail and Facebook. The leaked slide from a classified PowerPoint
presentation declared that monitoring these sites could allow N.S.A. analysts to learn “nearly everything a typical user does on the Internet.”
The harm to Wikimedia and the hundreds of millions of people who visit our websites is clear: Pervasive surveillance has
a chilling
effect. It stifles freedom of expression and the free exchange of knowledge that Wikimedia was designed to enable.
Human Rights Add-on
A) Curtailing NSA surveillance bolsters international human rights:
Alex Sinha, 3/25/2015 (Aryeh Neier Fellow at the American Civil Liberties Union and Human Rights
Watch, “Better Privacy Protections Key to US Foreign Policy Coherence,”
http://www.defenseone.com/ideas/2015/03/better-privacy-protections-key-us-foreign-policycoherence/108469/, Accessed 7/22/2015, rwg)
While Washington has nominally supported internet freedom around the globe, its surveillance
programs have undermined human rights. For all its interest in promoting human rights around the
world, you’d think the United States would be more sensitive to the ways its own surveillance policies
undermine those very rights. Over the last few years, U.S. officials say they have spent more than $125 million to advance Internet
freedom, which the State Department describes as a “foreign policy priority.” The U.S. rightly links Internet freedom with the freedoms of
expression, peaceful assembly, and association, as well as with the work of human rights defenders. It makes sense, therefore, that the U.S.
also actively funds human rights defenders, and calls out other governments for mistreating them. Yet surveillance
conducted by the
U.S. government—some of it unconstitutional and contrary to international human rights law—compromises Internet freedom,
undermines the rights the government seeks to promote, and directly harms human rights defenders. Two weeks ago, the ACLU
filed a lawsuit challenging the NSA’s “upstream” surveillance, which involves tapping the Internet backbone to copy and search countless
communications as they enter and leave the country. Among the plaintiffs in that suit are human rights groups, including Human Rights Watch
and Amnesty International. Both organizations send researchers around the world to document and report on human rights abuses, often in
conflict zones or countries with oppressive governments. Both rely on local human rights defenders to help collect evidence, and both often
solicit the testimony of victims and survivors of atrocities. Upstream surveillance undermines this critical work by raising the costs of
communicating securely and exposing and frightening away sources. Those sources are understandably reluctant to provide sensitive
information when they know it can easily be collected by the U.S. and shared with other governments—sometimes the very governments they
have spoken out against. Today, we are releasing a report that analyzes state obligations to protect privacy under the International Covenant
on Civil and Political Rights, or, a treaty that imposes legal obligations on the U.S. and many other signatories. Our report urges the U.N. body
that monitors state compliance with the ICCPR, the Human Rights Committee, to update its authoritative analysis of the right to privacy. This
analysis, called “General Comment 16,” was published in 1988, and some of its standards have fallen behind the times. Since its publication, we
have become so heavily reliant on information technologies—cell phones, the Internet and more—that there now exist detailed digital records
of our daily lives. Meanwhile, government capacities to gather, store, and analyze those records have grown exponentially. The U.N. calls this
the “digital age.” The State Department calls it “an inflection point in human history.” But whatever label we use, this new reality explains why
we’re calling on the Human Rights Committee to establish modern standards that give governments much needed guidance on how to meet
their privacy-related human rights obligations. Our report is designed to help the committee revisit General Comment 16. It draws on a broad
range of existing human rights laws and standards to collect and organize relevant data points, distilling the requirements they reflect. And,
until the committee updates its analysis, our report will also help human rights advocates in their continuing efforts to ensure that their
governments respect the international human right to privacy. Despite
its lofty rhetoric about promoting Internet
freedom and associated human rights, the U.S. needs a new general comment on privacy as much as
anyone. It has resisted modernizing international privacy protection standards in the same statements it uses to reaffirm its commitments to
privacy rights. It simultaneously funds secure communications technology and weakens the security of such technology. Its surveillance
programs have had chilling effects here at home on the exact rights it aims to promote around the world. Now it’s being sued by major human
rights defenders for hindering their work, even as it trumpets its commitment to their cause. Privacy lies at the center of this tangle of
contradictions. Of course, we
believe the U.S. should respect the human right to privacy because it’s legally obligated to
do so. But if that’s not a good enough reason, there is another: It’s the first step toward a coherent foreign policy on
human rights.
B) Human rights prevent global slavery and war.
William W. Burke-White, 2004 Lecturer in Public and International Affairs and Senior Special
Assistant to the Dean, Woodrow Wilson School of Public and International Affairs, Princeton University
The Harvard Environmental Law Review Spring, 2004 LN
The second effect of institutionalized protections of human rights is to set a minimum floor of treatment
for all citizens within the domestic polity. Even in a non-democracy, minimum human rights protections
ensure that [*266] rights are accorded to individuals not directly represented by the government. By
ensuring a minimum treatment of the unrepresented, human rights protections prevent the
government from externalizing the costs of aggressive behavior on the unrepresented. In human rights
respecting states, for example, unrepresented individuals cannot be forced at gunpoint to fight or be
bound into slavery to generate low-cost economic resources for war, and thus restrain the state from
engaging in aggressive action. On the other hand, in a state where power is narrowly concentrated in
the hands of a political elite that systematically represses its own people, the state will be more able to
bear the domestic costs of war. By violating the human rights of its own citizens, a state can force
individuals to fight or support the military apparatus in its war-making activities. Similarly, by denying
basic human rights, a state may be better able to bear the political costs of war. Even if such a state had
fair elections, denial of freedom of thought and expression might well insulate the government from the
electoral costs of an aggressive foreign policy.
Courts NEG Updates
Human Rights Add-On Answers
(--) No modeling: different countries interpret human rights laws differently:
Eric Posner, 1/14/2015 (professor at the University of Chicago Law School, “Charlie Hebdo proves just
how broken human rights law is,”
https://www.washingtonpost.com/posteverything/wp/2015/01/14/human-rights-law-is-basically-deadthats-a-good-thing/, Accessed 7/23/2015, rwg)
You might think our international human rights treaties would guide us to the answer. But in reality,
these treaties are broad and do not resolve conflicting sets of values. For example, Article 19 of the International
Covenant on Civil and Political Rights says that the right to freedom of expression is “subject to certain restrictions [as] are necessary [f]or the
protection of national security or of public order … or of public health or morals.” But countries
interpret these restrictions for
public order and morals in greatly different ways. In the United States, we hardly ban any offensive speech
or images. But child pornography is forbidden, as is offensive language on public broadcasts. In Europe, many countries ban
various forms of hate speech, including Holocaust denial, but not images of Mohammad. In many Islamic
countries, a wider range of images and text deemed offensive or blasphemous are banned.
(--) International human rights laws not taken seriously:
Eric Posner, 1/14/2015 (professor at the University of Chicago Law School, “Charlie Hebdo proves just
how broken human rights law is,”
https://www.washingtonpost.com/posteverything/wp/2015/01/14/human-rights-law-is-basically-deadthats-a-good-thing/, Accessed 7/23/2015, rwg)
Most governments did not take these treaties seriously when they ratified them. Moreover, human
rights treaties are often so vague as to be almost meaningless, and unenforceable even when a meaning
can be discerned. Article 19 of the ICCPR is just one of many examples where countries are permitted to balance an interest protected by
a right with the interest in order and morality. The treaties also contain numerous rights unfamiliar to Americans—social and economic rights
that guarantee a minimum income, health care, education, and pensions. Developing countries have interpreted these rights to give them a
“right to development,” and their citizens a “right to security”—which mean that governments can sacrifice political rights when those rights
interfere with efforts to reduce poverty, fight crime, and battle insurgencies. In some cases, governments go too far, but in others, they make
reasonable tradeoffs between freedom and security that westerners do not face, in light of moral traditions westerners do not understand. * *
* The
vagueness of the treaties is no accident. It derives from fundamental disagreement about what
they are supposed to accomplish—about what is the human good, and what is the role of the government in advancing it. During
the Cold War, two diametrically opposed ideological visions—liberal democracy and communism—flourished.
(--) Multiple alternate causes to the US living up to human rights law:
Eric Posner, 1/14/2015 (professor at the University of Chicago Law School, “Charlie Hebdo proves just
how broken human rights law is,”
https://www.washingtonpost.com/posteverything/wp/2015/01/14/human-rights-law-is-basically-deadthats-a-good-thing/, Accessed 7/23/2015, rwg)
Even western countries often fail to live up to the values they espouse. The United States has used torture,
targeted killing, and mass surveillance to defend itself from these new threats. Wars in Afghanistan, Iraq, and
Libya, fought in part under the banner of human rights, brought anarchy rather than improvement in
people’s lives. Many Europeans have turned against their Muslim immigrant populations, some of whom cheer on Islamist radicals in their
homelands. You can expect French security forces to strengthen reliance on profiling and administrative detention after the most recent
terrorist attacks.
(--) Human rights treaties can’t be enforced:
Eric Posner, 1/14/2015 (professor at the University of Chicago Law School, “Charlie Hebdo proves just
how broken human rights law is,”
https://www.washingtonpost.com/posteverything/wp/2015/01/14/human-rights-law-is-basically-deadthats-a-good-thing/, Accessed 7/23/2015, rwg)
The human rights treaties cannot stop these tidal currents. The various institutions created to enforce
them—like the UN Human Rights Council—are paralyzed by disagreement and starved of funds. Russian and
Chinese leaders have deftly exploited ethnic and nationalist sentiments in their populations. Leaders of most non-western countries know that
while significant minorities crave liberal freedoms, the western lifestyle—secular, consumerist, individualist—is repulsive to most of their
people, who no longer believe (if they ever believed) that western human rights are compatible with the practices they cherish. What is there
to do about this? We can start by recognizing three facts: that the
goals of the international human rights movement are
not universally accepted; that the full panoply of western-style rights is not appropriate for all countries;
and that efforts to implement them in foreign countries through law and coercion are not effective ways
of improving people’s lives. Human rights law is a dead letter.
(--) Torture and drone strikes are alternate causes to US human rights credibility:
Eric Posner, 12/4/2014 (professor at the University of Chicago Law School, “The case against human
rights,” http://www.theguardian.com/news/2014/dec/04/-sp-case-against-human-rights, Accessed
7/23/2015, rwg)
We live in an age in which most of the major human rights treaties – there are nine “core” treaties – have been ratified by the vast majority of
countries. Yet it seems that the human rights agenda has fallen on hard times. In much of the Islamic world, women lack
equality, religious dissenters are persecuted and political freedoms are curtailed. The Chinese model of development, which combines political
repression and economic liberalism, has attracted numerous admirers in the developing world. Political authoritarianism has gained ground in
Russia, Turkey, Hungary and Venezuela. Backlashes against LGBT rights have taken place in countries as diverse as Russia and Nigeria. The
traditional champions of human rights – Europe and the United States – have floundered. Europe has turned inward as it has struggled with a
sovereign debt crisis, xenophobia towards its Muslim communities and disillusionment with Brussels. The
United States, which used
torture in the years after 9/11 and continues to kill civilians with drone strikes, has lost much of its
moral authority. Even age-old scourges such as slavery continue to exist. A recent report estimates that nearly 30
million people are forced against their will to work. It wasn’t supposed to be like this.
(--) Human rights treaties have empirically failed to improve human rights:
Eric Posner, 12/4/2014 (professor at the University of Chicago Law School, “The case against human
rights,” http://www.theguardian.com/news/2014/dec/04/-sp-case-against-human-rights, Accessed
7/23/2015, rwg)
The truth is that human rights law has failed to accomplish its objectives. There is little evidence that human
rights treaties, on the whole, have improved the wellbeing of people. The reason is that human rights
were never as universal as people hoped, and the belief that they could be forced upon countries as a
matter of international law was shot through with misguided assumptions from the very beginning. The human
rights movement shares something in common with the hubris of development economics, which in previous decades tried (and failed) to
alleviate poverty by imposing top-down solutions on developing countries. But where development economists have reformed their approach,
the human rights movement has yet to acknowledge its failures. It is time for a reckoning.
(--) China prevents successful international human rights regime:
Eric Posner, 12/4/2014 (professor at the University of Chicago Law School, “The case against human
rights,” http://www.theguardian.com/news/2014/dec/04/-sp-case-against-human-rights, Accessed
7/23/2015, rwg)
The rise of China has also undermined the power of human rights. In recent years, China has worked
assiduously behind the scenes to weaken international human rights institutions and publicly rejected international
criticism of the political repression of its citizens. It has offered diplomatic and economic support to human rights
violators, such as Sudan, that western countries have tried to isolate. Along with Russia, it has used its veto in the UN
security council to limit western efforts to advance human rights through economic pressure and military intervention.
And it has joined with numerous other countries – major emerging powers such as Vietnam, and Islamic countries that fear western
secularisation – to deny many of the core values that human rights are supposed to protect.
AFF Case Updates
Economy Updates
Economic Decline Impact Extensions
(--) Econ decline leads to nuclear war—empirics prove
LaRouche, 11 (Lyndon LaRouche's standing as an internationally known economist, and his
exceptional successes as a long-range forecaster, are the outgrowths of his original discoveries of
physical principle, dating from a project conducted during the 1948-1952 interval. He forecast, that, if
the dominant powers resorted to a combination of increasingly rapacious, monetarist forms of austerity
measures, the result would be, not a new cyclical crisis, but, rather, a systemic crisis, a general
breakdown crisis of the global system. Since the October 1987 U.S. stock-market crisis, and the strategic,
economic, financial, and monetary decisions of the 1989-1992 interval, the existing global financialmonetary system has become locked into the presently erupting series of seismic-like shocks expressing
such a global systemic, or general breakdown crisis. The most recent famous conclusion by LaRouche
came in his July 25, 2007 webcast, on the cusp of the first visible signs of the current world financial
breakdown crisis, when he said, without hedging, that the current bankrupt financial system was
finished. Since that time, LaRouche's credibility in certain limited, but significant U.S. professional
economic circles, and internationally, has skyrocketed, and his international campaign for the return to a
Glass-Steagall standard of banking, and a new agreement among sovereign nation states for a fixed
exchange rate credit system, has gained increasing international support, 11/11/11, “How Economic
Collapse Can Lead to World War”, http://www.larouchepub.com/eiw/public/2011/eirv38n4420111111/23-27_3844.pdf). SZ
Wars—world wars especially—tend to come on in a certain way. It’s been that way during this century. It was that way with
World War I; it was that way with World War II. World War I began with the assassination of U.S. President McKinley, which resulted in a fundamental
change in policy under Presidents Teddy Roosevelt and Woodrow Wilson. Teddy Roosevelt and Woodrow Wilson were allies, in effect, of the British monarchy, in
the British monarchy’s plan for a war against Germany under Edward VII, a war which actually broke out in 1914. The war was obvious; it was coming. It was clear
from 1905 on. It
was associated with a series of international financial and related economic crises. In the
United States, for example, where we had the famous 1907 crisis, 1905-1907 crisis. The Russian-Japanese war of 1905. The
Balkan Wars. They kept coming and coming. And then, suddenly, there was World War I. And then there was World War II. World War II was
essentially set into place when the former chief of the Bank of England, Montagu Norman, together with other British
influences and with support from the Morgan and Harriman banking interests in New York, put Hitler into power in Germany
in January 1933. Once Hitler was consolidated in power, with the death of Hindenburg in 1934, then the march toward World War II became inevitable. One of
the conditions which made this connection, was the fact that the world had gone into a great post Versailles
worldwide depression, which broke out officially with the U.S. stock market collapse in 1929; which became
consolidated with the 1931 collapse of the British pound sterling. And under these conditions, processes unleashed
led to war in 1939. It led to war involving the United States on Dec. 7, 1941. Similar conditions exist now. The world has been, especially
since a foolish decision by President Nixon in 1971, when he destroyed the existing world monetary system, and set into motion a new, so-called floating-exchangerate monetary system—the present IMF system—the world has been sliding downhill overall. Though many people are deceived by lying propaganda, to believe
that there’s prosperity in the United States, there
is no prosperity in the United States, except for the upper 20% of
income brackets. They have more money, more cash. The 80% of the population, does not. ... [LaRouche also describes the economic crisis in Europe and
Africa.] These are the realities. It is in this condition, as this present financial system approaches collapse, that the danger
of war begins to emerge. Now this—the current danger of war came to the surface beginning August of 1998. What happened? Well, the previous
November, October-November, there had been a major financial collapse which had been bailed out with hyperinflationary growth and asset values. That is, the
central banks began printing money, in effect, and pumping money into financial markets— stock markets and other financial markets. So that had led into a new
situation by the Summer of 1998. The blowout occurred. It started with the Russian bond debt. In August of that year, at the same time that President Clinton was
being distracted by being called to testify before the Special Prosecutor, Russia declared bankruptcy, state bankruptcy. As a reaction to this effect, [Vice President]
Al Gore and others, behind the back of the President, pushed through, fraudulently, a bombing attack on a pharmaceutical plant in Sudan. I believe, now the
President knows that was fraudulent; but nothing has been done effectively to correct it. That was the beginning.... You
have a system which is
intrinsically, systemically bankrupt. It cannot be saved. The only thing that can be done, is action by governments
to put the bankrupt financial system and the bankrupted monetary system, into government-supervised financial reorganization; in other words, to apply the
thinking of a Franklin Roosevelt to the current emergency situation. This
creates a crisis, a crisis in which powerful financial interests
are totally panic-stricken, are driven mad by the fact that the system in which their investments are located, is about to be liquidated; that the nationstate which they thought they were eliminating with globalization, is the only institution which can save nations from total destruction. It is under these
conditions that plans to move toward military adventures, even wars, even general wars, and that risk of nuclear war is
pushed by madmen; some in the United States, some in the Congress who don’t even know what they’re doing, as well as in Britain and elsewhere. This
is the situation....
(--) Econ decline will cause nuclear war by 2025
McCoy 2010 (Alfred W. McCoy is the J.R.W. Smail Professor of History at the University of WisconsinMadison. He is the author of A Question of Torture: CIA Interrogation, "From the Cold War to the War
on Terror." Later this year, "Policing America's Empire: The United States, the Philippines, and the Rise
of the Surveillance State," a forthcoming book of his, will explore the influence of overseas
counterinsurgency operations on the spread of internal security measures here at home, 12/6/2010,
“How America will Collapse (by 2025)”, http://www.salon.com/2010/12/06/america_collapse_2025/).
SZ
A soft landing for America 40 years from now? Don’t bet on it. The demise of the United States as the global superpower could come far more quickly
than anyone imagines. If Washington is dreaming of 2040 or 2050 as the end of the American Century , a more realistic assessment of domestic and
global trends suggests that in 2025, just 15 years from now, it could all be over except for the shouting. Despite the aura of omnipotence most empires project, a
look at their history should remind us that they are fragile organisms. So delicate is their ecology of power that, when things start to go truly bad, empires
regularly unravel with unholy speed: just a year for Portugal, two years for the Soviet Union, eight years
for France, 11 years for the Ottomans, 17 years for Great Britain, and, in all likelihood, 22 years for the
United States, counting from the crucial year 2003. Future historians are likely to identify the Bush administration’s rash invasion of Iraq in that year as the start of America’s
downfall. However, instead of the bloodshed that marked the end of so many past empires, with cities burning and civilians slaughtered, this twenty-first century imperial
collapse could come relatively quietly through the invisible tendrils of economic collapse or cyberwarfare. But have no doubt:
when Washington’s global dominion finally ends, there will be painful daily reminders of what such a loss of power means for Americans in every walk of life. As a half-dozen European nations
imperial decline tends to have a remarkably demoralizing impact on a society, regularly
bringing at least a generation of economic privation. As the economy cools, political temperatures rise,
often sparking serious domestic unrest. Available economic, educational, and military data indicate that,
when it comes to U.S. global power, negative trends will aggregate rapidly by 2020 and are likely to reach a critical mass no later than 2030. The
have discovered,
American Century, proclaimed so triumphantly at the start of World War II, will be tattered and fading by 2025, its eighth decade, and could be history by 2030. Significantly, in 2008, the U.S.
National Intelligence Council admitted for the first time that America’s global power was indeed on a declining trajectory. In one of its periodic futuristic reports, Global Trends 2025, the
Council cited “the transfer of global wealth and economic power now under way, roughly from West to East” and “without precedent in modern history,” as the primary factor in the decline of
the “United States’ relative strength — even in the military realm.” Like many in Washington, however, the Council’s analysts anticipated a very long, very soft landing for American global
Under
current projections, the United States will find itself in second place behind China (already the world’s second largest economy) in
economic output around 2026, and behind India by 2050. Similarly, Chinese innovation is on a trajectory toward world leadership in applied
preeminence, and harbored the hope that somehow the U.S. would long “retain unique military capabilities… to project military power globally” for decades to come. No such luck.
science and military technology sometime between 2020 and 2030, just as America’s current supply of brilliant scientists and engineers retires, without adequate replacement by an illeducated younger generation. By 2020, according to current plans, the Pentagon will throw a military Hail Mary pass for a dying empire. It will launch a lethal triple canopy of advanced
aerospace robotics that represents Washington’s last best hope of retaining global power despite its waning economic influence. By that year, however, China’s global network of
communications satellites, backed by the world’s most powerful supercomputers, will also be fully operational, providing Beijing with an independent platform for the weaponization of space
and a powerful communications system for missile- or cyber-strikes into every quadrant of the globe. Wrapped in imperial hubris, like Whitehall or Quai d’Orsay before it, the White House still
seems to imagine that American decline will be gradual, gentle, and partial. In his State of the Union address last January, President Obama offered the reassurance that “I do not accept
second place for the United States of America.” A few days later, Vice President Biden ridiculed the very idea that “we are destined to fulfill [historian Paul] Kennedy’s prophecy that we are
going to be a great nation that has failed because we lost control of our economy and overextended.” Similarly, writing in the November issue of the establishment journal Foreign Affairs, neoliberal foreign policy guru Joseph Nye waved away talk of China’s economic and military rise, dismissing “misleading metaphors of organic decline” and denying that any deterioration in U.S.
65
percent of Americans believed the country was now “in a state of decline.” Already, Australia and Turkey,
traditional U.S. military allies, are using their American-manufactured weapons for joint air and naval
maneuvers with China. Already, America’s closest economic partners are backing away from Washington’s opposition to China’s rigged currency rates. As the president flew
global power was underway. Ordinary Americans, watching their jobs head overseas, have a more realistic view than their cosseted leaders. An opinion poll in August 2010 found that
back from his Asian tour last month, a gloomy New York Times headline summed the moment up this way: “Obama’s Economic View Is Rejected on World Stage, China, Britain and Germany
Challenge U.S., Trade Talks With Seoul Fail, Too.” Viewed historically, the question is not whether the United States will lose its unchallenged global power, but just how precipitous and
wrenching the decline will be. In place of Washington’s wishful thinking, let’s use the National Intelligence Council’s own futuristic methodology to suggest four realistic scenarios for how,
whether with a bang or a whimper, U.S. global power could reach its end in the 2020s (along with four accompanying assessments of just where we are today). The future scenarios include:
economic decline, oil shock, military misadventure, and World War III. While these are hardly the only possibilities when it comes to American decline or even collapse, they offer a window
three main threats exist to America’s dominant position in the
global economy: loss of economic clout thanks to a shrinking share of world trade, the decline of
American technological innovation, and the end of the dollar’s privileged status as the global reserve
currency. By 2008, the United States had already fallen to number three in global merchandise exports, with just 11 percent of them compared to 12 percent for China and 16 percent
for the European Union. There is no reason to believe that this trend will reverse itself. Similarly, American leadership in technological
into an onrushing future. Economic Decline: Present Situation Today,
innovation is on the wane. In 2008, the U.S. was still number two behind Japan in worldwide patent applications with 232,000, but China was closing fast at 195,000, thanks to a blistering 400
: in 2009 the U.S. hit rock bottom in ranking among the 40 nations surveyed by the Information
when it came to “change” in “global innovation-based competitiveness” during the previous
decade. Adding substance to these statistics, in October China’s Defense Ministry unveiled the world’s fastest
supercomputer, the Tianhe-1A, so powerful, said one U.S. expert, that it “blows away the existing No. 1 machine” in
America. Add to this clear evidence that the U.S. education system, that source of future scientists and innovators, has
been falling behind its competitors. After leading the world for decades in 25- to 34-year-olds with university degrees, the country sank to 12th place in 2010.
The World Economic Forum ranked the United States at a mediocre 52nd among 139 nations in the quality of its
university math and science instruction in 2010. Nearly half of all graduate students in the sciences in the U.S. are now
foreigners, most of whom will be heading home, not staying here as once would have happened. By 2025, in other words, the United States is likely to face a critical shortage of
talented scientists. Such negative trends are encouraging increasingly sharp criticism of the dollar’s role as the
world’s reserve currency. “Other countries are no longer willing to buy into the idea that the U.S. knows
best on economic policy,” observed Kenneth S. Rogoff, a former chief economist at the International Monetary Fund. In mid-2009, with the world’s central banks
percent increase since 2000. A harbinger of further decline
Technology & Innovation Foundation
holding an astronomical $4 trillion in U.S. Treasury notes, Russian president Dimitri Medvedev insisted that it was time to end “the artificially maintained unipolar system” based on “one
formerly strong reserve currency.” Simultaneously, China’s central bank governor suggested that the future might lie with a global reserve currency “disconnected from individual nations”
(that is, the U.S. dollar). Take these as signposts of a world to come, and of a possible attempt, as economist Michael Hudson has argued, “to hasten the bankruptcy of the U.S. financial-
After years of swelling deficits fed by incessant warfare in distant lands, in 2020, as long expected, the
U.S. dollar finally loses its special status as the world’s reserve currency. Suddenly, the cost of imports
soars. Unable to pay for swelling deficits by selling now-devalued Treasury notes abroad, Washington is
finally forced to slash its bloated military budget. Under pressure at home and abroad, Washington slowly pulls U.S. forces back from hundreds of
overseas bases to a continental perimeter. By now, however, it is far too late . Faced with a fading superpower incapable of paying the bills,
China, India, Iran, Russia, and other powers, great and regional, provocatively challenge U.S. dominion
over the oceans, space, and cyberspace. Meanwhile, amid soaring prices, ever-rising unemployment, and a continuing decline in real wages,
domestic divisions widen into violent clashes and divisive debates, often over remarkably irrelevant issues. Riding a
political tide of disillusionment and despair, a far-right patriot captures the presidency with thundering
rhetoric, demanding respect for American authority and threatening military retaliation or economic
reprisal. The world pays next to no attention as the American Century ends in silence. Oil Shock: Present Situation One casualty of America’s waning economic power has been its lock
military world order.” Economic Decline: Scenario 2020
on global oil supplies. Speeding by America’s gas-guzzling economy in the passing lane, China became the world’s number one energy consumer this summer, a position the U.S. had held for
over a century. Energy specialist Michael Klare has argued that this change means China will “set the pace in shaping our global future.” By 2025, Iran and Russia will control almost half of the
world’s natural gas supply, which will potentially give them enormous leverage over energy-starved Europe. Add petroleum reserves to the mix and, as the National Intelligence Council has
warned, in just 15 years two countries, Russia and Iran, could “emerge as energy kingpins.” Despite remarkable ingenuity, the major oil powers are now draining the big basins of petroleum
reserves that are amenable to easy, cheap extraction. The real lesson of the Deepwater Horizon oil disaster in the Gulf of Mexico was not BP’s sloppy safety standards, but the simple fact
everyone saw on “spillcam”: one of the corporate energy giants had little choice but to search for what Klare calls “tough oil” miles beneath the surface of the ocean to keep its profits up.
Compounding the problem, the Chinese and Indians have suddenly become far heavier energy consumers. Even if fossil fuel supplies were to remain constant (which they won’t), demand, and
so costs, are almost certain to rise — and sharply at that. Other developed nations are meeting this threat aggressively by plunging into experimental programs to develop alternative energy
sources. The United States has taken a different path, doing far too little to develop alternative sources while, in the last three decades, doubling its dependence on foreign oil imports.
Between 1973 and 2007, oil imports have risen from 36 percent of energy consumed in the U.S. to 66 percent. Oil Shock: Scenario 2025 The United States remains so dependent upon foreign
oil that a few adverse developments in the global energy market in 2025 spark an oil shock. By comparison, it makes the 1973 oil shock (when prices quadrupled in just months) look like the
proverbial molehill. Angered at the dollar’s plummeting value, OPEC oil ministers, meeting in Riyadh, demand future energy payments in a “basket” of Yen, Yuan, and Euros. That only hikes the
cost of U.S. oil imports further. At the same moment, while signing a new series of long-term delivery contracts with China, the Saudis stabilize their own foreign exchange reserves by
switching to the Yuan. Meanwhile, China pours countless billions into building a massive trans-Asia pipeline and funding Iran’s exploitation of the world largest percent natural gas field at
South Pars in the Persian Gulf. Concerned that the U.S. Navy might no longer be able to protect the oil tankers traveling from the Persian Gulf to fuel East Asia, a coalition of Tehran, Riyadh,
and Abu Dhabi form an unexpected new Gulf alliance and affirm that China’s new fleet of swift aircraft carriers will henceforth patrol the Persian Gulf from a base on the Gulf of Oman. Under
heavy economic pressure, London agrees to cancel the U.S. lease on its Indian Ocean island base of Diego Garcia, while Canberra, pressured by the Chinese, informs Washington that the
Seventh Fleet is no longer welcome to use Fremantle as a homeport, effectively evicting the U.S. Navy from the Indian Ocean. With just a few strokes of the pen and some terse
announcements, the “Carter Doctrine,” by which U.S. military power was to eternally protect the Persian Gulf, is laid to rest in 2025. All the elements that long assured the United States
limitless supplies of low-cost oil from that region — logistics, exchange rates, and naval power — evaporate. At this point, the U.S. can still cover only an insignificant 12 percent of its energy
needs from its nascent alternative energy industry, and remains dependent on imported oil for half of its energy consumption. The oil shock that follows hits the country like a hurricane,
sending prices to startling heights, making travel a staggeringly expensive proposition, putting real wages (which had long been declining) into freefall, and rendering non-competitive
whatever American exports remained. With thermostats dropping, gas prices climbing through the roof, and dollars flowing overseas in return for costly oil, the American economy is
paralyzed. With long-fraying alliances at an end and fiscal pressures mounting, U.S. military forces finally begin a staged withdrawal from their overseas bases. Within a few years, the U.S. is
functionally bankrupt and the clock is ticking toward midnight on the American Century. Military Misadventure: Present Situation Counterintuitively, as their power wanes, empires often
plunge into ill-advised military misadventures. This phenomenon is known among historians of empire as “micro-militarism” and seems to involve psychologically compensatory efforts to salve
the sting of retreat or defeat by occupying new territories, however briefly and catastrophically. These operations, irrational even from an imperial point of view, often yield hemorrhaging
expenditures or humiliating defeats that only accelerate the loss of power. Embattled empires through the ages suffer an arrogance that drives them to plunge ever deeper into military
misadventures until defeat becomes debacle. In 413 BCE, a weakened Athens sent 200 ships to be slaughtered in Sicily. In 1921, a dying imperial Spain dispatched 20,000 soldiers to be
massacred by Berber guerrillas in Morocco. In 1956, a fading British Empire destroyed its prestige by attacking Suez. And in 2001 and 2003, the U.S. occupied Afghanistan and invaded Iraq.
With the hubris that marks empires over the millennia, Washington has increased its troops in Afghanistan to 100,000, expanded the war into Pakistan, and extended its commitment to 2014
and beyond, courting disasters large and small in this guerilla-infested, nuclear-armed graveyard of empires. Military Misadventure: Scenario 2014 So irrational, so unpredictable is “micromilitarism” that seemingly fanciful scenarios are soon outdone by actual events. With the U.S. military stretched thin from Somalia to the Philippines and tensions rising in Israel, Iran, and
Korea, possible combinations for a disastrous military crisis abroad are multifold. It’s mid-summer 2014 and a drawn-down U.S. garrison in embattled Kandahar in southern Afghanistan is
suddenly, unexpectedly overrun by Taliban guerrillas, while U.S. aircraft are grounded by a blinding sandstorm. Heavy loses are taken and in retaliation, an embarrassed American war
commander looses B-1 bombers and F-16 fighters to demolish whole neighborhoods of the city that are believed to be under Taliban control, while AC-130U “Spooky” gunships rake the rubble
with devastating cannon fire. Soon, mullahs are preaching jihad from mosques throughout the region, and Afghan Army units, long trained by American forces to turn the tide of the war, begin
to desert en masse. Taliban fighters then launch a series of remarkably sophisticated strikes aimed at U.S. garrisons across the country, sending American casualties soaring. In scenes
reminiscent of Saigon in 1975, U.S. helicopters rescue American soldiers and civilians from rooftops in Kabul and Kandahar. Meanwhile, angry at the endless, decades-long stalemate over
Palestine, OPEC’s leaders impose a new oil embargo on the U.S. to protest its backing of Israel as well as the killing of untold numbers of Muslim civilians in its ongoing wars across the Greater
Middle East. With gas prices soaring and refineries running dry, Washington makes its move, sending in Special Operations forces to seize oil ports in the Persian Gulf. This, in turn, sparks a
rash of suicide attacks and the sabotage of pipelines and oil wells. As black clouds billow skyward and diplomats rise at the U.N. to bitterly denounce American actions, commentators
worldwide reach back into history to brand this “America’s Suez,” a telling reference to the 1956 debacle that marked the end of the British Empire. World War III: Present Situation In the
summer of 2010, military tensions between the U.S. and China began to rise in the western Pacific, once considered an American “lake.” Even a year earlier no one would have predicted such a
development. As Washington played upon its alliance with London to appropriate much of Britain’s global power after World War II, so China is now using the profits from its export trade with
the U.S. to fund what is likely to become a military challenge to American dominion over the waterways of Asia and the Pacific. With its growing resources, Beijing is claiming a vast maritime
arc from Korea to Indonesia long dominated by the U.S. Navy. In August, after Washington expressed a “national interest” in the South China Sea and conducted naval exercises there to
reinforce that claim, Beijing’s official Global Times responded angrily, saying, “The U.S.-China wrestling match over the South China Sea issue has raised the stakes in deciding who the real
future ruler of the planet will be.” Amid growing tensions, the Pentagon reported that Beijing now holds “the capability to attack… [U.S.] aircraft carriers in the western Pacific Ocean” and
target “nuclear forces throughout… the continental United States.” By developing “offensive nuclear, space, and cyber warfare capabilities,” China seems determined to vie for dominance of
what the Pentagon calls “the information spectrum in all dimensions of the modern battlespace.” With ongoing development of the powerful Long March V booster rocket, as well as the
launch of two satellites in January 2010 and another in July, for a total of five, Beijing signaled that the country was making rapid strides toward an “independent” network of 35 satellites for
global positioning, communications, and reconnaissance capabilities by 2020. To check China and extend its military position globally, Washington is intent on building a new digital network of
air and space robotics, advanced cyberwarfare capabilities, and electronic surveillance. Military planners expect this integrated system to envelop the Earth in a cyber-grid capable of blinding
entire armies on the battlefield or taking out a single terrorist in field or favela. By 2020, if all goes according to plan, the Pentagon will launch a three-tiered shield of space drones — reaching
from stratosphere to exosphere, armed with agile missiles, linked by a resilient modular satellite system, and operated through total telescopic surveillance. Last April, the Pentagon made
history. It extended drone operations into the exosphere by quietly launching the X-37B unmanned space shuttle into a low orbit 255 miles above the planet. The X-37B is the first in a new
generation of unmanned vehicles that will mark the full weaponization of space, creating an arena for future warfare unlike anything that has gone before. World War III: Scenario 2025 The
technology of space and cyberwarfare is so new and untested that even the most outlandish scenarios may soon be superseded by a reality still hard to conceive. If we simply employ the sort
of scenarios that the Air Force itself used in its 2009 Future Capabilities Game, however, we can gain “a better understanding of how air, space and cyberspace overlap in warfare,” and so
begin to imagine how the next world war might actually be fought. It’s 11:59 p.m. on Thanksgiving Thursday in 2025. While cyber-shoppers pound the portals of Best Buy for deep discounts on
the latest home electronics from China, U.S. Air Force technicians at the Space Surveillance Telescope (SST) on Maui choke on their coffee as their panoramic screens suddenly blip to black.
Thousands of miles away at the U.S. CyberCommand’s operations center in Texas, cyberwarriors soon detect malicious binaries that, though fired anonymously, show the distinctive digital
fingerprints of China’s People’s Liberation Army. ADVERTISEMENT The first overt strike is one nobody predicted. Chinese “malware” seizes control of the robotics aboard an unmanned solarpowered U.S. “Vulture” drone as it flies at 70,000 feet over the Tsushima Strait between Korea and Japan. It suddenly fires all the rocket pods beneath its enormous 400-foot wingspan,
sending dozens of lethal missiles plunging harmlessly into the Yellow Sea, effectively disarming this formidable weapon. Determined to fight fire with fire, the White House authorizes a
retaliatory strike. Confident that its F-6 “Fractionated, Free-Flying” satellite system is impenetrable, Air Force commanders in California transmit robotic codes to the flotilla of X-37B space
drones orbiting 250 miles above the Earth, ordering them to launch their “Triple Terminator” missiles at China’s 35 satellites. Zero response. In near panic, the Air Force launches its Falcon
Hypersonic Cruise Vehicle into an arc 100 miles above the Pacific Ocean and then, just 20 minutes later, sends the computer codes to fire missiles at seven Chinese satellites in nearby orbits.
The launch codes are suddenly inoperative. As the Chinese virus spreads uncontrollably through the F-6 satellite architecture, while those second-rate U.S. supercomputers fail to crack the
malware’s devilishly complex code, GPS signals crucial to the navigation of U.S. ships and aircraft worldwide are compromised. Carrier fleets begin steaming in circles in the mid-Pacific. Fighter
squadrons are grounded. Reaper drones fly aimlessly toward the horizon, crashing when their fuel is exhausted. Suddenly, the United States loses what the U.S. Air Force has long called “the
ultimate high ground”: space. Within hours, the military power that had dominated the globe for nearly a century has been defeated in World War III without a single human casualty. A New
World Order? Even if future events prove duller than these four scenarios suggest, every significant trend points toward a far more striking decline in American global power by 2025 than
anything Washington now seems to be envisioning. As allies worldwide begin to realign their policies to take cognizance of rising Asian powers, the cost of maintaining 800 or more overseas
military bases will simply become unsustainable, finally forcing a staged withdrawal on a still-unwilling Washington. With both the U.S. and China in a race to weaponize space and cyberspace,
tensions between the two powers are bound to rise, making military conflict by 2025 at least feasible, if hardly guaranteed. Complicating matters even more, the economic, military, and
technological trends outlined above will not operate in tidy isolation. As happened to European empires after World War II, such negative forces will undoubtedly prove synergistic. They will
combine in thoroughly unexpected ways, create crises for which Americans are remarkably unprepared, and threaten to spin the economy into a sudden downward spiral, consigning this
country to a generation or more of economic misery. As U.S. power recedes, the past offers a spectrum of possibilities for a future world order. At one end of this spectrum, the rise of a new
global superpower, however unlikely, cannot be ruled out. Yet both China and Russia evince self-referential cultures, recondite non-roman scripts, regional defense strategies, and
underdeveloped legal systems, denying them key instruments for global dominion. At the moment then, no single superpower seems to be on the horizon likely to succeed the U.S. In a dark,
dystopian version of our global future, a coalition of transnational corporations, multilateral forces like NATO, and an international financial elite could conceivably forge a single, possibly
unstable, supra-national nexus that would make it no longer meaningful to speak of national empires at all. While denationalized corporations and multinational elites would assumedly rule
such a world from secure urban enclaves, the multitudes would be relegated to urban and rural wastelands. In “Planet of Slums,” Mike Davis offers at least a partial vision of such a world from
the bottom up. He argues that the billion people already packed into fetid favela-style slums worldwide (rising to two billion by 2030) will make “the ‘feral, failed cities’ of the Third World… the
distinctive battlespace of the twenty-first century.” As darkness settles over some future super-favela, “the empire can deploy Orwellian technologies of repression” as “hornet-like helicopter
gun-ships stalk enigmatic enemies in the narrow streets of the slum districts… Every morning the slums reply with suicide bombers and eloquent explosions.” At a midpoint on the spectrum of
possible futures, a new global oligopoly might emerge between 2020 and 2040, with rising powers China, Russia, India, and Brazil collaborating with receding powers like Britain, Germany,
Japan, and the United States to enforce an ad hoc global dominion, akin to the loose alliance of European empires that ruled half of humanity circa 1900. Another possibility: the rise of
regional hegemons in a return to something reminiscent of the international system that operated before modern empires took shape. In this neo-Westphalian world order, with its endless
vistas of micro-violence and unchecked exploitation, each hegemon would dominate its immediate region — Brasilia in South America, Washington in North America, Pretoria in southern
Africa, and so on. Space, cyberspace, and the maritime deeps, removed from the control of the former planetary “policeman,” the United States, might even become a new global commons,
controlled through an expanded U.N. Security Council or some ad hoc body. All of these scenarios extrapolate existing trends into the future on the assumption that Americans, blinded by the
arrogance of decades of historically unparalleled power, cannot or will not take steps to manage the unchecked erosion of their global position. If America’s decline is in fact on a 22-year
trajectory from 2003 to 2025, then we have already frittered away most of the first decade of that decline with wars that distracted us from long-term problems and, like water tossed onto
desert sands, wasted trillions of desperately needed dollars. If only 15 years remain, the odds of frittering them all away still remain high. Congress and the president are now in gridlock; the
American system is flooded with corporate money meant to jam up the works; and there is little suggestion that any issues of significance, including our wars, our bloated national security
state, our starved education system, and our antiquated energy supplies, will be addressed with sufficient seriousness to assure the sort of soft landing that might maximize our country’s role
and prosperity in a changing world. Europe’s empires are gone and America’s imperium is going. It seems increasingly doubtful that the United States will have anything like Britain’s success in
shaping a succeeding world order that protects its interests, preserves its prosperity, and bears the imprint of its best values.
(--) Econ decline cause nuclear war
Lieberthal and O’Hanlon, 2012 (Kenneth Lieberthal and Michael O'Hanlon are foreign policy
scholars at the Brookings Institution and coauthors with Martin Indyk of "Bending History: Barack
Obama's Foreign Policy, 7/3/12, “The Real National Security Threat: America’s debt”,
http://articles.latimes.com/2012/jul/03/opinion/la-oe-ohanlon-fiscal-reform-20120703). SZ
Drones, kill lists, computer viruses and administration leaks are all the rage in the current political debate. They indeed merit serious scrutiny at a time when the rules of war, and technologies
available for war, are changing fast. That said, these issues are not the foreign policy centerpiece of the 2012 presidential race. Economic renewal and fiscal reform have become the
preeminent issues, not only for domestic and economic policy but for foreign policy as well. As the former chairman of the Joint Chiefs of Staff, Adm.Michael G. Mullen, was fond of saying,
national debt has become perhaps our top national security threat. And neither major presidential candidate is doing enough about it.
This issue needs to be framed as crucial not just for our future prosperity but for international stability as well. The United States has been running trillion-dollar deficits, resulting in a huge
explosion in the country's indebtedness. Publicly held debt now equals 70% of gross domestic product, a threshold many economists consider significant and highly worrisome. Making matters
, half of our current deficit financing is being provided by foreigners
worse
. We are getting by with low interest rates and tolerable levels
of domestic investment only because they find U.S. debt attractive, which may not last. COMMENTARY AND ANALYSIS: Presidential Election 2012 According to the nonpartisan Committee for a
Responsible Federal Budget, President Obama's long-term budget plan would allow publicly held debt as a fraction of GDP to rise further, up to 75%, within a decade. Mitt Romney's proposal,
featuring tax cuts and defense spending increases and as-yet-unspecified (and thus less than fully credible) entitlement reform, appears worse. It would probably drive publicly held debt to
95% of GDP over the same period. Put differently, though both are serious and pragmatic men, neither major party's presidential candidate is adequately stepping up to the plate, with
? First, we are headed for a level of debt that within a decade
could require us to spend the first trillion dollars of every year's federal budget servicing that debt.
Much less money will be left for other things. That is a prescription for a vicious cycle of underfinancing for our infrastructure, national education efforts,
science research and all the other functions of government that are crucial to long-term economic growth. Robust defense spending will be
Romney's plan the more troubling of the two. Why is this situation so serious
unsustainable too. Once we get in this rut, getting out will be very hard. Second, such a chronic economic decline would undercut what
has been 70 years of strong national political consensus in favor of an activist and engaged American
foreign policy. One reason the United States was so engaged through the Cold War and the first 20 years of the post-Cold War world was fear of threats. But the other reason was
that the strategy was associated with improvements in our quality of life as well. America became even more prosperous, and all major segments of society benefited. Alas, globalization and
. Another decade of
underinvestment in what is required to remedy this situation will make an isolationist or populist
president far more likely because much of the country will question whether an internationalist role
makes sense for America — especially if it costs us well over half a trillion dollars in defense spending
annually yet seems correlated with more job losses. Lastly, American economic weakness undercuts U.S.
leadership abroad. Other countries sense our weakness and wonder about our purported decline. If this
perception becomes more widespread, and the case that we are in decline becomes more persuasive,
countries will begin to take actions that reflect their skepticism about America's future. Allies and
friends will doubt our commitment and may pursue nuclear weapons for their own security, for example;
automation trends of the last generation have increasingly called the American dream into question for the working classes
adversaries will sense opportunity and be less restrained in throwing around their weight in their own neighborhoods. The crucial Persian Gulf and Western Pacific regions will likely become
Major war will become more likely
less stable.
. When running for president last time, Obama eloquently articulated big foreign policy visions: healing America's
breach with the Muslim world, controlling global climate change, dramatically curbing global poverty through development aid, moving toward a world free of nuclear weapons. These were,
and remain, worthy if elusive goals. However, for Obama or his successor, there is now a much more urgent big-picture issue: restoring U.S. economic strength. Nothing else is really possible if
that fundamental prerequisite to effective foreign policy is not reestablished.
Economic Decline Impacts--Racism
Econ decline leads to more racism
Connor 14 (Steve Connor is the Science Editor of The Independent and i. He has won many awards for
his journalism, including five-times winner of the prestigious British science writers’ award; the David
Perlman Award of the American Geophysical Union; four times highly commended as specialist
journalist of the year in the UK Press Awards; UK health journalist of the year and a special merit award
of the European School of Oncology for his investigations into the tobacco industry. He has a degree in
zoology from the University of Oxford and has a special interest in genetics and medical science, human
evolution and origins, climate change and the environment, 6/9/14, “Financial hardship can make
people more racist, scientists claim”, http://www.independent.co.uk/news/science/financial-hardshipcan-make-people-more-racist-scientists-claim-9516092.html). SZ
People unwittingly become more racially aware and less generous towards those of a different skin tone
when they feel financially squeezed, according to a study showing how racism thrives in an economic
recession. A series of psychological tests has revealed the deep-seated prejudices of white people towards black faces
when they experience financial pressures resulting from an economic downturn similar to the global crash of 2008. When
times are hard, people are more likely to judge mixed-race individuals as “black”. Previous research in the US has shown
that the more prototypically black a person is judged to be, the more likely they are to be socially
excluded, shot when unarmed in police training tests, or sentenced to death after a guilty verdict The latest
findings indicate that racial stereotyping and discrimination in a recession is not just to do with institutional racism
but a psychological frame of mind, the researchers have suggested. “When the economy declines, racial minorities are
hit the hardest. Although existing explanations for this effect focus on institutional causes, recent psychological findings suggest that scarcity may also alter
perceptions of race in ways that exacerbate discrimination,” according to Amy Krosch and David Amodio of New York University. “We tested
the hypothesis that economic resource scarcity causes decision makers to perceive African Americans as ‘blacker’
and that this visual distortion elicits disparities in the allocation of resources,” they write in the journal Proceedings of the
National Academy of Sciences. The study involved a series of tests. The first investigated how non-black volunteers judged the race of an individual based on a series of 110 morphed faces that
ranged from 100 per cent white to 100 per cent black. Those who believed that white and black people were competing with one another for resources – judged from questionnaires – were
more likely to categorise mixed-race faces as “black” compared with people who did not see competition between the races. The same test was run when the volunteers were exposed to
“subliminal” messages in the form of key words flashed on a screen for a few milliseconds. When words indicating a heightened sense of resource scarcity were used, the volunteers showed a
lower threshold for identifying mixed-races faces as black, the researchers found. A further test showed that the non-black volunteers were more likely to judge a face as “black” when they felt
the blacker the perceived skin tone of an individual,
the more discrimination they face in predominately white society. “It is well known that socioeconomic disparities between white
Americans and racial minorities expand dramatically under conditions of economic scarcity,” said Professor Amodio, the study’s senior author. “Our findings indicate that scarcity
changes the way that the people visually perceive another person’s race, and that this perceptual
distortion can contribute to disparities,” he said. Racial disparities in household wealth are known to
increase significantly between white Americans and African Americans during a recession and this has
been largely explained by institutional racism but the latest findings suggest a subconscious form of
racial prejudice, said Ms Krosch. “The study’s findings point to a new challenge to discrimination reduction, since perceptual effects appear to operate without a person’s
they had been short-changed from a hypothetical endowment. The researchers point out that
awareness. People typically assume that what they see is an accurate representation of the world, so if their initial perceptions of race are actually distorted by economic factors, people may
not even realise the potential for bias,” she said.
Internet Advantage Extensions
Internet Key to Economy Extensions
(--) Internet k2 econ development
Palis, 12 (Courteney Palis is a writer for the Huffington Post,
http://www.huffingtonpost.com/2012/03/20/internet-economy-infographic_n_1363592.html, “Internet
Economy: How Essential Is The Internet To The U.S.? (INFOGRAPHIC)”, 3/20/12). SZ
Over the last 10 years, the Internet has grown to become a fundamental part of our society. According to
Nielsen data, 274.2 million Americans were hooked up to the Internet in 2011 (more than double the number with
access in 2000) and spent 81 billion minutes on social networks and blogs. And now that the Internet is almost always at
hand -- last year 117.6 million people visited the Internet via a mobile device, per Nielsen -- it's not much of a surprise that
Americans spent a total of $256 billion on retail and travel-related purchases online in 2011, a 12-percent
increase from 2010, as noted in data released by comScore in February. So exactly how essential has the Internet become to the U.S. economy
offline? Global management consulting firm Boston Consulting Group (BCG) sought to explore that question with $4.2 Trillion Opportunity: The
Internet Economy in the G-20, a March 19 report focusing on the Internet's impact on the world's top economies. The report, a second release
for BCG's Connected World series states that
by 2016, there will be approximately three billion Internet users
globally. (To put that into perspective, the total number of global 'net users is currently pegged at 2.267 billion, based on Internet World
Data's latest figures from December 2011.) In the same year, the combined Internet economy among G-20 member
nations is expected to reach nearly $4.2 trillion. Furthermore, BCG senior partner and co-author of the report David Dean said
in a company press release, "If [the Internet] were a national economy, it would rank in the world's top five,
behind only the U.S., China, India, and Japan, and ahead of Germany." The report finds that in the coming years,
online economies will play an even larger role in the economies of both developed and developing
countries. In the U.S., the Internet economy accounted for 4.7 percent of the country's 2010 Gross Domestic
product (GDP) of $14.5 trillion, or approximately $68.2 billion. That number is expected to pass $100 billion in 2016,
when the Internet economy is projected to comprise about 5.4 percent of the country's estimated GDP
of $18.6 trillion. At present, the Internet contributes more of a percentage to America's GDP than traditional
industry sectors like information and technical services, construction, education, agriculture, and arts,
entertainment, and recreation. And it comprises about 5 percent or $252 billion of all retail. BCG researchers
also asked U.S. 'net users how much online access meant to them. According to BCG's report, 73 percent of Americans would give up alcohol,
77 percent would give up chocolate and 21 percent would give up sex instead of going without the Internet for a year. Outside of the U.S., the
Internet's impact on the economies and societies of other G-20 nations has also been large. According to the report, there
are 800
million people surfing the web in developing G-20 countries. That's more than the combined number of
Internet users in all developed G-20 countries. One of these developing nations, India, has an Internet
economy growth rate of 23 percent, second only to Argentina's 24.3 percent, reported The Times of India. Indian online
consumers find the Internet so essential that 36 percent told BCG that they would forgo showering for a year, 64 percent would cease eating
chocolate, and 70 percent would give up alcohol -- just to keep Internet access. Meanwhile, the U.K.'s Internet economy comprises a larger
percentage of its whole economy than that of any other country. According to the BBC, the Internet contributes about 8.3 percent to the
country's whole economy and will continue to grow as the years pass.
(--) Internet k2 econ
Dean et al, 12 (Dr. David Dean is a Senior Partner, Senior Advisor, and Managing Director at The
Boston Consulting Group GmbH. Dr. Dean served as a Senior Vice President at The Boston Consulting
Group GmbH. For several years, he was the global leader of BCG's technology, media and
telecommunications practice. For more than 28 years, he has worked with many high-tech and
telecommunications companies around the world on issues of strategy and corporate development,
globalization, organization, “The Internet Economy in G-20”,
https://www.bcgperspectives.com/content/articles/media_entertainment_strategic_planning_4_2_trilli
on_opportunity_internet_economy_g20/?chapter=2#chapter2, 3/19/12). SZ
Since the day the first domain was registered in 1985, the Internet has not stopped growing. It has sailed through
multiple recessions and one near-collapse and kept on increasing in use, size, reach, and impact. It has
ingrained itself in daily life to the extent that most of us no longer think of it as anything new or special. The Internet has become,
quite simply, indispensible. By 2016, there will be 3 billion Internet users globally—almost half the world’s population.
The Internet economy will reach $4.2 trillion in the G-20 economies. If it were a national economy, the Internet economy would rank in the
world’s top five, behind only the U.S., China, Japan, and India, and ahead of Germany. Across the G-20, it already amounted to 4.1 percent of
GDP, or $2.3 trillion, in 2010—surpassing the economies of Italy and Brazil. The Internet is contributing up to 8 percent of GDP in some
economies, powering growth, and creating jobs. The scale and pace of change is still accelerating, and the nature of the
Internet—who uses it, how, and for what—is changing rapidly too. Developing G-20 countries already have 800 million Internet users, more
than all the developed G-20 countries combined.
Social networks reach about 80 percent of users in developed and
developing economies alike. Mobile devices—smartphones and tablets—will account for four out of five broadband connections by
2016. The speed of these developments is often overlooked. Technology has long been characterized by exponential growth—in processing
speed, bandwidth, and data storage, among other things—going back to Gordon Moore’s observation nearly five decades ago. The Intel 80386
microprocessor, introduced in the same year as that first domain name, held 275,000 transistors. Today, Intel’s Core i7 Sandy Bridge-E
processor holds 2.27 billion transistors, or nearly 213 times as many. As the growth motors along, it is easy to lose track of just how large the
exponential numbers get. The power of exponential growth is illustrated by an ancient fable, repopularized by Ray Kurzweil in his book, The Age
of Spiritual Machines. It tells of a rich ruler who agrees to reward an enterprising subject starting with one grain of rice on the first square of a
chessboard, then doubling the number of grains on each of the succeeding 63 squares. The ruler thinks he’s getting off easy, and by the thirtysecond square, he owes a mound weighing 100,000 kilograms, a large but manageable amount. It’s in the second half of the chessboard that
the real fun starts. Quickly, 100,000 becomes 400,000, then 1.6 million, and keeps growing. By the sixty-fourth square, the ruler owes his
subject 461 billion metric tons, more than 4 billion times as much as on the first half of the chessboard, and about 1,000 times global rice
production in 2010. The Internet has moved into the second half of the chessboard. (See Exhibit 1.)
It has reached a scale and level
of impact that no business, industry, or government can ignore. And like any technological phenomenon with its scale
and speed, it presents myriad opportunities, which consumers have been quick and enthusiastic to grasp.
Businesses, particularly small and medium enterprises (SMEs)—the growth engine of most economies—
have been uneven in their uptake, but they are moving online in increasing numbers and with an
increasingly intense commitment. There are threats too, some misunderstood, and policymakers and regulators alike are
challenged to make the right choices in a fast-moving environment. As is often the case with fast-paced change and complex issues, many
governments are still trying to determine what their role should be. Meanwhile the rice pile on the next square keeps getting bigger. This report
assesses the far-reaching economic impact of the Internet. It shows how the benefits are large and getting larger, identifies the
drivers behind them, and examines their clout. It quantifies gains—economic growth, consumer value, and jobs—in the context of the
no one—individual, business, or government—can afford to ignore the ability of the
Internet to deliver more value and wealth to more consumers and citizens more broadly than any
economic development since the Industrial Revolution. The economic impact of the Internet is getting bigger—just about
everywhere—and it already has an enormous base. In the U.K., for example, the Internet’s contribution to
2010 GDP is more than that of construction and education. In the U.S., it exceeds the federal
government’s percentage of GDP. The Internet economy would rank among the top six industry sectors
in China and South Korea. Policymakers in developed countries cite with envy the GDP growth rates of 5
to 10 percent per year being achieved in China and India, particularly in today’s troubled economic
environment. At the same time, they can often look past similar, or even higher, rates close to home. The Internet economy in
the developed markets of the G-20 will grow at an annual rate of 8 percent over the next five years, far
outpacing just about every traditional economic sector, producing both wealth and jobs. The contribution to
GDP will rise to 5.7 percent in the EU and 5.3 percent for the G-20. Growth rates will be more than twice as fast—an average
annual rate of 18 percent—in developing markets, some of which are banking on a digital future with big investments in broadband
infrastructure. Overall, the Internet economy of the G-20 will nearly double between 2010 and 2016, when it
will employ 32 million more people than it does today. The growth is being fueled in large part by two factors: more users
economies of the G-20. It demonstrates that
and faster, more ubiquitous access. The number of users around the globe will rise to a projected 3 billion in 2016 from 1.9 billion in 2010.
Broadening access, particularly via smartphones and other mobile devices, and the popularity of social media are further compounding the
Internet’s impact. In the developing world in particular, many consumers are going “straight to social.” (See Exhibit 2.) National levels of
Internet economic activity generally track the BCG e-Intensity Index, which measures each country’s level of enablement (the amount of
Internet infrastructure that it has in place), expenditure (the amount of money spent on online retail and online advertising), and engagement
(the degree to which businesses, governments, and consumers are involved with the Internet). Big differences are apparent among the 50
countries examined, with five clusters emerging according to their performance on the index in absolute terms and relative to per capita GDP.
(See Exhibit 3.) Consumption is the
principal driver of Internet GDP in most countries, typically representing
more than 50 percent of the total in 2010. It will remain the largest single driver through 2016. Investment, mainly in
infrastructure, accounts for a higher portion of the total in “aspirant” nations as they are in the earlier stages of development. Several
“natives” on BCG’s e-Intensity Index—the U.K., South Korea, and Japan—are among those nations with
the largest Internet contributions to GDP. China and India stand out for their enormous Internet-related
exports—China in goods, India in services—which propel their Internet-economy rankings toward the top of the chart.
Mexico and South Korea have also developed significant Internet export sectors. Among G-20 “players,” the
United States benefits from a vibrant Internet economy, while Germany and France tend to lag. The picture will change by 2016 as, for
example, the Internet economies of India and the EU-27 grow rapidly to move into the top five. (See Exhibits 4 and 5.) Retail represents almost
one-third of total GDP in the G-20, and online retail contributes a significant and increasing share in many countries. (See Exhibit 6.) Nowhere is
the impact more apparent than in the U.K. Thanks
in part to high Internet penetration, efficient delivery
infrastructure, a competitive retail market, and high credit-card usage, the U.K. has become a nation of
digital shopkeepers, to paraphrase Adam Smith. Several European economies—Denmark, the Netherlands, Sweden, and the U.K.—to
name but four—perform strongly on BCG’s e-Intensity Index. But various barriers hold back the EU as a whole, the world’s biggest single
market, when it comes to cross-border e-commerce. In January, the European Commission announced plans to catch up, removing these
impediments and creating a “digital single market.” The commission believes that
e-commerce can double its share of overall
retail sales by 2015. As significant as the GDP figures are, they capture only part of the story. In retail alone, G-20 consumers
researched online and then purchased offline (ROPO) more than $1.3 trillion in goods in 2010—the
equivalent of about 7.8 percent of consumer spending, or more than $900 per connected consumer.
ROPO is a bigger factor in developed economies, as one would expect, but consumers everywhere research a wide variety of products online
before purchasing them elsewhere. In China, groceries are a popular ROPO purchase; in the United States, cars; India, technology products;
Brazil, electronics, appliances, and travel packages. Multiple factors affect e-commerce and ROPO. In addition to regulatory barriers like those
cited above, the state of infrastructure for online and bricks-and-mortar retail plays a big role, as do Internet penetration, credit-card use, and
consumer confidence in online payment systems, delivery, and fulfillment. ROPO spending is higher than online retail in virtually all the nations
we studied. (See Exhibit 7.) In
the U.S., online retail sales totaled $252 billion in 2010, and ROPO added another
$482 billion. ROPO dwarfs online retail in Turkey—$37 billion compared with $2 billion—owing in large part to poor delivery infrastructure
and consumer concern over fulfillment. In Mexico, although low credit-card penetration and security concerns over online payments hold back
online commerce, Mexican consumers without credit cards can pay for their online purchases at 7-Eleven stores. Like the U.S., Japan has a busy
online retail market, which totaled $89 billion in 2010. ROPO added $139 billion because Japanese consumers still prefer the experience of
shopping in stores. Across the G-20, ROPO would add an additional 2.7 percent if it were counted as part of Internet GDP. Mobile
shopping—using a smartphone to identify deals, compare products and prices, and “seal the deal” while
on the go—is growing in popularity worldwide. As device prices fall, especially in developing markets, increased smartphone
penetration will have a dramatic impact on both retail commerce and e-commerce—further blurring the lines between online and offline
buying. Mobile
apps such as RedLaser, Google Shopper, and Amazon Remembers make it ever easier for consumers to
research products, compare deals, and make purchases as they see fit at any given moment. Retailers of all
stripes face an especially fast-changing and increasingly competitive environment in the years ahead. With the rapid growth of e-commerce and
its potential to disrupt both the top and bottom lines, retail may be ripe for a transformation similar to the one seen in media. A multichannel
offering that captures sales wherever they occur will become a “must have” for most businesses.
Online advertising, a $65 billion
business in the G-20 in 2010, is forecast to grow 12 percent a year to almost $125 billion in 2016. In
countries with more developed Internet economies, 15 to 30 percent of advertising spending has
migrated online. Online advertising spending in the U.K. overtook spending on television advertising in 2011—and it now exceeds
spending on all other media categories. Consumer-to-consumer Internet commerce is a big factor in China, facilitated by websites such as
Taobao, a marketplace for goods of all sorts. More products were purchased on Taobao in 2010 than at China’s top-five brick-and-mortar
retailers combined. The Internet is having a big impact on how enterprises do business and interact with one another, too. Cloud-based data
storage, integrated procurement systems, and “enterprise social networks” that facilitate communication within and among organizations in
real time are helping companies address a host of procurement, coordination, communication, and fragmentation issues. With
spending
in the $3 trillion range, both the U.S. and Japan lead the world in business-to-business e-commerce, but
penetration is picking up in other countries. South Korea’s percentage of business-to-business e-commerce is approaching 50 percent, as is
Japan’s.
(--) Internet k2 accessing every privilege level, economic sector, healthcare, and
financial services.
Dean et al, 12 (Dr. David Dean is a Senior Partner, Senior Advisor, and Managing Director at The
Boston Consulting Group GmbH. Dr. Dean served as a Senior Vice President at The Boston Consulting
Group GmbH. For several years, he was the global leader of BCG's technology, media and
telecommunications practice. For more than 28 years, he has worked with many high-tech and
telecommunications companies around the world on issues of strategy and corporate development,
globalization, organization. “The Connected World; The Digital Manifesto: How Companies and
Countries Can Win in the Digital Economy”,
1/27/12https://www.bcgperspectives.com/content/articles/growth_innovation_connected_world_digit
al_manifesto/ ). SZ
The Internet is for real. In many countries, it has become both a vital economic force and a driver of growth.
In 2010, it contributed up to 8 percent of overall GDP in some of the leading G-20 nations. While the size of the Internet economy is much
smaller in emerging markets, many of these countries are making big investments in broadband infrastructure that will pay future dividends.
The Internet also conveys sizable economic benefits that do not get captured directly by calculations of
GDP. In the G-20 nations in 2010, consumers researched online but purchased offline more than $1.3 trillion in goods—the equivalent of
about 7.8 percent of consumer spending in those nations. In addition, in many leading G-20 nations, the Internet generated a consumer surplus
of about 4 percent of GDP. (This consumer surplus is the value that consumers place on the Internet above what they pay for it in device,
application, and access costs for everything from live streaming coverage of the Arab Spring and Justin Bieber videos to e-mail and video chats.)
Further economic benefits include business-to-business e-commerce and collaboration within and
across companies. Not all countries, however, are created equal. The BCG e-Intensity Index provides a picture of the depth and reach of
digital activity across countries. It measures a nation’s level of enablement (the amount of Internet infrastructure that it has in place),
expenditure (the amount spent on online retail and online advertising), and engagement (the degree of involvement of businesses,
governments, and consumers with the Internet). Big differences were apparent among the 50 countries we examined, with five clusters
emerging according to their performance on the index in absolute terms and relative to per capita GDP. (See the exhibit below.) But it takes
more than a strong broadband infrastructure to become a “native”—one in the top cluster of countries—on the BCG e-Intensity Index.
Investments in fixed and mobile infrastructure need to be accompanied by other strengths, such as a favorable regulatory environment, strong
payment systems, consumer protection for e-commerce transactions, and a willingness on the part of governments, businesses, and consumers
to go online. While the basic macroeconomic story provided by the e-Intensity Index gives a broad overview of the economic punch and
prospects of the Internet, the view is more nuanced at the intersection of microeconomics and human behavior—that is, in terms of the ways
in which companies and consumers are using the Internet. It is a scene of rapid change, disruption, uncertainty, and potential. Companies have
a once-in-a-lifetime opportunity to reinvent everything about the way they do business.
Twenty years ago, at the Internet’s
commercial birth, its use was restricted to the relatively wealthy. Today it is almost literally everywhere.
Residents of many villages around the world are more familiar with Internet content than with indoor plumbing or air conditioning. By 2016,
3 billion consumers, or 45 percent of the world’s population, will use the Internet. This shift from a luxury good
to an ordinary good is one of just several changes under way as the Internet matures and becomes fully embedded in everyday life. From Fixed
to Ubiquitous Access. When
the Internet gained popularity in developed nations, users accessed it through
and viewed it as an adjunct to the PC. No longer. Increasingly, the Internet is everywhere—not just on
mobile phones but also in cars, refrigerators, and watches. In emerging markets, in particular, most consumers are more
familiar with a mobile than with a landline phone. By 2016, mobile devices will account for about 80 percent of all
broadband connections in the G-20 nations. From Developed to Emerging Nations. Emerging markets have
become a major engine of online commercial activity. The Internet economy of China will approach the size of the U.S.
Internet economy in 2016. In China, consumer-to-consumer transactions through online marketplaces are also sizable. These “resales” are not
part of official GDP calculations but nonetheless have big ramifications for brands and retailers. By 2016, China will have nearly 800 million
Internet users, about the same number as France, Germany, India, Japan, the U.K., and the U.S. combined. Emerging nations will be responsible
for about 34 percent of the overall Internet economy of the G-20 nations and for 48 percent of their growth. From Passive to Participatory.
Social media have taken hold everywhere, especially in emerging markets. Indonesia has the second-largest number of Facebook users. More
than 90 percent of Internet users in Argentina, Brazil, and Mexico participate in social media, a higher
percentage than in any developed nation. Across all nations, social media are responsible for most of the new time spent on the Internet—22
percent of total Internet minutes. Some are predicting the death of e-mail, since Millennials prefer the instantaneous nature of messaging and
social media. Consumers have far
more power than before, and companies will need to discover ways to
meaningfully engage with them. The shift to a participatory Web fundamentally changes the nature of companies’ interactions with
customers, from messages delivered to passive recipients to conversations conducted in real time. As the Internet becomes ubiquitous, it
naturally takes on the contours of the particular nation’s economy, reflecting its structure and norms. Just as the ocean looks very different
depending on whether you are at the coast of Maine, Mexico, Morocco, or Malaysia, so too does the Internet. The Evolving Local Experience.
As a tangible presence in national markets, the Internet can help enhance the strengths and overcome
the structural weaknesses of the traditional economy. The U.K., for example, has become a nation of digital shopkeepers,
but the Netherlands has not, even though the fixed-broadband infrastructure is much stronger there. The reason: the Dutch are light creditcard users. The Czech Republic has a relatively strong e-commerce market, reflecting the poor retail experience in its physical stores. Hong
Kong, which also has a strong Internet infrastructure, has relatively weak business-to-consumer activity because traditional merchants in this
densely populated “shoppers’ paradise” have an easier time holding on to nearby customers. India’s relatively small e-commerce market, on
the other hand, is hampered by the nation’s poor distribution network, but dating and online betting sites are highly popular. It is easier to
make a payment using a mobile phone in Kenya than in Kansas. Kenya is unencumbered by the infrastructure, regulations, and inertia that
hamper mobile payments in developed markets, and consumers are eager to access banking services. In China, the shortage of television
programming and weak enforcement of intellectual property laws have made the Internet a prime vehicle for entertainment. About 83 percent
of Internet users listen to music online, compared with 34 percent in the U.S.; 76 percent watch videos online, compared with 68 percent in the
U.S. Moreover, the nation’s one-child policy encourages the use of chat rooms and social networking among young people with no siblings at
home.
In emerging markets, social media are the Internet medium and mobile is the access medium of
choice. Consumers have leapt past e-mail, portals, and the other stages of the Internet experience in much the same way that they jumped
straight to mobile phones, bypassing landlines altogether. Straight to social and mobile-only access are powerful new trends that are most
prominent in emerging markets but are also prevalent among young consumers in developed markets. The Retail Experience. Online purchases
will account for more than 20 percent of retailing in the U.K. and between 8 and 12 percent in other leading economies by 2016. But online
retail is affecting the shopping experience in all nations, even those without a large e-commerce footprint. By allowing businesses and
consumers to conduct fast and high-quality interactive research, it is creating better-informed shoppers and improving the offline shopping
experience as well. For example, the online tools at Ikea’s website allow shoppers to see how a piece of furniture will actually look in their
home. The world is rapidly becoming populated by companies of all shapes and sizes that have the Internet in their DNA and have built up
strong digital balance sheets. They are Main Street’s version of Amazon.com. For example, Wiggly Wigglers, a U.K. organic-garden-supply shop,
and Hiwave Dry Seafood, a Hong Kong vendor, were founded prior to the creation of the commercial Internet and figured out how to thrive on
it. The services industry is not immune either: Open English, a company “born in the cloud,” teaches English to Latin Americans. All three are
companies in traditional categories that are comfortable seeing the world as their marketplace, creating an online brand and presence,
analyzing data patterns, using apps in the cloud, and taking advantage of the network effects that accrue to companies that build a loyal
customer base early. Small Is Beautiful. Many smaller companies, which do not have the advantages of scale and market position but can
innovate more quickly, are leading the way. Small
and medium enterprises (SMEs), historically the growth engine of
national economies, are also becoming Internet successes. Over the last 18 months, BCG has surveyed employees at more
than 15,000 companies with fewer than 250 employees in the world’s biggest economies (in the U.S., the cutoff was 500 employees). We
divided the survey respondents into four groups: high Web, medium Web, low Web, and no Web. The Internet
is driving sales and
job growth at these companies. In the U.K., the overall sales of high- and medium-Web businesses grew by 4.1 percent annually
from 2007 through 2010—about seven times faster than the overall sales of low- and no-Web businesses. In Hong Kong, 79 percent of highand medium-Web businesses reported higher sales over the past five years, compared with 63 percent of no-Web businesses. In the U.S, highand medium-Web businesses expect to grow by 17 percent over the next three years, compared with 12 percent for their low-Web and noWeb counterparts. High- and medium-Web businesses have also increased the size of their workforces to support their Internet operations
over the past three years, an otherwise dire period for job growth in the developed economies. One
of the most interesting
findings is that in most nations, high-Web businesses tend to engage their workforces more broadly
than their low-Web peers. Employees other than owners and founders at these companies have a much
greater ability to introduce new online services and initiatives. From flower shops to restaurants to real estate
operations, SME owners who do not feel comfortable with technology themselves look to their employees to help them build a social-media
presence and exploit online business opportunities. SMEs are rapidly adopting social-media tools to increase the richness of their interactions
with customers and employees. Over
40 percent of these businesses in the U.S. and the U.K. report using socialmedia tools. Among high-Web businesses, 60 percent use social media as a source of new ideas from
customers, and more than 45 percent have created social-networking groups. Digital Champions. Some large
companies, too, have figured out how to thrive in the digital world. In many of its markets, Tesco is the leading retailer, with the traditional
advantages of infrastructure, brand, locations, and distribution. In South Korea, however, Tesco was trailing the market leader, E-mart, in sales
and number of stores. So it turned to the Internet to design an innovative strategy. It created virtual shops in subway stations—billboards
designed to replicate the look of store shelves, down to the arrangement of products. With their mobile phone, commuters can scan the QR
code of any item on display, buy it, and have it delivered to their homes that day. These virtual displays enabled Tesco to turn the time spent
waiting for a train into shopping time—and become South Korea’s number-one online supermarket and its second-largest supermarket overall.
China’s Tencent has a broad portfolio of Internet services , but it is known mainly for its messaging service, QQ, which offers its more than 700
million users games and opportunities to purchase virtual goods. Its success, however, is built on more than just a fad. Tencent is relentlessly
focused on understanding consumers and delivering services that are in demand. It has tailored its products to the specific interests, needs, and
usage profiles of Chinese Internet consumers. It has recognized local trends, such as the popularity of instant messaging and social networking,
and the unmet demand for online and home entertainment in a nation where television penetration is still low. By following a deliberate
strategy to build traffic, create stickiness, and then generate revenues, Tencent has become the number-two global leader in creating
shareholder value over the past five years. Many companies not under immediate threat are nonetheless taking steps to use the Internet to
their advantage. In emerging markets, traditional companies wanting to build their online retail presence are creatively overcoming constraints.
In Mexico, for example, 7-Eleven stores allow offline payment for online purchases. In China and India, cash on delivery is becoming a standard
form of payment in online transactions. In Argentina, where poor roads and heavy congestion make home delivery difficult, Wal-Mart limits
deliveries to the immediate neighborhood surrounding its stores and encourages store pickup of online purchases. Burberry, a British fashion
house founded in 1856 that allocates 60 percent of its marketing budget to digital initiatives, has generated a boost in sales through such
efforts. It broadcasts live 3D video streams of fashion shows in its stores and on the iPad. Shoppers can order clothes before they are available
on store shelves. When Burberry recently launched a new fragrance, Body, it received 225,000 requests for samples through Facebook. Industry
Disruption. Many industries have been and will be disrupted by the Internet. While posing challenges, disruption can also create opportunities.
For example, over time and to varying degrees, record companies have discovered how to live in the digital world. Universal Music, the largest
record label, has diversified away from recorded music. A
material portion of its revenue now comes from
merchandising, licensing, ticketing, touring, e-commerce, and digital-music partnerships. Health care is
an industry that could be ready to experience the disruptive force of the Internet. It took $300 million
and 13 years to map the first human genome. Now, less than ten years later, the cost is only $3,000, and
every five months it is cut in half. Soon the cost to fully sequence a human genome will be $100. But
unlocking the causes of illness and developing cures do not depend only on falling per-unit costs. The health care industry also
needs to mine and combine genomic data and to synthesize this information with medical records and
data about costs and patient outcomes. If the leading health-care and insurance providers fail to figure
out how to deliver better diagnoses, medicines, and treatments—and better value in the process—an
attacker certainly will. The same type of information explosion is occurring in financial services, where
the proliferation of smart cards, debit cards, and mobile payments is creating rich veins of intelligence
about consumer behavior that are waiting to be tapped. Likewise in the utility industry, smart meters and connectivity
between the grid and the Internet are creating an environment in which information about energy usage is almost as important as energy itself.
In developed countries, the Internet can support a return to economic growth. In emerging economies, it creates the potential for enormous
economic and social development. But the growth of the Internet economy is not a foregone conclusion. Our projection of a $4.2 trillion
Internet economy among the G-20 nations by 2016 is grounded in analysis but also assumes that governments will not take actions that impede
progress.
(--) The internet creates jobs and bolsters the econ
Manyika and Roxburgh 11 (James Manyika and Charles Roxburgh are directors at Mckinsey Global
Institute in San Fransisco and London, October 2011, “The great transformer: The impact of the Internet
on economic growth and prosperity”
http://www.mckinsey.com/insights/high_tech_telecoms_internet/the_great_transformer ). SZ
In a paper prepared for the Foreign Commonwealth Office International Cyber Conference, MGI examines what more can be done to fully
capture the benefits of the Internet. The
Internet is changing the way we work, socialize, create and share
information, and organize the flow of people, ideas, and things around the globe. Yet the magnitude of this
transformation is still underappreciated. The Internet accounted for 21 percent of the GDP growth in mature
economies over the past 5 years. In that time, we went from a few thousand students accessing Facebook to more than 800 million
users around the world, including many leading firms, who regularly update their pages and share content. While large
enterprises and national economies have reaped major benefits from this technological revolution,
individual consumers and small, upstart entrepreneurs have been some of the greatest beneficiaries
from the Internet’s empowering influence. If Internet were a sector, it would have a greater weight in
GDP than agriculture or utilities. And yet we are still in the early stages of the transformations the Internet will unleash and the
opportunities it will foster. Many more technological innovations and enabling capabilities such as payments
platforms are likely to emerge, while the ability to connect many more people and things and engage
them more deeply will continue to expand exponentially. As a result, governments, policy makers, and
businesses must recognize and embrace the enormous opportunities the Internet can create, even as they
work to address the risks to security and privacy the Internet brings. As the Internet’s evolution over the past two decades has demonstrated,
such work must include helping to nurture the development of a healthy Internet ecosystem, one that boosts infrastructure and access, builds a
competitive environment that benefits users and lets innovators and entrepreneurs thrive, and nurtures human capital. Together these
elements can maximize the continued impact of the Internet on economic growth and prosperity.
(--) The Industrial Internet of Things create new markets and enable workers to
undertake more advanced tasks
Daugherty, 15 (Paul Daugherty is Accenture’s chief technology officer and also leads the Accenture
Technology Innovation & Ecosystem groups, writing for Forbes, “Transforming Economic Growth With
The Industrial Internet Of Things”, 1/21/15,
http://www.forbes.com/sites/valleyvoices/2015/01/21/transforming-economic-growth-with-theindustrial-internet-of-things/) SZ
As the world struggles to leave behind a period of weak demand and poor productivity growth, many
business and government leaders are looking to the next wave of technology innovation to revitalize
their economies. The Industrial Internet of Things (IIoT) could be the largest driver of economic growth
and employment in the next decade. But much of its potential is at risk of being lost as companies and policy makers fail to exploit
the opportunity. The IIoT will create new markets as data from billions of connected devices unleashes an
era of services innovation that will generate new revenue streams for manufacturers and those who
serve the industrial sectors. Its impact will extend to two-thirds of the world economy. It could add as
much as $14.2 trillion to 20 of the world’s major economies over the next 15 years, according to the latest
analysis from Accenture. It also promises a greater fillip to hard-pressed, mature economies than to their emerging market competitors. This
would help restore a more healthy trade balance in the global economy. The Industrial Internet of Things is already here. Today,
global
positioning system (GPS) navigation, smart phone health kits and connected vehicles make life more
convenient for consumers. But the industrial world has barely begun to take note. Where it has, companies have used Industrial
Internet of Things effectively to reduce costs, enhance worker safety or improve efficiencies. Oil refiners use wearable devices
that protect workers with gas sensors that can call for help when they detect dangerous events. Miners
use remote-controlled equipment to dig with greater precision and realize higher rates of output. The
opportunity for new revenue streams comes from unlocking the value of the data that can be captured
and shared by smart, connected devices. As a result, engine manufacturers can go beyond selling
products to charging fees for the reliability that can be achieved by pre-empting equipment failures. This is
the outcome economy—the delivery of measurable results that are tailored to the needs of customers and how they use products. While digital
technology will automate more routine tasks, its capacity to create new markets and enable workers to undertake more advanced tasks will not
only spawn new categories of jobs, but also increase the sophistication of jobs and inspire greater collaboration to deliver outcome economy
services. The vast majority of businesses are not ready for this opportunity, however. In a survey of more than 1,400 business leaders, half of
whom are CEOs, 71 percent confess that their companies have yet to make any concrete progress with the Industrial Internet of Things. Just
seven percent have developed a comprehensive strategy with investments to match. This slow start may be due to the fact that many countries
do not have the sufficient underlying conditions to enable this new digital revolution to sweep through their economies. Accenture analysis
shows while the Industrial Internet of Things could lift the annual gross domestic product (GDP) of United States, the Nordics or Switzerland by
at least 2 percent by 2030, Spain and Italy look likely to enjoy gains of about half that. That dramatic difference can, in part, be attributed to the
quality of their infrastructure, technology skills and innovative capacity, as well as the ease of creating new business models. Rather like the
advent of electricity, which saw some countries lead in the wide application of the new technology throughout their economies, we can expect
a similar variance today. The
United States was the first to use electricity to power assembly lines and
transform manufacturing. It then went on to pioneer new electricity-based markets, from domestic
appliances to software. The IIoT presents a similar opportunity to transform economies for those
countries willing to put in place the necessary conditions. If the IIOT is to be harnessed to drive both productivity and
growth, business and government leaders need to work together in three key areas. They must prepare for entirely new and more open
organizational structures as business models arise from the shift to a more sophisticated outcome economy. They need to collaborate across
industry sectors and borders to establish standards to promote the security and interoperability of data and machines, as well as create
governance structures that encourage and reward the appropriate sharing of valuable data. Finally, they will need to invest in the new skills
that will be needed in working environments which increasingly blend digital and human labor. The potential of the Industrial Internet of Things
to kick start greater innovation and growth is clear. The evidence is that business leaders and policy makers need to do more to make the best
of the opportunity.
Internet Key to Tech
A) The internet can develop tech from drug development to biofuels.
Boyle, 11 (Alan Boyle, since joining NBC News Digital (a.k.a. MSNBC.com) in 1996, Boyle has won
awards from the National Academies, the American Association for the Advancement of Science, the
National Association of Science Writers, Sigma Delta Chi, the Society of Professional Journalists, the
Space Frontier Foundation, IEEE-USA, the Pirelli Relativity Challenge and the CMU Cybersecurity
Journalism Awards program. He is the author of "The Case for Pluto," a contributor to "A Field Guide for
Science Writers," the blogger behind Cosmic Log — and an occasional talking head on MSNBC, NBC's
TODAY and Nightly News, “Gamers solve molecular puzzle that baffled scientists”, 9/18/11,
http://www.nbcnews.com/science/science-news/gamers-solve-molecular-puzzle-baffled-scientistsf6C10402813). SZ
Video-game players have solved a molecular puzzle that stumped scientists for years, and those
scientists say the accomplishment could point the way to crowdsourced cures for AIDS and other
diseases. "This is one small piece of the puzzle in being able to help with AIDS," Firas Khatib, a biochemist at the University of Washington, told me. Khatib is the
lead author of a research paper on the project, published today by Nature Structural & Molecular Biology. The feat, which was accomplished using a
collaborative online game called Foldit, is also one giant leap for citizen science — a burgeoning field that enlists Internet users to look for
alien planets, decipher ancient texts and do other scientific tasks that sheer computer power can't accomplish as easily. "People have spatial reasoning skills,
something computers are not yet good at," Seth Cooper, a UW computer scientist who is Foldit's lead designer and developer, explained in a news release. "Games
provide a framework for bringing together the strengths of computers and humans." Unraveling a retrovirus For
more than a decade, an
international team of scientists has been trying to figure out the detailed molecular structure of a
protein-cutting enzyme from an AIDS-like virus found in rhesus monkeys. Such enzymes, known as
retroviral proteases, play a key role in the virus' spread — and if medical researchers can figure out their structure, they could
conceivably design drugs to stop the virus in its tracks. The strategy has been compared to designing a key to fit one of Mother Nature's locks. The problem is that
enzymes are far tougher to crack than your typical lock. There are millions of ways that the bonds between the atoms in the enzyme's molecules could twist and
turn. To design the right chemical key, you have to figure out the most efficient, llowest-energy configuration for the molecule — the one that Mother Nature
herself came up with. That's where Foldit plays a role. The game is designed so that players can manipulate virtual molecular structures that look like multicolored,
curled-up Tinkertoy sets. The virtual molecules follow the same chemical rules that are obeyed by real molecules. When someone playing the game comes up with a
more elegant structure that reflects a lower energy state for the molecule, his or her score goes up. If the structure requires more energy to maintain, or if it doesn't
reflect real-life chemistry, then the score is lower. More than 236,000 players have registered for the game since its debut in 2008. The monkey-virus puzzle was
one of several unsolved molecular mysteries that a colleague of Khatib's at the university, Frank DiMaio, recently tried to solve using a method that took advantage
of a protein-folding computer program called Rosetta. "This was one of the cases where his method wasn't able to solve it," Khatib said. Fortunately, the challenge
fit the current capabilities of the Foldit game, so Khatib and his colleagues put the puzzle out there for Foldit's teams to work on. "This was really kind of a last-ditch
effort," he recalled. "Can
the Foldit players really solve it?" They could. "They actually did it in less than 10
days," Khatib said. A screen shot shows how the Foldit program posed the monkey-virus molecular puzzle. University of Washington One floppy loop of the
molecule, visible on the left side of this image, was particularly tricky to figure out. But players belonging to the Foldit Contenders Group worked as a tag team to
come up with an incredibly elegant, low-energy model for the monkey-virus enzyme. "Standard autobuilding and structure refinement methods showed within
hours that the solution was almost certainly correct," the researchers reported in the paper published today. "Using the Foldit solution, the
final refined structure was completed a few days later." Khatib said the Seattle team's collaborators in Poland were in such a celebratory mood that they insisted on
organizing a simultaneous champagne toast, shared over a Skype video teleconference. "Although much attention has recently been given to the potential of
crowdsourcing and game playing, this is the first instance that we are aware of in which online gamers solved a longstanding scientific problem," Khatib and his
colleagues wrote. The parts of the molecule that formed the floppy loop turned out to be of particular interest. " These
features provide exciting
opportunities for the design of retroviral drugs, including AIDS drugs," the researchers said. Looking for new problems to
solve The monkey-virus puzzle solution demonstrates that Foldit and other science-oriented video games could be used to
address a wide range of other scientific challenges — ranging from drug development to genetic
engineering for future biofuels. "My hope is that scientists will see this research and give us more of those cases," Khatib said. He's not alone in
that hope. "Foldit shows that a game can turn novices into domain experts capable of producing first-class
scientific discoveries," Zoran Popovic, director of University of Washington's Center for Game Science, said in today's news release. "We are currently
applying the same approach to change the way math and science are taught in school." That's something that Carter Kimsey, program director for the National
Science Foundation's Division of Biological Infrastructure, would love to see happen. "After this discovery, young people might not mind doing their science
homework," she quipped. One caveat, though: Playing Foldit isn't exactly like playing Bejeweled. "Let's be honest, proteins aren't the sexiest video game out there,"
Khatib told me. Give the game a whirl, and let me know whether it's addictive or a drag. Tale of a Contender The final decisive move in the Foldit Contender Group's
solution to the monkey-virus puzzle involved twisting around that floppy loop, or "flap," in the structure of the enzyme. The paper published today notes that one of
the Contenders, nicknamed "mimi," built upon the work done by other gamers to make that move. I got in touch with mimi via email, and here's the wonderfully
detailed response she sent back today from Britain: "I have been playing Foldit for nearly three years, and I have been in the Contenders team for two and a half
years. "Although there are 35 names on the members list on the website, when you take off duplicate names and non-active players, it comes down to about 12 to
15 people. "The team members come from a wide range of backgrounds, chiefly scientific or IT [information technology], although our best player is from neither.
"One of the main features of Foldit is the ability to communicate via chat within the game. There is both global chat, which everyone can access, and individual
group chat, which allows team members to talk easily to one another. The Contenders are spread out between Canada, USA, UK, Europe and New Zealand, so this is
essential. "Each player can work on a solo solution to a puzzle, but we can also exchange solutions between the team and add our own improvements to achieve a
better result. Often the evolved solution for a team scores higher than the top solo score. "The game is not only an interesting intellectual challenge, allowing you to
use your problem-solving skills, 'feel' for protein shapes, and whatever biochemical knowledge you have to obtain a solution to each puzzle, but it also provides a
unique society of players driven by both individual and team rivalry with an overall purpose of improving the game and the results achieved. A body of knowledge
has been built up in the Wiki by contributions from players, and ideas are constantly fed back to the game designers. "In the case of the Mason-Pfizer monkey virus,
I had looked at the structure of the options we were presented with and identified that it would be better if the 'flap' could be made to sit closer to the body of the
protein — one of the basic rules of folding is to make the protein as compact as possible — but when I tried this with my solo solution, I couldn't get it to work.
However, when I applied the same approach to the evolved solution that had been worked on by other team members, I was able to get it to tuck in, and that
proved to be the answer to the structure. I believe that it was the changes made by my colleagues that enabled mine to work, so it was very much a team effort.
"We were all very excited to hear that we had helped to find the answer to this crystal form, especially since it had been outstanding so long and other methods had
been unsuccessful. The feeling of having done something that could make a significant contribution to research in this field is very special and unexpected. Foldit
players have achieved a number of successes so far, and I hope we will go on to make many more. "You may be aware that we asked for accreditation for the Foldit
Contenders Team within the article, rather than being named individually. "Many of the people playing the game are known only by their user name, even within a
team. "I would be grateful if you could refer to me as 'mimi' rather than using my full name." Update for 12:45 p.m. ET Sept. 20: I've added an MSNBC video about
the Foldit project, and I've also heard back via email from another one of the Contenders, a player known as "Bletchley Park": "We are all very excited about the
discovery, to see the story unfold now is very gratifying. The main motivator of the Contenders group, and most Foldit players for that matter, is the advancement
of science. It is very typical for mimi not to have her real name listed or even to claim the discovery as her own. "Contenders is a group of like-minded individuals.
The strength lies in comradeship, cooperation and perseverance. Most of us have been 'folding' for several hours each day over the past years. "To be part of this
adventure is a very fulfilling experience. Quite a few of us have or have had family members who suffered from the modern terminal diseases and find energy in
those experiences to keep folding with the intention to make a difference."
(--) Strong tech sector key to US military dominance and solving war around the globe:
Dr. Mary L. Good, 1996(Chair, Undersecretary for Technology, Dept. of Commerce, Technology in the
national interest, accessed via google books)
Technology and the National Defense On the battlefield, technology can be the decisive edge.
America’s technological
superiority has provided our men and women in uniform the wherewithal to protect the freedom, democracy, and security of the United
States. Beyond our own borders, U.S.
military strength—built on a foundation of high-technology—has enabled
the United States to stand in defense of our allies, preserve the peace, deter hostilities, repel aggression,
and foster fledging democracies around the globe. During the Cold War, an arsenal of advanced weapons allowed the
United States to field a technologically superior force to counter the numerically superior Soviet threat. Today, these high-technology weapons
and the transportation and logistics systems that support their deployment provide the United States with the ability to undertake global
military operations and conduct surgical strikes on strategic military targets—as in recent operations in Iraq and Bosnia—while minimizing the
Continued technological leadership is essential to U.S. national security, military
readiness, and global influence.
risk to U.S. soldiers and civilians.
Internet Solves Disease
A) Internet is k2 reduced costs and transparency of early detection of disease
outbreaks
Wilson and Brownstein, ’09 (Kumanan and John S. From the Department of Medicine (Wilson),
Ottawa Health Research Institute, University of Ottawa, Ottawa Ont., the Children’s Hospital Informatics
Program (Brownstein), Children’s Hospital Boston; and the Department of Pediatrics (Brownstein),
Harvard Medical School, Boston, USA, “Early detection of disease outbreaks using the Internet”, 3/12/9,
http://www.cmaj.ca/content/180/8/829.full). SZ
Rapidly identifying an infectious disease outbreak is critical, both for effective initiation of public health
intervention measures and timely alerting of government agencies and the general public. Surveillance
capacity for such detection can be costly, and many countries lack the public health infrastructure to
identify outbreaks at their earliest stages. Furthermore, there may be economic incentives for countries
to not fully disclose the nature and extent of an outbreak.1 The Internet, however, is revolutionizing
how epidemic intelligence is gathered, and it offers solutions to some of these challenges. Freely
available Web-based sources of information may allow us to detect disease outbreaks earlier with
reduced cost and increased reporting transparency. A vast amount of real-time information about
infectious disease outbreaks is found in various forms of Web-based data streams.2 These range from official public health
reporting to informal news coverage to individual accounts in chat rooms and blogs.3–5 Because Web-based data sources exist outside traditional
reporting channels, they are invaluable to public health agencies that depend on timely information flow
across national and subnational borders. These information sources, which can be identified through Internet-based tools, are
often capable of detecting the first evidence of an outbreak, especially in areas with a limited capacity for public health surveillance. For
example, the World Health Organization’s Global Outbreak Alert and Response Network relies on these data
for day-to-day surveillance activities.3,4 Revised international health rules have authorized the World Health Organization to act on this information to issue
recommendations to prevent the spread of diseases.6 Canadians were leaders in introducing Web-based surveillance technologies to the world. In the 1990s, Health Canada created the Global
Every 15
minutes, the network obtains information from news feed aggregators based on established search
queries. Although automation is a key component, the Global Public Health Intelligence Network also employs trained analysts who provide essential linguistic, interpretive and
analytical expertise. These data are disseminated to various public health agencies, including the World Health
Organization, which then perform public health vetting of the informal report. The value of this network
was demonstrated when the system identified the outbreak of severe acute respiratory syndrome in
Guangdong Province, China, as early as November 20027, more than 2 months before the World Health
Organization publically published details on cases of the new respiratory illness. A parallel pioneering effort in Internet-based
surveillance was started by the International Society for Infectious Diseases’ Program for Monitoring Emerging Diseases. 8 Rather than rely on automated news
scanning, this program draws from its membership to find, comment and disseminate reports on
emerging disease threats through a freely available and open mailing list. This program is now one of the largest publicly available
emerging disease and outbreak reporting systems in the world. There are a number of online resources that deliver similar real-time
intelligence on emerging infectious diseases to diverse audiences, from public health officials to
international travelers on user-friendly, open-access websites. These systems combine freely available data sources and open-source
Public Health Intelligence Network.7 Its software application retrieves articles that provide relevant information pertaining to the possibility of a public health emergency.
software technology to create online surveillance systems. For example, HealthMap is a freely accessible, automated real-time system that monitors, organizes, integrates, filters, visualizes
and disseminates online information about emerging diseases.9 The site pulls from over 20 000 sources every hour, many of which come from news aggregators such as Google News.
Syndromic surveillance has emerged over the last decade as a new strategy for early detection of outbreaks. In this form of surveillance, efforts are focused on monitoring symptoms or other
Unlike traditional surveillance efforts, an
outbreak investigation would be triggered when certain health-related outcomes exceeded expected
baseline levels. Examples of this type of surveillance include examining increases in visits to emergency departments, the volume of calls to health advice lines and the sales of
evidence of a disease, which may be identified before the diagnosis is confirmed and formally recognized.10
prescription or over-the-counter medications. A new frontier in syndromic surveillance has emerged that uses Web-based clickstream- and keyword-searching aggregated across Internet
users. This application has the opportunity to provide important insights into public health trends for a fraction of the cost. Eysenbach originally demonstrated the potential value and costeffectiveness of such a strategy for surveillance of influenza in Canada.11 Similarly, recent efforts that used data from Google12 and Yahoo13 have shown that search query data can be
harnessed as a form of collective intelligence where patterns of population-level searching mirror and may even predict disease outbreaks. Google Flu Trends, for example, now provides both
public health professionals and the general population with a real-time geographically specific view of influenza search activity in the United States. Analysis of the recent listeriosis outbreak in
Canada that resulted from contaminated deli meat provides some interesting insights into the potential power of these tools. We investigated data sources other than traditional reporting
that may have been available at the time of the outbreak. The public was officially informed by federal officials that 1 death and 16 cases were linked to a listeriosis outbreak on August 20,
2008.14 HealthMap collected 89 original articles that provided detailed information about the outbreak, the earliest of which appeared on August 17, although the majority of reports followed
the federal announcement. However, search-term surveillance using the word “listeriorisis” showed a spike beginning in mid to late July, nearly a month before the declaration of the public
outbreak. Interestingly, peak searching for “listeriosis” correlated more with the retrospective epidemic curve (Pearson correlation = 0.62, p = 0.005) than with the publicity of the outbreak
(Pearson correlation = 0.55, p = 0.014) as measured by news volume. In comparison, a massive increase in searching for the word “Listeria” coincided perfectly with news media attention
(Figure 1). Therefore, it appears that there was a clear Internet signal related to “Listeria” that preceded the official federal announcement. A potential explanation for these findings is that the
term “listeriosis” is more technical and that the data reflect queries by food inspection or industry officials investigating the possibility of the outbreak. Or it could have reflected queries by
family and friends of people diagnosed early or people concerned about the initial voluntary recalls. A question that arises from this analysis is whether knowledge of this information, either
by public health officials or members of the public, could have prompted an earlier response that may have reduced exposure to the contaminated products. These data and aggregating Webbased technologies provide valuable information, but there are important limitations (Box 1). Although the utility of news media scanning is better established than surveillance of Internet
search terms, there is limited evidence of the ability of these systems to detect emerging threats before signals from more traditional systems.4,15,16 Clearly, these data sources require indepth evaluation, especially with respect to false positives and gaps in coverage.17 Lack of specificity, in particular, may be a primary limitation of these technologies (i.e., spikes in search
terms or news stories potentially related to a disease outbreak may not necessarily mean that an outbreak exists). This may be less of an obstacle if the analysis is supported by trained public
health officials who can investigate signals as they develop. However, these inefficiencies create the possibility of overload of signals that require verification and suggest that further work be
conducted to determine how much of a change from baseline warrants further investigation. Public awareness of such signals, if they are openly accessible, could create problems in terms of
risk communication for public health officials. The operating characteristics of these technologies need to be more precisely defined, as do their ability to detect disease before conventional
systems and their application to a wide spectrum of diseases. Privacy implications are also need to be considered and balanced with the public health need to drill down to the highest possible
geographic resolution.18 Given that search data contains associated internet provider information, which can be identified to the level of the household, appropriate decisions need to be
made as to the level of appropriate spatial aggregation.18 Another potentially major obstacle to the use of these technologies is the requirement for Internet access. This is especially true in
the dissemination of hand-held devices and mobile phones that
connect to the Internet and have the ability to use short message service, or SMS, can help fill in
technology gaps in resource-poor settings.19 In the future, we expect that the diagnostic accuracy of these instruments will be improved through an
iterative process and that search term surveillance will be expanded to other diseases. Internet scanning represents an important advancement
in health surveillance, and search term surveillance is a provocative new tool that has much potential.
developing countries where surveillance is important. However,
However, both technologies merit further evaluation. The new application of these technologies could provide earlier access to information on potential disease outbreaks and promote
. Most importantly, these technologies may provide important benefits to
outbreak control at local, national and international levels, ultimately reducing the health consequences
of these outbreaks. Internet surveillance tools can assist in the early identification of disease outbreaks and raise public awareness about emerging disease threats. Surveillance
greater transparency in disease reporting
based on trends of specific terms entered into search engines offers the potential to assist in earlier detection, but this technique requires further evaluation. Search engine queries of the term
“listeriosis” demonstrated a possible signal of an outbreak before the official announcement was made in Canada.
B) Diseases cause extinction
Guterl ’12 [Fred, award-winning journalist and executive editor of Scientific American, worked for ten
years at Newsweek, has taught science at Princeton University, The Fate of the Species: Why the Human
Race May Cause Its Own Extinction and How We Can Stop It, 1-2, Google Books, online]
Over the next few years, the bigger story turned out not to be SARS, which trailed off quickly, bur avian influenza, or bird flu. It had been making the rounds among
birds in Southeast Asia for years. An outbreak in 1997 Hong Kong and another in 2003 each called for the culling of thousands of birds and put virologists and health
workers into a tizzy. Although the virus wasn't much of a threat to humans, scientists fretted over the possibility of a horrifying pandemic. Relatively few people
caught the virus, but more than half of them died. What would happen if this bird flu virus made the jump to humans? What if it mutated in a way that allowed it to
spread from one person to another, through tiny droplets of saliva in the air? One
bad spin of the genetic roulette wheel and a deadly
new human pathogen would spread across the globe in a matter of days. With a kill rate of 60 percent, such a pandemic
would be devastating, to say the least.¶ Scientists were worried, all right, but the object of their worry was somewhat theoretical. Nobody knew for certain
if such a supervirus was even possible. To cause that kind of damage to the human population, a flu virus has to combine two traits: lethality and transmissibility. The
more optimistically minded scientists argued that one trait precluded the other, that if the bird flu acquired the ability to spread like wildfire, it would lose its ability to
kill with terrifying efficiency. The virus would spread, cause some fever and sniffles, and take its place among the pantheon of ordinary flu viruses that come and go
each season.¶ The optimists, we found out last fall, were
wrong. Two groups of scientists working independently managed to create bird
flu viruses in the lab that had that killer combination of lethality and transmissibility among humans . They did it for
the best reasons, of course—to find vaccines and medicines to treat a pandemic should one occur, and more generally to understand how influenza viruses work. If
we're lucky, the scientists will get there before nature manages to come up with the virus herself, or before someone steals the genetic blueprints and turns this
knowledge against us. ¶ Influenza is a natural killer, but we have made it our own. We
have created the conditions for new viruses to
flourish—among pigs in factory farms and live animal markets and a connected world of international trade and travel—and
we've gone so far as to fabricate the virus ourselves. Flu is an excellent example of how we have, through our technologies and our dominant presence on the
planet, begun to multiply the risks to our own survival.
Bigotry Advantage Extensions
Bigotry Advantage is Utilitarian
Solving for discrimination is utilitarian – millions of minorities are surveilled
Cyril 15 (Executive Director of the Center for Media Justice, an organization that cultivates grassroots movements for a
more participatory democracy; Malkia Amala, “Black America’s State of Surveillance”, The Progressive, April 2015,
http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance, RX)
law enforcement
agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and policies have not
caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting
privacy as the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned
privilege of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate
collection of the private data of people targeted by race but not involved in any crime. For targeted
communities, there is little to no expectation of privacy from government or corporate surveillance.
Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve birthed a
In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new surveillance technologies,
complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public benefits programs and
beat cops on the block, is as much a part of our built environment as the streets covered in our blood. In a recent address, New York City Police Commissioner Bill
Bratton made it clear: “2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in which we literally will
give to every member of this department technology that would’ve been unheard of even a few years ago.” Predictive policing, also known as “Total Information
Awareness,” is described as using advanced technological tools and data analysis to “preempt” crime. It utilizes trends, patterns, sequences, and affinities found in
data to make determinations about when and where crimes will occur. This model is deceptive, however, because it presumes data inputs to be neutral. They
In a racially discriminatory criminal justice system, surveillance technologies reproduce injustice.
Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander calls the “New Jim
Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates,
sentencing terms, and conditions of confinement that operate more as a system of social control by
racial hierarchy than as crime prevention or punishment. In New York City, the predictive policing approach in use is “Broken
aren’t.
Windows.” This approach to policing places an undue focus on quality of life crimes—like selling loose cigarettes, the kind of offense for which Eric Garner was
choked to death. Without oversight, accountability, transparency, or rights, predictive policing is just high-tech racial profiling—indiscriminate data collection that
drives discriminatory policing practices. As local law enforcement agencies increasingly adopt surveillance technologies, they use them in three primary ways: to
listen in on specific conversations on and offline; to observe daily movements of individuals and groups; and to observe data trends. Police departments like
Bratton’s aim to use sophisticated technologies to do all three. They will use technologies like license plate readers, which the Electronic Frontier Foundation found
to be disproportionately used in communities of color and communities in the process of being gentrified. They will use facial recognition, biometric scanning
software, which the FBI has now rolled out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body
and dashboard cameras, which have been touted as an effective step toward accountability based on the results of one study, yet storage and archiving procedures,
among many other issues, remain unclear. They will use Stingray cellphone interceptors. According to the ACLU, Stingray technology is an invasive cellphone
surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into transmitting their locations and identifying information.
When used to track a suspect’s cellphone, they also gather information about the phones of countless bystanders who happen to be nearby. The same is true of
domestic drones, which are in increasing use by U.S. law enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone
manufacturers are considering arming these remote-controlled aircraft with weapons like rubber bullets, tasers, and tear gas. They will use fusion centers. Originally
designed to increase interagency collaboration for the purposes of counterterrorism, these have instead become the local arm of the intelligence community.
According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse for increasingly used “suspicious activity
reports”—described as “official documentation of observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal
activity.” These reports and other collected data are often stored in massive databases like e-Verify and Prism. As anybody who’s ever dealt with gang databases
knows, it’s almost impossible to get off a federal or state database, even when the data collected is incorrect or no longer true. Predictive
policing
doesn’t just lead to racial and religious profiling—it relies on it. Just as stop and frisk legitimized an
initial, unwarranted contact between police and people of color, almost 90 percent of whom turn out to
be innocent of any crime, suspicious activities reporting and the dragnet approach of fusion centers
target communities of color. One review of such reports collected in Los Angeles shows approximately
75 percent were of people of color. This is the future of policing in America, and it should terrify you as much as it terrifies me. Unfortunately, it
probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially those reporting on the issue in the media or advocating in the
halls of power. One
of the most terrifying aspects of high-tech surveillance is the invisibility of those it
disproportionately impacts. The NSA and FBI have engaged local law enforcement agencies and
electronic surveillance technologies to spy on Muslims living in the United States. According to FBI
training materials uncovered by Wired in 2011, the bureau taught agents to treat “mainstream” Muslims
as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for
combat,” and to view Islam itself as a “Death Star” that must be destroyed if terrorism is to be
contained. From New York City to Chicago and beyond, local law enforcement agencies have expanded
unlawful and covert racial and religious profiling against Muslims not suspected of any crime. There is no
national security reason to profile all Muslims. At the same time, almost 450,000 migrants are in detention facilities throughout the
United States, including survivors of torture, asylum seekers, families with small children, and the elderly. Undocumented migrant communities enjoy few legal
protections, and are therefore subject to brutal policing practices, including illegal surveillance practices. According
to the Sentencing Project,
of the more than 2 million people incarcerated in the United States, more than 60 percent are racial and
ethnic minorities. But by far, the widest net is cast over black communities. Black people alone represent 40 percent of those
incarcerated. More black men are incarcerated than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as
evidence of greater criminality, a 2012 study confirms that black defendants are at least 30 percent more likely to
be imprisoned than whites for the same crime. This is not a broken system, it is a system working
perfectly as intended, to the detriment of all. The NSA could not have spied on millions of cellphones if it
were not already spying on black people, Muslims, and migrants. As surveillance technologies are increasingly adopted and
integrated by law enforcement agencies today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in
the context of structural racism. Reporters love to tell the technology story. For some, it’s a sexier read. To me, freedom from repression and racism is far sexier
than the newest gadget used to reinforce racial hierarchy. As civil rights protections catch up with the technological terrain, reporting needs to catch up, too. Many
journalists still focus their reporting on the technological trends and not the racial hierarchies that these trends are enforcing. Martin Luther King Jr. once said,
“Everything we see is a shadow cast by that which we do not see.” Journalists have an obligation to tell the stories that are hidden from view. We are living in an
incredible time, when migrant activists have blocked deportation buses, and a movement for black lives has emerged, and when women, queer, and trans
the Internet also makes possible
the high-tech surveillance that threatens to drive structural racism in the twenty-first century.
experiences have been placed right at the center. The decentralized power of the Internet makes that possible. But
Solving for discrimination is utilitarian – millions of minorities are surveilled
Cyril 15 (Executive Director of the Center for Media Justice, an organization that cultivates grassroots movements for a
more participatory democracy; Malkia Amala, “Black America’s State of Surveillance”, The Progressive, April 2015,
http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance, RX)
In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks to new
surveillance technologies, law enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal protections and
policies have not caught up to this technological advance. Concerned advocates see mass surveillance as the problem and protecting privacy as
the goal. Targeted surveillance is an obvious answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege
of the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate collection of the private data of people
targeted by race but not involved in any crime. For targeted communities, there is little to no expectation of privacy from government or
corporate surveillance. Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us. Instead, we’ve
birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying,
from AT&T and
Walmart to public benefits programs and beat cops on the block, is as much a part of our built
environment as the streets covered in our blood. In a recent address, New York City Police Commissioner Bill Bratton made
it clear: “2015 will be one of the most significant years in the history of this organization. It will be the year of technology, in which we literally
will give to every member of this department technology that would’ve been unheard of even a few years ago.” Predictive policing, also known
as “Total Information Awareness,” is described as using advanced technological tools and data analysis to “preempt” crime. It utilizes trends,
patterns, sequences, and affinities found in data to make determinations about when and where crimes will occur. This model is deceptive,
however, because it presumes data inputs to be neutral. They aren’t. In a racially discriminatory criminal justice system, surveillance
technologies reproduce injustice. Instead of reducing discrimination, predictive policing is a face of what author Michelle Alexander calls the
“New Jim Crow”—a de facto system of separate and unequal application of laws, police practices, conviction rates, sentencing terms, and
conditions of confinement that operate more as a system of social control by racial hierarchy than as crime prevention or punishment. In New
York City, the predictive policing approach in use is “Broken Windows.” This approach to policing places an undue focus on quality of life
crimes—like selling loose cigarettes, the kind of offense for which Eric Garner was choked to death. Without oversight, accountability,
transparency, or rights, predictive policing is just high-tech racial profiling—indiscriminate data collection that drives discriminatory policing
practices. As
local law enforcement agencies increasingly adopt surveillance technologies, they use them in
three primary ways: to listen in on specific conversations on and offline; to observe daily movements of
individuals and groups; and to observe data trends. Police departments like Bratton’s aim to use
sophisticated technologies to do all three. They will use technologies like license plate readers, which the
Electronic Frontier Foundation found to be disproportionately used in communities of color and
communities in the process of being gentrified. They will use facial recognition, biometric scanning software, which the FBI
has now rolled out as a national system, to be adopted by local police departments for any criminal justice purpose. They intend to use body
and dashboard cameras, which have been touted as an effective step toward accountability based on the results of one study, yet storage and
archiving procedures, among many other issues, remain unclear. They will use Stingray cellphone interceptors. According to the ACLU, Stingray
technology is an invasive cellphone surveillance device that mimics cellphone towers and sends out signals to trick cellphones in the area into
transmitting their locations and identifying information. When used to track a suspect’s cellphone, they also gather information about the
phones of countless bystanders who happen to be nearby. The same is true of domestic drones, which are in increasing use by U.S. law
enforcement to conduct routine aerial surveillance. While drones are currently unarmed, drone manufacturers are considering arming these
remote-controlled aircraft with weapons like rubber bullets, tasers, and tear gas. They will use fusion centers. Originally designed to increase
interagency collaboration for the purposes of counterterrorism, these have instead become the local arm of the intelligence community.
According to Electronic Frontier Foundation, there are currently seventy-eight on record. They are the clearinghouse for increasingly used
“suspicious activity reports”—described as “official documentation of observed behavior reasonably indicative of pre-operational planning
related to terrorism or other criminal activity.” These reports
and other collected data are often stored in massive
databases like e-Verify and Prism. As anybody who’s ever dealt with gang databases knows, it’s almost
impossible to get off a federal or state database, even when the data collected is incorrect or no longer
true. Predictive policing doesn’t just lead to racial and religious profiling—it relies on it. Just as stop and frisk legitimized an initial,
unwarranted contact between police and people of color, almost 90 percent of whom turn out to be innocent of any crime, suspicious activities
reporting and the dragnet approach of fusion centers target communities of color. One review of such reports collected in Los Angeles shows
approximately 75 percent were of people of color. This is the future of policing in America, and it should terrify you as much as it terrifies me.
Unfortunately, it probably doesn’t, because my life is at far greater risk than the lives of white Americans, especially those reporting on the
issue in the media or advocating in the halls of power. One of the most terrifying aspects of high-tech surveillance is the invisibility of those it
disproportionately impacts. The NSA and FBI have engaged local law enforcement agencies and electronic surveillance technologies to spy on
Muslims living in the United States. According to FBI training materials uncovered by Wired in 2011, the bureau taught agents to treat
“mainstream” Muslims as supporters of terrorism, to view charitable donations by Muslims as “a funding mechanism for combat,” and to view
Islam itself as a “Death Star” that must be destroyed if terrorism is to be contained. From New York City to Chicago and beyond, local law
enforcement agencies have expanded unlawful and covert racial and religious profiling against Muslims not suspected of any crime. There is no
national security reason to profile all Muslims. At the same time, almost 450,000 migrants are in detention facilities throughout the United
States, including survivors of torture, asylum seekers, families with small children, and the elderly. Undocumented migrant communities enjoy
few legal protections, and are therefore subject to brutal policing practices, including illegal surveillance practices. According to the Sentencing
Project, of the more than 2 million people incarcerated in the United States, more than 60 percent are racial and ethnic minorities. But by far,
the widest net is cast over black communities. Black people alone represent 40 percent of those incarcerated. More black men are incarcerated
than were held in slavery in 1850, on the eve of the Civil War. Lest some misinterpret that statistic as evidence of greater criminality, a 2012
study confirms that black defendants are at least 30 percent more likely to be imprisoned than whites for the same crime. This
is not a
broken system, it is a system working perfectly as intended, to the detriment of all. The NSA could not
have spied on millions of cellphones if it were not already spying on black people, Muslims, and migrants.
As surveillance technologies are increasingly adopted and integrated by law enforcement agencies
today, racial disparities are being made invisible by a media environment that has failed to tell the story of surveillance in the
context of structural racism. Reporters love to tell the technology story. For some, it’s a sexier read. To me, freedom from repression and
racism is far sexier than the newest gadget used to reinforce racial hierarchy. As civil rights protections catch up with the technological terrain,
reporting needs to catch up, too. Many journalists still focus their reporting on the technological trends and not the racial hierarchies that these
trends are enforcing. Martin Luther King Jr. once said, “Everything we see is a shadow cast by that which we do not see.” Journalists have an
obligation to tell the stories that are hidden from view. We are living in an incredible time, when migrant activists have blocked deportation
buses, and a movement for black lives has emerged, and when women, queer, and trans experiences have been placed right at the center. The
decentralized power of the Internet makes that possible. But the
Internet also makes possible the high-tech surveillance
that threatens to drive structural racism in the twenty-first century.
We should solve for discrimination even in a utilitarian framework
Burkhart et al. 7 (Students at Leeds School of Business, Laurie, “The Effect of Government Surveillance on Social
Progress”, Ethica Publishing, http://www.ethicapublishing.com/confronting/5CH1.pdf, RX)
Under utilitarian, duty-based, and rights-based ethical theories the act of heavy government surveillance policy
is an ethical violation. From a utilitarian perspective, one must look at the consequences of an action,
and determine which consequence would be the most desirable for the greatest number of people
involved. In this case, the government is not acting in line with what is the greatest good for the greatest
number. The greatest good is allowing a society to have the ability to freely participate and change the
system in order to adhere to what is best for the people. By limiting radical political groups the government can effectively
take away this ability. In taking the ability to change and progress away from the people in a democratic
system the government violates the greatest good for the greatest number. The use of government surveillance to
hinder radical movements is causing a “chilling effect” on political participation and results in an obstruction of social progress. The
consequences of these government actions are undesirable, the actions are considered to be unethical
under utilitarian or consequence-based theory.
Even in a utilitarian framework, discrimination from warrantless surveillance
outweighs – it suppresses people’s thoughts
Fournier 13 (Universite de Versailles Saint-Quentin-en-Yvelines, France, graduate teaching assistant at City University of
Hong Kong, internally quoting Research Professor of Law Daniel Solove; Knut; “The Right to Anonymity in Political Activities: A
Comparative Look at the Notion of Political Surveillance”; Digital Democracy and the Impact of Technology on Governance and
Politics; http://tinyurl.com/pebzd6a; 2013; RX)
Utilitarianism has been used to justify a massive warrantless surveillance of all electronic
communication on US soil: the theory that acts are morally justified if their outcome, in terms of well-being, is overall positive
(Cohen. 2010, p. 178). In the justification of the TIA, this justification, which has been used by the Bush administration, is flawed. Indeed the
justification in the fight against terrorism, following 9/11. is the prevention of further attacks. However, no such an extreme and
disproportionate way of preventing crime is put forth by governments to prevent other forms of criminality, despite the overwhelming danger
that it represents for the civilian population. compared to the terrorist threat. From that perspective, the
harm caused to the right
to privacy by warrantless surveillance data mining and analysis cannot be seriously justified by the
harm it is trying to prevent. A second aspect of the justification of this blanket surveillance is the 'nothing to hide' argument,
expressed by a majority of the population when the surveillance by the government is mentioned. According to this popular belief. meaningless
information, and non-sensitive data about law-abiding citizen could be amassed by the government, since those who have nothing to hide have
nothing to be afraid of. The feeling expressed by people who agree, tacitly or not, to data collecting and mining from the government is also a
utilitarian one (Solove, 2007, p. 753). Solove, in his classification of information collection and usage, identifies clearly which step of the
government surveillance disrupts the idea that only people engaged in illegal activities should be afraid of this type of surveillance. The
“decisional interference”, in which
the individual, knowing that his privacy is constantly violated, modifies his
behaviour constantly as well (Solove, 2007. p. 758). He becomes his own censor, and sees the shadow of the
guard at the centre of Bentham's panopticon. What begins, and is presented as a simple 'information collection,' ends up
controlling people's behaviour through a self-censorship mechanism that is simply logical: none of us acts totally in the same way
when alone, and when we know that we are watched. Individuals cannot constantly evolve under the eye of the rest of the
society (or under the eye of a watching minority). and require moments of complete privacy. Thus, the violation of privacy is the
start of multiple violations: through the harm caused to a right that has asocial value, the government,
and consenting individuals or groups, infringes other fundamental political freedoms such as free speech
(Solove. 2007, p. 764). That all information mined by the TIA computer system have been disclosed by the individuals concerned is not enough
to overcome the necessary condition of expectation of privacy that might protect individuals in that type of situation. The aggregate of the
information, which has not been authorized, neither tacitly nor specifically by citizens, combines with the inhibiting power of a constant
surveillance to delegitimize a dis-proportionate practice that is a political project, as opposed to a simple policing tool as stated.
Discrimination affects a large portion of the Muslim community – solving for it does
the most good for the most people
Knefel 13 (Independent journalist, John, “Police Spying on American Muslims Is a Pointless Shame”, Rolling Stone, 11
March 2013, http://www.rollingstone.com/politics/news/police-spying-on-american-muslims-is-a-pointless-national-shame20130311, RX)
Civil liberties groups led by the
Muslim American Civil Liberties Coalition released a new report today detailing the
detrimental effects of the NYPD's spying on Muslim communities in recent years. The report, called Mapping Muslims:
NYPD Spying and its Impact on American Muslims, alleges that more than a decade of surveillance of Muslims throughout the
Northeast "has chilled constitutionally protected rights – curtailing religious practice, censoring speech
and stunting political organizing." They describe their communities as being under "a pervasive climate of fear and
suspicion" that affects "every aspect of individual and community life." The report combines publicly available
documentation about the NYPD's snooping regime – including the Associated Press' groundbreaking investigations into the department's Demographics Unit – with
original interviews of 57 Muslims in New York City. But the
significance of this report reaches far beyond New York's Muslim
community – and even beyond the American Muslim community at large. The authors have provided a needed rebuttal to
the common argument that surveillance isn't a problem if you have nothing to hide, and that spying itself is essentially value-neutral so long as you don't become a
target of an investigation. The
Muslims interviewed in the report describe a terrifying reality where trust and
privacy are virtually impossible, and where lives are severely harmed by spying alone. The pervasive
spying regime has effectively intimidated many would-be critics. "Many of the Shi'a organizations who
were approached by activists to speak up or speak out were hesitant to do so," says community organizer Ali Naquvi in
the report. "A lot of it seems to be fear. They don't want to be targeted for additional surveillance." Discouraging this legitimate, constitutionally protected behavior
isn't simply an unfortunate by-product of total surveillance, but rather a primary and predictable outcome. As anyone who has ever suspected themselves of being
under surveillance will tell you, that fear changes the way you think and act. Instilling such fears is an extremely effective form of social control. And whether
limiting civil rights and liberties in this way was the stated aim of the Intelligence Division doesn't really matter. That has been the effect – one that was entirely
foreseeable. So what has all this surveillance, this so-called "intelligence gathering," gotten us? A terrorized local Muslim population, a police department that
grossly exaggerates the terror plots it has disrupted and a crown jewel investigation of a troubled man named Ahmed Ferhani that was so problematic even the FBI
– recently dubbed "the terror factory" by one author because of its role in manufacturing plots that its own agents then disrupt – wanted nothing to do with it. And
as the report reminds us, Thomas Galati, the commanding officer of the NYPD's Intelligence Division, "admitted during sworn testimony that in the six years of his
tenure, the unit tasked with monitoring American Muslim life had not yielded a single criminal lead." While
Muslims in the Northeast are the
people most directly affected by this surveillance, it is a national problem – both in the sense that all of
our rights are infringed if anyone's are, but also in a more concrete way. The state's capacity for surveillance is already
enormous, and will only expand as technologies, including domestic drones, continue to increase in sophistication . When total surveillance of one
population becomes normalized, we are all at a greater risk of being illegally spied on. This report is an important
document that illustrates just how damaging that can be.
Legalism K Answer
(--) Alt Fails- Cedes the Political
Orly Lobel 2007, University of San Diego Assistant Professor of Law, The Paradox of Extralegal Activism: Critical Legal Consciousness and
Transformative Politics,” 120 HARV. L. REV. 937, http://cdn.harvardlawreview.org/wp-content/uploads/pdfs/lobel.pdf
Error! Bookmark not defined.
Error! Bookmark not defined.
Both the
practical failures and the fallacy of rigid boundaries generated by extralegal activism rhetoric permit us to
broaden our inquiry to the underlying assumptions of current proposals regarding transformative politics - that is,
attempts to produce meaningful changes in the political and socioeconomic landscapes. The suggested
alternatives produce a new image of social and political action. This vision rejects a shared theory of social reform, rejects formal programmatic
agendas, and embraces a multiplicity of forms and practices. Thus, it is described in such terms as a plan of no plan, n211 "a project of
projects," n212 [*984] "anti-theory theory," n213 politics rather than goals, n214 presence rather than power, n215 "practice over theory,"
n216 and chaos and openness over order and formality. As a result, the contemporary message rarely includes a comprehensive vision of
common social claims, but rather engages in the description of fragmented efforts. As Professor Joel Handler argues, the
commonality
of struggle and social vision that existed during the civil rights movement has disappeared. n217 There is no
unifying discourse or set of values, but rather an aversion to any metanarrative and a resignation from theory. Professor Handler warns
that this move away from grand narratives is self-defeating precisely because only certain parts of the
political spectrum have accepted this new stance: "The opposition is not playing that game ... . Everyone else
is operating as if there were Grand Narratives ... ." n218 Intertwined with the resignation from law and policy, the new bromide of "neither left
nor right" has become axiomatic only for some. n219 The contemporary critical legal consciousness informs the scholarship of those who are
interested in progressive social activism, but less so that of those who are interested, for example, in a more competitive securities market.
Indeed, an interesting recent development has been the rise of "conservative public interest lawyering." n220 Although
"public
interest law" was originally associated exclusively with liberal projects, in the past three decades
conservative advocacy groups have rapidly grown both in number and in their vigorous use of traditional
legal strategies to promote their causes. n221 This growth in conservative advocacy [*985] is particularly
salient in juxtaposition to the decline of traditional progressive advocacy. Most recently, some thinkers
have even suggested that there may be "something inherent in the left's conception of social change focused as it is on participation and empowerment - that produces a unique distrust of legal expertise."
n222 Once again, this conclusion reveals flaws parallel to the original disenchantment with legal reform. Although the new extralegal frames
present themselves as apt alternatives to legal reform models and as capable of producing significant changes to the social map, in practice
they generate very limited improvement in existing social arrangements. Most strikingly, the cooptation effect here can be explained in terms
of the most profound risk of the typology - that of legitimation. The
common pattern of extralegal scholarship is to describe
strategies, n223 and then to assume that
specific instances of counterhegemonic activities translate into a more complete transformation. This
an inherent instability in dominant structures by pointing, for example, to grassroots
celebration of multiple micro-resistances seems to rely on an aggregate approach - an idea that the multiplication of practices will evolve into
something substantial. In fact, the myth of engagement obscures the actual lack of change being produced, while the broader pattern of
equating extralegal activism with social reform produces a false belief in the potential of change. There
are few instances of
meaningful reordering of social and economic arrangements and macro-redistribution. Scholars write about decoding
what is really happening, as though the scholarly narrative has the power to unpack more than the actual conventional experience will admit.
n224 Unrelated efforts become related and part of a whole through mere reframing. At
the same time, the elephant in the
room - the rising level of economic inequality - is left unaddressed and comes to be understood as natural and
inevitable. n225 This is precisely the problematic process that critical theorists decry as losers' self-mystification, through which marginalized
groups come to see systemic losses as the [*986] product of their own actions and thereby begin to focus on minor achievements as
representing the boundaries of their willed reality. The explorations of micro-instances of activism are often fundamentally performative,
obscuring the distance between the descriptive and the prescriptive. The manifestations of extralegal activism - the law and organizing model;
the proliferation of informal, soft norms and norm-generating actors; and the celebrated, separate nongovernmental sphere of action - all
produce a fantasy that change can be brought about through small-scale, decentralized transformation. The emphasis is local, but the locality is
described as a microcosm of the whole and the audience is national and global. In the context of the humanities, Professor Carol Greenhouse
poses a comparable challenge to ethnographic studies from the 1990s, which utilized the genres of narrative and community studies, the latter
including works on American cities and neighborhoods in trouble. n226 The aspiration of these genres was that each individual story could
translate into a "time of the nation" body of knowledge and motivation. n227 In contemporary legal thought, a corresponding gap opens
between the local scale and the larger, translocal one. In reality, although there has been a recent proliferation of associations and grassroots
groups, few new local-state-national federations have emerged in the United States since the 1960s and 1970s, and many of the existing
voluntary federations that flourished in the mid-twentieth century are in decline. n228 There is, therefore, an absence of links between the
local and the national, an absent intermediate public sphere, which has been termed "the missing middle" by Professor Theda Skocpol. n229
New social movements have for the most part failed in sustaining coalitions or producing significant
institutional change through grassroots activism. Professor Handler concludes that this failure is due in part to the ideas of
contingency, pluralism, and localism that are so embedded in current activism. n230 Is the focus on small-scale dynamics simply an evasion of
the need to engage in broader substantive debate? It is important for next-generation progressive legal scholars, while maintaining a critical
legal consciousness, to recognize that not
all extralegal associational life is transformative. We must differentiate, for
example, between inward-looking groups, which tend to be self- [*987] regarding and depoliticized, and social movements that participate in
political activities, engage the public debate, and aim to challenge and reform existing realities. n231 We must differentiate between
professional associations and more inclusive forms of institutions that act as trustees for larger segments of the community. n232 As described
above, extralegal activism
tends to operate on a more divided and hence a smaller scale than earlier social
movements, which had national reform agendas. Consequently, within critical discourse there is a need to recognize the
limited capacity of small-scale action. We should question the narrative that imagines consciousness-raising as directly translating
into action and action as directly translating into change. Certainly not every cultural description is political. Indeed, it is questionable
whether forms of activism that are opposed to programmatic reconstruction of a social agenda should
even be understood as social movements. In fact, when groups are situated in opposition to any form of
institutionalized power, they may be simply mirroring what they are fighting against and merely
producing moot activism that settles for what seems possible within the narrow space that is left in a rising convergence of ideologies.
The original vision is consequently coopted, and contemporary discontent is legitimated through a
process of self-mystification.
Terrorism DA Updates
Terrorism UQ: ISIS is losing now
Squo solves for terrorism
McNeill et al 11. Jena Baker McNeill is a senior director of government relations at the U.S. Travel
Association. In this∂ position, she performs outreach to advance U.S. Travel’s legislative priorities in
Congress. She also∂ creates policy messages and thought leadership efforts that will engage lawmakers
on travel issues,∂ working in conjunction with U.S. Travel’s communications and research teams. [39
Terror Plots Foiled Since 9/11: Examining Counterterrorism’s Success Stories” The Heritage FoundationBy Jena Baker McNeill, James Jay Carafano, Ph.D. and Jessica Zuckerman May 20, 2011 URL:
http://www.heritage.org/research/reports/2011/05/39-terror-plots-foiled-since-911-examiningcounterterrorisms-success-stories] JC
Since the terrorist attacks of September 11, 2001, at least 39 terror plots against the United States have
been foiled thanks to domestic and international cooperation, as well as efforts to track down terror
leads in local communities. Such a successful track record of preventing terror attacks should garner the
attention of policymakers around the country as both Congress and the Administration wrestle with the
difficult decision of where to best spend precious security dollars. The death of Osama bin Laden serves
as a reminder that the war on terrorism is not over, and as a call to focus on strategies that have made
the nation a harder target for terrorism, while examining which reforms are still necessary.
ISIS is losing
Harris 15
(Johnny Harris, 4-15-2015, "ISIS is still a ruthless group, but it no longer has the territorial advantage it
has enjoyed.," Vox, http://www.vox.com/2015/4/15/8410501/ISIS-losing-Iraq, DSG)
After ISIS's seemingly unstoppable nine-month rise, the group is being turned back in Iraq. The Iraqi
army, along with Shia militias and an international air power coalition, is retaking territory.
ISIS's successes relied in part on Arab Sunni support in western Iraq. But ISIS made a mistake in
approaching the city of Erbil, the Iraqi Kurdish capital. The Kurds, who have an independent fighting
force, were able to stall ISIS's advance. Shortly after, the US intervened with airstrikes.
Airstrikes don't usually work very well on terrorist groups, whose strategies often depend on hiding
among civilians. But ISIS is different. It is obsessed with acquiring land, a key aspect to its mission. The
group seeks to establish a state, complete with justice, governance, and, most important, territory. This
obsession has left them in plain sight for airstrikes.
Since the US airstrikes started last August, ISIS's territorial ambitions have been significantly disrupted.
The Iraqi army, the Kurdish peshmerga, and Shia militias (which are often sponsored by Iran) have been
pushing them back. This is why many analysts are confident ISIS will soon lose it territory in Iraq and
once again end up where it started a year ago, a delusional group of hardened warriors festering in the
chaos of a Syrian civil war.
Links: NSA Surveillance Stops ISIS Attacks
NSA Surveillance key to stop ISIS attacks
Carroll 15
(Before joining The Guardian Rory worked as a reporter for the Irish News in Belfast. He was born in
Dublin and holds degrees from Trinity College Dublin and Dublin City University., Rory Carroll, 4-1-2015,
"NSA surveillance needed to prevent Isis attack, claims former intelligence chair," Guardian,
http://www.theguardian.com/us-news/2015/apr/22/mass-surveillance-needed-isis-attack-mike-rogers,
DSG)
Mass surveillance should be retained because of the prospect of Islamic State attacks within the United
States, a key Republican ally of the National Security Agency has claimed. Mike Rogers, the former
chairman of the House intelligence committee, said the NSA needed to preserve its wide powers in case
Isis used its bases in Syria and Iraq to unleash atrocities on the US homeland. “Now you have a very real
face on what the threat is,” Rogers told the Guardian on Tuesday. “Somebody calling back from Syria to
Minnesota, either recruiting somebody or giving the operational OK to do something. That’s real and it’s
serious. Before it seemed all hypothetical. Now you can see it.” He added: “Think about how many
people are in Syria with western passports or even American passports. I want to know if they pick up
the phone. If they’re calling back to the States, I don’t know about you, but I want to know who they’re
talking to and what they’re talking about.” Rogers gave the warning as negotiators in the House of
Representatives wrangled over a revamp of the USA Freedom Act, a bill that aimed to stop the NSA from
its daily collection of US phone records in bulk which failed in the Senate in 2014, and is now returning
to Congress. A coalition of civil libertarian groups on the left and right wants a landmark law to reform
the intelligence services in the wake of revelations to the Guardian by Edward Snowden, the NSA
whistleblower. Part of the Patriot Act known as section 215, which the NSA uses to justify domestic
mass surveillance, expires on 1 June. Reformers hope that deadline will give them the leverage to make
sure the Freedom Act only reauthorises those provisions on condition of much greater privacy
protections. Republicans, however, are signalling possible resistance. Senator Charles Grassley, the
powerful chair of the Senate judiciary committee, whose support is crucial, told reporters on Tuesday he
had concerns about “finding a balance between national security and privacy” in the bill. The National
Journal reported that the Senate majority leader, Mitch McConnell, may try to thwart reformers by
introducing a bill that would reauthorise section 215 until 2020. Rogers, speaking in a brief interview
after addressing the Rand Corporation thinktank in Los Angeles, sought to persuade Democrats and his
fellow Republicans of the need to keep extensive surveillance, and expressed hope that “cooler heads”
in Congress will renew section 215 without ceding big concessions to reformers. Nadia Kayyali, an
activist with the digital rights group Electronic Frontier Foundation, said reauthorising the provision
without comprehensive reform would be against the constitution. “Ending the bulk collection of phone
records under section 215 is the first step in reforming the NSA. The time for Congress to take that step
is now.” She said NSA defenders would falsely claim that it was necessary to keep the mass surveillance.
“But the Privacy and Civil Liberties Oversight Board, the President’s Review Group, and senators who are
familiar with how bulk phone records collection works have all said we don’t need the program.” Kayyali
accused reform opponents of peddling fear and discredited claims, such as mass surveillance having
stopped 54 terrorist attacks. “We hope at least Congress has some frank, truthful discussion about NSA
spying as we head towards the 1 June deadline.” In his address to the Rand Corporation audience
Rogers, a former FBI agent, painted a dark picture of terrorists and other enemies exploiting the naivety
and complacency of certain Americans – including Barack Obama – who did not grasp the urgency of
nurturing and projecting US power. He lamented that the uproar over Snowden’s leaks gave the public a
“completely wrong” impression about NSA collection of metadata, which he compared to a postman
noting an envelope’s addressee and sender. “It got so distorted, as if the government was collecting
everything and hoarding it in the basement and couldn’t wait to find out about Aunt May’s bunions. The
political narrative got ahead of the facts. It was very frustrating.” Rogers, a close ally of John Boehner,
the House majority leader, expressed confidence Congress would strike an acceptable balance. “I’m
hoping cooler heads will prevail knowing what we have now. I mean, Isis is a mess. And this
interconnected world we live in, with these folks having the ability to get back to the United States, is
really troubling. We better have some mechanism to protect ourselves and still protect our civil rights.”
NSA Surveillance foiled an ISIS plot on the Capitol
Friedman 15
(Dan Friedman joined the Washington bureau of the Daily News in December 2012. He covers Congress,
the White House and the New York delegation., Dan Friedman, 1-16-2015, "Boehner credits NSA for
stopping ISIS plot against Capitol," NY Daily News,
http://www.nydailynews.com/news/politics/boehner-credits-nsa-stopping-isis-plot-capitol-article1.2080689)
National Security Administration snooping helped stop an ISIS backer’s plot against the Capitol, House
Speaker John Boehner said Thursday.
He credited the Foreign Intelligence Surveillance Act, saying: "We would have never known about this
had it not been for FISA program and our ability to collect information on people who pose an imminent
threat.”
Speaking at a news conference at a retreat for House and Senate Republicans in Hershey, Pa., he Ohio
Republican said he wanted to emphasize the issue because Congress will consider renewing the FISA act
in coming months.
"Our government does not spy on Americans, unless they are Americans who are doing things that
frankly tip off our law enforcement officials to an imminent threat," he said. "It was those law
enforcement officials and those programs that helped us stop this person before he committed a
heinous crime in our nation's capital."
The FBI arrested Christopher Cornell, 20, of Green Township, Ohio, near Cincinnati, Wednesday, and
charged him with plotting to detonate pipe bombs in the Capitol building.
Caldwell is an apparent Islamic State supporter and talked of setting up an ISIS cell in the United States,
authorities say. He was charged after sharing his plans with an uncover informant dispatched by the FBI.
They received a tip that Caldwell was making pro-ISIS statements on Twitter under an alias.
'I hope that he gets the help that he needs.' Michael Hoyt, 44, was indicted last week on charges of
threatening to shoot or poison Boehner.
Impacts: Bioweapons are Feasible/Possible
ISIS is trying to build bioweapons
Ynet ‘14
(Israel’s largest and most popular news and content website, “ISIS laptop reveals project to build
biological weapons”, Israel news, September 1, 2014, http://www.ynetnews.com/articles/0,7340,L4566367,00.html, DSG)
US intelligence officials discovered that one of the world's nightmare scenarios may have some base in
reality as, according to a report in Foreign Policy last Friday, a laptop was recently discovered in war-torn
Syria, detailing the attempts and ambitions of the Islamic State (ISIS) to build and use weapons of mass
destruction. According to the report, the computer was discovered in the city of Idlib in north-western
Syria, near the Turkish border after fierce battles in which other resistance groups captured the area,
and with it an ISIS post. An ISIS militant brandishes a knife over captured Syrian soldiers. (Photo: AP) An
ISIS militant brandishes a knife over captured Syrian soldiers. (Photo: AP) Foreign policy said that the
computer belonged to a Tunisian national who studied chemistry at two separate universities in his
home country before leaving to join ISIS in Syria. The Syrian rebels who captured Idlib didn't know what
was on the computer or what importance it may have and therefore passed it on to Foreign Policy
reporters who initially thought that the laptop was empty. Only after further investigation did they
discover tens of thousands of folders and documents in French, English and Arabic. The computer's
contents were originally unsurprising for a terrorist organization like ISIS. Reporters found old videos of
Osama Bin Laden, a guidebook for building a bomb and stealing a vehicle, and how jihadists should use
disguises and fake identities to travel from country to country without being caught. Finally, after hours
of filing through the computer's documents, Foreign Policy reporters found documents proving that the
Tunisian had taught himself how to construct biological weapons for attacks that would astound the
world. Perhaps the most alarming of the documents however, detailed ISIS sanctioned work to
weaponize the bubonic plague and other viruses that would have an even greater affect than that of a
localized chemical attack. "The benefits of a biological weapon are that it doesn't come up often, and
the losses are massive," said the instructions on the laptop. "When a mouse is injected by the bacteria,
the symptoms of the disease begin to show after 24 hours. It's best to use in places like underground
trains or soccer fields and it can be used in a suicide attack as well." Alongside the instructions was also a
message of religious approval for the use of such weapons - part of a Fatwa which says that, "If the
Muslims can't overwhelm the infidels in any other way, they are allowed to use weapons of mass
destruction to kill everyone and erase them and their descendants from the earth." While the idea of
ISIS establishing such devastating weapons can easily conjure fear, this isn't the first time that terrorist
organizations have brought the issue of biological weapons to the forefront of the war on extremism.
Even before the September 11 attacks in the US, al-Qaeda was involved in attempts to use chemical
weapons in Afghanistan. In a CNN report from 2002, members of the extremist group could be seen
using toxic gas on dogs. The US invested substantial efforts to prevent al-Qaeda from getting biological
weapons, but the information on the laptop from Syria proves that terrorist organizations are still
working to develop such weapons, which can kill thousands of people in one breath. The fear is that the
longer ISIS continues to exist, the more specialists may join its ranks and use labs in the areas already
capture by ISIS to work toward chemical weapons capabilities. Such labs exist in Mosul in Iraq and Ar
Raqqah in Syria, both in the hands of ISIS militants.
Al-Qaeda is a Bioweapons threat
Soffer ‘13
(The managing editor of Arutz Sheva, Ari, “Experts Warn of Al Qaeda Biological Weapons Threat”, Arutz
Sheva, October 16, 2013, http://www.israelnationalnews.com/News/News.aspx/172897#.Vaz4cPlViko,
DSG)
As international attention in Syria focuses on efforts to dismantle the Assad regime's chemical weapons
stockpile, British experts are warning of another, potentially more lethal threat. Experts from the Henry
Jackson Society (HJS) have issued a stark warning over what they say is the "clear and present danger" of
Al Qaeda gaining possession of the Assad regime's stockpile of biological weapons, claiming to have
substantial evidence that Al Qaeda-linked groups may already have possession of toxic agents. Unlike
chemical weapons, which utilize chemical agents to poison victims, biological weapons make use of
diseases, toxins and other contagious agents. Biological weapons have the potential to kill far greater
numbers, and are also far harder to detect or protect against. Both are banned under international
treaties, but the Syrian government possesses active programs in both fields. However, whilst the use of
chemical weapons during the Syrian civil war has been seen on numerous occasions - most notably, but
by no means exclusively, during the August 21 attack which killed more than 1,000 people in a number
of Damascus suburbs - biological weapons have not been used by either side. That is likely because
bioweapons are notoriously difficult to control or contain. But the HJS report, released on Tuesday, says
that jihadists in Syria are actively seeking to gain control of the regime's biological weapons' stockpile
and, chillingly, suggests they may already have done so. The report claims that the Assad regime is losing
control of its bioweapons arsenal, in part because it was never centrally-controlled in the way the
country's chemical weapons stockpile has been. "Unlike chemical weapons, maintained in military
designated stockpiles which are generally identifiable and which Assad maintains command and control
over, the structure of Syria's biological warfare programs are latent, compartmentalized and spread
across its remaining bio-pharmaceutical infrastructure. The programs are designed to be highly agile to
allow swift production if required." Worryingly, the report suggests that the Al Qaeda-linked Nusra Front
may already have possession of "biological pathogens or weaponized agents either of which would pose
a threat to the international community." It points to the widespread looting of bio-pharmasuitical
laboratories throughout the country, and cites a "credible eyewitness" as claiming to have personally
witnessed "a looted pharmaceutical laboratory," near Aleppo, where Syria's biological weapons program
is concentrated, "which was probably a cover for a biological weapons production site." The fact that a
Malaysian Al Qaeda operative named as Yazid Sufaat, identified as "Al Qaeda's primary biological
weapon expert", was arrested in February as he attempted to enter Syria, was said to indicate the clear
interest that the group has in developing such a program in the country. Other Al Qaeda branches, most
notably in Yemen and North Africa, have previously attempted to obtain such weapons, and the group's
founder, Osama Bin Laden, had expressed an interest in them prior to the infamous 9/11 attacks. While
the report does not cite any clear and definitive evidence of Al Qaeda physically possessing biological
agents, the circumstantial evidence paints a fairly alarming picture. On the other hand, analysts will find
some solace in the fact that neither Al Qaeda nor any other terrorist group has successfully
manufactured and deployed biological weapons to lethal effect. But HJS's Associate Fellow Dr Bellamy
van Aalst, a former EU and NATO bio-defence consultant, warned against complacency, in light of the
relative availability of already-weaponized and readily-deployable biological weapons in Syria.
“Establishing the extent to which Assad may have developed biological WMDs is extremely difficult,
given that their production is indistinguishable from benign biological lab processes. “But this is certainly
a risk to which we should not turn a blind eye. If Assad has been developing biological weapons, as the
evidence suggests, and if those weapons fall into the hands of extremists, global health security could be
in grave danger.”
Al Shabaab trying to get bioweapons
Kelley ‘13
(Maria Kelley is a well-rounded intelligence professional with experience in four distinct areas of analysis
as both a service member and a civilian. While deployed she was devoted to understanding and
dismantling terrorist networks and analyzing their ideology. She holds two Bachelor degrees in Law and
was inducted into Golden Key International Honour Society for academic excellence. While earning her
Master's in Intelligence with a concentration in Analysis she was again academically recognized and
inducted into Pi Gamma Mu. She is currently working on expanding upon her research on WMDs and
applying it to other terrorist organizations., Maria, “Terrorism and the Growing threat of Weapons of
Mass Destruction- Al-shabaab”, GRIN, August 5, 2013, http://www.grin.com/en/ebook/230939/terrorism-and-the-growing-threat-of-weapons-of-mass-destruction-al-shabaab, DSG)
In 2008, the then Director of National Intelligence, J. Michael McConnell, told the US Senate Select
Committee on Intelligence that the safety of the United States was threaten by the “ongoing efforts of
nation-states and terrorists to develop and/or acquire dangerous weapons and delivery systems” (Spiers
2010, 90). Mr. McConnell was right to be concerned; some chemical and biological weapons can be
produced easily and inexpensively, hence the reference “poor man’s atomic bomb” (Spiers 2010, 96).
There is some suspicion that some countries are secretly pursuing nuclear capabilities while others are
openly seeking these capabilities.
(1) al-Shabaab, given its current area of operation, control, and affiliations, already possesses the ability
and capability of obtaining materials and producing chemical and biological weapons of mass
destruction. (2) The most common reason these chemical and biological cocktails have not been used is
that the best method of delivery has not been ascertained by al-Shabaab. (3) The effectiveness and
potential success of the weapons is still undetermined by al-Shabaab.
ISIS is trying to use ebola as a bioweapon
Fitzgerald ‘14
(A writer, journalist, and analyst for newsmax, Sandy, "ISIS Could Turn Ebola Into Bioweapon, Security
Expert Warns," Newsmax, October 10, 2014, http://www.newsmax.com/Newsfront/Ebola-ISISterrorists-bioweapons/2014/10/10/id/599965, DSG)
The Islamic State (ISIS) may be thinking of using human carriers to infect its enemies with the Ebola
virus, a national security expert claims, saying terror groups would not have to weaponize the deadly
virus to spread the disease. "In the context of terrorist activity, it doesn't take much sophistication to go
that next step to use a human being as a carrier," Retired Capt. Al Shimkus, a professor of national
security affairs at the U.S. Naval War College, told Forbes. Shimkus said the "individual exposed to the
Ebola virus would be the carrier," and with West Africa in an open epidemic, it would not be difficult for
terrorists to steal infected bodily fluids to use elsewhere. Shimkus said that ISIS or another terror group
could also send some operatives into an outbreak region so they could intentionally expose themselves
to the virus, and once exposed, they could head to a target city or country. Troops have been using
human carriers to spread disease for centuries, even during the Middle Ages, said Shimkus, when they
threw corpses of people who had died of the bubonic plague over enemy walls to spread the disease.
Shimkus is not alone in believing Ebola could be used as a weapon, Forbes reports. Amanda Teckman,
who wrote the paper "The Bioterrorist Threat of Ebola in East Africa and Implications for Global Health
and Security" says "the threat of an Ebola bioterrorist attack in East Africa is a global health and security
concern, and should not be ignored."
Al-Qaeda is already attempting to strike the US with bioweapons
Bell ‘13
(a professor and endowed professor at the University of Houston where he founded and direct the
Sasakawa International Center for Space Architecture and head the graduate program in space
architecture. His background deals extensively with research, planning and design of habitats, structures
and other support systems for applications in space and extreme environments on Earth. he have
recently written a new book titled "Climate of Corruption: Politics and Power Behind the Global
Warming Hoax"., Larry Bell, 10-20-2013, ""Black Wind To America": A Deadly Terrorist Bioweapon
Program Agenda?," Forbes, http://www.forbes.com/sites/larrybell/2013/10/20/black-wind-to-americaa-deadly-terrorist-bioweapon-program-agenda/, DSG)
Larry, while we can’t be certain, the advisor to the European Union on bioweapons has told them of the
evidence of smallpox being tested on prisoners in Syria—and that was years before the current uprising.
The word “smallpox” was also found written on incubation containers in Iraq after the first Gulf War.
More recently there has been chatter of a “black wind to America”. After the attack in Spain, the
Brigade of Abu Hafs al-Masri said, claiming to speak for al-Quaeda, “We announce the good news for the
Moslems in the world that the strike of the black wind of death against America, is now at its final stage,
90 percent ready and it is coming soon, by God’s will.”
Some have interpreted this as a reference to a bio-attack. Again, we can’t be sure that’s what they are
referring to, but it would be a mistake not to plan for every contingency.
ISIS Impacts
ISIS causes causes toxic warfare
Karasik 14
(Dr. Theodore Karasik is a Gulf-based analyst of regional geo-political affairs. He received his Ph.D in
History from UCLA in Los Angeles, California in four fields: Middle East, Russia, Caucasus, and a
specialized sub-field in Cultural Anthropology focusing on tribes and clans., Theodore, 7-23-2015, "ISIS
and the potential for toxic warfare," No Publication,
http://english.alarabiya.net/en/views/news/middle-east/2014/07/13/ISIS-and-the-potential-for-toxicwarfare.html)
Reports over the past few days of Islamic State of Iraq and Syria (ISIS) capturing chemical and uranium
compounds is bringing to light the issue of how violent terrorist groups may use such materials for
nefarious purposes. If ISIS incorporates these materials into its capabilities and can justify their use, it
means Caliph Ibrihim and his lieutenants will find an important tool that can cause psychological panic.
Neighboring states and the international community need to be fully aware of the potential impact and
be ready to implement mitigation strategies necessary to halt this potentially destructive problem,
resulting in potential “Toxic Warfare” scenarios.
ISIS appears to have an increased interest in weapons that incorporate harmful materials that are
inexpensive and relatively easy to acquire. Such “toxic weapons” provide a means for non-state actors in this case ISIS - to improve their capabilities to achieve goals within the context of asymmetrical
warfare. In basic terms, toxic warfare refers to the use of chemicals or harmful materials to hurt or alter
the behavior of an opponent during kinetic operations. Toxic warfare does not, however, require the use
of traditional weapons but seeks to psychologically damage an opponent and create havoc.
Toxic warfare can be used by both state and non-state actors to achieve a number of objectives. Toxic
warfare can cause casualties among opposing militaries by incapacitating and, in some cases, killing the
adversary. Toxic warfare can also halt or force delays in military logistics flows or operations and can
disrupt the functioning of the urban infrastructure through contamination or corrosion. ISIS can perhaps
use toxic warfare for a strategic advantage in their holy war against their enemies.
Toxic weapons can, moreover, derive power from the uncertainty that stems from their potential use.
Toxic substances often represent an unknown threat, and the level of uncertainty surrounding the
potential damage these substances might cause can increase their impact even when little or no
physical harm has been done. ISIS can use substances with profound psychological impact and based on
their superior information campaigns, will know how to capitalize on any potential use with full effect.
Now let’s turn to two major events that occurred within 48 hours of each other. In mid-June, ISIS
captured the Muthanna site, 56 kilometers north of Baghdad. This achievement, only reported in the
open press recently, asserted that ISIS militants now had access to Sarin and Mustard gas. Muthanna
was Saddam Hussein’s main chemical weapons facilities and was used to store the remainder of the
former despot’s stockpile. But the Sarin and Mustard gas is not of concern here because of degraded
composition. Instead, sodium cyanide is the main risk. According to a Jordanian official, ISIS took a large
quantity of sodium cyanide from Muthanna which is a very toxic chemical and a precursor for the
warfare agent tabun. During the American occupation, the tabun-filled containers were all treated with
decontamination solution and likely no longer contain any agent, but “the residue of this
decontamination would contain cyanides, which would still be a hazard.” This cyanide can be potentially
used to poison water supplies with toxic results and creating general panic.
Less than 24 hours later, news of an Iraqi government appeal dated July 8 to United Nations SecretaryGeneral Ban Ki Moon, appeared in the mass media. The Iraqi government asked for international help in
regarding 40kg of uranium compounds stolen by ISIS from Mosul University. Iraq’s ambassador to the
U.N., Mohammad Ali al-Hakim said that “terrorist groups have seized control of nuclear material at the
sites that came out of the control of the state.” At first glance, the uranium in question appears to be
used by Mosul University faculty in determining the impact of U.S. use of Depleted Uranium (DU) shells
on, for instance, local flora and fauna.
However, the tone of the request seemed to be almost alarmist for simple uranium. The Russian press
picked up the Iraqi concern while the Western press downplayed the event. Russian Foreign Ministry
spokesman Alexander Lukashevich said “the sheer fact that the terrorists ... show unmistakable interest
in nuclear and chemical materials is, of course, very alarming.”
Maybe the Kremlin should be concerned. After all, any ISIS chemical and uranium agents are indeed in
Moscow’s area of worry both geographically and logistically given the presence of Chechen leader Abu
Umar al-Shishani. According to an Arab official, shockingly, the material taken from Mosul University
was Plutonium 238: “It came from Ukraine in 2011 via personnel at the Vostochny Integrated Mining
and Concentrating Plant (VostGOK). It is completely illegal and was brought via Turkey to Iraq for use for
‘eventual Sunni/Saddamist enrichment’. The material got into Iraq through the black market with
middlemen and transport without inspection. The Mosul University work on DU studies was a cover.” If
true, this story adds an additional danger to ISIS’ capabilities as well as their ability to create a
Radioactive Dispersal Device (RDD) which is capable of spreading panic and making a unholy mess via a
vaporization process. If not true, then there are certainly questions to be asked regarding Mosul
University’s security procedures, along with missing government oversight, for their experiments given
that the uranium compounds are toxic.
Overall, the events of the last weeks regarding ISIS’s growing holdings of toxic substances raises the
question of how they will be used. The group clearly has extreme violence in its portfolio of weapons,
and toxic warfare should not be ruled out. Chemical and radiation detection will be a necessity with
clear civil defense procedures in place. In the Levant, this type of response may be practically impossible
to implement and therefore regional and international powers may have to intervene either before it’s
too late or to clean-up the resulting poisonous disorder. As a warning from ISIS, the first issue of the
Caliphate’s English language magazine, Dabiq, said “tawahhush” (mayhem) is necessary.
ISIS sparks nuclear war
Batchelor 15
(Online news reporter for daily express and freelances the ipaper, Tom Batchelor, 6-11-2015, "ISIS
fighters plot nuclear war after they obtain radioactive material to build dirty bomb," Express.co.uk,
http://www.express.co.uk/news/world/583563/Islamic-State-radioactive-material-nuclear-weapon)
According to the Australian foreign minister, Julie Bishop, Nato members are growing increasingly
worried about radioactive material seized by the terror group, with fears that it could be turned into a
nuclear weapon.
It is thought that ISIS fighters have stolen or captured the toxic loot from government-controlled
research centres and hospitals across the region.
The radioactive matter is thought to have been destined for use by authorities for health and science
research - but it has now fallen into the hands of ISIS radicals.
Middle East expert Afzal Ashraf
Ms Bishop claimed the jihadi organisation had recruited "highly technically trained professionals" and
was already using chlorine as a weapon.
She added that ISIS was "prepared to use any and all means, any and all forms of violence they can think
of, to advance their demented cause.
"That includes use of chemical weapon."
ISIS supporters in Mosul, IraqAP
ISIS has been operating in its current form for just a year but has already made sweeping gains
A former commander of the British army's chemical weapons unit has spoken out in support of the
Australian foreign minister's comments, calling the development of a dirty bomb by ISIS a "very real
threat".
Hamish de Bretton-Gordon also described as "worrying" reports that ISIS fighters had got hold of
chemical weapons previously controlled by Syrian president Bashar al-Assad's troops.
Middle East expert Afzal Ashraf told Express.co.uk that the group's long-term plan hinged on obtaining
the deadly weapon.
ISIS causes regional instability
World Review 14
(It is an online information platform with access to a worldwide network of experts and in-depth
research and analysis providing insight on relevant topics in geopolitics, economics, defense & security
and energy., World Review, 06-24-2014, "ISIS advance in Iraq poses threat to regional instability,"
http://www.worldreview.info, http://www.worldreview.info/content/isis-advance-iraq-poses-threatregional-instability)
Short of real and effective political power-sharing in Iraq, this group is unlikely to be pacified. Continued
political sectarianism by the Shia government will only exasperate the extremist threat with the
possibility that Iraq will splinter into three regions.
There will be consequences, particularly in terms of an increased threat of terrorism, regional instability
and possibly limited disruption to the flow of oil. The most likely scenario is that there will be no
strategic redeployment of forces or renewed military intervention.
US President Barack Obama’s decision to deploy 300 military advisers in Iraq is unlikely to lead to
'mission creep'. The protagonists are likely to fight in a replay of the 2006 eruption of the Iraqi civil war
regardless of any last-minute concessions from Prime Minister Nouri al-Maliki to grant Sunnis real
political power - or even if he leaves office.
An ISIS victory would be regionally destabilising as a large, strategically important tract of territory will
be considered 'ungovernable space' for purposes of conventional diplomacy, politics and state craft. The
Syrian civil war would become more vicious as ISIS would be emboldened and its new-found territory
would provide a strategic military and logistical depth to its Syrian operations.
This new ungovernable space would produce more global security threats by training jihadists who
return to their home countries after being radicalised and battle-hardened during their stints fighting
with ISIS in Syria and Iraq. These people, born and bred in Western countries, are then sent home to
commit terrorist acts. This could prove to be the most serious security threat to European countries over
the next couple of years.
ISIS cyberattack leaves US vulnerable
Blosser 15
(John Blosser, 4-16-2015, "Experts Warn ISIS' Cyberattack Capabilities Leave US Vulnerable," Newsmax,
http://www.newsmax.com/Newsfront/ISIS-computers-Islamic-State-UnitedStates/2015/04/16/id/639010/)
Islamic State (ISIS) terrorists are becoming more cyber-savvy than ever, experts warn, showing
surprisingly sophisticated capability at recruiting young computer mavens to their cause, hacking into
worldwide websites and posing a serious threat to Western emergency systems, utilities,
communications, and transportation systems.
A "cyberattack" on the U.S. "launched by foreign hackers…could cripple the country by taking down the
power grid, water infrastructure, transportation networks and the financial system," warn Mitchell
Silber, former director of intelligence analysis for the New York Police Department, and Daniel Garrie, of
the Journal of Law and Cyber Enforcement, writing in The Wall Street Journal.
"In a major U.S. city, a combined physical and cyber terrorist attack could result in hundreds wounded
and killed. It could also impair first responders’ ability to get to the scene of the attack, and the ability of
local government to communicate with the city’s population in a chaotic and confusing environment,"
the pair wrote.
Already, an ISIS group called CyberCaliphate has taken over the French TV network TV5 Monde for 24
hours and invaded the Twitter accounts of the U.S. Central Military Command (Centcom), posting the
chilling messages, "American soldiers, we are coming. Watch your back," and "We broke into your
networks and personal devices and know everything about you. You'll see no mercy, infidels. ISIS is
already here. We are in your PCs, in each military base," the Canadian Broadcasting Corp. (CBC)
reported.
Three years after Congress mandated the development of a cyber-protected national public safety
broadband network, it is still not up and running, Garrie and Silber wrote.
"To successfully prevent future attacks, whether cyber-enhanced terrorism or otherwise, federal and
local authorities in likely urban targets will need to increase their cyber situational awareness,
preparedness and resilience," the Journal reported.
Terrorism Link Turns
Terror Link Turns
False positives in big data leads to less reliable results
Nassim M. Taleb 13. Nassim N. Taleb is the author of Antifragile, which this piece is adapted from. He
is a former derivatives trader who became a scholar and philosophical essayist. Taleb is currently a
distinguished Professor of risk engineering at New York University’s Polytechnic Institute. His works
focus on decision making under uncertainty, in other words “what to do in a world we don’t
understand.” His other book is The Black Swan: The Impact of the Highly Improbable. [“Beware the Big
Errors of ‘Big Data’” wired.com 02/08/13 URL: http://www.wired.com/2013/02/big-data-means-bigerrors-people/] JC
Big-data researchers have the option to stop doing their research once they have the right result. In
options language: The researcher gets the “upside” and truth gets the “downside.” It makes him
antifragile, that is, capable of benefiting from complexity and uncertainty — and at the expense of
others.∂ But beyond that, big data means anyone can find fake statistical relationships, since the
spurious rises to the surface. This is because in large data sets, large deviations are vastly more
attributable to variance (or noise) than to information (or signal). It’s a property of sampling: In real life
there is no cherry-picking, but on the researcher’s computer, there is. Large deviations are likely to be
bogus.∂ We used to have protections in place for this kind of thing, but big data makes spurious claims
even more tempting. And fewer and fewer papers today have results that replicate: Not only is it hard to
get funding for repeat studies, but this kind of research doesn’t make anyone a hero. Despite claims to
advance knowledge, you can hardly trust statistically oriented sciences or empirical studies these days.
Overreliance on Big Data fails in counterterror ops
Frances Goullart 13. Francis Gouillart is the president of Experience Co-Creation Partnership, a
management education and consulting firm in Concord, Mass. and author of The Power of Co-Creation.
[“Big data NSA spying is not even an effective strategy” Fortune.com June 10, 2013
http://fortune.com/2013/06/10/big-data-nsa-spying-is-not-even-an-effective-strategy/] JC
FORTUNE — The Obama Administration thinks it can prevent terrorism by collecting and linking
immense volumes of private phone call, credit card, and Internet data. Unfortunately, as the
administration trades privacy for intelligence insights, President Obama is exchanging a cherished
American value for an unproved theory.∂ The Obama Administration loves data. It argues that the
president was reelected because of its enormous people database and use of polling and social media.
And the Affordable Care Act is built in part on a belief that massive troves of electronic health records
will pave the way for predictive algorithms that will prevent costly hospital readmissions, or identify
medical practices that lead to better patient health.∂ But the evidence for big data is scant at best. To
date, large fields of data have generated meaningful insights at times, but not on the scale many have
promised. This disappointment has been documented in the ∂ Wall Street Journal∂ , ∂ Information Week∂ ,
and SmartData Collective. Yet, for years now, corporations and public organizations have been busy
buying huge servers and business intelligence software, pushed by technology providers and consultants
armed with sales pitches with colorful anecdotes such as the Moneyball story in which general manager
Billy Beane triumphed by using player statistics to predict the winning strategies for the Oakland A’s
baseball team. If it worked for Billy Beane, it will work for your global multinational, too, right? Well,
no.∂ MORE: Spying: Good for business — as long as it stays secret∂ The worship of big data is not new.
Twenty-five years ago, technology salespeople peddled data using an old story about a retailer that
spotted a correlation between diaper purchases and beer drinking, allowing a juicy cross-promotion of
the two products for young fathers. Today, most data warehouses are glorified repositories of
transaction data, with very little intelligence.∂ Working with multinationals as a management
consultant, I have chased big data insights all my life and have never found them. What I have learned,
however, is that local data has a lot of value. Put another way, big data is pretty useless, but small data
is a rich source of insights. The probability of discovering new relationships at a local, highly contextual
level and expanding it to universal insights is much higher than of uncovering a new law from the
massive crunching of large amounts of data.∂ According to my firm’s research, local farmers in India with
tiny fields frequently outperform — in productivity and sustainability — a predictive global model
developed by one of the world’s leading agrochemical companies. Why? Because they develop unique
planting, fertilizing, or harvesting practices linked to the uniqueness of their soil, their weather pattern,
or the rare utilization of some compost. There is more to learn from a local Indian outlier than from
building a giant multivariate yield prediction model of all farms in the world. The same is true for
terrorism. Don’t look for a needle in a giant haystack. Find one needle in a small clump of hay and see
whether similar clumps of hay also contain needles.
Big data counterproductive to finding terrorism
Julia Angwin 13. Julia Angwin is a senior reporter at ProPublica. From 2000 to 2013, she was a reporter
at The Wall Street Journal, where she led a privacy investigative team that was a finalist for a Pulitzer
Prize in Explanatory Reporting in 2011 and won a Gerald Loeb Award in 2010. Her book "Dragnet Nation:
A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance," was published by
Times Books earlier this year, and was shortlisted for Best Business Book of the Year by the Financial
Times. [“NSA Struggles to Make Sense of Flood of Surveillance Data- Spy Agency Drowns in Useless Data,
Impeding Work, Former Employee Claims” December 25, 2013 The Wall Street Journal URL:
http://www.wsj.com/articles/SB10001424052702304202204579252022823658850] JC
The agency is drowning in useless data, which harms its ability to conduct legitimate surveillance, claims
Mr. Binney, who rose to the civilian equivalent of a general during more than 30 years at the NSA before
retiring in 2001. Analysts are swamped with so much information that they can't do their jobs
effectively, and the enormous stockpile is an irresistible temptation for misuse.∂ Mr. Binney's warning
has gotten far less attention than legal questions raised by leaks from former NSA contractor Edward
Snowden about the agency's mass collection of information around the world. Those revelations
unleashed a re-examination of the spy agency's aggressive tactics.∂ MORE∂ Snowden Warns of Dangers of
Citizen Surveillance∂ But the NSA needs more room to store all the data it collects—and new phone
records, data on money transfers and other information keep pouring in. A new storage center being
built in Utah will eventually be able to hold more than 100,000 times as much as the contents of printed
materials in the Library of Congress, according to outside experts.∂ Some of the documents released by
Mr. Snowden detail concerns inside the NSA about drowning in information. An internal briefing
document in 2012 about foreign cellphone-location tracking by the agency said the efforts were
"outpacing our ability to ingest, process and store" data.∂ In March 2013, some NSA analysts asked for
permission to collect less data through a program called Muscular because the "relatively small
intelligence value it contains does not justify the sheer volume of collection," another document shows.∂
In response to questions about Mr. Binney's claims, an NSA spokeswoman says the agency is "not
collecting everything, but we do need the tools to collect intelligence on foreign adversaries who wish to
do harm to the nation and its allies."∂ Existing surveillance programs were approved by "all three
branches of government," and each branch "has a role in oversight," she adds.∂ In a statement through
his lawyer, Mr. Snowden says: "When your working process every morning starts with poking around a
haystack of seven billion innocent lives, you're going to miss things." He adds: "We're blinding people
with data we don't need."∂ A presidential panel recommended earlier this month that the agency shut
down its bulk collection of telephone-call records of all Americans. The federal government could
accomplish the same goal by querying phone companies, the panel concluded.
Squo data collection increases terrorist risks
Peter Maass 2015. Peter Maass has written about war, media, and national security for The New York
Times Magazine, The New Yorker, and The Washington Post. He reported on both civilians and
combatants during the conflicts in Iraq and Afghanistan. He is the author of Love Thy Neighbor: A Story
of War, an award-winning memoir about the conflict in Bosnia, and he wrote Crude World: The Violent
Twilight of Oil. Peter, awarded a Guggenheim Fellowship in 2012, has focused most recently on
government and corporate surveillance, and is working on a book about surveillance for Alfred A. Knopf.
He has taught writing at Princeton and Columbia universities, and he has been awarded fellowships at
the Shorenstein Center at Harvard and the American Academy in Berlin. He is on the advisory boards of
the Solutions Journalism Network, and the Program for Narrative and Documentary Practice at Tufts
University. A graduate of the University of California at Berkeley, he lives in New York City. [“INSIDE NSA,
OFFICIALS PRIVATELY CRITICIZE "COLLECT IT ALL" SURVEILLANCE” May 28 2015 The Intercept URL:
https://firstlook.org/theintercept/2015/05/28/nsa-officials-privately-criticize-collect-it-all-surveillance/]
JC
Alexander, the NSA director from 2005 to 2014 and chief proponent of the agency’s “collect it all”
strategy, vigorously defended the bulk collection programs. “What we have, from my perspective, is a
reasonable approach on how we can defend our nation and protect our civil liberties and privacy,” he
said at a security conference in Aspen in 2013. He added, “You need the haystack to find the needle.”
The same point has been made by other officials, including James Cole, the former deputy attorney
general who told a congressional committee in 2013, “If you’re looking for the needle in the haystack,
you have to have the entire haystack to look through.”∂ NSA Slide, May 2011∂ The opposing viewpoint
was voiced earlier this month by Snowden, who noted in an interview with the Guardian that the men
who committed recent terrorist attacks in France, Canada and Australia were under surveillance—their
data was in the haystack yet they weren’t singled out. “It wasn’t the fact that we weren’t watching
people or not,” Snowden said. “It was the fact that we were watching people so much that we did not
understand what we had. The problem is that when you collect it all, when you monitor everyone, you
understand nothing.”∂ In a 2011 interview with SIDtoday, a deputy director in the Signals Intelligence
Directorate was asked about “analytic modernization” at the agency. His response, while positive on the
NSA’s ability to surmount obstacles, noted that it faced difficulties, including the fact that some targets
use encryption and switch phone numbers to avoid detection. He pointed to volume as a particular
problem.∂ “We live in an Information Age when we have massive reserves of information and don’t
have the capability to exploit it,” he stated. “I was told that there are 2 petabytes of data in the SIGINT
System at any given time. How much is that? That’s equal to 20 million 4-drawer filing cabinets. How
many cabinets per analyst is that? By the end of this year, we’ll have 1 terabyte of data per second
coming in. You can’t crank that through the existing processes and be effective.”
Curtailing drone use creates less terrorists
Hassan Abbas 13 Hassan Abbas is a senior advisor at Asia Society and the author of the forthcoming
book The Taliban Revival. [“How Drones Create More Terrorists- Militants take advantage of fearful
communities to draw new recruits.” August 23 2013 The Atlantic URL:
http://www.theatlantic.com/international/archive/2013/08/how-drones-create-moreterrorists/278743/] JC
Recently, strong evidence has begun to suggest that terrorists use drone strikes as a recruitment tool. Of
course, the value of drones in the arena of intelligence-gathering and secret surveillance of foes (and
even friends) is unmistakable. In warzones too, it can support ground operations in significant and even
decisive ways. None of this is controversial, though the ones on the receiving end will certainly not like
it. What is debatable is its use as a counter-terrorism instrument in theaters that are not declared war
zones, or in cases where a sovereign state is not fully and publicly on board with this policy. Lack of
transparency in regulations that govern this new type of warfare, the unverifiable nature of targets, and
questions over the credibility of intelligence only complicates the matter.∂ Mark Bowden's important
contribution to the drone debate raises critical questions that policy makers will be wise to consider for
the future use of this new tool of war. One of the important arguments mentioned in the piece revolves
around the notion that drone strikes might be less provocative than ground assaults for terrorists,
meaning that standard warfare might create more terrorists than drones do. Lets first accept what is
obvious: more civilians are killed in standard warfare, and the history of warfare in the 20th century
sufficiently proves the point. When it comes to drones strikes, the ratio of civilian deaths is certainly
lower, but the issue is not about the number of civilian casualties alone. The inherently secret nature of
the weapon creates a persistent feeling of fear in the areas where drones hover in the sky, and the
hopelessness of communities that are on the receiving end of strikes causes severe backlash -- both in
terms of anti-U.S. opinion and violence.∂ Response to drone strikes comes in many varieties. First,
revenge is targeted at those within the easy range of the insurgents and militants. The victims of those
revenge terrorist attacks also consider the drone strikes responsible for all the mayhem. Consequently,
terrorists and ordinary people are drawn closer to each other out of sympathy, whereas a critical
function of any successful counter-terrorism policy is to win over public confidence so that they join in
the campaign against the perpetrators of terror. Poor public awareness -- which is often a function of
inadequate education -- about terrorist organizations indeed plays a role in building this perspective.
Public outrage against drone strikes circuitously empowers terrorists. It allows them space to survive,
move around, and maneuver. Pakistan is a perfect example of this phenomenon.
Bulk data tradesoff with other successful counterterror ops
Schneier 15. Bruce Schneier is an internationally renowned security technologist and author.
Described by The Economist as a "security guru" [“Why Mass Surveillance Can't, Won't, And Never Has
Stopped A Terrorist” digg.com Adapted from the book Data and Goliath March 24 2015 URL:
http://digg.com/2015/why-mass-surveillance-cant-wont-and-never-has-stopped-a-terrorist] JC
The three problems listed above cannot be fixed. Data mining is simply the wrong tool for this job, which
means that all the mass surveillance required to feed it cannot be justified. When he was NSA director,
General Keith Alexander argued that ubiquitous surveillance would have enabled the NSA to prevent
9/11. That seems unlikely. He wasn’t able to prevent the Boston Marathon bombings in 2013, even
though one of the bombers was on the terrorist watch list and both had sloppy social media trails — and
this was after a dozen post-9/11 years of honing techniques. The NSA collected data on the Tsarnaevs
before the bombing, but hadn’t realized that it was more important than the data they collected on
millions of other people.∂ This point was made in the 9/11 Commission Report. That report described a
failure to “connect the dots,” which proponents of mass surveillance claim requires collection of more
data. But what the report actually said was that the intelligence community had all the information
about the plot without mass surveillance, and that the failures were the result of inadequate analysis.∂
Mass surveillance didn’t catch underwear bomber Umar Farouk Abdulmutallab in 2006, even though his
father had repeatedly warned the U.S. government that he was dangerous. And the liquid bombers
(they’re the reason governments prohibit passengers from bringing large bottles of liquids, creams, and
gels on airplanes in their carry-on luggage) were captured in 2006 in their London apartment not due to
mass surveillance but through traditional investigative police work. Whenever we learn about an NSA
success, it invariably comes from targeted surveillance rather than from mass surveillance. One analysis
showed that the FBI identifies potential terrorist plots from reports of suspicious activity, reports of
plots, and investigations of other, unrelated, crimes.∂ This is a critical point. Ubiquitous surveillance and
data mining are not suitable tools for finding dedicated criminals or terrorists. We taxpayers are
wasting billions on mass-surveillance programs, and not getting the security we’ve been promised.
More importantly, the money we’re wasting on these ineffective surveillance programs is not being
spent on investigation, intelligence, and emergency response: tactics that have been proven to work.
The NSA's surveillance efforts have actually made us less secure.
Politics Link Turns
Politics Link Turn
Freedom Act popular and bipartisan support for Freedom Act
Dan Roberts 13 Roberts is the Guardian's Washington Bureau chief, covering politics and US national
affairs. Previously, he worked as the national editor in London and was head of business. Follow him on
Twitter and Instagram. [Congressional duo launch NSA overhaul bill and urge 'meaningful reform'”
October 29 2013 The Guardian URL: http://www.theguardian.com/world/2013/oct/29/nsa-overhaulbill-legislation-usa-freedom-act] JC
The bill also calls for a special advocate to focus on the protection of privacy rights and civil liberties
before the court that oversees Fisa requests by the NSA, and requires more detailed public reporting
about the numbers and types of court orders that are issued.∂ It does not yet include reforms of
overseas activity, although such amendments are expected to be introduced soon, according to
congressional staff involved in the drafting.∂ The legislation draws on earlier reform efforts in the House
that were narrowly defeated before further NSA revelations appeared over the summer, and has
already attracted support from many members of Congress who were previously sceptical of the need
for legal change. “Washington must regain Americans’ trust in their government,” said Sensebrenner.
“|The USA Freedom Act is an essential first step.”∂ The bill has 16 co-sponsors in the Senate including
senators Mike Lee (R-Utah), Dick Durbin (D-Ill), Dean Heller (R-Nev), Richard Blumenthal (D-Conn), Lisa
Murkowski (R-Alaska), Mazie Hirono (D-Hawaii), Tom Udall (D-NM), Mark Begich (D-Alaska), Tammy
Baldwin (D-Wisc), Martin Heinrich (D-NM), Ed Markey (D-Mass), Mark Udall (D-Colo), Elizabeth Warren
(D-Mass), Jeff Merkley (D-Ore), Jon Tester (D-Mont), and Joe Schatz (D-Hawaii).∂ The measure also has
more than 70 bipartisan co-sponsors in the House and enjoys the diverse support of groups ranging
from the National Rifle Association to the American Civil Liberties Union.
Tech sector loves the Freedom Act
ITI 4/29 2015 The Information Technology Industry Council (ITI) is the global voice of the tech sector. As
the premier advocacy and policy organization for the world’s leading innovation companies, ITI
navigates the relationships between policymakers, companies, and non-governmental organizations,
providing creative solutions that advance the development and use of technology around the world.
[Tech Encourages Congress to Act Swiftly on Bipartisan Surveillance Reform Legislation” 4/29/2015
Information Technology Industry Council URL: http://www.itic.org/news-events/news-releases/techencourages-congress-to-act-swiftly-on-bipartisan-surveillance-reform-legislation] JC
WASHINGTON – The Information Technology Industry Council (ITI), the global voice for the tech sector’s
leading companies, issued the following statement from Andy Halataei, senior vice president for
government affairs, encouraging Congress to move quickly to enact the USA Freedom Act. Reps. Bob
Goodlatte (R-Va.), John Conyers (D-Mich.), James Sensenbrenner (R-Wis.) and Jerry Nadler (D-N.Y.); and
Sens. Patrick Leahy (D-Vt.) and Mike Lee (R-Utah) introduced the bipartisan legislation today:∂ "We
applaud Reps. Goodlatte, Conyers, Sensenbrenner, and Nadler; and Sens. Leahy and Lee, for their
commitment to finding a bicameral, bipartisan approach to reforming our government’s surveillance
authorities. The USA Freedom Act, H.R. 2048, builds on the foundation laid by the House Judiciary
Committee last Congress and the result is a bill that strengthens privacy protections while maintaining
the interests of national security. The bill, among other things, ends indiscriminate bulk collection of
data and enables the private sector to be more transparent about the orders it receives. These reforms
are critical to restoring user trust across the globe in both the U.S. government and U.S.-based
technology companies as well as the open and borderless Internet our innovation economy depends
upon."∂ "We urge the House Judiciary Committee to quickly approve the USA Freedom Act and avoid
harmful amendments that would jeopardize this carefully crafted bipartisan bill."∂ Earlier in April, ITI
joined in a multi tech association letter to members of Congress encouraging lawmakers to enact
needed surveillance reforms. Reforming the nation’s surveillance authorities is one of tech’s top agenda
items and ITI President and CEO Dean Garfield testified on the need for reforms last year before
committees in the House and Senate.
Tech sector dedicated to lobbying Capitol Hill, especially with surveillance
Romm 15. Tony Romm is a senior technology reporter for POLITICO Pro. He closely covers the
intersection of Silicon Valley and Washington, D.C., tracking how top tech and telecom companies lobby
in the nation's capital — from the ways the industry donates to its regulators, to the sector’s activities to
shape state and federal debates on privacy, cybersecurity, net neutrality and more. [Tech giants get
deeper into D.C. influence game- Apple, Amazon and Facebook all shelled out record amounts last year
to lobby Washington, according to new disclosures” Politico.com 1/21/15 URL:
http://www.politico.com/story/2015/01/tech-lobby-apple-amazon-facebook-google-114468.html] JC
Apple, Amazon and Facebook shelled out record amounts to influence Washington; Google posted one
of its biggest lobbying years ever; and a slew of new tech companies dipped their toes into politics for
the first time in 2014 — a sign of the industry’s deepening effort to shape policymaking in D.C.∂ The
sharp uptick in spending reflects the tech sector’s evolution from an industry that once shunned
Washington into a powerful interest that’s willing to lobby extensively to advance the debates that
matter most to companies’ bottom lines — from clamping down on patent lawsuits to restricting NSA
surveillance to obtaining more high-skilled immigration visas and green cards.∂ Story Continued Below∂
“There is increasingly a sense from companies that they need to engage earlier and smarter,” said Ryan
Triplette, a Republican lobbyist for Franklin Square Group, which represents companies like Apple and
Google. “They began opening up their view as their businesses have grown … and not just looking at
traditional technology issues.”∂ Apple, which mostly avoided D.C. under the watch of late CEO Steve
Jobs, grew its lobbying balance sheet to just over $4.1 million last year from $3.3 million in 2013,
according to an analysis of lobbying reports, the latest of which were filed midnight Tuesday. The iPhone
giant recently has shown a greater willingness to engage Washington under CEO Tim Cook: It even
dispatched executives to Capitol Hill in September to talk about its new smart watch and health tracking
tools hoping to assuage lawmakers’ fears about the new technology’s data-tracking abilities.∂ Amazon’s
lobbying expenses — more than $4.7 million, up from around $3.5 million in 2013 — correspond with
the company’s own Washington makeover. The e-commerce giant last year jumped into new lines of
business, expanding its pursuit of government contracts while eyeing a new drone delivery service,
prompting it to hire a slew of new lobbyists and move to a bigger downtown D.C. office. Amazon is also
fighting the Federal Trade Commission over how it handled app purchases made by kids.∂ Apple, Amazon
and Google declined to comment on the record. Facebook did not reply to a request for comment.∂ For
all their efforts, these tech giants failed to advance their political priorities in the last Congress — but
the fights are sure to return in 2015 under the Republican-majority Congress.∂ GOP leaders in both
chambers have already promised to revive the debate over patent litigation reform — a critical issue for
tech companies like Google that want to curb lawsuits from so-called patent trolls. There’s also talk of
boosting the number of foreign high-skilled workers, something industry titans have coveted as part of
broader immigration reform.∂ The looming expiration of key Patriot Act surveillance authorities means
Congress must also wade back into the fight over what data the NSA can collect — a major issue for
tech companies stung by Edward Snowden’s leaks about the agency’s spying via popular Internet
services. And lawmakers are plugging into new issues like drones and wearable technology that are
important to Silicon Valley.
Tech sector influential and lobbying in Capitol Hill
Bolluyt 15. Jess Bolluyt is a recent graduate of Cedar Crest College, where she wrote and edited for the
college's newspaper, and received a degree in English. Her work in poetry and fiction has appeared in
Lines + Stars, Pitch, Onyx and The Laconic. [“How Much Influence Does Google Have in Washington?”
The Cheat Sheet April 5, 2015 URL: http://www.cheatsheet.com/technology/how-much-influence-doesgoogle-have-in-washington.html/?a=viewall#ixzz3gY9jyt4i] JC
Nathan Ingraham, writing for The Verge, notes that Google has been a major influence on U.S. politics
for years, though it’s tried to keep that influence out of the spotlight. But as its influence grows, that’s
becoming more difficult to do. A recent report by The Wall Street Journal suggested that Google
tampered with a 2012 investigation by the Federal Trade Commission (FTC) into whether the search
engine giant was engaging in anticompetitive practices.∂ “Google’s access to high-ranking Obama
administration officials during a critical phase of the antitrust probe is one sign of the Internet giant’s
reach in Washington,” wrote Brody Mullins for the Journal. “One of Google’s biggest victories is the
defeat of the FTC’s antitrust probe. A lawsuit would have challenged the core of some Google business
strategies. In a sign of the stakes, Google announced the hiring of 12 additional lobbying firms one week
after news broke that the FTC had begun subpoenaing documents related to the investigation.”∂ While
the FTC decided not to bring a lawsuit against Google — the company made voluntary changes and the
investigation was closed — reports published by the Journal indicated that the commission was deeply
divided on whether it should sue. The reports also exposed the close ties between Google and the
Obama administration. The Journal quoted an FTC staff report which characterized the evidence against
Google as “a complex portrait of a company working toward an overall goal of maintaining its market
share by providing the best user experience, while simultaneously engaging in tactics that resulted in
harm to many vertical competitors, and likely helped to entrench Google’s monopoly power over search
and search advertising.” The implication of its reporting was that Google used its influence in
Washington to influence the FTC’s decision in its favor.∂
Terrorism Non-Uniques
US losing the war on terror-ISIS Proves
Macias 15 (Amanda Macias, 6-4-2015, "The US is 'probably losing' in the campaign against ISIS,"
Business Insider, http://www.businessinsider.com/the-us-is-probably-losing-in-the-campagin-againstisis-2015-6,VR)
When asked if the US-led coalition against ISIS was winning or losing, retired four-star General David Petraeus told CBS News, "These are
fights where if you're not winning, you're probably losing, because time is not on your side." Despite US
Deputy Secretary of State Antony Blinken's announcement that 10,000 Islamic State (also known as ISIS, ISIL, and Daesh) militants have
been killed since the beginning of nine-month long campaign, Petraeus called the situation "worrisome." He added
that the loss of Ramadi, the provincial capital of the Anbar province, is"an operational and a strategic
setback, a significant one." The Obama administration contends that the lsos of Ramadi is a temporary setback, but that's not how
Iraqis are seeing it. Sunni tribes in Anbar — crucial to US success— have reportedly pledged allegiance to ISIS,
and Baghdad is relying on Iran-backed Shia militias more than ever. Petraeus continued by saying that "[ISIS] is
clearly a threat to the United States, to our allies and partners around the world, and of course, very
much in the region, where it's fomenting instability, violence and indeed, far beyond Iraq and Syria. It's
also into North Africa. It's even trying to recruit in Afghanistan and Pakistan." "This is a moment, when you sit back
and say, 'What do we need to do in the military arena? What also do we need to do in the political arena?'" ISIS Islamic State Iraq Syria
controlReuters Militarily, the Obama
administration is reluctant to commit more US troops to the fight despite
the campaign's shortcomings. Earlier this month in an interview with Frontline, America's top military officer
admitted that ISIS caught the US off guard. Chairman of the Joint Chiefs of Staff General Martin
Dempsey explained that the Pentagon was unprepared when Iraq's second-largest city, Mosul, fell to
the ISIS in June 2014. When asked if there were plans on how the US could react to ISIS' possible seizure of Mosul, Dempsey responded,
"Well no, there were not." Politically, the US has allowed Iran, which is currently negotiating a nuclear deal with world powers, to entrench
itself in the sectarian government t in both Syria and Iraq. In terms of Syria, the Obama administration has pretty much ignored the civil war for
fear of upsetting Tehran.
US losing the war on cyber terror
Trugman 14 (Jonathon M. Trugman, New York Post Writer, 12-21-2014, "How the US is losing the
escalating cyberwar," New York Post, http://nypost.com/2014/12/21/how-the-us-is-losing-theescalating-cyber-war/, VR)
Last week we witnessed the repercussions of a cyberattack on American business interests like we have
never seen before. Sony Pictures, which has a massive presence here in America, was intimidated into
canceling the release of its movie “The Interview.” Sony’s stock got crushed. Its shares, which trade on
the NYSE, lost roughly 10 percent of their value as the leak of confidential corporate communications
became public. That amounts to a drop of about $2.5 billion in market value. This series of events
shows that not only any company is vulnerable to cyber-invasion, but that existing security
methodologies need to improve to combat this threat. It’s not just Sony — it also has happened with banks. In October, after
JPMorgan got hacked, CEO Jamie Dimon said the bank would probably double its $250 million cybersecurity budget over the coming years. And it has also
happened with Target, Home Depot, and on Friday, Staples said 1.1 million customers were hacked. Last
year, Target was hacked, and 40 million customers had their credit and debit card data compromised. But
the Sony attack was different, deeper and seemingly personal. And it represents a huge escalation in the cyberwar that we are
losing. With the battle charged, it’s time for our Silicon Valley whiz kids to come to the defense of the US cyber-infrastructure. Stop developing the latest
SnapTweetBook app! Get to work on a robust cyber defense shield in the US. Clearly, if hackers can gain access to embarrassing company email correspondence and
make it public, as in the case of Sony’s Amy Pascal and Scott Rudin, just imagine what they have access to we don’t know about. Dr. Georgios Portokalidis,
cybersecurity expert and professor of computer science at Stevens Institute of Technology, said, “ Security
usually comes as an afterthought
when companies are building their systems.” As opposed to doing it as an add-on to create a more secure network and system, he said, “it
must be part of the design of the systems from the design-phase principles.” Out of crisis comes opportunity, and security could become the next big growth sector
in technology. If this calling doesn’t attract the next wave of brash, brilliant, boy-band-wannabe billionaires, nothing will. There’s
a known need, and
the problem is now defined.
We are losing the war on terror-empirics prove
Rothkopf 14(David Rothkopf, CEO and Editor of foreign policy magazine, 6-10-2014, "We Are Losing
the War on Terror," Foreign Policy, http://foreignpolicy.com/2014/06/10/we-are-losing-the-war-onterror/)VR
Terrorism is spreading worldwide. Our enemies have sustained our blows, adapted, and grown. Two questions loom large as a consequence: Where did we go
wrong and what do we do now? Recent headlines and new studies support the conclusion that global terror trends are heading in an ever more dangerous
direction.
In early June, the Rand Corporation released a study that detailed the growing threat. It reports
that in 2007, there were 28 Salafi-jihadist groups like al Qaeda. As of last year, there were 49. In 2007, these
groups conducted 100 attacks. Last year, they conducted 950. The study estimates that there were between 18,000 and 42,000
such terrorists active seven years ago. The low-end estimate for last year, at 44,000, is higher than the top estimate for 2007, and the new high-end estimate is
105,000. The administration rightly argues that "core al Qaeda" has sustained "huge" damage. But "core al Qaeda" no longer poses the principle threat to the U.S.
homeland. That comes, according to the Rand report, from al Qaeda in the Arabian Peninsula. As Rand summarizes the report: " Since
2010, there has
been a 58 percent increase in the number of jihadist groups, a doubling of jihadist fighters and a tripling
of attacks by Al Qaeda affiliates. The most significant threat to the United States, the report concludes, comes from terrorist groups operating in
Yemen, Syria, Afghanistan and Pakistan." As legitimate as the questions that have emerged in the Bowe Bergdahl case may be, they are secondary to the
deteriorating situation associated with the war the recently released prisoner went to Afghanistan to fight. There is no denying that the contempt for Congress
shown in failing to inform it of the deal — even as perhaps 100 in the administration knew of it — starkly reveals the cynicism behind last year’s faux deferral to
Congress on Syria. But it would be far more cynical to continue with the Obama team’s variation on the "mission accomplished" misrepresentations of his
predecessor. The
war in Iraq was not over or won when we said it was. Nor is the war on terror won or the
threat it poses resolved simply by no longer using the term or suggesting our goal was merely to inflict
damage on the tiny fraction of terrorists who were associated with the 9/11 attacks. The reality is that we are still
fighting the last war on terror even as a new set of risks loom and are made worse by our minimizing their implications for political purposes. In its recent
assessment, "Country Reports on Terrorism 2013," the
State Department acknowledged the trend. It observes that last
year attacks worldwide increased almost by half, from 6,700 to 9,700. Nearly 18,000 people died and nearly 33,000 were
injured. While the report hails allied forces for making progress combating al Qaeda’s core in the AfPak region, it also notes that the group’s affiliates are becoming
more dangerous. The report takes particular note of the threat posed by foreign extremists in Syria, which has become a kind of petri dish in which a growing global
terror threat is being cultivated. Estimates on the number of such fighters range from 7,000 to over 20,000. The news that one recent suicide bomber in Syria was
an American and that one of the attackers behind the recent shooting at the Jewish Museum of Belgium spent time in Syria suggests how this threat may evolve
over time. It’s
not unlikely that, if left unchecked, the long-term consequences of a cadre of fighters trained
in Syria who will soon return to their home countries will be one of the darkest legacies of that war — a
legacy that may well echo the long-term costs associated with training jihadists in the battle against the Russians in Afghanistan in the 1980s, among whom, of
course, was Osama bin Laden.
Terrorism is running rampant and not backing down, prefer evidence from last month.
Pollard 7/7/15 (Stephen Pollard, 7-7-2015,Editor of the Jewish Chronicle, "Ten years later we are still
losing the war on extremism, blasts STEPHEN POLLARD," Express.co.uk,
http://www.express.co.uk/comment/expresscomment/589212/Stephen-Pollard-extremism-war-tenyears, VR)
Four years earlier, on 9/11 they had murdered nearly 3,000 people in the US. But 7/7 marked the first
British Islamist terrorist outrage and, significantly, was the product of home-grown extremists. Until 7/7
the security authorities had been focused on the prospect of foreign based terrorists arriving in Britain
and operating here. But that changed when 7/7 brought home with devastating clarity the threat from
the enemy within. The story since then has been a constant battle by the security services to prevent another mass terror attack. As
the murders of 30 Britons in Tunisia showed last month, we are no nearer defeating the extremists. It is,
instead, a matter of doing our very best to find out what they are up to and stopping them. But, as the old saying has it, we have to be lucky
every time, they only have to be lucky once. Which is why it is so worrying that so many so-called civil liberties types seem determined to
hamper the security services and stop them doing their best to protect us. David Davis – the man who, it is easy to forget, was favourite to
become Conservative leader in 2005 – is also doing his level best to frustrate the plans of David Cameron and the Home Secretary Theresa May
to ramp up the powers available to the security services and allow them to do their job. RELATED ARTICLES Bus chiefs not told of Tube blasts
'Everyone screaming and running' Tube commuters flee during rush... According to Mr Davis extra powers are not only wrong in principle, they
also won’t work: “Only by engaging with extremist views, opposing them and defeating them through debate can we hope to deal with the
threat of extremism.” Only by engaging with them and debating them! Is he serious? How about – for a start – infiltrating their networks,
listening to their conversations and stopping their supplies of money and arms? This
is not a game. This is life and death. We
are now on the second highest terror alert level, “severe”, which means an attack is highly likely. Last
week the Prime Minister said that at least four Islamist terrorist plots had been stopped in recent
months. But the civil liberties crowd think all we need to do is defeat them in debate. These people live
in a fantasy land where Islamist terror isn’t a real threat and, for some, the real blame attaches to our
security services. As when the husbands of two of the three women who ran off last month from Bradford to Syria with their nine
children then had the gall to blame the police. Yes, of course there is an important role for argument and debate. But a good start to that would
be for Muslims themselves to do more to debate and deal with the extremist cancer that exists within parts of their community. Reacting to the
runaways last month Bana Gora from the Muslim Women’s Council, said: “As Muslims we are getting to a point where we are really getting sick
of it. This onslaught of counter-terrorism legislation that’s coming through is not going to help matters.” Well, some of us are sick of terrorism.
And we want to give the authorities every chance of preventing it. So yes, it is going to help matters if counter-terrorism legislation stops jihadis
from murdering us. Freed from the Lib Dems’ shackles, the Government is now planning to introduce some of the necessary measures: allowing
the banning of some extremist groups, the closure of mosques that act as hotbeds for radicalism and giving the security services wider powers
to examine new technology communications. All this is made more important and more difficult, in the wake of the leaks by US traitor Edward
Snowden, which has severely hindered our capabilities. A report from the Henry Jackson Society showed that since his leaks at least three Al
Qaeda affiliates have changed their communication methods, online jihadist forums now use new encryption tools, GCHQ’s ability to track
groups has been reduced by about 25 per cent and it can now take three times as long to decipher targets’ communications. And
many
security operations had to stop after Snowden revealed details to our enemies. As Sir John Sawers, the
former head of MI6, put it: “Snowden threw a massive rock in the pool and the ripples haven’t stopped
yet.” Sir John has been explicit since he left the service and was able to speak publicly that it is simply
not possible to stop terrorist attacks without a data-sharing agreement with communications companies
to allow the security agencies to monitor people’s activity online. Of course that involves a loss of privacy but I’d rather
be alive, wouldn’t you? And we should be able to trust them not to misuse these powers. Instead of dismissing plans to allow the security
services to do their job with sneering terms such as “snoopers’ charter” we must allow them to enter the world of modern communications and
data that the terrorists long-ago started to use. It
is deeply depressing that 10 years after 7/7 we still have to have
these arguments. But the capacity for some people to act as the terrorists’ useful idiots knows few
limits.
We are losing the war against Domestic Terror, prefer evidence from this week.
Doblin 7/20/15 (Alfred P. Doblin, Editor for the New Jersey Group, 7-20-2015, "Doblin: America
chooses to lose the war against domestic terrorism," NorthJersey,
http://www.northjersey.com/opinion/america-chooses-to-lose-the-war-against-domestic-terrorism1.1377296, VR)
PRESIDENT OBAMA sang "Amazing Grace." On June 26, he went to Charleston, S.C., and sang "Amazing Grace" at
the funeral of Clementa Pinckney, one of nine people gunned down in the Emanuel AME Church,
allegedly by Dylann Roof, an avowed racist. The horror of the murders quickly shifted to the Confederate battle flag still flying
high on the grounds of the South Carolina capitol, while the federal flag had been lowered to half-staff. The swiftness with which the
battle flag was denounced — not just in the South Carolina statehouse, but also in the Sovereign State
of Walmart — was remarkable. Remarkable until you realize it is easier to pull down the Confederate
battle flag in the Deep South than it is to pass sensible gun-control legislation in Congress. Here's something I
read Saturday in The New York Times: More Marines died on American soil than in Afghanistan this year. That
sobering fact was in an article about the mass shooting at a Navy and Marine training center Thursday in
Chattanooga, Tenn. Four Marines were killed. On Saturday, the Navy announced that a sailor wounded
in the carnage had also died. The body count this time is five. These men trained to defend our nation
were shot down like targets in an arcade game by a man with a weapon that sends bullets into a body as
fast as someone can say "NRA." Muhammad Youssef Abdulazeez was the armed man. It has been
reported that he had spent time in Jordan and may have been inspired by ISIS. American Muslims are fearful of
reprisals. Their fear is justified. Yet after Roof allegedly murdered nine black people, there was no national conversation about the probability
that loner white men — and they are mostly loner white men — are a menace to our society. Something
is enabling these young
men to become domestic terrorists, and it is not ISIS. On Thursday, the same day Abdulazeez killed four
Marines and a sailor, James E. Holmes was pronounced guilty 165 times for the murder and attempted
murder of moviegoers in a theater in Aurora, Colo., in 2012. Holmes has no ties to ISIS. Federal officials need to
investigate whether Abdulazeez was radicalized in Jordan and whether he was part of a terrorist cell, but let's not kid ourselves: America is
losing the war against domestic terrorism. When two high school students kill other students in Columbine, when mere babes are slaughtered
in an elementary school in Connecticut and when James E. Holmes is able to obtain the firepower to shoot wildly into a crowded, darkened
movie theater, we are in the middle of a war we choose not to win. I have been rereading the Second Amendment. I'm not one of those takeaway-everybody's-guns kind of people.
The amendment states that citizens have the right to keep and bear arms.
But the amendment is silent on what those arms are. I fail to see how so many spineless public officials can insist our
Founding Fathers meant every citizen had the right to bear an assault-style weapon. The right to keep and bear arms has become more
important than the need to stop bearing the weight of caskets at funerals.
The only people benefiting in this deranged world
besides gun manufacturers are the people they pay to advocate for them. The primary role of the
federal government is to protect and defend the homeland. If every crazy loner has the ability to get
hold of high-powered weapons, government has failed to carry out its most important mandate.
Afro-Pessimism Links
Targeted surveillance is still discriminatory
Cyril 15 (Executive Director of the Center for Media Justice, an organization that cultivates grassroots movements for a
more participatory democracy; Malkia Amala, “Black America’s State of Surveillance”, The Progressive, April 2015,
http://www.progressive.org/news/2015/03/188074/black-americas-state-surveillance, RX)
In an era of big data, the Internet has increased the speed and secrecy of data collection. Thanks
to new surveillance technologies, law
enforcement agencies are now able to collect massive amounts of indiscriminate data. Yet legal
protections and policies have not caught up to this technological advance. Concerned advocates see
mass surveillance as the problem and protecting privacy as the goal. Targeted surveillance is an obvious
answer—it may be discriminatory, but it helps protect the privacy perceived as an earned privilege of
the inherently innocent. The trouble is, targeted surveillance frequently includes the indiscriminate
collection of the private data of people targeted by race but not involved in any crime. For targeted
communities, there is little to no expectation of privacy from government or corporate surveillance.
Instead, we are watched, either as criminals or as consumers. We do not expect policies to protect us.
Instead, we’ve birthed a complex and coded culture—from jazz to spoken dialects—in order to navigate a world in which spying, from AT&T and Walmart to public
benefits programs and beat cops on the block, is as much a part of our built environment as the streets covered in our blood.
Targeted warrants is MORE racist than bulk surveillance
Lennard 14 (Former freelancer at the New York Times, Natasha, “The NSA’s Racist Targeting of Individuals Is as Troubling
as Indiscriminate Surveillance”, Vice News, 9 July 2014, https://news.vice.com/article/the-nsas-racist-targeting-of-individualsis-as-troubling-as-indiscriminate-surveillance, RX)
Revelations of the National Security Agency’s massive surveillance programs have highlighted how millions of ordinary
internet and phone users — that is, non-criminal targets — have had their communications data swept up by a vast, indiscriminate dragnet.
This has occasioned justifiable outrage, but the reaction has overshadowed discussion of how the NSA targets actual individuals — a process
that, it turns out, can
be quite discriminatory. As I noted last week, if our national security state’s dangerously loose determination of
should be as troubled by the NSA’s targeting of particular
people as we are by its non-targeted spying. The latest disclosure from The Intercept clearly illustrates why. According to
documents leaked by Edward Snowden, the NSA has been spying on five distinguished Muslim-Americans under a
law — the Foreign Intelligence Surveillance Act (FISA) — that is meant to target international terrorists
or foreign agents. The inclusion of the email accounts of these five people in a spreadsheet listing the
targeted accounts of more than 7,000 others belies the NSA’s claim that it’s in the business of marking
only terrorist suspects. Here are the agency’s suspected “terrorists”: Faisal Gill, who was appointed to
(and thoroughly vetted by) the Department of Homeland Security under President George W. Bush;
Asim Ghafoor, an attorney who has defended clients suspected of terrorism; Hooshang Amirahmadi, an
Iranian-American professor of public policy and international development at Rutgers University; Agha
Saeed, founder and chairman of the American Muslim Alliance and a former political science professor
at California State University; and Nihad Awad, the executive director of the Council on American-Islamic
Relations. This is anti-Muslim discrimination pure and simple. While the NSA’s broad data collection is
disturbingly total and unspecific, its targeted spying is evidently racist. Another leaked document punctuates this
what constitutes an “imminent threat” is any indication, we
point with a dull, disgusting thud: a 2005 training document explaining how to “properly format internal memos to justify FISA surveillance”
offers a sample memo that uses “Mohammed Raghead” as the name of a fictitious terrorism suspect. Your NSA at work, ladies and gentlemen!
As the existence of this document makes clear, legality is a tortured issue at the heart national security misdeeds. NSA agents are trained to
ensure that their surveillance practices fall within the letter of the law — and the law here is at fault, shaped not by a spirit of justice but by
surveillance-state paranoia. The Intercept report does not skirt around this point: Indeed,
the government’s ability to monitor
such high-profile Muslim-Americans — with or without warrants — suggests that the most alarming and
invasive aspects of the NSA’s surveillance occur not because the agency breaks the law, but because it is
able to exploit the law’s permissive contours. “The scandal is what Congress has made legal,” says Jameel Jaffer, an ACLU
deputy legal director. “The claim that the intelligence agencies are complying with the laws is just a distraction from more urgent questions
relating to the breadth of the laws themselves.”
Targeted surveillance is still racist
Miller 12 (B.A. from the University of California at Berkeley in 1966 and Ph.D. from Columbia University in 1973, Wilbur R.,
The Social History of Crime and Punishment in America: An Encyclopedia, 7 August 2012, RX)
Racial minorities continue to serve as the primary victims of police surveillance. African Americans and Hispanics
are stopped most frequently by police and are more likely to be made subject to search and arrested, according to national statistics. In 1998,
African Americans comprised 11.6 percent of drivers stopped by police but represented 19.9 percent of the drivers arrested, while Hispanics
were 8.4 percent of drivers stopped by police but made up 11.7 percent of those arrested. Many
individuals of Arab descent have
complained of increased police surveillance and racial profiling since 9/11. The increased surveillance of
Arab Muslims in the post-9/11 world has led to a greater number of detainments, interrogations, and
arrests among Arab Muslims. Native Americans are also disproportionately made the subject of police surveillance, particularly in the
states of the Great Plains (where they make up a disproportionate number of the prison population compared to their actual population). The
prison industrial complex in the United States is disproportionately populated by people of color as a
result of targeted surveillance and unequal sentencing.
Download