Whistleblower Counterplan Affirmative Answers – Table of Contents

advertisement
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
Whistleblower Counterplan Affirmative Answers – Table of Contents
Summary.............................................................................................................................................. 2
Glossary............................................................................................................................................... 3
Solvency Answers
No Solvency – Overbroad Surveillance ................................................................................................ 4
No Solvency – Internal Threat Surveillance .......................................................................................... 5
Solvency Turn – Collapses Hegemony ................................................................................................. 6
Solvency Turn – Leaks Destroy Foreign Relations ............................................................................... 7
Solvency Turn – Decreased Capabilities .............................................................................................. 8
1|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
Summary
The Whistleblower Counterplan Affirmative position denies that the best course of action is to protect
whistleblowers laws and contends that their originally proposed plan is best suited to solve the
problems highlighted by both teams in the debate. This evidence contends that past whistleblower
reforms have failed and will continue to do so, despite claims from the Negative team that say
otherwise. Furthermore, the reason that whistleblower laws have failed in the past is because
surveillance itself is currently far too broad for whistleblowers to provide adequate protection and
transparency. More simply, there is too much surveillance for whistleblowers to protect against all
wrongdoing. Another point made by the Affirmative team is that if whistleblower laws are enhanced,
then the NSA could simply shift its own practices, making it harder for whistleblowers to detect
wrongdoing, even from within the agency.
The Affirmative responses to the counterplan also claim that the international community has already
lost most of its trust in the U.S. government because of its surveillance practices. Thus, any further
whistleblowing could push the NSA beyond the point of no return, making it impossible for that
agency to ever regain foreign or domestic trust. A lack of trust by foreign nations in U.S. surveillance
practices could then have increasingly negative impacts on our foreign relations as a whole with other
nations. Finally, the Affirmative team argues that unchecked whistleblowing could damage national
security, putting domestic residents, foreign allies, and troops in danger of attacks from international
powers.
2|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
Glossary
Angela Merkel – A German politician and a former research scientist who has been the leader of the
Christian Democratic Union since 2000 and the Chancellor of Germany since 2005. She is the first
woman to hold either office. It was revealed to the world in 2013 that the NSA had tapped her mobile
phone.
Chelsea Manning – known before 2013 as Bradley Edward Manning, is a United States Army soldier
who was convicted in July 2013 of violations of the Espionage Act and other offenses, after disclosing
to WikiLeaks nearly three-quarters of a million classified or unclassified but sensitive military and
diplomatic documents.
Disclosure – The action of making new or secret information known.
Edward Snowden – An American computer contractor who leaked classified information from the
NSA in 2013. The information revealed numerous global surveillance programs, many run by the
NSA with the cooperation of telecommunication companies and European governments. As of 2015,
he was living in an undisclosed location in Russia while seeking asylum elsewhere.
FAA – FISA Amendments Act of 2008 – an Act of Congress that amended the Foreign Intelligence
Surveillance Act. It has been used as the legal basis for mass surveillance programs disclosed by
Edward Snowden in 2014, including PRISM.
Human Rights Watch – An international non-governmental organization that conducts research and
advocacy on human rights.
NGO – Non-governmental Organization – An organization that is neither a part of a government nor a
conventional for-profit business.
SOR Act and STA Act – The Surveillance Order Reporting Act and Surveillance Transparency Act of
2013 – Two proposed pieces of legislation that seek to give companies more options for disclosing
when and how often they received national security-related requests and provided data to the
government.
Transparency – The right and the means to examine the process of decision-making.
Whistleblower – A person who exposes any kind of information or activity that is deemed illegal,
dishonest, or not correct within an organization that is either private or public.
3|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
No Solvency – Overbroad Surveillance
[___]
[___] Whistleblower transparency reforms fail – the problem is the surveillance itself is
overbroad.
Greene, 2014
(John Marshall Law School, B.S. in Political Science (Michael, “Where Has Privacy Gone? How
Surveillance Programs Threaten Expectations of Privacy”, The John Marshall Journal of Information
Technology & Privacy Law, Summer 2014, http://heinonline.org/HOL/Page?handle=hein.journals/
jmjcila30&div=36&g_sent=1&collection=journals)
Next, analyzing the SOR Act and STA Act, the focus of these Acts are to push for a more immediate
resolution to some of the concerns that U.S. persons have regarding private companies turning over
their private information to government surveillance programs. However, these legislative pushes run
far shorter than the proposed legislation under the aforementioned ISOR Act. Currently, companies
can only report on the amount of data requests.156 While these requests can be reported in blocks of
1,000, a single request could encompass millions of users.157 The SOR and STA Acts would focus
on refining the language used in the FAA of 2008 to allow private companies to give more detailed
reports regarding the frequency and amount of user data that has been requested under FISC court
orders. All of the above being considered, the SOR and STA Acts are more likely to be passed in
Congress and moving onto the next stage of the legislation process, due to the substantial lobbying of
the technology industry and that these acts will not alter any significant parts of the FAA of 2008.
Lobbying by several large technology companies has increased support in the legislation that would
give the companies more ability to inform their customers and future users about information
requests.158 These companies hope that more transparency will alleviate customer’s concerns about
information security. Endorsement by technology companies also provides more persuasive support
to the SOR and ACT Acts by showcasing the private sector backing of these acts. However, both the
SOR and STA Acts still fall short of offering a substantive solution to the problems of implementing
FISA programs because they do not halt or change any of the policies currently used to collect
information.
4|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
No Solvency – Internal Threat Surveillance
[___]
[___] The NSA will just shift towards increased internal surveillance to get rid of
whistleblowing opportunities.
Dilanian, 2013
(Ken, reporter for the Los Angeles Times, “Clapper: Snowden case brings healthy debate; more
disclosures to come,” September 12, 2013, http://articles.latimes.com/2013/sep/12/world/la-fg-wnclapper-snowden-disclosures-20130912)
WASHINGTON -- James Clapper, the director of national intelligence, said Thursday that Edward
Snowden's disclosures of secret surveillance programs at home and abroad have generated a useful
public debate on the trade-offs between privacy and national security. "I think it's clear that some of
the conversations this has generated, some of the debate, actually needed to happen," Clapper told a
defense and intelligence contractor trade group. "If there's a good side to this, maybe that's it."
Clapper defended the work of the National Security Agency, where Snowden worked on contract as a
systems analyst, and took no responsibility for the glaring security lapse that allowed Snowden to
download and remove at least 50,000 classified documents from an NSA listening post in Hawaii.
The "continuous stream of revelations" that has appeared in U.S. and British newspapers has
damaged national security, and is far from over, Clapper said. "Unfortunately, there is more to
come," he said. He said the intelligence community is taking steps to prevent other employees or
contractors from compromising security. "There's been a lot of focus on insider threat detection,
which we were into, but probably not with the emphasis and the energy that we are now," Clapper
said. His statement suggested that the digital theft of more than 700,000 classified documents in 2010
by Chelsea Manning, then an Army intelligence analyst in Iraq known as Bradley, did not prompt the
intelligence bureaucracy to adequately plug its holes. Manning has been convicted of espionage and
other charges. Joseph DeTrani, a retired intelligence official who is president of the Intelligence and
National Security Alliance, asked Clapper why the public seemed skeptical about Obama
administration claims that the NSA does not spy on Americans in violation of the law. Clapper cited
the challenge of trying to track terrorists and other foreign adversaries who communicate over the
same telephone lines, airwaves and Internet servers as Americans. He also cited what he called
distorted reporting in the news media for causing misunderstanding. Journalists examining the
surveillance programs that Snowden disclosed "go to the deepest darkest place they can and make
the most conspiratorial case for what the intelligence community is doing." Clapper noted that he
spent six years as an intelligence contractor, and he defended the role of private companies working
with the intelligence community. "Contractors continue to serve as a crucial part of the community,"
he said. "We could not do our mission without you and we need you to stick with us and help us get
through this difficult period."
5|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
Solvency Turn – Collapses Hegemony
[___] Surveillance disclosures pushed U.S. intelligence capabilities and credibility to the
brink—they collapse US power projection.
Mukasey, 2014
(Former U.S. Attorney General, judge for the Southern District of New York, B.A. from Columbia,
LL.B. from Yale (Michael, SAFE AND SURVEILLED: FORMER U.S. ATTORNEY GENERAL
MICHAEL B. MUKASEY ON THE NSA, WIRETAPPING, AND PRISM, National Security Law Journal,
3/25/14, https://www.nslj.org/wp-content/uploads/3_NatlSecLJ_196-209_Mukasey.pdf)
What damage has been done to our national security by Snowden’s disclosure? Well, the Defense
Intelligence Agency has prepared a report for the House permanent subcommittee that’s classified,
but what is already clear is that although press reports have focused on NSA foreign intelligence
collection, much of the information that Snowden stole actually relates to current U.S. military
operations, and in the words of [House Permanent Select Committee on Intelligence] Chairman Mike
Rogers, is likely to have “lethal consequences for our troops in the field.” According to the Ranking
Member to the Committee Dutch Ruppersberger, we have already seen terrorists changing their
methods because of Snowden’s leaks. The operations affected ranged beyond terrorism, into
cybercrime, narcotics, and human trafficking. A program in Latin America that helped rescue women
in that part of the world from human trafficking rings had to be abandoned because documents
relating to it were leaked and the identity of informants was compromised. Vital operations for all four
of our military services have been affected. The exposures as to foreign intelligence operations are
potentially devastating. They include, for example, an NSA report of self-assessment in fifty aspects
of counterterrorism that reveals gaps in our knowledge about the security of Pakistani nuclear
material when it’s being transported; of the capabilities of China’s next generation of fighter aircraft
(that includes secrets that were stolen from our own F35 planes back in 2007); of what plans Russian
leaders might have to deal with destabilizing events, such as large protests or terrorists incidents. The
capabilities he has disclosed, thus far, include how NSA intercepts e-mails, phone calls, and radio
transmissions of Taliban fighters in Pakistan; the fact that NSA is watching the security of Pakistan’s
nuclear weapons; that NSA is capable of measuring the loyalty of CIA recruits in Pakistan; [and] how
NSA hacks into telephones in Honk Kong and the rest of China. Just last weekend, The New York
Times carried another leak from the Snowden trove, a story that describes how NSA has tried—
apparently successfully—to penetrate a Chinese manufacturer of electronic equipment, including
communications equipment, [of] Huawei, so that it could monitor what purchasers of that equipment,
including foreign governments, do with it. Right in the body of that story was the revelation that the
Times had withheld certain technical details from the story at the request of the Obama
administration, but nonetheless the Chinese government and Huawei are now on notice of the effort
and can set about taking steps to guard against it. You want to imagine the nature of the damage that
he has done? Think of someone disclosing the acoustic signature of a nuclear submarine. That’s
among the most closely guarded of secrets that we have, because if it is disclosed, it makes that
submarine—an investment of literally billions of dollars—useless. That is the nature of what he has
done to a lot our intelligence capabilities.
6|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
Solvency Turn – Leaks Destroy Foreign Relations
[___] Surveillance disclosures destroy our foreign relationships because of their public
nature.
Mukasey, 2014
(Former U.S. Attorney General, judge for the Southern District of New York, B.A. from Columbia,
LL.B. from Yale (Michael, SAFE AND SURVEILLED: FORMER U.S. ATTORNEY GENERAL
MICHAEL B. MUKASEY ON THE NSA, WIRETAPPING, AND PRISM, National Security Law Journal,
3/25/14, https://www.nslj.org/wp-content/uploads/3_NatlSecLJ_196-209_Mukasey.pdf)
It is, of course, no accident that Snowden has wound up in Russia, whose geopolitical goals are
consistent with weakening U.S. intelligence. Russia itself is technologically and economically and
militarily a basket case, but undermining the capabilities of the United States can’t help [but even] the
playing field. The distortion in allocating resources is another byproduct of these disclosures. As you
can imagine, if a single disclosure is made, all possible sources of damage have to be considered
and mitigated to the extent possible. If means and methods are disclosed, adjustments have to be
made. If human assets are disclosed, steps have to be taken to get them and others with whom they
may have a relationship to safety. Two disclosures complicate the problem still further. When you
have millions of documents with varied disclosures, the problem of building a protective wall around
what can be salvaged in each case is one that could absorb virtually the entire resources of even the
best-resourced agency. And, of course, resources devoted to damage control are not then available
for the active protection of our national security. But that’s just the damage within our own intelligence
community. Relationships between the United States and Europe, between European nations
themselves, are undermined because confidence is undermined—and I’m not speaking of the Angela
Merkel cellphone problem. In fact, for years it had been an open secret in the intelligence community
[that] Angela Merkel used a conventional cell phone that could be overheard, and we were by no
means the only country that overheard it. The French were quite active in that regard. Besides, even
if we were the only country, if you’re dealing with a country like Germany that’s been champing at the
bit trying to avoid sanctions on Iran for years, you would certainly want to know what the leaders of
that country is saying in her less-guarded moments. Rather, what I’m talking about is simply how
seriously we can be taken by even our friends. If we can’t keep secrets secure from somebody like
Snowden, how willing do you think foreign intelligence agencies will be to share information with us?
Because the United States is a leader in the gathering of intelligence, the result is to paralyze western
intelligence capabilities and our self-defense. Snowden and his public handlers . . . have sold the
public in general, and some conservatives in particular, on the idea that what they have disclosed is
that the United States Government is secretly spying on all of its citizens, on their communications,
and indeed on all aspects of their lives—of any electronic interaction, whether through e-mail,
banking, telephone calls, card transactions, you name it. They portray Snowden as romantic and
idealistic rather than self-absorbed and traitorous—as someone who more closely resembles Robin
Hood or Paul Revere than Alger Hiss or Benedict Arnold. And the popular press, which has an
ongoing interest in being able to continue to get stories from the Snowden trough, has gone along
with the message in the way it reports information, which guarantees continued access.
7|Page
Whistleblower Counterplan Affirmative
RIUDL
Varsity Division
Solvency Turn – Decreased Capabilities
[___]
[___] Unchecked disclosures seriously damage our national security. We need to eliminate
the situations that create such discomfiture to begin with.
Blake, 2013
(Aaron Blake, reporter for The Washington Post, “Clapper: Leaks are ‘literally gut-wrenching,’ leaker
being sought,” June 9, 2013, http://www.washingtonpost.com/blogs/postpolitics/wp/2013/06/09/clapper-leaks-are-literally-gut-wrenching-leaker-being-sought/)
Director of National Intelligence James Clapper said in an interview that aired Saturday night that the
leaks regarding the Obama administration's surveillance programs are "literally gut-wrenching" and
that the administration has requested a criminal investigation into who leaked the information.
"For me, it is literally – not figuratively – literally gut-wrenching to see this happen because of the
huge, grave damage it does to our intelligence capabilities," Clapper told NBC News's Andrea
Mitchell. Clapper accused the media of using "hyperbole" in describing the programs. The National
Security Agency's collection of phone records was first reported by the Guardian, while a separate
program that tracks Internet data of foreigners as revealed by the Guardian and the Washington Post.
He said the NSA has asked the Justice Department to find whoever leaked the information. "I think
we all feel profoundly offended by that," Clapper said. "This is someone who, for whatever reason,
has chosen to violate a sacred trust for this country. And so I hope we're able to track down
whoever's doing this, because it is extremely damaging to, and it affects the safety and security of this
country." Appearing on a separate Sunday show, the chairs of the House and Senate intelligence
committees -- Rep. Mike Rogers (R-Mich.) and Dianne Feinstein (D-Calif.), respectively -- both urged
an investigation into who leaked the information. Rogers had tough words for both the leaker and the
reporter who first broke the story, the Guardian's Glenn Greenwald. "(Greenwald) doesn’t have a
clue how this thing works; neither did the person who released just enough information to make this
dangerous," Rogers said on ABC's "This Week." "I absolutely think (the leaker) should be
prosecuted."
8|Page
Download