1ac 1ac – internet freedom Contention 1 – internet freedom --NSA overbreadth --perception alone that the US is relying on XO12333 --driving global data localization – wrecks the internet --Eagleman --spills over to foreign policy generally --legitimacy impact The NSA’s PRISM program is being used to collect surveillance data from US companies – this overreach undermines US soft power and credibility on internet freedom Wheeler, 14 - Marcy Wheeler is an independent journalist and PhD from the University of Michigan. She specializes in civil liberties, technology, and national security. (Marcy, “The Drama Ahead: Google versus America” 6/16, http://www.cato-unbound.org/2014/06/16/marcy-wheeler/drama-ahead-googleversus-america This leaves one central drama to play out, in which Google and other tech companies (and to a much lesser extent, a few telecoms) begin to push back against the NSA’s overreach. It’s not just that U.S. cloud (and other tech) companies stand to lose billions as their clients choose to store data locally rather than expose it easily to the NSA. It’s also that the NSA violated several aspects of the deal the Executive Branch made six years ago with the passage of the FISA Amendments Act (FAA), Section 702 of which authorizes the PRISM program and domestic upstream collection. Congress passed the FISA Amendments Act several years after the New York Times’ exposure of the illegal wiretap program, ostensibly to address a technical problem used to justify that program. Technology had changed since the analog and radio world in place when FISA was first passed in 1978. Now, much of the world’s communications – including those of extremists who were targeting America – were sitting in Google’s and Yahoo’s and Microsoft’s servers within the United States. So Congress authorized the NSA to conduct collection inside the United States on targets located outside of the country (which swept up those who communicated with those targets, wherever they were located). In exchange , the government and its supporters promised, it would extend protections to Americans who were overseas. Yahoo and Google played by the rules, as the PRISM slide released last June revealed. The data of both Yahoo and Google have been readily available for any of the broad uses permitted by the law since January 2009. Yet, in spite of the fact that the NSA has a legal way to obtain this Internet data inside the United States using PRISM, the government also broke in to steal from Yahoo and Google fiber overseas. That’s an important implication of Sanchez’ point that “modern communications networks obliterate many of the assumptions about the importance of geography.” American tech companies now store data overseas, as well as in the United States. Americans’ data is mixed in with foreigners’ data overseas. Many of the more stunning programs described by Snowden’s documents – the collection of 5 billion records a day showing cell location, NSA partner GCHQ’s collection of millions of people’s intimate webcam images, and, of course, the theft of data from Google and Yahoo’s servers – may suck up Americans’ records too. Plus there’s evidence the NSA is accessing U.S. person data overseas. The agency permits specially trained analysts to conduct Internet metadata contact chaining including the records of Americans from data collected overseas. And in a Senate Intelligence Committee hearing earlier this year, Colorado Senator Mark Udall asked hypothetically what would happen with a “a vast trove of U.S. person information” collected overseas; the answer was such data would not get FISA protection (California Senator Dianne Feinstein, the Intelligence Committee Chair, asked an even more oblique question on the topic). Udall and Feinstein’s questions show that a lot of this spying does not undergo the oversight Benjamin Wittes and Carrie Cordero point to. Last year, Feinstein admitted her committee gets less reporting on such spying. Even for programs overseen by FISA, the NSA has consistently refused to provide even its oversight committees and the FISA Court real numbers on how many Americans get sucked into various NSA dragnets. Moreover, the government’s threat to tech companies exists not just overseas. When a group of tech companies withdrew their support for the USA Freedom Act, they argued the bill could permit the resumption of bulk collection of Internet users’ data domestically. In the past, that has always meant telecoms copying Internet metadata at telecom switches, another outside entity compromising tech companies’ services. As with the data stolen overseas, Internet metadata is available to the government legally under PRISM. In response to the news that the government at times bypasses the legal means it has to access Google’s clients’ data, the tech giant and others have found new ways to protect their customers. That consists of the new encryption Sanchez described – both of that fiber compromised overseas and of emails sent using Google – but also the right to publish how much data the government collects. Even within the criminal context, tech companies (including telecoms Verizon and AT&T) are challenging the U.S. government’s efforts to use tech companies’ presence in the United States to get easy access to customers’ data overseas. The conflict between Google and its home country embodies another trend that has accelerated since the start of the Snowden leaks. As the President of the Computer & Communications Industry Association, Edward Black, testified before the Senate last year, the disclosure of NSA overreach did not just damage some of America’s most successful companies, it also undermined the key role the Internet plays in America’s soft power projection around the world : as the leader in Internet governance, and as the forum for open speech and exchange once associated so positively with the United States. The U.S. response to Snowden’s leaks has, to a significant degree, been to double down on hard power, on the imperative to “collect it all” and the insistence that the best cyberdefense is an aggressive cyberoffense. While President Obama paid lip service to stopping short of spying “because we can,” the Executive Branch has refused to do anything – especially legislatively – that would impose real controls on the surveillance system that undergirds raw power. And that will likely bring additional costs, not just to America’s economic position in the world, but in the need to invest in programs to maintain that raw power advantage. Particularly given the paltry results the NSA has to show for its domestic phone dragnet – the single Somali taxi driver donating to alShabaab that Sanchez described. It’s not clear that the additional costs from doubling down on hard power bring the United States any greater security. The perception that the NSA is using Executive Order 12333 to circumvent section 702 of the FISA Amendments Act is causing a backlash against US tech companies and driving global data localization Eoyang, 14 - Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto) (“A Modest Proposal: FAA Exclusivity for Collection Involving U.S. Technology Companies” Lawfare, 11/24, http://www.lawfareblog.com/modest-proposalfaa-exclusivity-collection-involving-us-technology-companies Beyond 215 and FAA, media reports have suggested that there have been collection programs that occur outside of the companies’ knowledge. American technology companies have been outraged about media stories of US government intrusions onto their networks overseas, and the spoofing of their web pages or products, all unbeknownst to the companies. These stories suggest that the government is creating and sneaking through a back door to take the data. As one tech employee said to me, “the back door makes a mockery of the front door.” As a result of these allegations, companies are moving to encrypt their data against their own government; they are limiting their cooperation with NSA; and they are pushing for reform. Negative international reactions to media reports of certain kinds of intelligence collection abroad have resulted in a backlash against American technology companies , spurring data localization requirements , rejection or cancellation of American contracts, and raising the specter of major losses in the cloud computing industry. These allegations could dim one of the few bright spots in the American economic recovery: tech. Without commenting on the accuracy of these media reports, the perception is still a problem even if the media reports of these government collection programs are not true---or are only partly true . The tech industry believes them to be true , and more importantly, their customers at home and abroad believe them to be true, and that means they have huge impact on American business and huge impact as well on the relationship between these businesses and an intelligence community that depends on their cooperation. So, how should we think about reforms in response to this series of allegations the Executive Branch can’t, or won’t, address? How about making the FAA the exclusive means for conducting electronic surveillance when the information being collected is in the custody of an American company? This could clarify that the executive branch could not play authority shell-games and claim that Executive Order 12333 allows it to obtain information on overseas non-US person targets that is in the custody of American companies, unbeknownst to those companies. As a policy matter, it seems to me that if the information to be acquired is in the custody of an American company, the intelligence community should ask for it, rather than take it without asking. American companies should be entitled to a higher degree of forthrightness from their government than foreign companies, even when they are acting overseas. Under the FAA, we have a statutory regime that creates judicial oversight and accountability to conduct electronic surveillance outside the US for specific purposes: foreign intelligence (or traditional espionage), counter-terrorism, and prevention of WMD proliferation. It addresses protections for both non-US and US persons. It creates a front-door, though compelled, relationship under which the intelligence community can receive communications contents without individual warrants but with programmatic judicial oversight. FAA exclusivity would say to the rest of the world that when the US conducts bulk electronic surveillance overseas, we are doing so for a particular, national security purpose. The FAA structure with FISC review provides an independent check that the statutory purposes are met. Through transparency agreements with the government, the American companies are able to provide their customers with some sense of how many requests are made. This would not change the 12333 authorities with respect to non-US companies. It would also not change 12333 authorities when the Executive Branch seeks to obtain the information in some other way than through the US company (i.e. breaking into the target’s laptop, parking a surveillance van outside their house, sending a spy, etc.). Some have asked me what would happen if foreign companies tried to set up shop here in the US to seek these protections. I need to refine this part further, but would look to other statutory regimes that need to define the nationality of companies, like the Foreign Corrupt Practices Act, or the CFIUS process. Executive Order 12333 itself offers a partial answer, defining a US person to include “a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments.” Others may argue that FAA provides inadequate civil liberties protections. This proposal says nothing about the adequacy of that statute. What it says is that for data held by an American company about a target that is not a US person, the checks within FAA are stronger than those under 12333 acting alone. That perception prevents the US from stopping data localization globally Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ Costs to the Internet Freedom Agenda and U.S. Credibility in Internet Governance “As the birthplace for so many of these technologies, including the internet itself, we have a responsibility to see them used for good,” declared Secretary of State Hillary Clinton in January 2010.175 Her speech at the Newseum in Washington DC effectively launched the United States’ Internet Freedom agenda, articulating a leading role for the U.S. in using the Internet to promote freedom of expression, freedom of worship, and the freedom to connect around the world. Clinton went on to give two other major addresses on Internet Freedom, becoming the first global leader to emphasize Internet Freedom as a foreign policy priority and urging “countries everywhere… to join us in the bet we have made, a bet that an open internet will lead to stronger, more prosperous countries.”176 As Richard Fontaine and Will Rogers describe in a seminal paper on the subject in June 2011, “Internet Freedom, broadly defined, is the notion that universal rights, including the freedoms of expression, assembly and association, extend to the digital sphere.”177 Although there were questions from the beginning about whether the United States would hold itself to the same high standards domestically that it holds others to internationally,178 the American government has successfully built up a policy and programming agenda in the past few years based on promoting an open Internet.179 These efforts include raising concerns over Internet repression in bilateral dialogues with countries such as Vietnam and China,180 supporting initiatives including the Freedom Online Coalition, and providing over $120 million in funding for “groups working to advance Internet freedom – supporting counter-censorship and secure communications technology, digital safety training, and policy and research programs for people facing Internet repression.”181 However, the legitimacy of these efforts has been thrown into question since the NSA disclosures began. “Trust has been the principal casualty in this unfortunate affair,” wrote Ben FitzGerald and Richard Butler in December 2013. “The American public, our nation’s allies, leading businesses and Internet users around the world are losing faith in the U.S. government’s role as the leading proponent of a free, open and integrated global Internet.”182 Prior to the NSA revelations, the United States was already facing an increasingly challenging political climate as it promoted the Internet Freedom agenda in global Internet governance conversations. At the 2012 World Conference on International Telecommunications (WCIT), the U.S. and diverse group of other countries refused to sign the updated International Telecommunications Regulations based on concerns that the document pushed for greater governmental control of the Internet and would ultimately harm Internet Freedom.183 Many observers noted that the split hardened the division between two opposing camps in the Internet governance debate: proponents of a status quo multistakeholder Internet governance model, like the United States, who argued that the existing system was the best way to preserve key online freedoms, and those seeking to disrupt or challenge that multistakeholder model for a variety of political and economic reasons, including governments like Russia and China pushing for greater national sovereignty over the Internet.184 Many of the proposals for more governmental control over the network could be understood as attempts by authoritarian countries to more effectively monitor and censor their citizens, which allowed the U.S. to reasonably maintain some moral high ground as its delegates walked out of the treaty conference.185 Although few stakeholders seemed particularly pleased by the outcome of the WCIT, reports indicate that by the middle of 2013 the tone had shifted in a more collaborative and positive direction following the meetings of the 2013 World Telecommunications/ICT Policy Forum (WTPF) and the World Summit on Information Society + 10 (WSIS+10) review.186 However, the Internet governance conversation took a dramatic turn after the Snowden disclosures. The annual meeting of the Freedom Online Coalition occurred in Tunis in June 2013, just a few weeks after the initial leaks. Unsurprisingly, surveillance dominated the conference even though the agenda covered a wide range of topics from Internet access and affordability to cybersecurity.187 Throughout the two-day event, representatives from civil society used the platform to confront and criticize governments about their monitoring practices.188 NSA surveillance would continue to be the focus of international convenings on Internet Freedom and Internet governance for months to come, making civil society representatives and foreign governments far less willing to embrace the United States’ Internet Freedom agenda or to accept its defense of the multistakeholder model of Internet governance as a anything other than self-serving. “One can come up with all kinds of excuses for why US surveillance is not hypocrisy. For example, one might argue that US policies are more benevolent than those of many other regimes… And one might recognize that in several cases, some branches of government don’t know what other branches are doing… and therefore US policy is not so much hypocritical as it is inadvertently contradictory,” wrote Eli Dourado, a researcher from the Mercatus Center at George Mason University in August 2013. “But the fact is that the NSA is galvanizing opposition to America’s internet freedom agenda.”189 The scandal revived proposals from both Russia and Brazil for global management of technical standards and domain names, whether through the ITU or other avenues. Even developing countries, many of whom have traditionally aligned with the U.S. and prioritize access and affordability as top issues, “don’t want US assistance because they assume the equipment comes with a backdoor for the NSA. They are walking straight into the arms of Russia, China, and the ITU.”190 Consequently, NSA surveillance has shifted the dynamics of the Internet governance debate in a potentially destabilizing manner. The Snowden revelations “have also been well-received by those who seek to discredit existing approaches to Internet governance,” wrote the Center for Democracy & Technology’s Matthew Shears. “There has been a long-running antipathy among a number of stakeholders to the United States government’s perceived control of the Internet and the dominance of US Internet companies. There has also been a long-running antipathy, particularly among some governments, to the distributed and open management of the Internet.”191 Shears points out that evidence of the NSA’s wide-ranging capabilities has fueled general concerns about the current Internet governance system, bolstering the arguments of those calling for a new government-centric governance order. At the UN Human Rights Council in September 2013, the representative from Pakistan—speaking on behalf of Cuba, Venezuela, Zimbabwe, Uganda, Ecuador, Russia, Indonesia, Bolivia, Iran, and China— explicitly linked the revelations about surveillance programs to the need for reforming Internet governance processes and institutions to give governments a larger role.192 Surveillance issues continued to dominate the conversation at the 2013 Internet Governance Forum in Bali as well, where “debates on child protection, education and infrastructure were overshadowed by widespread concerns from delegates who said the public’s trust in the internet was being undermined by reports of US and British government surveillance.”193 Further complicating these conversations is the fact that several of the institutions that govern the technical functions of the Internet are either tied to the American government or are located in the United States . Internet governance scholar Milton Mueller has described how the reaction to the NSA disclosures has become entangled in an already contentious Internet governance landscape. Mueller argues that, in addition to revealing the scale and scope of state surveillance and the preeminent role of the United States and its partners, the NSA disclosures may push other states toward a more nationally partitioned Internet and “threaten… in a very fundamental way the claim that the US had a special status as neutral steward of Internet governance.”194 These concerns were publicly voiced in October 2013 by the heads of a number of key organizations, including the President of the Internet Corporation for Assigned Names and Numbers (ICANN) and the chair of the Internet Engineering Task Force (IETF), in the Montevideo Statement on the Future of Internet Cooperation. Their statement expressed “strong concern over the undermining of the trust and confidence of Internet users globally due to recent revelations of pervasive monitoring and surveillance” and “called for accelerating the globalization of ICANN and Internet Assigned Numbers Authority (IANA) functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing.”195 In particular, the process of internationalizing ICANN—which has had a contractual relationship with the Commerce Department’s National Telecommunications and Information Association (NTIA) since 1998—has progressed in recent months.196 That will collapse the global internet Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) The era of a global Internet may be passing. Governments across the world are putting up barriers to the free flow of information across borders. Driven by concerns over privacy, security, surveillance, and law enforcement, governments are erecting borders in cyberspace, breaking apart the World Wide Web. The first generation of Internet border controls sought to keep information out of a country - from Nazi paraphernalia to copyright infringing material. n1 The new generation of Internet border controls seeks not to keep information out but rather to keep data in. Where the first generation was relatively narrow in the information excluded, the new generation seeks to keep all data about individuals within a country. Efforts to keep data within national borders have gained traction in the wake of revelations of widespread electronic spying by United States intelligence agencies. n2 Governments across the world, indignant at the recent disclosures, have cited foreign surveillance as an argument to prevent data from leaving their borders, allegedly into foreign hands. n3 As the argument [*680] goes, placing data in other nations jeopardizes the security and privacy of such information. We define "data localization" measures as those that specifically encumber the transfer of data across national borders. These measures take a wide variety of forms - including rules preventing information from being sent outside the country, rules requiring prior consent of the data subject before information is transmitted across national borders, rules requiring copies of information to be stored domestically, and even a tax on the export of data. We argue here that data localization will backfire and that it in fact undermines privacy and security, while still leaving data vulnerable to foreign surveillance. Even more importantly, data localization increases the ability of governments to surveil and even oppress their own populations. Imagine an Internet where data must stop at national borders, examined to see whether it is allowed to leave the country and possibly taxed when it does. While this may sound fanciful, this is precisely the impact of various measures undertaken or planned by many nations to curtail the flow of data outside their borders. Countries around the world are in the process of creating Checkpoint Charlies - not just for highly secret national security data but for ordinary data about citizens. The very nature of the World Wide Web is at stake. We will show how countries across the world have implemented or have planned dramatic steps to curtail the flow of information outside their borders. By creating national barriers to data, data localization measures break up the World Wide Web, which was designed to share information across the globe. n4 The Internet is a global network based on a protocol for interconnecting computers without regard for national borders. Information is routed across this network through decisions made autonomously and automatically at local routers, which choose paths based largely on efficiency, unaware of political borders. n5 Thus, the services built on the Internet, from email to the World [*681] Wide Web, pay little heed to national borders. Services such as cloud computing exemplify this, making the physical locations for the storage and processing of their data largely invisible to users. Data localization would dramatically alter this fundamental architecture of the Internet. Such a change poses a mortal threat to the new kind of international trade made possible by the Internet - information services such as those supplied by Bangalore or Silicon Valley. n6 Barriers of distance or immigration restrictions had long kept such services confined within national borders. But the new services of the Electronic Silk Road often depend on processing information about the user, information that crosses borders from the user's country to the service provider's country. Data localization would thus require the information service provider to build out a physical, local infrastructure in every jurisdiction in which it operates, increasing costs and other burdens enormously for both providers and consumers and rendering many of such global services impossible. While others have observed some of the hazards of data localization, especially for American companies, n7 this Article offers three major advances over earlier work in the area. First, while the earlier analyses have referred to a data localization measure in a country in the most general of terms, our Article provides a detailed legal description of localization measures. Second, by examining a variety of key countries around the world, the study allows us to see the forms in which data localization is emerging and the justifications offered for such measures in both liberal and illiberal states. Third, the Article works to comprehensively refute the various arguments for data localization offered around the world, showing that data localization measures are in fact likely to undermine security, privacy, economic development, and innovation where adopted. [*682] Our paper proceeds as follows. Part I describes the particular data localization measures in place or proposed in different countries around the world, as well as in the European Union. Part II then discusses the justifications commonly offered for these measures - such as avoiding foreign surveillance, enhancing security and privacy, promoting economic development, and facilitating domestic law enforcement. We appraise these arguments, concluding that, in fact, such measures are likely to backfire on all fronts. Data localization will erode privacy and security without rendering information free of foreign surveillance, while at the same time increasing the risks of domestic surveillance. A free internet is vital to combating every existential threat Eagleman, 10 - American neuroscientist and writer at Baylor College of Medicine, where he directs the Laboratory for Perception and Action and the Initiative on Neuroscience and Law (David, “Six ways the internet will save civilization” Wired, 9/10, http://www.wired.co.uk/magazine/archive/2010/12/start/apocalypse-no Many great civilisations have fallen, leaving nothing but cracked ruins and scattered genetics. Usually this results from: natural disasters, resource depletion, economic meltdown, disease, poor information flow and corruption. But we’re luckier than our predecessors because we command a technology that no one else possessed: a rapid communication network that finds its highest expression in the internet. I propose that there are six ways in which the net has vastly reduced the threat of societal collapse. Epidemics can be deflected by telepresence One of our more dire prospects for collapse is an infectious-disease epidemic. Viral and bacterial epidemics precipitated the fall of the Golden Age of Athens, the Roman Empire and most of the empires of the Native Americans. The internet can be our key to survival because the ability to work telepresently can inhibit microbial transmission by reducing human-to-human contact. In the face of an otherwise devastating epidemic, businesses can keep supply chains running with the maximum number of employees working from home. This can reduce host density below the tipping point required for an epidemic. If we are well prepared when an epidemic arrives, we can fluidly shift into a self-quarantined society in which microbes fail due to host scarcity. Whatever the social ills of isolation, they are worse for the microbes than for us. The internet will predict natural disasters We are witnessing the downfall of slow central control in the media: news stories are increasingly becoming user-generated nets of up-to-the-minute information. During the recent California wildfires, locals went to the TV stations to learn whether their neighbourhoods were in danger. But the news stations appeared most concerned with the fate of celebrity mansions, so Californians changed their tack: they uploaded geotagged mobile-phone pictures, updated Facebook statuses and tweeted. The balance tipped: the internet carried news about the fire more quickly and accurately than any news station could. In this grass-roots, decentralised scheme, there were embedded reporters on every block, and the news shockwave kept ahead of the fire. This head start could provide the extra hours that save us. If the Pompeiians had had the internet in 79AD, they could have easily marched 10km to safety, well ahead of the pyroclastic flow from Mount Vesuvius. If the Indian Ocean had the Pacific’s networked tsunami-warning system, South-East Asia would look quite different today. Discoveries are retained and shared Historically, critical information has required constant rediscovery. Collections of learning -- from the library at Alexandria to the entire Minoan civilisation -- have fallen to the bonfires of invaders or the wrecking ball of natural disaster. Knowledge is hard won but easily lost. And information that survives often does not spread. Consider smallpox inoculation: this was under way in India, China and Africa centuries before it made its way to Europe. By the time the idea reached North America, native civilisations who needed it had already collapsed. The net solved the problem. New discoveries catch on immediately; information spreads widely. In this way, societies can optimally ratchet up, using the latest bricks of knowledge in their fortification against risk. Tyranny is mitigated Censorship of ideas was a familiar spectre in the last century, with state-approved news outlets ruling the press, airwaves and copying machines in the USSR, Romania, Cuba, China, Iraq and elsewhere. In many cases, such as Lysenko’s agricultural despotism in the USSR, it directly contributed to the collapse of the nation. Historically, a more successful strategy has been to confront free speech with free speech -- and the internet allows this in a natural way. It democratises the flow of information by offering access to the newspapers of the world, the photographers of every nation, the bloggers of every political stripe. Some posts are full of doctoring and dishonesty whereas others strive for independence and impartiality -- but all are available to us to sift through. Given the attempts by some governments to build firewalls, it’s clear that this benefit of the net requires constant vigilance. Human capital is vastly increased Crowdsourcing brings people together to solve problems. Yet far fewer than one per cent of the world’s population is involved. We need expand human capital. Most of the world not have access to the education afforded a small minority. For every Albert Einstein, Yo-Yo Ma or Barack Obama who has educational opportunities, uncountable others do not. This squandering of talent translates into reduced economic output and a smaller pool of problem solvers. The net opens the gates education to anyone with a computer. A motivated teen anywhere on the planet can walk through the world’s knowledge -- from the webs of Wikipedia to the curriculum of MIT’s OpenCourseWare. The new human capital will serve us well when we confront existential threats we’ve never imagined before. Energy expenditure is reduced Societal collapse can often be understood in terms of an energy budget: when energy spend outweighs energy return, collapse ensues. This has taken the form of deforestation or soil erosion; currently, the worry involves fossil-fuel depletion. The internet addresses the energy problem with a natural ease. Consider the massive energy savings inherent in the shift from paper to electrons -- as seen in the transition from the post to email. Ecommerce reduces the need to drive long distances to purchase products. Delivery trucks are more eco-friendly than individuals driving around, not least because of tight packaging and optimisation algorithms for driving routes. Of course, there are energy costs to the banks of computers that underpin the internet -- but these costs are less than the wood, coal and oil that would be expended for the same quantity of information flow. The tangle of events that triggers societal collapse can be complex, and there are several threats the net does not address. But vast, networked communication can be an antidote to several of the most deadly diseases threatening civilisation. The next time your coworker laments internet addiction, the banality of tweeting or the decline of face-to-face conversation, you may want to suggest that the net may just be the technology that saves us. Surveillance overreach spills over to gut overall US global legitimacy Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ Broader Foreign Policy Costs Beyond Internet Freedom, the NSA disclosures “have badly undermined U.S. credibility with many of its allies,” Ian Bremmer argued in Foreign Policy in November 2013.214 Similarly, as Georg Mascolo and Ben Scott point out about the post-Snowden world, “the shift from an open secret to a published secret is a game changer… it exposes the gap between what governments will tolerate from one another under cover of darkness and what publics will tolerate from other governments in the light of day.”215 From stifled negotiations with close allies like France and Germany to more tense relations with emerging powers including Brazil and China, the leaks have undoubtedly weakened the American position in international relations, opening up the United States to new criticism and political maneuvering that would have been far less likely a year ago.216 U.S. allies like France, Israel, and Germany are upset by the NSA’s actions, as their reactions to the disclosures make clear.217 Early reports about close allies threatening to walk out of negotiations with the United States—such as calls by the French government to delay EU-U.S. trade talks in July 2013 until the U.S. government answered European questions about the spying allegations218—appear to be exaggerated, but there has certainly been fallout from the disclosures. For months after the first Snowden leaks, German Chancellor Angela Merkel would not visit the United States until the two countries signed a “no-spy” agreement—a document essentially requiring the NSA to respect German law and rights of German citizens in its activities. When Merkel finally agreed come to Washington, D.C. in May 2014, tensions rose quickly because the two countries were unable to reach an agreement on intelligence sharing, despite the outrage provoked by news that the NSA had monitored Merkel’s own communications.219 Even as Obama and Merkel attempted to present a unified front while they threatened additional sanctions against Russia over the crisis in the Ukraine, it was evident that relations are still strained between the two countries. While President Obama tried to keep up the appearance of cordial relations at a joint press conference, Merkel suggested that it was too soon to return to “business as usual” when tensions still remain over U.S. spying allegations.220 The Guardian called the visit “frosty” and “awkward.”221 The German Parliament has also begun hearings to investigate the revelations and suggested that it is weighing further action against the United States.222 Moreover, the disclosures have weakened the United States’ relationship with emerging powers like Brazil, where the fallout from NSA surveillance threatens to do more lasting damage. Brazilian President Dilma Rousseff has seized on the NSA disclosures as an opportunity to broaden Brazil’s influence not only in the Internet governance field, but also on a broader range of geopolitical issues. Her decision not to attend an October 2013 meeting with President Barack Obama at the White House was a direct response to NSA spying—and a serious, high-profile snub. In addition to cancelling what would have been the first state visit by a Brazilian president to the White House in nearly 20 years, Rousseff’s decision marked the first time a world leader had turned down a state dinner with the President of the United States.223 In his statement on the postponement, President Obama was forced to address the issue of NSA surveillance directly, acknowledging “that he understands and regrets the concerns disclosures of alleged U.S. intelligence activities have generated in Brazil and made clear that he is committed to working together with President Rousseff and her government in diplomatic channels to move beyond this issue as a source of tension in our bilateral relationship.”224 Many observers have noted that the Internet Freedom agenda could be one of the first casualties of the NSA disclosures. The U.S. government is fighting an uphill battle at the moment to regain credibility in international Internet governance debates and to defend its moral high ground as a critic of authoritarian regimes that limit freedom of expression and violate human rights online. Moreover, the fallout from the NSA’s surveillance activities has spilled over into other areas of U.S. foreign policy and currently threatens bilateral relations with a number of key allies. Going forward, it is critical that decisions about U.S. spying are made in consideration of a broader set of interests so that they do not impede—or, in some cases, completely undermine—U.S. foreign policy goals. Legitimacy key to global stability - prevents great power war Fujimoto 12 (Kevin Fujimoto 12, Lt. Colonel, U.S. Army, January 11, 2012, "Preserving U.S. National Security Interests Through a Liberal World Construct," online: http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Preserving-US-National-SecurityInterests-Liberal-World-Construct/2012/1/11) The emergence of peer competitors, not terrorism, presents the greatest long-term threat to our national security. Over the past decade, while the United States concentrated its geopolitical focus on fighting two land wars in Iraq and Afghanistan, China has quietly begun implementing a strategy to emerge as the dominant imperial power within Southeast Asia and the Indian Ocean. Within the next 2 decades, China will likely replace the United States as the Asia-Pacific regional hegemonic power, if not replace us as the global superpower.1 Although China presents its rise as peaceful and non-hegemonic, its construction of naval bases in neighboring countries and military expansion in the region contradict that argument. With a credible threat to its leading position in a unipolar global order, the United States should adopt a grand strategy of “investment,” building legitimacy and capacity in the very institutions that will protect our interests in a liberal global construct of the future when we are no longer the dominant imperial power. Similar to the Clinton era's grand strategy of “enlargement,”2 investment supports a world order predicated upon a system of basic rules and principles, however, it differs in that the United States should concentrate on the institutions (i.e., United Nations, World Trade Organization, ASEAN, alliances, etc.) that support a world order, as opposed to expanding democracy as a system of governance for other sovereign nations. Despite its claims of a benevolent expansion, China is already executing a strategy of expansion similar to that of Imperial Japan's Manchukuo policy during the 1930s.3 This three-part strategy involves: “(i) (providing) significant investments in economic infrastructure for extracting natural resources; (ii) (conducting) military interventions (to) protect economic interests; and, (iii) . . . (annexing) via installation of puppet governments.”4 China has already solidified its control over neighboring North Korea and Burma, and has similarly begun more ambitious engagements in Africa and Central Asia where it seeks to expand its frontier.5 Noted political scientist Samuel P. Huntington provides further analysis of the motives behind China's imperial aspirations. He contends that “China (has) historically conceived itself as encompassing a “‘Sinic Zone'. . . (with) two goals: to become the champion of Chinese culture . . . and to resume its historical position, which it lost in the nineteenth century, as the hegemonic power in East Asia.”6 Furthermore, China holds one quarter of the world's population, and rapid economic growth will increase its demand for natural resources from outside its borders as its people seek a standard of living comparable to that of Western civilization. The rise of peer competitors has historically resulted in regional instability and one should compare “the emergence of China to the rise of. . . Germany as the dominant power in Europe in the late nineteenth century.”7 Furthermore, the rise of another peer competitor on the level of the Soviet Union of the Cold War ultimately threatens U.S. global influence, challenging its concepts of human rights, liberalism, and democracy; as well as its ability to co-opt other nations to accept them.8 This decline in influence, while initially limited to the Asia-Pacific region, threatens to result in significant conflict if it ultimately leads to a paradigm shift in the ideas and principles that govern the existing world order. A grand strategy of investment to address the threat of China requires investing in institutions, addressing ungoverned states, and building legitimacy through multilateralism. The United States must build capacity in the existing institutions and alliances accepted globally as legitimate representative bodies of the world's governments. For true legitimacy, the United States must support these institutions, not only when convenient, in order to avoid the appearance of unilateralism, which would ultimately undermine the very organizations upon whom it will rely when it is no longer the global hegemon. The United States must also address ungoverned states, not only as breeding grounds for terrorism, but as conflicts that threaten to spread into regional instability, thereby drawing in superpowers with competing interests. Huntington proposes that the greatest source of conflict will come from what he defines as one “core” nation's involvement in a conflict between another core nation and a minor state within its immediate sphere of influence.9 For example, regional instability in South Asia10 threatens to involve combatants from the United States, India, China, and the surrounding nations. Appropriately, the United States, as a global power, must apply all elements of its national power now to address the problem of weak and failing states, which threaten to serve as the principal catalysts of future global conflicts.11 1ac – economy Contention 2 – the economy The perception of NSA overreaching wrecks global trust in the US tech sector – that wrecks the US economy and competitiveness Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ “It is becoming clear that the post-9/11 surveillance apparatus may be at cross-purposes with our hightech economic growth,” declared Third Way’s Mieke Eoyang and Gabriel Horowitz in December 2013. “The economic consequences [of the recent revelations] could be staggering.”25 A TIME magazine headline projected that “NSA Spying Could Cost U.S. Tech Giants Billions,” predicting losses based on the increased scrutiny that economic titans like Google, Microsoft, Facebook, and Yahoo have faced both at home and abroad since last June.26 The NSA’s actions pose a serious threat to the current value and future stability of the information technology industry, which has been a key driver of economic growth and productivity in the United States in the past decade.27 In this section, we examine how emerging evidence about the NSA’s extensive surveillance apparatus has already hurt and will likely continue to hurt the American tech sector in a number of ways, from dwindling U.S. market share in industries like cloud computing and webhosting to dropping tech sales overseas. The impact of individual users turning away from American companies in favor of foreign alternatives is a concern. However, the major losses will likely result from diminishing confidence in U.S. companies as trustworthy choices for foreign government procurement of products and services and changing behavior in the business-to-business market. Costs to the U.S. Cloud Computing Industry and Related Business Trust in American businesses has taken a significant hit since the initial reports on the PRISM program suggested that the NSA was directly tapping into the servers of nine U.S. companies to obtain customer data for national security investigations.28 The Washington Post’s original story on the program provoked an uproar in the media and prompted the CEOs of several major companies to deny knowledge of or participation in the program.29 The exact nature of the requests made through the PRISM program was later clarified,30 but the public attention on the relationship between American companies and the NSA still created a significant trust gap, especially in industries where users entrust companies to store sensitive personal and commercial data. “Last year’s national security leaks have also had a commercial and financial impact on American technology companies that have provided these records,” noted Representative Bob Goodlatte, a prominent Republican leader and Chairman of the House Judiciary Committee, in May 2014. “They have experienced backlash from both American and foreign consumers and have had their competitive standing in the global marketplace damaged.”31 Given heightened concerns about the NSA’s ability to access data stored by U.S. companies, it is no surprise that American companies offering cloud computing and webhosting services are among those experiencing the most acute economic fallout from NSA surveillance. Within just a few weeks of the first disclosures, reports began to emerge that American cloud computing companies like Dropbox and Amazon Web Services were starting to lose business to overseas competitors.32 The CEO of Artmotion, one of Switzerland’s largest offshore hosting providers, reported in July 2013 that his company had seen a 45 percent jump in revenue since the first leaks,33 an early sign that the country’s perceived neutrality and strong data and privacy protections34 could potentially be turned into a serious competitive advantage.35 Foreign companies are clearly poised to benefit from growing fears about the security ramifications of keeping data in the United States. In a survey of 300 British and Canadian businesses released by PEER 1 in January 2014,36 25 percent of respondents indicated that they were moving data outside of the U.S. as a result of the NSA revelations. An overwhelming number of the companies surveyed indicated that security and data privacy were their top concerns, with 81 percent stating that they “want to know exactly where their data is being hosted.” Seventy percent were even willing to sacrifice performance in order to ensure that their data was protected.37 It appears that little consideration was given over the past decade to the potential economic repercussions if the NSA’s secret programs were revealed.38 This failure was acutely demonstrated by the Obama Administration’s initial focus on reassuring the public that its programs primarily affect nonAmericans, even though non-Americans are also heavy users of American companies’ products. Facebook CEO Mark Zuckerberg put a fine point on the issue, saying that the government “blew it” in its response to the scandal. He noted sarcastically: “The government response was, ‘Oh don’t worry, we’re not spying on any Americans.’ Oh, wonderful: that’s really helpful to companies [like Facebook] trying to serve people around the world, and that’s really going to inspire confidence in American internet companies.”39 As Zuckerberg’s comments reflect, certain parts of the American technology industry are particularly vulnerable to international backlash since growth is heavily dependent on foreign markets. For example, the U.S. cloud computing industry has grown from an estimated $46 billion in 2008 to $150 billion in 2014, with nearly 50 percent of worldwide cloud-computing revenues coming from the U.S.40 R Street Institute’s January 2014 policy study concluded that in the next few years, new products and services that rely on cloud computing will become increasingly pervasive. “Cloud computing is also the root of development for the emerging generation of Web-based applications—home security, outpatient care, mobile payment, distance learning, efficient energy use and driverless cars,” writes R Street’s Steven Titch in the study. “And it is a research area where the United States is an undisputed leader.”41 This trajectory may be dramatically altered, however, as a consequence of the NSA’s surveillance programs. Economic forecasts after the Snowden leaks have predicted significant, ongoing losses for the cloudcomputing industry in the next few years. An August 2013 study by the Information Technology and Innovation Foundation (ITIF) estimated that revelations about the NSA’s PRISM program could cost the American cloud computing industry $22 to $35 billion over the next three years.42 On the low end, the ITIF projection suggests that U.S. cloud computing providers would lose 10 percent of the foreign market share to European or Asian competitors, totaling in about $21.5 billion in losses; on the highend, the $35 billion figure represents about 20 percent of the companies’ foreign market share. Because the cloud computing industry is undergoing rapid growth right now—a 2012 Gartner study predicted global spending on cloud computing would increase by 100 percent from 2012 to 2016, compared to a 3 percent overall growth rate in the tech industry as a whole43—vendors in this sector are particularly vulnerable to shifts in the market. Failing to recruit new customers or losing a competitive advantage due to exploitation by rival companies in other countries can quickly lead to a dwindling market share. The ITIF study further notes that “the percentage lost to foreign competitors could go higher if foreign governments enact protectionist trade barriers that effectively cut out U.S. providers,” citing early calls from German data protection authorities to suspend the U.S.-EU Safe Harbor program (which will be discussed at length in the next section).44 As the R Street Policy Study highlights, “Ironically, the NSA turned the competitive edge U.S. companies have in cloud computing into a liability, especially in Europe.”45 In a follow up to the ITIF study, Forrester Research analyst James Staten argued that the think tank’s estimates were low, suggesting that the actual figure could be as high as $180 billion over three years.46 Staten highlighted two additional impacts not considered in the ITIF study. The first is that U.S. customers—not just foreign companies—would also avoid US cloud providers, especially for international and overseas business. The ITIF study predicted that American companies would retain their domestic market share, but Staten argued that the economic blowback from the revelations would be felt at home, too. “You don’t have to be a French company, for example, to be worried about the US government snooping in the data about your French clients,” he wrote.47 Moreover, the analysis highlighted a second and “far more costly” impact: that foreign cloud providers, too, would lose as much as 20 percent of overseas and domestic business because of similar spying programs conducted by other governments. Indeed, the NSA disclosures “have prompted a fundamental re-examination of the role of intelligence services in conducting coordinated cross-border surveillance,” according to a November 2013 report by Privacy International on the “Five Eyes” intelligence partnership between the United States, the United Kingdom, Canada, Australia, and New Zealand.48 Staten predicts that as the surveillance landscape around the world becomes more clear, it could have a serious negative impact on all hosting and outsourcing services, resulting in a 25 percent decline in the overall IT services market, or about $180 billion in losses.49 Recent reports suggest that things are, in fact, moving in the direction that analysts like Castro and Staten suggested.50 A survey of 1,000 “[Information and Communications Technology (ICT)] decisionmakers” from France, Germany, Hong Kong, the UK, and the USA in February and March 2014 found that the disclosures “have had a direct impact on how companies around the world think about ICT and cloud computing in particular.”51 According to the data from NTT Communications, 88 percent of decision-makers are changing their purchasing behavior when it comes to the cloud, with the vast majority indicating that the location of the data is very important. The results do not bode well for recruitment of new customers, either—62 percent of those currently not storing data in the cloud indicated that the revelations have since prevented them from moving their ICT systems there. And finally, 82 percent suggested that they agree with proposals made by German Chancellor Angela Merkel in February 2014 to have separate data networks for Europe, which will be discussed in further detail in Part III of this report. Providing direct evidence of this trend, Servint, a Virginia-based webhosting company, reported in June 2014 that international clients have declined by as much as half, dropping from approximately 60 percent of its business to 30 percent since the leaks began.52 With faith in U.S. companies on the decline, foreign companies are stepping in to take advantage of shifting public perceptions. As Georg Mascolo and Ben Scott predicted in a joint paper published by the Wilson Center and the New America Foundation in October 2013, “Major commercial actors on both continents are preparing offensive and defensive strategies to battle in the market for a competitive advantage drawn from Snowden’s revelations.”53 For example, Runbox, a small Norwegian company that offers secure email service, reported a 34 percent jump in customers since June 2013.54 Runbox markets itself as a safer email and webhosting provider for both individual and commercial customers, promising that it “will never disclose any user data unauthorized, track your usage, or display any advertisements.”55 Since the NSA revelations, the company has touted its privacy-centric design and the fact that its servers are located in Norway as a competitive advantage. “Being firmly located in Norway, the Runbox email service is governed by strict privacy regulations and is a safe alternative to American email services as well as cloud-based services that move data across borders and jurisdictions,” company representatives wrote on its blog in early 2014.56 F-Secure, a Finnish cloud storage company, similarly emphasizes the fact that “its roots [are] in Finland, where privacy is a fiercely guarded value.”57 Presenting products and services as ‘NSA-proof’ or ‘safer’ alternatives to Americanmade goods is an increasingly viable strategy for foreign companies hoping to chip away at U.S. tech competiveness.58 It has ripple effects that will destroy global economic growth Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) C. Economic Development Many governments believe that by forcing companies to localize data within national borders, they will increase investment at home. Thus, data localization measures are often motivated, whether explicitly or not, by desires to promote local economic development. In fact, however, data localization raises costs for local businesses, reduces access to global services for consumers, hampers local start-ups, and interferes with the use of the latest technological advances. In an Information Age, the global flow of data has become the lifeblood of economies across the world. While some in Europe have raised concerns about the transfer of data abroad, the European Commission has recognized "the critical importance of data flows notably for the transatlantic economy." n209 The Commission observes that international data transfers "form an integral part of commercial exchanges across the Atlantic including for new growing digital businesses, such as social media or cloud computing, with large amounts of data going from the EU to the US." n210 Worried about the effect of constraints on data flows on both global information sharing and economic development, the Organisation for Economic Co-operation and Development (OECD) has urged nations to avoid "barriers to the location, access and use of cross-border [*722] data facilities and functions" when consistent with other fundamental rights, in order to "ensure cost effectiveness and other efficiencies." n211 The worry about the impact of data localization is widely shared in the business community as well. The value of the Internet to national economies has been widely noted. n212 Regarding Brazil's attempt to require data localization, the Information Technology Industry Council, an industry association representing more than forty major Internet companies, had argued that "in-country data storage requirements would detrimentally impact all economic activity that depends on data flows." n213 The Swedish government agency, the National Board of Trade, recently interviewed fifteen local companies of various sizes across sectors and concluded succinctly that "trade cannot happen without data being moved from one location to another." n214 Data localization, like most protectionist measures, leads only to small gains for a few local enterprises and workers, while causing significant harms spread across the entire economy . The domestic benefits of data localization go to the few owners and employees of data centers and the few companies servicing these centers locally. Meanwhile, the harms of data localization are widespread, felt by small, medium, and large businesses that are denied access to global services that might improve productivity. In response to Russia's recently passed localization law, the NGO Russian Association for Electronic Communications stressed the potential economic consequences, pointing to the withdrawal of global services and substantial economic losses caused by the passing of similar laws in other countries. n215 For example, besides the loss of international social media platforms, localization would make it impossible for [*723] Russians to order airline tickets or consumer goods through online services. Localization requirements also seriously affect Russian companies like Aeroflot because the airline depends on foreign ticket-booking systems. n216 Critics worried, at the time, that the Brazilian data localization requirement would "deny[] Brazilian users access to great services that are provided by US and other international companies." n217 Marilia Marciel, a digital policy expert at Fundacao Getulio Vargas in Rio de Janeiro, observes, "Even Brazilian companies prefer to host their data outside of Brazil." n218 Data localization affects domestic innovation by denying entrepreneurs the ability to build on top of global services based abroad. Brasscom, the Brazilian Association of Information Technology and Communication Companies, argues that such obligations would "hurt[] the country's ability to create, innovate, create jobs and collect taxes from the proper use of the Internet." n219 Governments implementing in-country data mandates imagine that the various global services used in their country will now build infrastructure locally. Many services, however, will find it uneconomical and even too risky to establish local servers in certain territories. n220 Data centers are expensive, all the more so if they have the highest levels of security. One study finds Brazil to be the most expensive country in the Western hemisphere in which to build data centers. n221 Building a data center in Brazil costs $ 60.9 million on average, [*724] while building one in Chile and the United States costs $ 51.2 million and $ 43 million, respectively. n222 Operating such a data center remains expensive because of enormous energy and other expenses - averaging $ 950,000 in Brazil, $ 710,000 in Chile, and $ 510,000 in the United States each month. n223 This cost discrepancy is mostly due to high electricity costs and heavy import taxes on the equipment needed for the center. n224 Data centers employ few workers, with energy making up three-quarters of the costs of operations. n225 According to the 2013 Data Centre Risk Index - a study of thirty countries on the risks affecting successful data center operations Australia, Russia, China, Indonesia, India, and Brazil are among the riskiest countries for running data centers. n226 Not only are there significant economic costs to data localization, the potential gains are more limited than governments imagine. Data server farms are hardly significant generators of employment, populated instead by thousands of computers and few human beings. The significant initial outlay they require is largely in capital goods, the bulk of which is often imported into a country. The diesel generators, cooling systems, servers, and power supply devices tend to be imported from global suppliers. n227 Ironically, it is often American suppliers of servers and other hardware that stand to be the beneficiaries of data localization mandates. n228 One study notes, "Brazilian suppliers of components did not benefit from this [data localization requirement], since the imported products dominate the market." n229 By increasing capital purchases from abroad, data localization requirements can in fact increase merchandise trade deficits. Furthermore, large data farms are [*725] enormous consumers of energy, n230 and thus often further burden overtaxed energy grids . They thereby harm other industries that must now compete for this energy, paying higher prices while potentially suffering limitations in supply of already scarce power. Cost, as well as access to the latest innovations, drives many e-commerce enterprises in Indonesia to use foreign data centers. Daniel Tumiwa, head of the Indonesian E-Commerce Association (IdEA), states that "the cost can double easily in Indonesia." n231 Indonesia's Internet start-ups have accordingly often turned to foreign countries such as Australia, Singapore, or the United States to host their services. One report suggests that "many of the "tools' that start-up online media have relied on elsewhere are not fully available yet in Indonesia." n232 The same report also suggests that a weak local hosting infrastructure in Indonesia means that sites hosted locally experience delayed loading time. n233 Similarly, as the Vietnamese government attempts to foster entrepreneurship and innovation, n234 localization requirements effectively bar start-ups from utilizing cheap and powerful platforms abroad and potentially handicap Vietnam from "joining in the technology race." n235 Governments worried about transferring data abroad at the same time hope, somewhat contradictorily, to bring foreign data within their borders. Many countries seek to become leaders in providing data centers for companies operating across their regions. In 2010, Malaysia announced its Economic Transformation Program n236 to transform Malaysia into a world-class data [*726] center hub for the Asia-Pacific region. n237 Brazil hopes to accomplish the same for Latin America, while France seeks to stimulate its economy via a "Made in France" digital industry. n238 Instead of spurring local investment, data localization can lead to the loss of investment. First, there's the retaliation effect. Would countries send data to Brazil if Brazil declares that data is unsafe if sent abroad? Brasscom notes that the Brazilian Internet industry's growth would be hampered if other countries engage in similar reactive policies, which "can stimulate the migration of datacenters based here, or at least part of them, to other countries." n239 Some in the European Union sympathize with this concern. European Commissioner for the Digital Agenda, Neelie Kroes, has expressed similar doubts, worrying about the results for European global competitiveness if each country has its own separate Internet. n240 Then there's the avoidance effect. Rio de Janeiro State University Law Professor Ronaldo Lemos, who helped write the original Marco Civil and is currently Director of the Rio Institute for Technology and Society, warns that the localization provision would have caused foreign companies to avoid the country altogether: "It could end up having the opposite effect to what is intended, and scare away companies that want to do business in Brazil." n241 Indeed, such burdensome local laws often lead companies to launch overseas, in order to try to avoid these rules entirely. Foreign companies, too, might well steer clear of the country in order to avoid entanglement with cumbersome rules. For example, Yahoo!, while very popular in Vietnam, places its servers for the [*727] country in Singapore. n242 In these ways we see that data localization mandates can backfire entirely, leading to avoidance instead of investment. Data localization requirements place burdens on domestic enterprises not faced by those operating in more liberal jurisdictions. Countries that require data to be cordoned off complicate matters for their own enterprises, which must turn to domestic services if they are to comply with the law. Such companies must also develop mechanisms to segregate the data they hold by the nationality of the data subject. The limitations may impede development of new, global services. Critics argue that South Korea's ban on the export of mapping data, for example, impedes the development of next-generation services in Korea: Technology services, such as Google Glass, driverless cars, and information programs for visually-impaired users, are unlikely to develop and grow in Korea. Laws made in the 1960s are preventing many venture enterprises from advancing to foreign markets via location/navigation services. n243 The harms of data localization for local businesses are not restricted to Internet enterprises or to consumers denied access to global services. As it turns out, most of the economic benefits from Internet technologies accrue to traditional businesses. A McKinsey study estimates that about seventy-five percent of the value added created by the Internet and data flow is in traditional industries, in part through increases in productivity. n244 The potential economic impact across the major sectors healthcare, manufacturing, electricity, urban infra-structure, security, agriculture, retail, etc. - is estimated at $ 2.7 to $ 6.2 trillion per year. n245 This is particularly important for emerging economies, in which traditional industries remain predominant. The Internet raises profits as well, due to increased revenues, lower costs of goods sold, and lower administrative costs. n246 With data localization mandates, traditional businesses [*728] will lose access to the many global services that would store or process information offshore. Data localization requirements also interfere with the most important trends in computing today. They limit access to the disruptive technologies of the future, such as cloud computing, the "Internet of Things," and data-driven innovations (especially those relying on "big data"). Data localization sacrifices the innovations made possible by building on top of global Internet platforms based on cloud computing. This is particularly important for entrepreneurs operating in emerging economies that might lack the infrastructure already developed elsewhere. And it places great impediments to the development of both the Internet of Things and big data analytics, requiring costly separation of data by political boundaries and often denying the possibility of aggregating data across borders. We discuss the impacts on these trends below. That causes World War 3 James, 14 - Professor of history at Princeton University’s Woodrow Wilson School who specializes in European economic history (Harold, “Debate: Is 2014, like 1914, a prelude to world war?” 7/3, http://www.theglobeandmail.com/globe-debate/read-and-vote-is-2014-like-1914-a-prelude-to-worldwar/article19325504/) Some of the dynamics of the pre-1914 financial world are now re-emerging. Then an economically declining power, Britain, wanted to use finance as a weapon against its larger and faster growing competitors, Germany and the United States. Now America is in turn obsessed by being overtaken by China – according to some calculations, set to become the world’s largest economy in 2014. In the aftermath of the 2008 financial crisis, financial institutions appear both as dangerous weapons of mass destruction, but also as potential instruments for the application of national power. In managing the 2008 crisis, the dependence of foreign banks on U.S. dollar funding constituted a major weakness, and required the provision of large swap lines by the Federal Reserve. The United States provided that support to some countries, but not others, on the basis of an explicitly political logic, as Eswar Prasad demonstrates in his new book on the “Dollar Trap.” Geo-politics is intruding into banking practice elsewhere. Before the Ukraine crisis, Russian banks were trying to acquire assets in Central and Eastern Europe. European and U.S. banks are playing a much reduced role in Asian trade finance. Chinese banks are being pushed to expand their role in global commerce. After the financial crisis, China started to build up the renminbi as a major international currency. Russia and China have just proposed to create a new credit rating agency to avoid what they regard as the political bias of the existing (American-based) agencies. The next stage in this logic is to think about how financial power can be directed to national advantage in the case of a diplomatic tussle. Sanctions are a routine (and not terribly successful) part of the pressure applied to rogue states such as Iran and North Korea. But financial pressure can be much more powerfully applied to countries that are deeply embedded in the world economy. The test is in the Western imposition of sanctions after the Russian annexation of Crimea. President Vladimir Putin’s calculation in response is that the European Union and the United States cannot possibly be serious about the financial war. It would turn into a boomerang: Russia would be less affected than the more developed and complex financial markets of Europe and America. The threat of systemic disruption generates a new sort of uncertainty, one that mirrors the decisive feature of the crisis of the summer of 1914. At that time, no one could really know whether clashes would escalate or not. That feature contrasts remarkably with almost the entirety of the Cold War, especially since the 1960s, when the strategic doctrine of Mutually Assured Destruction left no doubt that any superpower conflict would inevitably escalate. The idea of network disruption relies on the ability to achieve advantage by surprise, and to win at no or low cost. But it is inevitably a gamble, and raises prospect that others might, but also might not be able to, mount the same sort of operation. Just as in 1914, there is an enhanced temptation to roll the dice, even though the game may be fatal. 1ac - plan Plan: The United States federal government should limit domestic surveillance of information in the custody of American companies exclusively to authority under section 702 of the FISA Amendments Act, subject to the additional use restrictions in Presidential Policy Directive 28. 1ac – solvency Contention 3 – Solvency The plan’s curtailment of surveillance of U.S. companies to exclusive section 702 authority is vital to restoring domestic and international trust in surveillance Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19, http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues Fixing the Problem Means Changing the Existing Legal Framework Currently, the U.S. collects electronic communications under four main authorities. Four Main Authorities on Electronic Communication For collection occurring under both 215 and 702, the companies would have been served with an order compelling production of their data. But outside the U.S., Executive Order 12333,15 the long-standing guidance for foreign intelligence activities, would govern the kind of collection that has caused international outrage. E.O. 12333, signed by President Reagan, set the ground rules and authorization for foreign intelligence collection when the nation’s primary security threat was the Soviet Union. At that time, traditional intelligence activities would have been focused on other nation-states—identifying their spies, trying to recruit spies for the U.S., and trying to steal other countries’ secrets while protecting our own. But the growth of terrorist groups’ capabilities, and particularly the 9/11 attacks, helped dissolve the separation between traditional overseas espionage and counter-terrorism. As the nation was grappling with new threats posed by terrorism, people around the world were sharing more and more of their information online and using mostly American companies to do so. Yet the legal framework that had once recognized privacy rights was ill-suited to the Internet Age. The Intelligence Community’s traditional position that constitutional rights like the Fourth Amendment’s privacy protections didn’t apply to non-Americans outside the U.S. might have been clear when travelling and communicating internationally were more difficult. But today’s free-flowing movement of people and data means that the “nationality” of an individual’s communications is far less obvious.16 While extending constitutional or privacy protections to foreigners abroad is a tricky legal proposition, for many their data is being held by entities that are entitled to the due process and privacy protections of the U.S. Constitution: American companies. Our tech firms often act as custodians of other people’s data, and as such don’t have the same heightened privacy interests as the targets of that data. But accessing the companies’ data without even giving notice to the owner of the servers raises serious constitutional questions. As a politician once famously noted, “corporations are people too.”17 As a legal (if not political) matter, he was right— these American tech companies are “U.S. Persons ,” and they therefore should know when the government seeks to access the data they possess. The companies should be entitled to notice, especially since they can be compelled to cooperate with law enforcement requests to hand over user data. Those protections should hold true regardless of whether the user data sought by the U.S. government is that of Americans or non-Americans. In addition to those privacy protections that all U.S. persons enjoy under the Constitution, both at home and abroad, surveillance reform should meet the following principles when dealing with information about or from Americans: The U.S. government should have a process, consistent with the Constitution, to acquire from companies the information that it needs to secure the country. The U.S. government should have a national security reason to collect the information that it requests. U.S. companies should not have to fear unauthorized access to their data or products from their own government. Any process to acquire information from U.S. companies should have safeguards to prevent misuse or intentional over-collection. The Solution Include Overseas Collection from American Companies in Existing Statutory Frameworks In order to meet the principles above, we propose that FAA’s 702 framework be the exclusive means for conducting electronic surveillance when the information is in the custody of an American company (“FAA Exclusivity”). Section 702 of FAA provides procedures to authorize data collection of foreign targets reasonably believed to be outside the U.S. It empowers the Attorney General (AG) and Director of National Intelligence (DNI) to jointly certify a high volume of targeting and does not require the requesters to identify specific non-U.S. persons who will be targeted. Under this 702 framework, information on foreigners that’s in the custody of a U.S. company should be subject to the following rules: The data must relate to targets “reasonably believed” to be outside the U.S. (can include foreign persons, governments or their factions and similar entities). The AG and DNI must jointly submit annual “certifications” to the Foreign Intelligence Surveillance Court (FISC). Certifications must identify categories of foreign intelligence targets that the Government wants to surveil electronically; they do not need to identify specific persons to be targeted. Certifications may include information or representations from other federal agencies authorized to cooperate with the AG, DNI, or Director of the NSA. Certifications must be reviewed by the FISC, which can authorize the targeting if they deem that the statutory requirements have been met. After the certifications are approved, the AG and DNI issue (written) “directives” to the providers, ordering them to assist the government. Collection should be executed with the appropriate “minimization procedures” in place to limit the acquisition, retention, and dissemination of any non–publicly available U.S. person information acquired through the Section 702 program. The AG, in consultation with the DNI, must adopt FISC-approved targeting and minimization procedures that are “reasonably designed” to ensure that the Government does not collect wholly domestic communications, and that only persons outside the U.S. are surveilled. The AG and DNI must also create acquisition guidelines (which are not subject to FISC approval). Advantages of an FAA Framework Shifting the legal authority for collection of data in the custody of an American company from E.O. 12333 to an FAA framework would have a number of advantages. Most importantly, it would create a way for the government to get the data it needs from American companies while giving those firms assurances that their data would not be accessed in other unauthorized ways. In particular, the FAA framework would create specific purposes for which the information could be sought, rather than allow the indiscriminate scooping up of every aspect of a person’s communications. FAA’s stated purpose is to acquire foreign intelligence information, which it defines as "information that relates to the ability of the U.S. to protect against an actual or potential attack by a foreign power; sabotage, international terrorism, or the proliferation of weapons of mass destruction by a foreign power; or clandestine intelligence activities by a foreign power." The FAA framework would also create a requirement that the Executive Branch explain how the information sought meets the statutory purposes. And there would be the additional check of an independent judge who would review the certifications and issue directives. Though this process is ex parte, and therefore a potential rubber stamp for the government, there have been no documented instances of intentional abuses of the system in seeking information beyond the statutory purposes. Finally, the FAA framework would subject information sought from U.S. companies to the statutory oversight requirements of the law. These are extensive and explicit.18 In addition to FAA’s inherent protections, FAA Exclusivity would send a powerful message to the rest of the world : when the U.S. conducts electronic surveillance overseas from American companies, it is doing so for a particular national security purpose. The FAA structure with FISC review provides an independent check that the statutory purposes are met. Through transparency agreements with the government, the American companies would be able to provide their customers with some sense of how many requests are made. FAA Exclusivity would not change the E.O. 12333 authorities with respect to non-U.S. companies. It would not change E.O. 12333 authorities when the Executive Branch seeks to obtain the information in some way other than through a U.S. company that holds the data (i.e. traditional espionage, like breaking into a target’s laptop, parking a surveillance van outside their house, or sending a spy, would still be permissible). Of course, FAA Exclusivity wouldn’t solve every problem. It would not prevent foreign governments from collecting information themselves and then providing it to U.S. intelligence agencies, as U.S. law cannot bind a foreign government. And some may argue that FAA provides inadequate civil liberties protections for Americans. This proposal says nothing about the adequacy of that statute in this respect. What it says is that for data held by an American company about a target that is not a U.S. person, the checks within FAA are stronger than those solely under E.O. 12333. Others have argued that the FAA shifts the burden of cooperation solely onto the company, which will suffer greater reputational harm as a more witting participant in affirmatively granting the government’s requests. However, companies have suffered reputational harm as a result of allegations of unwitting cooperation. Making the cooperation known, even if it’s secret, gives the companies the opportunity to account for it in their own planning. The move by certain U.S. companies to place subsidiaries in foreign ownership to resist requests by the U.S. government presents an interesting twist on this idea. In shifting the balance back to increased protections for U.S. companies, this legislation would change the incentives so that claiming U.S. law would have operational advantages in giving companies uniformity of law for all their data. This would also encourage the use of a single choice of law for all data governed by a company—that of the nationality of incorporation—rather than encouraging a choice of law patchwork to govern the data as it flows around the world. Finally, some foreign multinational companies operating in the U.S. and abroad may argue that this is inconsistent with principles that we treat all companies operating in the U.S. the same way for purposes of law. While that would remain true under this proposal, it would create a difference in how the U.S. treats U.S. companies operating abroad compared to how it treats foreign companies abroad. But stretching the U.S. Constitution to foreign companies abroad is to stretch the document too far. If, on the other hand, those companies see advantage in changing their nationality to U.S. in order to claim protections of those laws, then that is the corporate version of the kind of immigration patterns that America has seen since its founding. Conclusion Using FAA’s framework as the exclusive means to access data that U.S. companies are holding will give the Intelligence Community a statutory framework to be able to get the intelligence information that it needs to protect the nation while restoring the trust relationship between the companies and our government. In addition, it will help restore the faith of foreign governments and customers that when American companies are acting overseas, they bring with them American values, including those of privacy protections. Applying the restrictions of PPD-28 to section 702 eliminates all negative perceptions of overbreadth Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11) To address the problem of overbreadth in Section 702 collection, PCLOB should recommend that Section 702 surveillance be conducted only for carefully defined national security purposes. While there are different ways to do this, the best way would be to turn the “use restrictions” in PPD-28 that govern bulk collection into the permissible purposes for Section 702 surveillance. This would require that collection pursuant to Section 702 only occur for purposes of detecting and countering: (1) espionage and other threats and activities directed by foreign powers or their intelligence services against the United States and its interests, (2) threats to the United States and its interests from terrorism, (3) threats to the United States and its interests from the development, possession, proliferation, or use of weapons of mass destruction, (4) cybersecurity threats, (5) threats to U.S. or allied Armed Forces or other U.S or allied personnel, and (6) transnational criminal threats, including illicit finance and sanctions evasion related to the other purposes named above. This change would provide significant comfort to non-U.S. persons abroad who are concerned about the impact on their human rights that Section 702 surveillance would otherwise have. Indeed, it would increase the likelihood that Section 702 surveillance would meet human rights standards. It would also focus Section 702 surveillance on true national security threats and still provide significant leeway to intelligence officials. We note that each time intelligence officials at the March 19 PCLOB hearings on Section 702 described the DNI certifications that identify the categories of foreign intelligence information that may be collected pursuant to Section 702, they mentioned one of these six categories of information. Another way to limit to national security the purposes for collection pursuant to Section 702 would be to remove “the conduct of foreign affairs” as a basis for collection. If adopted, this reform would permit collection under Section 702 for the purpose of obtaining (1) information that relates to the ability of the U.S. to protect against a hostile attack, espionage, sabotage or international terrorism or proliferation of weapons of mass destruction, or (2) information with respect to a foreign territory or foreign power (a foreign government, political party, or entity controlled by a foreign government, or a foreign terrorist organization) that relates to the security of the U.S. Such a change would be consistent with the stated counterterrorism purpose of Section 702. Refining the purpose for which surveillance under Section 702 may be conducted would not prevent the Intelligence Community from gathering information related to the conduct of foreign affairs, but rather would merely remove the highly invasive practice of compelled company disclosure of communications content absent judicial review as a means of doing so. Curtailing the use of surveillance on US-based servers to national security interests and increasing transparency regarding surveillance is vital to restoring trust and US credibility Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ The NSA mass surveillance programs described in the introduction, conducted domestically pursuant to USA PATRIOT Act Section 215 and FISA Amendments Act Section 702 and conducted outside the U.S. under Executive Order 12333, have arguably had the greatest and most immediate impact on America’s tech industry and global standing. Strictly limiting the scope and purpose of surveillance under these authorities—not just in regard to surveillance of Americans but of non-Americans as well —will be critical to regaining the trust of individuals, companies and countries around the world, as well as stemming the economic and political costs of the NSA programs. The President’s NSA Review Group acknowledged the need for such reform in its report on surveillance programs, affirming that “the right of privacy has been recognized as a basic human right that all nations should respect,” and cautioned that “unrestrained American surveillance of non-United States persons might alienate other nations, fracture the unity of the Internet, and undermine the free flow of information across national boundaries.”324 In addition to recommending a variety new protections for U.S. persons, the Review Group urged in its Recommendation 13 that surveillance of non-U.S. persons under Section 702 or “any other authority”—a reference intended to include Executive Order 12333325 — should be strictly limited to the purpose of protecting national security, should not be used for economic espionage, should not be targeted based solely on a person’s political or religious views, and should be subject to careful oversight and the highest degree of transparency possible.326 Fully implementing this recommendation—and particularly restricting Section 702 and Executive Order 12333 surveillance to specific national security purposes rather than foreign intelligence collection generally— would indicate significant progress toward addressing the concerns raised in the recent Report of the Office of the United Nations High Commissioner for Human Rights on “The Right to Privacy in the Digital Age.” The UN report highlights how, despite the universality of human rights, the common distinction between “‘foreigners’ and ‘citizens’…within national security surveillance oversight regimes” has resulted in “significantly weaker – or even non-existent – privacy protection for foreigners and noncitizens, as compared with those of citizens.”327 The leading legislative reform proposal in the U.S. Congress, the USA FREEDOM Act, would go a long way to protecting both U.S. and non-U.S. persons against the bulk collection under Section 215 of records held by American telephone and Internet companies.328 On that basis, passage of the law would very much help address the trust gap that the NSA programs have created. However, with regard to Section 702, the bill as originally introduced only added new protections for U.S. persons or for wholly domestic communications,329 and even those protections were stripped out or weakened in the version of the bill that was passed by the House of Representatives in May 2014.330 Meanwhile, neither the bill as introduced nor as passed by the House addresses surveillance conducted extraterritorially under Executive or 12333. Therefore, even if USA FREEDOM is eventually approved by both the House and the Senate and signed into law by the President, much more will ultimately need to be done to reassure foreign users of U.S.-based communications networks, services, and products that their rights are being respected. Provide for increased transparency around government surveillance, both from the government and companies. Increased transparency about how the NSA is using its authorities, and how U.S. companies do—or do not—respond when the NSA demands their data is critical to rebuilding the trust that has been lost in the wake of the Snowden disclosures. In July 2013, a coalition of large Internet companies and advocacy groups provided a blueprint for the necessary transparency reforms, in a letter to the Obama Administration and Congress calling for “greater transparency around national security-related requests by the US government to Internet, telephone, and web-based service providers for information about their users and subscribers.”331 Major companies including Facebook, Google, and Microsoft—joined by organizations such as the Center for Democracy and Technology, New America’s Open Technology Institute, and the American Civil Liberties Union—demanded that the companies be allowed to publish aggregate numbers about the specific types of government requests they receive, the types of data requested, and the number of people affected. They also also urged the government to issue its own transparency reports to provide greater clarity about the scope of the NSA’s surveillance programs.332 “This information about how and how often the government is using these legal authorities is important to the American people, who are entitled to have an informed public debate about the appropriateness of those authorities and their use, and to international users of US-based service providers who are concerned about the privacy and security of their communications,” the letter stated.333 Two months later, many of the same companies and organizations issued another letter supporting surveillance transparency legislation proposed by Senator Al Franken (D-MN) and Representative Zoe Lofgren (D-CA) that would have implemented many of the original letter’s recommendations.334 Elements of both bills, consistent with the coalition’s recommendations, were included in the original version of the USA FREEDOM Act introduced in the House and the Senate—as were new strong transparency provisions requiring the FISA court to declassify key legal opinions to better educate the public and policymakers about how it is interpreting and implementing the law. Such strong new transparency requirements are consistent with several recommendations of the President’s Review Group335 and would help address concerns about lack of transparency raised by the UN High Commissioner for Human Rights.336 Unfortunately, all of these transparency provisions from the original USA FREEDOM Act were substantially weakened in the version of the bill that was passed by the House of Representatives in May 2014.337 Congress will need to include stronger transparency provisions in any final version of the USA FREEDOM Act if it intends to meaningfully restore trust in the U.S. Internet and telecommunications industries and stem the loss of business that has begun as a result of the NSA programs. As commentator Mieke Eoyang put it, “If reforms do not deliver sufficient protections and transparency for [tech companies’] customers, especially those abroad who have the least constitutional protections, they will vote with their feet.”338 Recommit to the Internet Freedom agenda in a way that directly addresses issues raised by NSA surveillance, including moving toward international human-rights based standards on surveillance. The United States must act immediately to restore the credibility of the Internet Freedom agenda, lest it become another casualty of the NSA’s surveillance programs. As described in Part IV, various agencies within the U.S. government have taken initial steps to demonstrate goodwill in this area, particularly through the NTIA’s announcement that it intends to transition stewardship of the IANA functions to a global multistakeholder organization and the State Department’s speech outlining six principles to guide signals intelligence collection grounded in international human rights norms. However, it will take a broader effort from across the government to demonstrate that the United States is fully committed to Internet Freedom, including firmly establishing the nature of its support for the evolving multistakeholder system of Internet governance and directly engaging with issues raised by the NSA surveillance programs in international conversations. Supporting international norms that increase confidence in the security of online communications and respect for the rights of Internet users all around the world is integral to restoring U.S. credibility in this area. “We have surveillance programmes that abuse human rights and lack in transparency and accountability precisely because we do not have sufficiently robust, open, and inclusive debates around surveillance and national security policy,” writes Matthew Shears of the Center for Democracy & Technology.339 It is time to begin having those conversations on both a national and an international level, particularly at key upcoming Internet governance convenings including the 2014 Internet Governance Forum, the International Telecommunications Union’s plenipotentiary meeting, and the upcoming WSIS+10 review process.340 Certainly, the United States will not be able to continue promoting the Internet Freedom agenda at these meetings without addressing its national security apparatus and the impact of NSA surveillance on individuals around the world. Rather than being a problem, this presents an opportunity for the U.S. to assume a leadership role in the promotion of better international standards around surveillance practices. Case extensions Internet freedom Surveillance kills Internet freedom NSA surveillance wrecks US cred in promoting Internet Freedom and spills over to larger foreign policy cred Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ Mandatory data localization proposals are just one of a number of ways that foreign governments have reacted to NSA surveillance in a manner that threatens U.S. foreign policy interests, particularly with regard to Internet Freedom. There has been a quiet tension between how the U.S. approaches freedom of expression online in its foreign policy and its domestic laws ever since Secretary of State Hillary Clinton effectively launched the Internet Freedom agenda in January 2010.170 But the NSA disclosures shined a bright spotlight on the contradiction: the U.S. government promotes free expression abroad and aims to prevent repressive governments from monitoring and censoring their citizens while simultaneously supporting domestic laws that authorize surveillance and bulk data collection. As cybersecurity expert and Internet governance scholar Ron Deibert wrote a few days after the first revelations: “There are unintended consequences of the NSA scandal that will undermine U.S. foreign policy interests – in particular, the ‘Internet Freedom’ agenda espoused by the U.S. State Department and its allies.”171 Deibert accurately predicted that the news would trigger reactions from both policymakers and ordinary citizens abroad, who would begin to question their dependence on American technologies and the hidden motivations behind the United States’ promotion of Internet Freedom. In some countries, the scandal would be used as an excuse to revive dormant debates about dropping American companies from official contracts, score political points at the expense of the United States, and even justify local monitoring and surveillance. Deibert’s speculation has so far proven quite prescient. As we will describe in this section, the ongoing revelations have done significant damage to the credibility of the U.S. Internet Freedom agenda and further jeopardized the United States’ position in the global Internet governance debates. Moreover, the repercussions from NSA spying have bled over from the Internet policy realm to impact broader U.S. foreign policy goals and relationships with government officials and a range of other important stakeholders abroad. In an essay entitled, “The End of Hypocrisy: American Foreign Policy in the Age of Leaks,” international relations scholars Henry Farrell and Martha Finnemore argue that a critical, lasting impact of information provided by leakers like Edward Snowden is “the documented confirmation they provide of what the United States is actually doing and why. When these deeds turn out to clash with the government’s public rhetoric, as they so often do, it becomes harder for U.S. allies to overlook Washington’s covert behavior and easier for U.S. adversaries to justify their own.”172 Toward the end of the essay, Farrell and Finnemore suggest, “The U.S. government, its friends, and its foes can no longer plausibly deny the dark side of U.S. foreign policy and will have to address it head-on.” Indeed, the U.S. is currently working to repair damaged bilateral and multilateral relations with countries from Germany and France to Russia and Israel,173 and it is likely that the effects of the NSA disclosures will be felt for years in fields far beyond Internet policy .174 Wrecks overall internet freedom globally Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ The effects of the NSA disclosures on the Internet Freedom agenda go beyond the realm of Internet governance . The loss of the United States as a model on Internet Freedom issues has made it harder for local civil society groups around the world—including the groups that the State Department’s Internet Freedom programs typically support203—to advocate for Internet Freedom within their own governments.204 The Committee to Protect Journalists, for example, reports that in Pakistan, “where freedom of expression is largely perceived as a Western notion, the Snowden revelations have had a damaging effect. The deeply polarized narrative has become starker as the corridors of power push back on attempts to curb government surveillance.”205 For some of these groups, in fact, even the appearance of collaboration with or support from the U.S. government can diminish credibility, making it harder for them to achieve local goals that align with U.S. foreign policy interests.206 The gap in trust is particularly significant for individuals and organizations that receive funding from the U.S. government for free expression activities or circumvention tools. Technology supported by or exported from the United States is, in some cases, inherently suspect due to the revelations about the NSA’s surveillance dragnet and the agency’s attempts to covertly influence product development. Moreover, revelations of what the NSA has been doing in the past decade are eroding the moral high ground that the United States has often relied upon when putting public pressure on authoritarian countries like China, Russia, and Iran to change their behavior. In 2014, Reporters Without Borders added the United States to its “Enemies of the Internet” list for the first time, explicitly linking the inclusion to NSA surveillance. “The main player in [the United States’] vast surveillance operation is the highly secretive National Security Agency (NSA) which, in the light of Snowden’s revelations, has come to symbolize the abuses by the world’s intelligence agencies,” noted the 2014 report.207 The damaged perception of the United States208 as a leader on Internet Freedom and its diminished ability to legitimately criticize other countries for censorship and surveillance opens the door for foreign leaders to justify—and even expand—their own efforts.209 For example, the Egyptian government recently announced plans to monitor social media for potential terrorist activity, prompting backlash from a number of advocates for free expression and privacy.210 When a spokesman for the Egyptian Interior Ministry, Abdel Fatah Uthman, appeared on television to explain the policy, one justification that he offered in response to privacy concerns was that “the US listens in to phone calls, and supervises anyone who could threaten its national security.”211 This type of rhetoric makes it difficult for the U.S. to effectively criticize such a policy. Similarly, India’s comparatively mild response to allegations of NSA surveillance have been seen by some critics “as a reflection of India’s own aspirations in the world of surveillance,” a further indication that U.S. spying may now make it easier for foreign governments to quietly defend their own behavior.212 It is even more difficult for the United States to credibly indict Chinese hackers for breaking into U.S. government and commercial targets without fear of retribution in light of the NSA revelations.213 These challenges reflect an overall decline in U.S. soft power on free expression issues. Surveillance kills soft power NSA overreach wrecks US smart power Donahoe, 14 - Eileen Donahoe served as U.S. ambassador to the United Nations Human Rights Council. She is a visiting scholar at Stanford University's Freeman Spogli Institute for International Studies (“Why the NSA undermines national security” Reuters, 3/6, http://blogs.reuters.com/greatdebate/2014/03/06/why-nsa-surveillance-undermines-national-security/ But this zero-sum framework ignores the significant damage that the NSA’s practices have done to U.S. national security. In a global digital world, national security depends on many factors beyond surveillance capacities, and over-reliance on global data collection can create unintended security vulnerabilities. There’s a better framework than security-versus-privacy for evaluating the national security implications of mass-surveillance practices. Former Secretary of State Hillary Clinton called it “smart power.” Her idea acknowledges that as global political power has become more diffuse, U.S. interests and security increasingly depend on our ability to persuade partners to join us on important global security actions. But how do we motivate disparate groups of people and nations to join us? We exercise smart power by inspiring trust and building credibility in the global community. Developing these abilities is as important to U.S. national security as superior military power or intelligence capabilities. I adopted the smart-power approach when serving as U.S. ambassador to the United Nations Human Rights Council. Our task at the council was to work with allies, emerging democracies and human rightsfriendly governments to build coalitions to protect international human rights. We also built alliances with civil society actors, who serve as powerful countervailing forces in authoritarian systems. These partnerships can reinforce stable relationships, which enhances U.S. security. The NSA’s arbitrary global surveillance methods fly in the face of smart power. In the pursuit of information, the spy agency has invaded the privacy of foreign citizens and political leaders, undermining their sense of freedom and security. NSA methods also undercut U.S. credibility as a champion of universal human rights. The U.S. model of mass surveillance will be followed by others and could unintentionally invert the democratic relationship between citizens and their governments. Under the cover of preventing terrorism, authoritarian governments may now increase surveillance of political opponents. Governments that collect and monitor digital information to intimidate or squelch political opposition and dissent can more justifiably claim they are acting with legitimacy. For human rights defenders and democracy activists worldwide, the potential consequences of the widespread use by governments of mass surveillance techniques are dark and clear. Superior information is powerful, but sometimes it comes at greater cost than previously recognized. When trust and credibility are eroded, the opportunity for collaboration and partnership with other nations on difficult global issues collapses. The ramifications of this loss of trust have not been adequately factored into our national security calculus. What is most disconcerting is that the NSA’s mass surveillance techniques have compromised the security of telecommunication networks, social media platforms, private-sector data storage and public infrastructure security systems. Authoritarian governments and hackers now have a roadmap to surreptitiously tap into private networks for their own nefarious purposes. By weakening encryption programs and planting backdoor entries to encryption software, the NSA has demonstrated how it is possible to infiltrate and violate information-security systems. In effect, the spy agency has modeled anarchic behavior that makes everyone less safe. Some have argued, though, that there is a big difference between the U.S. government engaging in mass-surveillance activities and authoritarian governments doing so. That “big difference” is supposed to be democratic checks and balances, transparency and adherence to the rule of law. Current NSA programs, however, do not operate within these constraints. With global standards for digital surveillance now being set, our political leaders must remember that U.S. security depends upon much more than unimpeded surveillance capabilities. As German Chancellor Angela Merkel, one of President Barack Obama’s most trusted international partners, has wisely reminded us, just because we can do something does not mean that we should do it. National security policies that fail to calculate the real costs of arbitrary mass surveillance threaten to make us less secure. Without trusted and trusting partners, U.S. priority initiatives in complex global negotiations will be non-starters. The president, his advisers and our political leaders should reassess the costs of the NSA’s spy programs on our national security, our freedom and our democracy. By evaluating these programs through a smart-power lens, we will be in a stronger position to regain the global trust and credibility so central to our national security. Data localization kills internet Mandatory data localization wrecks US internet company competitiveness and US internet freedom – also threatens the functioning of the internet itself Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ Some analysts have questioned whether data localization and protection proposals are politically motivated and if they would actually enhance privacy and security for ordinary individuals living in foreign countries,160 especially given the existence of similar laws in a number of countries and Mutual Legal Assistance Treaties (MLATs) between nations that provide cross-border access to data stored for lawful investigations.161 Yet there is no doubt that American companies will pay a steep price if these policies move forward. Mandatory data localization laws could lead to soaring costs for major Internet companies such as Google, Facebook, and Twitter, who would be faced with the choice of investing in additional, duplicative infrastructure and data centers in order to comply with new regulations or pulling their business out of the market altogether.162 In testimony before Congress last November, for example, Google’s Director of Law Enforcement and Information Security suggested that requirements being discussed in Brazil could be so onerous that they would effectively bar Google from doing business in the country.163 The penalties that companies face for violating these new rules are also significant. In some cases, unless U.S. policy changes , it may be virtually impossible for American companies to avoid violating either domestic or foreign laws when operating overseas.164 The costs and legal challenges could easily prevent firms from expanding in the first place or cause them to leave existing markets because they are no longer profitable.165 ITIF’s Daniel Castro has suggested that data privacy rules and other restrictions could slow the growth of the U.S. technology-services industry by as much as four percent.166 Data localization proposals also threaten to undermine the functioning of the Internet, which was built on protocols that send packets over the fastest and most efficient route possible, regardless of physical location. If actually implemented, policies like those suggested by India and Brazil would subvert those protocols by altering the way Internet traffic is routed in order to exert more national control over data.167 The localization of Internet traffic may also have significant ancillary impacts on privacy and human rights by making it easier for countries to engage in national surveillance, censorship, and persecution of online dissidents, particularly where countries have a history of violating human rights and ignoring rule of law.168 “Ironically, data localization policies will likely degrade – rather than improve – data security for the countries considering them, making surveillance, protection from which is the ostensible reason for localization, easier for domestic governments, if not foreign powers, to achieve,” writes Jonah Force Hill.169 The rise in data localization and data protection proposals in response to NSA surveillance threatens not only U.S. economic interests, but also Internet Freedom around the world. Data localization kills internet freedom Data localization threatens internet freedom – creates a bordered internet Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ The NSA disclosures have prompted some foreign leaders to propose new policies for data localization and data protection that could have serious ramifications for the Internet ecosystem. In the name of strengthening privacy and security, many of these changes could hurt American tech companies, impact the future growth of the network as a whole, and endanger human rights and Internet Freedom.99 In particular, proposals that would require data localization or strengthen data protection laws could fundamentally alter the way traffic flows over the Internet and create significant additional compliance costs for American technology companies operating overseas. Major economic powers such as Germany, Brazil, and India have discussed requiring that all Internet traffic be routed or stored locally. Various leaders in these countries have also urged government agencies and their citizens to stop using American tools altogether because of concerns about backdoors or other arrangements with the NSA.100 Meanwhile, legislators in the European Union have passed strict new data protection rules for the continent and considered various privacy-focused proposals, including the development of “national clouds” and the suspension of key trade agreements with the United States.101 “The vast scale of online surveillance revealed by Edward Snowden is leading to the breakup of the Internet as countries scramble to protect privacy or commercially sensitive emails and phone records from UK and US security services,” reported The Guardian in November 2013.102 In combination, these various proposals could threaten the Internet economy while endangering privacy and free expression. Mandatory Data Localization and the Costs of a Bordered Internet Internet jurisdiction and borders were contentious issues long before the Snowden leaks, but the debate has become significantly more complex in the past year. For decades, the borderless nature of cyberspace103 has raised concerns about sovereignty and how governments can regulate and access their citizens’ personal information or speech when it is stored on servers that may be located all over the world.104 Various data localization and national routing proposals have been put forth by governments that seek greater control of the information that flows within their borders, often in order to make censorship and surveillance over the local population easier.105 On the other side, free speech advocates, technologists, and civil society organizations generally advocate for a borderless cyberspace governed by its own set of internationally-agreed upon rules that promote the protection of human rights, individual privacy, and free expression.106 The revelations about NSA surveillance have heightened concerns on both sides of this debate. But the disclosures appear to have given new ammunition to proponents of greater governmental control over traffic and network infrastructure, accelerating the number and scope of national control proposals from both long-time advocates as well as governments with relatively solid track records on human rights.107 There are now more than a dozen countries that have introduced or are actively discussing data localization laws.108 Broadly speaking, data localization can be defined as any measures that “specifically encumber the transfer of data across national borders,” through rules that prevent or limit these information flows.109 The data localization proposals being considered post-Snowden generally require that foreign ICT companies maintain infrastructure located within a country and store some or all of their data on that country’s users on local servers.110 Brazil, for example, has proposed that Internet companies like Facebook and Google must set up local data centers so that they are bound by Brazilian privacy laws.111 The Indian government’s draft policy would force companies to maintain part of their IT infrastructure in-country, give local authorities access to the encrypted data on their servers for criminal investigations, and prevent local data from being moved out of country.112 Germany, Greece, Brunei, and Vietnam have also put forth their own data sovereignty proposals. Proponents argue that these policies would provide greater security and privacy protection because local servers and infrastructure can give governments both physical control and legal jurisdiction over the data being stored on them—although the policies may come with added political and economic benefits for those countries as well. “Home grown and guaranteed security in data storage, hardware manufacture, cloud computing services and routing are all part of a new discussion about ‘technological sovereignty,’” write Mascolo and Scott. “It is both a political response and a marketing opportunity.” 113 At the same time, data localization can also facilitate local censorship and surveillance, making it easier for governments to exert control over the Internet infrastructure. Data localization kills democracy Data localization rolls back global democracy Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) E. Freedom Information control is central to the survival of authoritarian regimes. Such regimes require the suppression of adverse information in order to maintain their semblance of authority. This is because "even authoritarian governments allege a public mandate to govern and assert that the government is acting in the best interests of the people." n280 Information that disturbs the claim of a popular mandate and a beneficent government is thus to be eliminated at all costs. Opposition newspapers or television is routinely targeted, with licenses revoked or printing presses confiscated. The Internet has made this process of information control far more difficult by giving many dissidents the ability to use services based outside the country to share information. The Internet has made it harder, though not impossible, for authoritarian regimes to suppress their citizens from both sharing and learning information. n281 Data localization will erode that liberty-enhancing feature of the Internet. The end result of data localization is to bring information increasingly under the control of the local authorities, regardless of whether that was originally intended. The dangers inherent in this are plain. Take the following cases. The official motivation for the Iranian Internet, as set forth by Iran's [*736] head of economic affairs Ali Aghamohammadi, was to create an Internet that is "a genuinely halal network, aimed at Muslims on an ethical and moral level," which is also safe from cyberattacks (like Stuxnet) and dangers posed by using foreign networks. n282 However, human rights activists believe that "based on [the country's] track record, obscenity is just a mask to cover the government's real desire: to stifle dissent and prevent international communication." n283 An Iranian journalist agreed, "this is a ploy by the regime," which will "only allow[] [Iranians] to visit permitted websites." n284 More recently, even Iran's Culture Minister Ali Janati acknowledged this underlying motivation: "We cannot restrict the advance of [such technology] under the pretext of protecting Islamic values." n285 Well aware of this possibility, Internet companies have sought at times to place their servers outside the country in order to avoid the information held therein being used to target dissidents. Consider one example: when it began offering services in Vietnam, Yahoo! made the decision to use servers outside the country, perhaps to avoid becoming complicit in that country's surveillance regime. n286 This provides important context for the new Vietnamese decree mandating local accessibility of data. While the head of the Ministry of Information's Online Information Section defends Decree 72 as "misunderstood" and consistent with "human rights commitments," n287 the Committee to Protect Journalists worries that this decree will require "both local and foreign companies that provide Internet services ... to reveal the identities of users who violate numerous vague prohibitions against certain speech in Vietnamese law." n288 As Phil Robertson of Human Rights Watch argues, "This is a law that has been established for selective persecution. This [*737] is a law that will be used against certain people who have become a thorn in the side of the authorities in Hanoi." n289 Data localization efforts in liberal societies thus offer cover for more pernicious efforts by authoritarian states. When Brazil's government proposed a data localization mandate, a civil society organization focused on cultural policies compared the measure to the goals of China and Iran: [SEE FIGURE IN ORIGNIAL] Translated, this reads as follows: "Understand this: storing data in-country is the Internet dream of China, Iran, and other totalitarian countries, but it is IMPOSSIBLE #MarcoCivil." n290 Thus, perhaps the most pernicious and long-lasting effect of data localization regulations is the template and precedent they offer to continue and enlarge such controls. When liberal nations decry efforts to control information by authoritarian regimes, the authoritarian states will cite our own efforts to bring data within national control . If liberal states can cite security, privacy, law enforcement, and social economic reasons to justify data controls, so can authoritarian states. Of course, the Snowden revelations of widespread U.S. surveillance will themselves justify surveillance efforts by other states. For example, Russia has begun to use NSA surveillance to justify increasing control over companies such as Facebook and Google. n291 Such rules have led critics to worry about increasing surveillance powers of the Russian state. n292 Critics caution, "In the future, Russia may even succeed in splintering the web, [*738] breaking off from the global Internet a Russian intranet that's easier for it to control." n293 Even though officials describe such rules as being antiterrorist, others see a more sinister motive. The editor of Agentura.ru, Andrei Soldatov, believes that Zheleznyak's proposal is motivated by the government's desire to control internal dissent. n294 Ivan Begtin, the director of the group Information Culture, echoes this, arguing that Zheleznyak's surveillance power "will be yet another tool for controlling the Internet." n295 Begtin warns, "In fact, we are moving very fast down the Chinese path." n296 Finally, creating a poor precedent for more authoritarian countries to emulate is not the only impact on liberty of data localization by liberal states. Even liberal states have used surveillance to undermine the civil rights of their citizens and residents. n297 The proposal for a German "Internetz" has drawn worries that national routing would require deep packet inspection, raising fears of extensive surveillance. n298 The newspaper Frankfurter Allgemeine argues that not only would a state-sanctioned network provide "no help against spying," it would lead to "a centralization of surveillance capabilities" for German spy agencies. n299 India's proposed localization measures in combination with the various surveillance systems in play - including Aadhaar, CMS, National Intelligence Grid (Natgrid), and Netra - have raised concerns for human rights, including freedom of expression. n300 [*739] In addition to concerns regarding human rights violations based on surveillance and censorship, data localization measures also interfere with the freedom of expression - particular the "freedom to seek, receive and impart information and ideas of all kinds, regardless of frontier[]." n301 Preventing citizens from using foreign political forums because such use might cause personal data to be stored or processed abroad might interfere with an individuals' right to knowledge. n302 Armed with the ability to block information from going out and to filter the information coming in, data location consolidates power in governments by making available an infrastructure for surveillance and censorship. Data localization kills cybersecurity Data localization wrecks cybersecurity Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) Closely related to the goal of avoiding foreign surveillance through data localization is the goal of protecting the privacy and security of personal information against nongovernmental criminal activities. As the country studies above show, the laws of many countries make it difficult to transfer personal data outside of national borders in the name of privacy and security. While these laws are not explicitly designed to localize data, by creating significant barriers to the export of data, they operate as data localization measures. [*719] The irony is that such efforts are likely to undermine, not strengthen, the privacy and security of the information. n195 First, localized data servers reduce the opportunity to distribute information across multiple servers in different locations. As we have noted above, the information gathered together in one place offers a tempting jackpot, an ideal target for criminals. As some computer experts have noted, "Requirements to localize data ... only make it impossible for cloud service providers to take advantage of the Internet's distributed infrastructure and use sharding and obfuscation on a global scale." n196 Sharding is the process in which rows of a database table are held separately in servers across the world - making each partition a "shard" that provides enough data for operation but not enough to re-identify an individual. n197 "The correct solution," Pranesh Prakash, Policy Director with India's Centre for Internet and Society suggests, "would be to encourage the creation and use of decentralised and end-to-end encrypted services that do not store all your data in one place." n198 Second, as we noted above, the Protected Local Provider offering storage and processing services may be more likely to have weak security infrastructure than companies that continuously improve their security to respond to the ever-growing sophistication of cyberthieves. As a recent cover feature of the IEEE Computer Society magazine observes, "The most common threats to data in the cloud involve breaches by hackers against inadequately protected systems, user carelessness or lack of caution, and engineering errors." n199 Information technology associations from Europe, Japan, and the United States have echoed this observation, arguing that "security is a function of how a product is made, used, and maintained, not by whom or where it is made." n200 When Australia was contemplating a rule requiring health data to [*720] remain in the country (a rule that was subsequently implemented), Microsoft made a similar argument. Microsoft argued that the rule might undermine the security of Australian health information by limiting consumer choice among potential providers and wrote, "Consumers should have the ability to personally control their [personal electronic health records] by choosing to have their [personal electronic health records] held by an entity not located within Australia's territorial boundaries if they believe that entity can provide to them a service that meets their individual needs." n201 Indeed, countries pushing for data localization themselves are sometimes hotbeds of cybercrimes. According to experts, "Cyber security is notoriously weak in Indonesia." n202 Indeed, the nation has been called a "hacker's paradise." n203 One 2013 report on Vietnam suggests that "2,045 agency and business websites were hacked this year, but the number of cyber security experts was too small to cope with all of them." n204 Another account suggests that "Brazil is among the main targets of virtual threats such as malware and phishing." n205 For example, in 2011, hackers stole one billion dollars from companies in Brazil, as Forbes put it, the "worst prepared nation to adopt cloud technology." n206 At times, a cybertheft can begin with a domestic burglary, as in the case of one recent European episode. n207 Or cyberthefts can [*721] be accomplished with a USB "thumb" drive. In January 2014, information about more than 100 million South Korean credit cards was stolen, likely through an "inside job" by a contractor armed with a USB drive. n208 Most fundamentally, there is little reason to believe that the personal information of British Columbians is more secure just because it is stored on a government computer in Vancouver than one owned by IBM, a few miles further south. AT: Data localization solves surveillance Data localization increases the risk of surveillance Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) Fourth, far from making surveillance more difficult for a foreign government, localization requirements might in fact make it easier. By compelling companies to use local services rather than global ones, there is a greater likelihood of choosing companies with weak security measures. By [*717] their very nature, the global services are subject to intense worldwide competition, while local services - protected by the data localization requirements - might have less need to offer stronger security to attract customers, and fewer resources to do so, than companies with a global scale. Weaker security makes such systems easier targets for foreign surveillance. This is what we call the "Protected Local Provider" problem. Fifth, data localization might actually facilitate foreign surveillance. Centralizing information about users in a locality might actually ease the logistical burdens of foreign intelligence agencies, which can now concentrate their surveillance of a particular nation's citizens more easily. We call this the "Jackpot" problem. AT: Data localization helps law enforcement Data localization doesn’t aid law enforcement Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) Equally important, it seems unlikely that data localization will prove an effective means to ensure that data about their residents is available to law enforcement personnel when they want it. Moreover, other alternatives are reasonably available to assist law enforcement access to data - alternatives that are both less trade restrictive and more speech-friendly than data localization. Data localization will not necessarily provide law enforcement better access to a criminal's data trail because localization requirements are extremely hard to enforce. They might simply end up driving potential wrongdoers abroad to less compliant and more secretive services. Indeed, the most lawabiding companies will follow costly data localization rules, while others will simply ignore them, comforted by the knowledge that such laws are difficult to enforce. Any success with gaining information from these companies will likely prove temporary, as, over time, potential scofflaws will become aware of the monitoring and turn to services that intentionally skirt the law. The services avoiding the law will likely be foreign ones, lacking any [*733] personnel or assets on the ground against which to enforce any sanction. Thus, understood dynamically, the data localization requirement will only hamper local and law-abiding enterprises, while driving some citizens abroad. Law enforcement is, without doubt, a laudable goal, so long as the laws themselves do not violate universal human rights. Many governments already have authority under their domestic laws to compel a company operating in their jurisdictions to share data of their nationals held by that company abroad. A recent study of ten countries concluded that the government already had the right to access data held extraterritorially in the cloud in every jurisdiction examined. n268 Although the process varied, "every single country ... vests authority in the government to require a Cloud service provider to disclose customer data in certain situations, and in most instances this authority enables the government to access data physically stored outside the country's borders." n269 Even if companies refuse to comply with such orders, or if the local subsidiary lacks the authority to compel its foreign counterpart to share personal data, governments can resort to information-sharing agreements. For example, the Convention on Cybercrime, which has been ratified by forty-four countries including the United States, France, and Germany, n270 obliges Member States to adopt and enforce laws against cybercrimes and to provide "mutual assistance" to each other in enforcing cyberoffenses. n271 Many states have entered into specific Mutual Legal Assistance Treaties (MLATs) with foreign nations. These treaties establish a process that protects the rights of [*734] individuals yet gives governments access to data held in foreign jurisdictions. Currently, the United States has MLATs in force with fifty-six countries. n272 The United States also entered into a Mutual Legal Assistance Agreement (MLAA) with China and Taiwan. n273 All the countries discussed in the country studies above, with the exception of Indonesia, Kazakhstan, and Vietnam, have MLAT arrangements in force with the United States. Generally, MLATs "specify which types of requested assistance must be provided, and which may be refused." n274 Requests for assistance may be refused typically when the execution of such request would be prejudicial to the state's security or public interest; the request relates to a political offense; there is an absence of reasonable grounds; the request does not conform to the MLAT's provisions; or the request is incompatible with the requested state's law. n275 The explanatory notes to the MLAT between the United States and the European Union observe that a request for data shall only be denied on data protection grounds in "exceptional cases." n276 At the same time, there are procedural requirements to help ensure that the information gathering is supporting a proper governmental investigation. For example, Article 17 of the U.S.-Germany MLAT provides that the government requesting assistance must do [*735] so in writing and must specify the evidence or information sought, authorities involved, applicable criminal law provisions, etc. n277 An effective MLAT process gives governments the ability to gather information held on servers across the world. The International Chamber of Commerce has recognized the crucial role of MLATs in facilitating the lawful interception of cross-border data flow and stressed the need to focus on MLATs instead of localization measures. n278 Similarly, the European Commission has recently stressed that the rebuilding of trust in the U.S.-E.U. relationship must focus in part on a commitment to use legal frameworks such as the MLATs. n279 Mutual cooperation arrangements are far more likely to prove effective in the long run to support government information gathering efforts than efforts to confine information within national borders. AT: PPD 28 solves Obama PPD doesn’t solve section 702 perception problems – it’s not applied to it Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11) The Presidential Policy Directive that President Obama issued on January 17, 2014 (PPD-28),7 while remarkable in many ways, does not sufficiently address this problem. It prohibits the government from collecting signals intelligence for the purpose of suppressing or burdening criticism or dissent, but that prohibition permits the continued collection of information about such expressive activities merely because they are relevant to U.S. foreign affairs. On the other hand, PPD-28 does include very important restrictions on the use of information collected in bulk for foreign intelligence purposes. They seem carefully thought out, and each permitted use of information collected in bulk would directly advance U.S. national security interests. These are among the most significant provisions of PPD-28, but they do not apply to Section 702 because it is not considered a bulk collection program.8 AT: USA Freedom Act solves The Freedom Act doesn’t change section 702 Froomkin, 6/2/15 - Dan Froomkin is a reporter, columnist, and editor with a focus on coverage of U.S. politics and media. During a nearly three-decade long career in journalism, which started in local news, he has served as the senior Washington correspondent and bureau chief for The Huffington Post, as editor of WashingtonPost.com, and as deputy editor of NiemanWatchdog.org (Dan, “USA FREEDOM ACT: SMALL STEP FOR POST-SNOWDEN REFORM, GIANT LEAP FOR CONGRESS” The Intercept, https://firstlook.org/theintercept/2015/06/02/one-small-step-toward-post-snowden-surveillancereform-one-giant-step-congress/ And while the Freedom Act contains a few other modest reform provisions‚ such as more disclosure and a public advocate for the secretive Foreign Intelligence Surveillance Court, it does absolutely nothing to restrain the vast majority of the intrusive surveillance revealed by Snowden. It leaves untouched formerly secret programs the NSA says are authorized under section 702 of the FISA Amendments Act, and that while ostensibly targeted at foreigners nonetheless collect vast amounts of American communications. It won’t in any way limit the agency’s mass surveillance of non-American communications. Economy advantage NSA killing tech competitiveness Loss of overseas markets wrecks tech competitiveness Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ The economic impact of NSA spying does not end with the American cloud computing industry. According to The New York Times, “Even as Washington grapples with the diplomatic and political fallout of Mr. Snowden’s leaks, the more urgent issue, companies and analysts say, is economic.”59 In the past year, a number of American companies have reported declining sales in overseas markets like China (where, it must be noted, suspicion of the American government was already high before the NSA disclosures), loss of customers including foreign governments, and increased competition from non-U.S. services marketing themselves as ‘secure’ alternatives to popular American products. There is already significant evidence linking NSA surveillance to direct harm to U.S. economic interests. In November 2013, Cisco became one of the first companies to publicly discuss the impact of the NSA on its business, reporting that orders from China fell 18 percent and that its worldwide revenue would decline 8 to 10 percent in the fourth quarter, in part because of continued sales weakness in China.60 New orders in the developing world fell 12 percent in the third quarter, with the Brazilian market dropping roughly 25 percent of its Cisco sales.61 Although John Chambers, Cisco’s CEO, was hesitant to blame all losses on the NSA, he acknowledged that it was likely a factor in declining Chinese sales62 and later admitted that he had never seen as fast a decline in an emerging market as the drop in China in late 2013.63 These numbers were also released before documents in May 2014 revealed that the NSA’s Tailored Access Operations unit had intercepted network gear—including Cisco routers—being shipped to target organizations in order to covertly install implant firmware on them before they were delivered.64 In response, Chambers wrote in a letter to the Obama Administration that “if these allegations are true, these actions will undermine confidence in our industry and in the ability of technology companies to deliver products globally.”65 Much like Cisco, Qualcomm, IBM, Microsoft, and Hewlett-Packard all reported in late 2013 that sales were down in China as a result of the NSA revelations.66 Sanford C. Bernstein analyst Toni Sacconaghi has predicted that after the NSA revelations, “US technology companies face the most revenue risk in China by a wide margin, followed by Brazil and other emerging markets.”67 Industry observers have also questioned whether companies like Apple—which hopes to bring in significant revenue from iPhone sales in China—will feel the impact overseas.68 Even AT&T reportedly faced intense scrutiny regarding its proposed acquisition of Vodafone, a European wireless carrier, after journalists revealed the extent of AT&T’s collaboration with the NSA.69 American companies are also losing out on business opportunities and contracts with large companies and foreign governments as a result of NSA spying. According to an article in The New York Times, “American businesses are being left off some requests for proposals from foreign customers that previously would have included them.”70 This refers to German companies, for example, that are increasingly uncomfortable giving their business to American firms. Meanwhile, the German government plans to change its procurement rules to prevent American companies that cooperate with the NSA or other intelligence organizations from being awarded federal IT contracts.71 The government has already announced it intends to end its contract with Verizon, which provides Internet service to a number of government departments.72 “There are indications that Verizon is legally required to provide certain things to the NSA, and that’s one of the reasons the cooperation with Verizon won’t continue,” a spokesman for the German Interior Ministry told the Associated Press in June.73 The NSA disclosures have similarly been blamed for Brazil’s December 2013 decision to award a $4.5 billion contract to Saab over Boeing, an American company that had previously been the frontrunner in a deal to replace Brazil’s fleet of fighter jets.74 Welber Barral, a former Brazilian trade secretary, suggested to Bloomberg News that Boeing would have won the contract a year earlier,75 while a source in the Brazilian government told Reuters that “the NSA problem ruined it for the Americans.”76 As we will discuss in greater depth in the next section, Germany and Brazil are also considering data localization proposals that could harm U.S. business interests and prevent American companies from entering into new markets because of high compliance costs. Wrecks the economy and industry reforms alone won’t solve Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ It is abundantly clear that the NSA surveillance programs are currently having a serious, negative impact on the U.S. economy and threatening the future competitiveness of American technology companies. Not only are U.S. companies losing overseas sales and getting dropped from contracts with foreign companies and governments—they are also watching their competitive advantage in fast-growing industries like cloud computing and webhosting disappear, opening the door for foreign companies who claim to offer “more secure” alternative products to poach their business. Industry efforts to increase transparency and accountability as well as concrete steps to promote better security by adopting encryption and other best practices are positive signs, but U.S. companies cannot solve this problem alone. “It’s not blowing over,” said Microsoft General Counsel Brad Smith at a recent conference. “In June of 2014, it is clear it is getting worse, not better .”98 Without meaningful government reform and better oversight, concerns about the breadth of NSA surveillance could lead to permanent shifts in the global technology market and do lasting damage to the U.S. economy . Perception key The widespread perception that the NSA is acting beyond the established legislative framework is destroying the reputation of U.S. tech companies Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19, http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues Allegations of intrusive U.S. government electronic surveillance activities have raised international outcry and created antagonism between U.S. technology companies and the government. Without a bold and enduring reform, American companies will continue to suffer a competitive disadvantage from perceptions of U.S. government intrusion into their data. We propose bringing electronic surveillance collection from U.S. companies into an existing statutory framework in order to reassure international customers and to respect the rights of U.S. companies operating abroad. The Problem In the wake of the Snowden revelations, people around the world have become uneasy about the security of their communications that flow through the servers of American companies.1 They now fear—not without reason—that the NSA has broad access to a wide range of their data that may not have any direct relevance to the core foreign policy or security concerns of the United States.2 Snowden has also alleged that the NSA accessed American companies’ data without their knowledge.3 American technology companies reacted with outrage to media reports that, unbeknownst to them, the U.S. government had intruded onto their networks overseas and spoofed their web pages or products.4 These stories suggested that the government created and snuck through back doors to take the data rather than come through well-established front doors.5 Beyond the broad implications for civil liberties and diplomacy, these fears led to two immediate consequences for the industry: First, many U.S. companies shifted to an adversarial relationship with their own government. They moved to secure and encrypt their data to protect the privacy rights of their customers.6 They are pushing for reform.7 They are building state-of-the-art data centers in Europe and staffing their high-paying jobs with Europeans, not Americans.8 They are challenging the government in court.9 Second, international customers of U.S. technology and communications companies began taking their business elsewhere. Brazil decided against a $4.5 billion Boeing deal and cancelled Microsoft contracts.10 Germany dropped Verizon in favor of Deutsche Telekom.11 Both of these examples suggest that if even friendly governments can go to the expense and trouble of dropping American companies, foreign individual and corporate customers could certainly decide to switch their data providers for greater privacy protection. Simply put, the reputational harm had a direct impact on American companies’ competitiveness—some estimate that it has cost U.S. tech firms $180 billion thus far.12 Defenders of the programs may argue that the Snowden allegations are overblown or that foreign companies are just using the revelations for their own protectionist purposes. But it doesn’t matter if the allegations are actually true because the global public believes them to be true , and they are therefore real in their consequences. In many ways, the Snowden revelations have created a sense of betrayal among American companies. Some had been providing information to the NSA through existing legislative means – either under Section 215 of the USA Patriot Act,13 or under Section 702 of the FISA Amendments Act (FAA).14 It was unsettling to read stories that, outside of this statutorily compelled cooperation, the government had been getting access to huge amounts of their data in other unauthorized ways. As one tech employee said, “the back door makes a mockery of the front door.” Privacy key to competitiveness Failure to provide privacy protections to US persons wrecks US competitiveness Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) The difficulty, for Section 702 purposes, enters in regard to Kennedy's reliance on the rule that he saw as most consistent with the United States' role as a sovereign nation. n447 "[W]e must interpret constitutional protections," he wrote, "in light of the undoubted power of the United States to take actions to assert its legitimate power and authority abroad." n448 What is the scope of the United States' legitimate power and authority abroad? To what degree is it rooted in the legal status of the individual against whom the state is acting? And what is the relationship between different forms of legal relationships and membership in the political community? Let us focus here on the types of relationships most at issue with regard to Section 702: global electronic communications. One danger in according non-U.S. persons Fourth Amendment rights via (substantial) virtual contact with the United States is that individuals could use such contacts to evade detection. n449 Foreign persons could become members of Amazon Prime, communicate with associates in the United States via Verizon, and take Massive Open Online Courses (MOOCs) from the latest American university to offer them, perhaps even in the process obtaining a U.S. college or graduate degree. This could then become a shield to mask behavior that may undermine U.S. national security. One response to this might be that in a global communications environment, privacy protections must be thought about in a broader sense. It matters little whether a customer is French, English, or American. Privacy rights should be extended to customers by nature of their dual status with U.S. persons qua customers--or even as a concomitant of their rights as people. This was the thrust of part of Privacy and Civil Liberties Oversight Board's (PCLOB) analysis that suggested privacy be regarded as a human right. There is a realpolitic argument to be made here as well, which ties more directly to U.S. foreign interests. Namely, U.S. failure to [*228] ensure privacy protections may lead to a loss in U.S. competitiveness. And economic concerns are central to U.S. national security. Consider the impact of the public release of information about NSA Section 702 surveillance on the U.S. cloud computing industry. There was an immediate, detrimental impact on the strength of the U.S. economy. Billions of dollars are now on the line because of concerns that the services provided by U.S. information technology companies are neither secure nor private. n450 The Information Technology and Innovation Foundation estimates that declining revenues of corporations that focus on cloud computing and data storage alone could reach $ 35 billion over the next three years. n451 Other commentators, such as Forrester Research analyst James Staten, have put actual losses as high as $ 180 billion by 2016, unless something is done to restore overseas' confidence in data held by U.S. companies. n452 Failure to extend privacy protections to individuals with substantial connections to the country via industry would, in this view, make it harder, not easier for the United States to assert its legitimate power and authority abroad. So, under Kennedy's reasoning, one could argue that Fourth Amendment rights should be extended to individuals economically tied to U.S. entities. This determination, however, is ultimately one of policy--not law. Deciding whether a greater national security threat is entailed in loss of competitiveness of U.S. industry, versus loss of protections extended to non-U.S. persons in the interests of privacy, is part of the weighing that must be done by the executive branch in pursuing its interests abroad. In this way, the Rehnquist opinion and [*229] the Kennedy concurrence can be read as compatible with not extending Fourth Amendment rights to individuals lacking a legal relationship (in other words, those stemming directly from the individual's status as a member of the political community). n453 AT: Doesn’t hurt cloud computing Data localization is an independent internal link Chandler and Le, 15 - * Director, California International Law Center, Professor of Law and Martin Luther King, Jr. Hall Research Scholar, University of California, Davis; A.B., Harvard College; J.D., Yale Law School AND **Free Speech and Technology Fellow, California International Law Center; A.B., Yale College; J.D., University of California, Davis School of Law (Anupam and Uyen, “DATA NATIONALISM” 64 Emory L.J. 677, lexis) Cloud Computing. Data localization requirements will often prevent access to global cloud computing services. As we have indicated, while governments assume that global services will simply erect local data server farms, such hopes are likely to prove unwarranted. Thus, local companies will be denied access to the many companies that might help them scale up, or to go global. n247 Many companies around the world are built on top of existing global services. Highly successful companies with Indian origins such as Slideshare and Zoho relied on global services such as Amazon Web Services and Google Apps. n248 A Slideshare employee cites the scalability made possible by the use of Amazon's cloud services, noting, "Sometimes I need 100 servers, sometimes I only need 10." n249 A company like Zoho can use Google Apps, while at the same time competing with Google in higher value-added services. n250 [*729] Accessing such global services thus allows a small company to maintain a global presence without having to deploy the vast infrastructure that would be necessary to scale as needed. The Internet of Things. As the world shifts to Internet-connected devices, data localization will require data flows to be staunched at national borders, requiring expensive and cumbersome national infrastructures for such devices. This erodes the promise of the Internet of Things - where everyday objects and our physical surroundings are Internet-enabled and connected - for both consumers and businesses. Consumer devices include wearable technologies that "measure some sort of detail about you, and log it." n251 Devices such as Sony's Smartband allied with a Lifelog application to track and analyze both physical movements and social interactions n252 or the Fitbit n253 device from an innovative start-up suggest the revolutionary possibilities for both large and small manufacturers. The connected home and wearable computing devices are becoming increasingly important consumer items. n254 A heart monitoring system collects data from patients and physicians around the world and uses the anonymized data to advance cardiac care. n255 Such devices collect data for analysis typically on the company's own or outsourced computer servers, which could be located anywhere across the world. Over this coming decade, the Internet of Things is estimated to generate $ 14.4 trillion in value that is "up for grabs" for global enterprises. n256 Companies are also adding Internet sensors not just to consumer products but to their own equipment and facilities around the world through RFID tags or through other devices. The oil industry has embraced what has come to be known as the "digital oil field," where real-time [*730] data is collected and analyzed remotely. n257 While data about oil flows would hardly constitute personal information, such data might be controlled under laws protecting sensitive national security information. The Internet of Things shows the risks of data localization for consumers, who may be denied access to many of the best services the world has to offer. It also shows the risk of data localization for companies seeking to better monitor their systems around the world. Data Driven Innovation (Big Data). Many analysts believe that data-driven innovations will be a key basis of competition, innovation, and productivity in the years to come, though many note the importance of protecting privacy in the process of assembling ever-larger databases. n258 McKinsey even reclassifies data as a new kind of factor of production for the Information Age. n259 Data localization threatens big data in at least two ways. First, by limiting data aggregation by country, it increases costs and adds complexity to the collection and maintenance of data. Second, data localization requirements can reduce the size of potential data sets, eroding the informational value that can be gained by crossjurisdictional studies. Large-scale, global experiments technically possible through big data analytics, especially on the web, may have to give way to narrower, localized studies. Perhaps anonymization will suffice to comport with data localization laws and thus still permit cross-border data flow, but this will depend on the specifics of the law. Solvency Solvency – global modeling The plan restores US cred as a global leader on privacy by limiting the FAA Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the Georgetown University Law Center (Timothy, “The Good News About Spying” https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-about-spying NEXT STEPS Has surveillance reform gone far enough? Hardly. Obama has taken the first steps, but the government should take six more to enhance public confidence in surveillance programs. First, the intelligence community should do even more to increase transparency. IC on the Record is a good start, but it is mostly reactive, providing context to programs that Snowden had already leaked. The intelligence community should continue to release as much as it possibly can about surveillance programs without compromising sources and methods—even if they have not been leaked. Given Snowden’s widespread public acclaim, coming clean about such controversial intelligence programs is not just good government, but also provides the surest way to preserve vital intelligence capabilities. With greater transparency, intelligence agencies can stay one step ahead of future leakers and earn back the trust of a skeptical public. The United States should also pivot from its defensive position and take the lead on global privacy. The United States has an impressive array of privacy safeguards, and it has even imposed new ones that protect citizens of every country. Despite their weaknesses, these safeguards are still the strongest in the world. The U.S. government should not be shy about trumpeting them, and should urge other countries to follow its lead. It could begin by engaging with close allies, like the United Kingdom, Germany, and other European countries, urging them to increase transparency and judicial supervision of their own communications surveillance activities. The government also needs to finish the job on telephone records. The law that allows for bulk collection of telephone records is set to expire on June 1, 2015. Congress should act now to pass sensible reforms that would replace bulk collection with a privacy-preserving alternative. The only truly viable option remains the bill that died in November last year. Washington also needs to work with U.S. technology companies to reform PRISM and other surveillance programs that have been an embarrassment for U.S. companies. Congress should narrow the FISA Amendments Act of 2008 that authorizes PRISM. That law allows the government to obtain secret court orders targeting communications that include foreign participants of interest to the NSA with the compelled assistance of U.S. companies. Congress could start by limiting such orders to the same six specific serious security threats that are included in Obama’s policy directive for bulk signals intelligence collection. AT: Companies suffer reputational costs FAA exclusivity on balance protects companies from reputational consequences Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19, http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues Others have argued that the FAA shifts the burden of cooperation solely onto the company, which will suffer greater reputational harm as a more witting participant in affirmatively granting the government’s requests. However, companies have suffered reputational harm as a result of allegations of unwitting cooperation. Making the cooperation known, even if it’s secret, gives the companies the opportunity to account for it in their own planning. AT: Foreign servers Plan reverses incentives for companies to shift to foreign subsidiaries Eoyang and Bishai, 15 - *Mieke Eoyang is the Director of the National Security Program at Third Way, a center-left think tank. She previously served as Defense Policy Advisor to Senator Edward M. Kennedy, and a subcommittee staff director on the House Permanent Select Committee on Intelligence, as well as as Chief of Staff to Rep. Anna Eshoo (D-Palo Alto); **Chrissy Bishai is a Fellow at Third Way (“Restoring Trust between U.S. Companies and Their Government on Surveillance Issues” 3/19, http://www.thirdway.org/report/restoring-trust-between-us-companies-and-their-government-onsurveillance-issues The move by certain U.S. companies to place subsidiaries in foreign ownership to resist requests by the U.S. government presents an interesting twist on this idea. In shifting the balance back to increased protections for U.S. companies, this legislation would change the incentives so that claiming U.S. law would have operational advantages in giving companies uniformity of law for all their data. This would also encourage the use of a single choice of law for all data governed by a company—that of the nationality of incorporation—rather than encouraging a choice of law patchwork to govern the data as it flows around the world. Off-case answers AT: T – domestic A US persons standard avoids the problems with geographic limits on the internet Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) To the extent that the interception of U.S. persons' communications constitutes a search or seizure within the meaning of the Fourth Amendment, it would appear that, at least at the front [*230] end, U.S. persons are entitled to protections. n456 The inspection and collection of content falls within the meaning of a search and seizure under the Fourth Amendment. Just as virtual entry into the United States should not matter for purposes of setting a threshold for application of the Fourth Amendment to aliens, use of global communications should not thereby divest U.S. persons of their constitutional protections. This approach is consistent with the geographic focus of the Courts in regard to the Fourth Amendment. It does not hinge constitutional protections on movement along global communications networks--itself an untenable proposition in light of how information flows over the Internet. If the courts, for instance, were to construct a rule that said that U.S. persons sending information outside the United States lose the protections of the Fourth Amendment in the privacy afforded those communications, it would be difficult to police. This rule assumes that individuals have control over whether their communications leave domestic bounds. They do not. The Internet is constructed to find the most efficient route between two ISP addresses. This means that even domestic communications may be routed internationally. Individuals have no control over how their messages are conveyed. At the back end, the government would have to be able to ascertain which messages originated within the United States and then left U.S. bounds. But the NSA claims that it does not have the appropriate technologies to make this call. As a result, the effect of this rule would essentially be to assume that every time a U.S. person communicates, she loses constitutional protections in the content of those communications. This would eviscerate the meaning of the Fourth Amendment. It would assume that U.S. persons have no reasonable expectation of privacy in their communications, regardless of whether they flow across international borders. The Supreme Court can avoid this conclusion by underscoring the status of the individual as Rehnquist articulated for the majority in Verdugo-Urquidez: emphasizing membership in the political community . Where established, the protection of the Fourth Amendment applies. The NSA intercepts upstream data by tapping directly into US service providers Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) A follow-up article two days later printed another slide depicting both PRISM and "upstream" collection of communications on fiber cables and infrastructure ("[c]ollection directly from the servers of . . . U.S. Service Providers.") n8 Upstream interception allowed the NSA to acquire Internet communications "as they [*121] transit the 'internet backbone' facilities." n9 The NSA could collect all traffic crossing Internet cables--not just information targeted at specific Internet Protocol (IP) addresses or telephone number. The potential yield was substantial: in the first six months of 2011, the NSA acquired more than 13.25 million Internet transactions through its upstream collection. n10 The slide urged analysts to use both PRISM and upstream collection to obtain information. n11 Within days of the releases, the intelligence community acknowledged the existence of the programs. n12 In August 2013 the Director of National Intelligence, James Clapper, offered further confirmation, noting that PRISM had been in operation since Congress had passed the 2008 FISA Amendments Act. n13 He declassified eight documents, n14 and by the end of the month, he had announced that the intelligence community would release the total [*122] number of Section 702 orders issued, and targets thereby affected, on an annual basis. n15 NSA interpretation of the FAA means in practice PRISM targets domestic communications Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) FAA = 2008 FISA Amendments Act The Article next turns to statutory issues related to targeting, post-targeting analysis, and the retention and dissemination of information. It argues that the NSA has sidestepped FAA restrictions by adopting procedures that allow analysts to acquire information not just to or from, but also "about" targets. In its foreignness determination the agency assumes, absent evidence to the contrary, that the target is a non-U.S. person located outside domestic bounds. And weak standards mark the foreign intelligence purpose determination. Together, these elements allow for the broad collection of U.S. persons' international communications, even as they open the door to the interception of domestic communications . In regard to post-targeting analysis, the Article draws attention to the intelligence community's use of U.S. person information to query data obtained under Section 702, effectively bypassing protections Congress introduced to prevent reverse targeting. The Article further notes in relation to retention and dissemination that increasing consumer and industrial reliance on cryptography means that the NSA's retention of encrypted data may soon become the exception that swallows the rule. In its constitutional analysis, the Article finds certain practices instituted under Section 702 to fall outside acceptable Fourth Amendment bounds. Although lower courts had begun to recognize a domestic foreign intelligence exception to the warrant clause, in 1978 Congress introduced FISA to be the sole means via which domestic foreign intelligence electronic intercepts could be undertaken. Consistent with separation of powers doctrine, this shift carried constitutional meaning. Internationally, practice and precedent prior to the FAA turned on a foreign intelligence exception. But in 2008 Congress altered the status quo, introducing individualized judicial review into the process. Like FISA, the FAA carried constitutional import. [*124] If that were the end of the story, one could argue that the incidental collection of U.S. persons' information, as well as the interception of domestic conversations ought to be regarded in Justice Jackson's third category under Youngstown Sheet & Tube Co. v. Sawyer. n18 Renewal in 2012, however, points in the opposite direction. The NSA's actions, for purposes of the warrant clause, appear to be constitutionally sufficient insofar as foreign intelligence gathering to or from non-U.S. persons is concerned. The tipping point comes with regard to criminal prosecution. Absent a foreign intelligence purpose, there is no exception to the warrant requirement for the query of U.S. persons' international or domestic communications. Although a warrant is not required for foreign intelligence collection overseas, the interception of communications under Section 702 must still comport with the reasonableness requirements of the Fourth Amendment. A totality of the circumstances test, in which the significant governmental interest in national security is weighed against the potential intrusion into U.S. persons' privacy, applies. The incidental collection of large quantities of U.S. persons' international communications, the scanning of content for information "about" non-U.S. person targets, and the interception of non-relevant and entirely domestic communications in multi-communication transactions, as well as the query of data using U.S. person identifiers, fall outside the reasonableness component of the Fourth Amendment. The Article concludes by calling for renewed efforts to draw a line between foreign intelligence gathering and criminal law and to create higher protections for U.S. persons, to ensure that the United States can continue to collect critical information, while remaining consistent with the right to privacy embedded in the Fourth Amendment. NSA overreach means it inevitably monitors domestic internet communications – rerouting, MCTs, and ‘about’ communications Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) Three points related to the volume and intrusiveness of the resulting surveillance deserve notice. First, to obtain "about" communications, because of how the Internet is constructed, the NSA must monitor large amounts of data. n180 That is, if the NSA may [*163] collect not just e-mail to or from the target's e-mail account (badguy@ISP.com), but, in addition, other communications happening to mention badguy@ISP.com that pass through the collection point, then the NSA is monitoring a significant amount of traffic. And the agency is not just considering envelope information (for example, messages in which the selector is sending, receiving, or copied on the communication) but the actual content of messages. n181 Second, wholly domestic conversations may become swept up in the surveillance simply by nature of how the Internet is constructed. Everything one does online involves packets of information. Every Web site, every e-mail, every transfer of documents takes the information involved and divides it up into small bundles. Limited in size, these packets contain information about the sender's IP address, the intended receiver's IP address, something that indicates how many packets the communication has been divvied up into, and what number in the chain is represented by the packet in question. n182 Packet switched networks ship this information to a common destination via the most expedient route-one that may, or may not, include the other packets of information contained in the message. If a roadblock or problem arises in the network, the packets can then be re-routed, to reach their final destination. Domestic messages may thus be routed through international servers, if that is the most efficient route to the final destination. What this means is that even if the NSA applies an IP filter to eliminate communications that appear to be within the United States, it may nevertheless monitor domestic conversations by nature of them being routed through foreign servers. In this manner, a student in Chicago may send an e-mail to a student in Boston [*164] that gets routed through a server in Canada. Through no intent or design of the individual in Chicago, the message becomes international and thus subject to NSA surveillance. Third, further collection of domestic conversations takes place through the NSA's intercept of what are called multi-communication transactions, or MCTs. It is important to distinguish here between a transaction and a communication. Some transactions have only single communications associated with them. These are referred to as SCTs. Other transactions contain multiple communications. If even one of the communications in an MCT falls within the NSA's surveillance, all of the communications bundled into the MCT are collected. The consequence is of significant import. FISC estimated in 2011 that somewhere between 300,000 and 400,000 MCTs were being collected annually on the basis of "about" communication--where the "active user" was not the target. So hundreds of thousands of communications were being collected that did not include the target as either the sender or the recipient of the communication. n183 PRISM allows reverse-targeting: targeting someone outside the United States to collect information about someone in the United States Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) B. Post-Targeting Analysis Section 702 makes it illegal to target someone outside the United States, where the purpose of the acquisition is to obtain information about a person known to be within domestic bounds. This practice, known as "reverse targeting," was central to Congressional debates. n308 Representative Langevin explained that the insertion of FISC would "ensure that the government's efforts are not aimed at targeting Americans, the so-called reverse targeting that we're all concerned about; and that if an American's communications is [sic] inadvertently intercepted, it is dealt with in a manner that guarantees legal protections." n309 Despite Congress' concern about reverse targeting, the NSA instituted and the FISC approved a rule change in October 2011 to make it possible to query the content of communications obtained under Section 702 using U.S. person names and identifiers for information obtained via PRISM and upstream telephony collection. n310 [*196] The relevant definition in the 2011 minimization procedures is largely consistent with its 2009 predecessor: Identification of a United States person means the name, unique title, address, or other personal identifier of a United States person in the context of activities conducted by that person or activities conducted by others that are related to that person. A reference to a product by brand name, or manufacturer's name or the use of a name in a descriptive sense, e.g., "Monroe Doctrine," is not an identification of a United States person. n311 The NSA may query data obtained under Section 702 by using the names, titles, or addresses of U.S. persons, or any other information that may be related to the individual and his or her activities. If the intelligence community would like to query the data based on, for instance, membership in the Council on Foreign Relations--on the grounds that such queries are likely to yield foreign intelligence information--it may now do so. In March 2014, the Director of National Intelligence, James Clapper, confirmed in a letter to Senator Ron Wyden that the [*197] NSA had queried Section 702 data "using U.S. person identifiers." n312 The following month, the NSA's Privacy and Civil Liberties Officer reiterated Clapper's statement. n313 Pressed during a June 2014 hearing for the number of queries using U.S. person identifiers, Clapper responded by noting that in 2013, the NSA approved 198 U.S. person identifiers for querying the content of Section 702 communications, even as it queried Section-702-acquired metadata approximately 9,500 times. n314 FISC has upheld the reading of the statute supporting use of U.S. person identifiers. n315 In its October 2011 opinion, the Court explained: The procedures previously approved by the Court effectively impose a wholesale bar on queries using United States-Person identifiers. The government has broadened Section 3(b)(5) to allow NSA to query the vast majority of its Section 702 collection using United States-Person identifiers, subject to approval pursuant to internal NSA procedures and oversight by the Department of Justice. Like all other NSA queries of the Section 702 collection, queries using United States-person identifiers would be limited to those reasonably likely to yield foreign intelligence information. n316 The Court did not find this problematic. Because the collection of the information centered on non-U.S. persons located outside the country, it would be less likely, in the aggregate, "to result in the acquisition of nonpublic information regarding nonconsenting United States persons." n317 [*198] As a practical matter, what this rule change means is that U.S. person information that is incidentally collected via Section 702 can now be mined using U.S. person information as part of the queries. This circumvents Congress's requirements in Sections 703 and 704 that prior to U.S. person information being obtained (and therefore prior to it being analyzed), the government be required to appear before a court to justify placing a U.S. person under surveillance. Section 702 authorizes a broad bulk collection of data – inevitably includes collection from U.S. persons on a large scale Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) II. PROGRAMMATIC COLLECTION n143 Almost immediately after passage of the FAA, members of Congress, scholars, and others began criticizing Section 702 because [*154] of the potential for the government to use the authorities to engage in programmatic surveillance. n144 In 2009 prominent national security law Professor William Banks explained, "the FAA targets do not have to be suspected of being an agent of a foreign power or, for that matter, they do not have to be suspected of terrorism or any national security offense, so long as the collection of foreign intelligence is a significant purpose of the surveillance." n145 Surveillance could be directed at a person, organization, e-mail address, or even "an entire ISP or area code." n146 He noted, "the surveillance permitted under the FAA does not require that the Government identify a particular known facility where the intercepted communications occur." n147 These provisions represented a sea change from how FISA had previously worked (albeit introducing, for the first time, statutory restrictions in an area previously governed by Executive Order). U.S. persons' communications now could be incidentally collected under the statute, on a large scale, without many of the protections in traditional FISA. n148 Banks presciently pointed out the most likely way in which the new authorities would be used: Although details of the implementation of the program . . . are not known, a best guess is the Government uses a broad vacuum cleaner -like first stage of collection, focusing on transactional data, where wholesale interception occurs following the development and implementation of filtering criteria. Then the NSA engages in a more particularized collection of content after analyzing mined data . . . [A]ccidental or incidental acquisition of U.S. persons inside the United States [will] surely occur[], especially in light of the difficulty of ascertaining a target's location. n149 For Professor Banks, part of the problem was that the nature of international information flows meant that it would be impossible [*155] to tell if an individual is located overseas or within domestic bounds. n150 The NSA circumvents Section 702 by adopting a presumption that targets are non-U.S. persons and not determining whether they are located domestically Donohue, 15 - Professor of Law, Georgetown University Law Center (Laura, “SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT” 38 Harv. J.L. & Pub. Pol'y 117, Winter, lexis) [*158] A. Targeting As aforementioned, Section 702 places four limitations on acquisition, each of which is meant to restrict the amount of information that can be obtained by the government. n166 The NSA has sidestepped these statutory restrictions in three important ways: first, it has adopted procedures that allow analysts to acquire information "about" selectors (that is, communications modes used by targets) or targets, and not merely communications to or from targets (or selectors employed by targets), or information held by targets themselves. Second, it has created a presumption of non-U.S. person status: That is, if an individual is not known to be a U.S. person (and thus exempted from Section 702 and treated either under Sections 703 and 704 or under traditional FISA, depending on the location), then the NSA assumes that the individual is a non-U.S. person. Third, the NSA has failed to adopt standards that would require it to ascertain whether a target is located within domestic bounds. Instead, the agency, having looked at the available evidence, absent evidence to the contrary, assumes that the target is located outside the United States. These interpretations work together to undermine Congress's addition of Sections 703 and 704, even as they open the door to more extensive collection of domestic communications. In 2008 Congress anticipated that U.S. person information would inadvertently be collected under Section 702. This is in part why it included minimization procedures, as well as limits on what could be collected. Most Members, however, do not appear to have contemplated broad, programmatic collection that would undermine protections introduced in Sections 702 and 703. n167 Those who did articulate this possibility voted against the bill. [*159] Even if Congress did not initially appreciate the potential for programmatic collection, however, certainly by 2012 the intelligence community had made enough information available to Congress for Members to make an informed decision. This does not mean that all Members were fully informed. But to the extent that Members selected not to access the material or to take a public stand on the matter, particularly in light of the legislature's reading of its authorities with regard to classification, fault lies with Congress. The Foreign Intelligence Surveillance Court failed to step into the gap. In 2011, FISC realized the implications of the NSA's interpretation of to, from or about (TFA) collection. However, in light of the seriousness of the NSA's aim (protecting national security), and the limitations imposed by the types of technologies being used, the Court read the statute in a manner that found the targeting procedures to be consistent with the statute. To the extent that NSA's TFA and assumptions regarding the target's foreignness undermine the law as it is written, the legislature failed to perform effective oversight. Congress similarly neglected to uphold the limit placed on the intelligence community to not knowingly collect domestic conversations. Instead, it relied on FISC to do so--a task that the Court failed to do. In a classified environment, when so much information is cloaked from public view, it becomes even more important for the government to ensure that the authorities as they are publicly presented are consistent with the manner in which they are being exercised. PRISM allows the NSA to access the records of US domestic telecomm companies – also it eliminates a warrant requirement if people are ‘reasonably believed’ to be outside the USA Greenwald, 13 – Glenn Greenwald is a fomer columnist on civil liberties and US national security issues for the Guardian. An ex-constitutional lawyer, he was until 2012 a contributing writer at Salon. (Glenn, “NSA Prism program taps in to user data of Apple, Google and others” The Guardian, 6/7, http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says. The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims "collection directly from the servers" of major US service providers. Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program. In a statement, Google said: "Google cares deeply about the security of our users' data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a back door for the government to access private user data." Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. "If they are doing this, they are doing it without our knowledge," one said. An Apple spokesman said it had "never heard" of Prism. The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012. The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US. It also opens the possibility of communications made entirely within the US being collected without warrants. Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers. The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata. Some of the world's largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan "Your privacy is our priority" – was the first, with collection beginning in December 2007. It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online. Collectively, the companies cover the vast majority of online email, search, video and communications networks. The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy. The Prism program allows the NSA, the world's largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders. With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users. The presentation claims Prism was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a "home-field advantage" due to housing much of the internet's architecture. But the presentation claimed "Fisa constraints restricted our home-field advantage" because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US. "Fisa was broken because it provided privacy protections to people who were not entitled to them," the presentation claimed. "It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all." The new measures introduced in the FAA redefines "electronic surveillance" to exclude anyone "reasonably believed" to be outside the USA – a technical change which reduces the bar to initiating surveillance. The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities' requests. In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA. The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming "access is 100% dependent on ISP provisioning". In the document, the NSA hails the Prism program as "one of the most valuable, unique and productive accesses for NSA". It boasts of what it calls "strong growth" in its use of the Prism program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was "exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype". There was also a 131% increase in requests for Facebook data, and 63% for Google. The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to "expand collection services from existing providers". The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired. Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working. "The problem is: we here in the Senate and the citizens we represent don't know how well any of these safeguards actually work," he said. "The law doesn't forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can't say and average Americans can't know." Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program. When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA's inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies' servers. Upstream intercepts foreign data only as it enters domestic internet connections Gellman, 14 – staff writer for the Washington Post; won 3 Pullitzer Prizes (Barton, Washington Post, “In NSA-intercepted data, those not targeted far outnumber the foreigners who are” 7/5, http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targetedfar-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-85724b1b969b6322_story.html Taken together, the files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge. One program, code-named PRISM, extracts content stored in user accounts at Yahoo, Microsoft, Facebook, Google and five other leading Internet companies. Another, known inside the NSA as Upstream, intercepts data on the move as it crosses the U.S. junctions of global voice and data networks. No government oversight body, including the Justice Department, the Foreign Intelligence Surveillance Court, intelligence committees in Congress or the president’s Privacy and Civil Liberties Oversight Board, has delved into a comparably large sample of what the NSA actually collects — not only from its targets but also from people who may cross a target’s path. Among the latter are medical records sent from one family member to another, résumés from job hunters and academic transcripts of schoolchildren. In one photo, a young girl in religious dress beams at a camera outside a mosque. Scores of pictures show infants and toddlers in bathtubs, on swings, sprawled on their backs and kissed by their mothers. In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam or striking risque poses in shorts and bikini tops. “None of the hits that were received were relevant,” two Navy cryptologic technicians write in one of many summaries of nonproductive surveillance. “No additional information,” writes a civilian analyst. Another makes fun of a suspected kidnapper, newly arrived in Syria before the current civil war, who begs for employment as a janitor and makes wide-eyed observations about the state of undress displayed by women on local beaches. By law, the NSA may “target” only foreign nationals located overseas unless it obtains a warrant based on probable cause from a special surveillance court. For collection under PRISM and Upstream rules, analysts must state a reasonable belief that the target has information of value about a foreign government, a terrorist organization or the spread of nonconventional weapons. Most of the people caught up in those programs are not the targets and would not lawfully qualify as such. “Incidental collection” of third-party communications is inevitable in many forms of surveillance, but in other contexts the U.S. government works harder to limit and discard irrelevant data. In criminal wiretaps, for example, the FBI is supposed to stop listening to a call if a suspect’s wife or child is using the phone. There are many ways to be swept up incidentally in surveillance aimed at a valid foreign target. Some of those in the Snowden archive were monitored because they interacted directly with a target, but others had more-tenuous links. If a target entered an online chat room, the NSA collected the words and identities of every person who posted there, regardless of subject, as well as every person who simply “lurked,” reading passively what other people wrote. “1 target, 38 others on there,” one analyst wrote. She collected data on them all. In other cases, the NSA designated as its target the Internet protocol, or IP, address of a computer server used by hundreds of people. The NSA treats all content intercepted incidentally from third parties as permissible to retain, store, search and distribute to its government customers. Raj De, the agency’s general counsel, has testified that the NSA does not generally attempt to remove irrelevant personal content, because it is difficult for one analyst to know what might become relevant to another. The Obama administration declines to discuss the scale of incidental collection. The NSA, backed by Director of National Intelligence James R. Clapper Jr., has asserted that it is unable to make any estimate, even in classified form, of the number of Americans swept in. It is not obvious why the NSA could not offer at least a partial count, given that its analysts routinely pick out “U.S. persons” and mask their identities, in most cases, before distributing intelligence reports. If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance. AT: Terrorism DA The perception of NSA overreach destroys law enforcement cooperation – it’s a larger internal link to terrorism Schulhofer, 13 – professor of law at NYU (Stephen, ““Making Sense of the NSA Metadata Collection Program (Part II)”, 11/8, http://justsecurity.org/2985/making-sense-nsa-metadata-collection-programpart-ii/) Efforts like the NSA sweeps actually undermine the counterterrorism effort itself. The reason is that these types of programs generate profound mistrust of government in general and of law enforcement in particular. We have already seen dramatic examples in the way that the Snowden revelations of our spying on allies has angered European leaders and endangered our working relationships with them. Although this breach eventually will be healed, alienation and mistrust among ordinary citizens is equally important, and it will not be so easily remedied. That mistrust, in turn, has a strong chilling effect on the willingness of law-abiding, loyal citizens to cooperate in the counterterrorism effort – for example by working with officials in local counterterrorism programs or by alerting law enforcement to various kinds of suspicious behavior. This dynamic has been demonstrated in several decades of extensive law enforcement research, including research focused specifically on counterterrorism policies and their impact on Muslim communities in the West. In one study, for example, Muslim-Americans in New York City were 61% less likely to report potentially suspicious precursors of terrorism when they felt that counterterrorism policies were being unfairly set and implemented. (See Schulhofer, Tyler & Huq, American Policing at a Crossroads: Unsustainable Policies and the Procedural Justice Alternative, 101 J. Crim. L. & Criminology 335, 364-74 (2011).) This last point underscores the most important, but least appreciated, “given” of the counterterrorism enterprise. Because the consequences of a terrorist attack could be so catastrophic, citizens and public officials alike tend to support strong law enforcement more readily than they do in ordinary times. The perception is that strong measures are acceptable because the top priority must be to reduce the risk of attack. And strong measures, whatever their drawbacks, at least seem to offer ways to reduce that risk. The central lesson of smart law enforcement, however, is that there are no risk-free choices. Strengthening the powers of the executive enhances some of our defenses against terrorism, but it weakens others – many of which, including community trust and cooperation, are absolutely essential to reducing the dangers of terrorism. Against this background, we must – for the sake of our democracy and even for the sake of our physical security – find ways to dissipate the cloud of mistrust that now hangs over NSA surveillance. Mass surveillance causes information overload Eddington, 15 - Patrick Eddington is a policy analyst in homeland security and civil liberties at the Cato Institute. He was formerly a senior policy advisor to Rep. Rush Holt (D-N.J.) and a military imagery analyst at the CIA’s National Photographic Interpretation Center (“No, Mass Surveillance Won't Stop Terrorist Attacks” Reason, 1/27, http://reason.com/archives/2015/01/27/mass-surveillance-andterrorism#.ltrezi:U8Io No, mass surveillance does not prevent terrorist attacks. It’s worth remembering that the mass surveillance programs initiated by the U.S. government after the 9/11 attacks—the legal ones and the constitutionally-dubious ones—were premised on the belief that bin Laden’s hijacker-terrorists were able to pull off the attacks because of a failure to collect enough data. Yet in their subsequent reports on the attacks, the Congressional Joint Inquiry (2002) and the 9/11 Commission found exactly the opposite. The data to detect (and thus foil) the plots was in the U.S. government’s hands prior to the attacks; the failures were ones of sharing, analysis, and dissemination. That malady perfectly describes every intelligence failure from Pearl Harbor to the present day. The Office of the Director of National Intelligence (created by Congress in 2004) was supposed to be the answer to the "failure-to-connect-the-dots" problem. Ten years on, the problem remains, the IC bureaucracy is bigger than ever, and our government is continuing to rely on mass surveillance programs that have failed time and again to stop terrorists while simultaneously undermining the civil liberties and personal privacy of every American. The quest to "collect it all," to borrow a phrase from NSA Director Keith Alexander, only leads to the accumulation of masses of useless information, making it harder to find real threats and costing billions to store. A recent Guardian editorial noted that such mass-surveillance myopia is spreading among European political leaders as well, despite the fact that "terrorists, from 9/11 to the Woolwich jihadists and the neo-Nazi Anders Breivik, have almost always come to the authorities’ attention before murdering." Mass surveillance is not only destructive of our liberties, its continued use is a virtual guarantee of more lethal intelligence failures . And our continued will to disbelieve those facts is a mental dodge we engage in at our peril. Mass surveillance makes it less likely to detect terrorism – overload, Tufekci, 15 - Zeynep Tufekci is an assistant professor at the University of North Carolina (“Terror and the limits of mass surveillance” Financial Times, 2/3, http://blogs.ft.com/the-exchange/2015/02/03/zeyneptufekci-terror-and-the-limits-of-mass-surveillance/ But the assertion that big data is “what it’s all about” when it comes to predicting rare events is not supported by what we know about how these methods work, and more importantly, don’t work. Analytics on massive datasets can be powerful in analysing and identifying broad patterns, or events that occur regularly and frequently, but are singularly unsuited to finding unpredictable, erratic, and rare needles in huge haystacks. In fact, the bigger the haystack — the more massive the scale and the wider the scope of the surveillance — the less suited these methods are to finding such exceptional events, and the more they may serve to direct resources and attention away from appropriate tools and methods. After Rigby was killed, GCHQ, Britain’s intelligence service, was criticised by many for failing to stop his killers, Michael Adebolajo and Michael Adebowale. A lengthy parliamentary inquiry was conducted, resulting in a 192-page report that lists all the ways in which Adebolajo and Adebowale had brushes with data surveillance, but were not flagged as two men who were about to kill a soldier on a London street. GCHQ defended itself by saying that some of the crucial online exchanges had taken place on a platform, believed to be Facebook, which had not alerted the agency about these men, or the nature of their postings. The men apparently had numerous exchanges that were extremist in nature, and their accounts were suspended repeatedly by the platform for violating its terms of service. “If only Facebook had turned over more data,” the thinking goes. But that is misleading, and makes sense only with the benefit of hindsight. Seeking larger volumes of data, such as asking Facebook to alert intelligence agencies every time that it detects a post containing violence, would deluge the agencies with multiple false leads that would lead to a data quagmire, rather than clues to impending crimes. For big data analytics to work, there needs to be a reliable connection between the signal (posting of violent content) and the event (killing someone). Otherwise, the signal is worse than useless. Millions of Facebook’s billion-plus users post violent content every day, ranging from routinised movie violence to atrocious violent rhetoric. Turning over the data from all such occurrences would merely flood the agencies with “false positives” — erroneous indications for events that actually will not happen. Such data overload is not without cost, as it takes time and effort to sift through these millions of strands of hay to confirm that they are, indeed, not needles — especially when we don’t even know what needles look like. All that the investigators would have would be a lot of open leads with no resolution, taking away resources from any real investigation. Besides, account suspensions carried out by platforms like Facebook’s are haphazard, semi-automated and unreliable indicators. The flagging system misses a lot more violent content than it flags, and it often flags content as inappropriate even when it is not, and suffers from many biases. Relying on such a haphazard system is not a reasonable path at all. So is all the hype around big data analytics unjustified? Yes and no. There are appropriate use cases for which massive datasets are intensely useful, and perform much better than any alternative we can imagine using conventional methods. Successful examples include using Google searches to figure out drug interactions that would be too complex and too numerous to analyse one clinical trial at a time, or using social media to detect national-level swings in our mood (we are indeed happier on Fridays than on Mondays). In contrast, consider the “lone wolf” attacker who took hostages at, of all things, a “Lindt Chocolat Café” in Sydney. Chocolate shops are not regular targets of political violence, and random, crazed men attacking them is not a pattern on which we can base further identification. Yes, the Sydney attacker claimed jihadi ideology and brought a black flag with Islamic writing on it, but given the rarity of such events, it’s not always possible to separate the jihadi rhetoric from issues of mental health — every era’s mentally ill are affected by the cultural patterns around them. This isn’t a job for big data analytics. (The fact that the gunman was on bail facing various charges and was known for sending hate letters to the families of Australian soldiers killed overseas suggests it was a job for traditional policing). When confronted with their failures in predicting those rare acts of domestic terrorism, here’s what GCHQ, and indeed the NSA, should have said instead of asking for increased surveillance capabilities: stop asking us to collect more and more data to perform an impossible task. This glut of data is making our job harder, not easier, and the expectation that there will never be such incidents, ever, is not realistic. Attention should instead be focused on the causal chain that led the Kouachi brothers on their path. It seems that the French-born duo had an alienated, turbulent youth, and then spent years in French prisons, where they were transformed from confused and incompetent wannabe jihadis to hardliners who were both committed and a lot more capable of carrying out complex violence acts than when they entered the prison. Understanding such paths will almost certainly be more productive for preventing such events, and will also spare all of us from another real danger: governments that know too much about their citizens, and a misguided belief in what big data can do to find needles in too-large haystacks. Significant surveillance reform now disproves the link Edgar, 4/13/15 - visiting fellow at the Institute and adjunct professor of law at the Georgetown University Law Center (Timothy, “The Good News About Spying” https://www.foreignaffairs.com/articles/united-states/2015-04-13/good-news-about-spying Despite high hopes for a fresh start on civil liberties, during his first term in office, Obama ratified and even expanded the surveillance programs that began under former President George W. Bush. After NSA contractor Edward Snowden began revealing the agency’s spying programs to The Guardian in 2013, however, Obama responded with a clear change of direction. Without great fanfare, his administration has made changes that open up the practices of the United States intelligence community and protect privacy in the United States and beyond. The last year and a half has been the most significant period of reform for national security surveillance since Senator Frank Church led the charge against domestic spying in the late 1970s. In 2013, at Obama’s direction, the Office of the Director of National Intelligence (ODNI) established a website for the intelligence community, IC on the Record, where previously secret documents are posted for all to see. These are not decades-old files about Cold War spying, but recent slides used at recent NSA training sessions, accounts of illegal wiretapping after the 9/11 attacks, and what had been highly classified opinions issued by the Foreign Intelligence Surveillance Court about ongoing surveillance programs. Although many assume that all public knowledge of NSA spying programs came from Snowden’s leaks, many of the revelations in fact came from IC on the Record, including mistakes that led to the unconstitutional collection of U.S. citizens’ emails. Documents released though this portal total more than 4,500 pages—surpassing even the 3,710 pages collected and leaked by Snowden. The Obama administration has instituted other mechanisms, such as an annual surveillance transparency report, that will continue to provide fodder for journalists, privacy activists, and researchers. The transparency reforms may seem trivial to some. From the perspective of an intelligence community steeped in the need to protect sources and methods, however, they are deeply unsettling. At a Brown University forum, ODNI Civil Liberties Protection Officer Alexander Joel said, “The intelligence community is not designed and built for transparency. Our culture is around finding our adversaries’ secrets and keeping our own secrets secret.” Accordingly, until only a few years ago, the intelligence community resisted making even the most basic information public. The number of FISA court opinions released to the public between 1978 and 2013 can be counted on one hand. Beyond more transparency, Obama has also changed the rules for surveillance of foreigners. Until last year, privacy rules applied only to “U.S. persons.” But in January 2014, Obama issued Presidential Policy Directive 28 (PPD-28), ordering intelligence agencies to write detailed rules assuring that privacy protections would apply regardless of nationality. These rules, which came out in January 2015, mark the first set of guidelines for intelligence agencies ordered by a U.S. president—or any world leader— that explicitly protect foreign citizens’ personal information in the course of intelligence operations. Under the directive, the NSA can keep personal information in its databases for no more than five years. It must delete personal information from the intelligence reports it provides its customers unless that person’s identity is necessary to understand foreign intelligence—a basic rule once reserved only for Americans. The new rules also include restrictions on bulk collection of signals intelligence worldwide—the practice critics call “mass surveillance.” The NSA’s bulk collection programs may no longer be used for uncovering all types of diplomatic secrets, but will now be limited to six specific categories of serious national security threats. Finally, agencies are no longer allowed simply to “collect it all.” Under PPD-28, the NSA and other agencies may collect signals intelligence only after weighing the benefits against the risks to privacy or civil liberties, and they must now consider the privacy of everyone, not just U.S. citizens. This is the first time any U.S. government official will be able to cite a written presidential directive to object to an intelligence program on the basis that the intelligence it produces is not worth the costs to privacy of innocent foreign citizens. No data proves surveillance reduces terrorism risks Kehl, 14 – Policy Analyst at New America’s Open Technology Institute (Danielle, “Surveillance Costs: The NSA’s Impact on the Economy, Internet Freedom & Cybersecurity” July, https://www.newamerica.org/oti/surveillance-costs-the-nsas-impact-on-the-economy-internetfreedom-cybersecurity/ So far, the purported benefits of the programs remain unsubstantiated. While intelligence officials and representatives of the Obama Administration have defended the merits of the NSA programs,18 they have offered little hard evidence to prove their value. To the contrary, initial analyses of the NSA’s bulk records collection program suggest that its benefits are dubious at best, particularly compared to the program’s vast breadth. A January 2014 study from the New America Foundation’s International Security Program, for example, concluded that “the government’s claims about the role that NSA ‘bulk’ surveillance of phone and email communications records has had in keeping the United States safe from terrorism… are overblown and even misleading.”19 Similarly, in its review of the telephone records collection program under Section 215 of the USA PATRIOT Act, the Privacy and Civil Liberties Oversight Board (PCLOB) could not identify a single instance in which the telephone records program made a concrete difference in the outcome of a counterterrorism investigation.20 The President’s Review Group concurred, emphasizing that “there is always a possibility that acquisition of more information— whether in the US or abroad—might ultimately prove helpful. But that abstract possibility does not, by itself, provide a sufficient justification for acquiring more information.”21 Although the PCLOB did find in a separate report that “the information the [Section 702] program collects has been valuable and effective in protecting the nation’s security and producing useful foreign intelligence,”22 it provided no details and did not weigh those purported benefits against the various costs of the surveillance. Furthermore, its conclusions were undermined just days later when The Washington Post revealed that nine out of ten of the Internet users swept up in the NSA’s Section 702 surveillance are not legally targeted foreigners.23 Current counter-terrorism fails – lack of human intelligence outweighs Eddington, 15 - Patrick G. Eggerton worked as a military imagery analyst at the CIA. He is policy analyst in homeland security and civil liberties at Cato Institute. (Patrick, “US wants to hack your phone because it doesn’t have real spies it needs” Reuters, http://blogs.reuters.com/great-debate/2015/02/23/the-fbiwas-for-encryption-before-it-was-against-it/ The best way to disrupt any organized criminal element is to get inside of it physically. But the U.S. government’s counterterrorism policies have made that next to impossible. The FBI, for example, targets the very Arab-American and Muslim-American communities it needs to work with if it hopes to find and neutralize home-grown violent extremists, including promulgating new rules on profiling that allow for the potential mapping of Arab- or Muslim-American communities. The Justice Department’s refusal to investigate the New York Police Department’s mass surveillance and questionable informant-recruitment tactics among immigrants in the Arab- and Muslim-American communities has only made matters worse. Overseas, the Cold War style of spying — relying on U.S. embassies as bases from which CIA and other U.S. government intelligence personnel operate — is increasingly difficult in the areas of the Middle East and southwest Asia undergoing often violent political change. Steinbach testified about this before the House Homeland Security Committee earlier this month. “The concern is in Syria,” he explained, “the lack of our footprint on the ground in Syria — that the databases won’t have the information we need.” Notice his reference to technology “databases” rather than the importance of the human element. The U.S. intelligence community’s emphasis should be on the spy on the ground who actually gathers critical information and makes any penetration of a terrorist organization possible. This problem is true for Yemen as well, as a recent Washington Post story highlighted: The spy agency has pulled dozens of operatives, analysts and other staffers from Yemen as part of a broader extraction of roughly 200 Americans who had been based at the embassy in Sana, officials said. Among those removed were senior officers who worked closely with Yemen’s intelligence and security services to target al-Qaeda operatives and disrupt terrorism plots often aimed at the United States. The CIA’s failure to field agents under nonofficial cover, or to recruit enough reliable local informants on the ground who could communicate securely with CIA handlers outside Yemen, is symptomatic of the agency’s failure to break with its reliance on embassy-based operations throughout that part of the world. Compromising encryption technology will do nothing to solve the intelligence community’s human-intelligence deficit. This is a problem the agency must address if it is ever going to be successful in finding and neutralizing terrorist cells overseas. It boils down to the fact that the FBI and the U.S. intelligence community have failed to adapt their intelligence-collection practices and operations to meet the challenges of the “new world disorder” in which we live. As former CIA officer Philip Giraldi has noted: [I]ntelligence agencies that were created to oppose and penetrate other nation-state adversaries are not necessarily well equipped to go after terrorists, particularly when those groups are ethnically cohesive or recruited through family and tribal vetting, and able to operate in a low-tech fashion to negate the advantages that advanced technologies provide. The CIA has repeatedly attempted — occasionally at high cost — to penetrate militant organizations like al Qaeda and Islamic State. Nonetheless, Washington’s overall counterterrorism bias in funding and manpower has been toward using the most sophisticated technology available as the key means of battling a relatively low-tech enemy. The FBI’s new anti-encryption campaign is just the latest phase in the government’s attempt to deny Islamic State and related groups the ability to shield their communications. If these militant groups were traditional nation-states with their own dedicated communications channels, we’d all be cheering on the FBI’s efforts. But the Internet has become the primary means for global, real-time communications for individuals, nonprofits, businesses and governments. So it should not be treated as just another intelligence target, which is certainly the FBI’s and Natural Security Agency’s current mindset. Using the legislative process to force companies to make defective electronic devices with exploitable communications channels in the hope that they will catch a tiny number of potential or actual terrorists is a self-defeating strategy. If implemented, the FBI’s proposal would only make all Americans more vulnerable to malicious actors online and do nothing to stop the next terrorist attack. The government greatly exaggerates PRISM’s ability to stop terrorism Sanchez, 13 – senior fellow on technology, privacy and national security and intelligence surveillance at Cato (Julian, “Epstein on NSA (Again) Part I: PRISM & the FISA Amendments Act” 6/28, http://www.cato.org/blog/epstein-nsa-again-part-i-prism-fisa-amendments-act Finally, Epstein and Loyola rather uncritically repeat the claim that the PRISM program surveillance pursuant to FAA authorities “is responsible for foiling about 40 of the 50 terrorist plots which the administration recently disclosed to Congress in classified briefings.” If we scrutinize the government’s claims a bit more closely, we see that in fact NSA Director Keith Alexander claimed that PRISM intercepts had “contributed” to the disruption of 40 of 50 terrorist “events,” mostly overseas, and judged this contribution to have been “critical” in 50 percent of these cases. When we examine some of the specific “events” government officials have discussed, however, it becomes clear that not all of these are “plots” at all—many seem to have involved funding or other forms of “material support” for radical groups, though in at least one such case the government appears to have claimed a “plot” to bomb the New York Stock Exchange where none really existed. (FBI Deputy Sean Joyce further told Congress that the “plot” must have been serious given that a jury convicted the plotters. But federal prosecutors themselves emphasized that the men “had not been involved in an active plot” and there was no jury trial: they were charged with “material support” and pled guilty.) Presumably at least some of these “events” did involve actual planned attacks, but knowing that PRISM surveillance was “critical” to disrupting half of them doesn’t in itself tell us much. The question is whether the same surveillance could have been conducted in these cases using authorities that existed before the FISA Amendments Act, or under narrower amendments to FISA. Since the bulk of these “events” appear to have been overseas, the traditional authority to intercept purely foreign communications without a warrant would seem to have sufficed, or at most required a legal tweak to accommodate stored data on U.S. servers used by foreigners to communicate with other foreigners. There is no evidence to suggest that the actually controversial part of the FAA—the revocation of the warrant requirement for interception of U.S.-to-foreign wire communications—made a necessary contribution in these cases. Indeed, as national security expert Peter Bergen has documented, the public record in the overwhelming majority of terror plots we know about shows that they were “uncovered by traditional law enforcement methods, such as the use of informants, reliance on community tips about suspicious activity and other standard policing practices.” There is certainly such a thing as too much skepticism about government. But when officials make vague allusions to vital, secret successes in an effort to justify their own broad powers, there is also such a thing as too much credulity. So much for PRISM and the FISA Amendments Act. I’ll discuss what Epstein and Loyola say about the NSA’s metadata dragnet in a separate post. Soft power turns terror Soft power solves all global problems – including terrorism Stanley, 7 (Elizabeth Stanley, Ass Prof @ Georgetown, 7 “International Perceptions of US Nuclear Policy” Sandia Report, http://www.prod.sandia.gov/cgi-bin/techlib/access-control.pl/2007/070903.pdf) How important is soft power, anyway? Given its vast conventional military power, does the United States even need soft power? Some analysts argue that US military predominance is both possible and desirable over the long term, and thus soft power is not important. But a growing consensus disagrees. These analysts argue that soft power is critical for four reasons. First, soft power is invaluable for keeping potential adversaries from gaining international support, for “winning the peace” in Afghanistan and Iraq, and for convincing moderates to refrain from supporting extremist terrorist groups. Second, soft power helps influence neutral and developing states to support US global leadership. Third, soft power is also important for convincing allies and partners to share the international security burden.14 Finally, and perhaps most importantly, given the increasing interdependence and globalization of the world system, soft power is critical for addressing most security threats the United States faces today. Most global security threats are impossible to be countered by a single state alone. Terrorism, weapons of mass destruction (WMD) proliferation, failed and failing states, conflicts over access to resources, are not confined to any one state. In addition, disease, demographic shifts, environmental degradation and global warming will have negative security implications as well.15 All of these potential threats share four traits: (1) they are best addressed proactively, rather than after they develop into full-blown crises; (2) they require multi-lateral approaches, often under the umbrella of an international institution; (3) they are not candidates for a quick fix, but rather require multi-year, or multi-decade solutions; and, (4) they are “wicked” problems. Given these four traits, soft power is critical for helping to secure the international, multi-lateral cooperation that will be necessary to address such threats effectively. AT: Presidential powers DA The perception of protection alone prevents a larger backlash against presidential power Small, 8 - United States Air Force Academy (Matthew, “His Eyes are Watching You: Domestic Surveillance, Civil Liberties and Executive Power during Times of National Crisis” http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf In fact, reasonable arguments can be made that there is no clearly formed public mandate demanding the consideration of an American citizen’s right to privacy as important, if not more so, than national security. There exists only a concern of abridgement of their right, but this concern does not equate to motivating factor for government constraint. Studies show that from 1974 to 1983 Americans perceived little impact of privacy invasion, in its rare instances, on their lives (Katz and Tassone 1990, 125). Simultaneously, however, Americans did not, and still do not,17 favor wiretaps regardless of the presence of warrants (Katz and Tassone 1990, 130-131). Despite this, it appears that the public realizes the necessity of the power of the president to abridge certain rights in order to ensure national security. The public voices its concern but stops far short of forcing the government to restrain itself. Legislatures listen to the “broad climate of opinion” (Gandy Jr. 2003, 285) and that climate allows President Bush to act as he did.18 Like Abraham Lincoln, President Bush realized inadequacy within the government institutions tasked with keeping America safe through the collection of information on internal threats. In order to effectively combat terrorism, the NSA needed the ability to expand operations within the US. President Bush, in the manner of his Civil War predecessor, expanded his power to better equip the NSA to handle the threat. Court cases and legislation concerning wiretapping and intrusive domestic surveillance techniques only establish guidelines to give degrees of protection, but more importantly the perception of protection .19 This still leaves the president with the room to maneuver within these guidelines to maintain national security at the expense of complete civil liberty. Justice Black’s dissensions shed more light on this paradox that even though the courts deemed warrantless wiretaps an invasion of privacy, they still continue. There remains those of the persuasion that wiretapping is a viable information gathering tool and admissible in court with or without an accompanying warrant because the Forth Amendment is not a protection of privacy. In American history, domestic surveillance, later to include electronic surveillance, proved necessary to enforce those laws passed by Congress that quelled rebellion and silenced dissidents. Presently, the USA Patriot Act and other similar legislation requires an increase in domestic electronic surveillance in order to combat terrorism; so in the interest of adhering to the letter and the spirit of the law, President Bush must expand the use of domestic electronic surveillance. President Bush took the precedent set by his predecessors and acted accordingly when the United States plummeted into turmoil. What is important now is for the president to realize when his power has reached its limit. The crux of the problem lies in justifying the remainder of a threat to American citizens. While the attacks of 9/11 still linger within the American psyche and legislation supports executive action, this task is less daunting. American citizens can stand some breaches in privacy but those breaches must not be permanent. Popular sentiment and legislation may currently favor expanded presidential power but President Bush, or any subsequent president, would be remiss in assuming that it will remain as such for the duration of the struggle against international terrorism. The fickle nature of public and Congressional support in the domestic intelligence realm thus requires a great deal of prudence on the part of the president. There are some indicators, albeit vague ones, of when domestic surveillance policy should yield to citizens’ right to privacy. Following the progression witnessed during the Cold War it would be reasonable to expect that opposition to presidential power would first come in the form of Supreme Court rulings striking down certain powers as unconstitutional followed by public opinion more heavily favoring the right to privacy and finally, legislation codifying judicial rulings in accordance with public opinion. Court cases challenging the president’s power under the USA Patriot Act have already surfaced. Both the American Civil Liberties Union (ACLU) and the Center for Constitutional Rights (CCR) have already filed formal complaints against the executive branch. The CCR, in particular, directly attacked the president’s power to conduct electronic surveillance without a court order as criminal under the provisions of FISA. Similarly, the Electronic Frontier Foundation sued AT&T for violating free speech and the right to privacy by aiding the NSA. Although the president has fought these allegations, fighting most vehemently in the AT&T case, none of the cases reached the Supreme Court. The legal actions precipitated neither legislative response nor changes in executive policy. If, however, the populous feels so compelled as to bring the matter before the Supreme Court, the president risks losing the policy initiative as one or more unfavorable rulings may force Congress to act on behalf of the right to privacy. The president must take care to ensure that domestic surveillance policies are commensurate with the actual national security threat. Although the war has no foreseeable end, the president’s actions must have one. That end must be in concert with Congress and must demonstrate to the American people that the security of the US, and by default their own freedom, is better because of it. If not, the president risks losing all legitimacy and having his power constrained to the point where neither he nor the agencies below him can effectively protect the nation. AT: Ex post CP Perm do both – the FAA includes ex post review mechanisms that solve the link Blum, 9 (Stephanie, “WHAT REALLY IS AT STAKE WITH THE FISA AMENDMENTS ACT OF 2008 AND IDEAS FOR FUTURE SURVEILLANCE REFORM” 18 B.U. Pub. Int. L.J. 269, Spring, lexis) If the Note's assertions are true, the FAA has one advantage over the traditional FISA in that the FAA relies more on ex post mechanisms. For example, the FAA imposes reporting requirements to Congress n253 and inspector general reviews, n254 rather than relying solely on ex ante warrants issued by a secret court. While under the FAA the FISC issues ex ante certifications concerning the executive's targeting and minimization procedures, these are programmatic reviews and not based on individualized suspicion of suspects as is required by traditional FISA. Given the arguably limited effectiveness of ex ante warrants issued by a secret court based on one-sided evidence, the FAA's greater reliance on ex post review mechanisms could be viewed as a significant improvement over traditional FISA. As Georgetown law professor Neal Katyal observed, "reporting requirements are powerful devices" that promote external checks on excessive executive power. n255 In contrast, the high degree of judicial deference in ex ante review may simply result from quality applications. Applications for traditional FISA warrants must survive considerable review by the executive branch prior to submission to the FISC; hence, it can be presumed that some, if not many, applications are not brought. As Alan Dershowitz notes, "although the FISA court has only rarely denied requests for national security wiretaps, the very existence of this court and the requirement of sworn justification serves as a check on the improper use of the powerful and intrusive technologies that are permitted in national security cases." n256 Hence, there are two ways to look at ex ante review: one could either argue that FISA "forces the executive to self-censor its requests," or that the judiciary is "acting merely as a 'rubber stamp.'" n257 The reality is probably a little of both. The FAA contains both ex ante and newly imposed ex post review mechanisms. While the ex ante review under the FAA is not based on individualized determinations about suspects, but rather focuses on programmatic reviews, because of its heavy ex post reporting mechanisms, it seems that the FAA creates [*308] a balanced structure that may prevent executive branch abuse while still protecting the nation from another terrorist attack. Ex post review alone fails – courts lack institutional expertise to review surveillance risks Harvard Law Review, 8 – no author cited, “SHIFTING THE FISA PARADIGM: PROTECTING CIVIL LIBERTIES BY ELIMINATING EX ANTE JUDICIAL APPROVAL” http://cdn.harvardlawreview.org/wpcontent/uploads/pdfs/shifting_the_FISA_paradigm.pdf 2. Judicially Ordered Notice to Wrongfully Surveilled Persons. — Another approach would provide a stronger statutory cause of action for improper surveillance, adding an ex post review function to the FISC. Such a scheme would “provide compensation to individuals subject to the most grievous instances of unlawful electronic surveillance” by giving the FISC power to “screen for these violations and discretionarily notify an individual,” and then compensate him or her if appropriate.82 This approach is commendable for attempting to remedy the lack of adversariality and the fact that improper surveillance that occurs after a FISC order is issued — when either changed circumstances or invalid governmental motives never come to light because the government does not attempt criminal prosecution — may go unchecked.83 But the suggested remedy, to broaden notice by making a “distinction . . . between disclosure that concretely threatens national security and disclosure that would merely embarrass the government,” 84 seems unworkable. Such line drawing necessarily involves crucial policy determinations that the courts are in a bad institutional position to make. Moreover, the ability of the remedy to provide a check on the government seems at best dubious and could even be viewed as permitting the government to purchase the ability to invade constitutional liberties. Ex post is impossible to enforce and amounts to a rubber stamp Berman, 14 - Visiting Assistant Professor of Law, Brooklyn Law School (Emily Berman, Regulating Domestic Intelligence Collection, 71 Wash. & Lee L. Rev. 3, http://scholarlycommons.law.wlu.edu/wlulr/vol71/iss1/5 The suggestion that the FISC approximate the role of traditional judicial review of agency decision making to impose constraints on discretion will also fail to result in the preservation of civil liberties. As an initial matter, it is unclear what the extent of the FISC’s review might be. Traditional judicial review of administrative rules asks whether an agency’s action is consistent with the Constitution and its statutory mandate or whether it is arbitrary or capricious.319 But when it comes to most intelligence-collection rules, there is no constitutional or statutory standard against which a court could measure agency compliance.320 One proposed solution to this baseline problem is to have the FISC review policy for whether it is consistent with the intelligence agencies’ own stated objectives.321 Again, this proposal fails to account for the fact that when the intelligence community is left to determine the rules of its own conduct, concerns other than security will get short shrift. By asking intelligence agencies to identify their own objectives and then subjecting their efforts to meet those objectives to judicial review would replicate the current situation—where the constraints on agencies are limited to those that they agree to place on themselves—but with the added legitimating feature of judicial imprimatur. Another barrier to enlisting the FISC in intelligencecollection governance is that the intelligencecollection activities governed by the Guidelines extend beyond the scope of the FISC’s jurisdiction. The FISC oversees electronic foreign intelligence surveillance and physical searches of premises connected with foreign powers.322 It has no role in overseeing purely domestic surveillance of Americans absent probable cause that those Americans are agents of a foreign power.323 The content of the Guidelines and the activities they regulate—such as physical surveillance of Americans, infiltration of religious or political groups, the use of informants, requests for internet history— rarely fall within the FISC’s jurisdiction. Individuals who wish to challenge FBI activity—if they can establish standing—do not have access to the FISC.324 Thus, it is unclear what role the FISC could play in reviewing many activities in which the FBI engages. The FISC, too, is likely to share the FBI and ODNI’s bias toward the security mission. Unless a recipient of a FISC order challenges the legitimacy of that order, proceedings in the FISC are not subject to an adversarial process.325 Instead, like magistrate judges considering whether to issue traditional search warrants, FISC judges review unopposed government applications for surveillance orders.326 The FISC thus receives only the Justice Department’s perspective—heavily informed by the FBI’s perspective— about any given rule. This concern is compounded by the fact that even the judges themselves largely hail from the law enforcement community—twelve of the fourteen judges who have served this year are former prosecutors and one is a former state police director.327 Moreover, once selected by the Chief Justice of the Supreme Court for FISC service, these judges are exposed to a constant stream of government applications to engage in foreign intelligence collection detailing just how dangerous the world can be and the important role that intelligence collection plays in combating those dangers.328 FISC involvement thus serves only to reinforce the pro-security perspective already embedded in the development of domesticintelligence- collection policies. Empirically true Brand, 15 - Dean and Professor Emeritus and Chairman of the Center for Law and Global Justice, University of San Francisco School of Law (Jeffrey, “Eavesdropping on Our Founding Fathers: How a Return to the Republic's Core Democratic Values Can Help Us Resolve the Surveillance Crisis” 6 Harv. Nat'l Sec. J. 16 Harv. Nat'l Sec. J. 1, lexis) That prediction also came to pass. In 2005, the New York Times revealed the Bush Administration's Terrorist Surveillance Program (TSP) that authorized warrantless surveillance on a massive scale that clearly violated the dictates of FISA and the Patriot Act. Initially, the Bush Administration argued that the program was legal, citing the 9/11 attacks and national security emergencies. Ultimately, a simpler path was taken: the Administration went to and received ex post facto approval from the FISA court. n189 A moment of accountability--the Bush Administration's acknowledgement that it had engaged in illegal surveillance--was side-stepped by simply seeking the approval of the court charged with monitoring the illegal activity, thereby making the Executive Branch unaccountable yet again. n190 The structure of the FISA court--shrouded in secrecy and devoid of any opposition to the government's position--also took its toll on the accountability of the Executive Branch to the Congress, a consequence that also had been roundly predicted during the FISA debates. Senators Abourezk, Hart, and Mathias candidly acknowledged throughout the debates over S. 3197, "In depth congressional oversight is a crucial element of the safeguards which justify embarking on the [FISA] legislative scheme." n191 Representative Ertel hoped that [*47] FISA's congressional reporting requirements would serve that end. n192 Secrecy makes meaningful ex post review impossible Setty, 15 - Professor of Law and Associate Dean for Faculty Development & Intellectual Life, Western New England University School of Law (Sudha, “Surveillance, Secrecy, and the Search for Meaningful Accountability” 51 Stan. J Int'l L. 69, Winter, lexis) The extent of congressional knowledge regarding the NSA Metadata Program is not fully known to the public and has been the subject of significant debate. Nonetheless, even assuming that Congress was sufficiently informed as to the potential reach of the PATRIOT Act with regard to surveillance n59 and, therefore, that the statutory authority for the bulk data collection and storage was sound, the ability of Congress to effect significant and meaningful ex post oversight appears to be severely limited . Historically, congressional hearings and investigations have been a powerful tool to rein in executive branch overreaching. n60 However, it seems that the extreme secrecy surrounding the NSA surveillance programs undermined the efficacy of these oversight powers, to the point that they may have been reduced to an ersatz form of accountability. One prominent example stems from a Senate oversight hearing on March 12, 2013, in which Senator Ron Wyden specifically asked Director of National Intelligence James Clapper if the NSA was systematically gathering information on the communications of millions of Americans. n61 Clapper denied this, yet subsequent revelations confirmed that the broad scope of the data collection included metadata for telephonic communications, as well as content data for emails, texts, and other such writings. n62 After public discussion of the discrepancy in his testimony, Clapper commented that he gave the "least most untruthful" answer possible under the circumstances. n63 Senator Wyden expressed disappointment and frustration that even while under oath at an oversight hearing, Clapper misled the Senate. n64 The ability for congressional oversight is further hampered by a general lack of access to information about the details of the NSA Metadata Program n65 and [*82] lack of ability to discuss publicly whatever knowledge is shared with Congress. n66 In fact, it remains unclear whether senators, including Dianne Feinstein, Chair of the Senate Intelligence Committee, knew of the lapses in NSA procedure until after such information was leaked to news sources. n67 Further revelations indicate that administration statements made to Congress even after the Snowden disclosures were not entirely accurate. n68 These examples are not determinative, but taken together, they raise significant doubt to the extent of accurate information regarding surveillance programs being made available to congressional oversight committees, and whether the oversight committees can function as effective accountability measures n69 without the benefit of illegally leaked information such as the Snowden disclosures. FISC review only has a weak effect on executive deterrence Setty, 15 - Professor of Law and Associate Dean for Faculty Development & Intellectual Life, Western New England University School of Law (Sudha, “Surveillance, Secrecy, and the Search for Meaningful Accountability” 51 Stan. J Int'l L. 69, Winter, lexis) The FISC differs from Article III courts in numerous ways: Its statutory scope is limited to matters of foreign intelligence gathering; its judges are appointed in the sole discretion of the Chief Justice of the United States Supreme Court; its proceedings are secret; its opinions are often secret or are published in heavily [*83] redacted form; and its process is not adversarial as only government lawyers make arguments defending the legality of the surveillance being contemplated. n70 Many of these differences bring into doubt the legitimacy of the court, its ability to afford adequate due process regarding civil liberties concerns, and its ability to uphold the rule of law in terms of government accountability. Compounding this legitimacy deficit is the FISC's own loosening of the relevance standard under Section 215 of the PATRIOT Act such that the FISC has found that bulk data collection without any particularized threat or connection to terrorism is legally permissible. n71 Historically, the FISC has rejected NSA surveillance applications too infrequently to be considered a substantial check on government overreach as an ex ante matter. n72 As an ex post matter, it is unclear to what extent the FISC's work guarantees any meaningful accountability over NSA surveillance activities. On the one hand, because the FISC lacks an adversarial process and has no independent investigatory authority, the FISC only addresses ex post compliance problems when the government itself brings the problem to the court's attention. n73 As such, FISC judges rely on the statements of the government as to the government's own behavior and lack the authority to investigate the veracity of the government's representations. n74 For example, in 2011, the FISC found one aspect of the surveillance program - brought to its attention months after the program went into effect n75 - to be unconstitutional. n76 Additionally, in one declassified opinion, the FISC critiques the NSA's sloppy over- collection of metadata of U.S. communications, and questions the efficacy of bulk data collection as a national security measure. n77 At one point, the FISC sanctioned the NSA for overreaching in [*84] saving all metadata and running daily metadata against an "alert list" of approximately 17,800 phone numbers, only 10% of which had met FISC's legal standard for reasonable suspicion. n78 On such occasions, the administration has modified problematic aspects of the surveillance and continued forward without further impediment by the FISC. n79 On the other hand, the fact that the NSA itself has brought potential compliance incidents to the notice of the FISC n80 indicates at least some internal policing of these programs. However, this is hardly an effective substitute for external review and accountability mechanisms that would ensure that consistent controls are in place. Further, the self-reporting of these compliance incidents does not in any way allow for discourse over the larger structural questions surrounding the surveillance programs. Finally, the ability of the FISC to act as an effective check on NSA overreaching is severely limited by the secrecy and lack of information available to the FISC judges. Judge Reggie B. Walton, formerly the Chief Judge of the FISC, lamented that "the FISC is forced to rely upon the accuracy of the information that is provided to the Court ... . The FISC does not have the capacity to investigate issues of noncompliance ... ." n81 The ability of the NSA to not only gather and retain bulk metadata, but also to build in backdoor access into data files despite private encryption efforts has been largely sanctioned by the FISC based on NSA representations as to the seriousness of the security threats posed to the nation. n82 In an environment in which there is a tremendous fear of being held responsible for any future terrorist attack that might occur on U.S. soil, n83 and in which there is a [*85] information deficit for those outside of the intelligence community, the FISC has consistently deferred to the NSA's assertions and has not been able to act as an effective accountability mechanism. Ex post fails – hindsight bias and secrecy Morgan, 8 - Law Clerk to the Honorable Samuel H. Mays, Jr., United States District Court for the Western District of Tennessee. J.D., 2007, New York University School of Law (Alexander, “A BROADENED VIEW OF PRIVACY AS A CHECK AGAINST GOVERNMENT ACCESS TO E-MAIL IN THE UNITED STATES AND THE UNITED KINGDOM” 40 N.Y.U. J. Int'l L. & Pol. 803, Spring, lexis) Ex post judicial review is compromised by hindsight bias. n192 Strict reliance on ex post approaches presupposes that judges charged with determining the sufficiency of original [*836] search justifications are capable of ignoring potentially inculpatory evidence since uncovered. As with the notion of a disinterested Home Secretary, this appears at odds with human nature. n193 The delay or outright denial of notice to search targets minimizes the efficacy of judicial review. Without notice, "the majority of interferences with privacy will be undetected," and most will only learn that they were surveillance targets if criminal charges follow. n194 By implication, the true extent of surveillance (and any abuse) remains unknown. n195 Untimely notice also compromises the value of judicial review because the court will be privy to the fruits of a search already conducted and thus susceptible to hindsight bias. In the United Kingdom, the Home Secretary never gives notification, n196 and delayed notice is fast growing in the United States through the use of "sneak and peek" warrants. n197 Gauging the scope of surveillance in the United Kingdom is further frustrated by non-responsive Tribunal decisions which "simply state whether the determination is favourable ... thus, not necessarily revealing [if] there has been any interception or its details." n198 [*837] Independent monitors such as the Interception of Communications Commissioner are prone to hindsight bias and also suffer from distinct shortcomings due to their generalized function. Their general charge allows them to uncover and address (through recommendations to Parliament) systemic defects more easily, unlike courts, which are limited to case-by-case review. The converse is that monitors lack authority to remedy any specific abuses they uncover. n199 Above all, commentators characterize monitors as helpless because there are too many authorizations to oversee, such that "not all authorisations are subject to scrutiny; only those selected at random." n200 In sum, the government's power to withhold notice precludes targets from seeking judicial review, and the result is that many authorizations are never held "to any form of independent scrutiny." n201 AT: Exclude PPD-28 Section 702 is overbroad – can’t solve reputational costs without curtailing surveilance Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11) Section 702 permits the government to compel communications service providers to assist with intelligence surveillance that targets non-U.S. persons (persons other than U.S. citizens and lawful permanent residents) reasonably believed to be abroad. Though it is defended as a necessary counterterrorism and national security power, Section 702 broadly authorizes collection, retention, and use of communications content unnecessary for national security and unrelated to counterterrorism. The overbroad use of Section 702 infringes upon the privacy rights of both U.S. persons, and of non-U.S. persons abroad, has already caused some damage to the American tech industry globally, and could cause much more.3 Section 702 monitors any foreign target regardless of national security interest – creates an enormous perception of abuse Nojeim, 14 - Director, Project on Freedom, Security & Technology at the Center for Democracy & Technology (Greg, “COMMENTS TO THE PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD REGARDING REFORMS TO SURVEILLANCE CONDUCTED PURSUANT TO SECTION 702 OF FISA” 4/11) The FISA provisions that govern intelligence surveillance of targets in the U.S. permit the government to engage in electronic surveillance to collect “foreign intelligence information.” For purposes of surveillance that targets a non-U.S. person, it is defined broadly as: (1) information that relates to the ability of the U.S. to protect against a hostile attack, espionage, sabotage or international terrorism or proliferation of weapons of mass destruction; or (2) information with respect to a foreign territory or foreign power (a foreign government, political party, or entity controlled by a foreign government, or a foreign terrorist organization) that relates to the security of the U.S. or to the conduct of U.S. foreign affairs.4 When the government applies to the Foreign Intelligence Surveillance Court (FISC) for permission to conduct surveillance of targets in the U.S., it must certify that a significant purpose of the surveillance it will conduct is to collect foreign intelligence information.5 Because “foreign intelligence information” is defined so broadly, and because the FISC never actually rules on whether the significant purpose test is met, the purpose limitation that governs FISA surveillance of targets in the U.S. is easily met. FISA surveillance in the U.S. is instead effectively constrained by an additional requirement: the requirement that the government prove to the FISC that there is probable cause to believe the target of surveillance is a terrorist, spy, or other agent of a foreign power. Thus, Congress effectively constrained FISA surveillance of targets in the U.S. by permitting that surveillance to target only a narrow class of persons and entities. For surveillance of people reasonably believed to be outside the U.S., Section 702 adopts the broad purpose requirement, but couples it with a broad class of surveillance targets. Section 702 is not constrained by the requirement that the target be an agent of a foreign power. Instead, the target need only be a non-U.S. person reasonably believed to be abroad. Effectively, Congress borrowed the broad purpose for FISA intelligence surveillance (collect “foreign intelligence information”) and applied it to surveillance abroad without limiting the class of potential targets to “agents of a foreign power.” This has prompted concern globally that surveillance under Section 702 is broadly directed at individuals not suspected of wrongdoing, and could include targeting based at least in part on political activities. A peaceful protest at a U.S. base in Germany or a demonstration against rising food prices in India “relate to” U.S. foreign policy; non-U.S. persons involved in those protests could be monitored under Section 702. A 2012 cloud computing report to the European Parliament included a finding that under Section 702, it is lawful in the U.S. to conduct purely political surveillance on non-U.S. persons’ data stored by U.S. cloud companies.6 Such actions raise serious human rights concerns. Further, fear of the mere possibly that this overbroad surveillance is occurring has significantly damaged the U.S. tech industry abroad.