Plan In the absence of an individually-tailored warrant obtained via use of a specific selector term, federal intelligence agencies should cease collection of domestic phone, internet, email, and associated electronic records. This should include, but not be limited to, ending the monitoring of United States persons under Sections 214 and 215 of the USA PATRIOT Act; Executive Order 12333; and Section 702 of the FISA Amendments Act. Advantage One is HUMINT Information overload drains resources and trades off with targeted surveillance Volz, 14 (Dustin, The National Journal, “Snowden: Overreliance on Mass Surveillance Abetted Boston Marathon Bombing: The former NSA contractor says a focus on mass surveillance is impeding traditional intelligencegathering efforts—and allowing terrorists to succeed”, October 20, 2014, ak.) Edward Snowden on Monday suggested that if the National Security Agency focused more on traditional intelligence gathering—and less on its mass-surveillance programs—it could have thwarted the 2013 Boston Marathon bombings. The fugitive leaker, speaking via video to a Harvard class, said that a preoccupation with collecting bulk communications data has led to resource constraints at U.S. intelligence agencies, often leaving more traditional, targeted methods of spying on the back burner. "We miss attacks, we miss leads, and investigations fail because when the government is doing its 'collect it all,' where we're watching everybody, we're not seeing anything with specificity because it is impossible to keep an eye on all of your targets," Snowden told Harvard professor and Internet freedom activist Lawrence Lessig. "A good example of this is, actually, the Boston Marathon bombings." Snowden said that Dzhokhar and Tamerlan Tsarnaev were pointed out by Russian intelligence to U.S. officials prior to the bombings last year that killed three and left hundreds wounded, but that such actionable intelligence was largely ignored. He argued that targeted surveillance on known extremists and diligent pursuit of intelligence leads provides for better counterterrorism efforts than mass spying. "We didn't really watch these guys and the question is, why?" Snowden asked. "The reality of that is because we do have finite resources and the question is, should we be spending 10 billion dollars a year on mass-surveillance programs of the NSA to the extent that we no longer have effective means of traditional [targeting]?" Anti-spying activists have frequently argued that bulk data collection has no record of successfully thwarting a terrorist attack, a line of argument some federal judges reviewing the NSA's programs have also used in their legal reviews of the activities. Snowden's suggestion—that such mass surveillance has not only failed to directly stop a threat, but actually makes the U.S. less safe by distracting resource-strapped intelligence officials from performing their jobs—takes his criticism of spy programs to a new level. "We're watching everybody that we have no reason to be watching simply because it may have value, at the expense of being able to watch specific people for which we have a specific cause for investigating, and that's something that we need to look carefully at how to balance," Snowden said. The plan solves – 1) Creates effective surveillance methods Walt, 14 (Stephen M. Walt is the (real papa Walt) and Robert and Renée Belfer professor of international relations at Harvard University, “The Big Counterterrorism Counterfactual Is the NSA actually making us worse at fighting terrorism?”, http://www.foreignpolicy.com/articles/2014/11/10/counterterrorism_spying_nsa_islamic_state_terrorist_cve, November 10, 2014, ak.) The head of the British electronic spy agency GCHQ, Robert Hannigan, created a minor flap last week in an article he wrote for the Financial Times. In effect, Hannigan argued that more robust encryption procedures by private Internet companies were unwittingly aiding terrorists such as the Islamic State (IS) or al Qaeda, by making it harder for organizations like the NSA and GCHQ to monitor online traffic. The implication was clear: The more that our personal privacy is respected and protected, the greater the danger we will face from evildoers. It's a serious issue, and democracies that want to respect individual privacy while simultaneously keeping citizens safe are going to have to do a much better job of reassuring us that vast and (mostly) secret surveillance capabilities overseen by unelected officials such as Hannigan won't be abused. I tend to favor the privacy side of the argument, both because personal freedoms are hard to get back once lost, but also because there's not much evidence that these surveillance activities are making us significantly safer. They seem to be able to help us track some terrorist leaders, but there's a lively debate among scholars over whether tracking and killing these guys is an effective strategy. The fear of being tracked also forces terrorist organizations to adopt less efficient communications procedures, but it doesn't seem to prevent them from doing a fair bit of harm regardless. The fear of being tracked also forces terrorist organizations to adopt less efficient communications procedures, but it doesn't seem to prevent them from doing a fair bit of harm regardless. So here's a wild counterfactual for you to ponder: What would the United States, Great Britain, and other wealthy and powerful nations do if they didn't have these vast surveillance powers? What would they do if they didn't have armed drones, cruise missiles, or other implements of destruction that can make it remarkably easy (and in the short-term, relatively cheap) to target anyone they suspect might be a terrorist? Assuming that there were still violent extremists plotting various heinous acts, what would these powerful states do if the Internet was there but no one knew how to spy on it? For starters, they'd have to rely more heavily on tried-and-true counterterrorism measures: infiltrating extremist organizations and flipping existing members, etc., to find out what they were planning, head attacks off before they occurred, and eventually roll up organization themselves. States waged plenty of counterterrorism campaigns before the Internet was invented, and while it can be difficult to infiltrate such movements and find their vulnerable points, it's not exactly an unknown art. If we couldn't spy on them from the safety of Fort Meade, we'd probably be doing a lot more of this. Second, if we didn't have all these expensive high-tech capabilities, we might spend a lot more time thinking about how to discredit and delegitimize the terrorists' message, instead of repeatedly doing things that help them make their case and recruit new followers. Every time the United States goes and pummels another Muslim country -- or sends a drone to conduct a "sign ature strike" -- it reinforces the jihadis' claim that the West has an insatiable desire to dominate the Arab and Islamic world and no respect for Muslim life. It doesn't matter if U.S. leaders have the best of intentions, if they genuinely want to help these societies, or if they are responding to a legitimate threat; the crude message that drones, cruise missiles, and targeted killings send is rather different. If we didn't have all these cool high-tech hammers, in short, we'd have to stop treating places like Afghanistan, Pakistan, Iraq, and Syria as if they were nails that just needed another pounding, and we might work harder at marginalizing our enemies within their own societies. To do that, we would have to be building more effective partnerships with authoritative sources of legitimacy within these societies, including religious leaders. Our failure to do more to discredit these movements is perhaps the single biggest shortcoming of the entire war on terror, and until that failure is recognized and corrected, the war will never end. Third, and somewhat paradoxically, if we didn't have drones and the NSA, we'd have to think more seriously about boots on the ground , at least in some places. But having to think harder about such decisions might be a good thing, because it would force the United States (or others) to decide which threats were really serious and which countries really mattered. It might even lead to the conclusion that any sort of military intervention is counterproductive. As we've seen over the past decade, what the NSA, CIA, and Special Ops Command do is in some ways too easy: It just doesn't cost that much to add a few more names to the kill list, to vacuum up a few more terabytes of data, or to launch a few more drones in some new country, and all the more so when it's done under the veil of secrecy. I'm not saying that our current policy is costless or that special operations aren't risky; my point is that such activities are still a lot easier to contemplate and authorize than a true "boots on the ground" operation. By making it easier, however, the capabilities make it easier for our leaders to skirt the more fundamental questions about interests and strategy. It allows them to "do something," even when what is being done won't necessarily help. Lastly, if U.S. leaders had to think harder about where to deploy more expensive resources, they might finally start thinking about the broader set of U.S. and Western policies that have inspired some of these movements in the first place. Movements like IS, al Qaeda, al-Nusra Front, al-Shabab, or the Taliban are in some ways indigenous movements arising from local circumstances, but they did not spring up out of nowhere and the United States (and other countries) bear some (though not all) blame for their emergence and growth. To say this is neither to defend nor justify violent extremism, nor to assert that all U.S. policies are wrong; it is merely to acknowledge that there is a causal connection between some of what we do and some of the enemies we face. But if some of the things the United States (or its allies) is doing are making it unpopular in certain parts of the world, and if some of that unpopularity gets translated into violent extremism that forces us to spend hundreds of billions of dollars trying to protect ourselves, then maybe we ought to ask ourselves if every single one of those policies makes sense and is truly consistent with U.S. interests and values. And if not, then maybe we ought to change some of them, if only to take some steam out of the extremist enterprise. What I'm suggesting, in short, is that the "surveil and strike" mentality that has dominated the counterterrorism effort (and which is clearly reflected in Hannigan's plea to let Big Brother -- oops, I mean the NSA and GCHQ -- keep its eyes on our communications) is popular with government officials because it's relatively easy, plays to our technological strengths, and doesn't force us to make any significant foreign-policy changes or engage in any sort of self-criticism at all. If we can solve the terrorist problem by throwing money at it, and enriching some defense contractors and former government officials in the process, what's not to like? If we can solve the terrorist problem by throwing money at it, and enriching some defense contractors and former government officials in the process, what's not to like? To be clear: I'm not suggesting we dismantle the NSA, fire all our cryptographers, and revert to Cordell Hull's quaint belief that "gentlemen [or ladies] do not read each other's mail." But until we see more convincing evidence that the surveillance of the sort Hannigan was defending has really and truly kept a significant number of people safer from foreign dangers, I'm going to wonder if we aren't overemphasizing these activities because they are relatively easy for us, and because they have a powerful but hard-to-monitor constituency in Washington and London. In short, we're just doing what comes naturally, instead of doing what might be more effective. 2) That prevents tradeoffs with human-intel which is critical to overall US intel Margolis 13 Gabriel Margolis – the author presently holds a Master of Arts (MA) in Conflict Management & Resolution from UNC Wilmington and in his final semester of the program when this article was published in the peer-reviewed journal Global Security Studies . Global Security Studies (GSS) is a premier academic and professional journal for strategic issues involving international security affairs. All articles submitted to and published in Global Security Studies (GSS) undergo a rigorous, peer-reviewed process. From the article: “The Lack of HUMINT: A Recurring Intelligence Problem” - Global Security Studies - Spring 2013, Volume 4, Issue 2http://globalsecuritystudies.com/Margolis%20Intelligence%20(ag%20edits).pdf The United States has accumulated an unequivocal ability to collect intelligence as a result of the technological advances of the 20th century. Numerous methods of collection have been employed in clandestine operations around the world including those that focus on human, signals, geospatial, and measurements and signals intelligence. An infatuation with technological methods of intelligence gathering has developed within many intelligence organizations, often leaving the age old practice of espionage as an afterthought. As a result of the focus on technical methods, some of the worst intelligence failures of the 20th century can be attributed to an absence of human intelligence. The 21st century has ushered in advances in technology have allowed UAVs to become the ultimate technical intelligence gathering platform; however human intelligence is still being neglected. The increasing reliance on UAVs will make the United States susceptible to intelligence failures unless human intelligence can be properly integrated . In the near future UAVs may be able to gather human level intelligence, but it will be a long time before classical espionage is a thing of the past. HUMINT key to verification of nuclear weaponization in North Korea Johnson ‘9 - Most spending goes to expensive intelligence hardware Surveillance satellites can’t look inside North Korean nuclear facilities (apparently they’re underground lol) Dr. Loch K. Johnson is Regents Professor of Political Science at the University of Georgia. He is editor of the journal "Intelligence and National Security" and has written numerous books on American foreign policy. Dr. Johnson served as staff director of the House Subcommittee on Intelligence Oversight from 1977 to 1979. Dr. Johnson earned his Ph.D. in political science from the University of California at Riverside. "Evaluating "Humint": The Role of Foreign Agents in U.S. Security" Paper presented at the annual meeting of the ISA's 50th ANNUAL CONVENTION "EXPLORING THE PAST, ANTICIPATING THE FUTURE", New York Marriott Marquis, NEW YORK CITY, NY, USA, Feb 15, 2009 – available via: http://citation.allacademic.com/meta/p_mla_apa_research_citation/3/1/0/6/6/p310665_index.html Despite the many negative critiques of humint, former DCI Tenet emphasizes that intelligence is still "primarily a human endeavor.” — He is obviously not referring to the government's intelligence budget priorities. Recall that the United States devotes only a small percentage of its annual intelligence budget to human spying. — Spy machines are costly, while human agents are relatively inexpensive to hire and sustain on an annual stipend. One of the ironies of American intelligence is that the vast percentage of its spending goes into expensive intelligence hardware, especially surveillance satellites, even though the value of these machines is questionable in helping the United States understand such contemporary global concerns as terrorism or China's economic might. Cameras mounted on satellites or airplanes are unable to peer inside the canvas tents, mud huts, or mountain caves in Afghanistan or Pakistan where terrorists plan their lethal operations, or into the deep underground caverns where North Koreans construct atomic weapons. "Space cameras cannot see into factories where missiles are made, or into the sheds of shipyards," writes an intelligence expert. "Photographs cannot tell whether stacks of drums outside an assumed chemical-warfare plant contain nerve gas or oil, or whether they are empty” — _As a U.S. intelligence officer has observed, we need "to know what's inside the building, not what the building looks like”. North Korean proliferation is increasing now Huessy 6/11 (Peter, 2015, Peter Huessy is President of GeoStrategic Analysis, founded in 1981, and the senior defense consultant at the Air Force Association and National Security Fellow at the American Foreign Policy Council, “North Korea's Serious New Nuclear Missile Threat,” http://www.gatestoneinstitute.org/5914/north-korea-nuclear-missile)//RTF North Korea appears to have made significant progress in extending its capability as a nucleararmed rogue nation, to where its missiles may become capable of hitting American cities with little or no warning. What new evidence makes such a threat compelling? North Korea claims to have nuclear warheads small enough to fit on their ballistic missiles and missiles capable of being launched from a submerged platform such as a submarine. Shortly after North Korea's April 22, 2015 missile test, which heightened international concern about the military capabilities of North Korea, U.S. Secretary of State John Kerry urged China and our regional allies to restart the 2003 "six-party talks" aimed at eliminating nuclear weapons from the Korean peninsula and reining in North Korea's expanding nuclear missile program. There are some "experts," however, who believe that North Korea's threat is highly exaggerated and poses no immediate danger to the United States. Consequently, many believe that, given China's oft-repeated support for a "nuclear weapons free" Korean peninsula, time is on America's side to get an agreement that will guarantee just such a full de-nuclearization. But, if North Korea's technical advances are substantive, its missiles, armed with small nuclear weapons, might soon be able to reach the continental United States -- not just Hawaii and Alaska. Further, if such missile threats were to come from submarines near the U.S., North Korea would be able to launch a surprise nuclear-armed missile attack on an American city. In this view, time is not on the side of the U.S. Submarine-launched missiles come without a "return address" to indicate what country or terrorist organization fired the missile. The implications for American security do not stop there. As North Korea is Iran's primary missile-development partner, whatever North Korea can do with its missiles and nuclear warheads, Iran will presumably be able to do as well. One can assume the arrangement is reciprocal. Given recent warnings that North Korea may have upwards of 20 nuclear warheads, the United States seems to be facing a critical new danger. Would renewed negotiations with China, Japan, South Korea and North Korea really be able to address this threat? Two years ago, Andrew Tarantola and Brian Barrett said there was "no reason to panic;" that North Korea was "a long way off" -- in fact "years" -- before its missiles and nuclear weapons could be "put together in any meaningful way." At the same time, in April 2013, an official U.S. assessment by the Defense Intelligence Agency stated the U.S. had "moderate" confidence that "North Korea had indeed developed a nuclear device small enough to mount on a ballistic missile." That was followed up two years later, on April 7, 2015, when the commander of Northcom, Admiral Bill Gortney, one of the nation's leading homeland security defenders, said the threat was considerably more serious. He noted that, "North Korea has deployed its new road-mobile KN-08 intercontinental ballistic missile and was capable of mounting a miniaturized nuclear warhead on it."[1] At a Pentagon press briefing in April, Admiral Cecil Haney, Commander of the US Strategic Command and America's senior military expert on nuclear deterrence and missile defense, said it was important to take seriously reports that North Korea can now make small nuclear warheads and put them on their ballistic missiles.[2] And sure enough, in April, North Korea launched a ballistic missile from a submerged platform. Media reaction to the North Korean test has been confused. Reuters, citing the analysis of two German "experts," claimed the North Korean test was fake -a not-too-clever manipulation of video images. The Wall Street Journal, on May 21, 2015, echoed this view, noting: "[F]or evidence of North Korea's bending of reality to drum up fears about its military prowess," one need look no further than a consensus that North Korea "doctored" pictures of an alleged missile test from a submarine. This, they claimed, was proof that the "technology developments" by North Korea were nothing more than elaborately faked fairy tales. However, Israeli missile defense expert Uzi Rubin -- widely known as the "father" of Israel's successful Arrow missile defense program -- explained to this author that previous North Korean missile developments, which have often been dismissed as nothing more than mocked-up missiles made of plywood, actually turned out to be the real thing -- findings confirmed by subsequent intelligence assessments. Rubin, as well as the South Korean Defense Ministry, insist that on April 22, the North Korean military did, in fact, launch a missile from a submerged platform.[3] Kim Jong Un, the "Supreme Leader" of North Korea, supervises the April 22 test-launch of a missile from a submerged platform. (Image source: KCNA) What gave the "faked" test story some prominence were the misunderstood remarks of the Vice Chairman of the Joint Chiefs of Staff, Admiral James Winnefeld. He had said, on May 19, that the North Korean missile launch was "not all" that North Korea said it was. He also mentioned that North Korea used clever video editors to "crop" the missile test-launch images. Apparently, that was exactly what the editors did. The Admiral, however, never claimed in his speech at the Center for Strategic and International Studies there had been no successful missile test.[4] The same day, a high-ranking State Department official, Frank Rose -- Assistant Secretary of State for Arms Control, Verification, and Compliance -- told a Korean security seminar on Capitol Hill that North Korea had successfully conducted a "missile ejection" test, but from an underwater barge rather than a submarine.[5] To confuse matters further, additional pictures were released by the South Korean media to illustrate stories about the North Korean test. Those pictures, however, were of American missiles, which use both solid and liquid propellant; as a result, one photo showed a U.S. missile with a solid propellant smoke trail and one, from a liquid propellant, without a smoke trail. These photographs apparently befuddled Reuters' "experts," who may have jumped to the conclusion that the photos of the North Korean test were "faked," when they were simply of entirely different missile tests, and had been used only to "illustrate" ocean-going missile launches and not the actual North Korean test.[6] According to Uzi Rubin, to achieve the capability to eject a missile from an underwater platform is a significant technological advancement. The accomplishment again illustrates "that rogue states such as North Korea can achieve military capabilities which pose a notable threat to the United States and its allies." Rubin also stated that the North Korean underwater launch test was closely related to the development of a missile-firing submarine, "a first step in achieving a very serious and dangerous new military capability."[7] Admiral Winnefeld and Secretary Rose, in their remarks, confirmed that the North Korean test was not the "dog and pony show" some have claimed. In other words, the U.S. government has officially confirmed that the North Koreans have made a serious step toward producing a sea-launched ballistic missile capability. While such an operational capability may be "years away," Rubin warns that "even many years eventually pass, and it will also take many years to build up the missile defenses, so we had better use the time wisely."[8] Will diplomacy succeed in stopping the North Korean threats? U.S. Secretary of State John Kerry seemed to think it worth a try; so he began the push to restart the old 2003 "six-party" talks between the United States, North Korea, Russia, China, South Korea and Japan, to bring North Korea's nuclear weapons under some kind of international control and eventual elimination. After all, supporters of such talks claim, similar talks with Iran appear to be leading to some kind of "deal" with Tehran, to corral its nuclear weapons program, so why not duplicate that effort and bring North Korea back into the non-nuclear fold? What such a "deal," if any, with Iran, will contain, is at this point unknown. Celebrations definitely seem premature. If the "deal" with North Korea is as "successful" as the P5+1's efforts to rein in Iran's illegal nuclear weapons program, the prognosis for the success of diplomacy could scarcely be more troubling. Bloomberg's defense writer, Tony Carpaccio, reflecting Washington's conventional wisdom, recently wrote that of course China will rein in North Korea's nuclear program: "What might be a bigger preventative will be the protestations of China, North Korea's primary trade partner and only prominent international ally. Making China angry would put an already deeply impoverished, isolated North Korea in even more dire straits." Unfortunately, no matter how attractive a strategy of diplomatically ending North Korea's nuclear program might look on the surface, it is painfully at odds with China's established and documented track record in supporting and carrying out nuclear proliferation with such collapsed or rogue states as Iran, Syria, Pakistan, North Korea and Libya, as detailed by the 2009 book The Nuclear Express, by Tom C. Reed (former Secretary of the Air Force under President Gerald Ford and Special Assistant to the President of National Security Affairs during the Ronald Reagan administration) and Daniel Stillman (former Director of the Lawrence Livermore National Laboratory). Far from being a potential partner in seeking a non-nuclear Korean peninsula, China, say the authors, has been and is actually actively pushing the spread of nuclear weapons to rogue states, as a means of asserting Chinese hegemony, complicating American security policy and undermining American influence. The problem is not that China has little influence with North Korea, as China's leadership repeatedly claims. The problem is that China has no interest in pushing North Korea away from its nuclear weapons path because the North Korean nuclear program serves China's geostrategic purposes. As Reed and Stillman write, "China has been using North Korea as the re-transfer point for the sale of nuclear and missile technology to Iran, Syria, Pakistan, Libya and Yemen". They explain, "Chinese and North Korean military officers were in close communication prior to North Korea's missile tests of 1998 and 2006". Thus, if China takes action to curtail North Korea's nuclear program, China will likely be under pressure from the United States and its allies to take similar action against Iran and vice versa. China, however, seems to want to curry favor with Iran because of its vast oil and gas supplies, as well as to use North Korea to sell and transfer nuclear technology to both North Korea and Iran, as well as other states such as Pakistan. As Reed again explains, "China has catered to the nuclear ambitions of the Iranian ayatollahs in a blatant attempt to secure an ongoing supply of oil". North Korea is a partner with Iran in the missile and nuclear weapons development business, as Uzi Rubin has long documented. Thus, it is reasonable to believe that China may see any curtailment of North Korea's nuclear program as also curtailing Iran's access to the same nuclear technology being supplied by North Korea. Any curtailment would also harm the Chinese nuclear sales business to Iran and North Korea, especially if China continues to use the "North Korea to Iran route" as an indirect means of selling its own nuclear expertise and technology to Iran. It is not as if Chinese nuclear proliferation is a recent development or a "one of a kind" activity. As far back as 1982, China gave nuclear warhead blueprints to Pakistan, according to Reed. These findings indicate that China's nuclear weapons proliferation activities are over three decades old.[9] Reed and Stillman also note that nearly a decade later, China tested a nuclear bomb "for Pakistan" on May 26, 1990, and that documents discovered in Libya when the George W. Bush administration shut down Libyan leader Muammar Kaddafi's nuclear program revealed that China gave Pakistan the CHIC4 nuclear weapon design. Unfortunately, China's nuclear assistance to Pakistan did not stay just in Pakistan. The nuclear technology made its way from Pakistan to North Korea. For example, high explosive craters, construction of a 50 megawatt nuclear reactor (finished in 1986) and a secret reprocessing facility begun in 1987 all were done in North Korea with major Pakistani help from the A.Q. Khan "Nukes R Us" smuggling group, as Reed and Stillman document in their book. Reed and Stillman write that when, amid disclosures in 2003 of a major Libyan nuclear weapons program, the U.S. government sought help in shutting down the Khan nuclear smuggling ring, "Chinese authorities were totally unhelpful, to the point of stonewalling any investigation into Libya's nuclear supply network." More recently, Chinese companies have now twice -- in 2009 and 2011 -- been indicted by the Attorney for the City of New York for trying to provide Iran with nuclear weapons technology. The indictments document that Chinese companies were selling Iran steel for nuclear centrifuges and other banned technology. A leaked State Department cable, discussing the indictments at the time, revealed "details on China's role as a supplier of materials for Iran's nuclear program," and that "China helped North Korea ship goods to Iran through Chinese airports." And more recently, in April 2015, the Czech government interdicted additional nuclear technology destined for Iran -- the origin of which remains unknown -- in violation of current sanctions against Iran. From 1982 through at least the first part of 2015, the accumulation of documentary evidence on nuclear proliferation reveals two key facts: First, despite literally hundreds of denials by Iran that it is seeking nuclear weapons, and amid current negotiations to end Iran's pursuit of nuclear weapons, there is solid evidence that Iran still seeks nuclear weapons technology; and that North Korea has nuclear weapons and is advancing their capability. Second, China continues to transfer, through its own territory, nuclear weapons technology involving both North Korea and Iran. Although the Chinese profess to be against nuclear proliferation, their track record from the documented evidence illustrates just the opposite. In summary, it is obvious North Korea's nuclear weapons and ballistic missiles are a serious threat to America and its allies. And China, from its proliferation record for the past three decades, is making such a threat more widespread. In this light, is dismissing North Korea's advances in military technology and ignoring China's record of advancing its neighbors' nuclear weapons technology really best for U.S. interests? That causes miscalc- leads to global nuclear war Metz 13 – Chairman of the Regional Strategy and Planning Department and Research Professor of National Security Affairs at the Strategic Studies Institute (Steven, 3/13/13, “Strategic Horizons: Thinking the Unthinkable on a Second Korean War,” http://www.worldpoliticsreview.com/articles/12786/strategichorizons-thinking-the-unthinkable-on-a-second-korean-war) Today, North Korea is the most dangerous country on earth and the greatest threat to U.S. security. For years, the bizarre regime in Pyongyang has issued an unending stream of claims that a U.S. and South Korean invasion is imminent, while declaring that it will defeat this offensive just as -- according to official propaganda -- it overcame the unprovoked American attack in 1950. Often the press releases from the official North Korean news agency are absurdly funny, and American policymakers tend to ignore them as a result. Continuing to do so, though, could be dangerous as events and rhetoric turn even more ominous. In response to North Korea's Feb. 12 nuclear test, the U.N. Security Council recently tightened existing sanctions against Pyongyang. Even China, North Korea's long-standing benefactor and protector, went along. Convulsed by anger, Pyongyang then threatened a pre-emptive nuclear strike against the United States and South Korea, abrogated the 1953 armistice that ended the Korean War and cut off the North-South hotline installed in 1971 to help avoid an escalation of tensions between the two neighbors. A spokesman for the North Korean Foreign Ministry asserted that a second Korean War is unavoidable. He might be right; for the first time, an official statement from the North Korean government may prove true. No American leader wants another war in Korea. The problem is that the North American policymakers fail to recognize signs of impending attack every recent war began with miscalc policymakers misunderstood intent of opponents Koreans make so many threatening and bizarre official statements and sustain such a high level of military readiness that . After all, their might U.S. the ulation; American the , who in turn underestimated American determination. The conflict with North Korea could repeat this pattern. Since the regi me of Kim Jong Un has continued its predecessors’ tradition of responding hysterically to every action and statement it doesn't like, it's hard to assess exactly what might push Pyongyang over the edge and cause it to lash out. It could be something that the United States considers modest and reasonable, or it could be some sort of internal power struggle within the North Korean regime invisible to the outside world. While we cannot know whether the recent round of threats from Pyongyang is serious or simply more of the same old lathering, it would be prudent to think the unthinkable and reason through what a war instigated by a fearful and delusional North Korean regime might mean for U.S. security. The second Korean War could begin with missile strikes Early attacks include nuc s something North Korea has prepared for many decades. might lear weapon against South Korean, Japanese or U.S. targets, or with a combination of missile strikes and a major conventional invasion of the South -, but even if they didn't, the United States would probably move quickly to destroy any existing North Korean nuclear weapons and ballistic missiles. The war itself would be extremely costly and probably long. North Korea is the most militarized society on earth. Its armed forces are backward but huge. It's hard to tell whether the North Korean people, having been fed a steady diet of propaganda based on adulation of the Kim regime, would resist U.S. and South Korean forces that entered the North or be thankful for relief from their brutally parasitic rulers. As the conflict in Iraq showed, the United States and its allies should prepare for widespread, protracted resistance even while hoping it doesn't occur. Extended guerrilla operations and insurgency could potentially last for years following the defeat of North Korea's conventional military. North Korea would need massive relief, as would South Korea and Japan if Pyongyang used nuclear weapons. Stabilizing North Korea and developing an effective and peaceful regime would require a lengthy occupation, whether U.S.-dominated or with the United States as a major contributor. The second Korean War would force military mobilization in the U S This would shock the economy and nited initially involve the military's existing reserve component, but it would probably ultimately require a major expansion of th e U.S. military and hence a draft. The military's training infrastructure and the defense industrial base would have to grow. government spending in the United States and postpone serious deficit reduction for some time, even if Washington increased taxes to help fund the war. Moreover, a second Korean conflict have destabiliz ing effects outside Northeast Asia tates. This would would be a body blow to efforts to cut global potentially . Eventually, though, the United States and its allies would defeat the North Korean military. At that point it would be impossible for the United States to simply re-establish the status quo ante bellum as it did after the first Korean War. The Kim regime is too unpredictable, desperate and dangerous to tolerate. Hence regime change and a permanent ending to the threat from North Korea would have to be America's strategic objective. China would pose the most pressing and serious challenge to such a transformation of North Korea. After all, Beijing's intervention saved North Korean dictator Kim Il Sung after he invaded South Korea in the 1950s, and Chinese assistance has kept the subsequent members of the Kim famil y dictatorship in power. Since the second Korean War would invariably begin like the first one - with North Korean aggression -- hopefully China has matured enough as a great power to allow the world to remove its dangerous allies this time. If the war began with out-of-the-blue North Korean missile strikes, China could conceivably even contribute to a multinational operation to remo ve the Kim regime. Still, China would vehemently oppose a long-term U.S. military presence in North Korea or a unified Korea allied with the United States. One way around this might be a g rand bargain leaving a unified but neutral Korea. However appealing this might be, Korea might hesitate to adopt the result could be economic connections do not prevent neutrality as it sits just across the Yalu River from a China that tends to claim all territory that it controlled at any poi nt in its history. If the aftermath of the second Korean War is not handled adroitly, U S war nited tates and China , perhaps even a new cold war . After all, history shows that deep easily automatically heightened hostility between the nations from hostility and -- in 1914 Germany was heavily involved in the Russian economy and had extensive trade and financial ties with France and Great Britain. It is not in conceivable then, that after the second Korean War, U.S.-China relations would be antagonistic and hostile at the same time that the two continued mutual trade and investment. Stranger things have happened in statecraft. Effective verification creates deals that stop prolif Hernandez 13 – Research Associate, Monterey Institute of International Studies (Jason, “Proliferation Pathways to a North Korean Intercontinental Ballistic Missile”, Nuclear Threat Initiative, Dec. 20, 2013) RMT During the Clinton Administration, the United States and North Korea came extremely close to concluding a "Missile Deal" that would have halted North Korean development, production, and testing of increasingly longer-range missiles. However, the deal never came to fruition, and under the Bush Administration it was scrapped completely. One of the primary issues for both the Clinton and Bush administrations was monitoring and verification. The United States sought a comprehensive monitoring and verification regime that would have permitted U.S. inspectors on-site access to rocket and missile facilities, while North Korea believed that the United States could accomplish verification through imagery analysis and other national technical means. [20] It is therefore likely that any future missile deal negotiations will focus heavily upon verification. Detection and Monitoring Any advances in rocket technology using the three pathways described above will require numerous tests before the missile can be accepted into service and deployed. Given North Korea's limited geographical size, all long-range missile tests will result in debris falling into international waters. For the December 2012 Unha-3 launch, the rocket's first stage fell into the Yellow Sea, and the second fell off the coast of the Philippines. By recovering the first stage debris, South Korea was able to confirm some facts about the Unha, while discovering new data that indicated progress in the Unha's design. The debris demonstrated continued areas of struggle and primitive design elements, such as in the propellant, airframe, and welding, while also showing program advancements and new design elements, such as the use of steering engines in place of jet vanes for orientation. [21] It is reasonable to assume that over the course of a testing program, debris will be recovered to enlighten the world on the progress of North Korea's missile program. New deployment methods, such as the use of silos or road-mobile launchers in pathways two or three will not necessarily be detected. While the construction of silos could be detected by satellite imagery analysis, it is not guaranteed that the international community would detect every silo. Iran's Shahab silos went unnoticed in the open source until displayed on Iranian media during the Great Prophet 6 military exercises. [22] A road-mobile TD-2/Unha would seemingly go undetected unless paraded or displayed publically. The KN-08 was unknown in the open source until it was displayed at the April 2012 military parade in Pyongyang. Deployments and launches of silo-based or road-mobile TD2/Unha's would be very difficult to detect and monitor. Verification The issue of verification is complex, and any missile deal will undoubtedly cover the entirety of North Korea's missile production, from battlefield and short-range ballistic missiles to space launch vehicles and ICBMs. However, this brief will only address the relationship between a missile deal and the three pathways to an ICBM. For the purpose of this section, the author assumes that a future missile deal will either aim to prevent or reverse a missile program in four key areas: development; manufacturing and production; acquisition; and deployment. The question becomes for each of the three pathways to an ICBM, can the international community verify that North Korea is abiding by a deal that prevents or reverses 1) development; 2) manufacturing and production; and 3) deployment of an ICBM? Verification efforts are a deterrent and prevent tech development Walker 11--UK Foreign and Commonwealth Office’s Arms Control and Disarmament Research Unit (ACDRU) since March 1985.Published widely on aspects of CBW history in the Harvard-Sussex Program’s ‘The CBW Conventions Bulletin’[John R., “The CTBT: Verification and Deterrence”, VERTIC BRIEF • 16 • OCTOBER 2011]RMT We can however consider that any state contemplating a clandestine programme, or in this case one or more underground nuclear tests, must make certain calculations about its ability to conceal all of the evidence all of the time from a watchful international community. Balancing risks—military and strategic gains against the political, diplomatic and economic costs—is not easy. A potential violator has to be sure that his preparations to test, as well as its conduct and aftermath, can be concealed from the international community indefinitely. In the case of the CTBT, it will be a combination of national technical means (NTMs) and the treaty’s International Monitoring System (IMS) and on-site inspections that place a series of high hurdles in the face of a would-be proliferator. Tripping over just one can compromise his plans and negate any conceivable military advantage that he might have been hoping to derive from a clandestine test, or tests. It is worth recalling here that Sir William Penney, the leader of the UK’s nuclear weapons programme in the 1950s and early 1960s, advised Harold Macmillan’s government in 1962 that even though the Soviet Union might be confident in avoiding the detection of one test under the then envisaged verification system, it could not be at all sure that a series of, say, three tests would go unnoticed. Penney’s view was that one test would not alter the strategic balance and so the risk of a test ban treaty was worth taking as one would need a series of tests to obtain a strategically significant advantage. M ore than fifty years later we have the CTBT’s IMS, which, as of August 2011, has 86 per cent of its primary stations (including seismic, hydroacoustic, infrasound and radionuclide stations), 83 per cent of its auxiliary seismic stations and 63 per cent of its radionuclide laboratories certified. Their detection capabilities are immeasurably superior to those planned by the 1958 Geneva seismic experts’ meeting. Simulations of global detection thresholds today, measured in terms of equivalent nuclear-yield in kilotons of TNT (kt), suggest that the IMS network is capable of detecting and identifying, worldwide, explosions fired close- coupled underground in hard rock, in the atmosphere, and in the ocean, with a yield equal to or more than one kiloton. In many areas of the world, such as continental Eurasia, the detection threshold is significantly less than one kiloton. In the 1977–1980 Tripartite Test Ban Treaty negotiations, UK and US scientists took the view The CTBT: Verification and Deterrence2 that it would only be yields of around ten kilotons that would permit meaningful developments in new warhead design. Any state contemplating a clandestine test has to be sure that, even assuming its preparations go find the right geological conditions on its territory in a reasonably remote area. It has to be sure, too, that it can stem a borehole or tunnel effectively to guarantee no venting of radioactive undetected (it can take about a year to prepare for an underground test), it still must particles or radioactive noble gases that could be picked up by IMS radionuclide stations. Such a task would be challenging for a state with no prior experience of underground testing. Then there is the small matter of the seismic stations— primary and auxiliary—detecting the event and the strong likelihood that it will be subsequently correctly identified as an explosion from the Treaty’s International Data Centre (IDC) Reviewed Events Bulletin. How convincing an explanation could a state provide when pressed for clarification under the Treaty’s Article IV provisions? Could it be absolutely confident that it could conjure up a fool-proof cover story that would hoodwink all of the treaty’s states parties? This is where we first begin to see that the more effective the verification system and the greater the integration of the elements that combine to make it up, the greater the level of deterrence of non-compliance is. A regime that can demonstrate a very high level of technical reliability, coverage and sensitivity presents a formidable obstacle to anyone who wants to cheat. The IMS does that. A state might hope that the CTBT Organisation’s Executive Council would fail to act on the compelling evidence presented by the IDC as well as any supporting information from states parties NTMs and other sources (such as commercial satellite data) and vote against an on-site inspection. However, could any state guarantee that this would indeed be the case? Just how confident ahead of time could it be? As Tibor Toth— the Provisional Technical Secretariat (PTS) Executive Secretary—has pointed out, the very nature of the Treaty’s verification regime will be democratic in that the information behind an inspection request is derived from an independent system whose results are open to all states parties. There may, therefore, be very strong pressures to respond to a well-substantiated compliance concern, which it would be politically much more difficult to ignore or dismiss. Building an on-site inspection capability for the CTBT is a demanding and lengthy process—but such a capability provides the one clear way of confirming that an event that triggered an inspection was a nuclear test conducted in violation of the treaty’s Article I prohibitions. Effective inspections require a well-equipped, trained and experienced cadre of inspectors and an ability to deploy to the field promptly. If the future Technical Secretariat cannot meet these criteria then the OSI regime is a paper tiger. However, major strides have been taken by the PTS and some states signatories in recent years and efforts are continuing on building up an initial capability that would be fit for purpose on entry-into-force of the treaty. There will be a large-scale OSI exercise Integrated Field Exercise in 2014 that will be a key milestone in the development of the Treaty’s OSI regime. OSIs present a violator with an array of techniques and technologies that will make it immensely difficult to be sure that absolutely all incriminating traces of illegal activity can be concealed for up to the 130 days that an inspection could last. Deployment of these techniques and technologies in an integrated and intelligent manner provides a potent tool for detecting non-compliance. And, if the traces cannot be concealed, finding sustainable and convincing technical explanations that will persuade not just the inspectors but the Executive Council back in Vienna is no easy matter. The Council will review the final inspection report and determine whether any non-compliance has occurred. Knowing that the treaty’s OSI capability is effective and would stand a very good chance of uncovering facts strongly suggestive of non-compliance, a cheating state will have to obstruct the inspectors in the field. A systematic pattern of evasion, delay, obstruction, obfuscation and down-right hostility tells its own story, especially since inspectors are allowed to comment on the co-operation (or lack thereof ) provided by an Inspected State Party in their final inspection report. Even a remote chance of detection is a difficult thing for a would-be violator to guard against. Moreover, the greater the level of uncertainty in the mind of such a state, the greater the role that OSIs play in the deterrent effect of the treaty’s overall verification regime. During the 1977–1980 tripartite test ban treaty nego- tiations the UK noted that: ‘Ther e is no known remote method of determining unambiguously whether an underground event was man-made in origin and, if so, was due to a nuclear explosion. Such conclusive evidence is only obtainable b y a n o n-the-spot i nvestigation i nto t he p resence of radioactive materials. Provision for OSI would help deter clandestine testing by posing a threat that it would be identified as such; OSI would also enhance the confidence of all parties to the treaty that its provisions were being observed.’ This statement remains valid today. 1 The CTBT verification regime—comprising the IMS stations (i.e. primary seismic, auxiliary seismic, hyrdoacoustic, infrasound and radionuclide, including stations with radioactive noble gas detection capabilities), the International Data Centre, National Data Centres, consultations and clarification procedures and on-site inspections armed with an array of detection techniques and technologies—presents a formidable set of obstacles for a would-be violator to surmount. And in this equation we should not overlook the role that can be played by NTMs—remote sensing data such as multispectral and infrared images to give but one example. Nor should we forget that science and technology does not stand still and we can confidently expect that the capabilities of all aspects of the verification regime will increase. In particular, as the June 2011 Science and Technology for the CTBT Conference in Vienna noted, progress in sensors, networks and observational technologies as well as in computing and We might still not know exactly what deters in deterrence in the context of preventing non-compliance in arms control and disarmament agreements, but in the context of the CTBT the negotiators designed an integrated system that will clearly complicate the processing offer promising benefits for the efficacy of all components of the treaty’s verification regime. plans of any state thinking that it could evade that system successfully and derive a meaningful political, military or strategic advantage from doing so. The overall regime must inevitably impact on the calculations of a wouldbe evader, and the higher the assurance of detection the more uncertain he must be that he can get away with cheating. Deterrence of non-compliance is therefore strengthened. Status quo programs like “Accumulo” empirically fail Konkel, 13 Frank Konkel is the editorial events editor for Government Executive Media Group and a technology journalist for its publications. He writes about emerging technologies, privacy, cybersecurity, policy and other issues at the intersection of government and technology. He began writing about technology at Federal Computer Week. Frank is a graduate of Michigan State University. “NSA shows how big 'big data' can be” - FCW - Federal Computer Week is a magazine covering technology - Jun 13, 2013 http://fcw.com/articles/2013/06/13/nsa-big-data.aspx?m=1 As reported by Information Week, the NSA relies heavily on Accumulo, "a highly distributed, massively parallel processing key/value store capable of analyzing structured and unstructured data" to process much of its data. NSA's modified version of Accumulo, based on Google's BigTable data model, reportedly makes it possible for the agency to analyze data for patterns while protecting personally identifiable information – names, Social Security numbers and the like. Before news of Prism broke, NSA officials revealed a graph search it operates on top of Accumulo at a Carnegie Melon tech conference. The graph is based on 4.4 trillion data points, which could represent phone numbers, IP addresses, locations, or calls made and to whom; connecting those points creates a graph with more than 70 trillion edges. For a human being, that kind of visualization is impossible, but for a vast, high-end computer system with the right big data tools and mathematical algorithms, some signals can be pulled out. Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee, publicly stated that the government's collection of phone records thwarted a terrorist plot inside the United States "within the last few years," and other media reports have cited anonymous Needles in endless haystacks of data are not easy to find , and the NSA's current big data analytics methodology is far from a flawless system, as evidenced by the April 15 Boston Marathon bombings that killed three people and injured more than 200. The bombings were carried out by Chechen brothers Dzhokhar and Tamerlan Tsarnaev, the latter of whom was previously interviewed by the Federal Bureau of Investigation after the Russian Federal Security Service notified the agency in 2011 that he was a follower of radical Islam. The brothers had made threats on Twitter prior to their attack as well, meaning several data points of suspicious behavior existed, yet no one detected a pattern in time to prevent them from setting off bombs in a public place intelligence insiders claiming several plots have been foiled. filled with people. "We're still in the genesis of big data, we haven't even scratched the surface yet," said big data expert Ari Zoldan, CEO of New-York-based Quantum Networks. " In many ways, the technology hasn't evolved yet, it's still a new industry." Advantage Two is Competitiveness Snowden leaks jeopardized credibility and public confidence – only the plan solves Vijayan 14 (Jaikumar, writer for Computer World who specializes in privacy topics, formerly worked as a contributor to the Economic Times, “Tech groups press Congress to pass USA Freedom Act”, http://www.computerworld.com/article/2604630/tech-groups-press-congress-to-pass-usa-freedomact.html) Concerns over the U.S. government's data collection activities have caused substantial problems for U.S. technology companies over the past year. Former NSA contractor Edward Snowden's leaks about PRISM and other NSA data collection programs have caused U.S. companies to lose customers and business in other countries. Technology giants like IBM and Cisco have reported blowback from overseas customers as a result of concerns stoked by Snowden's revelations. Some have predicted that U.S. cloud hosting companies could lose tens of billions of dollars over the next few years as overseas customers take their business to foreign rivals. Many vendors, including Google, Microsoft and others have asked the government for permission to disclose more details about the kind of customer data they have provided to the government in recent years in response to requests under the Patriot Act and FISA. The companies have argued that such transparency is vital to regaining the confidence of international customers. It is against this background that the tech groups are calling for quick passage of the USA Freedom Act. Reforms contained in the bill "will send a clear signal to the international community and to the American people that government surveillance programs are narrowly tailored, transparent, and subject to oversight," this week's letter to the senators noted. U.S. technology companies have experienced losses in overseas markets as a result of the surveillance programs revelations, the letter noted. Other countries are also mulling proposals that would limit free data flows between countries, the letter cautioned. The measures in the USA Freedom Act would alleviate some of these concerns and would help restore faith in the U.S. government and the U.S. technology sector, the letter said. Civil rights groups and the Electronic Freedom Foundation, which support the bill, called it a good first step in reining in the NSA's domestic data collection practices. The bill addresses many concerns but still leaves some wiggle room for the NSA and other U.S. spy agencies to exploit it to their advantage, the EFF said in blog post this week. Even so, it offers the best chance for some positive change, according to the EFF. "Congress can do the right thing by pushing forward with the USA Freedom Act and passing much needed NSA reform," the EFF said. That destroys US tech competitiveness – the plan solves Mindock ’15 (Clark Mindock - Reporting Fellow at International Business Times – Internally quoting The Information Technology and Innovation Foundation. ITIF is a non-partisan research and educational institute – a think tank – whose mission is to formulate and promote public policies to advance technological innovation and productivity internationally, in Washington, and in the states. “NSA Surveillance Could Cost Billions For US Internet Companies After Edward Snowden Revelations” - International Business Times June 10 2015 http://www.ibtimes.com/nsa-surveillance-could-cost-billions-us-internet-companies-afteredward-snowden-1959737) Failure to reform National Security Administration spying programs revealed by Edward Snowden could be more economically taxing than previously thought, says a new study published by the Information Technology and Innovation Foundation Tuesday. The study suggests the programs could be affecting the tech nology sector as a whole , not just the cloud-computing sector , and that the costs could soar much higher than previously expected. Even modest declines in cloud computing revenues from the revealed surveillance programs, according to a previous report, would cost between $21.5 billion and $35 billion by 2016. New estimates show that the toll “will likely far exceed ITIF’s initial $35 billion estimate.” “The U.S. government’s failure to reform many of the NSA’s surveillance programs has damaged the competitiveness of the U.S. tech sector and cost it a portion of the global market share,” a summary of the report said. Revelations by defense contractor Snowden in June 2013 exposed massive U.S. government surveillance capabilities and showed the NSA collected American phone records in bulk, and without a warrant. The bulk phone-record revelations, and many others in the same vein, including the required complacency of Internet companies in providing the data , raised questions about the transparency of American surveillance programs and prompted outrage from privacy advocates. The study, published this week, argues that unless the American telecom and American government can vigorously reform how NSA surveillance is regulated and overseen, U.S. companies will lose contracts and, ultimately, their competitive edge in a global market as consumers around the world choose cloud computing and technology options that do not have potential ties to American surveillance programs. The report comes amid a debate in Congress on what to do with the Patriot Act, the law that provides much of the authority for the surveillance programs. As of June 1, authority to collect American phone data en masse expired, though questions remain as to whether letting that authority expire is enough to protect privacy. Supporters of the programs argue that they provide the country with necessary capabilities to fight terrorism abroad. A further reform made the phone records collection process illegal for the government, and instead gave that responsibility to the telecom companies. The industry is key to the global economy – facilitates private growth and innovation Polonetsky and Tene 13 (Jules, Co-Chair and Director, Future of Privacy Forum, and Tene, Associate Professor, College of Management Haim Striks School of Law, Israel; Senior Fellow, Future of Privacy Forum; Affiliate Scholar, Stanford Center for Internet and Society, published in the Stanford Law Review, “Privacy and Big Data: Making Ends Meet”, http://www.stanfordlawreview.org/online/privacy-and-bigdata/privacy-and-big-data) Big data analysis often benefits those organizations that collect and harness the data. Data-driven profits may be viewed as enhancing allocative efficiency by facilitating the “free” economy.[15] The emergence, expansion, and widespread use of innovative products and services at decreasing marginal costs have revolutionized global economies and societal structures , facilitating access to technology and knowledge[16] and fomenting social change.[17] With more data, businesses can optimize distribution methods , efficiently allocate credit , and robustly combat fraud, benefitting consumers as a whole.[18] But in the absence of individual value or broader societal gain, others may consider enhanced business profits to be a mere value transfer from individuals whose data is being exploited. In economic terms, such profits create distributional gains to some actors (and may in fact be socially regressive) as opposed to driving allocative efficiency. D. Society Finally, some data uses benefit society at large. These include, for example, data mining for purposes of national security. We do not claim that such practices are always justified; rather, that when weighing the benefits of national security driven policies, the effects should be assessed at a broad societal level. Similarly, data usage for fraud detection in the payment card industry helps facilitate safe, secure, and frictionless transactions, benefiting society as a whole. And large-scale analysis of geo-location data has been used for urban planning, disaster recovery, and optimization of energy consumption. E. Benefits Big data creates enormous value for the global economy , driving innovation, productivity, efficiency, and growth. Data has become the driving force behind almost every interaction between individuals, businesses, and governments. Economic decline goes nuclear and escalates Royal 10 (Jedediah Royal is the Director of Cooperative Threat Reduction at the U.S. Department of Defense, “Economics of War and Peace: Economic, Legal, and Political Perspectives”, pg. 213-215) Less intuitive is how periods of economic decline may increase the likelihood of external conflict. Political science literature has contributed a moderate degree of attention to the impact of economic decline and the security and defence behaviour of interdependent stales. Research in this vein has been considered at systemic, dyadic and national levels. Several notable contributions follow. First, on the systemic level. Pollins (20081 advances Modclski and Thompson's (1996) work on leadership cycle theory, finding that rhythms in the global economy are associated with the rise and fall of a pre-eminent power and the often bloody transition from one pre-eminent leader to the next. As such, exogenous shocks such as economic crises could usher in a redistribution of relative power (see also Gilpin. 19SJ) that leads to uncertainty about power balances, increasing the risk of miscalculation (Fcaron. 1995). Alternatively, even a relatively certain redistribution of power could lead to a permissive environment for conflict as a rising power may seek to challenge a declining power (Werner. 1999). Separately. Pollins (1996) also shows that global economic cycles combined with parallel leadership cycles impact the likelihood of conflict among major, medium and small powers, although he suggests that the causes and connections between global economic conditions and security conditions remain unknown. Second, on a dyadic level. Copeland's (1996. 2000) theory of trade expectations suggests that 'future expectation of trade' is a significant variable in understanding economic conditions and security behaviour of states. He argues that interdependent states arc likely to gain pacific benefits from trade so long as they have an optimistic view of future trade relations. However, if the expectations of future trade decline, particularly for difficult to replace items such as energy resources, the likelihood for conflict increases, as states will be inclined to use force to gain access to those resources. Crises could potentially be the trigger for decreased trade expectations either on its own or because it triggers protectionist moves by interdependent states.4 Third, others have considered the link between economic decline and external armed conflict at a national level. Momberg and Hess (2002) find a strong correlation between internal conflict and external conflict, particularly during periods of economic downturn. They write. The linkage, between internal and external conflict and prosperity is strong and mutually reinforcing. Economic conflict lends to spawn internal conflict, which in turn returns the favour. Moreover, the presence of a recession tends to amplify the extent to which international and external conflicts self-reinforce each other (Hlomhen? & Hess. 2(102. p. X9> Economic decline has also been linked with an increase in the likelihood of terrorism (Blombcrg. Hess. & Wee ra pan a, 2004). which has the capacity to spill across borders and lead to external tensions. Furthermore, crises generally reduce the popularity of a sitting government. "Diversionary theory" suggests that, when facing unpopularity arising from economic decline, sitting governments have increased incentives to fabricate external military conflicts to create a 'rally around the flag' effect. Wang (1996), DcRoucn (1995), and Blombcrg. Hess, and Thacker (2006) find supporting evidence showing that economic decline and use of force arc at least indirecti) correlated. Gelpi (1997). Miller (1999). and Kisangani and Pickering (2009) suggest that Ihe tendency towards diversionary tactics arc greater for democratic states than autocratic states, due to the fact that democratic leaders are generally more susceptible to being removed from office due to lack of domestic support. DeRouen (2000) has provided evidence showing that periods of weak economic performance in the United States, and thus weak Presidential popularity, are statistically linked to an increase in the use of force. In summary, rcccni economic scholarship positively correlates economic integration with an increase in the frequency of economic crises, whereas political science scholarship links economic decline with external conflict al systemic, dyadic and national levels.' This implied connection between integration, crises and armed conflict has not featured prominently in the economic-security debate and deserves more attention. Trust in internet business is being eroded every day by surveillance –new restrictions in the Freedom Act are vital to solve Gross 14 (Grant, Washington, D.C., correspondent for IDG News Service, covers legislation and regulation related to the technology and telecommunications, contributor to PCWorld, “Snowden leaks after one year: Wrangling over the meaning of 'bulk'”, http://www.pcworld.com/article/2361120/snowden-leaks-after-oneyear-wrangling-over-the-meaning-of-bulk.html) The Snowden leaks have forced a national conversation that’s necessary and important, but policymakers “haven’t waved the flag and said, ‘what was happening before will not happen again,’” Castro said. While some policy debates in Washington, D.C., take years to play out, speed is important in this case , as other nations look for alternatives to U.S. tech products, Castro said. “There’s basically a clock on this,” he said. “If you don’t address this in a certain you lose out on long-term competitiveness. Every day you don’t address this, you’re losing out.” Castro doesn’t expect the controversy over the surveillance to die down. period of time, “It’s defining the brand of American tech companies as something that is both insecure and available to government surveillance,” he said. “Once you’re branded a certain way, it’s really hard to shake.” This week, the CEOs of nine major U.S. tech vendors— including Facebook, Google and Apple —wrote a letter to senators, calling on them to strengthen the USA Freedom Act. “ Confidence in the Internet , both in the has been badly damaged over the last year, ” the letter said. “It is time for action. As the Senate takes up this important legislation, we urge you to ensure that U.S. surveillance efforts are clearly restricted by law, proportionate to the risks, transparent, and subject to independent oversight.” U.S. and internationally, Advantage Three is India New Freedom Act fails to restore US’s global credibility on Internet freedom. The original version solves by closing SST loopholes. Brinkerhoff ‘14 (Internally quoting Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of expression online. Wong earned her law degree from New York University School of Law. Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the cause of human rights for all. Noel Brinkerhoff is a Political reporter and writer covering state and national politics for 15 years. “With Support of Obama Administration, House NSA Surveillance Reform Bill Includes Gaping Loopholes” – AllGov – May 26th http://www.allgov.com/news/top-stories/with-support-of-obama-administration-house-nsa-surveillance-reform-bill-includes-gapingloopholes-140526?news=853242) Lawmakers in the U.S. House of Representatives claim they have addressed the problems of the National Security Agency’s (NSA) notorious bulk collection of data, made so famous last year by whistleblower Edward Snowden. But the legislation adopted to end this controversial practice contains huge loopholes that could allow the NSA to keep vacuuming up large amounts of Americans’ communications records, all with the blessing of the Obama administration. Dubbed the USA Freedom Act, the bill overwhelmingly approved by the House (303 to 121) was criticized for not going far enough to keep data out of the hands of government. “This so-called reform bill won’t restore the trust of Internet users in the U.S. and around the world,” Cynthia Wong, senior Internet researcher at Human Rights Watch (HRW), said. “Until Congress passes real reform , U.S. credibility and leadership on Internet freedom will continue to fade.” Julian Sanchez, a researcher at the Cato Institute, a libertarian think tank, warned that the changes could mean the continuation of bulk collection of phone records by another name. “ The core problem is that this only ends ‘bulk’ collection in the sense the intelligence community uses that term,” Sanchez told Wired. “As long as there’s some kind of target , they don’t call that bulk collection, even if you’re still collecting millions of records…If they say ‘give us the record of everyone who visited these thousand websites,’ that’s not bulk collection, because they have a list of targets.” HRW says the bill, which now goes to the Senate for consideration, contains ambiguous definitions about what can and cannot be collected by the agency. For instance, an earlier version more clearly defined the scope of what the NSA could grab under Section 215 of the Patriot Act, which has formed the legal basis for gathering the metadata of phone calls. “ Under an earlier version of the USA Freedom Act, the government would have been required to base any demand for phone metadata or other records on a “ specific selection term” that “uniquely describe[s] a person, entity, or account.” Under the House version, this definition was broadened to mean “a discrete term, such as a term specifically identifying a person, entity, account, address, or device, used by the government to limit the scope” of information sought,” according to Human Rights Watch. “ This definition is too open-ended and ambiguous to prevent the sort of creative interpretation by intelligence agencies that has been used to justify overbroad collection practices in the past,” the group claims. The New America Foundation’s Open Technology Institute is similarly disappointed in the final House bill. “Taken together,” the Institute wrote, “the changes to this definition may still allow for massive collection of millions of Americans’ private information based on very broad selection terms such as a zip code, an area code , the physical address of a particular email provider or financial institution , or the IP address of a web hosting service that hosts thousands of web sites.” The US can alter global practices that threaten privacy, but only when US is credible—specifically shapes Indian surveillance Wong 13 (Cynthia M. Wong is the senior researcher on the Internet and human rights for Human Rights Watch. Before joining Human Rights Watch, Wong worked as an attorney at the Center for Democracy & Technology (CDT) and as director of their Project on Global Internet Freedom. She conducted much of the organization’s work promoting global Internet freedom, with a particular focus on international free expression and privacy. She also served as co-chair of the Policy & Learning Committee of the Global Network Initiative (GNI), a multi-stakeholder organization that advances corporate responsibility and human rights in the technology sector. Prior to joining CDT, Wong was the Robert L. Bernstein International Human Rights Fellow at Human Rights in China (HRIC). There, she contributed to the organization’s work in the areas of business and human rights and freedom of expression online. Wong earned her law degree from New York University School of Law. (“Surveillance and the Corrosion of Internet Freedom,” HRW, http://www.hrw.org/news/2013/07/30/surveillance-and-corrosion-internet-freedom, July 30, 2013) Defenders of US and UK surveillance programs argue that collecting metadata is not as problematic as “listening to the content of people’s phone calls” or reading emails. This is misleading. Technologists have long recognized that metadata can reveal incredibly sensitive information, especially if it is collected at large scale over long periods of time, since digitized data can be easily combined and analyzed. The revelations have also exposed glaring contradictions about the US Internet freedom agenda . This has emboldened the Chinese state media, for example, to cynically denounce US hypocrisy, even as the Chinese government continues to censor the Internet, infringe on the widening rift between US values and actions has real, unintended human rights consequences. For the human rights movement, the Internet’s impact on rights crystalized in 2005 after we learned that Yahoo! uncritically turned user account information over to the Chinese government, leading to a 10-year prison sentence for the journalist Shi Tao. The US government forcefully objected to the Chinese government’s actions and urged the tech industry to act responsibly. In the end, that incident catalyzed a set of new human rights standards that pushed some companies to improve safeguards for user privacy in the face of government demands for data. US support was critical back then, but it is hard to imagine the government having the same influence or credibility now. The mass surveillance scandal has damaged the US government’s ability to press for better corporate practices as technology companies expand globally. It will also be more difficult for companies to resist overbroad surveillance mandates if they are seen as complicit in mass US infringements on privacy. Other governments will feel more entitled to ask for the same privacy rights, and curb anonymity online. Though there is hypocrisy on both sides, cooperation that the US receives . We can also expect governments around the world to pressure companies to store user data locally or maintain a local presence so that governments can more easily access it, as Brazil and Russia are now debating. While comparisons to the Chinese government are overstated, there is reason to worry about the broader precedent the US has set . Just months before the NSA scandal broke, India began rolling out a centralized system to monitor all phone and Internet communications in the country, without much clarity on safeguards to protect rights. This development is chilling, considering the government’s problematic use of sedition and Internet laws in recent arrests. Over the last few weeks, Turkish officials have condemned social media as a key tool for Gezi Park protesters. Twitter has drawn particular ire. Now the government is preparing new regulations that would make it easier to get data from Internet companies and identify individual users online. The Obama administration and US companies could have been in a strong position to push back in India and Turkey. Instead, the US has provided these governments with a roadmap for conducting secret, mass surveillance and conscripting the help of the private sector. US surveillance sets a precedent for surveillance in India Sinha 14 – G. Alex Sinha is an Aryeh Neier fellow with the US Program at Human Rights Watch and the Human Rights Program at the American Civil Liberties Union. Sinha holds a J.D. from New York University’s School of Law. This includes a specialization as a Scholar from NYU’s Institute for International Law & Justice. The author also holds a Ph.D. in Philosophy University of Toronto. Maria McFarland Sanchez-Moreno is a US Program deputy director at Human Rights Watch, who participated in some of the research interviews. Andrea Prasow is the deputy Washington Director at Human Rights Watch, who also participated in one of the research interviews and provided key contacts. (“WITH LIBERTY TO MONITOR ALL How Large-Scale US Surveillance is Harming Journalism, Law and American Democracy,” this report is based on extensive interviews with some 50 journalists covering intelligence, national security, and law enforcement for outlets including the New York Times, the Associated Press, ABC, and NPR, http://www.hrw.org/node/127364, July 2014) The questions raised by surveillance are complex. The government has an obligation to protect national security, and in some cases, it is legitimate for government to restrict certain rights to that end. At the same time, international human rights and constitutional law set limits on the state’s authority to engage in activities like surveillance, which have the potential to undermine so many other rights. The current, large-scale, often indiscriminate US approach to surveillance carries enormous costs. It erodes global digital privacy and sets a terrible example for other countries like India , Pakistan, Ethiopia, and others that are in the process of expanding their surveillance capabilities. It also damages US credibility in advocating internationally for internet freedom, which the US has listed as an important foreign policy objective since at least 2010. As this report documents, US surveillance programs are also doing damage to some of the values the United States claims to hold most dear. These include freedoms of expression and association, press freedom, and the right to counsel, which are all protected by both international human rights law and the US Constitution. Domestic is key Pitter ‘14 Laura Pitter, senior national security counsel in Human Rights Watch's US Program, monitors, analyzes and writes on US national security policies. Prior to joining Human Rights Watch, Laura was a journalist, human rights advocate, and attorney who practiced in both the public and private sectors. She was a reporter during the war in Bosnia where she wrote for Time Magazine and Reuters News Agency among other media outlets. Following the war she worked for the United Nations in both Bosnia and post Sept. 11Afghanistan as a protection and political affairs officer. After Afghanistan, Laura practiced law for eight years, first as a public defender and later with a product liability law firm, both in New York. Laura holds a bachelor's degree from the University of California at Santa Barbara, a master's in international affairs from Columbia University, and a law degree from the University of San Francisco. “US: It's Been a Year Since Snowden, and Nothing's Really Changed” – Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human dignity and advance the cause of human rights for all. June 5, 2014 - http://www.hrw.org/news/2014/06/05/us-its-been-year-snowden-and-nothings-really-changed Prior to these disclosures, the United States was considered a world leader in promoting Internet freedom. It made it a signature part of American foreign policy and spent millions of dollars supporting new tools to protect the digital privacy of human rights activists globally. But the last year has deeply undermined global trust in U.S. leadership in this area, not to mention its commitment to the rule of law and transparency in government. If this trust continues to erode, it will have huge ramifications for U.S. business and foreign policy interests. Technology companies are already losing billions of dollars and overseas customers who want their data stored away from the snooping eyes of the U.S. government. Studies estimate a loss of between $35 billion and $180 billon to the U.S. cloud computer industry over the next three years. And U.S. diplomats are now at a distinct disadvantage when negotiating economic and foreign policy agreements abroad. The leaks have dealt a blow to America's standing when criticizing countries with repressive regimes, who threaten fundamental rights such as freedom of expression and association -- rights that Washington purports to hold dear. Hypocrisy does not sell. Indian surveillance centralizes information—creates a vulnerability for financial markets Trivedi 13 – Anjani Trivedi holds a Master Degree in Journalism from the University of Hong Kong and a Bachelor’s Degree in Mathematics from MIT. The author has previously held internships at the New York Times and CNN International. This piece internally quotes Meenakshi Ganguly, The South Asia director for Human Rights Watch, Anja Kovacs of the Internet Democracy Project, and Sunil Abraham, executive director of India’s Centre for Internet and Society. (“In India, Prism-like Surveillance Slips Under the Radar,” Time Magazine, http://world.time.com/2013/06/30/in-india-prism-like-surveillance-slips-under-the-radar/#ixzz2YpWhRsrB, June 30, 2013) CMS is an ambitious surveillance system that monitors text messages, social-media engagement and phone calls on landlines and cell phones, among other communications. That means 900 million landline and cell-phone users and 125 million Internet users. The project, which is being implemented by the government’s Centre for Development of Telematics (C-DOT), is meant to help national law-enforcement agencies save time and avoid manual intervention, according to the Department of Telecommunications’ annual report. This has been in the works since 2008, when C-DOT started working on a proof-of-concept, according to an older report. The government set aside approximately $150 million for the system as part of its 12th five-year plan, although the Cabinet ultimately approved a higher amount. Within the internal-security ministry though, the surveillance system remains a relatively “hush-hush” topic, a project official unauthorized to speak to the press tells TIME. In April 2011, the Police Modernisation Division of the Home Affairs Ministry put out a 90-page tender to solicit bidders for communication-interception systems in every state and union territory of India. The system requirements included “live listening, recording, storage, playback, analysis, postprocessing” and voice recognition. Civil- liberties groups concede that states often need to undertake targeted-monitoring operations. However, the move toward extensive “surveillance capabilities enabled by digital communications,” suggests that governments are now “casting the net wide, enabling intrusions into private lives,” according to Meenakshi Ganguly, South Asia director for Human Rights Watch. This extensive communications surveillance through the likes of Prism and CMS are “out of the realm of judicial authorization and allow unregulated, secret surveillance, eliminating any transparency or accountability on the part of the state,” a recent U.N. report stated. India is no stranger to censorship and monitoring — tweets, blogs, books or songs are frequently blocked and banned. India ranked second only to the U.S. on Google’s list of userdata requests with 4,750 queries, up 52% from two years back, and removal requests from the government increased by 90% over the previous reporting period. While these were largely made through police or court orders, the new system will not require such a legal process. In recent times, India’s democratically elected government has barred access to certain websites and Twitter handles, restricted the number of outgoing text messages to five per person per day and arrested citizens for liking Facebook posts and tweeting. Historically too, censorship has been India’s preferred means of policing social unrest. “Freedom of expression, while broadly available in theory,” Ganguly tells TIME, “is endangered by abuse of various India laws.” There is a growing discrepancy and power imbalance between citizens and the state, says Anja Kovacs of the Internet Democracy Project. And, in an environment like India where “no checks and balances [are] in place,” that is troubling. The potential for misuse and misunderstanding, Kovacs believes, is increasing enormously. Currently, India’s laws relevant to interception “disempower citizens by relying heavily on the executive to safeguard individuals’ constitutional rights,” a recent editorial noted. The power imbalance is often noticeable at public protests, as in the case of the New Delhi gang-rape incident in December, when the government shut down public transport near protest grounds and unlawfully detained demonstrators. With an already sizeable and growing population of Internet users, the government’s worries too are on the rise. Netizens in India are set to triple to 330 million by 2016, according to a recent report. “As [governments] around the world grapple with the power of social media that can enable spontaneous street protests, there appears to be increasing surveillance,” Ganguly explains. India’s junior minister for telecommunications attempted to explain the benefits of this system during a recent Google+ Hangout session. He acknowledged that CMS is something that “most people may not be aware of” because it’s “slightly technical.” A participant noted that the idea of such an intrusive system was worrying and he did not feel safe. The minister, though, insisted that it would “safeguard your privacy” and national security. Given the high-tech nature of CMS, he noted that telecom companies would no longer be part of the government’s surveillance process. India currently does not have formal privacy legislation to prohibit arbitrary monitoring. The new system comes under the jurisdiction of the Indian Telegraph Act of 1885, which allows for monitoring communication in the “interest of public safety.” The surveillance system is not only an “abuse of privacy rights and security-agency overreach,” critics say, but also counterproductive in terms of security . In the process of collecting data to monitor criminal activity, the data itself may become a target for terrorists and criminals — a “honeypot ,” according to Sunil Abraham, executive director of India’s Centre for Internet and Society. Additionally, the wide-ranging tapping undermines financial markets , Abraham says, by compromising confidentiality, trade secrets and intellectual property. vulnerabilities will have to be built into the existing cyberinfrastructure to make way for such a system. Whether the nation’s patchy infrastructure will be able to handle a complex web of surveillance and networks, no one can say. That, Abraham What’s more, contends, is what attackers will target. Hacks on India’s central data files will succeed—crushes their financial markets Dharmakumar 13 – Rohin Dharmakumar is an Editor at Forbes India. He holds degrees from The Indian Institute of Management in Calcutta and The R. V. College of Engineering in Bangalore. (“Is CMS a compromise of national security?,” Forbes India Magazine, http://forbesindia.com/printcontent/35543, July 12, 2013) Meanwhile, government bodies like the R&AW, Central Bureau of Investigation, National Investigation Agency, Central Board of Direct Taxes, Narcotics Control Bureau and the Enforcement Directorate will have the right to look up your data. Starting next year, all mobile telephony operators will also need to track and store the geographical location from which subscribers make or receive calls. “I see it as the rise of techno-determinism in our security apparatus. Previously, our philosophy was to avoid infringing on individual privacy, and monitor a small set of individuals directly suspected of engaging in illegal activities. Now, thanks to the Utopianism being offered up by ‘Big Data’ infrastructure, putting everybody under blanket surveillance seems like a better way to serve our security and law enforcement agendas more effectively,” says Abraham. There is a real risk that CMS and the numerous other monitoring programmes that will subsequently connect to it will end up harming more Indians than protecting them. The biggest risk is that these programmes will turn into lucrative ‘honey pots’ for hackers , criminals and rival countries. Why bother hacking individuals and companies if you can attack the CMS? We’ve seen private corporations and government agencies in the US, Israel and the UK getting hacked. So let’s not have any illusions that India is going to fare much better. Another consequence is that sooner or later innocent citizens will be wrongly accused of being criminals based on mistaken data patterns. While searching for matches in any database with hundreds of millions of records, the risk of a ‘false positive’ increases disproportionately because there are exponentially more innocents than there are guilty. And in the nearDystopian construct of the CMS, it will take months or years for such errors to be rectified. As more Indians become aware of these programmes, they will adopt encryption and masking tools to hide their digital selves. In the process, numerous ‘unintended consequences’ of failing to differentiate law-abiding citizens from criminals will be created. What answer will a normal citizen offer to a law enforcement official who wants to know why he or she has encrypted all communications and hosted a personal server in, say, Sweden? But arguably the biggest threat of 24x7 surveillance is to businesses. Security and trust are the foundations atop which most modern businesses are built . From your purchase of a gadget on an ecommerce site to a large conglomerate’s secret bid in a government auction to discussions within a company on future business strategies to patent applications—everything requires secrecy and security. All an unscrupulous competitor, whether it be a company or a country, has to do to go oneup on you is to attack the CMS and other central databases . “The reason why the USA historically decided not to impose blanket surveillance wasn’t because of human rights, but to protect its businesses and intellectual property. Because while we may be able to live in a society without human rights, we cannot be in one without functional markets,” says Abraham. Hack could create havoc – Indian infrastructure will inevitably digitize and is already vulnerable. Shukla ‘13 Ajai Shukla is Indian journalist and retired Colonel of Indian Army. He currently works as Consulting Editor with Business Standard writing articles on strategic affairs, defence and diplomacy. He earlier worked with DD News and NDTV– “India's digital battleground” - Business Standard - June 21, 2013 - http://www.business-standard.com/article/current-affairs/india-s-digitalbattleground-113062101013_1.html But the government has understood that an ostrich-like response to the digital threat - which is to have as little digitisation as possible - is not a viable, long-term strategy. The economic ministries are finding that volumes of data are becoming larger and larger. And the compulsion for more open governance requires the Internet to be harnessed, mastered and adequately secured. Although India's day-to-day governance and infrastructure management is not heavily reliant on the Internet, there is unease within the government at the growing vulnerability of private Internet users to cyber-attacks. According to figures that the government shared with Business Standard, India was the 10th most intensely cyber-attacked country in 2010-11; today, it is second only to the US. With internet usage (including cellphones) rising dramatically - from 202 million users in March 2010 to 412 million in March 2011 and 485 million in March 2012 - India is now second only to China in the number of devices connected to the Internet. Strong financial markets are key to India’s economy Goyal 14 – Dr. Sakshi Goyal is a former Faculty member at the Kaling Institute of Management Studies, Faridabad, Haryana (India). “Indian Financial Markets: A Global Perspective” - Journal of Business Management & Social Sciences Research (JBM&SSR) - Volume 3, No.6, June 2014 - ISSN No: 2319-5614. Available at: http://www.borjournals.com/a/index.php/jbmssr/article/viewFile/1729/1078 Financial markets are a vital part of an economy making it possible for industry, trade and commerce to flourish without any obstacle in terms of resources. Today most economies around the world are judged by the performance of their financial markets. The financial markets have indicators in place that reflect the performance of companies whose securities are traded in those markets. The financial markets also serve a vital purpose in the growth and development of a company, which wants to expand. Such companies with expansion plans and new projects are in need of funding and the financial market serves as the best platform from which a company can determine the feasibility of such possibilities Krishnan (2011) mentioned that, the economic literature acknowledged that efficient and developed financial markets could lead to increased economic growth by improving the efficiency of allocation and utilization of savings in the economy. Better functioning financial systems ease the external financing constraints that impede firm and industrial expansion. “ There is a growing body of empirical analyses, including firm-level studies, industry-level studies, individual country studies, and cross-country comparisons, which prove this strong, positive link between the functioning of the financial system and long-run economic growth . In addition, they better allocate resources, monitor managers and exert corporate control, mobilize savings, and facilitate the exchange of goods and services”. A capital market is a market for securities (debt or equity), where business enterprises (companies) and governments can raise long-term funds. It is defined as a market in which money is provided for periods longer than a year as the raising of short-term funds takes place on other markets (e.g., the money market). The capital market includes the stock market (equity securities) and the bond market (debt) The capital market of a country can be considered as one of the leading indicators in determining the growth of its economy. As mentioned by C.Rangarajan, Ex Governor, RBI (1998), “The growth process of any economy depends on the functioning of financial markets which also helps to augment its Capital formation. According to Professor Hicks, the industrial Revolution in England was ignited more by the presence of liquid financial market than the technological investment”. He writes interestingly- “What happened in the Industrial Revolution is that the Range of fixed capital goods that were used in production Began noticeably to increase. But fixed capital is sunk; it is embodied in a particular form, from which it can only gradually be released. In order that people should be willing to sink large amounts of capital it is the availability of liquid funds which is crucial. This condition was satisfied in England ...by the first half of the eighteenth century The liquid asset was there, as it would not have been even a few years earlier “ Thus, liquidity is a very important component of Financial Market and plays a very vital role in the long run economic development of any country as it helps not only in promoting the savings of the economy but also to adopt an effective channel to transmit various financial policies by creating liquidity in the market. Therefore Financial System of any country should be well developed, competitive, efficient and integrated to face all shocks. The financial system and infrastructure of any country at any time can be considered as the result of its own peculiar historical evolution. This evolution is resulted by continuous interaction between all the participants existing in the system and public policy interventions. The evolution of Indian financial markets and the regulatory system has also followed a similar path. India began with the central bank, Reserve Bank of India (RBI), as the banking sector regulator, and the Ministry of Finance as the regulator for all other financial sectors. Today, most financial service providers and their regulatory agencies exist. The role of regulators has evolved over time from that of an instrument for planned development in the initial stage to that of a referee of a relatively more modern and complex financial sector at present. Over this period, a variety of financial sector reform measures have been undertaken in India, with many important successes. An important feature of these reforms has been the attempt of the authorities to align the regulatory view the needs of the country and domestic factors. These reforms can be broadly classified as steps taken towards: a) Liberalizing the overall macroeconomic and regulatory environment within which financial sector institutions function. b) Strengthening the institutions and improving their efficiency and competitiveness. c) Establishing and strengthening the regulatory framework and institutions for overseeing the financial system.The history of Indian capital markets spans back 200 years, around the end of the 18th century. It was at this time that India was under the rule of the East India Company. The capital market of India initially developed around Mumbai; with around 200 to 250 securities brokers participating in active trade during the second half of the 19th century. There are a number of factors that have paved path for India market growth. After the economic liberalization, policies were undertaken in the 1990s, the economy of the country has been steadily rising which has led to more demands and supply circles. This has introduced diverse market sectors and industries in the country, which has led to a competitive consumer market. Through this research paper, an attempt is made to understand the evolution of Global financial system with more emphasis on Indian markets. It also aims to study the global perspective of financial markets of any country and to understand that how a country’s financial markets is integrated with the other world markets. Also the concept of efficiency is highlighted which says that a country whose financial markets are well integrated with the world markets are more efficient as compared to one whose financial markets are not very well integrated. Lastly the paper concludes by leaving scope and opportunities to understand these global concepts in an easier way to the reader and further can be used for extensive research. A financial system or financial sector functions as an intermediary and facilitates the flow of funds from the areas of surplus to the areas of deficit. A Financial System is a composition of various institutions, markets, regulations and laws, practices, money manager, analysts, transactions and claims and liabilities. Indian Financial market can be considered as one of the oldest across the globe and is experiencing favorable time during the recent years, which have prospered the economy of the country to a great extent . Presently, India is rated by six international credit rating agencies, namely Standard and Poor’s (S&P), Moody’s Investor Services, FITCH, Dominion Bond Rating Service (DBRS), the Japanese Credit Rating agency (JCRA), and the Rating and Investment Information Inc., Tokyo( R&I). Decline sparks nuclear war with Pakistan Busch 04 – Dr. Nathan Busch is the Professor of Government and co-director of the Center for American Studies at Christopher Newport University. The author holds a Ph.D. in International relations from the University of Toronto and an MA in Political Science from Michigan State University. The author previously held the position of Research Fellow at the Belfer Center for Science and International Affairs in the Kennedy School of Government at Harvard University. (“No End in Sight: The Continuing Menace of Nuclear Proliferation,” pg. 202-209) In addition, because the Indian military currently has little experience handling nuclear weapons, the risks of accidental use could be very high during a crisis situation, at least for some time to come. If the order were given to prepare India's nuclear weapons for possible use, the military (perhaps in conjunction with India's nuclear scientists) would need to assemble the warheads rapidly; mate them to the deliver)' vehicles (gravity bombs or missiles); and prepare them for use, either by loading them into bombers or by aiming the missiles and preparing them for launch. All these procedures require training and precision, and, given the early stages of India's new command-and-control arrangements, it is not at all clear that the Indian military would be able to carry them out safely under extreme time constraints.194 If India decided to develop a rapid-response capability, some of these dangers would be lessened, but more serious dangers would be introduced. In particular, there would be a significantly increased risk of an accidental launch of nuclear-armed missiles. India would need to engage in a great deal of additional research into safety mechanisms to prevent such an accidental launch, and it is simply not known how much effort India is devoting, or will devote, to this area.195 Because the Prithvi and the two-stage Agni-I missiles contain a nonstorable liquid fuel, it would be impossible to deploy the current configuration of either missile to allow for a rapid response. This significantly reduces the likelihood of these missiles being launched accidentally during normal circumstances, though the risks of accidental launches would probably increase significantly if they were fueled during a crisis situation. As noted, however, India has conducted several successful flight tests of the Agni and Agni-II missiles. Because these missiles use a solid fuel, they could be deployed in a rapidresponse state. If India were to choose such a deployment option, the risks of an accidental launch could increase significantly. These risks would depend on the extent to which India integrates use-control devices into its weapons to prevent accidental launches, but there is little evidence that India is currently devoting significant efforts to develop such use-control devices.196 Furthermore, even if India intends to develop such use-control devices, if a nuclear crisis were to arise before India had developed them, it still might be tempted to mate warheads on its missiles. If India does decide to weaponize its arsenal, it still remains to be seen what type of deployment option it would choose. According to a statement in November 1999 by India's foreign minister, Jaswant Singh, India would not keep its weapons on a "hair-trigger alert," though he did suggest that these weapons would be dispersed and made mobile to improve their chances of surviving a first strike.197 If this statement is true, then the risks of accidental launch would be relatively small during normal circumstances.198 But these risks would increase significantly during crisis situations, when India would presumably mate the warheads to the missiles.199 If the military still has not been given physical control over the warheads, this would further reduce risks of accidental use during peacetime, though the transfer of nuclear weapons to the military during a crisis could significantly increase the risks of an accident due to the military's inexperience in handling the nuclear weapons.200 What deployment option Pakistan might adopt depends in part on India's weapon deployment. It appears that if India were to adopt a rapid-response option, Pakistan would probably adopt a similar missile deployment, thereby increasing the risks of an accidental launch of its nuclear weapons as well. But even if India were to deploy its weapons (in field positions) withour the warheads mated, concerns about survivability might nevertheless cause Pakistan to adopt a rapidresponse capability. If such an event were to occur, the risks of Pakistani accidental missile launches could be quite high, especially because it is unlikely that Pakistan currently has the technical capacity to integrate sophisticated launch controls into its missile designs. Just as in India, it is also unlikely that Pakistan's nuclear devices are designed to minimize risks of accidents. Because Pakistan's warheads are based on an early Chinese warhead design, they probably do not contain one-point safety designs, IHE, or fire-resistant pits. If Pakistan were to assemble its nuclear warheads, there could be an unacceptable risk of an accidental detonation of its nuclear weapons. Moreover; if Pakistan were to mate nuclear warheads to its missiles, either because it chose to establish a rapid-response capability or because of an ongoing nuclear crisis, then similar concerns would exist about accidental launches of Pakistani nuclear weapons. The current risks of unauthorized use of nuclear weapons in India and Pakistan are probably relatively small because they have a very small number of nuclear weapons and those weapons are tightly controlled by their nuclear establishments. But there are a number of factors that could increase risks of unauthorized use in the future. Although both India and Pakistan currently possess nuclear weapons that could be delivered by aircraft, and are both actively developing nuclear-capable ballistic missiles, none of their weapons appear to contain sophisticated usecontrol devices to prevent unauthorized use. Instead, the nuclear controls in both countries appear to be based on guards, gates, and guns . As we have seen in the Russian and Chinese cases, while the "3 G's" might be sufficient during normal circumstances, they are particularly vulnerable during political, economic , and social upheaval s. The Russian case has demonstrated that severe domestic upheavals can undermine central controls and weaken the infrastructures that previously maintained the security for nuclear weapons. In particular, such upheavals can undermine the loyalty of guards and workers at nuclear facilities, especially if the state collapses economically and can no longer afford to pay those employees. Neither India nor Pakistan appears to have taken the necessary steps to prevent such weaknesses from arising in their nuclear controls. Because Indian and Pakistani nuclear controls rely on the "3 G's" while reportedly lacking personnel reliability programs, there could be a significant risk of thefts of nuclear weapons during severe upheavals. The Russian analogy is particularly relevant in the Pakistani case. The Pakistani state is far from stable. After the nuclear tests in 1998 and the military coup in 1999, the Pakistani economy came close to collapsing and remained quite unstable for the next several years.202 In the aftermath of the September 11, 2001, terrorist attacks, the United States removed economic sanctions and approved nearly $1 billion in international foreign aid to Pakistan. But with a debt burden of nearly $39 billion, massive economic disparities, and continuing low levels of foreign investment, there still is significant cause for concern about the prospects for Pakistan's long-term political and economic stability.203 If the Pakistani state were to fail, there could be significant risks of a collapse in its nuclear controls. Were such an event to occur, there could be an extreme risk of thefts of nuclear weapons or of nuclear weapons falling into the hands of Islamic militants.204 In the events following the September 11 attacks and President Musharraf's decision to support U.S. military strikes in Afghanistan, there were serious concerns about a potential collapse of Pakistani nuclear controls. These concerns were spurred by reports of public riots, a close affiliation among some elements of the Pakistani military and intelligence community with the Taliban regime and al Qaeda, and the tenuous hold that Pakistani president Musharraf appears to have in Pakistan.205 In October 2001, President Musharraf took significant steps to centralize his control by removing high-level military and intelligence officers with ties to the Taliban, but analysts have nevertheless continued to raise concerns about Musharraf's ability to maintain control.206 Due to the seriousness of these risks, President Musharraf ordered an emergency redeployment of Pakistan's nuclear arsenal, and the United States has offered to advise Pakistan on methods for securing its nuclear stockpile. ' If the U.S. military strikes in Afghanistan had extended for a longer period, Musharraf might have found it increasingly difficult to remain in power and reign in the more extreme elements in his country. One also cannot rule out the possibility that terrorists might choose to target nuclear facilities in India and Pakistan, especially if domestic instability were to increase . Both India and Pakistan have serious problems with domestic terrorism.208 These terrorists are increasingly well-armed and have targeted critical infrastructures and military bases in the past.209 Although current defenses at both Indian and Pakistani nuclear weapons storage facilities are probably sufficient to defend against most terrorist attacks,210 the physical protection systems at other nuclear facilities might be less effective.211 Moreover, if the defenses at the most sensitive facilities were weakened by domestic upheavals, then the risks of successful terrorist attacks—either for purposes of theft or sabotage—could increase significantly. But even if such extreme events did not occur, the tightly controlled decision-making and underdeveloped command-and-control structures in both India and Pakistan could potentially allow unauthorized use, particularly during crises. In India, some of these risks have been minimized by the formalization of its command structure, though the military units are still fairly inexperienced with handling these weapons.212 Moreover, because India probably still lacks clearly defined, detailed operational procedures and established, resilient communication channels, there would still be a fairly high risk of unauthorized use arising from confusion or miscommunication during a crisis. These concerns will probably remain for some time to come, though the specific risks could eventually be improved, depending on the training the military receives and the degree of professionalism among the troops. Because Pakistan is currently under military rule, and its nuclear weapons are controlled by the military, one would expect a better coordination of nuclear decision-making and command-and-control systems. Nevertheless, there are potential problems with Pakistani command and control as well. The lack of a clear operational use doctrine, combined with inadequate C3I could increase the risks of unauthorized use during crises: "there is no enunciated nuclear doctrine, nor are there decision-making and communications systems adequate for either strategic or tactical command and control in the nuclear environment. Nuclear targeting information could not be passed in time to be of use in a rapidly changing situation, which would increase the probability of own-troop strikes by tactical [nuclear] missiles."213 The risks or unauthorized use would increase if India and Pakistan were to deploy their weapons on ballistic missiles. Risks of decapitation and questions about the survivability of the nuclear forces would probably cause both India and Pakistan to deploy mobile systems if they were to operationalize their nuclear forces. These systems would significantly increase difficulties in command and control, especially because their weapons lack use-control devices.214 In addition, because of the risks of decapitation, Pakistan is likely to adopt a "delegative" system, where the authority to launch nuclear weapons is given to a number of military officials.215 As the number of people authorized to launch nuclear weapons increases, so does the risk of a use of nuclear weapons that has not been commanded by the central authorities.216 The greatest concerns have been raised about a possible inadvertent use of nuclear weapons in South Asia. The combined effects of mutual mistrust, very short flight times for missiles, continual armed conflicts along their borders, and few reliable CBMs make the risks of inadvertent use quite severe, especially during crisis situations. According to George Perkovich, a South Asia expert at the Carnegie Endowment for International Peace, "Kargil proved that having nuclear weapons would not deter new conflicts . It also showed that unless such conflicts themselves were prevented, the possibility of an accidental or deliberate nuclear exchange would also increase given both states' relatively poor systems of intelligence surveillance and nuclear command and control."217 Due to continual mistrust between the two countries, each would be likely to misinterpret military movements, missile tests, or accidental detonations as an impending attack by the other side. The risks of misinterpreting each other's motives are compounded by the vulnerability of their nuclear forces and the short flight times of the forces to key targets. For example, because the runways at Pakistani Air Force bases could be destroyed by a conventional air strike or nuclear attack,218 India could effectively eliminate Pakistan's nuclear bomber capability. During an acute crisis, Pakistan might be faced with a "use them or lose them" dilemma, in that it would need to attack rapidly or lose its ability to retaliate altogether. For this reason, Pakistani officials would be extremely suspicious of any Indian actions that could be interpreted as preparations for an attack. Because the flight time of Indian bombers is approximately ten minutes, Pakistani leaders would have a very limited amount of time to decide whether to launch their own attack.219 These conditions thus create an ongoing environment in which inadvertent use is quite possible. In addition, both countries have unreliable intelligence systems, which have repeatedly misinterpreted the other's intentions. For example, during the Brasstacks incident, Pakistani intelligence reported that India's exercise was merely a cover for an attack. Meanwhile, Indian intelligence overlooked the defensive nature of the Pakistani troops' position. These intelligence failures caused each side to escalate the tensions unnecessarily. In addition, their intelligence systems have sometimes failed to detect major troop movements altogether. As we have seen, during the Brasstacks crisis, Indian surveillance planes did not detect Pakistani troops positioned at their border for two weeks. And in the 1999 Kargil war, Indian intelligence failed to detect the Pakistani invasion until several months after they had positioned themselves at strategic locations in the Kargil heights. These intelligence failures could have two consequences. First, if either side were surprised by comparatively benign actions (such as Pakistan's defensive positioning during the Brasstacks crisis), it would be more likely to overreact and mistakenly conclude that an attack is imminent. And second, if one side (especially Pakistan) is confident that an invasion would not be detected at first, it might be more likely to launch attacks across the border: Each of these scenarios would greatly increase the risks of nuclear escalation.220 Presumably owing to the massive intelligence failure prior to the 1999 Kargil war, however, India has recently made significant investments in its intelligence-gathering capabilities, which could reduce risks of such failures by India in the future.221 The dangers of miscalculations and intelligence failures are increased by the crude early-warning systems employed by both countries, particularly Pakistan. Several incidents serve to illustrate this point. First, prior to Pakistan's nuclear tests in 1998, Pakistan reported that it had detected an air force attack on its radars and warned that it had mated a number of warheads to its Ghauri missiles.222 While this report might have been circulated in order to justify their nuclear tests, circulating such a report could have caused India to mate weapons to its missiles, greatly increasing the risks of inadvertent use (as well as accidental and unauthorized use). Another, perhaps more troubling, incident occurred prior to the U.S. missile strike on Afghanistan in August 1998. The United States sent a high-level U.S. official to Pakistan because it feared Pakistan would detect the missile and interpret it as an Indian strike. Pakistan never even detected the missile, however. Scholars have pointed out that this incident emphasizes not only the U.S. concern about inadvertent nuclear war between India and Pakistan, but also that Pakistan's early-warning system "has serious flaws, and such shortcomings are more likely to foster nervousness than calm. To the extent that they lack reliable early-warning systems, India or Pakistan could base launch decisions on unreliable sources, increasing the chance of mistakes."223 But even if India and Pakistan had reliable early-warning systems, the risks of inadvertent war would still be extremely high. If Indian or Pakistani radars detected aircraft headed toward them, they would have very little time to decide what to do before the aircraft reached their targets. In addition, because there would be a great deal of uncertainty about whether attacking bombers carried conventional or nuclear weapons, the attacked side (especially Pakistan) could face a "use them or lose them" scenario and be tempted to launch a nuclear attack to ensure that its nuclear capability was not destroyed.224 Thus, even if India and Pakistan do not deploy nuclear weapons on missiles, the risks of an inadvertent use in these circumstances could be extremely high. If India and Pakistan were to deploy their nuclear weapons on missiles (a scenario that is quite likely, given the vulnerability of Pakistani airfields and India's stated need for deterrence against the People's Republic of China), the risks of inadvertent use would become even worse. Because the flight time for ballistic missiles between the two countries is less than five minutes,225 Indian and Pakistani leaders would have virtually no time to decide what action to take (or perhaps even to launch a retaliatory strike) before the missiles hit their targets.226 The psychological effect on the two countries would be tremendous. According to Francois Heisbourg, once theater missiles are strategic situation will resemble the Cuban missile crisis, except that it "would be permanent rather than tempo-rary, would occur without adequate C3I in place, and with political leadership located less than five minutes from mutual Armageddon .” deployed in South Asia, the The impact is extinction Chaffin 11 – Greg Chaffin is a Research Assistant at Foreign Policy in Focus. (“Reorienting U.S. Security Strategy in South Asia,” http://www.fpif.org/articles/reorienting_us_security_strategy_in_south_asia, July 8, 2011) Portions of the military and ISI, whose primary concern is the strategic challenge posed by India, operate largely without constraints or civilian oversight. As a result of this strategic calculus, Pakistan has not and will never be the strategic ally the United States wants or needs. Indeed, so long as Pakistan’s overriding security concern emanates from India, U.S. and Pakistani interests in Afghanistan will diverge. The greatest threat to regional security (although curiously not at the top of most lists of U.S. regional concerns) is the possibility that increased IndiaPakistan tension will erupt into all-out war that could quickly escalate into a nuclear exchange. Indeed, in just the past two decades, the two neighbors have come perilously close to war on several occasions. India and Pakistan remain the most likely belligerents in the world to engage in nuclear war. Due to an Indian preponderance of conventional forces, Pakistan would have a strong incentive to use its nuclear arsenal very early on before a routing of its This policy is probably not directed from the top. Indeed, any characterization of Pakistan as a unitary actor would be fallacious. military installations and weaker conventional forces. In the event of conflict, Pakistan’s only chance of survival would be the early use of its nuclear arsenal to inflict unacceptable damage to Indian military and (much more likely) civilian targets. By raising the stakes to unacceptable levels, Pakistan would hope that India would step away from the brink. However, it is equally likely that India would respond in kind, with escalation ensuing. Neither state possesses tactical nuclear weapons, but both possess scores of city-sized bombs like those used on Hiroshima and Nagasaki. Furthermore, as more damage was inflicted (or as the result of a decapitating strike), command and control elements would be disabled, leaving individual commanders to respond in an environment increasingly clouded by the fog of war and decreasing the likelihood that either government (what would be left of them) would be able to guarantee that their forces would follow a negotiated settlement or phased reduction in hostilities. As a result any such conflict would likely continue to escalate until one side incurred an unacceptable or wholly debilitating level of injury or exhausted its nuclear arsenal. A nuclear conflict in the subcontinent would have disastrous effects on the world as a whole. In a January 2010 paper published in Scientific American, climatology professors Alan Robock and Owen Brian Toon forecast the global repercussions of a regional nuclear war. Their results are strikingly similar to those of studies conducted in 1980 that conclude that a nuclear war between the United States and the Soviet Union would result in a catastrophic and prolonged nuclear winter, which could very well place the survival of the human race in jeopardy . In their study, Robock and Toon use computer models to simulate the effect of a nuclear exchange between India and Pakistan in which each were to use roughly half their existing arsenals (50 apiece). Since Indian and Pakistani nuclear devices are strategic rather than tactical, the likely targets would be major population centers. Owing to the population densities of urban centers in both nations, the number of direct casualties could climb as high as 20 million. The fallout of such an exchange would not merely be limited to the immediate area. First, the detonation of a large number of nuclear devices would propel as much as seven million metric tons of ash, soot, smoke, and debris as high as the lower stratosphere. Owing to their small size (less than a tenth of a micron) and a lack of precipitation at this altitude, ash particles would remain aloft for as long as a decade, during which time the world would remain perpetually overcast. Furthermore, these particles would soak up heat from the sun, generating intense heat in the upper atmosphere that would severely damage the earth’s ozone layer. The inability of sunlight to penetrate through the smoke and dust would lead to global cooling by as much as 2.3 degrees Fahrenheit. This shift in global temperature would lead to more drought, worldwide food shortages, and widespread political upheaval. Although the likelihood of this doomsday scenario remains relatively low, the consequences are dire enough to warrant greater U.S. and international attention. Furthermore, due to the ongoing conflict over Kashmir and the deep animus held between India and Pakistan, it might not take much to set them off. Indeed, following the successful U.S. raid on bin Laden’s compound, several members of India’s security apparatus along with conservative politicians have argued that India should emulate the SEAL Team Six raid and launch their own crossborder incursions to nab or kill anti-Indian terrorists, either preemptively or after the fact. Such provocative action could very well lead to all-out war between the two that could quickly escalate.