Religious Surveillance Neg Wave 2 - University of Michigan Debate

advertisement
Religious Surveillance Neg Wave 2
Produced by:
Celia Buckman
Fiona Chen
Samyak Jain
Alana Levin
Jeffrey Liu
Will Matheson
Ben Mnushkin
Ben Rosenthal
Aly Shakoor
Advantage Answers
1nc Profiling / Discrimination Advantages
Current Scholarship exaggerates the claims of civil liberties abuses.
Deflem & McDonough, 15 --- *Professor of Sociology at the University of South Carolina, AND **
Instructor, Social Sciences at Allen University (February 2015, Mathieu & Shannon, Society, “The Fear of
Counterterrorism: Surveillance and Civil Liberties Since 9/11,” Volume 52, Issue 1, SpringerLink database,
WM)
The terrorist attacks of September 11, 2001 have dramatically heightened concerns over national security and
brought about, in the United States perhaps more than anywhere else, a sharp rise in anti-terrorism laws and
related initiatives to build and improve counterterrorism efforts. In addition to a sharp increase in the budget and
resources assigned to counterterrorism investigations and intelligence-gathering agencies, US Congress formally
approved the expansion of power of the executive branch, including the authorization of new surveillance
techniques and procedures for law enforcement agencies in terrorist-related investigations (Deflem 2010). The
most prominent and commonly scrutinized source of the formal expansion of investigative powers in the United States
since 9/11 is the 2001 USA PATRIOT Act (“Uniting and Strengthening America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism”), which was swiftly passed with little congressional debate in October of
2001. Civil liberties organizations as well as a number of academic scholars have routinely criticized post-9/11
counterterrorism initiatives as unconstitutional and major threats to civil liberties and privacy. Harmonizing
with the claims from civil liberties groups are contributions in the popular and scholarly discourse on surveillance and
counterterrorism that lament the purported negative impact of governmental policies and related surveillance and
intelligence activities on personal rights and liberties. The revelations by former security contractor Edward Snowden in
June 2013 concerning alleged spying practices by the National Security Agency (NSA) greatly reinvigorated these
debates. We investigate here if there is any counter-evidence to the alarmist statements that are often made in the
popular and scholarly discourse on civil liberties and surveillance. Against the background of academic scholarship on
surveillance and criticisms from civil liberty and privacy groups, we rely on archival sources, government documents, and
media reports to examine a variety of claims made concerning civil liberties violations by security agencies. Our
analysis reveals that at least a sizeable number of claims raised against counterterrorism practices
are without objective foundation in terms of any actual violations. As an explanation for this
markeddiscrepancy, we suggest that, as various survey data show, there is a relatively distinct, albeit it uneven and not
entirely stable, culture of privacy and civil liberties in contemporary American society which independently
contributes to a fear of counterterrorism, rather than of terrorism. These specific cultural sensitivities bring
about an increase in the amount of civil rights allegations independent of actual violations thereof. Surveillance
Studies Meets Civil Liberties Advocacy In recent years, especially since the events of 9/11, a new social-science field of
surveillance studies has been developing (Ball et al. 2012; Contemporary Sociology 2007; Lyon 2007). Briefly reviewing
this new burgeoning area, it can be observed that most contributions exhibit a critical and, implicitly or explicitly,
fearful view of surveillance as a powerful and deeply invasive social force. Such worrying observations are
particularly made in the context of the development of technologically advanced means of information
gathering that can threaten privacy and civil liberties. Surveillance expert David Lyon (2003, 2007), for example,
laments the inherent consequences of the new surveillance methods as a powerful tool for profiling that
would produce and reinforce long-term social inequalities. Surveillance scholars have suggested such novel
concepts as a ‘surveillant assemblage’ to denote the convergence of once separate and discrete surveillance
systems in order to mark nothing short of a gradual destruction of privacy (Haggerty and Ericson 2000).
Surveillance technologies are argued to turn into instruments of totalitarian control that create or exacerbate
inequality and lack accountability (Haggerty and Ericson 2006). Some differences in perspective on the impact of
surveillance are to be noted among social-science scholars (Deflem 2008; Dunér 2005), but the research community
has nonetheless not sufficiently acknowledged whatever gains and positive contributions have been made in
providing security.
No FBI racial profiling --- it doesn’t target individuals based on race or ethnicity and
investigates only to protect the communities it serves
Arab American News, 11
(10/29/11, Arab American News, “ACLU says documents obtained from FBI show unconstitutional racial
profiling”, ProQuest)//Yak
In response to the ACLU release, Detroit Special Agent in Charge of the FBI Andy Arena said that
accusations of profiling were not accurate.
"I would not describe it as racial profiling, it is geo-spacial mapping and domain awareness, it's about
knowing the area that you serve," he said.
"All it basically is looking at the makeup of communities across the board, not any specific person, and
learning about who are potential victims and targets but not targeting any specific individual or group."
His office also said that it is mainly responding to profiling allegations with a statement on the FBI's website.
The statement said: "FBI joins the ACLU in opposing racial or ethnic discrimination. The AG Guidelines and
the FBI's Domestic Investigations and Operations Guide (DIOG) clearly prohibit the predication of
investigative activity solely on the exercise of First Amendment rights, including freedom of religion,
or on race or ethnicity. The FBI does not investigate individuals, groups, or communities based on ethnicity
or race.
"Certain terrorist and criminal groups target particular ethnic and geographic communities for victimization
and/or recruitment purposes. This reality must be taken into account when determining if there are threats to
the United States.
"These efforts are intended to address specific threats, not particular communities."
The FBI has an outstanding civil rights record
Deflem & McDonough, 15 --- *Professor of Sociology at the University of South Carolina, AND **
Instructor, Social Sciences at Allen University (February 2015, Mathieu & Shannon, Society, “The Fear of
Counterterrorism: Surveillance and Civil Liberties Since 9/11,” Volume 52, Issue 1, SpringerLink database,
WM)
Civil-Liberties Allegations Against the FBI On the basis of news reports retrieved via Lexis-Nexis, we investigated
civil liberties violations against the FBI in the period between January 1, 2002 and December 31, 2013. Though
not based on a complete universe of cases or a random sample thereof, evidence gathered from these sources suggests
that the number of civil rights violations by the FBI has been reported to be much lower than one would
expect considering the potential problems voiced in the discourse on post-9/11 surveillance. During the
examined period, some 20 cases involving allegations against the FBI received media attention. Some of the cases
involves multiple individuals or groups claiming civil liberties violations. Only five cases involved a substantiated
violation, two of which concerned certain provisions of the Patriot Act before they were excluded as
unconstitutional upon reauthorization of the Act. Other claims are either still under investigation or were proved to
be unsubstantiated. Among the unsubstantiated claims are the cases of Mohamad K. Elzahabi and the FBI surveillance
of protesters before the 2004 political conventions. In 2004, the FBI questioned Mohamad K. Elzahabi, a Lebanese
national put on an FBI watch list after 9/11. Elzahabi claimed that the FBI violated his rights when they questioned him
for 17 days before his arrest in 2004 (Louwagie 2006). Elzahabi made statements during questioning that he taught
sniping in Afghanistan and associated with Al Qaeda leaders, which his lawyers attempted to suppress, claiming coercion
and involuntary detention. However, in June 2007, a judge denied the request, concluding that FBI agents explicitly told
Elzahabi participation in the questioning was voluntary (Browning 2007).
--- XT: Impact Exaggerated
Actual civil rights violations are small compared to ALLEGED threat to liberties
Deflem & McDonough, 15 --- *Professor of Sociology at the University of South Carolina, AND **
Instructor, Social Sciences at Allen University (February 2015, Mathieu & Shannon, Society, “The Fear of
Counterterrorism: Surveillance and Civil Liberties Since 9/11,” Volume 52, Issue 1, SpringerLink database,
WM)
Surveillance and counterterrorism activities are by definition oftentimes secretive and raise sensitive matters
on rights and justice. Such issues are particularly important in a democratic society where violations of civil liberties by
intelligence and other security agencies, even in an area as pressing as terrorism, cannot be condoned. Yet, a
democratically committed society will also be more likely to produce a cultural climate in which concerns
surrounding privacy and civil liberties can lead to claims over rights-related violations that cannot be
substantiated on the basis of actual incidents of such violations. Our findings suggest that the amount of civil
rights violations in the post-9/11 context is relatively small when compared to the alleged threat to civil
liberties suggested in the surveillance discourse among academicians and advocates. In view of our analysis, it is
important for social-science scholars to understand the social realities involved with surveillance and counterterrorism as
involving a subjective dimension related to legitimacy—especially the lack thereof— that co-exists with objective
conditions that are rooted in technology and bureaucratic development. For whereas government and private measures
against terrorism and other security concerns have certain measurable consequences, it is also to be noted that they are
evaluated by a citizenry that is more or less concerned about such issues irrespective of actual violations. The need is
thereby affirmed for sociologists to examine the social conditions affecting security measures regardless of stated
motives. Since the classic contributions of Emile Durkheim on the role of law and punishment (Durkheim 1893), it can
no longer suffice to view counterterrorism (and other forms of social control) as a mere dependent variable related to
terrorism (and other crimes). Instead, as our analysis shows, a more useful framework examines the entire range of
factors shaping surveillance activities, ranging from situational factors to deep-rooted cultural traditions. From the
viewpoint of civil liberties, our study should not be misinterpreted to assume that we would suggest that the
contemporary practices of surveillance and counterterrorism in post-9/11 America (and in other nations across the
world) would not have the potential and actuality to violate civil rights. Our analysis does not imply that the threats that
surveillance programs and practices may pose to civil liberties should be dismissed, a priori or otherwise. Instead, we
suggest that a cultural fear of surveillance and counterterrorism may be so pervasive and deep-rooted that it
leads to overstating the amount of civil liberties violations. The culturally embedded assumption that
surveillance is powerful and harmful to rights and liberties, which is also sustained by claims-making by
surveillance scholars and activists alike, may drive civil liberties allegations independent from actual violations
thereof. In the interest of both social-science analysis as well as civil liberties protection, surveillance scholars and
civil liberties advocates would do well to not overestimate and speculate, without evidence, on the powers of
surveillance and counterterrorism outside of the social context in which relevant practices as well as their
study and debate take place.
The rise of civil liberty groups has created an unwarranted culture of distrust towards
counter terrorism efforts
Deflem & McDonough, 15 --- *Professor of Sociology at the University of South Carolina, AND **
Instructor, Social Sciences at Allen University (February 2015, Mathieu & Shannon, Society, “The Fear of
Counterterrorism: Surveillance and Civil Liberties Since 9/11,” Volume 52, Issue 1, SpringerLink database,
WM)
Besides surveillance scholars, major civil liberties organizations have greatly criticized the post-9/11 expansion
of the surveillance powers of government and intelligence agencies by means of aggressive public campaigns, critical
reports, and lawsuits. The American Civil Liberties Union (ACLU) is one of the most active and prolific of such groups
oriented at protecting the rights granted to US citizens by the constitution. The ACLU has instituted a so-called ‘Safe
and Free’ campaign to address a number of issues related to surveillance and civil liberties on the basis of the notion that
“there has never been a more urgent need to preserve fundamental privacy protections and our system of checks and
balances than the need we face today, as illegal government spying, provisions of the Patriot Act and governmentsponsored torture programs transcend the bounds of law and our most treasured values in the name of national
security” (ACLU website). The ACLU claims that post-9/11 systems of mass surveillance threaten civil liberties
more than that they can effectively combat terrorism. Yet, ACLU campaign tactics may aggravate the fear of
surveillance by exaggerating the actual threat to civil liberties. For example, an analysis of an ACLU ‘Safe and Free’
commercial regarding the FBI’s authority to perform ‘sneak-and-peek’ searches shows that the ACLU overstates the
extent of the threat to civil liberties imposed by counterterrorism laws (Factcheck.org 2004). The ACLU’s ad
claims that the Patriot Act authorizes government agencies to search homes without notification, leaving out
the condition of obtaining a warrant from a judge on the basis of regular probable-cause criteria. Campaigns
similar to those launched by the ACLU have also been established by other civil liberties organizations. The
Electronic Frontier Foundation (EFF), for example, set up the FLAG (FOIA Litigation for Accountable
Government) Project, which “aims to expose the government’s expanding use of new technologies that invade
Americans’ privacy… [and] to protect individual liberties” (EFF website). The project utilizes Freedom of
Information Act (FOIA) requests to reduce government secrecy and thwart potential abuses of power in regard to
government surveillance. Likewise, the Electronic Privacy Information Center (EPIC) works to “focus public
attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional
values” (EPIC website). EPIC has set up a ‘Watching the Watchers’ program to assess the impact of public surveillance
programs proposed following 9/11 (ObservingSurveillance.org). An EPIC report reviewing a budget plan of the
Department of Justice criticizes the proposed surveillance programs for their inadequate public scrutiny and possible
violations of civil rights under the telling title of “Paying for Big Brother” (EPIC 2002). Using such strong imagery
and provocative language, civil liberties groups may effectively contribute to create a fear of surveillance and
counterterrorism irrespective of actual practices concerning rights violations.
Amount of actual civil liberties abuses by agencies ON THE WHOLE is still
incredibly miniscule --- proves their examples are just isolated cases
Deflem & McDonough, 15 --- *Professor of Sociology at the University of South Carolina, AND **
Instructor, Social Sciences at Allen University (February 2015, Mathieu & Shannon, Society, “The Fear of
Counterterrorism: Surveillance and Civil Liberties Since 9/11,” Volume 52, Issue 1, SpringerLink database,
WM)
An analysis of the findings of the OIG reports pertaining to investigations between October of 2001 and June of 2013
reveals that the number of civil rights claims and allegations far exceeds the number of violations. Table 1 presents the
distribution of all claims versus credible claims in each investigative half-year period. Overall, in the period between
2001 and 2013, the Office of the Inspector General received 21,248 claims of civil rights or civil liberties
violations. Of these claims, only 3,421 fell within DOJ’s jurisdiction or warranted further review. Of the DOJ
claims warranting further review, only 265 were deemed credible enough to open an OIG investigation. Thus,
only 7.7 % of the claims within DOJ jurisdiction warranting further review and 1.2 % of the total claims received
were identified as potential civil liberties violations, showing that the number of civil liberties violation claims
made against DOJ far exceeds the number of credible claims.
--- NYPD Surveillance Program Ended
DeBlasio is ending the NYPD’s intrusive Muslim surveillance measures due to
political pressure
Paybarah, 14 --- senior writer at Capital New York. He’s covered politics in New York for The New York
Observer, WNYC Public Radio, New York Sun and New York Press.
(4/16/14, “Was it Justice or Politics that Killled the NYPD Muslim Spy Unit?”,
http://www.thedailybeast.com/articles/2014/04/16/was-it-justice-or-politics-that-ended-the-policeprogram-to-spy-on-new-york-s-muslim-community.html)//Yak
New York is the country’s largest city and one of its most progressive but since 2001 it’s also been at the
forefront of some of the most aggressive and controversial anti-terrorism tactics. Yesterday, city officials
announced the end of one of those major tactics: targeted spying on Muslim communities.
But there’s some strange timing going on here. For one thing, New York’s liberal Mayor Bill de Blasio was in
favor of the surveillance program before he was against it. Then there's the fact that just days after the New
York Times reported that Attorney General Eric Holder will sign off on new guidelines for the FBI that
would allow it to continue using nationality to map and surveil neighborhoods, the NYPD program that had
been assembling detailed files on Muslim neighborhoods is being publicly dismantled.
More on that in a bit, first some background on the program itself.
Officially, the spying was done under the auspices of the NYPD’s “Zone Assessment Unit.” Muslims in New
York City saw their mosques, restaurants and, in some cases, student associations infiltrated by undercover
NYPD officials and confidential informants who took notes on overheard conversations, television programs
that were playing, nationality of store owners and customers, and anything else that NYPD officials thought
gave them a flavor for what was happening in the city’s cloistered immigrant communities that catered to
Muslims from the Middle East, North Africa and Eastern Europe.
The Associated Press first reported on NYPD spying in 2011, in a series of articles that later were awarded
the Pulitzer Prize. The series culminated in a 2013 book by those reporters, Matt Apuzzo and Adam
Goldman, arguing that the labor-intensive and intrusive tactics were also not effective.
Justin Elliott at Pro Publica also questioned the NYPD’s claims that its anti-terrorism tactics helped ward off
more than a dozen terrorist plots, as was claimed by police officials. Setting aside that debate, the politics of
ending what critics called “muslim spying” weren’t as easy or palatable in New York City as observers might
think. As Michael Powell noted in an unrelated television interview, New York City is progressive … as long
as everything is functioning.
But the criticisms made of the spying program weren’t heeded by the Justice Department when it reviewed
racial profiling rules for a similar FBI program that used ethnic mapping to focus intelligence and recruit
informants. According to the Daily News, the Justice Department’s ruling, “should once and for all settle the
debate about whether what’s been wrongly labeled “Muslim surveillance” should continue under Bill
Bratton.” But the opposite has happened. Shortly after Holder's decision on the FBI, Bratton has
discontinued a high profile unit in the NYPD's own surveillance program.
So, what gives? As usual in New York, this is about politics.
Bill de Blasio’s meteoric rise from fourth to first place in last year’s mayoral race was predicated on a few
simple facts: addressing New York’s out of control income inequality (who doesn’t want someone richer than
them to pay a little more?) and, electing someone as far away as possible from Mayor Michael Bloomberg,
who earned a lot of resentment from New Yorkers after extending term limits to stay in office.
De Blasio took office with a progressive mandate and promises to reform New York law enforcement
policies and make them more responsive to minority concerns. But the public safety issue de Blasio focused
on wasn’t Muslim spying. It was the controversial stop-and-frisk tactic. The reason was simple, stop-and-frisk
was the high profile cause that grabbed headlines. Regular reporting on frisking was required under city law;
professors had reams of data to study and analyze; and local lawmakers from majority-minority districts had
countless constituents who were the victims of this policy. And in a Democratic primary, those constituents
would make up a decisive number of votes.
The targets of Muslim spying had much less ammunition at their disposal. There was hardly any data to
analyze — the surveillance programs were, by design, kept from public disclosure. Most information gleaned
about the program came from leaks, primarily to Apuzzo and Goldman. Politically, Muslims were a fraction
of the voting bloc in New York, and had no real recognizable spokesperson. The only Muslim elected official
in New York City — Councilman Robert Jackson of Harlem — questioned the program, but hardly made a
sustained effort to be seen as the face of its opposition.
De Blasio himself initially backed the NYPD as the first wave of Associated Press stories were published. In
April 2013, de Blasio told me “I spent a lot of time with Commissioner Kelly reviewing the situation. I came
to the conclusion that the NYPD had handled it in a legal and appropriate manner with the right checks and
balances.” He also said he wanted to “constantly monitor” them to make sure “it was done right.”
By October, after more AP stories, de Blasio was standing in front of “Muslims for de Blasio,” and publicly
distinguishing between his policies and Ray Kelly’s, telling reporters that spying would have to be based on
“specific leads” and not done “on a wholesale basis.”
When de Blasio appointed Bill Bratton as the city’s police commissioner, he might as well have announced
the end of Kellys’ surveillance program too.
After the AP stories first appeared in 2011, Kelly defended the program as necessary and accused the outlet
of inaccuracies and biases and, later, ginning up stories to promote their forthcoming book. No corrections
were ever run. The series won a Pulitzer Prize. (And, in an ironic twist, the Rupert Murdoch-owned TV
operation bought the rights to the book, despite the vicious attacks it got on the editorial pages of a Rupert
Murdoch-owned paper.)
Years earlier, Bratton had his own short-lived Muslim controversy but he handled it very differently than
Kelly did. To observers, he began to look like the opposite of Ray Kelly.
In 2007, as police commissioner in Los Angeles, Bratton sent Michael Downing, the LAPD’s commanding
officer for Counterterrorism and Special Operations, to testify at a Senate Homeland Security Committee
hearing. Downing said, “We probably have over 700,000 American Muslims throughout the Los Angeles
region but we don’t really know where they live, or what they do or how they’re structured” and “We have
great outreach and we’ve got great relationships, but the idea here is to actually map out, to find out where
the Pakistani Muslims live, the Somalians, the Chechnyans, the Jordanians.”
Sixteen days later, Bratton held a press conference to announce there would be no mapping.
The FBI and NYPD are revising their surveillance policies and moving away from
informal informants
Apuzzo and Goldstein, 14- Matt Apuzzo is a Pulitzer Prize-winning American journalist. Apuzzo was
born in Cumberland, Maine and attended Colby College.
(4/15/14, “New York Drops Unit that Spied on Muslims”,
http://www.nytimes.com/2014/04/16/nyregion/police-unit-that-spied-on-muslims-isdisbanded.html)//Yak
The New York Police Department has abandoned a secretive program that dispatched plainclothes detectives
into Muslim neighborhoods to eavesdrop on conversations and built detailed files on where people ate,
prayed and shopped, the department said.
The decision by the nation’s largest police force to shutter the controversial surveillance program represents
the first sign that William J. Bratton, the department’s new commissioner, is backing away from some of the
post-9/11 intelligence-gathering practices of his predecessor. The Police Department’s tactics, which are the
subject of two federal lawsuits, drew criticism from civil rights groups and a senior official with the Federal
Bureau of Investigation who said they harmed national security by sowing mistrust for law enforcement in
Muslim communities.
To many Muslims, the squad, known as the Demographics Unit, was a sign that the police viewed their every
action with suspicion. The police mapped communities inside and outside the city, logging where customers
in traditional Islamic clothes ate meals and documenting their lunch-counter conversations.
“The Demographics Unit created psychological warfare in our community,” said Linda Sarsour, of the Arab
American Association of New York. “Those documents, they showed where we live. That’s the cafe where I
eat. That’s where I pray. That’s where I buy my groceries. They were able to see their entire lives on those
maps. And it completely messed with the psyche of the community.”
Ms. Sarsour was one of several advocates who met last Wednesday with Mr. Bratton and some of his senior
staff members at Police Headquarters. She and others in attendance said the department’s new intelligence
chief, John Miller, told them that the police did not need to work covertly to find out where Muslims gather
and indicated the department was shutting the unit down.
The Demographics Unit, which was renamed the Zone Assessment Unit in recent years, has been largely
inactive since Mr. Bratton took over in January, the department’s chief spokesman, Stephen Davis, said. The
unit’s detectives were recently reassigned, he said.
“Understanding certain local demographics can be a useful factor when assessing the threat information that
comes into New York City virtually on a daily basis,” Mr. Davis said. “In the future, we will gather that
information, if necessary, through direct contact between the police precincts and the representatives of the
communities they serve.”
The department’s change in approach comes as the federal government reconsiders and re-evaluates some of
its own post-9/11 policies. Although the police department’s surveillance program was far smaller in scope
than, say, the bulk data collection by the National Security Agency, a similar recalibration seems to be
unfolding.
The Demographics Unit was the brainchild of the Central Intelligence Agency officer Lawrence Sanchez,
who helped establish it in 2003 while working at the Police Department and while he was still on the spy
agency’s payroll.
The goal was to identify the mundane locations where a would-be terrorist could blend into society.
Plainclothes detectives looked for “hot spots” of radicalization that might give the police an early warning
about terrorist plots. The squad, which typically consisted of about a dozen members, focused on 28
“ancestries of interest.”
Detectives were told to chat up the employees at Muslim-owned businesses and “gauge sentiment” about
America and foreign policy. Through maps and photographs, the police noted where Albanian men played
chess in the afternoon, where Egyptians watched soccer and where South Asians played cricket.
After years of collecting information, however, the police acknowledged that it never generated a lead. Since
The Associated Press published documents describing the program in 2011, Muslims and civil rights groups
have called for its closing.
Mr. Bratton has said that he intends to try to heal rifts between the Police Department and minority
communities that have felt alienated as a result of policies pursued during the Bloomberg administration. The
meeting last week put Mr. Bratton in the room with some of his department’s harshest critics.
“This is the first time we’ve felt that comfort sitting with them,” said Ahmad Jaber, who resigned from the
Police Department’s Muslim advisory board last year to protest the surveillance tactics. “It’s a new
administration, and they are willing to sit with the community and listen to their concerns.”
1nc Terrorism Adv
CVE focuses counter-radicalization efforts in Muslim communities --- that ignores
the threat of attacks from non Islamic groups --- results in Islamophobia and turns
the Muslim cooperation internal link
Iyer and Sarsour, 2/17/15 --- *South Asian American activist and the former executive director of
South Asian Americans Leading Together, AND **National Advocacy Director for the National Network
for Arab American Communities (NNAAC), the Executive Director of the Arab American Association of
New York.
(Deepa and Linda, 2/17/15, “Obama wants to 'counter violent extremism'. He should look beyond
Muslims”, http://www.theguardian.com/commentisfree/2015/feb/17/obama-counter-violent-extremismconference-muslims)//Yak
On Tuesday, the White House will convene a national summit on combatting violent extremism – but,
despite a plethora of attacks by domestic right-wing extremists and the increase in white supremacist hate
groups, no one expects that to be on the agenda.
Just a week ago, Craig Hicks, an apparently militant anti-theist murdered three American Muslim college
students in Chapel Hill; the FBI and local law enforcement have opened an inquiry into the possibility that it
was a hate crime. In August 2012, Wade Michael Page, an avowed white supremacist, stormed into the Sikh
Temple of Wisconsin outside Milwaukee and killed six people. Page died, but Attorney General Holder made
it clear that the community had endured an act of terrorism and hatred at Page’s hands. Frazier Glenn Miller
Jr, a neo-Nazi who founded the White Patriot Party, allegedly killed three people at a Jewish retirement
community in Overland Park, Kansas on 13 April 2014. He awaits trial for murder.
One would think the federal government’s response to this and other threats against communities of color
would be to develop programs and practices to confront the very real threat of right-wing violence and the
alarming increase of such hate groups in the United States. Instead, the Obama Administration’s programs to
counter violent extremism (CVE) almost exclusively focus on the recruitment and radicalization of Muslims
to engage in terrorist attacks in this country.
While it is important for our government to address all forms of violent extremism to keep Americans safe,
the CVE framework is deeply flawed because of its failure to do that and its reliance on unworkable models.
Last December, a range of interfaith, community and civil rights organizations sent a letter to the White
House expressing these concerns. They noted that the CVE program characterizes Muslims as suspect –
which fosters the existing culture of Islamophobia and hostility in the country that leads to discrimination.
Moreover, the government’s practice of providing funds to Muslim community partners in the fight against
violent extremism has also raised concerns about the true goal of these partnerships. Are they being formed
in order to gather intelligence and information about community members, or to actually engage in valuable
community outreach about civil rights protections? CVE programs can foster mistrust between government
entities and community members. To counter that, the government should engage with Muslim, Arab and
South Asian communities to protect their civil rights – especially since hate violence and discrimination
against our communities have not abated.
The threat of right-wing domestic extremism is not far-fetched. According to the Southern Poverty Law
Center (SPLC), since the year 2000, the number of hate groups in the United States has increased by 56%;
they now include anti-immigrant, anti-LGBT, anti-Muslim and anti-government “Patriot” groups. The federal
government too is aware of the threats from these groups. In April 2009, a report by the Department of
Homeland Security (DHS) on right-wing extremism was leaked and then withdrawn. It revealed the
government’s assessment that “white supremacist lone wolves” posed the most significant domestic terrorist
threat in the US.
Yet, despite this complicated and growing landscape of domestic right-wing groups, the Obama
Administration’s Countering Violent Extremism programs continue to focus on the threat of radicalization in
Muslim communities. Last September, Attorney General Holder announced that the Department of
Homeland Security, the National Counterterrorism Center and the White House would be working with local
US Attorney offices to conduct pilot programs in Boston, Los Angeles and Minneapolis to counter violent
extremism. At the CVE summit held by the White House this week, these programs will likely be highlighted.
Participants at the Summit must ask whether, in these cities, government agencies are focusing on the range
of organizations that espouse violent extremism, including hate groups and white supremacists.
One thing is clear: the federal government’s one-note approach to countering violent extremism
fosters distrust and hostility towards Muslim communities while disregarding threats to Americans’
safety from racist hate groups in the country. As the CVE Summit unfolds this week, we must ask critical
questions about the government’s implementation of CVE programs for the sake of not only Muslim
communities, but all Americans.
No homegrown terrorist threat --- unreliable studies, increased law enforcement,
execution failures
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Is the Muslim homegrown terrorism threat growing?
Despite the concerns expressed by many analysts and public officials, the evidence does not support the
conclusion that Americans face a growing threat of deadly attacks plotted by Muslims in the United States.
First, it is unclear that more American Muslims are intent on mounting such attacks. Although it may yet
prove to be the case, the evidence at present does not substantiate such a finding. The exploratory nature and
approach of studies of radicalization provide limited tools for evaluating whether Muslim Americans are
increasingly exhibiting cognitive and behavioral changes that predispose them to violence. Even if the
behaviors and beliefs sometimes associated with radicalization are detected, it is unclear that they will
culminate in individuals undertaking terrorist activity, and if so, in what incidence individuals will engage in
violent acts. Other evidence that radicalization is increasing, such as a surge in arrests, is also a poor indicator
of a growing inclination toward violence. The surge could be the result of a clustering of arrests of those long
engaged in militancy or the apprehension of large groups, such as the members of the Daniel Boyd network
or the al-Shabaab recruits. Improvements in detection or other actions by law enforcement could also be
contributing to an increase in the number of individuals charged with terrorist offenses independent of any
larger trends in the population.
Second, there is a dearth of evidence suggesting that American Muslims, even if they were to aspire in greater
numbers to plot deadly attacks, would be more capable of doing so without being prematurely apprehended
than their counterparts in the past. The evidence cited above suggests that a significant grassroots
investigative and monitoring architecture is in place in the United States, such that those who do aspire to
plot will continue to be hard pressed to do so undetected. There is no basis for anticipating that the security
environment has become more permissive for terrorists. If anything, the commitment to a steady growth of
resources, an emphasis on federal, state, and local cooperative initiatives in counterterrorism, ongoing signs of
societal vigilance, and continued resistance to militancy in Muslim communities suggest that terrorist plots, as
in the past, have a high probability of being detected and foiled before they culminate in the deaths of
Americans.
Finally, even if attacks are not foiled, there is little basis for anticipating that those that are executed will be
less prone to failure than in the past. Muslim homegrown terrorists in 2009 or 2010 do not appear to have
been better equipped to overcome the challenges of bomb making, or preparing attacks, than in prior years.
Indeed, mistakes in operational security and tradecraft are common even among skilled terrorists and, in the
case of the mostly inexperienced and unprofessional cohort of American terrorists, may be endemic.110 The
evidence from several 2010 cases, including those of Finton, Smadi, Farooque, Martinez, and Mohamud,
suggests that militants make even the most basic mistakes in terrorist tradecraft, including soliciting help from
friends for their plots, advertising their intentions on the internet, and trusting informants and undercover
agents often with few questions asked.111 Even the most capable homegrown terrorists—such as those few
who managed to navigate security obstacles to obtain overseas training and guidance—ran into difficulty in
preparing for their attacks. For example, both Zazi and Shahzad had to contend with serious technical
problems and committed errors in operational security.
No impact --- Acquiring and storing equipment and preparation mistakes
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Acquiring equipment, or simply storing materials, generates yet another set of risks of being exposed. Recall
the case of the Saudi student, Khalid Aldawsari, who was arrested in February 2011 after he was reported to
authorities, first by the chemical company from which he ordered a large quantity of phenol and second from
the freight-forwarding company he hoped to use to receive the shipment.80 According to the New York City
Police commissioner, Shahzad purchased fertilizer with an inferior grade of ammonium nitrate and bought
M-88 fireworks rather than more powerful equipment to lessen the chance his expenditures would be
detected.81 Shahzad’s example illustrates how the security environment could indirectly elevate the
capabilities required for attacks by forcing militants to rely on obscure or difficult-to-work-with materials in
order to evade detection.82
Finally, fabricating viable explosive devices is not the only obstacle that terrorists must overcome to prepare
and execute deadly attacks. Preparing attacks often entails pre-operational activity, including identifying and
surveilling targets while maintaining operational security. Errors in pre-operational activity are common even
among established or well-resourced terrorist networks and organizations and are likely to be pervasive
among less experienced militants.83 Take, for example, the 2003 Casablanca suicide bombings. In that case,
the plotters had a secure community sanctuary and a skilled coordinator (and, at least according to the
Moroccan authorities, help from al-Qaida).84 Yet they still made serious errors in surveillance and planning,
including blowing up a Jewish community center on a Saturday. Fortunately, no one was killed, because the
plotters did not consider that the center would be closed for the Sabbath.85
Empirics prove resiliency to terrorist attacks --- focusing on Muslim threats ignores
far more lethal right wing extremists
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
A final way of evaluating the seriousness of the homegrown Islamist threat is to compare it with other
terrorist threats that Americans have faced in the past and others they face in the present—threats the
population has heretofore managed rather capably. Seen in light of the threats posed by other segments of the
population, the one posed by Muslim Americans appears neither especially novel, nor severe. Take, for
example, the United States’ recent history with terrorism. As Brian Jenkins observes, in the 1970s the country
experienced a rash of bombings by Puerto Rican nationalist groups and the militant left, such as the Weather
Underground, which combined were responsible for more than 100 bombings.127 Contemporaneous reports
underscore the magnitude of the threat at the time. Between January 1969 and October 1970, 370 bombings
occurred in New York City alone, an average of more than one every other day.128 In just over two weeks in
March 1970, 14 bombs exploded in New York City, and there were nearly 2,300 bomb scares—numbers that
defy imagination today.129 Overall, according to the National Consortium for the Study of Terrorism and
Responses to Terrorism, from 1970 to 2007 the United States experienced nearly 1,300 terror attacks—an
average of more than 36 per year—with about 10 percent yielding at least one fatality.130
The United States’ recent experience with terrorist violence from offshoots of antigovernment and Christian
Patriot movements as well as white supremacist groups provides further evidence of Americans’ resilience in
the face of terrorism, and therefore their capacity to weather terrorist attacks of the kind most likely to
originate with Muslim homegrown terrorists.131 In some ways similar in form to the terrorist violence that
has been perpetrated by Muslims, right-wing terrorism is often inspired by an overarching ideology or
worldview and occurs in operationally disconnected attacks usually outside the boundaries of formal
organizations or hierarchies.132 According to the Southern Poverty Law Center’s Intelligence Project, there
were nearly sixty rightwing terrorist plots largely of this nature from 1995 to 2005.133 Another study found
that from September 2001 through September 2010, there were eighty domestic plots involving primarily
right-wing terrorists.134
Moreover, a subset of these cases appears to be especially frightening. When white supremacist William Klar
was apprehended in 2003 as the result of a postal mistake and the actions of an alert citizen, he had allegedly
amassed a large amount of sodium cyanide for use in a terror attack.135 In 2009 a wealthy white supremacist
acquired materials that he hoped to use in a radio logical weapon.136 In 2010, members of a local Michigan
militia helped to expose a plot by the Hutaree militia, which allegedly sought to kill a policeman and then
bomb attendees at his funeral—an assault, as Al-Jazeera’s correspondents did not fail to observe, that is as
serious in its particulars as those of other recent “jihadi” plots.137
Interestingly, Americans do not seem especially terrorized by the right-wing threat. Even the 1995 Oklahoma
city bombing of the Alfred P. Murrah Federal Building—the most lethal attack on U.S. soil bar September
11—seemed to horrify more than terrify people, even though among the 168 dead were 19 children less than
six years old. As one study of public opinion in the aftermath of the Oklahoma City bombing concluded, the
bomber’s actions “altered neither the public’s assessment of personal risk nor its reported behavior.”138
Despite a jump in the month following the April 1995 attack in the number of respondents who said they
were very concerned about terrorist violence in the United States, by June 1995 that figure had fallen below
its July 1993 level. The title of the public opinion study captured the prevailing sentiment: “The Terror That
Failed.”139
In short, Americans have long experience in dealing with the kind of terrorist challenges that Muslim
homegrown terrorism is most likely to present.
--- XT: CVE Bad Turns
Community engagement turns on itself exacerbates intercommunal inequalities
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
Part III moves to the material implications of community engagement. Community engagement efforts constitute one of many entry points for federal
law enforcement into Muslim communities today. But
unlike other types of radicalization policing, community engagement
efforts draw their legitimacy from ideas of inclusion and democratic participation. Most acutely, my concern is that
community engagement turns on itself by providing police with greater power and discretion over
marginalized communities. Rather than enhance participation, community engagement may simply provide
opportunities for select members of Muslim communities to approve preexisting law enforcement
commitments - and create an additional source of pressure on Muslim communities to perform their
Americanness - without meaningful openings for Muslim communities to communicate, collaborate, and
contest the relationship, its modalities, and its outputs. The coercive effect of these practices has been
underexplored, even as their success at increasing democracy and inclusion is taken for granted. While it is beyond the scope of this Article to
engage the premise that cultivating pro-law-enforcement attitudes is necessary for democracy, the Article does raise questions about how the
government should cultivate these attitudes, and how cultivating such attitudes may clash with the duty of people to hold their governments
accountable.
Focusing only on Muslim communities and linking CVE to terror efforts stigmatizes
Muslim Americans
Muslim Advocates, 14- letter from civil liberty organizations to Obama about CVE
(12/18/14, “Coalition Letter to Obama Administration on Countering Violent Extremism”,
http://www.muslimadvocates.org/coalition-letter-to-obama-administration-on-countering-violentextremism/)//Yak
The undersigned human rights, civil liberties and community-based organizations write to express our
concern about the targeting of American Muslim communities and communities presumed to be Muslim
through activities conducted under the auspices of Countering Violent Extremism (CVE).
In 2011, the White House released a strategic implementation plan with the overarching goal of “preventing
violent extremists and their supporters from inspiring, radicalizing, financing or recruiting individuals or
groups in the United States to commit acts of violence.” 1 The plan describes federal support for
“community-led efforts to build resilience to violent extremism” and “preventative programming.” It tasks
the Department of Homeland Security, Department of Justice and FBI to execute CVE programs and
emphasizes the coordinating role of local US Attorneys’ Offices. However, the White House has not
described the basic parameters, methods and metrics of CVE, which appear to vary at the local level.
Our organizations have diverse perspectives on the wisdom and legality of CVE and therefore do not take a
final position on CVE here; however, we all agree that where the federal government encourages these
efforts, it also bears responsibility for their impacts. In this letter, we describe some of these impacts,
including on: religious exercise; freedom of expression; government preference for or interference in religion;
stigmatization of American Muslims; and ongoing abusive surveillance and monitoring practices. We
recommend necessary initial steps toward addressing our concerns.
Impact on Religious Exercise and Political Expression
One purported method of CVE is to provide a space for community discussion of alternative political
opinions and religious viewpoints, without the threat of government surveillance and monitoring. Yet CVE
may also task community members to expansively monitor and report to law enforcement on the beliefs and
expressive or associational activities of law-abiding Americans. That approach to American Muslim
communities—or any belief community— reproduces the same harm as government surveillance and
monitoring. The result of generalized monitoring—whether conducted by the government or by community
“partners”—is a climate of fear and self-censorship, where people must watch what they say and with whom
they speak, lest they be reported for engaging in lawful behavior vaguely defined as suspicious.
Religious exercise and political expression are among the casualties, as individuals may abandon discussions
about religion and politics—or avoid mosque and community spaces altogether—to avoid being tracked into
CVE programs that brand them as “at risk” or potential “terrorists.” Indeed, insofar as CVE trainings and
guidance promote a theory of “radicalization” and malleable “indicators” and “predictors” of violence
including patterns of lawful political activism, ideology and religious worship, they are likely to result in law
enforcement targeting based on political opinion and religious exercise. These are First Amendmentprotected activities—no government-sponsored programs should chill them and law enforcement cannot use
them as a basis for action.
Even where the parameters of CVE and community outreach are more narrowly defined, we are concerned
based on prior incidents of law enforcement overreach that law enforcement may use them as a pretext for
intelligence gathering activities that treat entire communities as suspect. Indeed, in any community roundtable
or event, the presence of Justice Department officials and police creates the risk that community members’
participation and statements may be recorded in intelligence databases.
Improper Characterization of American Muslims as a Suspect Community
CVE’s stated goal is to “support and help empower American communities.”2 Yet CVE’s focus on American
Muslim communities and communities presumed to be Muslim stigmatizes them as inherently suspect. It sets
American Muslims apart from their neighbors and singles them out for monitoring based on faith, race and
ethnicity.
CVE’s focus on supporting local communities links it to traditional community policing initiatives. Yet
federal support for community policing should focus on crime reduction in communities overall—and not
succumb to a singular focus on terrorism or American Muslims. The federal government’s support for
community policing should also be delinked from “radicalization” theory and related concepts. Empirical
studies show that violent threats cannot be predicted by any religious, ideological, ethnic, or racial profiling.
The evidence suggests that there is no direct link among religious observance, radical ideas and violent acts.
Moreover, all agencies involved in CVE should be mindful of potential stigmatizing impacts when they
publicize and promote their efforts to engage with American Muslim communities. Materials should avoid
linking federal engagement with these communities to actions to counter armed groups such as ISIS,
especially as many federal officials acknowledge ISIS does not pose a credible threat of attack within the
United States and the number of Americans who have allegedly traveled to join ISIS—let alone returned—is
miniscule.
Harmful associations with ISIS and other armed groups play into fear-mongering about American Muslim
communities. They are amplified and distorted by the media and can be exploited by individuals and groups
who promote anti-Muslim rhetoric. Government and law enforcement authorities have the power to
significantly shape public discourse and send a strong message to the American public that fundamental rights
such as equal protection and religious liberty must be defended. Singling out one community for special
interventions and enhanced monitoring may have the effect of aggravating existing prejudices and reinforcing
intolerance.
CVE provides legitimacy to status quo FBI practices- encourages community to spy
on each other and creates a global industry upon counterproductive law enforcement
practices- results in international violations on human rights
Fernandez, 15 --- journalist who observes political and social events (4/17/14, Belén, “The pseudoscience
of countering violent extremism”, http://america.aljazeera.com/opinions/2015/4/the-pseudoscience-ofcountering-violent-extremism.html)//Yak
The CVE industry
Despite the seemingly innocuous nature of government campaigns such as “If You See Something, Say
Something™,” the field of domestic terrorism prevention is one of refined Orientalist pseudoscience. Among
its guiding texts is a 2007 manual, courtesy of the NYPD’s Intelligence Division, which lists signs that an
individual may be on a path to “Jihadization.”
According to the report, a person’s “progression along the radicalization continuum” can be signaled by
“giving up cigarettes, drinking, gambling and urban hip-hop gangster clothes” or “becoming involved in
social activism and community issues.”
Beneath the invented technical jargon is an invitation to unabashed and limitless racial and religious profiling,
with the apparent crime of being Muslim further underscored by an expansive list of “radicalization
incubators” and “nodes” that can host the radicalization process. In addition to mosques, these include
“cafes, cab driver hangouts, flophouses, prisons, student associations, nongovernmental organizations,
hookah (water pipe) bars, butcher shops and book stores.”
Meanwhile, given that “urban hip-hop gangster clothes” often trigger other police responses such as stopand-frisk, it might be helpful if the NYPD sat down and composed a coherent inventory of approved
wardrobe items.
No serious government undertaking is complete without acronyms, and here too the counter-radicalization
program shines. Take the NSI: the Nationwide Suspicious Activity Reporting (SAR) Initiative — a
collaborative effort between the Department of Homeland Security, the Federal Bureau of Investigation and
SLTT (state, local, tribal, and territorial law enforcement outfits). As a blog post by American Civil Liberties
Union attorney Julia Harumi Mass notes, this has enabled the FBI to collect a colossal database of
information, because the state’s “loose standards define practically anything as suspicious.”
Then there’s the trendy business of Countering Violent Extremism (CVE), which, among other things,
encourages teachers and parents to serve as the eyes and ears of the national security state. The problem here,
Harumi Mass writes, is that “under CVE, normal teenage behavior could be an indicator of the potential to
engage in terrorism.”
DHS advocates a prevention-focused, community-based approach to CVE, which will ideally render the
members of said community “more inclined to share suspicious information with law enforcement.” A CVE
working group (CVEWG) led by a CVE Coordinator has been established to oversee operations.
To be sure, there’s no better way to promote resilient and cohesive communities that aren’t susceptible to
radical antisocial pathologies than by having residents spy on one another and parents terror-tattle on their
children. (Better still when the FBI pays informants to radicalize folks.)
Beyond its own immediate battle against Domestic Terrorists and Homegrown Violent Extremists (HVEs),
the U.S. is also deeply concerned with helping other nations confront their problems. In February, the White
House Summit To Counter Violent Extremism gathered foreign leaders, United Nations officials, and “a
broad range of international representatives and members of civil society” — including those interested in
making a buck off the CVE industry.
And many a buck is to be made, judging from the White House’s press release about the summit, which plugs
“social media solutions” to violent extremism. According to the release, the US “and our partners in the
private sector are organizing multiple ‘technology camps’ in the coming months, in which social media
companies will work with governments, civil society, and religious leaders to develop digital content that
discredits violent extremist narratives and amplifies positive alternatives.” Google, Facebook and Twitter
were all represented at the summit.
Violence and safe spaces
Among America’s illustrious allies in its global counterterrorism effort is the United Arab Emirates, which
with the United Kingdom co-chairs the CVE working group at the Global Counterterrorism Forum,
launched in New York in 2011. Abu Dhabi also plays host to Hedayah, the International Center for
Excellence in Countering Violent Extremism, which is listed as one of DHS’s crucial CVE partners.
Never mind that the Emirates’ version of CVE appears to include such dubious actions as deporting resident
Shiites en masse and hiring Erik Prince, the founder of Blackwater (rebranded as Academi), to form secret
mercenary armies. It’s no doubt fitting that the UAE, an eager client of the U.S. defense industry, has been
propelled to the vanguard of counter-jihad.
A State Department fact sheet boasting $188 million worth of “ongoing and planned CVE efforts”
emphasizes support for Hedayah as well as other initiatives such as those that “seek to create safe spaces for
dialogue between women community leaders and law enforcement” and that “amplify … the voices of
victims/survivors of terrorism.” Drone-strike survivors need not apply.
This brings us to the question: how does one counter violent extremism when so much of what one
does qualifies as extreme violence? Furthermore, don’t one’s own violent acts — drone assassinations,
bombing civilians, torturing people and supporting oppressive governments — help breed the very violence
that must then be countered? Owning up to this arrangement would, of course, mean ceasing to have our
cake and eat it too.
In an op-ed for Al Jazeera America on the February summit in Washington, Amnesty International USA
director Steven W. Hawkins warned that abusive regimes could take advantage of CVE-mania and use
international funding to violate human rights if the U.S. failed to insist on appropriate safeguards.
But this analysis overlooks the fact that CVE programs are already an affront to these rights, right here at
home. As the ACLU’s National Security Project Director Hina Shamsi recently emailed me, the CVE strategy
“does not include necessary safeguards to protect privacy and constitutional rights [and] risks treating people,
especially young people, as security threats based on vague and virtually meaningless criteria.”
In the end, she wrote, the strategy “risks further alienating the very communities it’s meant to engage.”
Surely it’s nothing that can’t be fixed with CAI, a counter-alienation industry.
Only community initiated reforms can solve – plan doesn’t hold police accountable
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
For community policing to be an effective tool in changing the relationship between the marginalized and law
enforcement, marginalized communities cannot simply be offered a seat at the table to participate in preconceived policing [*907]
programs. They must have the political power to hold police accountable. For community policing mechanisms to offer
potential for real change to marginalized communities, communities must build capacity and political power to demand
accountability. So while we might advocate for law enforcement to engage marginalized communities, we cannot rely on law
enforcement initiatives to recalibrate relationships long rife with deep inequality. The pressure for
meaningful change must come from outside, from the communities themselves organizing for change. n325
--- XT: No Homegrown Terrorist Threat
Empirics prove threat of homegrown terrorism threat is low
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
How serious is the threat?
If there are no solid reasons for anticipating that the threat of deadly attacks in the United States is growing,
how should Americans evaluate the seriousness of the threat of Muslim homegrown terrorism? A first step is
to review the record of homegrown terrorism in the years since September 11. From September 2001
through December 2010, approximately 175 Muslim citizens or residents of the United States were charged
with terrorist-related offenses, including fundraising on behalf of an overseas terrorist organization such as
alQaida or al-Shabaab, seeking to join one, or plotting an attack in the United States.112 The surge in arrests
noted at the start of this article included 43 people in 2009 and 32 in 2010.113 Among these were 31
individuals seeking to join or aid al-Shabaab as well as 9 individuals involved in sting operations.114
Within the smaller sample of operational plots aimed at homeland targets within the United States (the focus
of this article), there were 18 such plots from 2001 to 2010. Of those, 12 involved the extensive participation
of informants and undercover agents from the plots’ early or formative phase. Two—the Little Rock and
Fort Hood shootings—resulted in deaths.115 The perpetrators of those attacks had singled out soldiers, as
have about one-third of all terrorist-related activities and attacks in the United States and overseas.116 Only
one plot reached the execution stage—Shahzad’s Times Square bombing attempt—without the perpetrator
being known to law enforcement before the attack. No explosive device has been successfully detonated by a
Muslim American in a terrorist attack in the United States.
Thus the record suggests, on both analytical and empirical grounds (to the extent one can extrapolate from
such a small number of successful attacks), that the plots most likely to succeed are those that involve
accessible weapons (e.g., firearms) and small numbers of individuals and that require minimal skill and preoperational steps. Because individual plotters do not risk exposure through contacts with others and may use
weapons that require minimal skills, they likely have the greatest chance of avoiding detection and being
successful.117
No risk of terror in Muslim communities --- cultural values, societal connections,
and reporting of suspicious activity already exist
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
I first consider the possibility that militants could and a complicit environment within American Muslim
communities that could constitute a form of community or local sanctuary. The conventional wisdom, as
noted above, has been that Muslim communities are inhospitable to militancy, especially compared with those
in Europe, because American Muslims are more thoroughly assimilated and enjoy middle-class status.43
Studies of Muslim communities provide little evidence of changes or trends that suggest they are becoming
any less resilient against the threat of militancy in their midst.44 For example, one major effort funded by the
Department of Justice, in which researchers resided for periods of two to three months in four midsized
Muslim American communities, found that several features of these communities rendered them intrinsically
resistant to militancy, including, in particular, the strength of their communal organizations and social
networks. In addition, there were efforts expressly geared toward preventing and exposing any signs of
militancy, including both outreach programs and a variety of internal monitoring, or self-policing, practices.45
In particular, two forms of self-policing underscore Muslim American resistance to militancy. First is the
willingness of members to voluntarily alert authorities, through unsolicited tips, when an individual professes
extreme views or is engaging in suspect behavior. In table 1, I detail the central role played by informers and
tips from the community in exposing militants. In addition, a study by Syracuse University found that from
2001 through 2010, in 22 percent of all cases in which defendants were charged with some terrorist related
offense, tips from family or community members brought the person to law enforcement’s attention.46
Another indication that communities—or at least some crucial subset of their members—are repulsing rather
than embracing militants is the (not uncontroversial) success that law enforcement has had in cultivating
informants. Informants are individuals who are engaged by law enforcement to covertly monitor people and
activities in their communities. The Syracuse University study, for example, found that 35 percent of terrorist
cases have involved an informant. Another 9 percent of cases involved undercover officers exposing plots.47
Finally, even if some Muslims sympathize with militant causes, and believe that violence might occasionally
be justiªed in some political contexts,48 attitudes alone do not indicate a willingness to support terrorism,
especially when aimed against fellow citizens.49 Beyond any moral or ethical considerations it raises,
supporting terrorism is a costly act that can result in the perpetrator and his or her community becoming
objects of suspicion.50
Militants cannot avoid suspicion --- alert citizens will report suspicions of
homegrown terror before attacks
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Anonymity
A second option for militants hoping to avoid detection is to seek anonymity by living in population centers
where individuals of similar backgrounds reside, or in places where social norms or environmental factors
render them less likely to be observed (e.g., urban areas, rural/remote places, or commuter/transient
neighborhoods). For example, depending on their ethnicity, some militants could conceal themselves in
immigrant population centers where they blend in demographically.51 In the United States, there are both
moderately sized and several large population centers of Muslims (e.g., Chicago, Los Angeles, the Bay Ridge
neighborhood of Brooklyn, New York, and Dearborn, Michigan).
The mere existence of such large population centers, however, does not mean it is easy to hide within them,
especially given the social norms and intracommunal patterns of engagement observed within these
communities. According to one survey, American Muslims engage in social services at their mosque at a rate
equivalent to U.S. congregations in general and are slightly more likely to engage in activities in the
community beyond (38 percent vs. 32 percent).52 These patterns suggest that there are interconnections
among individuals that heighten the odds that individuals who withdraw from the community or exhibit
changes in belief or behavior will be noticed. Especially when militants are young and inexperienced—as in
the 2010 case of the accused Portland bomber, whose family apparently tipped off authorities about his
increasingly extreme views—they may be especially likely to do and say things that draw attention to
themselves.53
Enhanced societal vigilance and awareness of terrorism after the September 11 attacks may also render it
harder for militants to remain anonymous. Compare the environment in which the September 11 hijackers
operated to that in the present-day United States. Despite warnings by the plot’s mastermind, Khalid Sheikh
Mohammed, to avoid Muslim communities— warnings that underscore the recognized dangers of living
within them—some of the operatives did just the opposite, without provoking the suspicions of those around
them.54 Zacarias Moussaoui befriended members of a Norman, Oklahoma, mosque who apparently did not
question his potential pursuit of terrorist activity even when he professed extreme views.55 Similarly, in San
Diego, two of the September 11 hijackers relied on the hospitality of members of a local mosque to find them
an apartment and purchase a car.56
Contrast the reaction of members of a Hawaiian mosque who in October 2010 reported a new member to
authorities after they became suspicious about his recent move to the area.57 Consider, also, the case of
Khalid Aldawsari, the Saudi student who in February 2011 was charged with plotting bomb attacks on U.S.
targets after he was reported to the FBI and local police by, respectively, employees at a chemical company
and a freight vendor.58 Or take the example of the Circuit City employee who helped to foil the 2007 Fort
Dix plot after observing disturbing footage on a video and informing authorities.59 In each case, alert
citizens, otherwise unacquainted with the militants, helped to expose their potential interest in violent activity
--- XT: No Impact
No impact to lone wolf terrorists- they prioritize psychological effect over the
number of lives taken
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
The difficulties associated with plotting attacks in the United States help to explain why “lone wolf” attackers
are sometimes identified as the mainline domestic threat.118 How serious a threat do such disconnected,
unsophisticated attacks pose to Americans? They can certainly prove lethal. Take, for example, Maj. Nidal
Hasan’s shooting spree at Fort Hood, Texas, which killed 13 soldiers and wounded many more. Alternatively,
consider the outcome if Times Square bomber Faisal Shahzad had chosen an easier method of attack and a
more dependable weapon—firing his newly purchased Kel-Tec semiautomatic riºe into the square on a
Saturday night, rather than attempting a technically ambitious car bombing. He could have killed a large
number of people with a higher probability of success.119 As demonstrated by the 421 workplace shootings
that, according to the U.S. Bureau of Labor Statistics, occurred in 2008, simple attacks can be deadly.120
Whether attacks of this kind present a serious terrorist threat, however, is a somewhat different question.121
Conceptually, terrorism is commonly understood as being about more than killing; its impact depends on
whether attacks generate deeply rooted psychological reverberations in society. As one ob server captures it,
“Terrorism is about terrorizing. It’s about creating fear; it is not just about attacking.”122 Moreover, as
terrorists themselves appear to understand implicitly, the operational complexity of their attacks can affect
how much they terrorize: generating a psychological impact requires undertaking attacks that demonstrate
ruthlessness, premeditation, and technical capability.123 For example, there is likely a reason why Shahzad
chose to use a bomb instead of his riºe, or why al-Qaida did not use its U.S.-based operatives to shoot up
suburban malls in the days following the September 11 attacks and why, since then, it may be willing to
advocate doing so only as a last resort.124 The very fact that aspiring militants are regularly attracted to using
explosives,125 despite the risks of detection and failure they invite, underscores a desire to generate the
maximum psychological effect possible.126
Homegrown terror studies are flawed --- analysts have not understood the
radicalization process, and those who avoided terrorist activities are excluded from
studies
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
While there may be evidence of common changes or behaviors observed within these samples of militants, it
is unclear whether evidence of similar changes in the present-day Muslim American population would reliably
indicate that its members will initiate terrorist activity. How or when such actions or beliefs will lead to
terrorism is not yet well understood. Analysts, for example, acknowledge that “only a tiny minority of
radicalized individuals actually cross over to become terrorists.”19 Although the problem of anticipating
when people will turn to violence is understandably complex, without a better grasp of that process,
arguments about when terrorist acts will occur based on observed changes in thought or actions will suffer
from analytical indeterminacy. This, in turn, makes it difficult to hypothesize about when a set of
individuals—such as American Muslims—is inclined to engage in terrorist related activity.
Moreover, it is unclear whether analysts are at present able to provide insight into what to look for in the
beliefs and behaviors of American Muslims, even in a preliminary or exploratory effort to assess any
propensity for violence. General arguments about how radicalization results in individuals becoming involved
in terrorism are derived from the experiences of a sample of individuals known to have engaged in terrorist
activity. To establish that these patterns in beliefs and behaviors are causally related to the turn to terrorism
and generalizable across cases, however, the arguments need to be evaluated against new data, beyond that
from which the patterns were initially induced.
Another limiting factor is a research design in which analysts of radicalization select cases to study on the
dependent variable—that is, they analyze only cases of individuals charged with terrorism. By not also looking
at individuals who have forgone violence, analysts cannot determine if they have isolated what is unique or
distinctive about those individuals who engage in terrorism. Many people could be doing or thinking things
similar to those committed to violence, but never take actions related to terrorism. They may listen to radical
sermons and engage with activists, discuss with friends Muslim persecution across the globe, and exhibit the
signifiers of extremist modes of thinking, without considering plotting an attack or otherwise aiding a terrorist
organization. Two recent studies of militant Muslims in Europe that do employ control groups of
nonmilitants, for example, suggest that the beliefs of those inclined toward violence and those who pursue
nonviolent political change may not be very different.20
The number cases of homegrown terrorism exaggerate the real number of
homegrown terror attacks
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Finally, it is worth considering the nature of the particular cases that represent the surge of arrests to see what
they reveal about a supposed growing trend in Muslim homegrown terrorism. Several features of that data
cast doubt on whether they represent the “watershed” in plots that some analysts fear.
From 2002 to 2008, the number of arrests involving Muslim Americans varied considerably, from a low of 5
individuals charged in 2008 to a high of 23 in 2003.39 Estimates for 2009 cite 11 to 13 terrorist incidents,
involving 43 Americans charged in the United States or abroad.40 In 2010 the number charged was 32, or 33
if one ambiguous case is included. (See the online appendix and table 1 for details on 2009–10 cases.) Those
numbers clearly represent a major slice of the 175 total number of individuals charged from 2001 to 2010.
Consider, however, that although terrorist indictments against Muslim Americans in 2009 involved an
unusually large number of individuals, many were charged in groups. For example, 14 individuals were
charged in two groups with joining or aiding a foreign insurgency, Somalia’s al-Shabaab; a group of 5
Americans was charged with seeking terrorist training in Pakistan; and another group of 7 North Carolina
men, led by Daniel Patrick Boyd, was charged with seeking to aid foreign insurgencies in Israel and Kosovo
(this group was also suspected of plotting an attack against the Marine base at Quantico, Virginia).
The 2009 figures could also represent a clustering of arrests for terrorist cases that had been unfolding for
years prior, such as that of Bryant Neal Vinas, who traveled to Waziristan, Pakistan, in 2007 only to be
apprehended in 2008 and charged in January 2009. Similarly, Terek Mehanna’s long odyssey to become a
terrorist allegedly began in 2002, although he was not arrested until 2009. The charges against Boyd and his
cohort include acts committed as early as November 2006 (and his militant actions allegedly long predate
those activities).41
The al-Shabaab cases raise an additional issue. On definitional grounds, it makes sense to include them as
instances of Muslim homegrown terrorism in that the cases represent Americans engaging in terrorist activity.
Conceptually grouping these cases with all other terrorist offenses, however, might obscure very different
phenomena that fall under the rubric of homegrown terrorism. There are reasons why officials worry about
the al-Shabaab cases (especially that the individuals will someday return to the United States and do harm).
Leaving the United States to join a group engaged in a regional insurgency, such as al-Shabaab or the Taliban,
however, may be different from plotting to attack Americans within their own borders even if the intent is to
attack American soldiers or Marines overseas.42 This means that the 43 arrests in 2009 do not really represent
a singular threat, but rather the conglomeration of actors with somewhat different militant aspirations.
Finally, if 2009 represents a watershed year, one might expect to see a continuation in the upward trend in
Muslim American terrorist activity in 2010. Although still elevated, especially compared with 2008 (which
represented a low point in terrorism arrests), the number of arrests in 2010 fell to 33, which suggests that
2009 could have been an empirical anomaly.
Reports of homegrown terrorism are only a result of harsher law enforcement --- no
real increase in terrorist activity
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Do terrorist arrests indicate a growing threat?
If studies of radicalization shed little light on the propensities toward violence of Muslims in the United
States, then what should Americans make of the surge in terrorism arrests observed in 2009? Do they indicate
a growing trend of radicalization and propensity toward terrorist violence among American Muslims?
Focusing on a surge in arrests as an indication of radicalization could be misleading for at least two reasons.
First, there could be alternative explanations: more terrorist offenses could have come to official attention,
and produced arrests, as a result of more aggressive law enforcement. Second, the spike could be the result of
factors related to the timing of those arrests and the other details of the cases, which would suggest that the
increase is more an artifact of the data than indicative of a larger trend in the population.
Since the September 11 attacks, the Department of Homeland Security and other entities have invested
significant resources aimed at monitoring and investigating terrorist activity within the United States (see table
1). In turn, there are two ways that this “grassroots” law enforcement effort could be contributing to an
increase in arrests and the appearance that homegrown terrorism is on the rise, even if the incidence of
terrorist activity within the Muslim population has not actually increased. First, a more comprehensive law
enforcement effort could result in more cases being detected that in the past might have been missed. For
example, incidents in which individuals travel overseas to join or aid a terrorist organization, such as those
related to the Somali terrorist group al-Shabaab, which, over the 2009–10 period amounted to thirty-one
cases, could conceivably have been missed and never found their way into terrorist statistics without a
comprehensive law enforcement effort to detect terrorist activity (see the online appendix).
Second, some terrorist acts might be detected and produce arrests, which in the past might never have
become known to law enforcement because the militants abandoned their plots or failed to progress beyond
the “talking” or aspirational stage without taking actions monitored by authorities. There is, in fact, evidence
that authorities might be better prepared to detect potential terrorist activity in its initial phases.21 In
December 2008, the Justice Department provided new guidance to federal agents that allows the FBI to
initiate “assessments” to “proactively” pursue information against a potential terrorist outside of a formal
investigation, and therefore without supplying a particular factual justification for the evaluation.22 Among
the activities authorized under an assessment are employing human sources or informants.23 According to
documents provided by the FBI to the chairman of the Senate Judicatory Committee, Patrick Leahy, from
December 2008 through March 2009, the FBI initiated 11,667 assessments of persons and groups, which
produced 427 more intensive investigations.24 In the summer of 2011, the FBI further loosened restrictions,
rendering it easier for agents to employ lie detector tests, comb through people’s trash, and search databases
prior to initiating an assessment.25
One piece of evidence that also suggests that detection has been occurring at early stages is the declination
rates observed in terrorism cases (i.e., the rate of terrorism matters referred by law enforcement for criminal
prosecution that prosecutors decline to pursue). The declination rate rose to 73 percent in fiscal year (FY)
2008 from 61 percent in FY 2005 and from 31 percent in 2002.26 These cases often lack sufªcient evidence
and are too weak for prosecutors to pursue.27 One cause for the increase in declination rates is that
authorities could be unearthing terrorist-related activity at earlier stages, when it is less likely to form the basis
of a substantial case. If, as a result, even some number of these cases that might in the past have gone under
the radar result in arrests, then the actions of law enforcement, independent from any actual change in the
amount of terrorist activity being undertaken by the population, could be producing larger numbers of
recorded terrorist incidents.
Equally important, law enforcement may not just be detecting more cases; it could also be generating more
cases through its actions in two ways. First, law enforcement could be seeking to build more substantial cases
against those accused of terrorism-related offenses, which could increase the number of incidents counted in
the data. Law enforcement officials might, for example, hope to push down the high prosecutorial declination
rate noted above by investing more resources in investigations or holding out longer before making arrests.
One expert captures this rationale, “[I]f you nip [the case] too early in the bud, then you may not have
credible evidence to use in court.”28 Alternatively, officials might be motivated to build stronger cases, so
that defendants can be charged with serious terrorism violations, rather than lesser or “preventive charges”
such as immigration violations.29 For example, the Center for Law and Security reports that between
September 2001 and September 2010, only 31.6 percent of defendants in cases associated with terrorism
(defined as cases in which the word “terrorism” is mentioned in indictments or press releases) were charged
on core terrorism statutes, while an additional 12.2 percent were charged with national security violations.30
The case of Hosam Smadi, who was accused of trying to blow up a Dallas office building in 2009, is
instructive in this regard. As a special agent involved in the case reported, Smadi had overstayed his visa, and
“law enforcement could have arrested and deported him.” Instead, the FBI decided to use undercover agents
“to set up a sting.”31 Given the political pressure over declination rates that the FBI has experienced in the
past, it makes sense that officials might seek to build the most substantial cases possible whenever they
suspect that an individual is seriously inclined toward militancy.32 In turn, if cases that might otherwise have
ended in lesser or no charges being ªled are instead pursued by agents to the point where they seem viable,
this could yield an increase in the number of terrorist-associated offenses recorded in the data.33
No threat of Muslim homegrown terrorism --- overstating the threat is
counterproductive for national security and decreases resiliency against attacks
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Conclusion
This article demonstrates that the threat posed by Muslim homegrown terrorism is not particularly serious,
and it does not appear to be growing, especially in its most lethal incarnation—deadly attacks within the
United States. Indeed, many analysts and public officials risk overstating the threat posed by Muslim
American terrorism. Mischaracterizing that threat, in turn, is potentially costly and counterproductive for the
security of the United States and the welfare of its citizens, for several reasons.
First, misjudging the homegrown threat could lead the country to overinvest or poorly spend on
counterterrorism initiatives. Since the September 11 attacks, the government’s investments in resources
oriented toward grassroots homeland security have risen steadily. Although these are modest in comparison
with other federal expenditures, they nevertheless detract from other priorities. Consider, for example, how
the reallocation of resources toward terrorism within the FBI has undermined its capacity to pursue whitecollar crimes. After 2001, the FBI reduced the number of agents for its criminal program by 30 percent (from
6,179 in 2001 to 4,353 in 2008), while the number of agents speciªcally allocated for white-collar crime fell by
36 percent, from 1,722 to 1,097. Consequently, the number of cases brought forward related to financial
institution fraud plummeted by 48 percent (dropping from 2,435 to 1,257), and during the height of the 2008
financial crisis, the FBI was left struggling to find resources to investigate major financial and other mortgage
and securities crimes.141 In short, the “terrorism trade-off” can be significant, especially if serious questions
remain about whether that investment is warranted.142
Second, overstating or poorly characterizing the challenges posed by Muslim American terrorism risks
undermining societal resilience in the face of terrorism.143 Take, for example, Director Leiter’s
characterization of the homegrown threat: while noting that recent attacks are “operationally unrelated,” he
nonetheless described them as being “indicative of a collective subculture and a common cause that rallies
independent extremists to want to attack the homeland.”144 Alternatively, consider FBI Director Mueller’s
warning that homegrown terrorists “inspired by a violent jihadist message . . . may be as dangerous as groups
like Al Qaida, if not more so.”145 This language reinforces the sense of homegrown terrorism constituting
not only a major threat, but a monolithic campaign against Americans.
--- Overstating Terrorist Threat Bad
Their framing of the Muslim threat undermines societal resilience to a terror attack
threats of terror activity
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
If a shooting at Fort Hood is scary, however, more terrifying is seeing it as part of a larger conspiracy against
Americans and their livelihoods. Comments that magnify the threat undermine society’s capacity to withstand
what in fact are mostly self-initiated, disconnected attacks whose only real association to a centralized
conspiracy is within the minds of the terrorists.
Public officials and expert commentators might consider reframing the Muslim American homegrown threat
by doing more, for example, to present it as one among many domestic threats of terrorist activity posed by
ideologically motivated segments of society—threats, for the most part, that Americans do not appear
especially afraid of and have managed rather capably.146 Officials might also emphasize what Leiter duly
observed is the “operational unrelatedness” of recent plots and the diversity of terrorist offenses grouped
under the rubric of homegrown terrorism. Instructive is former National Intelligence Director Dennis Blair’s
characterization in February 2011 of violence from “homegrown jihadists” as “sporadic,” in which a “handful
of individuals and small, discrete cells will seek to mount attacks each year, with only a small portion of that
activity materializing into violence against the homeland.”147 Such framing efforts could help to render
threats of militancy originating from Muslim Americans more familiar and less formidable—akin to other
terrorist threats from domestic militants the country faces. There are, however, serious obstacles to such a
balanced discussion of terrorism in American politics. One indication of the problem is the political backlash
that ensued after the Department of Homeland Security issued a report in 2009 warning that the threat from
violent right-wing extremist activity was growing.148 Secretary Napolitano came under fire for one section of
the report that warned that returning veterans could become drawn to extremist groups. She subsequently
issued an apology letter to the American Legion, posted on the department’s website a formal statement
clarifying the report’s intent, and eventually disowned the report, calling it “not a well-produced product.”149
Perhaps unsurprisingly, the Department of Homeland Security has been notably reticent to label right-wing
attacks “terrorism,” even when they qualify by many people’s standards.150
These political obstacles aside, more should be done to promote a balanced discussion of terrorist threats in
the United States. Otherwise, Americans are presented with a distorted picture in which terrorist attacks
appear to be originating primarily with Muslims, rather than with extremists of all varieties. In an era when
the mistrust of Muslim communities is a serious social and political issue, this unbalanced presentation is
corrosive to American society.151
Finally, mischaracterizing and inflating the Muslim homegrown American threat could prove self-defeating to
the country’s efforts to defend against it. Especially worrisome is the potential that, in an atmosphere in
which the threat of homegrown terrorism appears serious and worsening, law enforcement will employ
counterproductive methods that threaten the trust between its officials and Muslim communities—trust that
underpins the demonstrated capacity and willingness of American Muslim communities to self-police and
root out militants in their midst.152 For example, although the cultivation of informants and infiltration of
undercover agents into Muslim communities can be helpful to investigators, there are inevitable risks
associated with these methods, and using them requires care and awareness of how they may affect the
communities in which they are employed. In many places, federal law enforcement and local police
departments have sought to build strong relationships through outreach to Muslim communities. Such efforts
help to lay the groundwork for good relations and ease tensions associated with law enforcement’s
monitoring efforts.153 But FBI sting operations, such as those employed in the case of the Portland bombing
suspect, Mohamed Osman Mohamud, can seriously test those relationships.154 Evidence of mismanagement
and insensitivity are similarly troubling.155 More broadly, the perception that authorities “routinely run
armies of informers” through American Muslim communities contributes to the sense, as the president of the
Islamic Society of North America describes it, that “law enforcement is viewing our communities not as
partners but as objects of suspicion.”156 Equally insidious is how these tactics, by generating suspicion and
eroding norms of communal openness, undermine the community’s capacity to self-police, thereby making it
harder for members to detect militants in their midst.157
No homegrown terrorism due to lack of incentive or capability --- US rhetoric
undermines Muslim cooperation and stigmatizes Muslims
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Are Muslims born or living in the United States increasingly inclined to engage in terrorist attacks within the
country’s borders? For much of the post–September 11 era, the answer to that question was largely no.
Unlike its European counterparts, the United States was viewed as being relatively immune to terrorism
committed by its residents and citizens—what is commonly referred to as “homegrown” terrorism—because
of the social status and degree of assimilation evinced by American Muslims.1 In 2006, in the long shadow
cast by the Madrid 2004 and London 2005 attacks perpetrated by European homegrown terrorists, there was
a perceptible shift in the characterization of the threat posed by American Muslims.2 Public officials began to
speak more regularly and assertively about the potential threat of some Muslims taking up terrorism, elevating
it in their discussions alongside threats from foreign operatives and transnational terrorist organizations.3 By
2009, in part catalyzed by a surge in terrorist-related arrests and concerns that they could portend a growing
radicalization of the American Muslim population, policymakers and terrorist analysts seemed increasingly
worried about homegrown terrorism.4 When U.S. Special Forces killed Osama bin Laden in May 2011, some
members of Congress and other commentators argued that the threat of homegrown terrorism would
become even more important.5
Thus, in the decade since the September 11 attacks, homegrown terrorism has evolved from a peripheral
issue to a major theme in contemporary debates about the terrorist threats facing the United States. Public
officials such as Secretary of Homeland Security Janet Napolitano, Federal Bureau of Investigation Director
Robert Mueller, and Attorney General Eric Holder regularly counsel that the number of Americans engaging
in terrorist activity has risen.6 As Napolitano cautions, “One of the most striking elements of today’s threat
picture is that plots to attack America increasingly involve American residents and citizens.”7 According to
Holder, “The American People would be surprised at the depth of the [homegrown terrorist] threat.”8
Concerns about homegrown terrorism, in turn, have generated a variety of think tank reports and associated
warnings by many of the country’s most accomplished terrorism researchers.9 Analysts such as Peter Bergen,
Paul Cruickshank, Bruce Hoffman, and Marc Sageman have all expressed concern about a potential rise in
terrorism initiated by Muslim Americans.10 Indeed, Bergen and Hoffman call the year 2009 a “watershed in
terrorist attacks and plots in the United States.”11
Clearly, public officials and analysts are worried about the prospect that Americans will face a growing trend
of violent attacks from extremist elements within the country’s Muslim population. Less certain, however, is
whether those warnings and the sense of urgency associated with the homegrown terrorism threat are
warranted. In fact, the threat of Muslim American terrorism may not be especially serious or growing. It
could remain a modest challenge, similar to what it was for much of the decade following September 11.
The stakes for Americans in an accurate assessment of the threat of Muslim homegrown terrorism are
significant. If the threat is overstated, the United States risks becoming preoccupied with this incarnation of
terrorism and could make unwarranted investments in intelligence and law enforcement to address it, while
underemphasizing other terrorist or nonterrorist threats. Overstating or miscasting the homegrown threat
could also undermine society’s resilience to terrorism, while feeding a climate of fear and misunderstanding
between Muslims and other Americans. In addition, overestimating the threat could contribute to the
adoption of counterproductive counterterrorism methods, especially those that threaten to alienate Muslim
communities from law enforcement. Given that cooperation from these communities has proven a major
safeguard against the homegrown threat, any breach of trust between their members and government
authorities would be a worrisome development.
It is therefore essential that Americans have a clear picture of the magnitude of the threat they face from
Muslim homegrown terrorism. This article aids in that endeavor by systematically analyzing the argument that
Muslim residents or citizens of the United States represent a serious and growing terrorist threat to American
society, particularly in their supposed willingness or capacity to execute deadly attacks in the United States. I
structure my analysis around three alternative pathways, or conditions, that alone or in combination could in
principle contribute to a growing threat of homegrown terrorism. In so doing, I probe what is known about
the motivations and capacity of American Muslims to execute deadly attacks in the United States and thus
provide a comprehensive analysis of that threat.
My conclusion should be generally reassuring to Americans: Muslim homegrown terrorism does not at
present appear to constitute a serious threat to their welfare. Nor is there a significant analytical or evidentiary
basis for anticipating that it will become one in the near future. It does not appear that Muslim Americans are
increasingly motivated or capable of engaging in terrorist attacks against their fellow citizens and residents.
--- AT: Terrorists Train Abroad
Training abroad fails --- western recruits get rejected and value of training is limited
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
The difficulty of acquiring expertise overseas
What if homegrown terrorists do not need to acquire skills or plan and prepare their attacks in the United
States and can instead travel overseas to train and then return to execute them?96 Some analysts contend that
training Westerners who travel overseas to then attack targets in their countries of residence is a favored
strategy of al-Qaida Central, and that this is contributing to a growing homegrown terror threat.97
There are, however, considerable obstacles to receiving remote training that cast doubt on whether it offers
such unmitigated benefits to aspiring terrorists. To start, leaving the United States and reentering requires
navigating significant post–September 11 security regimes in Western countries; similarly, entering and exiting
a terrorist camp in the foreign country without exposing one’s identity can be a complicated process.98
According to Nesser, many activists in Europe in the last decade who traveled overseas to obtain training
were exposed or captured before they could undertake their missions.99
In addition, Western “self-recruits” have to connect with terrorist organizations in their base countries, and
leaders have to accept them for training. Take the case of five Muslim American suspects who traveled to
Pakistan for training but were repeatedly turned down “because they were foreigners and had no local
references.”100 Or consider the case of Terek Mehanna, whose associate sought to solicit training, only to be
turned down by two Pakistani militant groups.101 Even someone with significant personal ties to Pakistan,
such as Faisal Shahzad, can encounter problems; he reported that establishing his connection with the Tehrike-Taliban organization took six months.102 Indeed, from the perspective of militant groups, as much as
American or European citizens represent an opportunity to train Westerners and send them back to wreak
havoc in their home countries, they also represent serious security risks to the organization.103
Finally, even if a recruit is accepted for training, the practical value of that remote instruction once the
militant is back home may be limited.104 The cases of Najibullah Zazi and Faisal Shahzad, the respective
New York subway and Times Square bombers, are instructive. Zazi was extensively trained and guided by an
al-Qaida operative.105 Still, he ran into technical problems while fabricating his TATP bombs in a hotel
kitchenette and was forced to contact his associates in Pakistan for instruction; those communications were
intercepted.106 Or consider that Faisal Shahzad was trained by the Pakistani Taliban for forty days, in which
five were devoted to explosives training and yet, leaving aside his use of nonexplosive fertilizer, his device was
poorly constructed.107 He also made several errors in operational security, including failing to destroy one
VIN number on his vehicle, as well as leaving behind car keys and a prepaid cellphone used to receive calls
from Pakistan and to call the ªreworks store where he purchased bomb-making materials—errors that helped
to ensure he would be unable to repeat his attempt, despite his professed plans to do so.108 Even if
Shahzad’s training was cursory or incompetent, it underscores the necessity and difficulty of bringing together
professional experts with capable students.109 Finally, trainees still face the selflimiting conditions of their
untrained counterparts once they are back home, which will also complicate their efforts to undertake preoperational activity and execute attacks without first being detected; for all his overseas training, for example,
Zazi’s plot was still detected by authorities in the United States.
--- AT: Terrorists Get Info from Internet
Militants are unable to deploy information from the internet effectively --- especially
in insecure environments
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
The internet as a technical and instructional resource
The proliferation of online training and explosives manuals has raised serious concerns that these materials
could enhance the skills of aspiring terrorists. Director of the National Counterterrorism Center Michael
Leiter captured these worries, “[I]ncreasingly sophisticated English language jihadist propaganda remains
easily downloadable via the internet and provides young extremists with guidance to carry out Homeland
attacks.” As Gabriel Weimann contends, the internet constitutes an “online terrorism university.”68
These concerns aside, there are analytical and empirical reasons to question how much online resources can
improve militant capabilities. One set of problems relates to the quality of information available from training
and explosives manuals. In a survey of online Arabic- and English-language training materials, for example,
Anne Stenerson found that the information in her sample was often poorly conveyed or organized.69 In a
separate study, Jennifer Yang Hui found that many of the technical instructions for explosives appearing on
Indonesian militant websites were patchy and incomplete.70 Although analysts at Jane’s Intelligence Weekly
observed improvements over time in online materials, they nonetheless concluded as recently as 2006 that “it
is probably fair to say that the jihadist online infrastructure is still in its infancy.”71
In addition to shortcomings in training manuals, militants may have a difficult time employing technical
information effectively, especially when, as Michael Kenney describes, they lack practical experience and the
capacity to tailor abstract information to local conditions.72 Failed attacks in Europe (where attempted
attacks have been more plentiful than in the United States) provide numerous examples of these difficulties.
In 2006 two Lebanese men left suitcase bombs on German trains that failed to detonate because of errors in
the fabrication of the explosives. In 2007 a British engineer and medical doctor set gas cylinder bombs in
automobiles outside London nightclubs, which also exhibited technical flaws.73 Most striking is Nesser’s
finding: in his detailed survey of plots in Western Europe, Nesser could not find a single example of terrorist
cells developing operational capabilities, including building working bombs, solely from instructions
downloaded from the internet.74 Consider that even members of technically capable organizations often
make errors, including the leader of the Basque nationalist group ETA, who was killed by his own bomb,75
or the operatives maimed by the Provisional Irish Republican Army’s “own goals.”76
Moreover, in evaluating the implications of online manuals, it is essential to consider the security context in
which militants in the United States operate and how this bears on their capacity to capitalize on those
resources. In a permissive security environment, militants might be able to experiment, train over time, and
perfect their skills and capacity to translate abstract information into practical know-how. In a less secure
environment, however, efforts to practice, especially with explosive devices, generate risks that the militants
will be observed and exposed. Consider the network responsible for the Madrid bombings on March 11,
2004. When members of the network rented a farm house to train and practice using detonators, their
activities were noticed by the local population; although not reported, the fact that they were observed
underscores the risk inherent in such activities.77 In the United States, the 2003 Virginia paintball network
was uncovered as a result of a tip about its efforts to enhance its skills through paramilitary training.78 Even
seemingly inconspicuous bomb-making activities can be detected. Producing chemicals can leave telltale signs
on interior spaces, changing paint colors and generating fumes, which may be observed by alert hotel
operators or landlords.79
--- AT: Terrorists Will Use Remote Communications
Remote communications have limited utility for terrorists --- errors and increased
risk of detection
Brooks, 11 --- Associate Professor of Political Science. Ph.D., UC-San Diego
(Fall 2011, Risa A Brooks, “Muslim “Homegrown” Terrorism in the United States How Serious Is the
Threat?”, projectmuse) //Yak
Although arguably of limited use for building explosives and training, the internet could help militants
implement their attacks more effectively in another way: it could mitigate the risks of exposure inherent in
pre-operational activity, especially by facilitating communications and substituting for on-theground
surveillance.86 Maps and satellite imagery, for instance, can be helpful in gathering information about targets.
Shahzad, for example, reportedly tracked pedestrian trafªc in Times Square with real-time video feeds.87 Also,
communications may be facilitated through the use of methods such as “electronic dead-drops,” in which
militants leave messages in the draft folder of an email account and others retrieve the information without
sending the message.88
Nonetheless, there are limits to the utility of the internet for these purposes. Take, for example, the 2008
Mumbai attack by Lashkar-e-Taiba. In preparing for the attack, leaders employed satellite maps, GPS, mobile
phone applications, and a variety of other technologies.89 Those leaders, however, also sent an American,
David Headley, on five surveillance trips to Mumbai during which he scouted targets and hired fishermen for
private tours of the harbor to determine landing points for the attackers.90 Despite being trained in
surveillance techniques, Headley made several errors in a subsequent plot aimed at the Danish newspaper
Jyllands-Posten, and he was ultimately apprehended because of his activities in preparation for that attack.91
As one U.S. military study observes, figuring out the details of local targets and their defenses often requires
some physical surveillance.92 Consider the requirements of a 2004 plot in which two men sought to bomb
the subway station in Herald Square by leaving explosive devices in refuse containers and under benches.
Before undertaking the attack, the plotters “wanted to know the number and location of cops on the
platforms at different times of the day. Which areas were covered by video cameras? Since the likeliest place
to hide a bomb was a garbage can, they needed to know how many there were, where they were located, and
when they got emptied. And they needed to find the best path to go in and then get out quickly after planting
the device.”93 Growing advances in the technology and methodology of countersurveillance increase the
risks inherent in such surveillance activities.94
This discussion, in fact, underscores an overarching constraint facing militants in the United States, which
originates in the country’s significant investment in security and dearth of community sanctuaries. Assume
that an individual is able to connect with an acquaintance and they can securely interact and discuss in the
abstract a terrorist plot. As soon as they attempt to recruit others, seek training or resources, or undertake
surveillance, they create security risks that threaten to expose themselves to authorities. In this sense, terrorist
plotting in the United States may be self-limiting: the greater the number and layers of complexity in the
campaign, the more it requires resources and activities that render the plotters vulnerable to exposure.95
AT: First Amendment Adv
The First Amendment legitimizes hate speech and reaffirms status quo notions of
racial minority’s inferiority.
Delgado and Stefancic 97 – Delgado is the founder of critical race theory and professor of
civil rights and race theory at the University of Alabama School of Law; Stefancic is an
Affiliate Professor at the University of Alabama in Civil Rights, Constitutional Law, and
Critical Race Theory (Richard Delgado, Jean Stefancic, Must We Defend Nazis?, NYU Press,
January 1 1997, *fc)
In the last few years observers have noticed a sharp upsurge in intellectual activity surrounding the role of
speech and expression. Reformers have been demonstrating how hate speech and pornography injure
minorities and women. Postmodernists have been pointing out how every speech controversy can be
approached in at least two ways. (See chapter 4.) A the same time, defenders of tradition such as the ACLU
and other free-speech absolutists have been writing books and articles defending an unfettered First
Amendment, to which yet other observers such as Jack Balkin reply: they are caught up in “ideological
drift”—failure to notice how an instrument that once promoted dissent and other causes dear to liberals is
now wielded chiefly by white supremacists, pornographers, and other dubious allies.
Is this debate merely about who possesses the correct vision [idea]—about who is the real defender of the
right and the true? No. We think there is another, far more intellectually intriguing explanation for the rifts
and tugs-of-war over issues such as pornography and hate speech that are testing the limits of First
Amendment orthodoxy. In this other vision [idea], the skirmishes are not so much questions of standing
one’s ground, as some of the old-timers see it, or even of refining that ground slightly, as some want to make
it appear. Rather the ground itself is shifting. The prevailing First Amendment paradigm is undergoing a slow,
inexorable transformation. We are witnessing the arrival, nearly seventy years after its appearance in other
areas of law, of First Amendment legal realism. The old, formalist views of speech as a near-perfect
instrument for testing ideas and promoting social progress is passing into history. Replacing it is a much more
nuanced, skeptical, and realistic view of what speech can do, one that looks to self- and class interest,
linguistic science, politics, and other tools of the realist approach to understand how expression functions in
our political system. We are losing our innocence about the First Amendment, but we will all be wiser, not to
mention more humane, when that process is complete.
The Transition
Early in American history, we thought the First Amendment was the crowning jewel of our jurisprudence. As
recently as 1970, scholars de-scribed our system of free expression in sweeping, exalted terms.; But shortly
thereafter some writers began expressing doubts about whether First Amendment doctrine was capable of
delivering on its lofty promises.4 In the last few years, under the impetus of challenges from critical race,
feminist, and other writers, the trickle of doubts has turned into a flood.' The transition to the new paradigm
is far from complete. Those who write in the new tradition still expend much energy defending themselves
from charges that they are Satanic, forgetful of history, deluded, in league with fascism, etc.6 It is impossible
to predict what the new understanding of the First Amendment will look like when fully mature, just as the
early Realists, seventy years ago, scarcely could have predicted how their move-ment would lead the way to
clinical legal education, perspectivism, critical legal studies, and elite law reviews. With these cautions, we
offer here the themes and outlines of a new conception of the First Amendment. We make no claim to be
comprehensive; the list may be personal to us.
The New First Amendment Legal Realism First, the paradigm includes an awareness of the First
Amendment's limitations. Early in our republic, we made grandiose claims for what the system of free
expression could do.7 But recently, scholars have shown that our much-vaunted marketplace of ideas works
best in connection with questions that are narrowly limited in scope. Is this parking space safer to leave the
car in than another? Does a heavy object fall faster than a light one in a vacuum? Would a voucher schoolfinance scheme ad-versely affect the poor? (See chapter 5.) With such clearly bounded disputes, free speech
can often help us avoid error and arrive at a consen-sus. But with systemic social problems like racism
and sexism, the market-place of ideas is much less effective. These broad-scale ills are embedded in the
reigning paradigm, the set of meanings and conventions by which we construct and interpret reality. Someone
who speaks out against the racism of his or her day is seen as extreme, political, or incoherent. Speech, it
turns out, is least effective where we need it most.
A second theme of First Amendment legal realism is the role of free expression in legitimating the status
quo.' If, as a starting point, we posit a perfect marketplace of ideas, then, according to the old paradigm, the
current distribution of social power and resources must be roughly what fairness and justice would dictate.
Our more energetic European ideas, for example, competed with others and won: it was a fair fight. But, of
course, it was not fair: communication is expensive, so the poor are often excluded; the dominant paradigm
renders certain ideas unsayable or incomprehensible; and our system of ideas and images constructs certain
people so that they have little credibility in the eyes of listeners.
This leads to a third component of the new approach, namely that language and expression can
sometimes serve as instruments of positive harm. Incessant depiction of a group as lazy, stupid, and
hypersexual—or ornamental for that matter—constructs social reality so that members of that group are
always one-down.' Thereafter, even the most scrupulously neutral laws and rules will not save them from
falling further and further behind as private actions compound their disadvantage. (See chapter 5.)
Affirmative action becomes necessary, which in turn reinforces the view that members of these groups are
naturally inferior (because they need special help). Pornography and hate speech are the two most visible
fronts on which the fight to make the legal order recognize and prevent these harms is waged, often against
great resistance. But when powerful groups find a particular type of speech offensive and likely to render
them one-down, they blithely pass a law to curtail it. We rarely notice these "exceptions" and special
doctrines, however, because they are time-hon-ored and second nature. Of course there would be an
exception for state even label, secrets, plagiarism, false advertising, and dozens of other types of speech, we
say. But one to protect eighteen-year-old black undergraduates at dominantly at white institutions? Oh no, we
say, the First Amendment must be a seamless web.10
1nc Religion Freedom Adv
The chilling effect isn’t real – Muslims respond to surveillance with increased
visibility.
Bayoumi 12 – Associate Professor of English at Brooklyn College, City University of New York, with a
Ph.D. in English and Comparative Literature from Columbia (Moustafa Bayoumi, The Nation, “Fear and
Loathing of Islam,” June 14 2012, http://www.thenation.com/article/168383/fear-and-loathing-islam, *fc)
Does this mean that the United States is an Islamophobic country? Of course not. Large support for
American Muslims exists in many quarters [see Laila Al-Arian’s essay in this issue, page 31]. Polls may suggest
that about half the population is anti-Muslim, but that leaves half that isn’t. In many quarters of the country,
there is genuine, not suspicious, interest in American Muslims and the realities they face, as evidenced by the
fact that TLC produced All-American Muslim. Aasif Mandvi’s contributions to The Daily Show routinely
deflate the power of this contemporary prejudice, and libraries, museums, classrooms and houses of worship
across the country now regularly include Muslims and Islam in their programming in an attempt to further
understanding and combat bigotry.
American Muslims have responded to events over the past decade and the expansion of an antiMuslim network largely by being more, not less, visible. The number of mosques grew 74
percent over the past decade, despite the opposition Muslims sometimes confront in their
construction. Even if a 2011 poll found that 48 percent of American Muslims reported experiencing
discrimination in the previous twelve months, they also showed more optimism than other Americans in the
poll that their lives would be better in five years (perhaps, in part, because of today’s discrimination). The
guiding belief in the American Muslim community today is that the country will recognize that Muslims have
always been and will continue to be a part of America.
An ordinary life is more meaningful than it sounds. It signifies being able to live your life as you define
yourself, not as others define you, and being able to assume a life free of unwarranted government prying. In
fact, ordinariness is the foundation of an open society, because it endows citizens with a private life and
demands that the government operate openly—not the other way around, which is how closed societies
operate.
IRF programs have existed for decades and are expanding
Mandaville and Silvestri, 15 – *Peter, Professor in Government & International Affairs at George
Mason U and ** Sara, Senior Lecturer in Religion and International Politics at City University London and
Director of Research at U of Cambridge (“Integrating Religious Engagement into Diplomacy: Challenges &
Opportunities” 1/29/15, Brookings Institution,
http://www.brookings.edu/~/media/research/files/papers/2015/01/29-religious-engagement-diplomacymandaville-silvestri/issuesingovstudiesmandavillesilvestriefinal.pdf,//BR/)
The last few years have witnessed a
flurry of interest and activity around religion and religious engagement in
diplomatic circles on both sides of the Atlantic. In 2013, the US State Department established a new Office of FaithBased
Community Initiatives as part of a broader national strategy on religious leadership and faith community engagement led by the White House’s
National Security Council.1 Within the same year, the
European Union issued new guidelines on the promotion and
protection of freedom of religion or belief; the Canadian Department of Foreign Affairs, Trade and Development
opened a new office focused on similar issues; and the French Foreign Ministry sponsored a major conference on the question of
religion and foreign policy with a keynote address delivered by Foreign Minister Laurent Fabius. <These
moves are but the latest in a
much longer story of efforts on the part of foreign policy leaders to integrate greater attention to religion in
the conduct of diplomacy. Since the end of the Cold War and the accompanying upsurge in world events driven by questions of identity and
culture, observers of international affairs have been searching for answers and solutions in religion. In 1995, Doug Johnston and Cynthia Sampson
published Religion: the Missing Dimension of Statecraft, a pioneering book that sought to make a case for including a focus on religion within the
practice of diplomacy.2 Regarded at the time as somewhat radical, the fact that the volume’s contents would raise very few eyebrows today speaks to
just how prescient it was. There
is now a considerable track record of diplomats having worked both formally and
informally to include a focus on religion and religious engagement in their work. For example, the advancement of
religious freedom has been a formal component of U.S. foreign policy since the late 1990s with the passage of
the International Religious Freedom Act (IRFA), which created a United States Commission on International
Religious Freedom as well as an Office of International Religious Freedom within the State Department. Certain domains of foreign
policy have seen more attention paid to the question of religion than others. The United States Agency for
International Development (USAID), for example, has had an office focused on faith-based actors in
development since 2002. Since 9/11, the national security services of the United States and many of its European
partners have devoted enormous time and resources to the question of religion and violent extremism—and
almost exclusively with a focus on the Muslim world.
IRF fails – religious presumptions and the constitution
Mandaville and Silvestri, 15 – *Peter, Professor in Government & International Affairs at George
Mason U and ** Sara, Senior Lecturer in Religion and International Politics at City University London and
Director of Research at U of Cambridge (“Integrating Religious Engagement into Diplomacy: Challenges &
Opportunities” 1/29/15, Brookings Institution,
http://www.brookings.edu/~/media/research/files/papers/2015/01/29-religious-engagement-diplomacymandaville-silvestri/issuesingovstudiesmandavillesilvestriefinal.pdf,//BR/)
effort to better appreciate the role of religion in foreign affairs must involve at least some
modicum of willingness to examine the assumptions we hold about the place of religion in society. This is not
about advocating for diplomats to accept as correct or appropriate a more expansive role for religion in society. Rather, it is about pointing
out that it may only become possible to see and appreciate the bigger picture of religion’s role in some
societies if we first set aside our own particular set of lenses on this issue. For some—particularly in the United
States—the aversion to mixing religion and diplomacy arises not out of an ideological commitment to
secularism but more from concerns about the need to respect the legal sense of secularism embedded in the
US constitution. The key question here is about whether the so-called “establishment clause” of the First
Amendment, which prohibits any act that would indicate a specific religious preference on the part of the
federal government—applies overseas. Case law history is mixed on this issue, but the overall trend is one that suggests a tendency in
<Properly undertaken, any
American jurisprudence to view the establishment clause as indicative of a universal principle.7
The plan fails – can’t resolve Islamophobia on a state or local level
Ghazali, 14 - Abdus Sattar, Chief Editor of the Journal of America (“2013: Another Hard Year For
American Muslims” Countercurrents, 1/2/14, http://www.countercurrents.org/ghazali020114.htm,//BR/)
Anti-Sharia (read anti-Islam) bills Anti-Muslim
prejudice is now institutionalized at the state level, as well. Over the past two
years, lawmakers in 32 legislatures across the country have targeted Muslims by moving to ban Islamic law, or
“Shariah.” Seven states - Arizona, Kansas, Louisiana, North Carolina Oklahoma, South Dakota and Tennessee - have signed the proposed ban into
law, despite the inability of legislators to name a single specific case in which a court ruling based on Shariah law was allowed to stand. The
bills
were patterned on a template produced by a leading Islamophobe David Yerushalmi who founded an organization in 2006
with the acronym SANE (the Society of Americans for National Existence) with the aim of banishing Islam from the US. He proposed a law
that would make adherence to Islam a felony punishable by 20 years in prison. What is the fall out of the antiSharia campaigns? Such campaigns increase bias among the public by endorsing the idea that Muslims are
second-class citizens. They encourage and accelerate both the acceptability of negative views of Muslims and the expression of those negative
views by the public and government agencies like the police. Anti-Muslim sentiment has not only manifested itself through
mosque arsons, assaults, murders and invariably hostile rhetoric from society’s extreme fringes. It has also
become a permanent fixture of the very institutions that should provide safeguards against those things. The
fallout of anti-Islam and anti-Muslim rhetoric, which is socially acceptable, appeared in different spheres. Hate
crimes against Muslims or perceived to be Muslim is not an uncommon phenomenon while Mosques also
became a target of hate. NYPD declares mosques as terrorist organizations Amid the concerted Islamophobic campaigns the America
Muslim community was stunned to know that the New York Police Department (NYPD) has secretly designated
mosques as “terrorist organizations.” The Associated Press reported on August 28 that the designation allowed the police to use
informants to record sermons and spy on imams, even without any evidence of criminal activity. According to the AP report, designating an
entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential
subject of an investigation and fair game for surveillance. The AP report further said: “Since the 9/11 attacks, the NYPD
has opened at least a dozen "terrorism enterprise investigations" into mosques...... The TEI, as it is known, is a police tool
intended to help investigate terrorist cells and the like. Many TEIs stretch for years, allowing surveillance to continue even though
the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism
enterprise." It may be pointed out that in August 2011, the AP exposed the NYPD spy program, which is allegedly being conducted with the
assistance of individuals linked to the CIA. The AP reported that the NYPD is using covert surveillance techniques “that would
run afoul of civil liberties rules if practiced by the federal government” and “does so with unprecedented help
from the CIA in a partnership that has blurred the bright line between foreign and domestic spying.”
Understandably, on June 18, 2013, civil rights groups filed a federal lawsuit charging that the NYPD's Muslim
Surveillance Program has imposed an unjustified badge of suspicion and stigma on hundreds of thousands of
innocent New Yorkers. It was filed on behalf of religious and community leaders, mosques, and a charitable organization that were all swept
up in the NYPD's dragnet surveillance of Muslim New Yorkers.
No spillover post-plan – Obama, Congress, and State Department are ineffective –
empirics prove
Farr 11 – Professor of Religion and International Affairs – Georgetown's Edmund A. Walsh School of
Foreign Service and Director (Thomas F., Berkley Center for Religion, Peace, and World Affairs “Preventing
Another Attack: International Religious Freedom”, 9/23/11,
http://berkleycenter.georgetown.edu/posts/preventing-another-attack-international-religious-freedom, //11)
Given the evidence that religious freedom can contribute to de-radicalization, American
foreign policy should be integrating
international religious freedom into its governance strategies for the broader Middle East. Unfortunately, it is
failing to do so. In his June 2009 Cairo speech, President Obama said that “freedom of religion is central to the ability of peoples to live
together.” He’s right; but words do not substitute for policy action. It took the Obama administration two and a
half years to get in place its ambassador-at-large for international religious freedom—the senior official who implements
American policy on religious freedom—and when the ambassador finally stepped into her office, she found herself
working for a lower-ranking official, far removed from the Secretary of State. While other similarly ranked officials,
such as the ambassador-at-large for women’s issues, work directly under Secretary Clinton, the ambassador for religious freedom remains isolated and
under-resourced. Meanwhile, minority Christians, disfavored Muslims, and other groups are being persecuted around the globe. In 2009, the Pew
Forum reported that 70 percent of the world’s population lives in countries where their religious freedom is severely restricted, often by violent
persecution. An August update says that the problem is getting worse. Political upheaval in the Middle East will likely lead to catastrophe unless the
religion-state problem is resolved. Yet the administration does not see the urgency. Obama and Clinton have prioritized other foreign policy issues,
investing the administration’s energy and resources in projects like climate change research, closing Guantanamo, “engaging Islam,” and
internationalizing gay rights. Of late, Congress also has done little to advance the cause of religious freedom. In
1998, it passed the International Religious Freedom Act, which provided the statutory basis for U.S. policy. Recently, a bipartisan group in the House
sponsored a bill with amendments that would force the State Department to prioritize religious freedom—putting the ambassador under the Secretary,
allocating democracy funding to religious freedom, and mandating training for American diplomats. Unfortunately, neither
Senate Democrat
nor House Republican leaders appear to see the value of passing these amendments. In mid-September, all
State Department language was summarily stripped from the bill, leaving only the reauthorization of an
advisory panel called the Commission on International Religious Freedom. The Commission is important and
should be reauthorized, but it is only an advisory body, unable to drive U.S. policy.
Cultural Movements are emerging to challenge islamophobia
Haddad and Harb 6-12-14 – Yvonne Yazbeck*, The Center for Muslim-Christian Understanding,
Georgetown University, and Nazir Nader**, Department of Arabic and Islamic Studies, Georgetown
University, (“Post-9/11: Making Islam an American Religion,” Religions, http://www.mdpi.com/20771444/5/2/477/htm,//BR/)
10. American Muslims Engaging in New Ways American
Muslims have responded to Islamophobia and shari‘aphobia in
variegated and creative ways [111]. They have assumed a redemptive posture in combatting misinformation about Islam and American
Muslim identity while reclaiming each by supporting, participating in, and initiating community and civic engagement projects as well as contributing to
U.S. politics, popular culture, and an ongoing national interfaith dialogue. American
Muslims today emphasize what they see as
shared American and Islamic values of honoring and celebrating difference. They also envision their efforts
to integrate Islam into the tapestry of American society as a way of protecting themselves from the phobias
that adversely affect and threaten their communities. In 2006, the first Muslim congressman in the U.S., Keith
Ellison of Minnesota, was sworn into office on a copy of Thomas Jefferson’s Qur’an from 1734, after much
consternation over whether or not an oath is valid on any scripture other than the Bible [112]. His experience
paved the way in 2008 for Andre Carson, democrat from Indiana, the second Muslim elected to Congress whose campaign and election were
much quieter and drew fewer questions about his religion [113]. American Muslims today understand newfound forms of
cultural engagement and civic activism to be important avenues for securing the right of religious freedom in
the name of the Constitution and the Bill of Rights for American Muslims. U.S.-based partnerships like the
501(c)(3) Clergy Beyond Borders (CBB), founded jointly by Muslim, Jewish, and Christian American clerics, further
illustrate this larger trend among forward-looking Muslim Americans and their counterparts in other faiths to
integrate Islam into America’s cultural and religious fabric. The CBB website emphasizes the organization’s vision that “all
religions contain a message of commitment to improving the world” [114]. CBB advocates “mutual recognition among religious communities, seeking
not to remove meaningful borders between them, but rather to build bridges of understanding and cooperation” [114]. Like American Muslim youth
organizations, part
of the goal of CBB is to educate non-Muslims and Muslims about the uniquely democratic,
pluralistic, and modern nature of Islam, or at least American Islam [114,115]. Muslim American youth have set out
to integrate Islam into the American popular conception of religious pluralism and diversity through the modern avenues
of networking, blogging, events on college campuses, and conferences and seminars open to the public that cater to non-Muslims around the country
[116]. Other
Muslim-based organizations, including the United Muslims of America (UMA), the American
Muslim Alliance (AMA), the Council on American Islamic Relations (CAIR), the Muslim Ummah of North America
(MUNA), and the Muslim Public Affairs Council (MPAC), began increasingly to support interfaith engagement across the
United States after 9/11 [117]. Appropriating “One God We Trust,” UMA’s website features a full section devoted to interfaith activism. The
description of the section explains that UMA sees “America as one nation, endeavoring to create one family through interfaith understanding. We
promote racial and religious harmony through religious institutions, projecting an image of America as a world leader who stands up for the human
rights for all communities.” Eboo Patel, well-known for his work in interfaith around the world, drew a lot of attention with the establishment of the
Interfaith Youth Core that some people likened to a “Muslim Peace Corps” interfaith organization [117]. American
Muslims have found a
kind of special kinship with American Jews in working toward greater interfaith cooperation [118]. Not to be left in
the dust of the rapid advancements in post-9/11 Muslim interfaith engagement, ISNA president Mohamed Magid and a delegation of imams from
around the world, along with Congressman Keith Ellison,
traveled with the U.S. State Department to the Wall of Death in
Auschwitz, Germany to offer prayers where many thousands of Jewish prisoners were killed during the Nazi Holocaust [119]. Muslim-Christian
alliances in the 12 years after 9/11 have also expanded widely and, along with improving Muslim-Jewish relations, may help to create a more accepting
space for American Muslims in U.S. society in the long term [120]. American Muslim communities, particularly mosques, which may not be directly
affiliated with interfaith organizations, have also opened their doors to Americans of other faiths to join in worship services as well as holiday
celebrations. American Muslims have also led prayer services and vigils at times of national mourning in the last 12 years, whether or not the assailant
was allegedly Muslim [121]. Ramadan, the holy Muslim month of fasting, provides an opportune venue for interfaith engagement at meals where
Muslims are encouraged to break the day’s fast with their neighbors [122]. An important feature of American Islam in the last 12 years has also been
intra-faith dialogue and engagement—“intra-faith” in this case refers to work by American Muslims on improving Sunni-Shi‘a
relations. The website The American Muslim (TAM), run by Sheila Musaji, a leader in developing frameworks of understanding American Islam,
quotes a 1959 fatwa, or religious treatise, by Shaikh Mahmood Shaltoot of Al-Azhar University: “Islam does not require a Muslim to
follow a particular Madh’hab (school of thought). Rather, we say: every Muslim has the right to follow one of
the schools of thought which has been correctly narrated and its verdicts have been compiled in its books”
[123]. The excerpt goes on to specify that the Shi‘ite school of thought is “religiously correct to follow in worship as are other Sunni schools of
thought.” Musaji’s piece includes a nearly exhaustive list of articles and links to websites dedicated to Sunni-Shi‘a, or “SuShi”, reconciliation, mutual
understanding, and intra-faith engagement [124]. This too marks a significant shift in American Muslim attitudes since 9/11. Whereas before
9/11, American Muslims either ignored Sunni-Shi‘a issues or assumed sectarianism was not a problem in the
United States, post-9/11, American Muslims are acknowledging that this is an important area with
increasingly profound consequences for the world community of Muslims [125]. In fact, the sphere of Sunni-Shi‘a intrafaith activism may be one field in which American Muslims are leading the way forward internationally. Amid rising tensions between Sunni and Shi‘a
Muslims in Iraq, Pakistan, Lebanon, Syria and other countries where sectarian violence has spilled over into civil war and attempts at genocide, a group
of American Muslim scholars and Imams were convened by ISNA in September 2013 to sign the “Washington Declaration Uniting Shi‘ah and Sunni
Scholars of North America” [126]. According to one of the signatories, “this declaration rejects all forms of sectarian violence between schools of
thought within Islam… It calls for the respect of religious symbols of all sects of Islam… (and) for dialogue between the schools of thought and calls
for imams to carry this message of mutual respect to their communities” [127]. ISNA president Mohamed Magid asserted that “ISNA is a platform for
the unity of Muslims—whatever brings Muslim together strengthens all of them.” Among some of the most active groups of American Muslims in the
pre- and post-9/11 efforts to integrate Islam into the mainstream of American psyches and culture have been activist youth programs [128]. The
February 2010 Purple Hijab Day was promoted as an annual event where women don purple headscarves to end domestic violence “in our ummah,” a
reference to the Muslim community [129]. Green Muslims in the District, based in Washington D.C., have evolved from an online blog to a full
website where events are coordinated, such as Zero Trash Parties and networking mixers for Muslim green activists to meet and pool efforts [130].
The nationwide Ramadan Fast-a-Thon has quickly developed a positive legacy on campuses across the country. Muslim Student Associations typically
organize a day of fasting where non-Muslims are invited to join their Muslim classmates in abstaining from food and water from sunup to sundown
and are then welcomed to partake in a special meal to break the fast (iftar) and accompanying prayers. They donate the funds they gather to a charity.
Students spend the day in communication and many participants have explained that Fast-a-Thon helped them better relate to Muslims in America and
at their universities.10 Other programs established by American Muslims are run by professionals but targeted toward American Muslim youth, such as
IMAN’s Takin’ it to the Streets, Patel’s above-mentioned Interfaith Youth Core (IFYC), and the Muslim Public Service Network (MPSN) [131].
More and more Muslim college students are finding creative ways to reach out to their local communities
beyond their campuses as well. Georgetown University’s Muslim Chaplaincy, one of only 13 such programs
in the United States, offered a “Muslim Alternative Spring Break” for the first time in March 2012. After a competitive
selection process, 12 Muslim undergraduate students led by their campus Imam traveled to Parkersburg, West
Virginia to work with Habitat for Humanity building homes for a family in need. Students spent their entire Spring Break
in service working side-by-side in the community. Parkersburg is a city with likely very little to no direct exposure to Islam or Muslims in the recent
past. The Georgetown group attended church services in solidarity with the local community and baked cookies for the congregation after the service.
The church community broke bread with the Muslim
students before the week’s end, and they are working to maintain
strong ties and possibly return to Parkersburg the following year. Their service was noted by local newspapers and television
news media who pointed out that these students willingly came to snowy Parkersburg rather than enjoy a more “traditional” Spring Break [132]. As
American Muslims come to define Islam in America, they are also poised to contribute to Islamic scholarship
and the training of Imams. In 2008, the Zaytuna Institute, founded in 1996 in Berkeley, California by Muslim “rock stars” Hamza Yusuf,
Zaid Shakir, and Hatem Bezian, became Zaytuna College. The college follows an integrated curriculum of Islamic studies, Arabic language, and liberal
arts including U.S. history and literature. Its motto is “Where America meets Islam,” and its goal is to be accredited by the University of California
system—it compares itself to private religiously-based universities founded by American Jews and Christians [133].
--- XT: International Religious Freedom Fails
The government is not equipped to promote Religious freedom diplomatically
Mandaville and Silvestri, 15 – *Peter, Professor in Government & International Affairs at George
Mason U and ** Sara, Senior Lecturer in Religion and International Politics at City University London and
Director of Research at U of Cambridge (“Integrating Religious Engagement into Diplomacy: Challenges &
Opportunities” 1/29/15, Brookings Institution,
http://www.brookings.edu/~/media/research/files/papers/2015/01/29-religious-engagement-diplomacymandaville-silvestri/issuesingovstudiesmandavillesilvestriefinal.pdf,//BR/)
One final challenge relating to institutional capacity has to do with the structure and relatively short timelines—often two years—that govern
diplomatic postings. This is not a new problem, and it is not at all uncommon for Foreign Service officers to complain that such brief
tenures
make it difficult for diplomats to develop sustained competencies. They arrive in a new position or posting,
spend the better part of a year acculturating and getting up to speed, and then deliver at full capacity for only
a few months before starting to focus on the next assignment and a new transition. This problem is particularly
pronounced when it comes to specialized skill sets such as those required for effective religious engagement. Rather than cultivating
institutional memory about how a focus on religion can help to advance the objectives of a particular bureau
or overseas post, it is far more common for the departure of a foreign affairs officer competent in religious
affairs to create a situation where that office has to start over from scratch when the next designee comes into position.
The fact of the matter is, however, that very few Foreign Service officers and other diplomats possess either sufficient
understanding of religion or the necessary skillsets to effectively undertake religious engagement. This fact speaks
to the need for any serious effort at integrating religion into foreign policy to do more than just create new functionaries or offices with a religious
designation. Rather, it
is crucial to build an awareness of religion and the many ways it bears on foreign policy and
national security objectives into the systems and curricula used for training and preparing professional
diplomats.
Structural trends – including restrictions in other countries – prevent effective reform
of religious freedoms abroad
George 14 – holds the McCormick Chair in Jurisprudence at Princeton University, founding director of the
James Madison Program in American Ideals and Institutions at Princeton University, Vice Chairman of the
US Commission on International Religious Freedom (Robert, Foreign Policy Research Institute, “The State
Of International Religious Freedom and Why It Matters”, November 2014,
http://www.fpri.org/articles/2014/11/state-international-religious-freedom-and-why-it-matters, //11)
When it comes to state hostility toward religions, some of these governments, like North Korea or China, are secular
tyrannies which
consider all religious beliefs as potential competitors of state secularist ideology such as Communism.
Others, like Iran, Saudi Arabia, and Sudan, are religious tyrannies which enthrone one religion or religious
interpretation over all others, which they see as rivals to the one they favor. Still others, like Russia, are a hybrid of secular and religious.
In North Korea, the government severely represses religious activity, and individuals who defy it are arrested,
imprisoned, tortured, or executed. In China, the government continues its persecution of Tibetan Buddhists
and Uighur Muslims. To stem the growth of independent Catholic and Protestant groups, Beijing has arrested
leaders and shut churches down. There have been reports of officials even going after registered churches, tearing down crosses and
church steeples. Members of Falun Gong, as well as those of other groups deemed “evil cults,” face long jail terms, forced renunciations of faith, and
torture in detention. In
Iran, the government has executed people for “waging war against God,” while relentlessly
targeting reformers among the Shi’a Muslim majority, as well as religious minorities, including Sunni and Sufi Muslims,
Bahai’s, and Christians. Pastor Sayeed Abedini remains in prison, and the regime has stirred up anti-Semitism and promoted Holocaust denial. Saudi
Arabia completely bans the public expression of religions other than Islam. Not a single church or other non-Muslim house of worship exists in the
country. In addition, the Kingdom enthrones its own interpretation of Sunni Islam over all others and has arrested individuals for apostasy, blasphemy,
and sorcery. Sudan continues its policy of Islamization and Arabization, imposing Shari’ah law in Muslims and non-Muslims alike, using amputations
and floggings for acts of so-called indecency and immorality and arresting Christians for proselytizing. And finally, Russia has a secular government but
favors the Moscow Patriarchate of the Russian Orthodox Church while persecuting competitors, such as Jehovah’s Witnesses, or those it deems a
threat to the state, such as Muslims. Regarding state sponsorship of radical ideology which targets others’ religious freedom, Saudi
Arabia
continues to export its own extremist interpretation of Sunni Islam through textbooks and other literature
which teach hatred and even violence toward other religious groups. Regarding state enforcement, Egypt and Pakistan
enforce anti-blasphemy or anti-defamation codes, with religious minorities bearing the brunt of the enforcement. And finally, regarding state failure to
protect religious freedom, the abysmal record of the governments of Burma, Egypt, Iraq, Nigeria, Pakistan, and Syria exemplifies those of nations
which do not protect their citizens against religion-related violence. In
Burma, sectarian violence and severe abuses against
Christians and Muslims continue with impunity. The plight of the Rohingya Muslims is especially alarming and heartbreaking, as
countless numbers are stateless, homeless, and endangered. In Egypt, Cairo has failed repeatedly over time to protect religious minorities, including
Coptic Orthodox and other Christians, Baha’is, Shi’a Muslims, and dissident Sunni Muslims from violence or to bring perpetrators to justice. In Iraq,
the rise of the so-called “Islamic State” is a major consequence of the government’s continued failure to protect the lives and freedoms of nonMuslims minorities such as Christians and Yazidis, as well as Shi’a Muslims and dissenting Sunni Muslims. In Nigeria, as Boko Haram attacks
Christians, as well as fellow Muslims, the government continues its failure to prosecute perpetrators of religiously-related violence that has killed more
than 14,000 Nigerians, both Christian and Muslim, since the turn of the century. In Pakistan, the government’s continued failure to protect Christians,
Ahmadis, Shi’a, and Hindus, has created a climate of impunity resulting in further vigilante violence. And in Syria, a civil war triggered at least in part
by the Assad regime’s refusal to respect human rights and embrace reform has devolved into a sectarian religious conflict. We now have a combination
of state tyranny and state failure to protect life and freedom. While the Assad regime targets Sunni Muslims, its terrorist opponents (such as the
“Islamic State”) are targeting those on all sides, from Sunnis and Alawites to Christians, who oppose their dictates. It is a complete nightmare. THE
TOTALITARIAN IMPULSE As
we survey this bleak landscape for religious freedom abroad, we detect a number
of unmistakable patterns and trends. We see the rise of violent religious extremism, largely through
radical Islamism, and its continued conflicts with the majority of Muslims, as well as with non-Muslim
religious minorities. We see the continued persecution of Christians—a persecution the sheer size and scope of which is
astonishing. And we see the stubborn persistence and in some places revival of anti-Semitism across countries
and cultures. Let me offer a few words on these disturbing patterns and trends. It has often been said that radical Islamism and
its leaders seek to recover a mythical golden age from a far-distant past. While this is undoubtedly the case, we must also
realize that they are also propelled by an inescapably modern—and terrifying—idea. Surfacing in the last century, that idea came to be
known as totalitarianism. What defines totalitarianism is a series of demands which may be summarized as follows: Give fanatical leaders
and movements absolute and permanent authority. Make these leaders and their followers into virtual gods, charged with seizing control of history and
transforming humanity itself. Release these leaders and their followers from accountability to any law or institution, belief or custom, and moral norm
or precept. Grant these leaders and their followers complete control of every facet of human existence, from outward conduct to the innermost
workings of conscience. For the better part of a century, those promoting and exploiting this malignant idea have advanced it by dressing it up in a
variety of costumes and by hijacking various ideals and institutions and putting them to work in its cause. In the 1930s and 1940s, it threatened
humanity through Nazism and other forms of fascism which exploited the concept of race and the ideology of nationalism. After World War II,
totalitarianism posed its greatest threat through Communism, which exploited the concepts of class and class consciousness and highjacked people’s
strivings for social justice. By the close of the 20th century, these movements had committed every crime under the sun, triggering the deaths of nearly
150 million human beings. They also waged war against the rights and duties of conscience, leaving behind a world where to this day, most people live
in countries that are hostile—in many cases deeply hostile—to freedom of religion or belief. Today, that same totalitarian impulse which drove Nazism
and Communism has hijacked religion as its latest vehicle, creating radical Islamism. From the “Islamic State” in Iraq and Syria to the extremist
mullahs in Iran, and from al Qaeda to the Taliban, these new totalitarians pose similar threats to the world. Displaying utter contempt for the rule of
law and for any distinction between combatants and non-combatants in the conduct of war, they target civilians and commit mass torture and murder,
precisely as the Nazis and Communists did. Many observers presume that these movements and their leaders simply represent Islam on steroids. Some
even claim they represent the “true Islam.” I submit to you today that they are mistaken. Granted, the history of nearly every religion—including
Islam—contains periods of despotism and bloodshed. Granted, every major religion has had to go through periods of reform or clarification of some
of its beliefs and ideas. Granted, as so many Muslim reformers have stated repeatedly, Islam should be no exception. But let us be clear. No civilized
religion—certainly no creed in the tradition of ethical monotheism—including Islam, ever stood in principle, as the Nazis and Communists did, and as
the “Islamic State” does today, for what amounts to sheer, unadulterated nihilism—the idea that any and every means—torture, rape, prostitution,
drug sales, the slaughter of innocent children and defenseless elderly people, genocide—may be carried out in the cause of regional hegemony and,
ultimately, world domination. No world religion ever granted any human being, group, or government the permanent right in principle to flout any
rule, break any law, or commit any atrocity at will. In other words, the
struggle we face is not that of one religion against
another, nor of religion against humanity. Rather, it is a struggle that pits lawlessness and tyranny against
basic decency and dignity. And in this struggle, reformers must be applauded for their resolute stand not only to reform and clarify from
within, but to stand against the hijacking of Islam by those driven by the same impulse that drove the likes of Hitler and Stalin, Mao Zedong and Pol
Pot. They must rip away radical Islamism’s religious mask – revealing its idolatrous soul before the world. At the hands of violent religious extremists,
Christians especially face severe persecution. Ironically, it is in the Middle East, the cradle of Christianity, that both persecution and the flight of the
persecuted cloud the future of the world’s oldest Christian communities. Unless circumstances change, many are asking whether a graveyard will one
day replace the cradle. In Egypt, violence against Coptic Christians reached alarming proportions in recent years. In Iraq, severe violence against
Christians, which peaked after Saddam Hussein’s fall, has returned with a vengeance. The “Islamic State” is principally to blame for that. Once home
to approximately one million Christians, Iraq has half that number today. Many Iraqi Christians sought refuge in Syria, where fellow Christians and
Muslims—from Sunnis to Shi’a, including Alawites—once had co-existed peacefully. We all know how that turned out. For Christians, Syria’s civil war
has been nothing short of calamitous. In Saudi Arabia and Iran, it is mainly the government that severely represses Christians and other religious
minorities. And just outside the Middle East, in Pakistan, attacks against Christians are escalating. In September 2013, suicide bombers launched the
worst anti-Christian attack in Pakistan’s history, assaulting All Saints Church in Peshawar, leaving nearly 100 dead and more than 150 other
parishioners wounded. In looking at the plight of Christians, especially those in the Middle East, those who know Jewish history see something
hauntingly familiar. Iraq’s Jewish community provides a somber example of what the future may hold. Like Iraq's Christians, the Jews were there for a
long time—perhaps as many as 20 centuries or even more. As of 1947, the country's Jewish population exceeded 50,000. Today only a handful remain.
People professed shock when it was revealed that in 2010, Mohammed Morsi, who was later elected Egypt’s president, depicted the Jewish people as
“descendants of apes and pigs,” whom Egyptian children and grandchildren must be taught to hate “down to the last generation.” Yet his comments
were no worse than those of Iranian leaders, who denied the Holocaust and allowed state-run media to broadcast anti-Semitic messages and hateful
cartoons. Nor are they worse than the lies and defamations against Jews and Judaism that one finds in the media elsewhere in the region, including in
Egypt itself. Yet it would be a mistake to say that anti-Semitism is confined to the Middle East. In post-Soviet Russia, skinhead groups commit acts of
anti-Semitism in the name of Russian nationalism. In Belarus, the anti-Jewish utterances of President Lukashenko and the state media are accompanied
by a failure to identify or punish the vandals of Jewish cemeteries and other property. Even in Western Europe, anti-Semitism has been making a
comeback. Since 2000, anti-Jewish graffiti increasingly have appeared in Paris and Berlin, Madrid and Amsterdam, London and Rome, and synagogues
have been vandalized or set ablaze in France and Sweden. In Malmo, Sweden, physical attacks fueled a Jewish exodus. In France, according to a report
by the security unit of its Jewish community, there were 614 anti-Semitic incidents in 2012, compared to 389 in 2011. Who are the perpetrators of
these hateful acts in Europe? Some are neo-Nazis. Others claim to act in the name of Islam. Compounding the problem are four factors. First,
European officials remain reluctant to identify the ideological or religious motivations of
perpetrators. Second, surveys show that anti-Semitic attitudes among Europe’s population are shockingly
widespread. Third, these surveys confirm that some of this bias manifests itself in harsh and unbalanced
criticisms of the state of Israel. While no nation is beyond reproach, when such criticism includes language intended to delegitimize Israel,
demonize its people, and apply to it standards to which no other state is held, we must call it what it is—anti-Semitism. Finally, a number of
European governments and political parties have added fuel to the fire by backing restrictions on vital
religious expression such as the donning of religious garb in public or the performance of kosher slaughter
and male infant circumcision. They have proposed or enacted similar kinds of restrictions on practitioners of other religions, including
Christianity and Islam. France and Belgium, for example, bar students in state schools and government workers from wearing “conspicuous” religious
symbols, such as the Muslim headscarf, the Sikh turban, large crosses, and the Jewish yalmulke and Star of David. Sweden, Switzerland, Norway, and
Iceland have banned kosher and halal slaughter. In Germany and Sweden, government authorities have told Jewish and Christian parents that they
cannot homeschool their children for religious reasons. And government officials in the United Kingdom are forcing Catholic adoption agencies to
shut down because they follow the moral criteria of their faith—criteria that are by no means idiosyncratically Catholic—in placing orphaned children
in homes that provide a mother and father and not in same-sex headed households. What drives these governments and parties is an attempt to grant
secularist ideology dominance in the public square by placing serious restrictions on religious expression or practice. It is an extreme view of statechurch separation which seeks to relegate religion to the purely private domain of the home, church, synagogue, mosque, or temple.
IRF fails – leaders who need to convert are already too far gone
Farr, 9 - Thomas F., Professor of Religion and International Affairs – Georgetown's Edmund A. Walsh
School of Foreign Service and Director – Berkley Center for Religion, Peace, and World Affairs (“The Future
of U.S. International Religious Freedom Policy”, Research Gate,//BR/)
The arguments presented above about the value of democracy
and religious freedom are highly unlikely to appeal to
religious actors who are already radicalized. There is some evidence that a few radicals have experienced
“conversions” to more moderate forms of Islam under the influence of reeducation programs performed by
authoritarian governments such as Saudi Arabia and Yemen . While such programs may be useful, they are unproven and
should not be the primary content of U .S. diplomatic efforts against Islamist terrorism. Those efforts should
center on the empowerment of democratic Muslim reformers, speaking from the heart of Islam, rather than
relying on the actions of authoritarian governments. Second, Islamist organizations that have engaged in the democratic process,
such as Egypt’s Muslim Brotherhood or Pakistan’s Jamaat-eIslami, contain factions that have historically undertaken violence and terrorism. The
radicalism of such groups does not arise solely in reaction to authoritarian regimes; their arguments for extremist measures, including illiberal measures
in criminal law, the treatment of women, and the treatment of religious minorities, derive from religious arguments as well. But on balance
authoritarian settings exacerbate the violent and radical tendencies of such groups while democratic settings can lead them to be more moderate and
peaceful than they otherwise would be. Part of the moderating mechanism is the requirement to submit their religious and political truth claims to
public scrutiny and debate. It is by no means inevitable that moderation will result from opening a political environment, but democracy grounded in
religious freedom can increase the chances of political and religious moderation. Third, a
key obstacle to the employment of IRF
policy as a counterterrorism strategy is the arguments made by terrorists themselves, i.e., that U.S. policy is
intended to separate Islam from politics and facilitate the operation of American missionaries. Islamist
radicals have successfully exploited Muslim familiarity with the French model of managing and marginalizing
religion. They have conflated the French and American models, and branded American “freedom” strategy as secular, godless, and anti-Islamic. U.S.
IRF policy can overcome these perceptions by communicating, in public and private diplomacy, foreign aid, democracy programs, and Track II efforts,
that religious freedom means the right of religious communities to participate in forming the laws and policies of a democratic state. It does not mean
the banishment of Islam from public life.
Legitimizing Multilateralism is a prerequisite to solvency
Farr, 9 - Thomas F., Professor of Religion and International Affairs – Georgetown's Edmund A. Walsh
School of Foreign Service and Director – Berkley Center for Religion, Peace, and World Affairs (“The Future
of U.S. International Religious Freedom Policy”, Research Gate,//BR/)
One of the ironies of U .S. IRF policy is that while some critics accuse it of being a peculiarly and unilaterally
American crusade, international law has long been abundantly clear in setting robust standards for freedom of
religion or belief. Article 18 of the Universal Declaration of Human Rights is unambiguous and remarkably comprehensive in defining these
freedoms. The Universal Declaration was adopted by the General Assembly without a single negative vote and to this day is still regarded as the
seminal international human rights document. The Universal
Declaration’s Article 18 is also the source text of subsequent
international human rights instruments, notably the International Covenant on Civil and Political Rights
(ICCPR), which stipulates that religious freedom cannot be impinged even during war-time. It is listed as one of the ICCPR’s
“non-derivable” rights. Freedom of religion or belief is reinforced in other human rights declarations and treaties as well, including the UN Declaration
on Elimination of all Forms of Intolerance and of Discrimination Based on Religion or Belief, the European Convention for the Protection of Human
Rights and Fundamental Freedoms (which established the European Court of Human Rights), the American Convention on Human Rights, the
African Charter on Human Rights, and key documents of the Organization for Security and Cooperation in Europe (OSCE) such as the Helsinki Final
Act and the Vienna Concluding Document . Furthermore, many
of the formal protections for religious freedom in
international law and institutions came into being not in spite of American unilateralism but with active
American multilateral engagement. Former First Lady Eleanor Roosevelt was the driving force behind the UN’s adoption of the Universal
Declaration. American diplomats and NGOs were also deeply engaged in other international human rights
efforts, such as the ICCPR and the Declaration on Elimination of all Forms of Intolerance and of Discrimination Based on Religion or Belief.
American diplomats were likewise key players working to ensure that OSCE documents included language on religious freedom. And it was the U .S.
that introduced the UN resolution creating a Special Rapporteur on Freedom of Religion or Belief. In short, international law has been important to
the cause of international religious freedom, and international religious freedom has been important in the development of international human rights
law. At least on paper, there is now and has long been widespread international support for freedom of religion or belief. And there are ample
precedents of American leadership and cooperation in efforts to include these freedoms in multilateral documents and institutions.
Notwithstanding the existence of these international protections for religious freedom on paper, many
signatory nations violate religious freedom in practice. Moreover, signatory nations that are not themselves gross
violators of religious freedom will often take no meaningful action, either individually or via international
law/institutions, in response to gross violators. This problem is, of course, not unique to religious freedom; other human rights are
also often ignored in favor of competing national and political interests. The practical weakness of existing international
institutions leads some frustrated U .S. policy makers to abandon or neglect multilateral engagement. Indeed,
the U .S. can rightly be criticized for inconsistency in its relationship to international human rights. While the
U .S. has at times exercised leadership in creating international human rights law, and its rhetoric on the
global stage is full of bold statements on human rights, it has not always avoided the temptation to seek
exceptions for itself. It has even failed to ratify human rights treaties that its own officials were influential in negotiating. Of course,
human rights treaties will never be perfect—some may never warrant U .S. approval, and others may only
warrant approval with specific reservations. But the U .S. has not invested deeply and consistently enough in
the development of legitimate international institutions capable of enforcing the high ideals of international
law. The U .S. needs efficacious international human rights institutions in order to promote genuinely
sustainable religious freedom and in order to protect its own interests and reputation. Its lack of investment
undermines U .S. credibility when it tries to use its own foreign policy tools (such as those available under
IRFA) to influence other nations’ human rights records.
--- XT: SQ Solves
Post 9/11 hysteria is fading and the government is learning its wrongdoing inevitably solving Religious free speech
Awad, 11 – Nihad, target of NSA surveillance, Executive Director and Founder of the Council on
American-Islamic Relations (“Muslims and religious freedom in post-9/11 America”, San Diego Union
Tribune, 9/11/11, http://www.utsandiego.com/news/2011/sep/09/muslims-and-religious-freedom-in-post911-america/all/,//BR/)
Oddly, in
an interview about the CIA-NYPD spying, the FBI’s own legal counsel said that sending an informant
into a mosque with no evidence of wrongdoing runs “right up against core constitutional rights. You’re
talking about freedom of religion.” In another California case involving spying on Muslims, government lawyers admitted to
lying to a federal judge, then justified the deceit on national security grounds. The case involved a routine
attempt to obtain government documents using the Freedom of Information Act. Such deception of a judge undermines
the checks and balances the founding fathers believed were crucial to preserving our liberty. I am confident that at this point in the debate
about Islam in America we have reinforced our nation’s commitment to religious freedom. I say this because
Muslims – a disliked minority – can still run for president, are able to file lawsuits to challenge discriminatory
laws and are still considered adherents of a recognized religion. I say this because the legal and advocacy tools
to challenge spying have not been stripped away in a misguided effort to defend America by morphing it into
a tyranny. My confidence in American common sense is reinforced by other facts. Since 9/11, two Muslims have been
elected to the U.S. Congress. General revulsion at a Florida pastor’s plan to burn a Quran last year was an
inspiring reminder that America can both respect free speech and at the same time marginalize bigots. Broadbased pushback against Rep. Peter King’s anti-Muslim hearings is another sign that pluralism is alive and well.
Our national debate will end when American Muslims no longer have a need to employ legal tools because
Islam is seen as equal among many faiths in America’s pluralistic society. Until that day, Muslims are honored
to be on the cutting edge of the struggle to preserve American religious freedom.
AT: Islamophobia Adv
Terrorism is only the media’s mask for a deeper issue – Islamophobia is rooted in a
xenophobic concern of a new religion challenging Western culture.
Iqbal, 10 – Professor of Media and Communication Studies at the International Islamic University,
Islamabad (Zafar Iqbal, Islamic Studies, Vol. 49, No. 1, “Islamophobia or Islamophobias: Towards
Developing a Process Model”, Spring 2010, JSTOR, *fc)
The evidence presented above indicates that Islam has been perceived primarily as a contra religio-political
force with a great potential to threaten the West. It appeared to be the 'new enemy' of the West,
providing the latter with justification of hoarding ammunitions and pursuing its designs of
expansionism. 'Cultural anomie,'46' opposing cultural ecologies,'47a 'challenge' and 'threat' to the western
world,48a 'threat to western security,'49'present terror of the world,' 'the Other,'50 and 'fifth column'51 are
some of the labels that have been applied to Islam in the recent past. Strangely, the confusion underlying this
contrast between Islam, a religion, and the West, a geographical area, has scarcely been noticed.52
Coming to the contemporary posture of the problem, we find that Islam appeared to be a 'powerful' sociopolitico-religious force of the medieval times when other religions were passing through their 'Dark Age.'
This presents a passive-active relationship between the West and Islam which was negatively viewed
by Christianity and instead of improving that relationship, the West resorted to jingoistic policies,
which finally resulted in the Crusades- a struggle to balance out dominant socio-politico-religious forces of
the time. The antagonism towards Islam spanning over centuries has led to the emergence of antiIslamic and anti-Muslim racial and cultural sentiments in contemporary times. Not long ago, the
'political' or 'active Islam'53 in the Muslim world, especially the Arabian peninsula and Iran, added insult to
the injury and cultural and racial prejudices turned into threats from Islam and the Muslims. Thus,
Islamophobia is more than mere hostility, or else we would have found it in the former USSR, a home to a
large Muslim population, and in India, Thailand, and Malaysia (with a Muslim population almost equal to that
of non-Muslims).
It is quite strange that although the racial and cultural prejudices against Islam and Muslims are fairly
noticeable, Islam can hardly be found as a threatening 'other' in literature. It was the demise of communism
that gave impetus to the portrayal of these stereotypes in the media. Therefore, communism- a great 'threat'
to the West and the rest of the world- was replaced by Islam as a threatening 'other.'54This seems to be the
replacement of one threatening' ideology' with 'another.' The fact that the contemporary Muslim world
is suffering from problems like those of terrorism, subjugation, subversion and animosity substantiate the
western notion that Islam and Muslims are 'threatening others.'
Another dimension of the difference between Islam and 'others' rests on the concept of 'race.' 'Race' was a
concept in Arabic literature which referred to a lineage of animals, particularly applied to horses, while
'ethnicity' referred to people with common histories, languages, rituals, food, songs, etc.55 Nevertheless, the
Spanish literature took 'race' to be synonymous with 'blood' and 'religion.' New terminologies were
introduced. People of the newly discovered America were labelled 'mestizo' - mixed blood - , and the mixed
breed of Spanish and black as 'mulatto.'56 Thus, while tracking the traces of difference between various
segments of humanity in history, we find that not only 'blood' but 'colour' was also thought to be an
ingredient of the concept of 'race.'
Islam became a victim of racial prejudice due to its rapid expansion worldwide in a very short span of time.
Its erstwhile tendency to grow swiftly challenged the West theologically, politically and culturally.57As a
result of mass conversions to Islam,58 the West found it easier to demonize this religion and its
followers than to take up the challenge to understand it.59 Islam and Muslims were thus labelled with
demonizing racial stereotypes meant to arouse hatred towards them. The long stretched' Crusades' further
aggravated the situation and institutionalized the racial prejudice between 'us and them.' Today, these
prejudices, having historical reasons, and the growing unrest and rise of 'jihadť movements across the Muslim
world, are responsible for augmenting the process. Hence, new terminologies have been constructed for the
historic differences which seem to continue apace. Thy name is Islamophobia.
Government policy alone can’t solve – Islamophobia is too deeply engrained in a
history of religious conflict.
Iqbal, 10 – Professor of Media and Communication Studies at the International Islamic University,
Islamabad (Zafar Iqbal, Islamic Studies, Vol. 49, No. 1, “Islamophobia or Islamophobias: Towards
Developing a Process Model”, Spring 2010, JSTOR, *fc)
Intolerance towards other religions or doctrines is universal and perhaps as old as humanity itself. The worst
of its manifestations have been the wars spanning over centuries- crusades, genocides and deep rooted
hostility on the basis of religious identities. Islam, at the time of its emergence in history, faced severe
opposition since some quarters represented it as a 'problem'6 to the world.7 This negative representation of
Islam has marked the human history especially that of last 14 centuries by mutual hostilities despite the
affinity that could bind Muslims, Christians and Jews the as 'people of the book,' as Prince of Wales rightly
pointed out during his speech at the Oxford Centre for Islamic Studies on 27 October 1993.8
The Byzantine Christians, Greek monks and the Church establishment, threatened by the rapid spread of
Islam from Arabia to its close and remote neighbours, started an obdurate campaign of slander and
vilification against Islam, depicting it as a mere "apostasy"9 and a sort of "barbaric paganism."10 The
foundation of this antagonism against Islam was articulated in the early Islamic period mainly by John of
Damascus (676-749), a Christian scholar of the Umayyad period, by declaring Islam to be a "pagan cult," and
heaping derogations on the Prophet (peace be on him).11 For long, his writings and accusations remained the
major source of the writings against Islam.
In addition to Christian scholars, the church elders regarded Islam as evil and "absolutely alien to God."12
Alexander Gainem, a freelance journalist, also observes that the campaign to reject Islam and Muslims
touched its peak in Dante Alighieri's Divine Comedy.13 Dante Alighiri (1265-1321) was an Italian poet,
known as "the Supreme Poet,"14 and his work is one of the masterpieces in the Italian language, in fact,
Western literature as a whole. Hence, his views had a strong impact on the European attitude to Islam.
Some religious stalwarts in 14th century also saw Islam as a "theological heresy" at the level of morals and
practice.15A round this period, the Council of Vienna met between 1311 and 1312, 16 declaring that Muslims
could not be converted or persuaded and thus an academic onslaught should be initiated against them.17 The
Qur'an was also subjected to criticism in the meetings of the Council.
Early 15th century witnessed further hostility towards Islam and Muslims when the controversial painting
'The Last Judgment'18 by Giovanni Da Modena (с. 1409-c. 1455) was displayed in Italy. It attacked the
Prophet (peace be on him), thereby further widening the already existing gulf between Islam and Christianity.
The sensitivity of the issue was further aggravated by the introduction of the concept of La Raza in the 15th
century. La Raza was a campaign to create a 'mix' of conflicting races. The 'mix' was desired to be different in
its outlook, having prominent attributes of the dominant cultures, but, with least cultural incompatibility. José
Vasconselos (1882-1959) in his work titled La Raza Cósmica 19 attempted to trace the historical outline of
the phenomenon from 15th century and hoped it to be the 'Fifth Race'20- an acceptable blend of all human
races irrespective of colour, creed and caste in order to develop a new civilization, ' Universópoli.s'2 1
Referring to La Raza, an American scholar has suggested that the efforts in this regard emerged from Spain
where the existence of races seemed more consciously observable. He adds that even Columbus's voyage to
America was racially biased since the salves he brought with him were mostly Muslims.22
Another’s important name in the history of the Christian version of Islamophobia is that of Humphrey
Prideaux, who saw the emergence of Islam as a part of God's inscrutable purposes: i.e. as a punishment for
the sins of Christians.23 He took the establishment of the Muslim continental rule as a scourge to Christians
and expected it to continue till they mend themselves. Some of his contemporaries like Peter Heylyn (15991662) in his work Cosmographie1a4n d Alexander Ross25 (c. 1590-1654) in Pansebeia were grossly illogical in
condemning a religion with a large body of followers. Following in the footsteps, Broughton's Dictionary of
All Religions (1745) categorized the world religions into 'true religions' (Christianity and Judaism) and 'false
religions' (all others).26
The same attitude towards Islam prevailed during the 19th and 20th centuries. J. Alley published Vindicia
Christiana attacking Islam, Hinduism and other religions on grounds of being "perpetual falsehood,
pernicious and extravagant."27 The Balkan War of 1912-1913 was depicted, mainly by the British press, as a
'Crusade against Islam.'28 More recent web bloggers and literary artifacts like The House of Apostasy keep
the door open for hurling blasphemy and libel at Muslims as 'intellectually weak' and as people who 'enjoy
killing.'29 William Miller says, "Islam is Satan's most brilliant and effective invention for leading men
astray,"30 and John Laffin condemns the "Islamic" concept of "holy war" and stresses that the treaties with
infidels be broken.31 Of course, Salman Rushdie and Taslima Nasrin are just recent manifestations of
indignation against Islam and Muslims;32 nevertheless, media contributed substantially to making their works
world famous.
Analysis of the media is necessary to deconstruct Islamophobia – constant portrayals
of Muslims as foreign and violent negatively shape people’s understandings.
Iqbal, 10 – Professor of Media and Communication Studies at the International Islamic University,
Islamabad (Zafar Iqbal, Islamic Studies, Vol. 49, No. 1, “Islamophobia or Islamophobias: Towards
Developing a Process Model”, Spring 2010, JSTOR, *fc)
In the present days Islamophobia appears to be a heavily mediated construct. Hence, it is pertinent to
observe the involvement of media in the process of constructing it. This is thanks to the power of the
media in conveying, explaining and articulating specific discourses that help represent or
misrepresent a social group or minority.2 Media critics argue that media misrepresentation has been
influential in the spread of Islamophobia in the West.3 Media develop stereotypes by framing the attributes of
a community or individual more often in a systematic way. The Australian experience shows that media
portrayed Muslims as alien and foreign to the Western society,4 as a "backward, uneducated, vulgar, violent"5
community which consequently strained the relations between Muslims and other Australians. Thus, while
discussing and explaining Islamophobia, we shall also dwell on the media's role in framing the Muslims and
Islam for it shapes the way people understand them, eventually generating Islamophobia or Islamophilia as a
process of binary schematization.
1nc Judicial Independence Adv
Partisan judicial appointments make judicial independence impossible
King 7 — Carolyn Dineen King, Circuit Judge, United States Court of Appeals for the Fifth Circuit, 2007
(CHALLENGES TO JUDICIAL INDEPENDENCE AND THE RULE OF LAW: A PERSPECTIVE
FROM THE CIRCUIT COURTS, Marquette Law Review, Summer, Vol. 90, No. 4,
http://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=1072&context=mulr)
Instead, the Supreme Court generally takes cases where the law is unclear or in need of further development
or where the circuits are in conflict. What this means is that the intermediate federal appellate courts are the
courts of the last resort for all but the handful of cases that the Supreme Court will agree to hear. It is
precisely that fact that has resulted in the politicization of the intermediate federal appellate court
appointment process. Political and issue activists understand only too well that ideologically committed judges
on these benches can make an enormous difference in the outcomes of hundreds of cases each year.
Too, it would be a mistake to think that ideologically committed judges affect the outcomes only in cases that
involve the so-called hot button issues: the civil rights of racial and ethnic minorities and women; abortion;
the rights of criminal defendants; the death penalty; and states' rights (or the proper balance of power
between federal and state governments). My own observations suggest that these judges cast a much wider
net. They have strong views on plaintiffs' jury verdicts, especially (but not only) large ones; on class actions;
on a wide range of federal statutes imposing burdens on corporate defendants; on religion in schools and in
public areas; and on and on.
If candidates for the presidency of both parties continue, as they have now for decades, to energize issue
activists within or allied with their parties by promising the appointment of judges who will pursue the
respective political and ideological agendas of those parties in their decisions, then judicial independence
will continue to be severely threatened, and with it the rule of law in the United States. The Washington
Post, in a 2005 editorial, captured the imminence of the threat:
The war [over Justice O'Connor's successor] is about money and fundraising as much as it is about
jurisprudence and the judicial function. It elevates partisanship and political rhetoric over any serious
discussion of law. In the long run, the war over the courts—which teaches both judges and the public at large
to view the courts simply as political institutions—threatens judicial independence and the integrity of
American justice."8
Judiciary will never be legitimate as long as financing and elections are common
practice
Sarokin 14—retired federal judge--( 08/07/2014, Judge H. Lee, “For Sale -- Going Fast: An Independent
Judiciary -- Buy a Judge Today,” Huffington Post, http://www.huffingtonpost.com/judge-h-leesarokin/judicial-elections_b_5655959.html) . WM
According to the New York Times the retention election of three Tennessee judges "has been preceded by an
expensive and acrimonious campaign bolstered by organizations like Americans for Prosperity, which
receives financial support from the billionaires Charles G. and David Koch and other conservative groups".
Those supporting retention of the judges have been compelled to raise "more than $1 million" to combat the
effort to defeat them. Could there be anything more unseemly or contrary to the purposes for which the
judiciary was established?
I do not doubt that there are persons out there (and even corporations now) who contribute to judicial
campaigns for the purpose of electing or retaining judges who are fair, competent and impartial and who will
carry out the applicable laws and enforce the state and federal constitutions. Then there are the other 99
percent who wish to influence particular matters or judicial philosophy in general. Judges are not and were
never intended to be elected representatives. I cringe at the constant contention that judges should be held
"accountable". They are accountable to the laws and the Constitution. They should not be subject to the
whim of those who find certain past rulings objectionable or seek to influence future ones by buying
elections. Nothing could weaken the independence of the judiciary more than having judges removed or not
re-elected because of prior decisions that they have made.
The whole concept of judicial independence is that judges should feel to rule as they deem correct without
fear of retaliation. Nor should judges undertake the position with some feeling that they are indebted to those
who have financed their election. Per the Times: "The Republican State Leadership Committee, a national
group, plans to spend at least $5 million on judicial races this year." Why? Because they want to influence
future judicial decisions.
Let's face it -- this movement is exclusively a conservative one. Conservatives own it. Judges are to be ousted
for "liberal" rulings like upholding same-sex marriage, ordering new trials in death penalty cases or generally
ruling in favor of persons charged with crimes -- stuff like upholding the Constitution. Judicial elections are
degrading. Voters do not know whether or not the candidates are qualified. And finally money has further
corrupted the process. I have said on prior occasions: Can you imagine a lawyer or a litigant walking up to a
judge in the middle of a trial and handing the judge a check for his or her campaign? Would it make any
difference if the check was delivered a week before? And isn't it even worse now that the big boys are coming
in with even bigger checks?
We should end judicial elections entirely, but until we do, we must find a way to limit the corrupting influence
of money in the election process and stop putting the judiciary up for sale.
No modelling --- Supreme Court losing international influence
Liptak 08 (Adam, Supreme Court correspondent for NYT. “U.S. Supreme Court's global influence is waning,” NYT.
9/17/2008. http://www.nytimes.com/2008/09/17/world/americas/17iht18legal.16249317.html?pagewanted=all&_r=0)//CB
But now American legal influence is waning. Even as a debate continues in the court over whether its
decisions should ever cite foreign law, a diminishing number of foreign courts seem to pay attention to the
writings of American justices."One of our great exports used to be constitutional law," said Anne-Marie
Slaughter, the dean of the Woodrow Wilson School of Public and International Affairs at Princeton. "We are
losing one of the greatest bully pulpits we have ever had."
From 1990 through 2002, for instance, the Canadian Supreme Court cited decisions of the United States
Supreme Court about a dozen times a year, an analysis by The New York Times found. In the six years since,
the annual citation rate has fallen by more than half, to about five.
Australian state supreme courts cited American decisions 208 times in 1995, according to a recent study by
Russell Smyth, an Australian economist. By 2005, the number had fallen to 72.
The story is similar around the globe, legal experts say, particularly in cases involving human rights. These
days, foreign courts in developed democracies often cite the rulings of the European Court of Human Rights
in cases concerning equality, liberty and prohibitions against cruel treatment, said Harold Hongju Koh, the
dean of the Yale Law School. In those areas, Dean Koh said, "they tend not to look to the rulings of the U.S.
Supreme Court."
The rise of new and sophisticated constitutional courts elsewhere is one reason for the Supreme Court's
fading influence, legal experts said. The new courts are, moreover, generally more liberal that the Rehnquist
and Roberts courts and for that reason more inclined to cite one another.
Another reason is the diminished reputation of the United States in some parts of the world, which experts
here and abroad said is in part a consequence of the Bush administration's unpopularity abroad. Foreign
courts are less apt to justify their decisions with citations to cases from a nation unpopular with their
domestic audience.
"It's not surprising, given our foreign policy in the last decade or so, that American influence should be
declining," said Thomas Ginsburg, who teaches comparative and international law at the University of
Chicago.The adamant opposition of some Supreme Court justices to the citation of foreign law in their own
opinions also plays a role, some foreign judges say
"Most justices of the United States Supreme Court do not cite foreign case law in their judgments," Aharon
Barak, then the chief justice of the Supreme Court of Israel, wrote in the Harvard Law Review in 2002. "They
fail to make use of an important source of inspiration, one that enriches legal thinking, makes law more
creative, and strengthens the democratic ties and foundations of different legal systems."
Partly as a consequence, Chief Justice Barak wrote, the United States Supreme Court "is losing the central
role it once had among courts in modern democracies."
Justice Michael Kirby of the High Court of Australia said that his court no longer confines itself to
considering English, Canadian and American law. "Now we will take information from the Supreme Court of
India, or the Court of Appeal of New Zealand, or the Constitutional Court of South Africa," he said in an
interview published in 2001 in The Green Bag, a legal journal. "America" he added, "is in danger of becoming
something of a legal backwater."
Independent judiciaries continue to apply state corruption in rulings—judge
selection.
Gibler and Randazzo 11. (Douglas, professor of political science at University of Alabama. Kirk, assistant professor of
political science at University of South Carolina. “Testing the Effects of Independent Judiciaries on the Likelihood of Democratic
Backsliding,” American Journal of Political Science. Vol. 55, No. 3. July 2011. JSTOR.)//CB
The difficulties of establishing judicial independence have led some to argue that courts only reflect elite
interests. Tsebelis (2002), for example, argues that courts almost never constitute a separate veto player within
a polity. Judicial-selection procedures in most countries practically guarantee that courts will fail to provide
new constraints on the policymaking process. Only when other political actors take extreme positions or
when a new issue, not related to judicial selection, comes before the court can the judiciary pose an effective
veto. This is why judicial independence does not necessarily lead to higher rates of judicial annulment
(Burbank, Friedman, and Goldberg 2002). This is also why institutionalization of the courts matters as newly
independent courts will tend to reflect executive and/or legislative policy preferences on most issues
(Epstein, Knight, and Shvetsova 2001). Nevertheless, the attention other political actors devote to the courts
suggests that judicial institutions can matter. Yeltsin was concerned enough with the Russian constitutional
court to dismiss it entirely, as was Argentina’s military regime in 1976 and its democratic regime in 1983.
These rulers understand that even courts lacking judicial independence can provide increased legitimacy for
the dominant position of other political actors (Larkins 1998.)
--- XT: Alt Causes
Political intimidation undermines judicial independence — empirics
Dinh 7 — Viet D. Dinh, Professor of Law, Georgetown University Law Center; A.B., J.D., Harvard
University, 2007 (Threats to Judicial Independence, Real and Imagined, Georgetown Law Journal, Vol. 95,
http://georgetownlawjournal.org/files/pdf/95-4/dinh.pdf)
B. THREATS OF IMPEACHMENT AND POLITICAL INTIMIDATION
Criticism of judges by politicians is not new, either, but its frequency has picked up in recent decades. While
virtually everyone agrees that federal judges may be impeached if they commit crimes31, in the modern era,
threats of impeachment often follow unpopular rulings. In 1996, Judge Harold Baer, a federal district judge in
New York, ordered the suppression of evidence found during a traffic stop in New York City’s Washington
Heights neighborhood. The judge reasoned that, in that neighborhood, it was reasonable for people to fear
the police and so the defendants’ running did not give the officers a reasonable basis for searching the car. 32
Judge Baer’s ruling was immediately denounced, and by members of both political parties. The Clinton
Administration called for the judge’s resignation, while some congressional Republicans proposed
impeachment.33 Several weeks later, Judge Baer reconsidered the case and reversed his prior ruling.34
More recently, former House Majority Leader Tom DeLay advocated impeachment investigations of several
sitting judges such that Congress could be “a check on the court system.”35 The House Judiciary Committee
has considered creating an office of inspector general for the Judiciary to investigate allegations of judicial
misconduct.36 The goal of such proceedings is not necessarily to actually remove the judges from the bench.
Rather, threats of impeachment can serve as a tool of intimidation, having a chilling effect that
encourages judges to look over their shoulders when deciding cases.
The desire for decisional accountability in the judge selection process undermines
judicial independence
Geyh 8 — Charles G. Geyh, Professor of Law at University of Indiana, J.D. at University of Wisconsin
School of Law, 2008 (The Endless Judicial Selection Debate and Why It Matters for Judicial Independence,
THE GEORGETOWN JOURNAL OF LEGAL ETHICS, Vol. 21,
http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1052&context=facpub)
V. CONCLUSION
In our existing legal structure, states lay claim to having independent judiciaries, whose judges take oaths to
uphold the law. They have codes of judicial conduct that direct judges, on pain of discipline and removal, to
follow the law and resist public and political pressure to do otherwise. And they require judges in all courts of
general jurisdiction to have training and experience in the law, because unlike legislators and governors who
make or execute the law, judges who interpret the law must possess special expertise that non-lawyers lack.
These features of the legal structure are compatible with judicial elections as originally conceived. As
originally envisioned, contested elections were to promote judicial independence and the rule of law by
transferring control of judicial selection from manipulative governors and legislatures to the people, and were
to promote behavioral accountability by weeding out the incompetent, the lazy and the corrupt.
In the new world order, however, the primary justification for contested judicial elections has moved from
preserving judicial independence and behavioral accountability to promoting decisional accountability by
subjecting judges to loss of tenure for making decisions unpopular with the electorate. This new justification
is fundamentally incompatible with the principles that underlie the existing legal structure. It assumes either
that average voters are able to review judicial decisions for themselves and intelligently second guess a judge's
interpretations of law, or that the decisions judges make are matters of public policy rather than law, which
voters have a right to control. The first assumption is at odds with the notion embedded in state law, that
intelligently interpreting the law requires judges who have years of legal training and expertise that nonlawyers lack. The second assumption—that judges simply make policy masquerading as law—guts the rule of
law altogether and de-legitimizes constitutional structures and codes of conduct that preserve judicial
independence.
Judges are paid off-alt cause to judicial legitimacy
Zelden 13 --- professor of history at Nova Southeastern University in Fort Lauderdale, Florida (June 2013,
Charles L. Reviews in American History, “The Many Faces of Judicial Independence”, Volume 41, Number
2, Project Muse)//Jmoney
In the last decade, the cost of running for judicial office in America has exploded, doubling to over $200million nationwide. With each election cycle, running for judicial office has only grown costlier, as ever-larger
amounts of money are raised, and then spent, to elect state judges. As the cost of running for judicial office
has grown, so too have charges of vote-buying and undue influence.
Most infamous in this regard was the 2002 Supreme Court election in West Virginia, where the CEO of
Massey Energy, a coal company facing a fifty-million–dollar verdict for illegal and fraudulent business
practices, spent three-million dollars in support of a successful judicial campaign by Brent Benjamin for a seat
on that court. In turn, Benjamin proved to be the deciding vote in overturning the fifty-million–dollar jury
award in 2007. When the case was appealed to the U.S. Supreme Court, a five-to-four majority of the Justices
overturned the West Virginia Supreme Court’s decision and returned the case to the lower court for further
proceedings; in so doing, the Justices addressed the dangers that funding support for judicial candidates could
pose. “There is a serious risk of actual bias,” noted Justice Anthony Kennedy for the majority, “when a
person with a personal stake in a particular case had a significant and disproportionate influence in placing the
judge on the case by raising funds . . . when the case was pending or imminent.” Where this was the case, the
majority ruled, elected judges were supposed to recuse themselves from the proceedings.1
Yet despite the Supreme Court’s words of warning, the West Virginia example is but one among many cases
in which those with personal or ideological interests before the courts have given significant financial support
to judicial candidates—and those candidates later ruled in favor of their financial backers. Such examples
have become so numerous, in fact, that many ask if justice is for sale in America—or, as Andrew Rosenthal
of the New York Times put it: does America have “The Best Courts Money Can Buy”?2 For too many [End
Page 356] Americans, the answer to this question is a resounding “yes.” As former U.S. Supreme Court
Justice Sandra Day O’Connor noted in 2010, the unchecked role of money in judicial elections has produced
a “crisis of confidence in the impartiality of the judiciary,” undermining faith in “the rule of law that the
courts are supposed to uphold.” Her solution, one advocated by many others, is to take the partisanship out
of judicial elections, either by adopting judicial appointment with retention elections as the means of choosing
judges or by publicly funding judicial races.3
Political interference undermines independence --- lifetime appointment doesn’t
solve for corruption
Zelden 13 --- professor of history at Nova Southeastern University in Fort Lauderdale, Florida (June 2013,
Charles L. Reviews in American History, “The Many Faces of Judicial Independence”, Volume 41, Number
2, Project Muse)//Jmoney
Lifetime appointment did not fully isolate the judiciary from political interference, however. As the nation’s
politics evolved into a tug-of-war between competing political parties, judicial rulings inevitably came to have
political consequences. Viewed in this light, the power of judicial review, articulated at various points during
the 1790s and famously asserted in 1803’s Marbury v. Madison, became a two-edged sword for the courts.
Whereas judicial review gave judges the capacity to affect the direction and scope of government policies and
actions, it also inevitably put judges into conflict with the popularly elected branches of government. This
conflict was potentially catastrophic for the courts, Shugerman argues. Though the implementation of lifetime
appointment “took very significant steps toward an independent judiciary, there still were plenty of ways to
change, challenge, or undermine the . . . courts” (p. 22). Angry politicians could punish assertive judges by
“sweeping them off the bench or [by] abolishing their jobs” (p. 31). After 1800, state legislatures also
shortened judicial tenures from lifetime to term appointments varying[End Page 358] in length from seven
years to no term at all (known as “at pleasure” tenure). The result was that appointed judges needed to be
very careful in the application of their powers of judicial review—“announcing the theory of judicial review . .
. but often refus[ing] to put this theory into practice” in the face of political pressures. The consequence,
Shugerman argues, was that, although many landmark judicial rulings during the Early Republic pushed the
theory of judicial review, they refused to apply these powers in practical ways. In other words, as Shugerman
puts it, judicial review in the Early Republic was “more paper than practice, more bark than bite” (p. 9).
--- XT: No Modelling
Other countries are gaining more influence than the US due to its conservative
nature and lack of judicial activism
Liptak, 08- Adam Liptak is the Supreme Court correspondent of The New York Times
(9/17/08, Adam Liptak, “U.S. Court Is Now Guiding Fewer Nations”,
http://www.nytimes.com/2008/09/18/us/18legal.html?pagewanted=all&_r=0)//Yak
The trend abroad, moreover, is toward decisions of a distinctly liberal sort in areas like the death penalty and
gay rights. “What we have had in the last 20 or 30 years,” Professor Fried said, “is an enormous coup d’état
on the part of judiciaries everywhere — the European Court of Human Rights, Canada, South Africa, Israel.”
In terms of judicial activism, he said, “they’ve lapped us.”
American Foundations
The rightward shift of the Supreme Court may partly account for its diminished influence. Twenty years ago,
said Anthony Lester, a British barrister, the landmark decisions of the court were “studied with as much
attention in New Delhi or Strasbourg as they are in Washington, D.C.”
That is partly because the foundational legal documents of many of the world’s leading democracies are of
quite recent vintage. The Indian Constitution was adopted in 1949, the Canadian Charter of Rights and
Freedoms in 1982, the New Zealand Bill of Rights in 1990 and the South African Constitution in 1996. All
drew on American constitutional principles.
Particularly at first, courts in those nations relied on the constitutional jurisprudence of the United States
Supreme Court, both because it was relevant and because it was the essentially the only game in town. But as
constitutional courts around the world developed their own bodies of precedent and started an international
judicial conversation, American influence has dropped.
Judge Guido Calabresi of the federal appeals court in New York, a former dean of Yale Law School, has
advocated continued participation in that international judicial conversation.
“Since World War II, many countries have adopted forms of judicial review, which — though different from
ours in many particulars — unmistakably draw their origin and inspiration from American constitutional
theory and practice,” he wrote in a 1995 concurrence that cited the German and Italian constitutional courts.
“These countries are our ‘constitutional offspring,’ ” Judge Calabresi wrote, “and how they have dealt with
problems analogous to ours can be very useful to us when we face difficult constitutional issues. Wise parents
do not hesitate to learn from their children.” (Judge Calabresi is Professor Calabresi’s uncle.)
The openness of some legal systems to foreign law is reflected in their constitutions. The South African
Constitution, for instance, says that courts interpreting its bill of rights “must consider international law” and
“may consider foreign law.” The constitutions of India and Spain have similar provisions.
Many legal scholars singled out the Canadian Supreme Court and the Constitutional Court of South Africa as
increasingly influential.
“In part, their influence may spring from the simple fact they are not American,” Dean Slaughter wrote in a
2005 essay, “which renders their reasoning more politically palatable to domestic audience in an era of
extraordinary U.S. military, political, economic and cultural power and accompanying resentments.”
Frederick Schauer, a law professor at the University of Virginia, wrote in a 2000 essay that the Canadian
Supreme Court had been particularly influential because “Canada, unlike the United States, is seen as
reflecting an emerging international consensus rather than existing as an outlier.”
In New Zealand, for instance, Canadian decisions were cited far more often than those of any other nation
from 1990 to 2006 in civil rights cases, according to a recent study in The Otago Law Review in Dunedin,
New Zealand.
“As Canada’s judges are, by most accounts, the most judicially activist in the common-law world — the most
willing to second-guess the decisions of the elected legislatures — reliance on Canadian precedents will worry
some and delight others,” the study’s authors wrote.
American precedents were cited about half as often as Canadian ones. “It is surprising,” the authors wrote,
“that American cases are not cited more often, since the United States Bill of Rights precedents can be found
on just about any rights issue that comes up.”
--- Argentina Answer
Judicial reform fails --- empirical example
Mander 06 (Feb 21, 2006, Benedict Mander is Southern Cone correspondent for the Financial Times,
“Argentina move 'will undermine the judiciary',” The Financial Times,
http://www.laits.utexas.edu/lawdem/unit07/index.html)
Argentina's lower house of Congress is expected to pass on Wednesday key reforms to the judicial council
that critics fear will "seriously undermine" the independence of the judiciary and fail to promote the
appointment of good judges.
Already approved by the Senate, the proposed reforms to the judicial council, which is responsible for the
appointment and dismissal of judges, will reduce its size from 20 to 13 members, with the intention of
enhancing its efficiency and transparency.
But the relative weighting of political representatives on the council will be increased significantly, falling
from nine to seven members, while independent members; represented by judges, lawyers and academics; will
fall from 11 to six.
"The government will end up with a remarkable power of veto, which is very serious indeed. The council will
become pointless," said Daniel Sabsay, a constitutional lawyer, explaining that five of the seven political
representatives would be from the ruling party.
With a two-thirds majority required to approve appointments and dismissals, the government will effectively
be able to block decisions with which it disagrees. "There are serious risks for the independence of the
judiciary, which is absolutely shameful," Mr Sabsay said. Opponents of the reforms also worry they will fail
to promote the necessary conditions to attract the best applicants. This is one of the few issues to unify what
has otherwise been a deeply fragmented opposition, which political analysts say has little chance of defeating
President Néstor Kirchner in the elections in 2007; so long as the economy remains healthy until then.
Agustín Rossi, the president of Mr Kirchner's party, Frente para la Victoria, said: "We are convinced that this
is just an attempt by the opposition to stigmatise the government."
He argues that criticisms from lawyers and academics are self-interested and designed to preserve their own
influence.
Mr Rossi points to reforms made shortly after Mr Kirchner became president which overhauled the
mechanism for selecting the Supreme Court's judges, placing limits on the president's power while giving way
to a more participatory selection process.
But non-partisan groups such as New York-based Human Rights Watch have also criticised this list of
reforms.
In an open letter to Mr Kirchner, the organisation said the reforms would "jeopardise the constitutional
principles on which the council is based and seriously undermine the progress that Argentina has made under
this government in consolidating judicial independence and the rule of law".
Ricardo Gil Lavedra, a lawyer and former justice minister, said: "Argentina maintains a façade of the state of
law but in practice there is a great disequilibrium." Against a comfortable majority in the Senate, the judiciary
is an important check on the executive's power, he argues.
Mr Gil Lavedra is concerned about what he sees as the president's increasingly authoritarian style, made
possible by the popularity he has gained from Argentina's impressive recovery since its debt crisis four years
ago. Mr Kirchner has never held a cabinet meeting. "He is his own economy minister, his own foreign
minister," Mr Gil Lavedra said.
Observers say the independence of institutions in general; not just the judiciary; is weakening, with the media
and the central bank often cited as examples. "Kirchner is trying to take control [by himself] and he has been
very successful," said Ricardo López Murphy, one of the main opposition candidates and leader of the
Recrear party, who came third in the 2003 presidential election.
--- States Secrets Privilege Answers
Government secrets are here to stay
--can’t change bureaucracies
--double government
--American people think of the political system wrong
Smith ’14 --- contributing writer citing Tuft’s University Michael Glennon (Jordan Michael, “Vote all you
want. The secret government won’t change,” The Boston Globe, 10/19/14,
https://www.bostonglobe.com/ideas/2014/10/18/vote-all-you-want-the-secret-government-wonchange/jVSkXrENQlu8vNcBfMn9sL/story.html)//Mnush
THE VOTERS WHO put Barack Obama in office expected some big changes. From the NSA’s warrantless wiretapping to
Guantanamo Bay to the Patriot Act, candidate Obama was a defender of civil liberties and privacy, promising a dramatically different approach from his predecessor. But
six years into his administration, the Obama version of national security looks almost indistinguishable from
the one he inherited. Guantanamo Bay remains open. The NSA has, if anything, become more aggressive in monitoring Americans. Drone strikes have
escalated. Most recently it was reported that the same president who won a Nobel Prize in part for promoting nuclear disarmament is spending up to $1 trillion modernizing
and revitalizing America’s nuclear weapons. Why did the face in the Oval Office change but the policies remain the same? Critics tend to focus on Obama himself, a leader
who perhaps has shifted with politics to take a harder line. But Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldn’t have
changed policies much even if he tried. Though
it’s a bedrock American principle that citizens can steer their own
government by electing new officials, Glennon suggests that in practice, much of our government no
longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defense and national security apparatus is
effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”:
There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked.
Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. Glennon cites
the example of Obama and his team being shocked and angry to discover upon taking office that the military
gave them only two options for the war in Afghanistan: The United States could add more troops, or the
United States could add a lot more troops. Hemmed in, Obama added 30,000 more troops. (Advertisement omitted)
Glennon’s critique sounds like an outsider’s take, even a radical one. In fact, he is the quintessential insider: He was legal counsel to the
Senate Foreign Relations Committee and a consultant to various congressional committees, as well as to the
State Department. “National Security and Double Government” comes favorably blurbed by former members of the Defense Department, State Department,
White House, and even the CIA. And he’s not a conspiracy theorist: Rather, he sees the problem as one of “smart, hard-working, public-spirited people acting in good faith
who are responding to systemic incentives”—without any meaningful oversight to rein them in. How exactly has double government taken hold? And what can be done
about it? Glennon spoke with Ideas from his office at Tufts’ Fletcher School of Law and Diplomacy. This interview has been condensed and edited. IDEAS: Where does
the term “double government” come from? GLENNON:It comes from Walter Bagehot’s famous theory, unveiled in the 1860s. Bagehot was the scholar who presided over
the birth of the Economist magazine—they still have a column named after him. Bagehot tried to explain in his book “The English Constitution” how the British
government worked. He suggested that there are two sets of institutions. There
are the “dignified institutions,” the monarchy and the
House of Lords, which people erroneously believed ran the government. But he suggested that there was in
reality a second set of institutions, which he referred to as the “efficient institutions,” that actually set
governmental policy. And those were the House of Commons, the prime minister, and the British cabinet. IDEAS: What evidence exists for saying America has
a double government? GLENNON:I was curious why a president such as Barack Obama would embrace the very same national security and counterterrorism policies that
he campaigned eloquently against. Why
would that president continue those same policies in case after case after case? I
initially wrote it based on my own experience and personal knowledge and conversations with dozens of
individuals in the military, law enforcement, and intelligence agencies of our government, as well as, of
course, officeholders on Capitol Hill and in the courts. And the documented evidence in the book is
substantial—there are 800 footnotes in the book. IDEAS: Why would policy makers hand over the national-security keys to unelected officials? GLENNON: It hasn’t
been a conscious decision....Members of Congress are generalists and need to defer to experts within the national security realm, as elsewhere. They are particularly
concerned about being caught out on a limb having made a wrong judgment about national security and tend, therefore, to defer to experts, who tend to exaggerate threats.
The presidency itself is not a top-down
institution, as many people in the public believe, headed by a president who gives orders and causes
the bureaucracy to click its heels and salute. National security policy actually bubbles up from within the bureaucracy. Many of the more
The courts similarly tend to defer to the expertise of the network that defines national security policy.
controversial policies, from the mining of Nicaragua’s harbors to the NSA surveillance program, originated within the bureaucracy. John Kerry was not exaggerating when
he said that some of those programs are “on autopilot.” IDEAS: Isn’t this just another way of saying that big bureaucracies are difficult to change? GLENNON: It’s much
more serious than that. These
particular bureaucracies don’t set truck widths or determine railroad freight rates. They
make nerve-center security decisions that in a democracy can be irreversible, that can close down the
marketplace of ideas, and can result in some very dire consequences. IDEAS: Couldn’t Obama’s national-security decisions just
result from the difference in vantage point between being a campaigner and being the commander-in-chief, responsible for 320 million lives? GLENNON: There is an
element of what you described. There is not only one explanation or one cause for the amazing continuity of American national security policy. But obviously there is
something else going on when policy after policy after policy all continue virtually the same way that they were in the George W. Bush administration. IDEAS: This isn’t
how we’re taught to think of the American political system. GLENNON: I think the
American people are deluded, as Bagehot explained about the
institutions that provide the public face actually set American national security policy. They
believe that when they vote for a president or member of Congress or succeed in bringing a case before the
courts, that policy is going to change. Now, there are many counter-examples in which these branches do
affect policy, as Bagehot predicted there would be. But the larger picture is still true—policy by and large in
the national security realm is made by the concealed institutions. IDEAS: Do we have any hope of fixing the problem? GLENNON:
The ultimate problem is the pervasive political ignorance on the part of the American people. And
indifference to the threat that is emerging from these concealed institutions. That is where the energy for
reform has to come from: the American people. Not from government. Government is very much the
problem here. The people have to take the bull by the horns. And that’s a very difficult thing to do, because
the ignorance is in many ways rational. There is very little profit to be had in learning about, and being active
about, problems that you can’t affect, policies that you can’t change.
British population, that the
Solvency
Circumvention
FBI circumvents the law —they’ll punish whistleblowers and be deceptive regardless
of policy.
*we don’t endorse ableist language
ACLU, 13 (September 2013, “UNLEASHED AND UNACCOUNTABLE; The FBI’s Unchecked Abuse of Authority,”
https://www.aclu.org/sites/default/files/assets/unleashed-and-unaccountable-fbi-report.pdf)//CB
B. Suppressing Government Whistleblowers
The FBI has a notorious record of retaliating against FBI employees who report misconduct or abuse in the
FBI and has used aggressive leak investigations to suppress other government whistleblowers.
Congress exempted the FBI from the requirements of the Whistleblower Protection Act of 1989 and instead
required the Justice Department to establish an internal system to protect FBI employees who report waste,
fraud, abuse, and illegality. Still, FBI Director Robert Mueller repeatedly vowed to protect Bureau
whistleblowers:
I issued a memorandum on November 7th [2001] reaffirming the protections that are afforded to
whistleblowers in which I indicated I will not tolerate reprisals or intimidation by any Bureau employee
against those who make protected disclosures, nor will I tolerate attempts to prevent employees from making
such disclosures.180
Yet court cases and investigations by the Justice Department Office of Professional Responsibility and
Inspector General have repeatedly found that FBI officials continue to retaliate against FBI employees who
publicly report internal misconduct, including Michael German,181 Sibel Edmonds,182 Jane Turner,183
Robert Wright,184 John Roberts,185 and Bassem Youssef.186 Other FBI whistleblowers choose to suffer
retaliation in silence. Special Agent Chad Joy courageously blew the whistle on a senior FBI agent’s serious
misconduct during the investigation and prosecution of Alaska Sen. Ted Stevens, which resulted in the trial
judge overturning the conviction against him, but only after the senator had lost re-election.187 Special Agent
Joy was publicly criticized by his then-retired supervisor, subjected to a retaliatory investigation, and then
taken off criminal cases.188 Joy resigned and no longer works at the FBI, while the FBI agent responsible for
the misconduct in the Stevens’ case continues to be assigned high-profile investigations—a clear sign that the
FBI culture continues to protect agents involved in misconduct more than those who report it.189
These high-profile cases of whistleblower retaliation discourage other FBI personnel from coming forward. A
2009 Inspector General report found that 28 percent of non-supervisory FBI employees and 22 percent of
FBI supervisors at the GS-14 and GS-15 levels “never” report misconduct they see or hear about on the
job.190 That such a high percentage of officials in the government’s premiere law enforcement agency refuse
to report internal misconduct is shocking and dangerous and perpetuates the risk that Americans like Sen.
Stevens will continue to be victimized by overzealous investigations and prosecutions.
The FBI has also been involved in suppressing other government whistleblowers through inappropriately
aggressive leak investigations. For example, when the U.S. media reported in 2005 that the National Security
Agency (NSA) was spying on Americans’ communications without warrants in violation of the Foreign
Intelligence Surveillance Act, the FBI didn’t launch an investigation to enforce the law’s criminal provisions.
It instead went after the whistleblowers, treating leaks to the American public about government malfeasance
as espionage.191 After more than a year of aggressive investigation and interviews, armed FBI agents
conducted coordinated raids on the homes of four former NSA and Justice Department officials and a House
Intelligence Committee staffer, treating them as if they were dangerous Mafiosi instead of dedicated federal
employees who held the government’s highest security clearances. William Binney, who served more than 30
years in the NSA, described an FBI agent pointing a gun at his head as he stepped naked from the
shower.192 The only prosecution, alleging Espionage Act violations against the NSA’s Thomas Drake,
collapsed at trial in 2011, and the government’s methods earned a stern rebuke from Judge Richard D.
Bennett:
I don't think that deterrence should include an American citizen waiting two and a half years after their home
is searched to find out if they're going to be indicted or not. I find that unconscionable. … It was one of the
most fundamental things in the Bill of Rights that this country was not to be exposed to people knocking on
the door with government authority and coming into their homes. And when it happens, it should be
resolved pretty quickly, and it sure as heck shouldn't take two and a half years before someone's charged after
that event.193
The deterrence effect from such enforcement activity isn’t felt just by the person ultimately charged, however,
or even those searched but never charged. The FBI’s aggressive investigations of whistleblowers send a clear
message to other federal employees that reporting government wrongdoing will risk your career, your
financial future, and possibly your freedom. And more FBI leak investigations are resulting in criminal
prosecutions than ever before. The Obama administration has prosecuted more government employees for
leaking information to media organizations than all other previous administrations combined, often charging
them with Espionage Act violations and exposing them to draconian penalties.194 Though leaks of classified
information are a common occurrence in Washington, almost invariably these leak prosecutions have targeted
federal employees who exposed government wrongdoing or criticized government policy.
FBI circumvents the AG guidelines
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
A. Attorney General Guidelines The
Attorney General's Guidelines on FBI Confidential Human Sources n157
agency guidelines, not regulations, and as such have
("Guidelines"), issued in 2006 by the Department of Justice, n158 are
no binding legal effect. n159 [*259] Much of the problem of FBI informant misuse stems from this fact. The Guidelines outline the rules the
FBI should follow in undercover investigations involving informants, which include documenting new informants and recording agreements made.
n160 The Guidelines are also subject to review and modification by the Attorney General in accordance with federal laws, and are afforded great
deference by the courts. n161 The major problems with the
Guidelines, however, are that they lack consequences, are not subject
to judicial review, and are not followed by agents. n162 While the Guidelines may have internal consequences n163 for FBI agents
who violate them, they have no meaningful effect beyond internal regulation and cannot be enforced by the public
via judicial review. n164 Judicial review for violations only occurs when criminal prosecutions reveal the FBI's activities in the investigation.
n165 However, the informants in these cases typically remain confidential, and any inquiry into their actions does not extend beyond the handling
agent's conduct and the recruitment methods used. n166 Evidence shows that in
many cases, FBI agents fail to follow the
Guidelines when recruiting and handling informants. A 2005 study conducted by the Department of Justice Office of the
Inspector General found that the FBI did not provide enough support to agents to properly follow the pre-2006 Attorney General Guidelines
Regarding the Use of Confidential Informants. n167 In fact, noncompliance
with the guidelines was a problem in 87
percent of the cases the Inspector General reviewed. In particular, agents failed to properly review the suitability of potential
informants, properly document informants' illegal activities, and notify informants of their limitations. n168 Given the high levels of
noncompliance and agents' nearly unlimited discretion in extending immigration rewards, agent abuse is likely
also high.
No Solvency – Pooling
Congressional oversight fails ---- different executive agencies can “pool” together
resources in order to dodge restraints put on only one agency
Renan 15 --- Alexander Fellow, New York University School of Law; formerly Attorney Advisor, Office
of Legal Counsel, and Counsel, Office of the Deputy Attorney General (Daphna, “POOLING POWERS”,
Columbia Law Review, 115 Colum. L. Rev. 211, Lexis)//Jmoney
B. Congress
Legal and political theory generally regards Congress as the designer-in-chief of the administrative state.
Congress generates administrative capacity and supervises the work of administration, including through
agency design. Pooling qualifies this narrative. By bridging a fragmentary bureaucracy, the executive can
generate capacity that would not otherwise exist. Pooling thus becomes a substitute, concededly imperfect,
for capacity building through legislation. Pooling also challenges a central analytic claim--that Congress
controls future agency outputs through legislation designing the agency's structure and process. Pooling
reveals a shape-shifting bureaucracy, reconfiguring its own organizational and procedural boundaries from
within.
1. Pooling Generates Capacity Without Congress. -- The executive's resort to administration to effect policy
change, particularly where legislative achievement becomes less viable, is a dynamic well trodden in the
administrative law scholarship. n219That literature has focused on centralization tools like presidential
directives to the agencies to undertake (or to decline to take) particular administrative action, and regulatory
review by the White House. n220
[*256] Part of what makes pooling distinctive, however, is the executive's ability to generate power of
administration not otherwise available to any single administrative actor. To be sure, at the margins, the scope
of plausible authority each agency can exercise is pliable. Presidential directives may energize a given agency's
mission, and legal interpretation may press the bounds of what is permissible. n221 But the synergistic
potential of pooling is different in degree, if not in kind.
The joint efforts by the FCC and the federal agencies constituting Team Telecom, for instance, enable the
executive to augment its law enforcement and surveillance capabilities. The requirements that Team Telecom
imposes through the Network Security Agreements effectively regulate the cable carriers. But while legal
leverage is supplied by the FCC's licensing authority, Team Telecom's effective power to so regulate the
carriers is not rooted in any legislative scheme. n222
Pooling's ability to create regulatory space is illuminated by comparing Team Telecom's effective jurisdiction
to the formal jurisdiction that the same agencies have through participation in another structure that has been
codified by Congress--the Committee on Foreign Investment in the United States (CFIUS). Congress has
authorized CFIUS to review proposed foreign acquisitions that could result in the transfer of control of a
U.S. business to a foreign entity in order to determine the effects of such a transaction on national
security. n223 The members of Team Telecom--the DoD, the DoJ, and the DHS--are also members of
CFIUS (though CFIUS includes additional agencies as well). n224 Congress has authorized CFIUS to enter
into "mitigation agreements," pursuant to which the acquirer agrees to certain conditions to mitigate national
security concerns. n225 But CFIUS lacks jurisdiction over so-called greenfield investments (or startups),
where there is no transfer of control over an [*257] existing U.S. business. n226 And CFIUS's authority to
require mitigation conditions is limited to threats to national security. n227
Team Telecom's effective power, by contrast, stems not from CFIUS but from the FCC's authority to review
and grant licenses in the "public interest" under the Communications Act. n228 Team Telecom reviews
greenfield investments in addition to transfers of control, n229 and the security agreements it negotiates can
consider aspects of public safety beyond national security. n230 Team Telecom's effective "jurisdiction," then,
is distinct from CFIUS, the closest statutory analog. n231
Pooling thus enables the executive to create capacity without Congress. Pooling also poses challenges for core
tools through which Congress superintends the administrative state.
2. Pooling Is a Mechanism of Bureaucratic Drift. -- Administrative design theory owes its current incarnation
in large part to positive political theory. That theory conceptualizes Congress's delegation of authority to
agencies as a principal--agent problem: How can Congress (the principal) bring its agent (the agency) into line
with its policy preferences? n232 This problem implicates two types of uncertainty--what theorists have
termed bureaucratic drift and coalitional drift. Bureaucratic drift is the difference between the policy
preferences of Congress and [*258] the policy preferences of the agency. n233 Coalitional drift is the
difference between the policy preferences of the enacting Congress and the policy preferences of a future
Congress.n234
Pooling is a tool through which the executive can achieve policy objectives distinct from those
Congress set out to achieve in the initial allocation of power. It can facilitate bureaucratic drift.
Agencies can use resources designed for a particular purpose to achieve a different policy objective.
As with other mechanisms of bureaucratic drift, Congress can still respond to pooling, including to ratify or
prohibit it. For example, Congress embraced the DHS--NSA collaboration in the cybersecurity context. In
2012, Congress included a provision in the National Defense Authorization Act to mandate
"interdepartmental collaboration" between the DHS and NSA on cybersecurity. n235 In introducing the
amendment, Senator John McCain indicated that it was intended to codify the 2010 cybersecurity
memorandum of agreement between the two agencies. n236 Congress also can terminate pooling after it has
occurred (when pooling is visible to Congress). But the status quo has been changed. And Congress will now
need to overcome its own collective action hurdles to alter the executive's design. n237
In part because Congress's abinlity to correct bureaucratic drift after it occurs is often quite difficult, theorists
have looked for ways in which [*259] Congress can exercise ex ante control over administration. Here,
again, pooling complicates a central narrative.
An influential argument in administrative law theory is that Congress exercises ex ante control over the
bureaucracy through administrative design. The claim was initially advanced by political scientists Matthew
McCubbins, Roger Noll, and Barry Weingast ("McNollgast"), n238 and it has been refined by
others. n239 Through a mix of structural and procedural controls enacted in legislation, the argument goes,
Congress ameliorates bureaucratic drift. Administrative design injects the interest groups that formed the
enacting coalition into the administrative process, thereby enabling those interest groups to influence the
agency's policy outputs and to alert Congress when issues warranting its oversight arise. n240 As McNollgast
explains, "By structuring who gets to make what decisions when, as well as by establishing the process by
which those decisions are made, the details of enabling legislation can stack the deck in an agency's decisionmaking." n241
Pooling complicates this account. It suggests that at least some of the action occurs through joint structures
that bridge those initial agency [*260] design choices. Pooling, in effect, can alter who makes what decisions
when, and through what process. It calls into question the stickiness of those initial structural bargains.
a. Overcoming Procedural Constraints. -- Congress uses a variety of design tools, including temporal
constraints, to control agencies through legislation. n242 An agency facing such limits on its delegated
authority, however, can in effect circumvent those statutory constraints by pooling with another
agency that Congress has not subjected to the same limitations.
For example, under the Hart-Scott-Rodino Antitrust Improvements Act of 1976 ("HSR Act"), Congress has
delegated to the DoJ the authority to review certain mergers before they occur to ensure compliance with
antitrust laws. n243 But the HSR Act establishes a strict timetable for the Department's review. The DoJ has
an initial thirty-day period to conduct its review, n244 which the agency may extend for an additional thirty
days when additional information is requested from the companies. n245After this waiting period expires, the
companies are free to consummate their proposed merger unless the government files suit in district court
and seeks a preliminary injunction. n246 The HSR Act's stringent deadlines address congressional concern
that "protracted delays . . . might effectively 'kill' most mergers." n247
When reviewing potential telecommunications mergers, however, the DoJ is able to work around the HSR
Act deadlines and the obligation to seek a preliminary injunction in court by pooling with the FCC. The FCC
reviews proposed mergers pursuant to its licensing authority under the Communications Act of
1934. n248 Unlike the DoJ's review under the HSR Act, the FCC confronts no statutory deadlines for its
premerger review under the Communications Act. As a matter of policy, the FCC has adopted an aspirational
"benchmark" of 180 days from public notice to [*261] complete its review. n249 But it has made clear that
even this timeline is flexible and that the Commission may depart from it. n250
There is a trend toward greater collaboration between the DoJ and the FCC in reviewing proposed
telecommunications mergers. n251 The agencies' joint efforts, in practice, enable the DoJ to work around the
stringent procedural constraints that the statutory scheme imposes. n252
b. Diversifying Interest Groups. -- Another mechanism through which Congress can curb bureaucratic drift is
the organizational design of the agency. n253 That initial design choice, shows Jonathan Macey, has the effect
of "perpetuat[ing] the power and legitimacy of certain groups and undermin[ing] the power and legitimacy of
others." n254 By choosing winners and losers upfront through the agency's organizational design, Congress
"hardwire[s]" into the agency structure the legislature's policy preferences. n255
Consider the congressional design choice to create a single-industry agency, beholden to a single interest
group, rather than a multi-industry agency. Congress's decision to create the single-industry agency,
Macey [*262] argues, bolsters Congress's control over the agency's policy outputs. n256 The single-industry
design choice augments that particular interest group's access to the agency, and it shapes the type of
expertise that will be relevant to the agency's mission--expertise that the interest group itself
possesses. n257 By empowering a particular interest group, Congress has hardwired certain preferences into
the design of the agency.
Through pooling, however, the executive can convert a single-industry regulatory space into a multi-industry-or multi-interest group--regulatory space. The joint structure's preferences will look different from those of
the single agency acting alone. Pooling thus enables the executive to work around Congress's initial structural
hardwiring.
The EPA--NHTSA joint rulemaking illustrates how pooling can diversify the interest groups influencing a
regulatory task, as well as how pooling can overcome other constraints on expertise building that Congress
imposes through legislation. The joint rulemaking enabled the EPA to exercise influence over
NHTSA, n258 an agency with a very different, and in some respects historically incapacitating, relationship to
the auto industry. n259 Coordination in any form might diversify the operative interest groups. n260 But
pooling can be particularly effective at altering the impact of particular interest groups as compared, for
instance, to OIRA review.
Pooling can affect more of the lifecycle of agency policymaking than centralization tools like OIRA have the
practical ability to influence, and pooling can be accompanied by institutional changes inside the agencies that
deepen collaboration. Both of these dimensions are evident in the EPA--NHTSA joint rulemaking. The EPA
and NHTSA collaborated on a variety of major tasks including syncing up the timing of "key
milestones [*263] of each rulemaking." n261 And the two agencies formed a number of joint structures to
support the pooled effort, including "joint technical teams," which drove the effects of coordination deep
into the two agencies' bureaucratic cores. n262 In this sense, pooling is able to affect some of the more subtle
dynamics of organizational design that Macey identified. For example, "hardwiring" turns in part on the
makeup of the experts populating the regulatory space, which Macey emphasizes are often drawn from the
regulated industry. n263
Pooling in the EPA--NHTSA example also enabled the executive to overcome a specific statutory
impediment to NHTSA's own expertise building. While Congress had curbed NHTSA's ability to build
expertise through a multiyear appropriations restriction, the joint structure enabled NHTSA to "borrow" that
expertise from the EPA after the ban was lifted. n264
Pooling thus adds complexity to a central causal claim in administrative law theory: that Congress exercises
control over the agency's ongoing policy outputs through agency design. It illuminates an assumption implicit
in that theory--the stability of the initial structural bargain as a matter of actual, or effective, administrative
decisionmaking. I do not want to overstate the claim. To be sure, initial design has effects on the agency's
policymaking. But pooling suggests that the reliance the existing account places on ex ante design choice
might be overdrawn. n265
Pooling undercuts oversight
Dalal 14 --- JD Yale Law School, BS University of Pennsylvania (Anjali S, Michigan State Law Review,
“SHADOW ADMINISTRATIVE CONSTITUTIONALISM AND THE CREATION OF
SURVEILLANCE CULTURE”, 2014 Mich. St. L. Rev. 59, Lexis)//Jmoney
3. Pooling Can Diminish the Effectiveness of Congress's Committee Oversight Structures. -- Pooling also can
muddle ongoing congressional oversight of administrative decisionmaking. It can obscure which
administrative actor is responsible for a given course of conduct. It can mask the true mover behind an
administrative decision. And it can diminish Congress's ability to exercise effective oversight to the extent that
pooled structures bridge Congress's own oversight committee structures.
For example, the intelligence oversight committees in Congress differ from the armed services oversight
committees, and the executive's reporting requirements with respect to intelligence collection and military
action are distinct. Pooling arrangements combining intelligence and military authorities--that is, the Title 10-Title 50 joint structures--have [*264] created confusion, if not obfuscation, regarding congressional
oversight. n266
Indeed, the House Permanent Select Committee on Intelligence has publicly expressed concerns that certain
intelligence activities are not being reported to it and to the Senate Select Committee on Intelligence because
they are being aggressively categorized as military activity instead. n267 Those activities also are slipping
through gaps in the oversight practices of the Senate and House Armed Services Committees because the
executive's notification obligations to those committees were designed with very different considerations in
mind. n268
4. Pooling Circumvents Some of Congress's Funding-Related Constraints. -- A final tool through which
Congress exercises control over executive action is funding. Congress can discipline specific pooling
arrangements through its funding decisions. Congress can choose to defund a particular program or agency
or to prohibit a particular interagency effort, including as a mechanism to penalize pooling. n269
But Congress also structures executive design at a more systematic level through appropriations law, and
pooling poses challenges to this more systematic form of congressional control.
Pooling allows the executive to work around constrains in the Economy Act
Renan 15 --- Alexander Fellow, New York University School of Law; formerly Attorney Advisor, Office
of Legal Counsel, and Counsel, Office of the Deputy Attorney General (Daphna, “POOLING POWERS”,
Columbia Law Review, 115 Colum. L. Rev. 211, Lexis)//Jmoney
b. The Economy Act. -- Through pooling, the executive also can work around some of the constraints that
Congress has imposed under the Economy Act. In 1932, Congress passed legislation authorizing agencies to
contract with one another for their services or materials. n280 The Act, as amended, authorizes "[t]he head of
an agency or major organizational unit within an agency" to "place an order with a major organizational unit
within the same agency or another agency for goods or services" where certain conditions are met. n281 The
Act was designed to address intraexecutive outsourcing, and so its constraints generally focus on
the transfer of funds or legal authority from one agency to another. n282
There are anticircumvention ideas driving interpretations of the Economy Act by the Comptroller General.
For example, an outsourcing agency cannot use an Economy Act agreement to fund work that it
would not itself be authorized to undertake. n283Nor can the outsourcing agency obtain under the
Economy Act services from another agency that its own enabling statute prohibits. n284
[*267] Those constraints do not easily translate to pooling, however. There is no transfer of authority with
pooling. And the aggregation of authorities that pooling achieves, sometimes formally and sometimes
informally, is not clearly governed by the Economy Act.
No Solvency – Immigrant Informants
Plan can’t solve – FBI targets non-US informants
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
Introduction In 2004, the FBI approached Imam Foad Farahi, a cleric at a mosque in South Florida, and promised him lawful permanent resident
status n1 in return for information on members of his South Florida Muslim community. n2 Farahi had entered the United States on a student visa
that had since expired, and was at the time applying for political asylum. n3 When
Farahi refused the FBI's offer and told the
agents that he had no information beyond his mere acquaintance with the individuals sought by the agents,
the FBI agents threatened to deport Farahi to Iran and charge him with providing material support to terrorism
unless he cooperated by acting as an informant. n4 Because the FBI's post-9/11 establishment of a preventative stance towards terrorism n5 has
increased the need for intelligence, n6 the agency has [*237] turned to the increased use of immigration law and residence
status to recruit more confidential informants. n7 Although the FBI does not comment on its informant recruitment methods, n8
numerous stories similar to Farahi's have been reported since 9/11. n9 In fact, allegations of the FBI's aggressive use of past
[*238] violations of immigration laws to pressure individuals whom the agency believes may have terrorism
knowledge have repeatedly surfaced. n10 The Informants, a yearlong investigation into the FBI's use of informants, led by Trevor
Aaronson and the University of California at Berkeley's Reporting Program in conjunction with Mother Jones, details the FBI's expanded use of
informants in terrorism investigations. n11 Of the approximately five hundred federal terrorism prosecutions conducted since 9/11, about half used an
informant, n12 and forty-nine of them were the result of work done by agent provocateurs. n13 Aaronson's investigation also shed light on the FBI's
use of immigration law and the threat of deportation to incentivize informants to cooperate. n14 Aaronson explains, A
typical scenario will
play out like this: An FBI agent trying to get someone to cooperate will look for evidence that the person has
immigration troubles. If they do, he can ask [Immigration and Customs Enforcement (ICE)] to begin or
expedite deportation proceedings. If the immigrant then chooses to cooperate, the FBI will tell the
court that he is a valuable asset, averting deportation. n15
The abundance of fabricated info from immigrant informants turns case –
encourages ethnic profiling, chills free speech, and wastes resources
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
[*239] Using the threat of immigration consequences like deportation to produce terrorism intelligence presents novel problems for the intelligence
gathering process and the informants. When individuals are pressured into becoming informants by the threat of deportation, which
may remove them from their family and all sources of support, the decision essentially becomes a Hobson's choice. n16 Informants recruited in this
manner who also lack legitimate ties to foreign terrorist organizations n17 have
an enormous incentive to fabricate information to
fulfill their end of the agreement and avoid deportation. n18 Attorney Stephen Downs of Project SALAM explained,
Community life is shattered as the government often forces Muslim immigrants to spy on their own
communities or give false testimony with the threat that the Muslim's immigration status will be "revised" if the Muslims do not
cooperate. Such practices generate fear and alienation in the Muslim community and diminish our security rather than enhance it. n19 As Downs
notes, the
intelligence these informants provide can be unreliable, n20 because these individuals may feel they
must offer up something to the government to avoid being removed from their families, jobs, and lives. The
threat of false intelligence is grave. In addition to the possibility of entrapment n21 by agent provocateurs, false intelligence
may encourage ethnic and religious profiling of Muslim and Middle Eastern communities, n22 chill free
speech, n23 and waste finite intelligence resources. Recruitment through [*240] immigration law also affords less
protection to informants than recruitment done by offering monetary rewards or reductions in sentencing. n24 For example, unlike criminal
offenses, there is no statute of limitations governing civil penalties like deportation, removal, or exclusion
orders, which means that the FBI can use immigration violations to leverage cooperation from out-ofstatus individuals who have been in the country for years. Moreover, unlike an informant who is promised a sentence reduction
or lessened charges and who can enforce his or her bargain with the government through plea bargaining, an informant promised immigration benefits
has no way of enforcing these promises. n25 Furthermore, the Sixth Amendment's guarantee of counsel n26 does not apply to immigration violations.
n27 Finally, according to some reported cases, the government has failed to reward informants with the promised immigration benefits after receiving
their cooperation. n28
Immigrant informants perpetuate ethnic profiling
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
B. Mosque Surveillance Encourages Religious and Ethnic Profiling In addition to eroding the First Amendment's free speech rights of Muslims and
Middle Easterners, the
FBI's informant surveillance tactics also inappropriately target these religious and ethnic
groups. Most of the organizations designated as Foreign Terrorist Organizations by the State Department are Muslim or Arab groups. n89 Many
post-9/11 policies, like the extensive detention of Muslims and Middle Easterners, indicate that the federal government views Muslims
and Middle Eastern immigrants as potential terrorists. n90 Popular perception of Muslims has moved in
the same direction, with huge opposition, for example, to the construction of an Islamic community center - Park 51 - near the site of the
World Trade Center in New York. n91 Other examples include state laws banning the use of Shari'ah law in judicial decisions n92 and Islamophobia
n93 rising in the United States n94 and abroad. n95 [*250] By
sending immigrant informants into mosques and religious and
ethnic communities with little more than a vague directive to find terrorists, the FBI perpetuates ethnic
profiling and the conflation of Islam and terrorism. In recruiting terrorism informants from the immigrant population, the
FBI puts an ethnic and religious face on terrorism, and perpetuates the popular perception of what terrorists look like. Sending these
informants into mosques and immigrant communities greatly increases the chances that alleged suspects fit
the ethnic and religious stereotypes of terrorists. Put differently, if an informant is assigned to surveil a mosque, the chances of the
informant bringing back a non-Muslim or non-Middle Eastern suspect are low. This surveillance policy becomes a vicious cycle.
The FBI recruits immigrant individuals from suspect communities to become informants, pressures them into producing
terrorism suspects that fit the popular perception of what terrorists are like, and then prosecutes these
suspected terrorists. All this reinforces the public conflation of immigrants, Muslims, Middle Easterners, and terrorists. Ethnic
and religious profiling further alienates Muslim and Middle Eastern communities, and deepens their mistrust for government. n96 Additionally,
by predisposing many Americans to view Muslims, immigrants, and Middle Easterners as potential terrorist threats, ethnic and
religious profiling may also bias juries in terrorism prosecutions. n97 Although suspects often claim entrapment as a
defense, after 9/11 the entrapment defense has never been successfully used in terrorism cases. n98 In fact, many, if not most, terrorism cases never
reach the jury because the chances of successfully defending against terrorism charges after 9/11 are almost nonexistent. n99 Popular stereotypes
concerning Muslims and Middle Easterners play a role in this. Although the use of immigration law in recruiting informants is only one of many
factors contributing to this harmful cycle, the use of coercive tactics like immigration law to recruit informants creates a [*251] higher risk of
unfounded terrorism prosecutions against innocent individuals who do not pose a risk. Consequently, this fuels the public perception that a
stereotypical terrorist is a Middle Easterner or Muslim.
Judicial Action Fails
Courts misunderstand how police surveillance is conducted and can’t act effectively
without future legislation
Rushin, 13 --- Visiting Assistant Professor, University of Illinois College of Law (Fall 2013, Stephen,
Brooklyn Law Review, “The Legislative Response to Mass Police Surveillance,” 79 Brooklyn L. Rev. 1,
Lexis,)//Mnush
[*24] II. THE LAW OF POLICE SURVEILLANCE Traditionally,
courts have shied away from regulating police surveillance in
public spaces. This is because the courts have operated under a set of jurisprudential assumptions of police
surveillance. These jurisprudential assumptions were reasonable in the past because of the limited technological efficiency of previous surveillance technologies. In
Jones, the Supreme Court had the opportunity to confront these jurisprudential assumptions in light of modern technology. A majority of the justices indicated that these
jurisprudential assumptions were increasingly unsupportable in today's digitally efficient world of policing. n118 But the
Court did not alter these doctrinal
assumptions in any way, nor did they offer much indication on how they may alter these assumptions in the
future. Thus, after the Jones decision, the law of police surveillance today is as incoherent as ever. I have previously
argued that the digitally efficient investigative state does not run afoul of the Fourth Amendment, based on the presence of these jurisprudential assumptions, n119 but dicta
in the concurrences of the Jones case imply that these jurisprudential assumptions may not exist for much longer. Even
so, there is no clear indication
how the Court could establish a default rule that both narrowly limits some uses of digitally efficient
technologies without adversely affecting other non-invasive, legitimate uses. In this section, I evaluate the doctrinal basis for the
traditional jurisprudential assumptions about police surveillance. I then spend considerable time analyzing the dicta in the Jones case to predict how the Court may respond
to these technologies in the future. I conclude that, while
the Court will likely make some effort to rein in the digitally efficient
investigative state in the future, any regulation will be limited in capacity. The regulation will almost certainly
rely upon an often-ineffective enforcement tool like the exclusionary rule. Thus, even if the judiciary is
institutionally capable of controlling the digitally efficient investigative state, the legislature must
also take a proactive role in any future regulation.
Judicial oversight fails --- non enforceable, extremely high standards, and executive
privilege
Dalal 14 --- JD Yale Law School, BS University of Pennsylvania (Anjali S, Michigan State Law Review,
“SHADOW ADMINISTRATIVE CONSTITUTIONALISM AND THE CREATION OF
SURVEILLANCE CULTURE”, 2014 Mich. St. L. Rev. 59, Lexis)//Jmoney
1. Judicial Intervention
The Church Committee, reflecting on the Keith decision, emphasized the importance of judicial intervention
in the national security arena when it reminded the public that warrantless wiretapping "had been permitted
by successive presidents for more than a quarter of a century without 'guidance from the Congress or a
definitive decision of the Courts.'" n308 Unfortunately, there are three barriers to judicial intervention that
facilitate shadow administrative constitutionalism in the national security arena: the lack of judicially
enforceable rights, the standing hurdle, and the growth of executive privilege.
a. Judicially Enforceable Rights
By the time the Civiletti Guidelines were issued in 1980, the DOJ made eminently clear that the Attorney
General Guidelines were "solely for the purpose of internal Department of Justice guidance" n309 and would
otherwise be legally binding. Specifically, the Guidelines made clear that "[t]hey are not intended to, do not,
and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in
any manner, civil or criminal." n310 Such rights-limiting language prevents any injured party from using the
governing document of the FBI to enforce the self-imposed limitations on the Bureau's power.
[*129] b. The Standing Hurdle
The lack of judicially enforceable rights is not, however, the only problem. Those who might bring a First
Amendment claim based on the surveillance authorized by the Attorney General Guidelines face immense
difficulty simply getting into court. n311One of the primary problems with surveillance is that it has the
power to coerce people into self-censorship--or chilled speech. This makes surveillance, fundamentally, a
First Amendment issue and a prime subject for constitutional litigation. As our communications are
increasingly subject to the prying eyes of the government, our ability to speak freely is directly curtailed.
However, after the Supreme Court's decision in Laird v. Tatum, litigants suing under the First Amendment
theory of chilled speech are subject to a high standing bar that, more often than not, prevents them from
having their case heard at all.
The first mention of the term "chill" in Supreme Court jurisprudence occurred in 1952 in Wieman v.
Updegraff, a case overturning an Oklahoma law that required all state employees to take a loyalty oath
denying all affiliation, direct and indirect, with "any foreign political agency, party, organization or
Government, or with any agency, party, organization, association, or group whatever which has been officially
determined by the United States Attorney General or other authorized agency of the United States to be a
communist front or subversive organization." n312 In an important concurrence, Justice Frankfurter argued
that the loyalty oath had "an unmistakable tendency to chill that free play of the spirit which all teachers
ought especially to cultivate and practice." n313 From that time to when the term "chilling effect" was first
used in Dombrowski v. Pfister n314 thirteen years later, Professor Frederick Schauer argues that [*130] the
term evolved from an "emotive argument into a major substantive component of first amendment [sic]
adjudication." n315
However, after Laird v. Tatum, litigating on the basis of chilling effects has become difficult. Tatum requires
litigants to first prove that the surveillance in question led to a cognizable harm before they will be granted
standing and further held that "the mere existence . . . of a governmental investigative and data-gathering
activity that is alleged to be broader in scope than is reasonably necessary for the accomplishment of a valid
governmental purpose" was simply not a cognizable harm. n316
As a result of Tatum, before an individual can bring a First Amendment claim against FBI based on the
authorizations of the Attorney General Guidelines, she must first prove that she has been harmed by the
often-secret surveillance. n317 Because of the difficulty of first affirmatively identifying that one is the subject
of government surveillance in order to allege a cognizable harm under the law, such litigation has been made
increasingly unlikely under Tatum.
For example, in 2005, The New York Times exposed the President's Surveillance Program (PSP), a program
developed after 9/11 that secretly authorized the NSA to intercept "the international telephone calls and
international e-mail messages of hundreds, perhaps thousands, of people inside the United States without
warrants over the past three years in an effort to track possible 'dirty numbers' linked to Al
Qaeda." n318 "Additionally, the NSA told Congress that privileged communications, such as those between
an attorney and her client, would not be 'categorically excluded' from interception." n319
This discovery led prominent civil rights organizations, including the American Civil Liberties Union
(ACLU), to file [*131] lawsuits against the government arguing that their speech was chilled because their
communications were likely targets of the surveillance program. n320 The ACLU filed on behalf of itself and
a group of journalists, scholars, and other organizations that regularly communicate with likely targets of the
PSP. n321 Importantly, none of the plaintiffs had evidence that they were in fact the subject of NSA
surveillance. n322 This was a fact that only the government knew and would not disclose. The Supreme
Court held that, without this information, the plaintiffs lacked standing to pursue their case. n323
The standing barrier created by Tatum is especially problematic given the nature of surveillance today.
Surveillance today no longer presents viable Fourth Amendment claims because so much of our most
personal information is mediated through third parties, and the third-party doctrine limits the extent of
Fourth Amendment protections. n324 While Justice Sotomayor's concurrence in United States v.
Jones provides some indication that this doctrine may be up [*132] for reconsideration by the Supreme
Court, n325 until that time, the Fourth Amendment no longer provides a powerful source of legal recourse
against the growth of surveillance authority. As a result, now, more than ever, the chilling effects doctrine
must be revived in order to provide a First Amendment backstop to the growing problem of government
surveillance.
c. Executive Privilege
As Professor Heidi Kitrosser describes, "A claim of executive privilege is generally a claim by the President of
a constitutional right to withhold information." n326 It is a claim whose authority lies not in the text of the
Constitution or of any specific law, but rather in the "notion that some information requests effectively
infringe on the President's Article II powers, threatening his ability to receive candid advice or to protect
national security." n327
Executive privilege as a means of obfuscation facilitates shadow administrative constitutionalism by
preventing judicial oversight. Professor Jack Balkin first made this claim nearly ten years ago when he argued
that, increasingly we exclude more and more executive action from judicial review on the twin grounds of
secrecy and efficiency. . . . [A]n independent judiciary plays an important role in making sure that zealous
officials do not overreach. If the executive seeks greater efficiency, this requires a corresponding duty of
greater disclosure before the fact and reporting after the fact to determine whether its surveillance programs
are targeting the right people or are being abused. n328
The courts have not taken heed to his warning.
In the wake of the disclosure of the PSP, there was one case that survived the extremely high standing bar set
in Tatum. In Al-Haramain Islamic Foundation v. Bush, an Islamic charity based in Oregon discovered that
the government inadvertently sent them classified documents demonstrating that their communications
were [*133] subject to warrantless surveillance. n329 With proof that they were in fact subject to
surveillance, Al-Haramain proceeded to court. However, the government argued that the state-secrets
privilege prevented the introduction of the classified documents and permitted the government to avoid
acknowledging the existence of the surveillance program. n330 Despite the fact that the classified information
had already been disclosed (and in seemingly direct conflict with the government's otherwise settled thirdparty doctrine), the Ninth Circuit agreed with the government's position. n331
The doctrinal barriers that prevent judicial intervention are significantly harder to overcome than the failures
that stymie intrabranch checks and balances. This is in no small part due to the doctrine of stare decisis and
the value of having binding precedent. Even judges who recognize the problems with the current system and
wish to reassert their role in determining both small-"c" and ultimately large-"C" constitutional meaning
cannot. Judge Colleen McMahon expressed her frustration with the state-secrets privilege in a court opinion,
saying, "I can find no way around the thicket of laws and precedents that effectively allow the Executive
Branch of our Government to proclaim as perfectly lawful certain actions that seem on their face
incompatible with our Constitution and laws, while keeping the reasons for its conclusion a secret." n332 As a
result, without a major shift in the doctrine, the judiciary will be limited in its ability to provide useful
oversight.
Rushin admits that judicial action alone won’t solve
Rushin, 11 --- PhD student at the University of California, Berkeley, Jurisprudence and Social Policy
Program (Fall 2011, Stephen, University of Illinois Journal of Law, Technology & Policy, “THE JUDICIAL
RESPONSE TO MASS POLICE SURVEILLANCE,” 2011 U. Ill. J.L. Tech. & Pol'y 281, Lexis,)//Mnush
VI. Conclusion Neither judicial responses nor "legislative rulemaking is ...a panacea." n376 Even
if the judiciary successfully recognizes a
remedy similar to that discussed in this Article, the legislatures must play a critical role in developing more
nuanced and specific enactments to implement this constitutional floor. The potential harms of the digitally efficient investigative
state are real. There is legitimate concern that the broad and integrated use of these technologies can create a mass
surveillance state. Central to this debate is the proper role of the judiciary in regulating policy activity. Courts have previously relied upon an
often fragile dichotomy between technologies that merely improve police efficiency and those that offer
officers a new, extrasensory ability. For the first time, the judiciary may be forced to limit the efficiency of law
enforcement technologies. Implicit in this action will be the recognition that sometimes improvements in
efficiency can be, quite simply, so efficient as to be unconstitutionally harmful. Unregulated efficiency can facilitate police
wrongdoing, discrimination, and calumniate political dissenters. Unregulated efficiency in policing technology undermines central protections and tenants of a democratic
state.
The relationship between efficiency of criminal investigations and privacy rights will be a new frontier for
the courts in the coming decades. The courts should forcefully, but prudently, protect against the unregulated
efficiency of emerging investigative and surveillance technologies. The judicial response offered in this Article
would be but one more example of the courts exercising their proper role as a limited but effective
policymakers.
Congress Overrides Courts
The courts fail – Congress can just override decisions.
Bayoumi 12 – Associate Professor of English at Brooklyn College, City University of New York, with a
Ph.D. in English and Comparative Literature from Columbia (Moustafa Bayoumi, The Nation, “Fear and
Loathing of Islam,” June 14 2012, http://www.thenation.com/article/168383/fear-and-loathing-islam, *fc)
There is a real danger that the same tools that enable today’s Islamophobia will continue to migrate
and expand with little or no public outcry. The FBI deploys a strategy of sting operations against Occupy
protesters that is eerily familiar to American Muslims, to little outrage. The president enacts a law that allows
for the indefinite detention of American citizens, and after a federal judge strikes it down as
unconstitutional, Congress rushes in two days later to try to keep it on the books. American citizens
can be assassinated by presidential decree, making a mockery of due process. Forget the Muslims. This
mission creep is as good a reason as any to pay attention to Islamophobia today—because when the ordinary
affairs of the United States include such actions, the stakes are nothing less than extraordinary.
Disadvantages
Politics Links
The reduction of domestic surveillance is extremely unpopular in congress-empirical
congressional actions and terror rhetoric
Harris, 10 --- Professor of Law, University of Pittsburgh School of Law (David, New York University
Review of Law & Social Change, “LAW ENFORCEMENT AND INTELLIGENCE GATHERING IN
MUSLIM AND IMMIGRANT COMMUNITIES AFTER 9/11,” 34 N.Y.U. Rev. L. & Soc. Change 123,
Lexis)//Jmoney
While legislation at either the federal or state level could impose judicial supervision requirements and legal
standards on the use of informants, the enactment of such legislation seems as unlikely in the current political
climate as a reversal of the Hoffa and White cases by the Supreme Court. In 2006, Congress reauthorized the
expiring provisions of the Patriot Act n219 with few changes, despite strong opposition. n220 In the
fall [*173] of 2006, Congress passed the Military Commissions Act, n221 which, among other things,
withdrew the possibility of using the writ of habeas corpus in cases arising from detention at Guantanamo
Bay, Cuba. n222 In addition, the summer of 2007 saw the enactment of legislation that provided additional
procedures for the National Security Agency to acquire foreign intelligence through a warrantless wiretapping
program. n223 The state laws regulating the use of informants, discussed above, were passed many years
ago, n224 and, in more recent years, states have leaned in the other direction, passing their own "Patriot
Acts." n225 In all, statutory restraints on the use of informants seem unlikely in
today's political climate because a political opponent could easily accuse a
legislator advocating such restraints as being soft on terrorism or handcuffing
our police and national security forces.
Plan would require massive political capital
Dalal 14 --- JD Yale Law School, BS University of Pennsylvania (Anjali S, Michigan State Law Review,
“SHADOW ADMINISTRATIVE CONSTITUTIONALISM AND THE CREATION OF
SURVEILLANCE CULTURE”, 2014 Mich. St. L. Rev. 59, Lexis)//Jmoney
The solution to a lack of congressional oversight is conceptually easy but practically difficult. It requires
Congress to pass legislation governing the FBI and regularly exercise its statutory oversight authority, both of
which require significant political capital and effort. However, the Snowden scandal may have created the
momentum necessary to motivate congressional action in this area. Senator Ron Wyden recently echoed this
sentiment while imploring his colleagues to act stating, "'If we do not seize this unique moment in out [sic]
constitutional history to reform our surveillance laws and practices we are all going to live to regret it.'" n337
Terrorism DA Links
Community mapping is crucial to counter domestic terrorism
Blumenfeld 13 – researcher with the Middle East Forum and with the U.S. Department of Justice (Teri,
Middle East Quarterly, “Denying Islam’s Role in Terror: Problems in the FBI”, Spring 2013,
http://www.meforum.org/meq/pdfs/3478.pdf, //11)
The fact that such lapses
and “failures of intelligence” continue to plague U.S. security agencies is in itself an abysmal
of Islamism as motivator in countless plots on American soil is indisputable. If
Islamic radicalization and its deadly impact continue to be overlooked in favor of privacy protection and
misconceived notions of religious freedom, and if these policies remain intact in intelligence protocols, such tragedies as the
Fort Hood massacre are likely to recur. Islamists often raise the specter of “Islamophobia” whenever any legitimate question about or
criticism of Islam is broached. But real Islamophobia stalks the corridors of Washington and other Western capitols:
The fear of upsetting Muslims of any stripe is so rampant that the security of the American citizenry
has been compromised.
failure. The continuing denial
Surveilling domestic Muslims enables us to counter the jihadist threat
Groenig 14 – reporter for One News Now, cites former FBI agent Guandolo who created and implemented
the FBI’s first Counterterrorism Training/Education Program (Chad, One News Now, “Former FBI says
only way to defeat Islam is to crush it”, 7/15/14, http://www.onenewsnow.com/nationalsecurity/2014/08/15/former-fbi-says-only-way-to-defeat-islam-is-to-crush-it, //11)
A terrorism expert says it
is time for the western world to stop political correctness and engage in an all-out effort
to crush radical Islam. John Guandolo is a former FBI agent who created and implemented the FBI's first
Counterterrorism Training/Education Program. He is co-author of Sharia - The Threat to America. Guandolo says the
western world needs to recognize that radical Islam is a threat that is not going away, and no amount of
wishing it away or talking to it or negotiating with it is going to stop it. "What stopped the Nazis was we killed and crushed
them on the field of battle,” he says. “What stopped the Communists is we did the same thing on the fields of battle in places where the Soviet
Communists were supporting actual warfare." And Guandolo says that's what's going to end the war against the jihadists. "We
need to find the
Islamic movement anywhere it is, including in the United States, and crush it and defeat it now,” he tells
OneNewsNow. “Because every month that has gone by for the last thirteen years they get stronger, better organized, better funded and more militarily
capable."
State Secrets Good DA
1nc State Secrets Privilege DA
State secrets privilege is good --- protects against lawsuits that would challenge
drone police
Rosen 11 --- Professor of Law and Director (Richard D, Center for Military Law and Policy, Texas Tech
University School of Law, “PART III: ARTICLE: DRONES AND THE U.S. COURTS”, 2011, 37 Wm.
Mitchell L. Rev. 5280, lexis)//Mnush
V. State Secrets: The Death Knell of Drone Cases
Assuming a complaint survives the jurisdictional, justiciability, immunity, and other hurdles to lawsuits
challenging U.S. drone policy, the state secrets doctrine is likely to bring the suit to a quick end. n93 Under
the doctrine, the United States may prevent the disclosure of information in judicial proceedings if there is a
reasonable danger of revealing military or state secrets. n94 Once the privilege is properly invoked and a court
is satisfied that release would pose a reasonable danger to secrets of state, "even the most compelling
necessity cannot overcome the claim of privilege." n95
Not only will the state secrets doctrine thwart plaintiffs from acquiring or introducing evidence vital to their
case, n96 it could result in dismissal of the cases themselves. Under the doctrine, the courts will dismiss a case
either because the very subject of the case involves state secrets, n97 or a case cannot proceed without the
privileged evidence or presents an unnecessary risk of revealing [*5293] protected secrets. n98 Employing
drones as a weapons platform against terrorists and insurgents in an ongoing armed conflict implicates both
the nation's military tactics and strategy as well as its delicate relations with friendly nations. n99 As such,
lawsuits challenging the policy cannot be tried without access to and the possible disclosure of
highly classified information relating to the means, methods, and circumstances under which drones
are employed.
Lawsuits will release vital intelligence about drones – that undermines tech
leadership
Murphy and Radsan 9 --- AT&T Prof. of Law @ Texas Tech University, Professor @ William Mitchell
College of Law (Richard and Afsheen, “ARTICLE: DUE PROCESS AND TARGETED KILLING OF
TERRORISTS”, November, 32 Cardozo L. Rev. 405, lexis)//Mnush
In defense of this anomaly, there are obvious policy reasons for not allowing Bivens-style claims against
American officials for targeted killings wherever they occur in the world. Among them, we do not want
federal courts damaging national security through excessive, misdirected second-guessing of executive
judgments; nor do we want [*442] the litigation process to reveal information that national security
requires to be kept secret. In Arar v. Ashcroft, a divided panel of the Second Circuit cited these "special
factors" to disallow a plaintiff from bringing a Bivens claim against officials he alleged subjected him to
extraordinary rendition. n209
But as the dissenting judge in Arar noted, these special factors lose much of their force once one
acknowledges that a Bivens-style action needs to overcome formidable hurdles of fact and law. n210 As to
practical hurdles, most people left alive by a Predator strike or other targeted killing would not turn to
American courts for relief. Some would not sue because they are, in fact, the enemy - Osama bin Laden is not
going to hire an American lawyer. n211 Others would not sue because doing so is beyond their means - a
villager from the mountains of Afghanistan is not likely to hire an American lawyer either.
As to legal hurdles, Boumediene itself poses a high one to lawsuits by non-U.S. citizens for overseas attacks.
Here we may seem to contradict our earlier insistence that Boumediene presupposes some form of
constitutional protection worldwide for everyone. n212 Yet Boumediene shows that the requirement of
judicial process depends on a pragmatic analysis. n213 As part of its balancing, Boumediene made clear that
courts should favor the interests of American citizens and of others with strong connections to the United
States. n214 Although the Boumediene petitioners lacked the preference in favor of citizens, they persuaded a
slim majority of the Court to extend constitutional habeas to non-resident aliens detained at Guantanamo.
This result, however, took place under exceptional circumstances: among them, Guantanamo is de facto
United States territory; n215 the executive had held detainees [*443] there for years and claimed authority to
do so indefinitely; and the Supreme Court doubted the fairness and accuracy of the CSRTs. n216 Absent such
circumstances, Boumediene leaves courts to follow their habit of deferring to the executive on national
security. For targeted killing, that may mean cutting off non-citizens from American courts.
The state-secrets privilege poses another barrier to Bivens-style actions. This privilege allows the government
to block the disclosure of information in court that would damage national security. n217 It could prevent a
case from proceeding in any number of ways. For instance, the government could block plaintiffs from
accessing or using information needed to determine whether a Predator attack had a sound basis through
human or technical sources of intelligence. n218 By this trump card, the government could prevent litigation
from seriously compromising intelligence sources and methods. n219
In addition, the doctrine of qualified immunity requires dismissal of actions against officials if a court
determines they reasonably believed they were acting within the scope of their legal authority. n220
Defendants would satisfy this requirement so long as they reasonably [*444] claimed they had authority
under the laws of war (assuming their applicability). These standards are hazy, and a court applying them
would tend to defer to the executive on matters of military judgment. n221
In view of so many practical and legal hurdles, some courts and commentators might be inclined to
categorically reject all Bivens-style challenges to targeted killings. In essence, they might view lawsuits related
to targeted killing as a political question left to the executive. n222 This view parallels Justice Thomas's that
courts should not second-guess executive judgments as to who is an enemy combatant. n223 Contrary to
Justice Thomas's view, the potency of the government's threshold defenses means that targeted-killing cases
that make it to the merits would likely involve the most egregious conduct - for example, killing an unarmed
Jose Padilla at O'Hare Airport on a shoot-to-kill order. For these egregious cases, a judicial check on
executive authority is most necessary.
In terms of a Mathews balancing, the question becomes whether the benefits of Bivens actions on targeted
killings of terrorists outweigh the harms. The potential harm is to the CIA's sources and methods on the
Predator program. Lawsuits might harm national security by forcing the disclosure of sensitive information.
The states-secrets privilege should block this result, however. Lawsuits might also harm national security by
causing executive officials to become risk-averse about actions needed to counter terrorist activities. Qualified
immunity, however, should ensure that liability exists only where an official lacks any justification for his
action. On the benefit side, allowing lawsuits to proceed would, in truly exceptional cases, serve the private
interest of the plaintiff in seeking compensation and, perhaps more to the point given the incommensurability
of death and money, would provide accountability. Still more important, all people have an interest in casting
light on the government's use of the power to kill in a world-wide war in which combatants and targets are
not easily identified.
Unmanned vehicle tech leadership is key to naval power all around the world
Berkowitz ’14 --- independent national security and intelligence analyst and author (Bruce, “Sea Power in the
Robotic Age,” Issues in Science and Technology, winter 2014, http://issues.org/30-2/bruce-2/)//Mnush
Note* - UMS = unmanned maritime system
The U.S. Navy’s recent interest in UMSs is partly tied to the “strategic pivot.” Officials believe that U.S.
military forces will more likely be used in the Pacific and Indian Oceans, rather than in Central Asia, the
Middle East, and Europe. This presents the Navy with new challenges.
One is distance. Operating in Asia takes personnel further from home, stretches logistics, demands greater
operating range from ships, and so on. Also, potential hot spots in Asia are highly dispersed. Looking north
to south, they include the resource-rich Arctic (Russia is making new territorial claims); Korea (Pyongyang,
along with its traditional invasion, submarine, and artillery threat to South Korea, has added a nuclear missile
threat to nations throughout the region); the perennial Taiwan Strait flashpoint; ocean claims by China against
Japan, the Philippines, and Vietnam; military and pirate threats to Indian Ocean sea lanes; and so on. The
result is greater demand for a U.S. presence over a much larger, more distant area.
As the saying goes, even the best warship cannot be in two places at the same time. But under current plans
the Navy will shrink, not grow. The five-year budget the Navy proposed to Congress in 2013 cut $58
billion from its FY 2012-13 proposal. Current plans will leave the Navy’s budget essentially flat at $152-156
billion annually through FY 2018-19. Few experts believe the Navy will top 300 surface ships during the next
decade; some think it may have fewer than 250. By comparison, at the Cold War’s end it had almost 560
ships.
Sea-based robots cannot fill the gap completely, but they can fill important missions and add new capabilities
to confound potential adversaries. Some scenarios discussed include:
• Counter-mine warfare. Mines are a particular concern for the Strait of Hormuz and Strait of Malacca. As
noted, mine clearing has been a primary mission of UMSs. Robotic systems can often clear a larger area faster
and usually more safely than older methods. Countermine UMSs could be kept on station in such hotspots
and also to serve as a deterrent.
• Anti-submarine warfare. Countries such as Iran and China are deploying new submarines that many
Western analysts believe could threaten maritime trade or prevent the United States from delivering supplies
and reinforcements to its regional allies in wartime. UMSs could assume part of the mission of detecting,
tracking, and following them, partly offsetting the Navy’s shrinking submarine fleet.
• Information operations. Because UUSs are usually quieter than submarines, it is straightforward to equip
them to mimic the sounds of their manned counterparts. Again, this capability could help as the U.S.
submarine force is stretched thin. Such “spoofing” complicates targeting for an adversary in wartime, and its
ability to develop reliable signatures and databases of U.S. forces before a conflict begins.
• Strike warfare and area denial. It would be possible to adapt short- and medium-range precision-guided
missiles to UMSs, just as missiles were added to unmanned aerial vehicles (UAVs) such as Predator and
Reaper. In one scenario, the Navy could position armed UUSs close to a potential hotspot such as North
Korea or the Taiwan Strait. During a crisis some might be surfaced as a “show of force,” and then the
weapons would be concealed to serve as a deterrent. UUSs could also attack enemy ships in port or en route.
They could provide greater endurance than manned vessels for remaining on station, and greater ability than
traditional torpedoes or mines to adapt to changing conditions.
•Infiltration and payload emplacement. Prior to amphibious operations in World War II, Navy frogman
surveyed approaches, emplaced demolitions to destroy enemy defenses, and planted navigation beacons to
guide forces to their targets. SEALs perform similar activities today. UMSs could allow them to work from a
greater distance.
• Infrastructure inspection and servicing. The Navy maintains an extensive underwater infrastructure for
command, control, and communications. UMSs could be used to maintain this infrastructure, much as the oil
exploration industry uses them today to service offshore rigs.
• Harbor policing. The Navy has performed this function in operations overseas and as part of its
force protection responsibilities at home. They could use UMSs to detect intruders and inspect
vessels, as could the Coast Guard, Customs and Border Protection, and local police.
• Ad-hoc sensor and communication networks. Today when U.S. forces go to war, one of their first tasks is
to establish “tactical intranets” to move information among units. UMSs offer a means to establish such
networks quickly in a combat zone offshore or at sea, using a combination of radio frequency, acoustic, and
pre-laid fiber optic links.
• Environmental monitoring and oceanography. UMSs can be used to determine conditions in littorals just
before a military operation and collect information on ocean conditions for long-term planning and research.
Naval power puts a cap on conflict and solves every impact
NLUS, 12 – a nonprofit organization dedicated to educating our citizens about the importance of sea power
to U.S. national security and supporting the men and women of the U.S. Navy, Marine Corps, Coast Guard
and U.S.-flag Merchant Marine and their families (Navy League of the United States, “Maritime Primacy &
Economic Prosperity: Maritime Policy 2012-13”, Navy League of the United States, 1/21/2012,
http://www.navyleague.org/files/legislative_affairs/maritime_policy20122013.pdf)
Global engagement is critical to the U.S. economy, world trade and the protection of democratic freedoms that so many take for granted. The
guarantors of these vital elements are hulls in the water , embarked forward amphibious forces and aircraft overhead . The
Navy League of the United States’ Maritime Policy for 2012-13 provides recommendations for strategy, policy and the allocation of national resources
terrorism,
political and economic turmoil, extremism, conflicts over environmental resources, manmade and natural
disasters — and potential flash points exist around the globe. It is the persistent forward presence and
engagement of maritime forces that keep these flash points in check, prevent conflict and crisis
escalation , and allow the smooth flow of goods in a global economy. The United States has fought multiple wars and sacrificed much to ensure
in support of our sea services and essential to the successful execution of their core missions. We live in a time of complex challenges —
un challenged access to sea lanes and secure the global commerce upon which the U.S. economy depends. The “persistent naval presence” provided by
our forward-deployed
Navy and Marine Corps ships, aircraft, Sailors and Marines is the guarantor of that hard-won maritime
security and the critical deterrent against those who might seek to undermine that security. Maintaining naval forces that
can sustain our national commitment to global maritime security and dissuade transnational aggression in the future must be a national imperative.
2nc Links
The privilege applies to drones
Sinnar 13 --- Assistant Professor of Law at Stanford (Shirin, “Protecting Rights from Within? Inspectors
General and National Security Oversight”, May, 65 Stan. L. Rev. 1027, lexis)//Mnush
More than a decade after September 11, 2001, the debate over which institutions of government are best
suited to resolve competing liberty and national security concerns continues unabated. While the Bush
Administration's unilateralism in detaining suspected terrorists and authorizing secret surveillance initially
raised separation of powers concerns, the Obama Administration's aggressive use of drone strikes to target
suspected terrorists, with little oversight, demonstrates how salient these questions remain. Congress
frequently lacks the [*1029] information or incentive to oversee executive national security actions that
implicate individual rights. Meanwhile, courts often decline to review counterterrorism practices
challenged as violations of constitutional rights out of concern for state secrets or institutional
competence. n1 These limitations on traditional external checks on the executive - Congress and the courts have led to increased academic interest in potential checks within the executive branch. Many legal scholars
have argued that executive branch institutions supply, or ought to supply, an alternative constraint on
executive national security power. Some argue that these institutions have comparative advantages over
courts or Congress in addressing rights concerns; others characterize them as a second-best option
necessitated by congressional enfeeblement and judicial abdication.
Empirics prove – state secrets have hidden the drone program
Bazzle 12 --- J.D. Georgetown University Law Center (Tom, “Shutting the Courthouse Doors: Invoking the
State Secrets Privilege to Thwart Judicial Review in the Age of Terror”, 2012, 23 Geo. Mason U. Civ. Rts. L.J.
29, lexis)//Mnush
C. A New Frontier: The Obama Administration's Invocation of State Secrets to Prevent Judicial Oversight of
Its Plan to Target and Kill Anwar al-Aulaqi The American-born Yemeni cleric Anwar al-Aulaqi was perhaps
the most notorious member of the Obama Administration's controversial "targeted killing" list, n171 a
classified but widely-known-to-exist list of alleged terrorists identified by intelligence agencies for targeted
killing by U.S. forces and the government's growing arsenal of unmanned drones. n172 As a propagandist of
the Al Qaeda in the Arabian Peninsula (AQAP), al-Aulaqi's incendiary statements and alleged involvement in
recently foiled terrorist plots n173 led the Obama Administration to conclude that he posed such a sufficient
threat to U.S. security to justify the unprecedented step of targeting him for capture or killing. n174 Despite
outcries from across the political spectrum [*56] that targeting a U.S. citizen for assassination without first
charging him and convicting him of a crime amounted to an unconscionable violation of due process rights,
n175 the Obama Administration continued undeterred in its search for al-Aulaqi. This pursuit ended on
September 30, 2011, when an American drone strike in Yemen killed al-Aulaqi and several others, including
an American citizen of Pakistani origin that had edited Al Qaeda's online jihadist magazine. n176 Prior to alAulaqi's killing, his father, Nasser al-Aulaqi - represented by the ACLU and Center for Constitutional Rights
(CCR) - filed a claim in the District Court for the District of Columbia to enjoin his assassination, and in
response, the Obama Administration invoked the state secrets privilege. n177 Al-Aulaqi charged that the
authority contemplated by the Obama Administration is far broader than what the Constitution and
international law allow. n178 According to al-Aulaqi, outside of armed conflict, both the Constitution and
international law prohibit targeted killing except as a last resort to protect against concrete, specific, and
imminent threats of death or serious physical injury. n179 Al-Aulaqi further argued that an extrajudicial
policy, under which names are added to CIA and military "kill lists" for a period of months, through a secret
executive process, is plainly limited to imminent threats. n180
Revealing secrets could threaten national security
Conan and Abramson ’06 --- Host and Reporter (Neil and Larry, “Invoking the State Secrets Privilege,”
npr, June 19, 2006, http://www.npr.org/templates/story/story.php?storyId=5495919)//Mnush
ABRAMSON: Right and - but let's give the government their due. If you are asked to disclose how you
target members of a terrorist group in order to allow litigation to go forward, you're basically giving away
the keys to the store. You're telling people how to avoid surveillance. And the same thing goes for some
of these employment discrimination cases. They did possibly threaten a lot of sensitive information that
would have jeopardized, perhaps, the lives of people working undercover.
So it's very difficult for them - for the government to explain in public why they're trying to keep something
secret, because, you know, it's a secret. And that's the nature of it, and they can't jeopardize somebody's life in
order to allow a civil proceeding to go ahead.
Government keeps secrets to maintain national security
Wencker ’13 --- attorney representing local and small governments (Chris, “Why does the government keep
secrets from us?” Law Office of Christopher Wencker P.L.C, http://www.wenckerlaw.com/governmentalperspective-blog/why-does-the-government-keep-secrets-from-us)//Mnush
The ongoing saga of Edward Snowden and his legal troubles in the wake of his disclosure of classified information has generated lively
discussion about the role of government surveillance in creating security for our society. Many people are debating whether or
not the government should be keeping secrets about its surveillance activities. I recently heard an interview on the radio in which the guest explained that, in his opinion, secret
security systems were ineffective, because they are not improved by being subjected to scrutiny and constant testing. While this may be a valid point
for computer firewalls and the like, I think this misunderstands the justification for government secrecy
in some programs. The purpose of keeping information from general dissemination is -- or at least
should be -- to prevent the information from benefiting those who would do harm to society. For example, if
the police are aware that organized criminals are using a particular location to discuss their murder plans, and they can plant a
listening device in that location, allowing the general public to know about the device will defeat its purpose.
The criminals will simply find another, more private, location to hatch their plan. In situations such as this, secrecy is key. Secrecy is a problem, on the other
hand, when it is used to prevent the public from uncovering illegal activity. Unfortunately, many people
assume that information is kept secret for the latter reason, when in actuality it is for the former. Please keep this in
mind when seeking information from the government. For the most part, the people working in these areas are genuinely motivated by a desire to help their fellow citizens, by stopping those who
They generally have no interest in your personal discussions
about what to make for dinner, and would rather focus on discussions about criminal activity. If you request
documents about a particular government program and are denied because the information is classified, do
not assume that the program is targeting you.
would seek to harm us. This includes most police officers and intelligence professionals.
Unmanned Vehicle Tech Leadership Key to Naval Power
Unmanned vehicle tech leadership is key to naval power
Landay et al. 4 (William E. Landay III – RDML (Rear Admiral), USN, Concurring with the following:
Michael A. LeFever, RDML, USN Raymond A. Spicer, RDML, USN Roseanne M. Levitre, RDML, USN
Steven J. Toma szeski, RADM, USN, Oceanographer of the Navy, Approved by Joseph A. Walsh and Roger
M. Smith of US Navy, “The Navy Unmanned Undersea Vehicle (UUV) Master Plan”, 11/9,
http://www.navy.mil/navydata/technology/uuvmp.pdf)
The Vision for UUVs and the Objective of the UUV Master Plan Today our naval forces enjoy maritime superiority
around the world and find themselves at a strategic inflection point during which future capabilities must be
pondered with creativity and innovation . Change must be embraced and made an ally in order to take
advantage of emerging technologies, concepts, and doctrine; thereby preserving the nation’s global leadership. Sea
Power 21 has additionally specified unmanned vehicles as force multipliers and risk reduction agents for the
Navy of the future. Transformation applies to what we buy as well as how we buy and operate it–all while competing with other shifting national
investment priorities. The growing use of unmanned systems– air, surface, ground, and underwater is continually
demonstrating new possibilities. While admittedly futuristic in vision , one can conceive of scenarios where UUVs sense,
track, identify, target, and destroy an enemy–all autonomously and tie in with the full net-centric battlespace. UUV systems will
provide a key undersea component f o r FORCEnet, contributing to an integrated picture of the battlespace. Even though today’s
planners, operators, and technologists cannot accurately forecast the key applications for U UVs in the year 2050, this plan provides a roadmap to
move toward that vision. Pursuit
of this plan’s updated recommendations beginning in the year 2004, will place increasingly large
numbers of UUVs in the hands of warfighters. Thus, xvii UUV Master Plan UUVs can begin addressing near-term needs while im
proving understanding of mid- to far-term possibilities. Even the most futuristic applications can evolve in a confident, cost-effective manner. This
confidence is based on several factor s: the Sea Power 21 Sub-Pillar capabilities identified he readdress a broad ran g e of user needs; critical
technologies are identified that will enable tomorrow’s more complex applications; and key principles and best practices are
recommended that p r o v ide for a logical, flexible, and affordable development effort.
Navy Prevents Great Power War
Strong navy is key to prevent great power – deterrence
Eaglen 11 (Mackenzie, Heritage Foundation Research Fellow for National Security Studies, Allison Center
for Foreign Policy Studies, May, 16, 2011, “Thinking about a Day without Sea Power: Implications for U.S.
Defense Policy”, http://www.heritage.org/research/reports/2011/05/thinking-about-a-day-without-seapower-implications-for-us-defense-policy)
Under a scenario of dramatically reduced naval power, the United States would cease to be active in any international
alliances. While it is reasonable to assume that land and air forces would be similarly reduced in this scenario, the lack of credible maritime capability to move their bulk
and establish forward bases would render these forces irrelevant, even if the Army and Air Force were retained at today’s
levels. In Iraq and Afghanistan today, 90 percent of material arrives by sea, although material bound for Afghanistan must then make a laborious journey by land into theater. China’s
claims on the South China Sea, previously disputed by virtually all nations in the region and routinely contested by U.S. and partner naval forces, are accepted as a fait
accompli, effectively turning the region into a “Chinese lake.” China establishes expansive oil and gas exploration with new deepwater drilling technology and secures its
local sea lanes from intervention. Korea, unified in 2017 after the implosion of the North, signs a mutual defense treaty with China and solidifies
their relationship. Japan is increasingly isolated and in 2020–2025 executes long-rumored plans to create an indigenous nuclear weapons
capability.[11] By 2025, Japan has 25 mobile nuclear-armed missiles ostensibly targeting China, toward which Japan’s historical animus remains strong. China’s entente
with Russia leaves the Eurasian landmass dominated by Russia looking west and China looking east and south. Each cedes a
sphere of dominance to the other and remains largely unconcerned with the events in the other’s sphere. Worldwide, trade in foodstuffs collapses. Expanding
populations in the Middle East increase pressure on their governments, which are already stressed as the breakdown in world trade
disproportionately affects food importers. Piracy increases worldwide, driving food transportation costs even higher. In the Arctic, Russia
aggressively asserts its dominance and effectively shoulders out other nations with legitimate claims to seabed resources. No naval power
exists to counter Russia’s claims. India, recognizing that its previous role as a balancer to China has lost relevance with the retrenchment of the Americans, agrees
to supplement Chinese naval power in the Indian Ocean and Persian Gulf to protect the flow of oil to Southeast Asia. In exchange, China agrees to
exercise increased influence on its client state Pakistan. The great typhoon of 2023 strikes Bangladesh, killing 23,000 people initially, and 200,000 more die in the
subsequent weeks and months as the international community provides little humanitarian relief. Cholera and malaria are epidemic. Iran dominates the Persian Gulf and is a
nuclear power. Its navy aggressively patrols the Gulf while the Revolutionary Guard Navy harasses shipping and oil infrastructure to force Gulf Cooperation Council (GCC) countries into Tehran’s
orbit.
Russia supplies Iran with a steady flow of military technology and nuclear industry expertise. Lacking a regional threat, the Iranians happily control the flow of
oil from the Gulf and benefit economically from the “protection” provided to other GCC nations. In Egypt, the decade-long experiment in participatory democracy ends with the ascendance of the
Muslim Brotherhood in a violent seizure of power. The United States is identified closely with the previous coalition government, and riots break out at the U.S. embassy. Americans in Egypt are left to
Led by Iran, a
coalition of Egypt, Syria, Jordan, and Iraq attacks Israel. Over 300,000 die in six months of fighting that includes a limited nuclear exchange between Iran and Israel. Israel is
their own devices because the U.S. has no forces in the Mediterranean capable of performing a noncombatant evacuation when the government closes major airports.
defeated, and the State of Palestine is declared in its place. Massive “refugee” camps are created to house the internally displaced Israelis, but a humanitarian nightmare ensues from the inability of
The NATO alliance is shattered. The security of European nations depends increasingly on the
lack of external threats and the nuclear capability of France, Britain, and Germany, which overcame its reticence to military capability
conquering forces to support them.
in light of America’s retrenchment. Europe depends for its energy security on Russia and Iran, which control the main supply lines and sources of oil and gas to Europe. Major European nations stand
down their militaries and instead make limited contributions to a new EU military constabulary force. No European nation maintains the ability to conduct significant out-of-area operations, and
Europe as a whole maintains little airlift capacity.
Strong navy key to allied response- creates a super-deterrent
Lyons, 13 -- retired Navy admiral
[James, commander in chief of the U.S. Pacific Fleet and senior U.S. military representative to the United
Nations, "Where are the carriers?" Washington Times, 1-15-13, l/n, accessed 1-22-13]
To keep pressure on and raise the level of deterrence, movement of naval forces, particularly carrier strike groups,
must remain unpredictable. In a deteriorating crisis situation, our Navy gains maximum impact by moving the
carrier strike group into the crisis area. That sends a special signal of our intent to respond to our potential
enemies and to our allies as well. Such a signal has a telling effect on our regional allies and encourages them to employ
their air force and naval assets in a coordinated manner, which certainly should raise the deterrent
equation .
Naval Power Key to the Economy
Naval power collapse kills the economy and trade
Eaglen 11 (Mackenzie, Heritage Foundation Research Fellow for National Security Studies, Allison Center
for Foreign Policy Studies, May, 16, 2011, “Thinking about a Day without Sea Power: Implications for U.S.
Defense Policy”, http://www.heritage.org/research/reports/2011/05/thinking-about-a-day-without-seapower-implications-for-us-defense-policy, 2/16/13, atl)
If the United States slashed its Navy and ended its mission as a guarantor of the free flow of transoceanic goods and
trade, globalized world trade would decrease substantially. As early as 1890, noted U.S. naval officer and historian Alfred Thayer Mahan described the world’s
oceans as a “great highway…a wide common,” underscoring the long-running importance of the seas to trade.[12] Geographically organized trading blocs develop as the maritime highways suffer from
Asia prospers thanks to internal trade and Middle Eastern oil, Europe muddles along on the largesse of Russia and Iran, and the Western
Hemisphere declines to a “new normal” with the exception of energy-independent Brazil. For America, Venezuelan oil grows in importance as other supplies
decline. Mexico runs out of oil—as predicted—when it fails to take advantage of Western oil technology and investment. Nigerian output, which for five years had been
secured through a partnership of the U.S. Navy and Nigerian maritime forces, is decimated by the bloody civil war of 2021. Canadian exports, which a decade earlier had been
insecurity and rising fuel prices.
strong as a result of the oil shale industry, decline as a result of environmental concerns in Canada and elsewhere about the “fracking” (hydraulic fracturing) process used to free oil from shale. State and
hazards to seaborne shipping, which are compounded by the necessity of traversing key
chokepoints that are easily targeted by those who wish to restrict trade. These chokepoints include the Strait of Hormuz, which Iran could quickly
close to trade if it wishes. More than half of the world’s oil is transported by sea. “From 1970 to 2006, the amount of goods transported via the oceans of the world…increased from 2.6 billion tons
non-state actors increase the
to 7.4 billion tons, an increase of over 284%.”[13] In 2010, “$40 billion dollars [sic] worth of oil passes through the world’s geographic ‘chokepoints’ on a daily basis…not to mention $3.2
These quantities of goods simply cannot be moved by any other
means. Thus, a reduction of sea trade reduces overall international trade. U.S. consumers face a greatly
diminished selection of goods because domestic production largely disappeared in the decades before the global depression. As countries increasingly focus on regional rather
than global trade, costs rise and Americans are forced to accept a much lower standard of living. Some domestic manufacturing
improves, but at significant cost. In addition, shippers avoid U.S. ports due to the onerous container inspection regime implemented after investigators discover that the
second dirty bomb was smuggled into the U.S. in a shipping container on an innocuous Panamanian-flagged freighter. As a result, American
consumers bear higher shipping costs. The market also constrains the variety of goods available to the U.S. consumer and increases their cost. A Congressional Budget
trillion…annually in commerce that moves underwater on transoceanic cables.”[14]
Office (CBO) report makes this abundantly clear. A one-week shutdown of the Los Angeles and Long Beach ports would lead to production losses of $65 million to $150 million (in 2006 dollars) per
employment
would shrink by approximately 1 million jobs.[15] These estimates demonstrate the effects of closing only the Los Angeles and Long
Beach ports. On a national scale, such a shutdown would be catastrophic. The Government Accountability Office notes that: [O]ver 95
percent of U.S. international trade is transported by water[;] thus, the safety and economic security of the United States depends in large
part on the secure use of the world’s seaports and waterways. A successful attack on a major seaport could potentially result in a dramatic slowdown in the
international supply chain with impacts in the billions of dollars.[16] As of 2008, “ U.S. ports move 99 percent of the nation’s overseas cargo, handle
day. A three-year closure would cost $45 billion to $70 billion per year ($125 million to $200 million per day). Perhaps even more shocking, the simulation estimated that
more than 2.5 billion tons of trade annually, and move $5.5 billion worth of goods in and out every day.” Further, “approximately 95 percent of U.S. military forces and supplies that are sent overseas,
including those for Operations Iraqi Freedom and Enduring Freedom, pass through U.S. ports.”[17]
Naval power key to the global economy
Conway, Roughead, and Allen, 07- *General of U.S. Marine Corps and Commandant of the Marine
Corps, **Admiral of U.S. Navy and Chief of Naval Operations, ***Admiral of U.S. Coast Guard and
Commandant of the Coast Guard (*James Conway, **Gary Roughead, ***Thad Allen, "A Cooperative
Strategy for 21st Century Seapower", Department of the Navy, United States Marine Corps, United States
Coast Guard, http://www.navy.mil/maritime/MaritimeStrategy.pdf, KONTOPOULOS)
The world economy is tightly interconnected. Over the past four decades, total sea borne trade has more than
quadrupled: 90% of world trade and two-thirds of its petroleum are transported by sea. The sea-lanes and
supporting shore infrastructure are the lifelines of the modern global economy, visible and vulnerable
symbols of the modern distribution system that relies on free transit through increasingly urbanized littoral
regions. Expansion of the global system has increased the prosperity of many nations. Yet their continued growth may create increasing
competition for resources and capital with other economic powers, transnational corporations and international organizations.
Heightened
popular expectations and increased competition for resources, coupled with scarcity, may encourage nations
to exert wider claims of sovereignty over greater expanses of ocean, waterways, and natural resources—
potentially resulting in conflict.
Secrecy Key to U.S. Nuclear Deterrent
Secrecy is key to the US nuclear deterrent
Green 97 (Tracey – Associate with McNair Law Firm, J.D. – University of South Carolina, “Providing for
the Common Defense versus Promoting the General Welfare: the Conflicts Between National Security and
National Environmental Policy”, South Carolina Environmental Law Journal, Fall, 6 S.C Envtl. L.J. 137,
lexis)
The deployment of nuclear weapons, however, is a DoD action for which secrecy is crucial and, thus, is
classified by Executive Order. n59 According to the American policy of deterrence through mutually assured destruction (MAD),
nuclear weapons are essential to an effective deterrent. n60 If DoD disclosed the location of these weapons,
disclosure would reduce or destroy the deterrent. An adversary could destroy all nuclear weapons with an
initial strike, leaving the country exposed to nuclear terror. n61 Additionally, terrorists would know where to strike
to obtain material for nuclear blackmail. In short, secrecy regarding nuclear weapons has enormous
implications for national security. While the armed services must consider the environmental effects of maintaining nuclear
weapons, they cannot release any information regarding the storage of these weapons.
Escalates to global nuclear war
Caves 10 (John P. Jr., Senior Research Fellow in the Center for the Study of Weapons of Mass Destruction –
National Defense University, “Avoiding a Crisis of Confidence in the U.S. Nuclear Deterrent”, Strategic
Forum, No. 252, http://www.ndu.edu/inss/docUploaded/SF%20252_John%20Caves.pdf)
Perceptions of a compromised U.S. nuclear deterrent as described above would have profound policy
implications, particularly if they emerge at a time when a nuclear-armed great power is pursuing a more
aggressive strategy toward U.S. allies and partners in its region in a bid to enhance its regional and global
clout.
A dangerous period of vulnerability would open for the United States and those nations that depend on U.S.
protection while the United States attempted to rectify the problems with its nuclear forces. As it would take
more than a decade for the United States to produce new nuclear weapons, ensuing events could preclude a
return to anything like the status quo ante.
■
The assertive, nuclear-armed great power, and other major adversaries, could be willing to challenge U.S.
interests more directly in the expectation that the United States would be less prepared to threaten or deliver
a military response that could lead to direct conflict. They will want to keep the United States from reclaiming
its earlier power position.
■
Allies and partners who have relied upon explicit or implicit assurances of U.S. nuclear protection as a
foundation of their security could lose faith in those assurances. They could compensate by accommodating
U.S. rivals, especially in the short term, or acquiring their own nuclear deterrents, which in most cases could
be accomplished only over the mid- to long term. A more nuclear world would likely ensue over a period of
years.
■
Important U.S. interests could be compromised or abandoned, or a major war could occur as adversaries
and/or the United States miscalculate new boundaries of deterrence and provocation. At worst, war could
lead to state-on-state employment of weapons of mass destruction (WMD) on a scale far more
catastrophic than what nuclear-armed terrorists alone could inflict.
■
Kritiks – Top Level
CVE / Terrorism Links
Conceptions of the radicalization of Islam ignores the complexity of violence and
posits an ethnicity as coterminous with terrorist. Counter-radicalization strategies
skew our perceptions of Islam by exaggerating the threat of terror
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11 and gingE)
B. Radicalization, Counterradicalization, and National Security n183 Like broken windows theory, radicalization theory has been highly contested and
yet broadly influential in shaping contemporary policing. While U.S. government accounts take for granted a problem with radicalization that warrants
government intervention, the literatures of governments, academics, experts, and civil society stakeholders around the world express profound
disagreement over the meaning of radicalization, and the nature and extent of threat embodied by Muslims. n184 Radicalization
discourse
purports to predict future terrorism, drawing from studies of prior terrorist acts to identify trends and details
that will aid in identifying future terrorists. In so doing, radicalization redefines and expands the legitimate
scope of government concern from terrorism - a question of political violence, of crime, even of war crime - to radicalization - a
question of religious and political cultures and beliefs. Before moving further into the problems inherent in overlaying radicalization theory onto
community engagement, it is worth exploring the similarities and differences between the work of radicalization theory and broken windows theory.
The primary similarities are threefold. First, both
radicalization and broken windows are preventative theories of crime
control, calling for prophylactic state action against noncriminal behavior. Second, while both theories
appear concerned with disorder or radicalization in the abstract, their practical effect is to bring
considerable scrutiny to communities already marginalized by virtue of race and religion. As a practical
matter, broken windows theory foregrounds race and inequality as instigators or signs of disorder. n185 Counterradicalization and CVE, in practice
and in theory, are almost exclusively focused on Muslims. n186 Moreover, when manifest in community policing and community engagement
approaches, the
theories work to cultivate partnerships with community members in order to increase the
legitimacy and reach of law enforcement into the subject communities. Third, in addition to shaping community
policing/engagement [*877] approaches, both theories have had great influence on the broader field of policing tactics in
the relevant communities (and beyond). There are at least two important differences. In terms of (contested) causal claims, broken
windows theory focuses on physical signs of disorder as signals of deteriorating social order, whereas radicalization emphasizes
ideological currents of disorder as motivators for acts of terrorism. Radicalization's concern is predicated
on a false belief in the teleological character of Islam - that if Muslims communities witness conservative religious practice
and critical politics, they will view such currents as acceptable and gravitate toward radicalism, thereby producing more terrorists. Second, the theories
arguably have propelled different types of police action. Whereas broken
windows theory leads to aggressive enforcement
against misdemeanor and minor crimes, counterradicalization produces increased surveillance. n187 This distinction
has its limits, since broken windows policing serves an intelligence-gathering function, and counter-radicalization shapes prosecutorial
priorities. But while both theories expand the role of the state and the blueprint of policing, their mechanics are distinct.
To be clear, I'm less concerned with anaologies between the causal mechanics of the theories, and more concerned with how the theories construct the
categories of the disorderly and the radical, and the implications those constructions have for policing and the subject communities. 1. Blurring Dissent
and Difference With Violence Even aside from the disproportionate focus on politically motivated violence by Muslims in terrorism studies, there
are key definitional problems with radicalization discourse. Most fundamentally, the terms radicalization
and extremism are used sloppily and with unclear meaning, with a causal connection assumed between
radical ideas and committing acts of terrorism. n188 [*878] Empirical research "has emphatically and repeatedly concluded" that there
is no single terrorist profile and no obvious markers for the process by which someone becomes a terrorist. n189 The process by which
people embrace violence is not linear but complex. n190 Importantly, studies of so-called homegrown terrorism also reject the ideas
that Islam and terrorism are linked, or that observing the Muslim faith constitutes a step toward violence. n191 Nor is there data to suggest
that Muslims are becoming more radical in their views, let alone more violent. n192 National security
prosecutions in the headlines provide a skewed sense of the threat; the vast majority of those prosecutions do
not charge defendants with any violent crime, or with any intent to commit violent crime, but instead with
material support for terrorism - a very broad concept typically far removed from violence. n193 Despite their continued hold
on law enforcement, the NYPD and FBI reports are transparent paper tigers - now deconstructed many
times over. n194 The stages and factors of radicalization are internally inconsistent and vague enough to
justify surveillance of any person who identifies as Muslim, or is linked with Muslim religious or political
community. Consider, for example, that the NYPD [*879] report marks as "radicalization incubators" "cafes, cab driver hangouts, flophouses,
prisons, student associations, nongovernmental organizations, hookah (water pipe) bars, butcher shops and book stores": mostly locations where
Muslims or those from Muslim-majority countries are likely to spend their time, whether for religious, political, or sentimental reasons. n195 The
reports offer little to no data in support of their ambitious conclusions, with the lack of substantiation
reflecting and reconstituting the marginalization and stigmatization of American Muslims. The data on
which the reports rely include national security prosecutions involving questionable tactics by law
enforcement: constructing the plot, providing the means, and incentivizing the conduct. In other words, the data
results in part from cases in which the FBI created or molded the behavior it then purported to model. n196 In other cases, the defendants never
committed a violent act, confounding the link between their behavior and a willingness to commit terrorist acts. n197 Overall, there remains no
trustworthy empirical account of radicalization that suggests the idea has explanatory or predictive power. n198
Counter-radicalization normalizes a system of suspicion that portrays all Muslims as
terrorists – Muslim identity becomes synonymous with state resistance and antiAmericanism, which causes violence against those who aren’t “American” enough
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11 and gingE)
[*883] The political vector marks your relationship to the project of American statecraft vis a vis your concern and commune with other Muslims.
The ideological questions are awash in a loyalty calculus, focused on whether you foreground concern with
Muslim community and Muslim suffering at home and abroad, or the imperatives of the U.S. government in
effectuating its policies. Implicit here is the idea that such concern is compatible with American identity only to the extent that it comes
second or does not compete with U.S. government interests. n212 The activity dimensions focus on Muslim engagement with political issues vis a vis
other Muslims and the U.S. government. Does this person or community protest U.S. foreign or national security policy? Does this person or
community comply with requests to inform on the local mosque when asked by the FBI to do so? The radicalization and counterradicalization
discourses have clear implications for the meaning of good citizenship on the part of American Muslims: To be a good citizen is to have a compliant
relationship with the state, rather than to relate from an oppositional or contesting stance. Are you with us or against us? n213 remains the question. If
radicalization creates ideological force for the idea that the state should monitor Muslims, and radical
Muslims in particular, then counterradicalization initiatives operationalize the distinction, offering American
Muslims an opening to perform their Americanness by partnering with the government. n214 The distinction emerges
not simply from how Muslims signal their identity or allegiance with regard to Muslim religious practices or other Muslims. The distinction between
the radical and American Muslim emerges in part from how Muslims relate to U.S. statecraft or U.S. government initiatives. [*884]
Counterradicalization creates friction between loyalty to the U.S. project and practices of Muslim identity. In
particular, the Muslim concept of the ummah, or global Muslim community, comes into conflict with
counterradicalization commitments. Resistance to, or criticism of, American foreign policy in Muslim lands is a factor of radicalization.
n215 So is concern for Muslim casualties abroad, or discrimination against Muslims in the United States. n216 Traveling abroad to Muslim countries,
even for hyphenated second-generation Americans visiting family, suggests suspicious connection. n217 In
classifying Muslims who
attend mosque, who travel or send money abroad, or who oppose the U.S. drone policy in Yemen and
Pakistan, as within the process of radicalization toward terrorism, the theory marks individuals and
geographies as sufficiently different to be outside the protections of the state, transforming them into
legitimate objects of state scrutiny. n218 Radical Muslims become the lawless out-of-place subjects deserving of little protection. n219
Counterradicalization cleaves Muslim from American identities in another way, equating cooperation with the
state with Americanness and loyalty, and dissent with Muslimness, radicalization, and terrorism. Efforts at
partnering with Muslim communities in counterradicalization efforts create opportunities for American Muslims to signal their allegiance. Like the
"regulars" and the "lawful" in the broken windows account, those
considered American Muslims are partners in
counterradicalization - they stand for the state's values, will cooperate with the police in their efforts to
monitor and influence coreligionists, and will step down in the face of conflict. By exercising a right of refusal
to cooperate with the state, the American Muslim moves toward radicalism, the radical emerging in response
to the state's policing. [*885] b. Creating the Terms of Racial Obedience Radicalization and counterradicalization place
identity pressures on American Muslims in their interactions with each other, the public, and the state. n220 To
cooperate - no matter the substance of law enforcement's demand and expectation - is to validate one's American identity. To refuse or to dissent is to
express radicalism, or at least openness to it. n221 Radicalization
policing creates the "racial obedience toward, and fear of,
the police," manifested in "particular kinds of performances .... to signal acquiescence and respectability." n222
Of course this racialized pressure emerges from a larger social context - people of color are subject to more frequent and
more severe police scrutiny, and they are fearful that refusing the police will stoke racial animosity or race-based suspicion and aggravate an already bad
situation. n223 Immigrants in particular are less likely to know their rights. In all these contexts, accountability
is minimal, so the police
"have an incentive to exploit vulnerabilities." n224 Radicalization theory has created a post-9/11 reality in which Muslims "are
more vulnerable to compliance requests, more likely to comply, and have to give up more privacy to do so." n225 Radicalization-informed
policing produces a loyalty discourse in which there are "good" and "bad" Muslims, and thereby
"entrenches the idea of [Muslimness] as a crime of identity," n226 "encourages group surveillance," and incentivizes
Muslims "to be available for, indeed advocate for, white [*886] racial inspection of [Muslimness]." n227 As with the politics of respectability in Black
communities, this approach does not protect the "good" Muslims but, instead, renders all Muslims "vulnerable to racial profiling." n228 Indeed,
radicalization creates geographies of suspicion. While the geography of broken windows theory was effectively one of class and
race - hoisting the specter of the poor Black neighborhood - the sphere of radicalization is religious and cultural (though of course
inflected by race and class as well). n229 In large metropolitan centers, there are certainly physically contiguous neighborhoods where Muslims of
similar racial or class backgrounds reside. In
the rest of the country, however, Muslims of different classes, races,
nationalities, and linguistic and ethnic groups are more dispersed. In these places, government surveillance creates a different
kind of geography out of the places where Muslims gather: the mosque, the halal butcher, or the Indian or Somali grocery store. And visiting these
places makes you vulnerable to police scrutiny. n230 Beyond
the policing practices themselves, there is the realm of public
discourse and debate in which Muslims make their choices. The most public and theatrical government initiative drawing
attention to radicalization occurred with Peter King's first in a series of hearings before the House Homeland Security Committee in 2011 and 2012,
meant to address "a crisis of radicalization to violence ... within the Muslim-American community" n231 [*887] and a refusal by Muslims to cooperate.
n232 Those called by King as representatives of Muslim communities testified that American Muslims were ignoring concerns with radicalization and
could do more to cooperate. n233 The witnesses lampooned a number of mainstream and prominent American Muslim advocacy organizations Muslim Advocates, the Council on American Islamic Relations, and the Muslim Public Affairs Council, all of which have met regularly with federal,
state, and local city officials - for undermining Muslim cooperation with law enforcement efforts. The organizations and other community leaders
came under fire especially for their recent initiatives counseling community members to retain a lawyer before dealing with the FBI. n234
Counter-radicalization of terrorism is shrouded in a politics of anti-knowledge and
exaggeration of threat – silences the Muslim community and pathologizes social
problems
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
c. Racializing Ideology In addition to shaping modes of political engagement with the state, radicalization
discourse and
counterradicalization practice affect the parameters of religious and political conversations and contestation
by rendering certain viewpoints or topics as off limits. n239 Of course it is not just the existence of the discourse at work here - it
is the recurring and regularized interactions with police that serve as constant reminders of the stakes for
American Muslims. Much of terrorism and radicalization discourses are enshrouded in a politics of "antiknowledge." n240 Terrorism studies tend to "reduce complex social, historical, and political dynamics." n241 Chief among the "constraints
shaping what can be said about terrorism" is "denial of the possibility of rational causes, and the
attribution of terrorism to pure evil." n242 The mainstream narrative "implies that, once an individual has
adopted an extremist religious ideology, terrorism will result, irrespective of political context or any
calculation on the part of any organisation or social movement." n243 Similarly, radicalization and violent extremism discourse
displaces any attention on political context with a focus on theological and psychological factors that supposedly foment radicalization. n244 [*889]
Radicalization theory marks certain topics or viewpoints as beyond the pale by suggesting that they are un-American or likely to draw government
scrutiny. n245 As a result, radicalization
discourse puts pressure on the contours of conversation among Muslim
communities about the public issues of our times to which many American Muslims are particularly attuned.
n246 American
Muslims are thus less likely to vocalize concerns about the exercise of American war power
in Iraq, Afghanistan, Pakistan, Somalia, Yemen, and so on. n247 The absence of Muslim voices on these issues
is particularly notable given how much of contemporary U.S. foreign policy is focused on Muslim
populations. Equally important, the space for religious debate - on questions such as the meaning of "jihad" or different modes of interpretation in mosques and other Muslim community space has also shrunk and warped. n248 "Since 9/11, mosque leaders have been
under pressure to eject anyone expressing radical views, rather than engaging with them and seeking to challenge their religious interpretation, address
their political frustrations, or meet their emotional needs." n249 Moreover, radicalization
discourse may serve to pathologize
complex social problems, displace focus from the role of government activity in creating those problems,
and place the burden of solving them on already marginalized communities. Broken windows theory could be criticized
along the same lines: The underlying roots of ordinary crime - poverty, joblessness, mass incarceration, disenfranchisement - disappear under the
discourse of "disorder." In the context of national security, the complicated political historical terrain between the U.S. government and Muslim
communities within the United States on the one hand, and the United States, Muslim-majority countries, and international terrorist groups on the
other, disappears under the discourse of radicalization and the terrorist Other.
“Radicalized” Muslim Links
The construction of radicalized Muslim identity allows the surveillance apparatus to
subordinate Muslims as an object of policing – this creates anxiety in society when
everyday acts become potential terrorist threats, which creates racist stereotypes
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11 and gingE)
2. Racializing Muslims Under
the guise of predicting future terrorism, radicalization provides a guide for
government activity. In so doing, it redefines and expands the relevant field of state concern: from terrorism to
radicalization in Muslim communities. Marking religious and political activities as the indicators of radicalization, the discourse links
religious and political practices in Muslim communities with the likelihood of terrorism - inviting state scrutiny into the halls of Muslim communities,
and changing the terms of engagement with the state for Muslims. The
theory creates the Muslim, her religious and political
habits, as an object of policing. [*880] The theory is racially productive, n199 contributing to the
racialization of American Muslims. n200 I use the term racialization knowing that it imperfectly describes the shape and
nature of the stigma that has attached to American Muslim communities after 9/11, not least because African
Americans make up a considerable portion of the Muslim population in the United States. American Muslims are unique in their diversity, varying by
race, language, ethnicity, nationality, and class. Still, racialization best approximates
the process by which a diverse group of
people become lumped together by stigma, stereotype, and fear, all of which draw from a range of physical
attributes and signifiers, mobilized by law, as a method of control and subordination. As with other subordinated
and racialized groups (for example, Blacks, Latinos, Native Americans), there are for example, physical attributes associated with Muslim identity, from
skin color to facial hair to garb. n201 By focusing on the post-9/11 era, I do not mean to minimize the reality that Muslims were racialized before
9/11, or that a significant portion of American Muslim communities are African American and have long been central to the story of race in America.
While crime is the primary lens through which African Americans figure in the American imaginary, terrorism is the lens through which Muslims
appear. African American and Muslim identities are carved by and in opposition to particularized types of suspicion. So the politics of respectability of
each group is distinct - with the pressure on African Americans to disavow and respond to Black-on-Black crime, and for American Muslims to
disavow and respond to terrorism. [*881] a. Creating Muslim Suspects The categories of "law-abiding" and "lawless," n202 "radical" and "moderate,"
are both overinclusive and indeterminate, n203 depending entirely for their meaning on police deployment and creating deep vulnerability for Muslim
communities. n204 Muslims are forced to carry the stigma borne of such intense scrutiny and are powerless to escape it, given that both playing up and
minimizing Muslim identity can be seen as potentially suspicious. n205 Evidence suggests, however, that Muslims have changed their behaviors in
response to the reality and perception of extensive surveillance. For example, individuals report signaling their Muslimness less openly, by praying at
home rather than at the mosque, avoiding political conversation in mosques and other Muslim-specific spaces, or reducing donations to Muslim
organizations. Similarly, mosques may ask speakers to avoid political content, including criticism of U.S. foreign policy. n206 Radicalization
discourse crystallizes the Muslim as a figure of legitimate police scrutiny. n207 As Harcourt observed in the context
of broken windows theory, "the theory of deterrence and punishment focuses on the disorderly person rather than
the criminal act, and thereby facilitates a policy of control, relocation, and exclusion of the disorderly"; "the
category of the disorderly is the product, in part, [*882] of the [policing] itself." n208 Broken windows theory does its
work in a two-step dialectic: It shifts the object of policing from crime to the out-of-place person, and in so doing, constructs the out-of-place person
as someone who needs to be surveilled and controlled by the state. Similarly, radicalization theory and policing shift law enforcement's attention from
actual plans to commit a terrorist crime to Muslim religious and political activity by literally marking observance of Muslim religious practice, or
expressions of political solidarity with other Muslims, as within its causal framework. The
radical Muslim, by virtue of noncriminal
behavior - attending a halaqa (religious study group), visiting family in Pakistan, growing a beard, or paying
off a mortgage n209 - embodies the potential threat of terrorism, and in so doing becomes a legitimate object of policing even
when engaging in wholly noncriminal (now suspicious) behavior. "Politicization," "becoming involved in social activism
and community issues," and "watching jihadi videos ... that highlight atrocities committed against Muslims" bring you within the third stage. It is not
until the fourth stage that the theory concerns itself with any intent to undertake a criminal act. In other words, you could be three-fourths radicalized a nearly full blown threat, one would imagine - and have yet to form any concrete thoughts of committing any crime. You might have radical beliefs,
but no intent to commit a violent crime. The conservative Muslim, rolling up his pant sleeve in accord with a certain religious practice, or attending the
Friday sermon criticizing U.S. foreign policy, embodies this disorder, and the potential for a much larger threat. The religious and political vectors of
radicalization theory work in different, if intersecting, ways; both vectors reflect concerns with the ideas and activities of Muslim communities. The
religious vector marks basic observant behavior and conservative modes of Muslim religious practice as radical, and therefore worthy of suspicion.
"Giving up cigarettes, drinking, [and] gambling," for example, or "wearing traditional Islamic clothing" are markers of radicalization. n210 It matters
both what type of Islam you believe in and what you practice: whether your actions (do you follow to a tee the hadith of the Prophet Muhammad?) or
level of devotion and study (do you regularly attend a halaqa?) adhere to more conservative modes of practice. The
"more Muslim" you are
in the religious sense, the more radical, and the more potentially threatening you appear to be. n211
Community Engagement Links
The federal nature of community engagement subjects the Muslim community to
domination by the state – degrades our democratic credibility
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
[*890] III. Community Engagement's Coercion While community
engagement aims to build relationships with Muslim communities, to gain
as a technique of policing radicalization, encouraging allencompassing surveillance of Muslim communities and working to cultivate in Muslims a suspicion of
coreligionists' religiosity and politicization. n250 Community engagement becomes yet another pressure point at
which Muslims must participate in surveillance or else suggest disloyalty to the American project. Given its
trust and enhance communication, it also functions
anchoring in counterradicalization, the order that community engagement seeks to impose draws from ideas about the proper ways to practice Islam in
America, the right balance between religious and secular life, and a demand for a certain form of political assimilation. n251 It
closes, or at least
narrows, possibilities for meaningful contestation and collaboration, while obscuring, and even reinforcing,
the power differential between Muslim communities and law enforcement. The space between how community
engagement appears - as a democracy-or inclusion-enhancing venture - and the work it actually does to reinforce coercive policing is what this Part
explores. Throughout the foregoing discussion, I have emphasized the dangers associated with law enforcement's community engagement efforts - in
particular how counterradicalization
and community engagement work to cultivate pro-law-enforcement attitudes
and affectations, such that Muslims open up their communities in various ways for government inspection
and regulation. In so emphasizing, I do not mean to disparage civic engagement, which is no doubt constitutive of democracy. The quality
of civic engagement has to matter, though, if the end is democracy of any meaningfully participatory or
accountable variety, and if the goal is to bring outsider communities into the fold. I am not convinced that encouraging
marginalized citizens' interactions with their government is constructive of democracy when it is achieved
through coercive means - which do not allow for contestation of terms or meaningful input, and instead provide pressure on communities to
participate in the very policing tactics that create the gulf in trust that propels the need for forays into trust building. When this participation and
consent are shaped by a pressure to perform [*891] Americanness and to dispel racialized assumptions about loyalty and allegiance, the
coercion
raises acute equality and antisubordination concerns. The federal government has an interest in community engagement apart
from democracy: national security. Through the surveillance and acculturation of communities marked as vulnerable to anti-American persuasion, the
government hopes to prevent attacks on its (non-Muslim) citizens. But while
a fear of Muslims or so-called Islamic terrorism fuels the
push for community engagement, the data does not substantiate the extent of the concerns. When one
considers the size of the global Muslim population, or even simply the American Muslim population, the few
acts of terrorism committed by Muslims in the United States are infinitesimal, including as compared to other
threats. n252 The bloated concern with terrorism seems to be motivated more by politics than by facts. Community policing generates its moral
authority by tapping into the ideas of community support and democratic legitimacy, but the slippery quality of the term community, and the terrain of
inequality that gives rise to the push for such programs, provokes two nested concerns. First, community
engagement programs are
largely top down, with federal government prerogatives imposed on Muslim communities. Community
engagement creates the aesthetics of democracy and inclusion without necessarily reflecting any substantive
commitments to those values. Concretely, the police may select partners that ratify preexisting police practices, n253 or pursue community
engagement primarily as another entry point for surveillance and norms molding, as opposed to a source of accountability or contestation. The
appearance of collaboration, without any real possibility of significant contestation, may undermine rather
than bolster democracy, augmenting the coercive power of the state. Moreover, to the extent community engagement
draws on racialized pressures on Muslims to perform their Americanness, and disavow their Muslimness, as a way to prove their American bona fides,
the police partnerships exacerbate autonomy, equality, and subordination concerns implicated in the broader
regime of policing radicalization. Second, the police partnerships may exacerbate hierarchies within Muslim communities. [*892] Police
partnerships may have distributive effects internal to the community, such that the elite may be further empowered over the marginalized - even as
they themselves are subject to coercive state power. If the inclusive and democratic work of community engagement is questionable, and the fear of
Muslims outsized, we must be suspect of the heightened push for community engagement with Muslim communities. My primary concern here is to
test or problematize the democratic claims of this tactic. n254 A. A Top-Down Approach If
we are to take the democracy and
inclusion claims of community engagement seriously, we should expect that communities are able to "exert
meaningful influence" n255 or have a determinative role in setting policing "goals, priorities, and strategies."
n256 If community engagement does not provide opportunities for meaningful or determinative input but rather facilitates involvement only
to the extent that participants lend support to preexisting law enforcement priorities, then its claim to democratic legitimacy
should be questioned. There is strong reason to question the democratic claims of community engagement. As with community policing in
the ordinary criminal context, a basic tenet of community engagement is that there is value for Muslim communities and law enforcement in cultivating
channels of communication. The
emphasis in official government statements is on relationship and trust building,
inclusion, and democracy. But community engagement efforts, steeped in counterradicalization, play
important norms-molding and intelligence-gathering functions, raising important questions about the
implicit claims to democracy enhancement on which the efforts rely. Moreover, whereas building trust and relationships is
based generally on the idea of two-way obligations, in reality the government has done little to address the fundamental root
of distrust - which starts with the overly broad and punitive approach to policing entire Muslim communities. n257 Interacting with Muslim
communities, law enforcement's prevailing focus is national security, [*893] foregrounding threat potential in government's interactions with Muslim
communities. n258
AT: Community Policing is Net Better / More Democratic
Community policing does not allow American Muslims to reset priorities – they just
ratify law enforcement’s work
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
Above and beyond the concerns with community engagement serving as a cover for surveillance and norms molding, the
federal government
has repeatedly signaled little room for American Muslim communities to play a determinative role in setting
priorities. Community engagement provides opportunities for American Muslims to partake in and ratify
law enforcement's work. In a community engagement push by federal law enforcement with Minnesota's Somali communities, for example,
"[an] FBI private acknowledged, there was no possibility of the community [having] influenced how the investigations were carried out." n259 To the
contrary, the aims were more one-sided: to "correct what its agents called "misperceptions' ... such as that suspects in Somalia might be
imprisoned without trial or targeted for drone killings (such community fears were consistent with official US policy ...)" and "to encourage community
leaders to pass information to federal agents about young people." n260 While there might be space to raise concerns with the government, there
is
little reason to suggest any real possibility for meaningful or determinative input. n261 The detachment of community
engagement from its claim to democratic authority starts at the foundational level. Community policing's historical aim has been to reduce crime in an
inner city or even a particular neighborhood. The subject community could in some sense be imagined to be working with the police to enhance its
own welfare. Central to proponents' arguments for community policing has been the idea that African American communities suffer from
underenforcement by police and need more policing to rid their communities of [*894] crime. n262 In
its national security manifestation,
however, community engagement's aim is to secure the state. Muslims are made responsible not for their
own condition but for the welfare of the entire nation - and for protecting the nation against terrorists. It is a
"particularized responsibility [for the welfare of the nation] ... not shared by other groups." n263 The assignment of responsibility should trouble us for
a number of reasons, including basic American proscriptions against guilt by association and racial and religious profiling. Muslim
communities
had not identified radicalization or violent extremism as an issue of concern before the government's framing
of radicalization and violent extremism as a national priority. n264 By and large, Muslim communities and
advocacy groups have not only objected to the radicalization framework and the assertion of growing
radicalization in Muslim communities, n265 but have also insisted that they are cooperating with law
enforcement efforts. n266 Community engagement - in its current manifestation, grounded in counterradicalization and CVE - has, in some
sense, been foisted on Muslim communities. n267 [*895] The federal nature of the underlying concern also undercuts community
engagement's democratic potential. Federal law enforcement entities, national in scope and in responsibility, take the lead in community
engagement efforts, whereas local police embody community policing as originally conceived. Even in the community policing context, critics worried
that more
marginalized communities or more marginalized segments of communities - the ones most in need of
be unable to exert enough power to contest or hold police
accountable. In the federal context, not to mention the politically charged realm of national security, the concern is even more acute. The idea that
protection from abusive, unaccountable policing - would
marginalized, dispersed, and diverse Muslim communities could hold accountable the federal government or federal law enforcement on national
security issues is dubious. If
Muslims had the political power to hold the police accountable, community
engagement programs would not be necessary from a democracy or inclusion perspective to begin
with.
Community engagement appears more benign but it is still a form of racialized
policing
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
*** Government officials tout these community engagement efforts as the pinnacle of good governance,
providing Muslim communities with opportunities to educate and hold the government accountable, and providing the government with the chance to
learn from Muslim communities. n147 Indeed,
community engagement initiatives may seem preferable to, or at least less
coercive than, other forms of policing. One might argue that the overt nature of community engagement efforts obviates any concern
about coercion or consent. Communities of color - overpoliced as they are - must know that their interactions with the police are recorded and shared.
(The FBI thinks otherwise: The recently released 2009 FBI Policy Directive on community engagement asserts that "members of the public contacted
through a community outreach activity generally do not have an expectation that information about them will be maintained in an FBI file or
database." n148) How
can communities later complain that they are under watch, even as they exchange
pleasantries at a mosque outreach event with the local FBI agent? This is to miss, however, a larger set of
normative concerns about the dialectic between the exercise of police power and the ways it restricts
the options available to communities of color. The remainder of this Article attempts to unpack these concerns. II. Disorder and
Racialization Community policing's elasticity has been integral to its currency and longevity. An approach by local police
in the 1970s and 1980s to working with poor, urban Black communities in response to ordinary crime and historical distrust [*869] has proved
sufficiently flexible to be put to use in service of the post-9/11 paradigm. Federal law enforcement has adopted community-policing-like tactics
nationwide with Muslim communities in response to national security concerns, deploying the vocabulary and aspirations of community policing. n149
While community engagement is regularly invoked in the same breath, or included in the same conceptual universe, as community policing, unnamed
is the dynamic between counterradicalization/CVE and broken windows theory. At first blush, there is an obvious parallelism: Counterradicalization
defines the contours of community engagement as broken windows often shaped practices of community policing. Both counterradicalization
and broken windows theories are preventative theories of crime control laid atop efforts at bettering relationships between marginalized
communities and law enforcement. n150 Both theories also motivate traditional policing tactics and approaches beyond those
that claim as their central normative force partnerships with the community. Yet there are important theoretical and
material distinctions between broken windows and counterradicalization, and between community policing and community engagement. In focusing
on the critiques of community policing inflected by broken windows theory, I do not mean to suggest that all community policing is defined by broken
windows theory, or that order maintenance (which is more directly linked to broken windows, in theory as well as practice) follows from community
policing. n151 Community policing and broken windows theory can certainly be [*870] decoupled: n152 Community policing's center of gravity is in
communication and collaboration with local communities, while broken windows theory centers police discretion to pursue disorder and minor crimes.
n153 In practice - and in particular in the 1980s and 1990s - the divide has proven more illusory. n154 When community policing and broken windows
theory have been linked in practice and in study, the
combination provides an important lens through which to see the
problems that emerge when a theory of crime control that attaches predictive authority to social markers of
difference shapes police communication with marginalized communities. The literature examining community policing
shaped by broken windows theory provides insights on similar problems that emerge when community engagement is shaped by counterradicalization.
AT: Community Policing is Cooperative
Community policing is not cooperative – they ignore the continued power imbalance
not predetermined by the more powerful police prerogatives
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
A. Community Policing, Broken Windows, Ordinary Crime n155 The basic intuition behind community policing is that increased communication and
collaboration between police and communities will benefit both parties and cultivate a stronger ethos of civic engagement in marginalized communities
- those with less social power and socioeconomic standing. n156 The
precise causal mechanics of this process, however, are far
from clear. n157 While the literature takes as a starting point the poor relationships between law enforcement and marginalized communities,
it generally fails to meaningfully engage the question of how community policing practices should account for
the power differential between police and those communities, instead assuming that the communication will
itself have a democracy-enhancing function. n158 Proponents advocate for more interaction and flexibility, but provide little
guidance on how to ensure that communication and police action is not predetermined by the more
powerful police prerogative. n159 [*872] Beyond its basic orientation toward communication, the theory and practices of
community policing are muddled. n160 Reading the literature, one encounters an avalanche of terminology: preventive policing, n161
problem-oriented policing, neighborhood policing, hot spots policing, third-party policing, order-maintenance policing, zero-tolerance policing,
quality-of-life policing, broken windows theory, social norms theory, intelligence-led policing, and so on. n162 These concepts represent an evolving
spectrum of approaches to policing. n163 Often [*873] these
concepts fill in the vagaries of or complement one on another, but they also clash
and confuse; where one set of practices ends and the other begins is often unclear and subject to debate. n164
Broken windows theory defines much community policing in the context of ordinary crime - one could even argue that it is a central spoke in
contemporary preventive policing concepts. For purposes of this Article, a basic account of the theory's adaptation to policing should suffice. In 1969,
in a famous psychology experiment, two cars were left in two very different neighborhoods without license plates, and with hoods open: one in
wealthy Palo Alto, and one in a poor neighborhood in the Bronx. n165 The Bronx car was quickly stripped of its valuables. The Palo Alto car went
untouched - until the study's progenitor publicly smashed in the windows, precipitating others to codemolish and rob the car. n166 In 1982, social
scientists George L. Kelling and James Q. Wilson announced their broken windows theory in The Atlantic, parlaying the psychology experiment into a
theory of crime control: They argued that outward signs of "disorder" invite law-breaking criminality by signaling to would-be criminals that the
geography's inhabitants lack effective practices of social cohesion and control. n167 If the police can fix the visible signs of disorder (broken windows),
the argument goes, they can reduce serious criminal activity. The translation from psychology experiment to preventive policing theory n168 was not
the only translation at work, however. Kelling and Wilson also forwarded broken windows as a theory to motivate collaboration between police and
the policed. n169 The Atlantic story featured a 1970s foot patrol initiative in which [*874] foot patrol worked with the "regulars" or "decent folk" to
protect them from "disorderly people" - "disreputable or obstreperous or unpredictable people: panhandlers, drunks, addicts, rowdy teenagers,
prostitutes, loiterers, the mentally disturbed." n170 In the legal academy, social norm theorists n171 championed community policing efforts inflected
by broken windows theory. n172 Community policing was framed as a powerful tool for the government to address the legitimacy deficit in African
American communities, wherein relationships with police were defined by histories of distrust and police violence.
n173 But community policing also [*875] had its critics, n174 many of whom pointed to how broken windows theory - even in a community policing
guise - had shifted the focus of policing from criminal conduct to "disorder." Broken windows theory assumed dichotomies between "order and
disorder," "insider and outsider," and the "law-abiding and lawless;" n175 assumed these categories were stable and observable; and then privileged
order, insiders, and the law abiding over their counterparts. n176 The
meanings of disorder, outsiders, and lawlessness were left
to police discretion, assuming the police would not inevitably draw from preexisting terrains of difference, and particularly the anti-Black racial
text linking Blackness and criminality, in making these distinctions. n177 Indeed, more recent work has contested broken windows theory's assumption
that the "perception of disorder is governed by actual, observed levels of disorder." n178 Instead, "racial
and immigrant concentration
proved more powerful predictors of perceived disorder than did carefully observed disorder." n179 Broken windows
theory, in its construction of the disorderly, the lawless, and the outsider as legitimate subjects of policing, rendered already vulnerable individuals as
even more vulnerable to policing. n180 Critics also pointed out that there
was no empirical evidence to suggest that policing
order decreased crime n181 or increased civic engagement. n182
Community based model won’t improve overall law enforcement – will still serve to
marginalize and radicalize Muslim communities
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
Certainly there are strong normative reasons, including those that motivate this Article, to expect and demand that law enforcement account for the
realities of marginalized communities. But we
cannot expect that dialogue will necessarily lead to accountability,
meaningful contestation, or realignment of police approaches in marginalized communities. After all, law
enforcement is itself a significant vehicle for marginalization and racialization in the United States. It
is reasonable to question whether community policing - or policing at all - can be expected to be the vehicle for the change we are seeking. The
problem and the solution may be entirely mismatched.
AT: Defer to Government Evidence
Don’t evaluate their evidence – government reports are overblown and biased
Akbar 15 – Assistant Professor of Law at Michael E. Moritz College of Law at the Ohio State University
(Amma, The Reagents of the University of California UCLA Law Review, “National Security’s Broken
Windows”, May 2015, 62 UCLA L. Rev. 834, Lexis, //11)
Within the broader framework of community engagement, federal,
state, and local law enforcement have stepped up efforts
to establish channels of communication with Muslim communities. While on the surface these efforts are
necessarily less secretive than other national security law enforcement efforts - indeed their basic function is partly
aesthetic - the concrete data on these efforts is scattered and incomplete. n113 Government accounts are
papered in promotional language, and community accounts are few and far between. n114 Given limited
information on what these efforts entail, the parameters in which they function, n115 the absence of a central repository for information, and [*863]
the fast pace of growth of such efforts, the descriptions below are necessarily limited. n116
Terrorism Kritik
Problem Solution Link
The aff’s overidentification with problem-solving political approaches legitimizes the
state’s short-term terroristic methods by framing them as the necessary and logical
solution to the ‘terrorist threat’ – ignoring social and historical context, this
reestablishes terrorists as the ‘other’ and means that the aff can’t solve its impacts.
Gunning, 7 – Director of the Durham Global Security Institute for Defense, Development and Diplomacy
in the School of Government and International Affairs, with a PhD in Middle Eastern and Islamic Studies
(Jeroen Gunning, Government and Opposition, Vol. 42, No. 3, “A Case for Critical Terrorism Studies?”, Summer
2007, *fc)
However, if we consider the typical characteristics of a ‘problemsolving’ or ‘traditional’ approach,37 we find
that many of these both dominate ‘terrorism research’ (including many of the contributions of Silke’s ‘onetimers’)38 and can be directly linked to the shortcomings witnessed in this research. In its most ‘uncritical’
manifestation – and it must be emphasised that few scholars are wholly uncritical in a Coxian sense – a
‘problem-solving’ approach does not question its framework of reference, its categories, its origins or
the power relations that enable the production of these categories.39 It is statecentric, takes security to
mean the security of the state rather than that of human beings, on the assumption that the former implies
the latter, and sees security in narrow military or law-and-order terms, as opposed to the wider conception of
human security, as for instance developed by critical security studies.40 It is ahistorical and ignores social and
historical contexts; if it did not, it would have to account for the historical trajectory of the state, which would
undermine the state’s claim to being uniquely legitimate. The problem-solving approach is positivist and
objectivist, and seeks to explain the ‘terrorist other’ from within state-centric paradigms rather than
to understand the ‘other’ inter-subjectively using interpretative or ethnographic methods. It divides
the world sharply into dichotomies (for instance, between the legitimate and ‘good’ state, and the illegitimate
and ‘evil’ ‘terrorists’). It posits assumptions based on these dichotomies, often without adequately exploring
whether these assumptions are borne out in practice. It sees interests as fixed, and it regards those opposed to
the status quo as the problem, without considering whether the status quo is part of the problem and
transformation of both sides is necessary for its solution.
Not only can many of these characteristics be found in more or less diluted form in ‘terrorism research’41 – a
legacy of the field’s origins as a sub-field within ‘traditional’ security and strategic studies – but these
‘problem-solving’ characteristics can also be shown to contribute directly to its observed shortcomings. The
reported lack of primary data, the dearth of interviews with ‘terrorists’ and the field’s typical unwillingness to
‘engage subjectively with [the terrorist’s] motives’,42 is in part fuelled by the field’s over-identification
with the state, and by the adoption of dichotomies that depict ‘terrorism’ as ‘an unredeemable
atrocity like no other’, that can only be approached ‘with a heavy dose of moral indignation’, although other
factors, such as security concerns, play a role too.43 Talking with ‘terrorists’ thus becomes taboo, unless it is
done in the context of interrogation.44
Such a framework also makes it difficult to enquire whether the state has used ‘terroristic’ methods. If the
state is the primary referent, securing its security the main focus and its hegemonic ideology the accepted
framework of analysis, ‘terrorism’, particularly if defined in sharp dichotomies between legitimate and
illegitimate, can only be logically perpetrated by insurgents against the state, not by state actors themselves.
State actors are engaged in counterterrorism, which is logically depicted as legitimate, or at least, ‘justifiable’
given the ‘terrorist threat’ and the field’s focus on shortterm ‘problem-solving’. Where ‘traditional terrorism
studies’ do focus on state terrorism, it is in the context of the ‘other’: the authoritarian or totalitarian state that
is the nemesis if not the actual ‘enemy’ of the liberal democratic state.45
Alt Solves
A critical approach solves best – broader analysis of terrorism would break down
dichotomies and open up new approaches to address terrorism.
Gunning, 7 – Director of the Durham Global Security Institute for Defense, Development and Diplomacy
in the School of Government and International Affairs, with a PhD in Middle Eastern and Islamic Studies
(Jeroen Gunning, Government and Opposition, Vol. 42, No. 3, “A Case for Critical Terrorism Studies?”, Summer
2007, *fc)
A ‘critical’ approach would enable scholars to analyse how ‘terrorism’ discourse is used to discredit
oppositional groups and justify state policies, and what structures underpin its production.62 It would
encourage research into how discourse is used by oppositional groups to discredit state elites, and what
structures make such discourse possible.63 It would facilitate research to move beyond paradigms that a
priori seek the eradication of violent nonstate actors through military action and contemplate the need for
political solutions and in particular political transformation, for instance, by drawing on the insights from
conflict transformation studies.64 It would enable scholars to move from paradigms where the non-state
actor is a priori considered to be the problem, to one where, a priori, all sides are assumed to be part of both
the problem and the solution.
Methodologically, it would encourage researchers to engage with their ‘research subjects’ at a human level
with the purpose of, in the words of Sara Roy (a scholar outside ‘terrorism studies’), ‘humanizing the
other’.65 It would facilitate the adoption of ethnographic methodologies, of considering interviews as a
pivotal source, and of living among the communities from where oppositional groups stem.66 It would
encourage scholars to break down us–them dichotomies and wrestle with Richardson’s observation that:
When I consider a terrorist atrocity I do not think of the perpetrators as evil monsters but rather I think
about the terrorists I have met, and the people I have known who have joined terrorist groups . . . I grapple
with how a young idealist can believe that in murdering innocent people he or she is battling injustice and
fighting for a fairer world. I think, as the Protestant martyr John Bradford said 500 years ago, ‘There but for
the grace of God, go I.’67
Such an approach would enable a shift from a limited focus on ‘terroristic’ violence (however defined) to one
also encompassing both ‘non-terroristic’ violence and ‘non-violent’ behaviour, although the boundary
between these two categories depends on the definition of ‘violence’ and ‘non-violent’. This would mean
taking into account ‘non-terroristic’ violence such as guerrilla tactics,68 enforced recruitment of child soldiers,
executions, torture, house demolitions, and ‘collateral damage’, as well as ‘non-violent’ acts, such as ‘structural
violence’, economic strangulation, imprisonment, charitable aid (and not just in relation to ‘terrorist funding’),
education, limiting freedom of speech or marginalizing alternative lifestyles.69 Without such a widening of
the agenda, key aspects of the conflict would be missed. One cannot understand the Italian Red Brigades
without analysing the wider left-wing movement of the 1960s and 1970s, and the behaviour of the Italian
state towards it. Similarly, one cannot understand Hamas without analysing its relationship with its wider
constituency, or the impact of Israeli occupation and settlement practices (including ‘structural violence’) on
that constituency. 70 Such a widening of the agenda, moreover, would deny ‘terrorism’ the capacity to
portray itself as somehow exceptional, and thus exceptionally frightening, rather than as one form of
violence among many. It would also deny it the capacity to isolate itself from its wider social context,
enabling researchers to engage cognate theories such as democratization theory, which concern themselves
with broader trends, of which violence is but one aspect.
A critical approach is a necessary prerequisite to overcome shortcomings of current
political approaches to terrorism.
Gunning, 7 – Director of the Durham Global Security Institute for Defense, Development and Diplomacy
in the School of Government and International Affairs, with a PhD in Middle Eastern and Islamic Studies
(Jeroen Gunning, Government and Opposition, Vol. 42, No. 3, “A Case for Critical Terrorism Studies?”, Summer
2007, *fc)
SINCE 9/11, STUDIES ON THE PHENOMENON OF ‘TERRORISM’ HAVE mushroomed.2 On
entering almost any bookshop, one is overwhelmed by the number of books discussing the war on terror,
‘Islamic terrorism’ or ‘terrorism’ more generally. Conference papers on ‘terrorism’ abound and interest in
issues related to ‘terrorism’ has increased dramatically among scholars in cognate disciplines; degree
programmes have been set up;3 funding opportunities have increased. And yet, as recent reviews of the field
have shown,4 core epistemological, methodological and political-normative problems persist, ranging
from lack of conceptual clarity and theoretical sterility to political bias and a continuing dearth of primary
research data.
A number of reasons have been cited for this state of affairs, which will shortly be detailed. But two reasons
are often overlooked: the predominance of ‘problem-solving’ approaches in the study of ‘terrorism’, which
accounts for many of the observed methodological and conceptual shortcomings of ‘terrorism research’; and
the dispersed nature of much of the more rigorous, critical and conceptually innovative research on
‘terrorism’ that is published outside the core journals of ‘terrorism studies’ and thus often fails either to
reinvigorate, or to learn from, ‘terrorism studies’. It is the argument of this article that a ‘critical turn’5 in the
field of ‘terrorism studies’6 is necessary to reverse these two trends, and that this turn must be conceived in
such a way as to maximize the field’s inclusiveness and, importantly, its policy relevance.7
AT: State Good
Quick, state-centric solutions to terrorism can’t solve – a lack of historical and
critical reflection means that the aff just reentrenches negative assumptions of
‘religious terrorism’ and reproduces threats.
Gunning, 7 – Director of the Durham Global Security Institute for Defense, Development and Diplomacy
in the School of Government and International Affairs, with a PhD in Middle Eastern and Islamic Studies
(Jeroen Gunning, Government and Opposition, Vol. 42, No. 3, “A Case for Critical Terrorism Studies?”, Summer
2007, *fc)
The observed disregard for historical context and wider sociopolitical dynamics46 can similarly be traced to
the ahistorical propensity of ‘problem-solving’ approaches and their state-centric understanding of security.
The typical focus is thus on violent acts against the state, and the immediate ‘terrorist’ campaign, not on how
these acts relate to a wider constituency and its perception of human security, history and the state, or what
role the evolution of the state has played in creating the conditions for oppositional violence.47
The lack of critical and theoretical reflection48 can be linked to the ‘problem-solving’ tendency to be
short-termist and practical, and to deal in fixed categories and dichotomies that privilege the state and its
dominant ideological values. From such a standpoint, scholars would not readily explore how ‘terrorism’
discourse is produced and how it is used to marginalize alternative conceptions, discredit oppositional groups,
and legitimize counter-terrorism policies that transgress international law.49 Nor would they be particularly
likely to consider how the development of the modern state or the international system might have
contributed to the evolution of ‘terrorism’, or how theories of the state and the international system can help
illuminate the ‘terrorism’ phenomenon. Drawing on cognate theories more broadly is similarly discouraged
since ‘terrorism’ is framed as an exceptional threat, unique and in urgent need of a practical solution.50
The state-centricity, inflexibility and dichotomous nature of such a framework also makes it easier to recycle
unproven assumptions, such as the notion that ‘religious terrorism’ is not concerned with constituencies and
knows no tactical constraints against killing ‘infidels’, 51 without having to test these assumptions empirically
across different samples. It thus becomes possible to argue, for instance, that negotiating with ‘terrorists’
encourages further ‘terrorism’ without need for empirical proof – a point already observed by Martha
Crenshaw in 198352 – or to insist that ‘terrorists’ inherently lack legitimacy without reflection on whether the
state lacks legitimacy in the experience of those who support the ‘terrorists’.53 The combined result of these
tendencies is often a less than critical support (whether tacit or explicit) for coercive counterterrorism
policy without adequate analysis of how this policy contributes to the reproduction of the very terrorist
threat it seeks to eradicate.
State Bar CP
1nc Bar Association CP
Counterplan text: The American Bar Association should issue and enforce the
following rule:
No prosecuting attorney shall supervise, advise, or otherwise take part in a criminal
investigation that involves the surveillance or infiltration of a religious organization,
unless specific and articulable facts provide a basis for suspecting criminal activity
by the organization or one of its members.
State bars solve best – they have the expertise to establish uniform rules and prevent
unwarranted surveillance.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
D. Regulation in State Bars' Ethical Codes
While not ideal, this final alternative may offer the greatest promise. State bars could modify their codes of
ethics to incorporate a requirement that prosecutors may not take part in the surveillance or infiltration of
religious organizations absent a particularized suspicion that a member of the organization is breaking the
law. Some scholars support a greater reliance on state bars to set ethical standards for prosecutors, n318
although no scholar has addressed the precise topic considered here.
The first issue to consider is whether state bar associations have sufficient expertise to promulgate such rules.
n319 Congress appears to have answered this question by deferring to state bars as the regulators of federal
prosecutors' ethics. n320 Most state bars have already adopted a limited set of ethical rules for
prosecutors. n321 State bars have a unique advantage in that they bring a range of viewpoints to the table not simply those of prosecutors, but also of defense attorneys. State bars also include both federal and state
practitioners. Officials in state bars are not elected by the public at large, and are less likely to be
susceptible to the political pressures that influence legislative debates over criminal justice matters.
Moreover, the rules adopted by a particular state's bar association must be approved by that state's supreme
court before they take effect, and this overlay of judicial approval provides an assurance that state bars will
not abuse their power as regulators. For all of these reasons, state bars are in a unique position to
formulate ethical rules for prosecutors.
State bars are probably more willing than legislatures, courts, or law enforcement agencies to impose limits on
investigations of religious organizations. Indeed, defense attorneys generally outnumber prosecutors in bar
associations. n322 The bars have already taken significant steps in [*1270] limiting the power of prosecutors.
Examples include rules against serving grand jury subpoenas on defense attorneys, rules against publicly
divulging details of a case in advance of trial, and rules directing attorneys not to make contact with
represented persons. n323
State bar associations could prove to be surprisingly effective in enacting a comprehensive, uniform
regulatory scheme for prosecutors and, indirectly, for law enforcement officers. While the full development
of this argument must await the next section, it is important at this juncture to dispel the myth that a statebased regulatory system cannot achieve uniformity throughout the nation. n324 The fact is that states are
now closer than ever to aligning their ethical rules in virtually all respects. n325 The A.B.A.'s blueprint, the
Model Rules of Professional Conduct, has now won approval in forty-four states. n326 Each of theses states
has adopted a version of Model Rule 3.8, which is the A.B.A.'s rule governing prosecutorial ethics (although
some jurisdictions have labeled this rule differently). n327 The near unanimous adoption of the Model Rules
suggests that state bar associations [*1271] would be capable of enacting uniform rules that limit
prosecutors' participation in the infiltration and surveillance of religious groups.
V. The Case for Revising State Bars' Ethical Codes
I propose that a new rule be added to the states' ethical codes for lawyers. In the forty-four states that follow
the template of the A.B.A. Model Rules of Professional Conduct, the new rule would appear as a subsection
of Rule 3.8, which regulates the conduct of prosecuting attorneys. The new rule would provide as follows:
"No prosecuting attorney shall supervise, advise, or otherwise take part in a criminal investigation
that involves the surveillance or infiltration of a religious organization, unless specific and articulable
facts provide a basis for suspecting criminal activity by the organization or one of its members."
In evaluating whether such a rule would be desirable, four questions arise. First, would this rule actually have
an effect on the conduct of police agencies? Second, is it appropriate for states' ethical codes to prescribe very
specific duties for prosecutors? Third, could states' ethical codes affect the conduct of federal prosecutors?
Fourth, would my proposal hinder investigations of terrorism? I will address each of these questions in turn.
2nc Solvency
Bar Association rules impose ethical guidelines on lawyers that prohibit racial or
religious discrimination.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
4. Unique Ethical Concerns for Lawyers
Additionally, prosecutors who take part in the surveillance and infiltration of religious organizations may
violate their ethical duties under various codes of professional conduct. Two categories of ethical rules come
into play: the rules imposing vicarious liability on prosecutors for the actions of law enforcement agents and
the rules prohibiting prosecutors from discriminating on the basis of religion.
The A.B.A. Model Rules of Professional Conduct include provisions imposing vicarious liability on lawyers
for the conduct of non-lawyers. Pursuant to Rules 5.3 and 8.4 of the A.B.A. Model Rules, a lawyer is
accountable for the conduct of a non-lawyer if the lawyer has directed, assisted, induced, or ratified that
conduct. n261 In fact, Alabama is the only state that has exempted prosecutors from vicarious liability for the
conduct of law enforcement officers. n262 In addition to the overarching standards of [*1257] vicarious
liability set forth in A.B.A. Model Rules 5.3 and 8.4, there are some rules that apply the same principles in
particular contexts. n263
Because prosecutors and law enforcement agents work closely together in the investigative phase, n264
prosecutors could theoretically become entangled in liability for the conduct of the officers. This vicarious
liability could arise even where the officer, if acting alone, would not be subject to any discipline. The key
question is whether the prosecutor has utilized the officer to do that which the prosecutor cannot himself do.
The ethical rules make clear that lawyers cannot take part in discriminating on the basis of religion.
For example, Rule 8.4(d) provides that a lawyer shall not "engage in conduct that is prejudicial to the
administration of justice ... ." n265 The commentary indicates that a lawyer violates Rule 8.4(d) when the
lawyer "knowingly manifests by words or conduct, bias or prejudice based upon race, sex, religion, national
origin, disability, age, sexual orientation or socioeconomic status," if "such actions are prejudicial to the
administration of justice." n266 Some states' ethical codes have gone even further than the A.B.A. template in
emphasizing the need for prosecutors to avoid prejudice based on religion. n267 The A.B.A. Code of Judicial
Conduct directs judges to prevent all lawyers from expressing religious prejudice in the courtroom. n268
Even stronger language appears in other bodies of rules that apply specifically to prosecutors. For example,
the A.B.A. Standards Relating to [*1258] the Administration of Criminal Justice, n269 which include a
section entitled "The Prosecution Function," strongly prohibit discrimination based on religion. Standard 33.1, entitled "Investigative Function of Prosecutor," provides in subsection (b) that "[a] prosecutor should not
invidiously discriminate against or in favor of any person on the basis of race, religion, sex, sexual preference,
or ethnicity in exercising discretion to investigate or to prosecute." n270 The American Trial Lawyers
Association's Code of Conduct also provides that "in exercising discretion to investigate," a prosecutor "shall
not show favoritism for, or invidiously discriminate against, one person among others similarly situated."
n271
Ethical rules prohibiting religious discrimination by lawyers are reinforced by other requirements for lawyers'
conduct in the courtroom. For example, Rule 610 of the Federal Rules of Evidence prohibits lawyers from
impeaching witnesses based on their religious views. n272 Also, lawyers in many jurisdictions are prohibited
from striking prospective jurors because of their religious beliefs. n273
The F.B.I.'s current policy of counting mosques throughout the United States and conducting surveillance
and infiltration of mosques without any specific suspicion arguably involves discrimination based on religion.
Indeed, in the new investigative guidelines, the Department of Justice has reserved the right for the F.B.I. to
infiltrate mosques even when there is no basis for suspicion other than the mere fact that the subjects under
investigation are Muslim. A prosecutor who directs such an investigation, or who ratifies it by
presenting charges based on information developed in the investigation, has arguably violated the
ethical rules against prejudice - either directly or indirectly through the doctrine of vicarious liability.
2nc Net Benefit --- Avoids Backlash
Solves the case – avoids backlash that would implicate Congress or Courts
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
In Part III, I will consider the alternative means for reinstating the suspicion requirement in investigations of
religious organizations. I will focus on four options: (1) statutory regulation; (2) judicial regulation; (3) internal
regulation by law enforcement agencies; and (4) regulation through states' ethical codes for lawyers. I will ask
a series of questions to evaluate whether each institution is well suited for the task. Does the institution have
sufficient expertise to promulgate rules for the investigative activities of prosecutors and law enforcement
agents? Could the institution establish an effective, uniform regulatory scheme? Is the institution willing to
undertake such regulation? After considering the expertise, efficacy, and willingness of each institution, I
conclude that state bar associations are in the best position to revive the "reasonable suspicion"
requirement in the Levi Guidelines. Other institutions could affect this reform more easily if they chose to,
but it is doubtful that Congress, the courts, or the Department of Justice would have the will to impose such
limitations in the present climate. State bar associations - with a higher membership of criminal defense
attorneys than prosecutors - may be the only forums in which the advocates of reform could prevail.
Part V will address possible objections to the proposal that state bars should regulate prosecutors'
involvement in investigations of religious groups. Anticipating concerns about the efficacy of my proposal, I
will explain that prosecutors increasingly serve as "gatekeepers" in proactive investigations. I will show that
ethical constraints on prosecutors have a transitive effect in limiting the conduct of police under the
prosecutors' supervision. I will cite the example of Oregon, where new ethical regulations for prosecutors
effectively shut down certain categories of proactive [*1210] investigations by F.B.I. agents. Further, in
response to scholars who criticize the micromanagement of prosecutorial ethics by state bars, I will argue that
the bars have a legitimate role to play in the interstices left by other bodies of authority. I will show why the
Supremacy Clause does not thwart state bars from regulating federal prosecutors. Finally, I will explain why
my proposal would not hinder investigations of terrorist cells and would actually improve such investigations
by fostering greater comity between the Muslim Community and law enforcement officials.
In sum, there is a good reason why three Republican and two Democratic administrations required a
predicate of reasonable suspicion before authorizing the surveillance and infiltration of religious organizations
by the F.B.I. Our religious freedom is too precious to sacrifice without at least a moment's reflection on the
quantum of evidence supporting the need for an investigation.
2nc Solvency – Terrorism
Regulations are good for terrorism investigations – requiring suspicion ensures that
the government doesn’t encroach on Constitutional rights or gather extraneous data.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
D. Would New Ethical Rules Impede Investigations of Terrorism?
It is true that terrorists have sometimes congregated in mosques, n374 and my proposal would be ill-advised
if it hindered law enforcement officers from investigating these terrorists. However, as explained below, the
reinstatement of the "reasonable suspicion" standard in a new ethical rule would not significantly impede the
detection of terrorist cells in the United States.
The F.B.I.'s experience with the Rahman investigation in the 1990s shows that the suspicion requirement
does not foreclose effective counterterrorism investigations. Indeed, the investigators of Rahman "encumbered" as they were by the suspicion requirement - achieved greater success than the F.B.I. has
achieved during the one-year period since Attorney General Ashcroft deleted the suspicion requirement. n375
An official with the Department of Justice admitted to Congress in May 2003 that the [*1282] authority to
infiltrate religious organizations without reasonable suspicion had not yet yielded a single lead that was
valuable enough for the F.B.I. to write in a report. n376
Some might fear that my proposal could create confusion about what sort of group would qualify as a
"religious organization" entitled to protection under the new ethical rule. How far from mainstream religious
groups would the line be drawn? The task of defining religion is always a daunting one, but it is a bridge that
we have crossed before when we determined the scope of the clergy-penitent privilege, n377 when we
determined who has authority to conduct marriage, when we determined who may claim a religious basis for
conscientious objector status, and when we determined which groups qualify for tax exemptions as religious
institutions. Importing definitions from these other contexts would go a long way in clarifying which groups
can qualify as "religious organizations" for purposes of the new ethical rule.
Even if we can agree on what constitutes a cognizable religion, how do we discern what constitutes a religious
institution (e.g., a building) that police should avoid unless they have reasonable suspicion? For example, it is
sometimes difficult to discern what is or is not a mosque. Not every mosque is located in a conspicuous
building. Some are located in small non-descript commercial buildings or even homes. n378 However, those
who worship in a [*1283] particular mosque or other religious facility should be given the discretion to
decide how conspicuously they will label the facility. If they opt for a nondescript appearance, they run the
risk that the F.B.I. would not accord the building the same privacy rights as an easily recognizable religious
institution. Of course, the F.B.I. cannot be heard to complain about its inability to discern what is or is not a
mosque when field offices were instructed to complete an inventory of every mosque in country at the start
of 2003.
Another frequently voiced concern is that terrorists will utilize mosques as "havens" that are free from
government surveillance. Many commentators have insisted that terrorists should not be able to hide behind
the "shield" of religion. n379 This concern should not detain us long. In order to permit infiltration of a
religious organization, my proposal would require only a minimum level of suspicion. In fact, under the Levi
Guidelines, the F.B.I. could easily infiltrate a religious organization simply by explaining a valid purpose for
the infiltration. As James Dempsey told Congress in May 2003:
the old guidelines allowed F.B.I. agents to go into any mosque or religious or political meeting if there was
reason to believe that criminal conduct was being discussed or planned there, and in fact, over the years the
F.B.I. conducted terrorism investigations against a number of religious organizations and figures. n380
In other words, if F.B.I. agents could ever think of a good reason to go to a religious service, they
could go - just as long as they did not target a particular organization for reasons such as religious profiling
or the purposeful suppression of First Amendment rights. n381
In a speech at Stanford Law School, F.B.I. Director Robert Mueller asked a rhetorical question: "When, if
ever, would it be appropriate to put leaders of Muslim mosques under surveillance? Are calls to kill
Americans in [*1284] strident sermons a lawful exercise of free speech or something more ... ?" n382
Mueller's inquiries seemed calculated to suggest a justification for the F.B.I.'s new authority to infiltrate
religious groups. Yet Mueller failed to mention that the F.B.I. could have monitored such speeches under the
old F.B.I. guidelines because the speeches advocate lawbreaking and, ipso facto, give rise to a reasonable
suspicion of criminal activity. n383 The investigation of Arizona churches - which by all accounts was based
on a permissible factual predicate under the old investigative guidelines - was justified by church leaders'
public pronouncements of their support for the Sanctuary Movement. Just as the old guidelines were not too
constraining for the investigation of immigration offenses, they would not be too constraining for the
investigation of terrorism. The small subset of mosques where leaders advocate criminal activity would not be
immune from the F.B.I.'s surveillance under a new rule that reinstated the "reasonable suspicion"
requirement.
2nc Solvency – Police
The counterplan solves best – constraining prosecutors inherently restricts police
abilities to conduct unwarranted surveillance.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
A. The Efficacy of Regulating Lawyers Rather than Police
The notion that ethical rules for prosecutors could limit activity by the entire "team" of law enforcement
agencies - including non-lawyers such as police officers - may seem fanciful on first impression. But in fact,
prosecutors are so vital to the investigation of complex criminal cases that any ethical restrictions on
prosecutors will have a substantial effect on police.
Especially in the federal system, prosecutors play a significant role in supervising proactive investigations.
n328 As Professor Rory Little has noted, "public prosecutors in this country have become increasingly
involved in the investigative stages of criminal matters during the twentieth century." n329 According to
Professor Little, "prosecutors today are centrally involved in proactive criminal investigations." n330 So great
is the involvement of [*1272] prosecutors in the investigative phase that the Supreme Court has conferred
immunity on prosecutors for their good-faith investigative decisions. n331
Consider the many ways in which prosecutors serve as gatekeepers in proactive investigations. Prosecutors
must sign off on the use of certain investigative techniques so that officers will avoid the risk that evidence
generated by such techniques will be suppressed in court. n332 Prosecutors must actually prepare requests for
judicial approval of certain highly intrusive techniques such as pen registers, wiretaps, and mobile tracking
devices ("bumper beepers"). n333 The involvement of prosecutors is necessary to present a search warrant to
a judge, or to obtain a grand jury subpoena for testimony or records. n334 Prosecutors must generally prepare
subpoenas for records, except in jurisdictions where police can use administrative subpoenas. The approval
of prosecutors is usually necessary before investigative agents can offer leniency to co-conspirators as an
enticement for cooperation. Police need the assistance of prosecutors in order to navigate the minefields of
entrapment and selective prosecution. Sometimes police need guidance from prosecutors to determine
whether a suspect under investigation has actually violated the law, and if so, whether the case fits the
prosecutorial guidelines in a particular jurisdiction. Further, officers need to rely on prosecutors for advice
about civil liability that may arise from the use of certain investigative techniques. n335 Perhaps the best
testament to the ascendancy of prosecutors in the investigative phase is the fact that a former Assistant U.S.
Attorney, Robert Mueller, is now the director of the F.B.I.
Among the various categories of criminal investigations, investigations of terrorism are particularly likely to
require the close involvement of prosecutors. The criminal statutes at issue are novel, and police officers are
usually less familiar with these statutes than with statutes in garden-variety cases involving drugs or violent
crime. Terrorism investigations may necessitate the use of special investigative techniques requiring the
assistance or approval of prosecutors, such as electronic surveillance and Foreign Intelligence Surveillance
Act (FISA) warrants. Moreover, due to the [*1273] high profile and high stakes of terrorism investigations,
police are particularly concerned not to run afoul of the law, and they will rely on the frequent advice of
prosecutors to avoid any embarrassing mishaps.
Because officers are so highly dependent on the involvement of prosecutors in proactive investigations, it
should come as no surprise that constraints on prosecutors often have the transitive effect of
constraining the police officers involved in a particular investigation. The best example of this
phenomenon is the recent experience of Oregon, where the state supreme court construed an ethical rule to
prevent prosecutors from supervising undercover investigations. In the case In re Gatti, n336 the court
interpreted DR 1-102(A)(4) of the Oregon Code of Professional Responsibility, which prohibits a lawyer
from "engaging in conduct involving dishonesty, fraud, deceit or misrepresentation." n337 The court
determined that this language prevented prosecutors from supervising investigations in which law
enforcement officers posed as participants in criminal activity, such as drug users seeking to buy drugs from a
target under investigation. n338 The Oregon State Bar eventually revised DR-102 to make clear that
prosecutors could supervise such investigations, and the Oregon Supreme Court approved this change. n339
But in the meantime, for the two- [*1274] year period in which "the Gatti rule" remained in effect, proactive
criminal investigations ground to a halt in Oregon. F.B.I. Agent Nancy Savage, the Special Agent in Charge of
the F.B.I. office in Eugene, Oregon, commented on a national television broadcast that the Gatti rule had
"shut down major undercover operations" in Oregon. n340 In summary, as defense attorneys sometimes
joke, the prosecutor is "the head of the snake" in proactive investigations: without the prosecutor, the
investigation cannot proceed.
The foregoing provides cause to believe that law enforcement agents would reduce their suspicionless
surveillance and infiltration of religious organizations if the ethical rules prohibited prosecutors from
taking part in an investigation where such techniques were used, yet there is one other possibility that
should be considered. What if the increased regulation of prosecutors actually drove a wedge between
prosecutors and police? Perhaps prosecutors would become isolated from investigative decisions, so police
would be free to pursue all the investigative options that would be available to them but for the prosecutors'
supervision. Some scholars have expressed concern that any disparity in the regulation of prosecutors and
police could create a rift between them, n341 leading police to strike out on their own without the benefit of
prosecutors' advice and moderating influence. This possibility requires special consideration in the context of
terrorism investigations because the Department of Justice has made clear that its top priority is the
prevention of terrorism, rather than the prosecution of terrorism n342 - a change in emphasis that arguably
could reduce the dependence of police on prosecutors.
There are reasons, however, to believe that the close cooperation between prosecutors and police would
persist even if prosecutors are subject to stricter rules than police. First and foremost, police need prosecutors
to unlock the door to the closet where the most valuable investigative tools are kept: wiretaps, FISA warrants,
grand jury investigations, plea agreements offering leniency in exchange for cooperation, etc. The heightened
importance of these tools in terrorism investigations offsets the fact that [*1275] officers are somewhat less
beholden to prosecutors because the investigations rarely culminate in prosecutions.
The prosecutor is more than the superego to the police officer's id; the prosecutor is an indispensable
teammate in complex proactive investigations. Stricter regulation of prosecutors will not cause the
divorce of prosecutors and police - especially when the effect of that regulation is simply to impose the same
"reasonable suspicion" requirement that federal agents have lived with for the last twenty-six years.
2nc Solvency – Specific Rules
The counterplan’s specific rules are key – they allow comprehensive regulation to
ensure compliance.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
A third view - adopted in the present Article - is that the states' ethical codes should include specific
rules regulating the interstices where other bodies of law do not extend. Without such specific rules,
state bars have little hope of asserting control over the conduct of the lawyers in their jurisdictions. Hortatory
rules are difficult to enforce, n348 and rules that "backstop" other authority are usually of greater concern to
the first authority than to the state bar. Specific rules are easier for practitioners to understand. Another
advantage of specific rules is that they allow a jurisdiction to establish a comprehensive, internal
cohesive regulatory scheme. On the other hand, a code of ethics that includes specific regulations will take
more time to draft, will cost more to administer, and will likely be more voluminous than a code that sorts
forth general principles. In the end, the debate over specificity really boils down to a debate over efficacy. If
the state bars are to be effective regulators, they need specific bright-line rules.
Nowhere is the need for specific rules more evident than in the state bars' regulation of prosecutors. The
states have very few specific rules for prosecutors, n349 and this lack of specificity is one of the reasons why
very few [*1277] disciplinary cases are brought against prosecutors. n350 A greater number of specific
regulations for prosecutors would be salutary for a number of reasons. First, a particularized set of rules for
prosecutors would embolden state disciplinary panels to exercise their authority over prosecutors. Presently
the state bars find the regulation of prosecutors to be somewhat intimidating. The bars' disciplinary panels are
daunted by the prospect of "prosecuting a prosecutor." It would be far easier for bar authorities to assume
that function if the states' ethical rules for prosecutors were specific and lucid, leaving little dispute as to the
propriety of the conduct at issue in a disciplinary proceeding. As Professor Bruce Green and Professor Fred
Zacharias have noted, state bar associations are unlikely to discipline prosecutors "except in situations
involving unambiguously wrongful conduct." n351 Similarly, the U.S. Department of Justice's Office of
Professional Responsibility (OPR) - which disciplines federal prosecutors for violations of all applicable rules,
including state bar rules - will have less difficulty applying states' ethical rules if these rules are specific rather
than hortatory. n352
A second argument in favor of specific rules is that they actually help prosecutors. Many prosecutors
supervise long-term, proactive investigations that will not come under public scrutiny for months, maybe
years. Without bright-line ethical rules, these prosecutors cannot be certain how their conduct will be viewed
when they finally unveil their cases after the defendants are arrested. The ethical responsibilities of
prosecutors at the investigative stage are vital, but self-policing is the only means of securing compliance
at this stage. Bright-line rules increase the effectiveness of self-policing.
One last justification for greater specificity in states' regulation of prosecutors is the need to avoid disparity
between the rules for federal and state prosecutors. If the state bar plays only a minimal role in regulating
the ethics of prosecutors practicing within its boundaries, then the federal and state prosecutors will be
governed primarily by the internal strictures of their own agencies. These rules will probably differ in many
ways, and these differences could invite the unseemly prospect of "ethics shopping" by law enforcement
officers whose decision to pursue a prosecution in state or [*1278] federal court could depend in part on the
ethical rules applicable to prosecutors in each system.
AT: State Rules Won’t Solve Federal Prosecutors
The mandates would of the counterplan will solve federal surveillance efforts --federal prosecutors would not be able to evade it
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
C. A Chink in the Armor of the Supremacy Clause
Ordinarily the Supremacy Clause of the U.S. Constitution protects federal officials from regulation by the
states. For example, the Supremacy Clause places F.B.I. agents beyond the reach of state and local laws
limiting the surveillance powers of police. Earlier in 2003, when a defendant in a federal terrorism
prosecution claimed that a federal agent had not complied with a state rule limiting surveillance of churches,
the Assistant U.S. Attorney quickly brushed aside the argument by invoking the Supremacy Clause. n357
[*1279] Curiously, however, Congress has waived federal prosecutors' immunity from state regulation. The
legislation that subjected federal prosecutors to states' ethical codes is known as the McDade Act of 1998.
n358 This law provides that an attorney for the U.S. Department of Justice "shall be subject to the State laws
and rules, and local Federal court rules, governing attorneys in each State where such attorney engages in that
attorney's duties, to the same extent and in the same manner as other attorneys in that State." n359 Congress
passed this legislation in response to concerns that federal prosecutors had abused their authority in
investigating Representative Joseph McDade, who was tried and acquitted on charges of racketeering and
bribery. n360
The proponents of the McDade Act made clear that they intended for states to take over the regulation of
federal prosecutors' ethics. For example, Representative Tillie Fowler made the following statement on the
House floor:
I see this as an issue of accountability. Department of Justice attorneys should be required to abide by
the same ethics rules as all other attorneys. These attorneys should be held accountable to the same
standards set by the State Supreme Court that granted each lawyer his or her license to practice law in that
State. n361
Representative Steve Buyer presented a similar viewpoint: "Quite simply the issue before us is whether the
government attorneys at the Department of Justice should abide by ethical rules that all other attorneys have
to abide by, or can they make up their own standards of conduct?" n362 Congress emphatically answered this
question, requiring the Department of Justice's attorneys to observe the ethical rules of every state in which
they practice. n363
Despite this unequivocal expression of congressional intent, the Department of Justice has attempted to
evade certain state rules by challenging the rules under the Supremacy Clause. For example, in United
States v. Colorado Supreme Court, n364 the Tenth Circuit considered whether federal prosecutors must
abide by Colorado's attorney-subpoena rule. The Tenth Circuit held that the resolution of this challenge
would "turn[] on whether the rule is a rule of professional ethics clearly covered by the McDade Act, or a
substantive or procedural rule that is inconsistent with [*1280] federal law." n365 The Tenth Circuit found
that Colorado's attorney-subpoena rule fell within the former category. Therefore, the attorney-subpoena rule
was "a rule of ethics applicable to federal prosecutors by the McDade Act." n366
One year later, the Department of Justice brought a similar challenge in United States v. Oregon State Bar.
n367 The Department argued that federal prosecutors were not subject to a provision of the state ethics code
that the state supreme court had construed to prohibit prosecutors from supervising deceptive undercover
investigations. n368 The Justice Department claimed that such a rule conflicted with federal law, n369 but the
bar's attorneys analogized the case to Colorado Supreme Court, suggesting that internal Justice Department
guidelines authorizing deceptive investigations do not preempt state regulation on this issue. n370 The
District Court avoided a decision on this issue for over a year because the state bar decided to revise the rule
in question. Observers thought that the Justice Department's position must have been weak because
otherwise the court would have granted the Department's motion for summary judgment instead of
postponing a decision for over a year.
The rule proposed in this Article would also fall within the scope of the McDade Act. There is no on-point
federal statute or regulation that would conflict with a state ethical rule prohibiting prosecutors from directing
surveillance and infiltration of religious organizations absent reasonable [*1281] suspicion. n371 The mere
fact that such suspicionless investigations are not prohibited in the federal system is a far cry from
preemption. For instance, attorney subpoenas are not prohibited in the federal system, but federal
prosecutors are still subject to state ethical rules that limit the use of these subpoenas. n372 In an analogous
context, while the federal regulations promulgated under the Sarbanes-Oxley Act permit attorneys to disclose
clients' confidences in some circumstances, the attorneys are nonetheless subject to state ethical rules that
prohibit such disclosures. n373 In sum, an activity permitted under federal law is not necessarily off-limits to
regulation in states' ethical codes - especially where, as here, Congress has declared its intention to subject
federal prosecutors to the states' ethical regulation.
AT: Congress Solves
Congress fails – lacks expertise and links to politics.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
A. Statutory Regulation
Conceivably, Congress or state legislatures could impose a "particularized suspicion" requirement akin to the
test set forth in the Levi Guidelines. n290 Indeed, some state legislatures have already enacted statutes along
these lines. n291 Several commentators have expressed enthusiasm for an increased legislative role in the
regulation of prosecutors n292 and law [*1263] enforcement agencies, n293 yet such a strategy is also
subject to criticism on a number of grounds.
First, the expertise of the legislative branch is not ideal for this undertaking. Among the alternative regulators
considered here - the legislative branch, the courts, the Department of Justice, and state bars - the legislative
branch is the only institution in which non-lawyers outnumber lawyers. Perhaps for this reason, Congress has
usually refrained from assuming much responsibility in the regulation of prosecutors and law enforcement
agencies. n294 Congress declined to enact a legislative charter for the F.B.I., and Congress deferred to the
Department of Justice to formulate its investigative guidelines internally. n295 Congress also declined to
prescribe ethical standards for federal prosecutors, determining instead that prosecutors should be subject to
the ethical rules in state bar codes. n296 This history suggests that Congress acknowledges its own limited
expertise in setting parameters for federal criminal investigations. n297
Second, it is unclear whether the legislative branch has the will to restrict the authority of prosecutors and law
enforcement agents. Very few in Congress have shown the political fortitude to question the [*1264]
counterterrorism campaign. Proposals to amend the USA PATRIOT Act have not attracted many cosponsors. n298 While the cause of religious freedom is popular on both sides of the aisle, n299 this instinct is
offset by the general tendency among legislators to side with the prosecution rather than the accused. n300
Even if these two considerations were close to equipoise, the tiebreaker may be the loyalty commanded by
President Bush in the current Congress. It is highly unlikely that a congress controlled by the president's own
party would seek to rein in (and thereby embarrass) an executive agency with a presidential election looming
in 2004.
Third, the efficacy of legislative regulation may be somewhat limited. Congress and state legislatures have
only limited resources available for proactive oversight, and the normal means of ensuring compliance
with their laws (i.e., litigation brought by the federal or state departments of justice) would be of little avail
when these agencies are themselves the subjects of the regulation in question. Another important
limitation is the inability of Congress to regulate the state criminal justice system, n301 and the [*1265]
inability of state legislatures to regulate the federal criminal justice system. n302 It is likely that an undesirable
patchwork n303 could result from legislative regulation - especially given the varying willingness of legislative
bodies to constrain the authority of law enforcement agencies.
AT: Courts Solve
Courts can’t solve – they’re biased, reluctant to play a regulatory role, and usually
conduct haphazard regulation.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
B. Judicial Regulation
Some scholars favor an increase in judicial regulation of prosecutors and law enforcement officials. n304
There are three possible means through which the judicial system could limit the surveillance and infiltration
of religious organizations. First, the courts could suppress evidence seized through such investigations.
Second, the courts could grant injunctive or declaratory relief prohibiting such investigations proactively.
Third, the courts could simply prescribe standards for prosecutors or law enforcement officers that appear
before them; the power to regulate in this manner might arise from the courts' inherent supervisory power, or
from a delegation of power by Congress. n305
The expertise of the judiciary in dealing with these issues is unquestionably superior to the expertise of the
legislative branch, and is likely superior to the expertise of state bar associations as well. Judges' day-to-day
involvement in the criminal justice system gives them a unique [*1266] vantage point from which to
observe, and perhaps also to regulate, the conduct of prosecutors and law enforcement agents. Furthermore,
the life tenure of federal judges makes them immune to political pressure (except those who seek
appointment to a higher court), yet the risk of bias does not disappear if the judiciary takes over
responsibility for prescribing the rules for prosecutors and law enforcement personnel. In fact, the
very reason for judges' expertise - their immersion in the day-to-day adjudication of criminal cases - also
creates the potential that courts might craft rules that favor the courts' interests in this system. n306
Would courts be willing to take on a greater role in regulating prosecutors and law enforcement personnel?
Federal courts have busy dockets and finite resources. State courts are even more burdened. When
presented with an opportunity to play a proactive regulatory role in the criminal justice system, some courts
have declined to do so. In particular, federal courts have been wary of involving themselves in the affairs
of state and local police departments. Despite - or perhaps because of - a few highly publicized examples
in New York City and Chicago, the federal courts appear to be reluctant to set standards for local law
enforcement agencies. In Rizzo v. Goode, the Supreme Court vacated a federal district court's order
prescribing steps for the Philadelphia Police Department to remediate abusive practices. n307 Among other
reasons for this ruling, the Supreme Court argued that a federal court should not intervene deeply in the
internal affairs of a local agency, especially one concerned with law enforcement. n308
The efficacy of judicial regulation is the biggest stumbling block for this alternative. When courts take a
passive approach to regulating the conduct of prosecutors and police - i.e., when courts simply wait to
adjudicate suppression motions and civil lawsuits that litigants might present - the regulatory scheme takes
a long time to emerge, and its coverage is more haphazard than uniform. Another problem is that
because many of the arguments against the expanded surveillance of religious groups are not constitutionally
cognizable, n309 courts will rarely be able to grant the relief sought by petitioners. Finally, the recent
relaxation of the restrictions imposed by the consent decrees in Handschu and Alliance to End Repression
indicates that judicial regulation is more malleable than some civil libertarians would prefer.
AT: DoJ Solves
The Department of Justice fails – self-determination means that regulatory
government agencies would prioritize personal interests.
Lininger, 4 – Assistant Professor at the University of Oregon School of Law (Tom Lininger, 89 Iowa L.
Rev. 1201, “Sects, Lies, and Videotape: The Surveillance and Infiltration of Religious Groups,” April 2004,
Lexis, *fc)
C. Internal Regulation by Law Enforcement Agencies
Some commentators believe that the Department of Justice and other law enforcement agencies should have
the primary responsibility for regulating the conduct of their employees. n310 According to this view, no
regulatory authority is better suited to determine the proper requirements for prosecutorial and investigative
activities (including infiltration of religious groups) than the agencies that conduct these activities.
There can be little question that law enforcement agencies have the requisite expertise to formulate such
rules. Professor Roberta K. Flowers argues that the Department of Justice is better qualified than any other
institution to play this role, n311 due in part to the Department's unique familiarity with the prosecutorial and
investigative functions, and due to the Department's access to fast-breaking information about the latest
exigencies in investigating terrorism. The very reason for this expertise, however, is the Department's direct
stake in the matters to be regulated. That self-interest could lead (and arguably has led) to a regulatory
regime that favors the Department's interests over competing concerns such as the protection of
civil liberties. Professor Fred Zacharias and Professor Rory Little fear that the Department's institutional
interests could compromise its objectivity as a regulator of prosecutorial ethics. n312 Granting the Attorney
General exclusive authority to regulate the ethics of federal prosecutors is tantamount to allowing "the fox to
guard the hen house." n313
Would autonomous law enforcement agencies be willing to ratchet up their own internal regulations? On the
federal level, it seems unlikely that Attorney General Ashcroft would reinstate a suspicion requirement that he
has so ardently opposed for the last year. On the local level, police departments seem even less fond of red
tape than their federal counterparts. Vesting law enforcement agencies with self-determination may
actually remove any incentive they have for self-regulation. In the past, they have proposed additional
self-regulation in order to avert the risk of more drastic [*1268] regulation by other bodies, not because the
law enforcement agencies have actually sought greater regulation in the first place.
The last problem with exclusive reliance on an internal regulatory scheme is the limited efficacy of such a
system. Internal guidelines for prosecutors and law enforcement agents generally are not enforceable by
outsiders - and certainly not by criminal defendants who might seek to invoke these provisions as protection
of the defendants' rights. Since 1983, the Justice Department's investigative guidelines have included language
making clear that they are not enforceable in court, n314 and they are not grounded in law that is itself
enforceable. n315 Also, the United States Attorney's Manual is not enforceable in court. n316 Even if these
bodies of law were somehow enforceable, they might prove evanescent. In most instances, internal
regulations can be changed overnight with the stroke of a pen by a single official. n317 In fact, that is
precisely what happened when Attorney General Ashcroft promulgated the new set of investigative guidelines
in May 2002. Thus, there appears to be a number of strong reasons why the internal regulations of law
enforcement agencies do not provide the best vehicle to reinstate the "reasonable suspicion" rule for
infiltration of religious organizations.
S-6 Visas CP
1nc S-6 Visas CP
Text: the United States federal government should revise the S-6 visa requirements to
--increase the number of available visas
--protect the informants’ civil liberties
--abolish the danger of retaliation
--abolish the requirement than an informant be eligible for a monetary reward
These revisions should require that the informants possess critical intelligence prior
to agreeing to inform.
Counterplan solves – encourages cooperation and increases the quality of
information
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
With fewer bargaining options, less protection, and potentially more to lose n29 than informants recruited through
monetary incentives or promises of sentence reductions, there is greater incentive for informants "flipped" n30 via [*241] immigration
violations to provide unreliable information. Furthermore, due to the latitude afforded to the executive branch in national security matters, there
is a darker veil of secrecy shrouding measures for recruiting terrorism informants than for other types of
informants. n31 Immigration status offers a valuable way for the FBI to elicit cooperation and collect
intelligence from individuals who otherwise would not be forthcoming. However, this method for collecting intelligence
can prove counterproductive when indiscriminately applied to situations where the informants lack useful connections to terrorist groups. Decreased intelligence benefits,
lack of protection for informants, and increased ethnic and religious profiling suggest that changes to how the FBI recruits terrorism informants with immigration threats
and rewards are needed. While the FBI appears to recruit most terrorism informants through informal means, an
existing visa program already
formally offers immigration benefits to informants in exchange for their cooperation with terrorism
investigations. As part of the Violent Crime Control and Law Enforcement Act of 1994, n32 Congress specifically designed the S-6 visa to attract and reward
immigrants who were willing to cooperate by giving terrorism intelligence. n33 However, given the small number of S-6 visas issued, the
program likely fails to meet the FBI's intelligence recruitment needs. The fifty allotted S-6 visas per year n34 do not match up with
the number of informants (fifteen thousand) used by the FBI. n35 In order to qualify for the S-6 visa, an informant must also meet the eligibility requirements of the
Department of Justice's Rewards for Justice Program, a separate program designed to elicit and monetarily reward terrorism intelligence. n36 Lastly, access to the S-6 visa is
further restricted by the requirement that the informant be subject to danger if he or she is returned to his or her home country. n37 Since
the FBI has long
used immigration law as an incentive to compel terrorism informants to act, it has little motivation to use a
rewards program that presents additional barriers. The stringent eligibility requirements to obtain an S-6 visa explain its ongoing underuse. n38
[*242] This Comment proposes the S-6 visa requirements should be modified in a way that encourages trust and
cooperation from informants by allowing informants to enforce their bargains with the FBI. A legislative
overhaul that emphasizes pre-existing ties to terrorist organizations, increases the number of available visas,
and lowers the barriers to the S-6 visa's use would produce more reliable and actionable intelligence, and
provide greater protection for the informants' civil liberties and free speech. Congressional oversight of
the FBI's use of S-6 visas would also provide a valuable check on the FBI's largely unlimited control over
terrorism informants.
Part I examines the differences between the FBI's historical use of informants in investigating crimes such as drug smuggling and prostitution and the FBI's current use of informants investigating terrorism. Part II discusses how the use of immigration law to recruit informants, as well as the presence of informants in Muslim and Middle Eastern communities, chills free speech and encourages religious and ethnic profiling. Part II also addresses how the FBI's use of immigration law
to recruit terrorism informants heightens the risk of false intelligence and increases the possibility of entrapment and prosecution of individuals who do not pose a true threat. Part III looks at limitations of the FBI's recruitment and use of informants, and analyzes the failure to protect informants from abuse by handlers and constrain the FBI's actions. Part IV explains the S-6 visa requirements and advises increasing the congressional allotment of S-6 visas and modifying the eligibility requirements to improve their efficacy in terrorism investigations. Finally, Part V concludes that a modified S-6 visa
program will result in better relationships between law enforcement and the Muslim and Middle Eastern communities, less encroachment on civil rights, and ultimately, more effective counterterrorism investigations and prosecutions. I. Background: Traditional Informant Use Versus Modern Use in Terrorism Investigations Despite the FBI's long history of problematic relationships with informants, n39 both Congress and the Department of Justice - the FBI's parent agency - provide very little oversight of FBI informants. The lack of transparency, control, and accountability give the FBI almost
unlimited power over how it recruits, handles, and rewards informants. n40 In particular, because of the greater secrecy afforded to national security investigations, the use of terrorism informants presents unique problems not present in traditional, nonterrorism use of informants. [*243] The use of informants in terrorism investigations differs in several ways from their use in the investigation of domestic crimes like smuggling, prostitution, and financial impropriety. Although the FBI has been using informants to conduct investigations since the agency's inception, n41 informants were traditionally
used to investigate "victimless" crimes such as white-collar crimes n42 and crimes dealing with prostitution, drugs, and corruption. n43 Informants proved especially useful in those cases because all parties to the crime were usually guilty and not likely to inform authorities, making it difficult for law enforcement agents to discover the crime on their own. n44 Consequently, because individuals already part of the criminal organization or conspiracy had the trust and confidence of the organization and could provide the most useful information to law enforcement over a longer period of time, the FBI
has generally recruited informants in these investigations from the inside. The FBI's "Top Echelon" informant program, for example, sought to recruit high-ranking members of the mafia as informants. n45 Notably, however, even the FBI's traditional method of recruiting informants from within the criminal organizations resulted in false intelligence and botched cases. n46 While there are no detailed studies on the differences between terrorism informants and traditional informants because the FBI keeps most of this information confidential, n47 broad observations can still be made. First, the
FBI's preventative stance on terrorism has significantly increased reliance on informants' intelligence. n48 After 9/11, the FBI drastically expanded the use of [*244] informants n49 from around 1,500 in 1975 n50 to an estimated 15,000 today. n51 Informants have become the number one tool for preventing terrorist acts. n52 Second, law enforcement dealings with terrorism informants receive greater deference from courts and other limiting actors because terrorism is considered a national security matter instead of simply a domestic law enforcement matter. n53 The executive branch has greater
control over national security and foreign intelligence matters than over domestic law enforcement, an area traditionally reserved to the states. n54 Thus, the post-9/11 characterization of terrorism as a national security matter results in courts affording more leeway to terrorism investigations than domestic criminal investigations. n55 In other words, the federal government is afforded more secrecy in matters of national security. n56 Hence, because the government can invoke national security concerns to keep information about the informant and handler privileged, there is less regulation governing
the recruitment and handling of terrorism informants than traditional criminal informants. n57 [*245] Third, while false and inaccurate intelligence has generally been a problem with informants, n58 recent terrorism investigations raise the question of whether the alleged terrorist crimes would have occurred without law enforcement instigating the terrorist activities. n59 Informants in these cases aggressively instigated the defendants' participation in the plot. n60 Recruiting informants who lack ties to terrorist organizations may be at the root of this problem, because they lack predetermined targets
known to be involved in terrorist groups. n61 Without these targets, informants under pressure to avoid deportation or other immigration consequences, for example, are more likely to produce false information. n62 Further complicating this issue, the government has suffered from credibility problems in terrorism investigations for not always fulfilling the promises made to informants. n63 One FBI informant, a Yemeni citizen named Mohamed Alanssi, set himself on fire in front of the White House after alleging that the FBI had broken numerous promises to him. n64 Governmental credibility is
critical to maintaining a relationship of trust between law enforcement and informants, and thereby facilitates the gathering of credible intelligence. Due to the vast number of terrorism informants today, the secrecy underlying the investigations, n65 and the potential for false intelligence, the recruitment and use of informants in terrorism investigations present unique problems to the FBI. Because of increased confidentiality surrounding national security issues, the government has the means and incentives to shield the true extent of its recruitment and use of terrorism informants from courts and the
public. n66 To increase accountability and lessen the risk of abuse, more oversight over the FBI's dealings with terrorism informants is needed. Notably, some limits on the FBI's use of informants do exist. However, given the secrecy [*246] surrounding national security concerns, whether these limits apply in terrorism investigations remains unclear. II. Problems with Recruiting Informants Based on Immigrant Status The FBI's use of immigration rewards and threats to recruit informants undermines civil liberties and cooperation with Muslim, Middle Eastern, and other immigrant communities. n67
In general, the presence of informants in mosques and the surrounding community creates suspicion and distrust of law enforcement efforts, chilling free speech. That is, when community members know that informants are potentially monitoring their speech, community members are less likely to cooperate with law enforcement efforts. Furthermore, by sending informants into Muslim and Middle Eastern communities without specific targets to surveil, the FBI encourages ethnic and religious profiling and helps conflate Islam and terrorism in the public eye. Because informants recruited via
immigration law possess less bargaining power and face potentially more serious consequences than those recruited via criminal law incentives, there is greater incentive for these informants to supply false information and accuse innocent individuals. Ethnic and religious profiling, combined with the indiscriminate surveillance carried out by informants, can entrap individuals who do not pose a threat. Entrapment wastes government resources and undermines public confidence in the justice system and law enforcement. Although the FBI's problematic surveillance of Muslim and Middle Eastern
communities stems from the use of all types of informants and not merely those recruited with immigration promises, a modification to the use of immigration law in rewarding or coercing terrorism informants would provide a step toward producing more useful intelligence and reducing the risk of harm to innocent individuals. A. Mosque Surveillance Chills Free Speech In 2002, Attorney General John Ashcroft updated the Attorney General's FBI Guidelines, n68 and did away with restrictions on entering mosques and other places of worship. n69 The Guidelines read in pertinent part: "For the
purpose of [*247] detecting or preventing terrorist activities, the FBI is authorized to visit any place and attend any event that is open to the public, on the same terms and conditions as members of the public generally." n70 Thus, FBI agents can now enter any mosque or attend any religious gathering without probable cause. Under the previous Guidelines, issued in 1979 by Attorney General Benjamin Civiletti, an agent could only conduct an investigation where "the facts or circumstances reasonably indicate that two or more persons are engaged in an enterprise for the purpose of furthering the
political or social goals ... through activities that involve force or violence and a violation of the criminal laws of the United States." n71 In the past, the FBI's Domestic Investigations and Operations Guide ("DIOG"), which provides guidance on implementing the Attorney General's Guidelines, allowed supervisory agents to delegate to inferior agents decisions concerning the surveillance of mosques and other religious gathering places. n72 Recently, however, restrictions have been slightly strengthened by requiring agents in charge of the field operations to approve surveillance. n73 Nevertheless,
this change may not really improve matters, as numerous instances of mosque surveillance have already eroded Muslim communities' trust of law enforcement. n74 By placing informants in places of worship and cultural spaces, the FBI has chilled free speech and damaged the most reliable way of obtaining accurate terrorism intelligence from these communities. In a well-publicized and egregious case, an FBI informant named Craig Monteilh was assigned to surveil a mosque in Irvine, California. n75 The FBI instructed Monteilh, a convicted felon working as a paid informant, n76 to [*248]
indiscriminately surveil worshippers at the mosque, without concentrating on a particular target or activity. n77 After congregants noticed Monteilh's inflammatory rhetoric and repeated talks about instigating terrorism, they reported him to the FBI. n78 The FBI failed to investigate further, and after the arrest of another suspected terrorist, Monteilh revealed his identity as an FBI informant. n79 This incensed the Islamic community, in part because an FBI Assistant Director had promised a year earlier that the agency would not surveil mosques. n80 In response, Islamic groups like the Council on
American-Islamic Relations and the American Muslim Task Force on Civil Rights and Elections, which had previously cooperated with the FBI and urged community members to do the same, reversed course and stopped their outreach efforts to aid law enforcement. n81 In the end, Craig Monteilh's story is just one of many that demonstrate why Muslim communities have soured on helping the FBI locate suspicious people within their communities. n82 Although Monteilh was neither an immigrant nor was offered immigration incentives in return for intelligence, his story shows how the use of
informants can potentially damage both law enforcement and immigrant communities. Monteilh's story also illustrates why many communities feel mosque surveillance infringes on their freedom of speech. Once a community becomes aware that FBI informants may be surveilling its mosques, the fear that informants will target them chills the free exchange and expression of ideas and speech. n83 Given the constitutional guarantees of the First Amendment, places of worship should be treated with utmost sensitivity by law enforcement, n84 as the self-editing that occurs when people know they are
being watched curtails the free exchange of ideas. The very knowledge of potential surveillance may caution people against discussing their political and religious viewpoints for fear of being targeted by informants like Monteilh. Consequently, mosque attendance falls n85 and community cohesion suffers, thwarting the First Amendment's protection of free expression. Even those not harboring extreme viewpoints may be [*249] dissuaded from political speech for fear of misinterpretation. For example, after revelations of potential FBI surveillance surfaced at the Islamic Center of Irvine, congregant
Omar Turbi attested, "It gives you a little bit of apprehension about who you trust ... . Makes you think twice about what you say; what if people misunderstand you?" n86 Similarly, the executive director of the Council on American-Islamic Relations in Anaheim stated, "Some average Muslims interested only in praying are avoiding mosques for fear of somehow being monitored or profiled ... . Everybody is afraid, and it is leading to an infringement of the free practice of our religion." n87 Although some states like Indiana, Pennsylvania, and Oregon have enacted laws prohibiting the surveillance of
religious sites without reasonable suspicion, n88 it should not be necessary to rely on state laws to protect the integrity and values of the First Amendment. B. Mosque Surveillance Encourages Religious and Ethnic Profiling In addition to eroding the First Amendment's free speech rights of Muslims and Middle Easterners, the FBI's informant surveillance tactics also inappropriately target these religious and ethnic groups. Most of the organizations designated as Foreign Terrorist Organizations by the State Department are Muslim or Arab groups. n89 Many post-9/11 policies, like the extensive
detention of Muslims and Middle Easterners, indicate that the federal government views Muslims and Middle Eastern immigrants as potential terrorists. n90 Popular perception of Muslims has moved in the same direction, with huge opposition, for example, to the construction of an Islamic community center - Park 51 - near the site of the World Trade Center in New York. n91 Other examples include state laws banning the use of Shari'ah law in judicial decisions n92 and Islamophobia n93 rising in the United States n94 and abroad. n95 [*250] By sending immigrant informants into mosques and
religious and ethnic communities with little more than a vague directive to find terrorists, the FBI perpetuates ethnic profiling and the conflation of Islam and terrorism. In recruiting terrorism informants from the immigrant population, the FBI puts an ethnic and religious face on terrorism, and perpetuates the popular perception of what terrorists look like. Sending these informants into mosques and immigrant communities greatly increases the chances that alleged suspects fit the ethnic and religious stereotypes of terrorists. Put differently, if an informant is assigned to surveil a mosque, the chances
of the informant bringing back a non-Muslim or non-Middle Eastern suspect are low. This surveillance policy becomes a vicious cycle. The FBI recruits immigrant individuals from suspect communities to become informants, pressures them into producing terrorism suspects that fit the popular perception of what terrorists are like, and then prosecutes these suspected terrorists. All this reinforces the public conflation of immigrants, Muslims, Middle Easterners, and terrorists. Ethnic and religious profiling further alienates Muslim and Middle Eastern communities, and deepens their mistrust for
government. n96 Additionally, by predisposing many Americans to view Muslims, immigrants, and Middle Easterners as potential terrorist threats, ethnic and religious profiling may also bias juries in terrorism prosecutions. n97 Although suspects often claim entrapment as a defense, after 9/11 the entrapment defense has never been successfully used in terrorism cases. n98 In fact, many, if not most, terrorism cases never reach the jury because the chances of successfully defending against terrorism charges after 9/11 are almost nonexistent. n99 Popular stereotypes concerning Muslims and Middle
Easterners play a role in this. Although the use of immigration law in recruiting informants is only one of many factors contributing to this harmful cycle, the use of coercive tactics like immigration law to recruit informants creates a [*251] higher risk of unfounded terrorism prosecutions against innocent individuals who do not pose a risk. Consequently, this fuels the public perception that a stereotypical terrorist is a Middle Easterner or Muslim. C. Terrorism Informants' Presence in Muslim and Middle Eastern Communities Damages Intelligence Efforts Many argue that tactics like recruiting
informants through immigration law and surveilling mosques are necessary to prevent terrorist attacks, and that national security must be the nation's top priority, whatever the cost. These arguments fail to recognize that when informants lack a specific target and direction, the gathered intelligence does not necessarily enhance the nation's security. Instead, the FBI - with little concern for the actual gravity of the original threat posed by the suspect - creates an elaborate terrorism plot for the surveillance targets to participate in. n100 After 9/11, many individuals who showed no signs of violence or
extremism prior to involvement with informants and government-created plots have been prosecuted under terrorism charges. n101 Until the informants provided the means, these individuals did not have the finances or the proper connections to conceive and carry out these terrorism plans. Although orchestrating these plots makes the FBI's preventative stance appear successful in the public eye, it diverts law enforcement resources from focusing on real targets. Moreover, Professor David A. Harris claims that "the unregulated use of informants in mosques and other religious and cultural settings
can also do great damage because it poses the risk of cutting off our best possible source of intelligence: the voluntary, cooperative relationships that have developed between law enforcement and Muslim communities." n102 Having community members report suspicious information to the FBI may be a more effective way of obtaining reliable terrorism intelligence from these communities. n103 For example, in the few domestic terrorist prosecutions where a terrorist attack plan actually existed prior to informant involvement, community members who had noticed something amiss were the first to
alert the FBI and identify the subjects. n104 In fact, since 9/11, community members have assisted law enforcement in stopping potential terrorism plots in a number of cases. n105 A [*252] recent example, the case of Umar Farouk Abdulmutallab, the "Underwear Bomber," shows that the attempted bombing could have been prevented had law enforcement heeded the warnings that Abdulmutallab's father gave the CIA at the U.S. embassy in Nigeria. n106 As the president of the San Francisco Board of Supervisors and former criminal prosecutor, David Chiu testified regarding the Arab, Middle
Eastern, Muslim, and South Asian communities in San Francisco: "Without that level of cooperation, that level of trust, everything falls apart ... . Surveillance only serves to continue to drive wedges when cooperation is what is needed most." n107 Analogous to the way informants in mosques target vulnerable individuals despite these individuals' lack of connection to terrorist organizations or predilection for extremism, a 2011 study by the Migration Policy Institute demonstrates a similar phenomenon within other communities. n108 The 287(g) initiative, named after the section of the Immigration
and Nationality Act that authorized it, allows ICE to enter into memorandums of agreement with state and local law enforcement agencies, empowering these agencies to directly enforce immigration laws. n109 However, the study found that half of the jurisdictions using 287(g) did not direct their enforcement efforts toward serious or violent offenders, n110 as the 287(g) initiative had originally envisioned. n111 Instead, these jurisdictions sought to deport as many offenders as possible regardless of the severity of the crime. n112 Study respondents "believe that 287(g) program activities affect the
community in distinct and adverse ways, including by causing declines in Latino immigrant populations, [creating] avoid[ance of] public places by these populations, changing [] driving behavior, [creating] fear and mistrust of the police and other authorities, and reducing crime reporting." n113 These behaviors were more acute in jurisdictions with nontargeted enforcement, [*253] where any offense could constitute grounds for deportation. n114 Just as Latino immigrant communities became distrustful of law enforcement and withdrew from crime reporting when threatened with deportation, so did
Muslim and Middle Eastern communities when threatened with FBI surveillance of communal spaces. As the study notes, "these operations can generate widespread distrust of police. Such distrust in turn prompts immigrants to change their behavior to avoid contact with police and other authorities." n115 In order to procure accurate intelligence from any community, a relationship of trust and respect between law enforcement and the community must exist. n116 However, from the mass arrest and detention of Muslims shortly after 9/11 n117 to the ongoing allegations of ethnic and religious
profiling today, n118 the federal government has made serious errors in dealing with Muslim and Middle Eastern communities since 9/11. While the government recognizes that community policing n119 is the best way to obtain reliable intelligence, n120 the FBI is caught between two contradictory strategies and must choose between sending informants into mosques without reasonable suspicion, and gaining the trust and cooperation of Muslim and Middle Eastern communities. As one congregant in a surveilled mosque observed, "The FBI wants to treat the Muslim community as a partner while
investigating us behind our backs ... . They can't have it both ways." n121 While it is unrealistic to think that the FBI will stop using informants in these communities, a more restrained use of informants based on reasonable suspicion of wrongdoing would mitigate perceived damages to community relations. Requiring the FBI to have preexisting reasonable suspicion would add credibility to the agency and alleviate some of the fear surrounding terrorism investigations involving informants. [*254] By virtue of their connections and daily interactions, those active in a particular community are in the
best position to notice when others in the community act strangely. Unlike informants who may be new to the community and who other members may view with suspicion, well-established community members may already know what is going on in their community and can more accurately spot genuine threats. Notably, the argument that Muslims and Middle Easterners are in the best position to provide accurate intelligence on terrorist activities within their respective communities risks fueling the government's conflation of those communities with terrorism. n122 However, in analyzing how best
to procure counterterrorism intelligence, it would be amiss not to recognize the FBI's and other law enforcement agencies' heavy focus on Muslim and Middle Eastern communities. This is largely due to most recognized foreign terrorist organizations being based out of the Middle East or having Islamic ties. n123 Law enforcement efforts, immigration law, surveillance policies, and pre-9/11 incidents like the 1993 attack on the World Trade Center have categorized the typical terrorist as male, Middle Eastern, and devoutly Muslim. n124 The reality is that even though recently immigrated Muslims and
Middle Easterners have become synonymous with terrorism, terrorists come from various ethnicities, religions, and communities. n125 While acknowledging and attempting not to replicate that stereotype, this Comment seeks to recommend ways to improve the relationship between law enforcement and potential terrorism informants who typically belong to the same religion or ethnicity as those they surveil. The government's focus on Muslim and Middle Eastern communities as potential breeding grounds for terrorist groups also directs the focus of this Comment. However, this Comment resists
the broad characterization of these communities as prone to extremism and violence. In fact, a recent statistical analysis of terrorism activity after 9/11 discredits the stereotype that Muslims and Middle Easterners account for most of the terrorism within the United States. n126 In total, the report found that U.S.-originated non-Muslims accounted for 107 post-9/11 plots while U.S.-originated Muslims accounted for 49. n127 Conversely, the report found that cooperation with Muslim communities helped prevent 40 percent of all Al-Qaeda plots after 9/11. n128 As the report notes, "[a] singular
focus on Muslim terrorists is both bad for national security and civil society ... . Numerous studies and experts have stated that there is no reliable [*255] "terrorist profile.'" n129 When compared to the actual threat posed by members of Muslim and Middle Eastern communities, then, the FBI's explicit target of Muslim and Middle Eastern communities is excessive. D. Indiscriminate Use of Informants Leads to Entrapment Entrapment is another problem arising from the broad use of terrorism informants. Since 9/11, many informants have been involved with cases where the government effectively
created a terrorist plot and then pressured the defendant into agreeing to it. n130 As the Council on American-Islamic Relations stated in a 2009 report, informants "are paid and/or rewarded based on the amount of information they produce; therefore, these informants are inclined to exaggerate, instigate, and fabricate cases of a "terrorist' nature." n131 Many of the terrorist plots the FBI touts to the public as victories have been the result of informants pressuring vulnerable, young, or impressionable individuals who lacked ties to terrorist organizations or prior terrorist inclinations. n132 In United
States v. Cromitie, n133 a striking case that illustrates the extent to which informants and their handlers can go in fabricating prosecutions, the defendant pled outrageous government conduct as a defense. n134 In contrast to an entrapment defense, claims of outrageous government conduct focus on government action rather than the defendant's. n135 Shahed Hussain, the informant in Cromitie, began working for the FBI in 2002 after facing deportation and criminal charges over a Department of Motor Vehicle scam he ran. For his work as an informant, Hussain was paid around $ 100,000. n136
Following Cromitie's conviction for conspiring to commit terrorist acts, Cromitie moved to dismiss the indictment based on the outrageous conduct of the government and, specifically, Hussain. n137 Before his arrest, Cromitie expressed to Hussain interest in joining a Pakistani terrorist group. In subsequent conversations with Hussain, however, Cromitie reacted negatively [*256] to suggestions of suicide bombing. n138 Further, in recorded conversations between Cromitie and Hussain, Cromitie at times sounded ambivalent about jihad and other times expressed violent sentiments. n139 However,
"whenever Hussain asked Cromitie to act on those sentiments ... Cromitie did none of the above." n140 Hussain then escalated the pressure, promising Cromitie a BMW for carrying out a mission and offering him money for "doing jihad." n141 In addition to the pressure exerted on Cromitie to commit a crime, the FBI made other serious missteps while building its case against him. During the investigation, the FBI failed to corroborate Cromitie's alleged past crimes and ties to Afghanistan. n142 The court specifically noted: Before deciding that the defendants (particularly Cromitie, who was in their
sights for nine months) presented any real danger, the Government appears to have done minimal due diligence, relying instead on reports from its Confidential Informant ... no one thought it necessary to check before offering a jihadist opportunity to a man who had no contact with any extremist groups and no history of anything other than drug crimes. n143 In fact, although FBI officials concluded during a meeting that Cromitie "was unlikely to commit an act without the support of the FBI source," officials nevertheless continued the investigation. n144 Even after Hussain realized that
Cromitie's stories of visiting Afghanistan and committing crimes were false, he continued to offer Cromitie money in exchange for committing crimes, promising him up to $ 250,000 without authorization from the FBI. n145 After Cromitie lost his job at Wal-Mart and grew desperate for money, Hussain "leveraged that unfortunate situation to coax Cromitie to go forward with a jihadist plot. Cromitie protested that he did not want to be a martyr, but nonetheless agreed to go forward." n146 Cromitie helped recruit several lookouts, surveilled potential sites, and planted what he thought was a bomb.
Cromitie was subsequently arrested. n147 The court described the government's involvement in this plot: As it turns out, the Government did absolutely everything that the defense predicted in its previous motion to dismiss the indictment. The Government indisputably "manufactured" the crimes of which defendants stand convicted. The Government invented all of the details of the scheme - many of them, such as the trip to Connecticut and the [*257] inclusion of Stewart AFB as a target, for specific legal purposes of which the defendants could not possibly have been aware ... . The Government
selected the targets. The Government designed and built the phony ordnance that the defendants planted ... . The Government provided every item used in the plot ... . The Government funded the entire project. And the Government, through its agent, offered the defendants large sums of money, contingent on the participation in the heinous scheme. n148 Surprisingly, the court nevertheless concluded that the government's actions were neither outrageous nor shocking. n149 In fact, the court stated that it would have been negligent for the FBI not to investigate Cromitie after the statements he
made regarding Jews, the United States, and Pakistan?despite these statements never becoming specific threats or incitements to action. n150 Even though the court did not find outrageous conduct, it nevertheless recognized that [Hussain, as the informant,] was the prime mover and instigator of all the criminal activity that occurred, right up until the last moments of the conspiracy, when he had to stop the car he was driving and "arm" the "explosive device" because the utterly inept Cromitie could not figure out how to do it. n151 Although "this court is not familiar with a case in which so many
different tactics were used on a single individual ... Cromitie justified the Government's persistence when he proved to be ready and willing to commit terrorist acts." n152 Cromitie raises the question whether government action would ever rise to the level of outrageousness that the courts demand. In Cromitie, the court suggested that only duress, physical deprivation, or coercion by the government is prohibited when pursuing a potential prosecution. n153 Although Cromitie's sentiments toward Americans and Jews are neither admirable nor politically correct, the court strongly suggested that he
never posed a real threat. n154 [*258] Nevertheless, despite its aggressive actions, the government received nothing more than a verbal slap on the wrist. n155 Stories like Cromitie's underscore Muslim and Middle Eastern communities' fears of informants. Community members realize that the chances of a successful defense against the government based on the tactics of an informant and the FBI are extremely low, regardless of the coerciveness of the methods used. III. Limitations on the FBI's Use of Informants Cromitie demonstrates that the FBI lacks substantial restraints on how it recruits and
uses informants. Currently, there are four restrictions on how the FBI recruits informants: (1) internal FBI limitations, (2) constitutional limitations, (3) the entrapment defense and the outrageous government conduct doctrine, and (4) enforcement of nondeportation agreements in plea bargains. Because these limitations have neither curtailed the FBI's mismanagement of informants nor ensured a high degree of accuracy in information obtained, these restrictions have failed to protect both the public from terrorism and informants from abuse. n156 A. Attorney General Guidelines The Attorney
General's Guidelines on FBI Confidential Human Sources n157 ("Guidelines"), issued in 2006 by the Department of Justice, n158 are agency guidelines, not regulations, and as such have no binding legal effect. n159 [*259] Much of the problem of FBI informant misuse stems from this fact. The Guidelines outline the rules the FBI should follow in undercover investigations involving informants, which include documenting new informants and recording agreements made. n160 The Guidelines are also subject to review and modification by the Attorney General in accordance with federal laws, and
are afforded great deference by the courts. n161 The major problems with the Guidelines, however, are that they lack consequences, are not subject to judicial review, and are not followed by agents. n162 While the Guidelines may have internal consequences n163 for FBI agents who violate them, they have no meaningful effect beyond internal regulation and cannot be enforced by the public via judicial review. n164 Judicial review for violations only occurs when criminal prosecutions reveal the FBI's activities in the investigation. n165 However, the informants in these cases typically remain
confidential, and any inquiry into their actions does not extend beyond the handling agent's conduct and the recruitment methods used. n166 Evidence shows that in many cases, FBI agents fail to follow the Guidelines when recruiting and handling informants. A 2005 study conducted by the Department of Justice Office of the Inspector General found that the FBI did not provide enough support to agents to properly follow the pre-2006 Attorney General Guidelines Regarding the Use of Confidential Informants. n167 In fact, noncompliance with the guidelines was a problem in 87 percent of the
cases the Inspector General reviewed. In particular, agents failed to properly review the suitability of potential informants, properly document informants' illegal activities, and notify informants of their limitations. n168 Given the high levels of noncompliance and agents' nearly unlimited discretion in extending immigration rewards, agent abuse is likely also high. [*260] Immigration rewards appear only once in the Guidelines, yet this single reference exemplifies the impunity with which law enforcement procures informants. The Guidelines state that "no promises or commitments can be made,
except by the United States Department of Homeland Security, regarding the alien status of any person or the right of any person to enter or remain in the United States." n169 The Guidelines also note that informants should receive this information if and when they have any issues regarding immigration status. n170 While acknowledging that FBI agents may only offer immigration benefits to informants pursuant to DHS's agreement, the Guidelines do not answer the questions raised by this arrangement. Unlike monetary rewards, for which the Guidelines establish a number of rules regarding
proper payment procedures and conditions, n171 it is not clear under what circumstances immigration rewards must be documented and whether they are subject to conditions similar to those of monetary rewards. Their brief appearance in the Guidelines shows the FBI's recognition of immigration benefits as a method to elicit informant cooperation, but details on their use are nonexistent. This absence of information indicates that agents may possess vast discretion when using immigration rewards to recruit informants. It also indicates that executing these rewards is ultimately in the hands of
DHS. B. Constitutional Limitations In theory, both the Fourth Amendment and the Due Process Clause of the Fifth Amendment restrict the FBI's use of informants in terrorism investigations. However, neither Amendment has actually limited the Agency's recruitment tactics when dealing with subjects facing immigration-related pressures to serve as informants. The Fourth Amendment's prohibition against unreasonable searches and seizures n172 does not offer any substantive restrictions on the FBI's use of informants in terrorist investigations. In criminal investigations where the Fourth
Amendment does apply, it places few restrictions on the use of information gathered by informants. n173 To obtain a warrant based on intelligence gathered by an informant, the information must be reliable in establishing the requisite probable cause. n174 In matters of national security however, the search standard is less stringent than the probable cause standard [*261] used in criminal investigations. n175 In fact, the United States Supreme Court has never held that the Fourth Amendment applies to national security investigations. n176 In particular, the Foreign Intelligence Surveillance Act of
1978 (FISA) n177 shields federal agents from standard criminal warrant requirements when carrying out electronic surveillance and searches. The Foreign Intelligence Surveillance Court, a secret court n178 created by FISA to issue warrants in national security investigations, n179 only requires probable cause that "the target of the electronic surveillance is a foreign power or an agent of a foreign power." n180 Hence, because agents do not have to produce evidence of criminal activity before initiating electronic or physical surveillance, they are able to use informants more freely. n181 Under FISA, the
Attorney General can also authorize surveillance for up to a year without court order. n182 Furthermore, in 1982, President Reagan's Executive Order No. 12,333 identified the FBI as the primary gatherer of domestic intelligence and held that the Attorney General holds the power to carry out warrantless searches and surveil agents of foreign powers. n183 Executive Order No. 12,333 essentially paved the way for the FBI's use of informants to conduct domestic surveillance of foreign agents, including members of foreign terrorist organizations, without [*262] adhering to the restrictions inherent in
the use of informants in domestic criminal investigations. In domestic criminal investigations, agents are required by law to corroborate informants' intelligence and credibility before a warrant is issued. n184 However, under Executive Order No. 12,333, this corroboration is not required in terrorism investigations. n185 For informants facing deportation and immense pressure to cooperate, these lax warrant requirements remove an important check on the validity of their intelligence. The requirements also give the FBI more opportunities to abuse its power. Although no court has explicitly found
Executive Order No. 12,333 constitutional, no court has found it unconstitutional and thus it remains good law. Indeed, the Northern District of Illinois found that FBI reliance on the Order in conducting physical searches for foreign intelligence gathering was reasonable. n186 The Due Process Clause of the Fifth Amendment has provided a way to avoid deportation to some informants facing deportation under the state-created danger doctrine. n187 The doctrine allows for recovery and injunctive relief for civil rights violations. It holds that "the government has a constitutional duty to protect a
person against injuries inflicted by a third-party when it affirmatively places the person in a position of danger the person would not otherwise have faced." n188 To establish a successful claim under this doctrine, a valid relationship must have existed between the plaintiff and state; the state must have created the opportunity that ultimately harmed the plaintiff; the state must have acted in willful disregard for the plaintiff's safety; and the harm must have been foreseeable. n189 Notably, given its nearly exclusive use in domestic criminal cases, n190 the state-created danger doctrine has limited use for
immigrant informants. The First and Third Circuits have declined to apply the danger doctrine in deportation cases because it intrudes on Congress's plenary power over immigration. n191 The Fifth and Ninth Circuits, however, have left the doctrine [*263] open for potential use by immigrant informants. n192 Nevertheless, even if the danger doctrine was applied in immigration cases, many of the terrorism informants in the United States lack ties to actual terrorist groups in or outside of the United States n193 and thus are not subject to threat of retaliation from actual terrorist groups if deported.
Hence, the state-created danger doctrine may not help many terrorism informants avoid deportation. Additionally, the state-created danger theory only protects informants after recruitment, and provides no benefits to informants when negotiating the terms of their agreement with the FBI. While the knowledge that informants can later enforce their agreements may encourage more careful engagement with potential informants, ultimately bolstering informants' ability to vindicate their agreements with the government, the danger theory creates no incentive for the FBI to only recruit informants with
established ties to terrorist organizations. In fact, because the danger doctrine is likely only useful when informants have preexisting ties to terrorist organizations, the doctrine may steer the FBI away from recruiting those with established ties because doing so would provide these informants with a way to enforce their agreements. Nevertheless, until courts actually extend the danger doctrine to deportation cases, the protective value of this theory is unknown. C. Entrapment Defense and Outrageous Government Conduct Doctrine The entrapment defense and the claim of outrageous government
conduct are also possible sources of restriction on the FBI's use of informants. n194 These protect defendants who claim to lack the necessary predisposition for criminal activity but whom the government induced to commit criminal acts. n195 The test for entrapment used by most jurisdictions including the federal courts places the burden on defendants to show lack of predisposition to commit the alleged crimes. n196 The entrapment defense succeeds when "the criminal design originates with the officials of the Government, and they [*264] implant in the mind of an innocent person the
disposition to commit the alleged offense and induce its commission in order that they may prosecute." n197 The mere provision of materials and opportunities by the government for the commission of a crime is not sufficient unless the government's action "actually implants the criminal design in the mind of the defendant." n198 In contrast, outrageous government conduct claims focus on government action. In United States v. Russell, the Supreme Court acknowledged that "we may some day be presented with a situation in which the conduct of law enforcement agents is so outrageous that due
process principles would absolutely bar the government from invoking judicial processes to obtain a conviction." n199 Unlike entrapment, outrageous government conduct is not an affirmative defense. Rather, it seeks dismissal based on government violation of due process. n200 To prevail, an individual must show that the government's conduct offended "fundamental fairness" and shocked "the universal sense of justice." n201 A court has never found outrageous government conduct where defendants were predisposed to commit crimes by the acts of an informant. n202 The use of the
entrapment or outrageous government conduct defense may raise questions about the behavior of the informant and the government agent's instructions to the informant. While the entrapment defense may allow a defendant to escape criminal liability, an examination of government relations with informants may call for public and political limitations on the FBI's dealings with informants. n203 Usually, because law enforcement values the secrecy of its dealings with informants, evidence about informant recruitment and handling only surfaces after egregious cases involving informants acting as
agent provocateurs. n204 For example, in Cromitie, the defendant argued that the government entrapped and subjected him to outrageous conduct. n205 Although neither claim ultimately prevailed, Cromitie exposes how far the government may go to set up an individual for a crime, including offering a car and a quarter million dollars to participate in terrorist acts. n206 Cases like Cromitie do little to restrict the FBI's dealings with informants. If courts were more receptive to claims of entrapment and outrageous [*265] government conduct, law enforcement agencies would be threatened by the risk
of exposure, which in turn might encourage them to curtail their aggressive tactics. Nevertheless, most terrorism investigations and cases involving terrorist defendants never go to trial, making Cromitie an unusual case. n207 In terrorism cases, defendants must overcome an unusually heavy burden because irrespective of the government's conduct or the defendant's vulnerability, committing or assisting in the commission of terrorist acts is always considered evidence of a predisposition to terrorism. n208 Cromitie demonstrates that even though courts acknowledge the government's outrageous
conduct, courts may nevertheless find that a defendant's agreement to participate in terrorist acts demonstrates the necessary predisposition. n209 The fact that the FBI suffered no repercussions for aggressively recruiting Cromitie shows that entrapment and outrageous government conduct claims effectively do not restrain the FBI's use of aggressive terrorism informant recruitment tactics. D. Nondeportation Agreements in Plea Bargains Nondeportation agreements have also failed to effectively restrain the FBI's use of informants via immigration law. In the United States, most criminal cases are
resolved by plea bargains. n210 Before the 1970s, plea bargaining was conducted in relative secrecy and deals between the parties were not recorded. n211 In the 1970s, the Supreme Court held that if prosecutors [*266] reneged on plea bargains, petitioners were entitled to specific performance, resentencing, or withdrawal of the guilty plea. n212 Traditionally, courts have treated nondeportation agreements and plea bargains as contracts. n213 Thus, when the prosecution does not follow through with the promised benefits of a plea agreement, defendants may enforce the agreement as though it were a
contract. n214 Further, nondeportation agreements are similar to plea bargains in that the defendant agrees with the government to some detriment in exchange for a benefit. Due to these similarities, until the 1990s the Eighth and Ninth Circuits routinely enforced plea bargains when informants were promised immigration benefits in exchange for information. n215 In addition to the standard contract elements of offer, acceptance, and consideration, two additional elements must have been present in the agreement in order to establish an enforceable claim against the government. First, the
government agent must have had "actual authority" to ensure government performance. n216 Second, agency principles must have been present in the agreement. Agency is present when one person, namely the agent, consensually acts on behalf of another - the principal. n217 Hence, an agreement entered into by the prosecutor, as the agent, creates a contract between the principal (the immigration official) and the third party (the informant). n218 Nevertheless, in 1996 the Department of Justice issued regulation 28 C.F.R. § 0.197 which stated that immigration officials could not be held responsible
for prosecution-made plea agreements in criminal proceedings or investigations that involved immigration laws. n219 Further, in order for agreements to count under 28 C.F.R. § 0.197, there must be written authorization from DHS. Cases that have addressed 28 C.F.R. § 0.197 since its enactment have affirmed it. For instance, in Bao Tai Nian v. Holder, the Ninth Circuit affirmed [*267] petitioner's deportation and held that a letter from an Assistant United States Attorney presumably promising nondeportation had no bearing on the case because according to existing regulation, "absent written
authorization from the Commissioner of the Immigration and Naturalization Service ("INS'), the INS shall not be bound by cooperation agreements that government agencies may reach with alien witnesses." n220 Similarly, in Frimpong v. Holder, petitioner alleged that a federal prosecutor had promised him relief from deportation in exchange for information against petitioner's coconspirators. n221 There, the court dismissed his argument because there was no evidence of written authorization from DHS for the agreement, as required by the regulation. n222 Effectively, unless authorized by DHS,
an FBI offer of nondeportation as an incentive does not bind the FBI to performance. Considering the Guidelines, various constitutional limits, the entrapment defense, and the near complete unenforceability of nondeportation agreements, the FBI has great discretion and little potential liability when recruiting informants. Very little prevents the FBI from pursuing aggressive recruiting tactics like probing an individual's background for immigration violations and using these as ways to elicit cooperation. Once the informant cooperates, almost nothing prevents the FBI from disregarding the promise
of immigration benefits. Today, nothing adequately restrains the FBI's recruitment practices, leaving informants particularly vulnerable to coercion and thus more likely to provide faulty information. IV. A Possible Solution: The S-6 Visa As it currently exists, the S-6 visa may be a way of controlling the FBI-informant relationship in cases involving promised immigration benefits. The S-6 visa rewards terrorism informants with permanent residency status. However, as discussed infra, in order for the S-6 visa to effectively restrain the FBI and produce useful intelligence, the S-6 visa needs to be
modified. The examples discussed supra in Part II illustrate how the overbroad and indiscriminate use of informants, particularly those recruited with immigration threats or rewards, harms the acquisition of useful information, fails to identify and protect against legitimate threats, chills speech, and encourages ethnic and religious profiling. Immigration law offers less protection to informants than promises of leniency in criminal matters, thus increasing the potential for informants to produce faulty intelligence. Part III, supra, demonstrates that limitations on FBI dealings with informants are
practically nonexistent. This Part proposes a revision to the S-6 visa that would help diminish the harmful effects discussed in Part II by increasing transparency and providing [*268] more procedure for FBI informant recruitment via immigration law. Specifically, providing immigrant informants with better bargaining power and ways to vindicate their agreements through the S-6 visa would alleviate some of the aforementioned harms. Although there have been few reports of the FBI abandoning immigration promises in counterterrorism investigations, n223 the FBI has repeatedly broken alleged
immigration and monetary n224 promises made to informants in exchange for participation in drug investigations, n225 human trafficking investigations, n226 and pre-9/11 terrorism prosecutions. n227 Providing a more straightforward and transparent way for the FBI to offer immigration benefits to informants would help decrease informants' potential vulnerability and limit the FBI's power. With modifications, the S-6 visa could help resolve these problems. A. The Current S-6 Visa Requirements Established in 1994 as part of the Violent Crime Control and Law Enforcement Act, the S-6 visa, or
"snitch visa," n228 rewards terrorism informants and their families with legal permanent residence. n229 More specifically, the Act allows the government to give a temporary (three-year) material witness visa to people with probative knowledge of criminal activity. n230 During this three-year stay, an S-6 visa recipient can apply for permanent resident status, or a "green card," which may subsequently permit the recipient to apply for citizenship. n231 S-6 visas are subject to a different allotment system than immigrant-type visas. n232 Specifically, Congress allots fifty S-6 visas each year, and unused
visas cannot be carried forward. n233 Furthermore, respective family members who are also eligible to come to the United States do not count toward the [*269] allotment. n234 To qualify for the S-6 visa, however, those providing critical and reliable information necessary for the successful investigation or prosecution of terrorist organizations n235 must be in danger of retaliation in their home country, and qualify for a reward under the State Department's Rewards for Justice Program. n236 The State Department's Rewards for Justice program was established in 1984 under the Act to Combat
International Terrorism. n237 At the discretion of the Attorney General, the Program provides rewards of up to $ 500,000 to "any individual who furnishes information leading to the arrest or conviction, in any country, of any individual or individuals for the commission of [or conspiracy to commit] an act of terrorism against a United States person or United States property." n238 Individuals cannot apply for the S-6 visa on their own behalf; only state or federal law enforcement agencies may apply on behalf of an individual. n239 Individuals eligible for immigration benefits under the S-6 visa
program would generally be inadmissible in the United States or otherwise subject to deportation due to criminal or immigration status violations. n240 As part of the process, applicants must waive their rights to any deportation hearings and appeals should deportation proceedings occur n241 - further eroding their bargaining power - and must acknowledge that the S-6 visa is the sole authorization of their presence in the United States. n242 In turn, the United States Attorney with jurisdiction over the investigation that forms the basis for the request must certify that no promises regarding
immigration benefits have been or will be made to applicants. n243 Furthermore, law enforcement agencies initiating the requests must provide affidavits, statements, or other evidence demonstrating applicants' cooperation, their grounds for exclusion, and the government's need for the terrorism intelligence. n244 Law enforcement agencies must then file this information with the Assistant Attorney General in the Criminal Division of the Department of Justice. n245 [*270] Upon reaching the Assistant Attorney General, the information is reviewed for accuracy and specific factors are weighed to
determine eligibility for the S-6 visa. n246 When necessary, "representatives of the [Immigration and Naturalization] Service [(now the U.S. Citizenship and Immigration Services ("USCIS"))], Marshals Service, Federal Bureau of Investigation, Drug Enforcement Administration, Criminal Division, and the Department of State, and those representatives of other [law enforcement agencies], including state and federal courts designated by the Attorney General" are involved in the review process to determine which cases should receive priority. n247 Once the Attorney General approves the application
and the Secretary of State certifies it, the application proceeds to the Immigration and Naturalization Services Commissioner (now the USCIS Director) n248 for final approval. n249 After notification is obtained from USCIS, the Assistant Attorney General may object to the decision within seven days, in which case the Deputy Attorney General makes a final decision. n250 Nevertheless, under no circumstances can law enforcement agencies and applicants appeal the decision. n251 During the time the informant works with the law enforcement agency, he or she must report to the agency on a
quarterly basis, and the agency must report to the Assistant Attorney General in the Criminal Division. Finally, the Assistant Attorney General and the USCIS Director must together make an annual report to the Committee on the Judiciary of the House of Representatives and the Committee on the Judiciary of the Senate. Reports indicate that no S-6 visas were issued to terrorism informants between 1994 and 2006. n252 There is also no indication of how many S-6 visas, if any, were processed during this time. The lack of incentives for the FBI to apply for S-6 visas on behalf of informants may be
responsible for this. That is, while the prospect of legal permanent residency may be tempting bait for the FBI to dangle in front of potential informants, the bureaucratic process involved in obtaining an S-6 visa is discouraging. n253 Hence, while the FBI may tout S-6 visas to potential informants, the use of coercive and unapproved [*271] threats of deportation is more likely to result in cooperation - with less time, effort, and oversight. Since informants waive their recourses in S-6 visa agreements, the FBI suffers no legal backlash when it fails to fulfill promises made to them. n254 Essentially, the
potential benefits of using the S-6 visa are outweighed by the lengthy process involved, especially if the FBI can circumvent the process or break its promises. In the end, the FBI has no real reason to seek an S-6 visa for an informant. B. Proposed Modifications to the S-6 Visa Greater use of the S-6 visa would ensure judicial review of government practices by forcing the FBI to be more careful about following procedures in recruiting and dealing with informants. Changes to the S-6 visa program that provides material witness visas to informants with intelligence about terrorist activities could
formalize the use of immigration rewards for terrorism intelligence in ways that would benefit the FBI and potential informants, and could help reduce the unnecessary and harmful surveillance of Muslim and Middle Eastern communities. In order for the S-6 visa to become a useful tool for the FBI without compromising civil liberties, the S-6 visa must be more readily available, easier to grant, and carefully tailored. The low numbers of S-6 visas used by law enforcement agencies may indicate several potential problems with the program. It may seem paradoxical to suggest that the available number
of S-6 visas is too low when congressional reports reveal no S-6 visas were issued between 1994 and 2006. n255 However, these low numbers likely reveal more about the drawbacks of the S-6 visa program than they do about the value of immigration incentives as an intelligence tool. In particular, the inconveniences the S-6 visa application process imposes are barriers to efficient and productive use of the S-6 visa program. If FBI informants number in the thousands, as reports suggest, n256 and the FBI continues to make terrorism prevention a priority, then it seems Congress has failed to offer an
appropriate number of S-6 visas for counterterrorism investigations. Whether or not the current number of informants in use is necessary for effective terrorism prevention is outside the scope of this Comment. Nevertheless, the current allotment of fifty S-6 visas per year seems low when compared to the premium the FBI places on terrorism investigation and prevention and the estimated fifteen thousand informants in use. n257 Although not all of these informants work on terrorism-related investigations, it [*272] is reasonable to assume that since terrorism prevention tops the list of FBI
priorities, n258 there are more than fifty of them that do. If Congress truly intends the S-6 visa to become a viable instrument in fighting the war on terror, it must give the FBI the appropriate tools?and number of tools?to work with. In determining a useful and appropriate number of S-6 visas to allot, under this proposal Congress would also be forced to determine the number of terrorism informants in use and whether the FBI plans to reward these individuals with S-6 visas for themselves and their families. Furthermore, were a court to find that the FBI cannot bypass the S-6 visa process, and
modify the eligibility requirements, the number of S-6 visas would likely rise. In sum, increasing n259 the statutory allotment of S-6 visas could ensure that there are enough S-6 visas available to cover the increased number of terrorism informants employed by the FBI. S-6 visa eligibility requirements also lack the proper tailoring to allow the FBI to make use of them while still guarding against overbroad informant recruitment and use which leads to religious and ethnic profiling. Changing the eligibility standards could better protect informants and produce more reliable intelligence for the FBI. For
example, one potential change would do away with requiring informants to also be eligible for the State Department's Rewards for Justice Program established by the Act to Combat International Terrorism. n260 As previously mentioned, the Act gives the Secretary of State sole discretion to monetarily reward individuals who provide information leading to the arrest or conviction of anyone committing or conspiring to commit international terrorism against the United States. n261 Those who frustrate acts of terrorism or dismantle terrorist organizations are also covered by the Act. n262 In short,
Abolishing the requirement that an informant be
eligible for a monetary reward under the Rewards for Justice Program would make S-6 visas available to more
terrorism informants. While this would not [*273] necessarily curtail the FBI's ethnic and religious profiling, making the visa available to more informants may
the Rewards for Justice Program eligibility requirements are quite high. Many informants may have useful terrorism intelligence that may not necessarily lead to an arrest or conviction. Furthermore, both the Attorney General and the Secretary of State approve awards on a discretionary basis not subject to judicial review. n263
encourage the FBI to actually use it, thereby creating a more legitimate and transparent path to immigration rewards than that afforded by current government practices.
Similarly, the S-6 visa requirement that informants be in danger of retaliation for providing critical and reliable intelligence n264 will likely not be met when immigration
benefits are the impetuses for cooperation. Because informants recruited for counterterrorism investigations often have no connection to foreign terrorist organizations,
n265 and are tasked with preventing "lone wolf" terrorists, they would likely not face threats from legitimate terrorist organizations if deported to their country of origin.
Abolishing the "danger of retaliation" requirement would make the S-6 visa available to more informants and
give them more incentive to cooperate with the FBI. It would also give the FBI greater assurance that
informants' cooperation is not based on empty promises. In all, removing this requirement, along with the requirement that informants be
eligible for the Rewards for Justice Program, would remove some of the barriers to receiving an S-6 visa.
2nc – Solvency / Terrorism Net Benefit
CP yields more trustworthy intelligence and limits ethnic profiling
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
Conclusion Offering
S-6 visas to immigrant informants with established connections to terrorist organizations in
exchange for their cooperation would be a legitimate way for the FBI to reward these informants. Further,
informants would be able to rely on the FBI's promise and seek review should the [*276] agreement go awry. Gaining informants' trust and
lessening the coercive aspect of recruitment would lead to more trustworthy intelligence, and thereby
enhance national security. A larger but less committed group of informants - characterized by the current underused S-6 visa program does the country little good. Likewise, the indiscriminate and widespread surveillance of Muslims and Middle Easterners damages American
communities and reifies assumptions and stereotypes about terrorists' identities and backgrounds. These assumptions may also blind law enforcement
to real threats taking place in non-Muslim or non-Middle Eastern communities. Expanding
and modifying the use of S-6 visas
would turn a small, poorly designed program into a helpful law enforcement tool that better procures reliable
intelligence. Furthermore, providing more oversight for FBI informant use and restricting practices that
contribute to ethnic and religious profiling would improve Muslim and Middle Eastern communities'
confidence in and cooperation with the government. This, in turn, would encourage communities to
effectively work with law enforcement and report suspicious activities. Information offered from within a community is more likely
to be accurate, n272 leading to more counterterrorism prosecutions that enhance national security and less waste of law enforcement resources on
bogus threats. n273
2nc – Solves Profiling
Counterplan limits religious and ethnic profiling
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
To limit the religious and ethnic profiling created through the widespread use of informants, the S-6 visa
should also require that informants possess critical and reliable intelligence prior to agreeing to inform.
Critical and reliable information is based on preexisting ties to terrorists or terrorist organizations rather than
on ethnicity or religion. In the cases at issue in this Comment, the FBI typically recruits informants without a specific surveillance target in
mind. In some cases, "FBI handlers have tasked [informants] with infiltrating mosques without a specific target or "predicate' - the term of art for the
reason why someone is investigated. They were, [informants] say, directed to surveil law-abiding Americans with no indication of criminal intent."
n266 Informants receiving such directions from the FBI would not meet the "critical and reliable information" requirement. Hence, requiring
informants to have potentially useful information that is not based purely on ethnicity or religion, but rather
on preexisting ties to terrorists or terrorist organizations, would lessen the indiscriminate surveillance
practices of the FBI without implementing the higher standards imposed by the Rewards for Justice Program. Finally, individuals who agree
to provide information in exchange for an S-6 visa should not be forced to waive their right to a deportation hearing. Currently, informants must
knowingly waive their rights to any deportation hearings and appeals should deportation proceedings occur. They must also waive their rights to
contest their detention pending deportation until lawful [*274] permanent resident status is obtained. n267 Strikingly, informants relinquish all access
to judicial review if their applications are mishandled or forgotten and they subsequently face deportation. In the past, informants have alleged that the
FBI has mismanaged and reneged on promises, including immigration promises. n268 Allowing judicial review of the S-6 visa process would help lift
the veil of secrecy under which the FBI operates. Furthermore, through redaction or other methods that preserve informants' identities, judicial review
could be carried out without threatening national security. n269 Another
benefit of this requirement would be increased
transparency in the way the FBI recruits informants. Wider use of the S-6 visa, as well as greater judicial review, would
allow the government to ascertain the number of individuals enlisted by the FBI as counterterrorism
informants. This may further help curb informant mishandling, a problem that plagues the agency. Because informants
would still be required to provide critical and reliable intelligence, the FBI would be required to articulate clear predicates for recruiting individuals,
such as a close relationship between an individual and a known member of a foreign terrorist organization. This, in turn, would provide due process
and could vindicate informants' rights. The
proposed changes to the S-6 visa program would not only force the FBI to
adjust its recruitment and use of counterterrorism informants, but would also help the FBI obtain more
reliable and valuable intelligence while rebuilding relationships with Muslim and Middle Eastern
communities. Despite the FBI's limited resources and financial limitations, the FBI and Congress should focus on finding the most accurate and
efficient methods of acquiring intelligence. n270 Although the FBI's budget has not suffered greatly in the financial crisis, n271 the agency does have a
finite amount of resources to work with. Sending unwilling informants into mosques in search of vulnerable and receptive attendees with no ties to
terrorist organizations and with no independent plans to commit terrorist acts is not efficient. Requiring the FBI to only use a modified version of the
S-6 visa would channel the FBI's pursuit of existing leads. In turn, the FBI's presence in mosques would decrease, which would assuage community
fears. Lastly, requiring the FBI to seek informants [*275] who possess reliable terrorist intelligence has the potential to reduce the possibility of
informant entrapment, which would help repair the FBI's relationship with Muslim and Middle Eastern communities.
2nc – Regulates FBI
Revisions to S-6 visas increase transparency and regulate FBI practices
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
IV. A Possible Solution: The S-6 Visa As it currently exists, the S-6 visa may be a way of controlling the FBI-informant relationship in cases involving
promised immigration benefits. The S-6 visa rewards terrorism informants with permanent residency status. However, as discussed infra, in order for
the S-6 visa to effectively restrain the FBI and produce useful intelligence, the S-6 visa needs to be modified. The examples discussed supra in Part II
illustrate how the
overbroad and indiscriminate use of informants, particularly those recruited with immigration threats or
rewards, harms the acquisition of useful information, fails to identify and protect against legitimate threats, chills
speech, and encourages ethnic and religious profiling. Immigration law offers less protection to informants than promises of
leniency in criminal matters, thus increasing the potential for informants to produce faulty intelligence. Part III, supra, demonstrates that
limitations on FBI dealings with informants are practically nonexistent. This Part proposes a revision to the S-6 visa
that would help diminish the harmful effects discussed in Part II by increasing transparency and providing [*268]
more procedure for FBI informant recruitment via immigration law. Specifically, providing immigrant informants with better
bargaining power and ways to vindicate their agreements through the S-6 visa would alleviate some of the aforementioned harms. Although there have
been few reports of the FBI abandoning immigration promises in counterterrorism investigations, n223 the FBI has repeatedly broken alleged
immigration and monetary n224 promises made to informants in exchange for participation in drug investigations, n225 human trafficking
investigations, n226 and pre-9/11 terrorism prosecutions. n227 Providing
a more straightforward and transparent way for the
FBI to offer immigration benefits to informants would help decrease informants' potential vulnerability and
limit the FBI's power. With modifications, the S-6 visa could help resolve these problems.
2nc – Reforms Informants
Current informants recruited with immigration measures degrade the quality and
credibility of counterterrorism efforts
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
While there are no detailed studies on the differences between terrorism informants and traditional informants because the FBI keeps most of this
information confidential, n47 broad observations can still be made. First, the
FBI's preventative stance on terrorism has
significantly increased reliance on informants' intelligence. n48 After 9/11, the FBI drastically expanded the use of [*244]
informants n49 from around 1,500 in 1975 n50 to an estimated 15,000 today. n51 Informants have become the number one tool
for preventing terrorist acts. n52 Second, law enforcement dealings with terrorism informants receive greater deference from courts and
other limiting actors because terrorism is considered a national security matter instead of simply a domestic law enforcement matter. n53 The executive
branch has greater control over national security and foreign intelligence matters than over domestic law enforcement, an area traditionally reserved to
the states. n54 Thus, the post-9/11 characterization of terrorism as a national security matter results in courts affording more leeway to terrorism
investigations than domestic criminal investigations. n55 In other words, the
federal government is afforded more secrecy in
matters of national security. n56 Hence, because the government can invoke national security concerns to keep
information about the informant and handler privileged, there is less regulation governing the recruitment
and handling of terrorism informants than traditional criminal informants. n57 [*245] Third, while false and inaccurate
intelligence has generally been a problem with informants, n58 recent terrorism investigations raise the question of whether
the alleged terrorist crimes would have occurred without law enforcement instigating the terrorist
activities. n59 Informants in these cases aggressively instigated the defendants' participation in the plot. n60 Recruiting informants who lack ties to
terrorist organizations may be at the root of this problem, because they lack predetermined targets known to be involved in terrorist groups. n61
Without these targets, informants
under pressure to avoid deportation or other immigration consequences, for
example, are more likely to produce false information. n62 Further complicating this issue, the government has
suffered from credibility problems in terrorism investigations for not always fulfilling the promises made to informants. n63 One FBI
informant, a Yemeni citizen named Mohamed Alanssi, set himself on fire in front of the White House after alleging that the FBI had broken numerous
promises to him. n64 Governmental
credibility is critical to maintaining a relationship of trust between law
enforcement and informants, and thereby facilitates the gathering of credible intelligence. Due to the vast number
of terrorism informants today, the secrecy underlying the investigations, n65 and the potential for false intelligence, the recruitment and use of
informants in terrorism investigations present unique problems to the FBI. Because
of increased confidentiality surrounding
national security issues, the government has the means and incentives to shield the true extent of its
recruitment and use of terrorism informants from courts and the public. n66 To increase accountability and lessen the risk
of abuse, more oversight over the FBI's dealings with terrorism informants is needed. Notably, some limits on the FBI's use of informants do exist.
However, given the secrecy [*246] surrounding national security concerns, whether these limits apply in terrorism investigations remains unclear.
The presence of informants creates an unwarranted distrust and chilling effect undermines counterterrorism cooperation
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
II. Problems with Recruiting Informants Based on Immigrant Status The FBI's use of immigration rewards and threats to recruit informants
undermines civil liberties and cooperation with Muslim, Middle Eastern, and other immigrant communities. n67 In general, the
presence of
informants in mosques and the surrounding community creates suspicion and distrust of law enforcement
efforts, chilling free speech. That is, when community members know that informants are potentially monitoring their speech,
community members are less likely to cooperate with law enforcement efforts. Furthermore, by sending
informants into Muslim and Middle Eastern communities without specific targets to surveil, the FBI
encourages ethnic and religious profiling and helps conflate Islam and terrorism in the public eye. Because
informants recruited via immigration law possess less bargaining power and face potentially more serious consequences than those recruited via
criminal law incentives, there is greater incentive for these informants to supply false information and accuse innocent individuals. Ethnic
and
religious profiling, combined with the indiscriminate surveillance carried out by informants, can entrap
individuals who do not pose a threat. Entrapment wastes government resources and undermines public
confidence in the justice system and law enforcement. Although the FBI's problematic surveillance of Muslim and Middle Eastern communities
stems from the use of all types of informants and not merely those recruited with immigration promises, a modification to the use of immigration law
in rewarding or coercing terrorism informants would provide a step toward producing more useful intelligence and reducing the risk of harm to
innocent individuals. A. Mosque Surveillance Chills Free Speech In 2002, Attorney General John Ashcroft updated the Attorney General's FBI
Guidelines, n68 and did away with restrictions on entering mosques and other places of worship. n69 The Guidelines read in pertinent part: "For the
purpose of [*247] detecting or preventing terrorist activities, the FBI is authorized to visit any place and attend any event that is open to the public, on
the same terms and conditions as members of the public generally." n70 Thus, FBI
agents can now enter any mosque or attend any
religious gathering without probable cause. Under the previous Guidelines, issued in 1979 by Attorney General Benjamin Civiletti,
an agent could only conduct an investigation where "the facts or circumstances reasonably indicate that two or more persons are engaged in an
enterprise for the purpose of furthering the political or social goals ... through activities that involve force or violence and a violation of the criminal
laws of the United States." n71
The presence of current immigrant informants chills freedom of speech
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
The very knowledge of potential surveillance may caution people against discussing their political and
religious viewpoints for fear of being targeted by informants like Monteilh. Consequently, mosque attendance falls n85
and community cohesion suffers, thwarting the First Amendment's protection of free expression. Even
those not harboring extreme viewpoints may be [*249] dissuaded from political speech for fear of
misinterpretation. For example, after revelations of potential FBI surveillance surfaced at the Islamic Center of Irvine, congregant Omar Turbi
attested, "It gives you a little bit of apprehension about who you trust ... . Makes you think twice about what you say; what if people misunderstand
you?" n86 Similarly, the executive director of the Council on American-Islamic Relations in Anaheim stated, "Some average Muslims interested only in
praying are avoiding mosques for fear of somehow being monitored or profiled ... . Everybody is afraid, and it is leading to an infringement of the free
practice of our religion." n87 Although some states like Indiana, Pennsylvania, and Oregon have enacted laws prohibiting the surveillance of religious
sites without reasonable suspicion, n88 it should not be necessary to rely on state laws to protect the integrity and values of the First Amendment.
AT: CP Not Sufficient
Counterplan creates a more transparent system, increases quality of intelligence, and
regulates the FBI’s surveilling power
Stabile 14 – J.D., University of California, Berkeley, School of Law, 2013 (February 2014, Emily, California
Law Review, “Recruiting Terrorism Informants: The Problems with Immigration Incentives and the S-6
Visa,” 102 Calif. L. Rev. 235, Lexis, //11)
Changing the S-6 visa program and focusing on the FBI's use of immigration incentives to recruit informants may seem too narrow to appreciably
influence national security and community relations. However, the point of this Comment is a narrow one: to showcase one problematic aspect in the
way the FBI handles human intelligence. The recommendations here would not fully solve the problems of privacy violations, ethnic and religious
profiling, and informant misuse. The use of immigration law and status to leverage informants is not the only way that the FBI recruits informants, and
the S-6 visa program would likely remain relatively small even if expanded. However, as previously explained, the
proposed changes to the
S-6 visa would generate a more transparent system and more fruitful intelligence, and would help ensure
the FBI operates within the scope of its power. Individuals pressured to provide intelligence information would have a
legitimate chance to receive an S-6 visa, and the FBI would have a greater incentive to stop its overtly coercive
recruitment tactics such as deportation threats. Due to the popularity and longstanding use of informants, it is unrealistic to think that
the FBI will stop using immigration law as a way to leverage cooperation. In the past, informants have aided national security by providing useful
intelligence, and so they are highly valued as a source of intelligence. Hence, no
matter how narrow in scope the proposed
changes are, changes to the S-6 visa would greatly benefit the FBI, informants, and Muslim and Middle
Eastern communities. Better intelligence may mean the difference between wasting government resources on
empty threats and preventing the loss of life in future terrorist attacks. While narrow, the proposed changes to the
S-6 visa provide a promising way for expending law enforcement resources where needed, preventing
manipulative informant recruitment tactics, and adding transparency to informant dealings with the FBI.
Congress has the power to increase the allotment of S-6 visas and to explicitly restrict the FBI from promising immigration benefits outside of this
program. The FBI should be forced to use the S-6 visa program when using immigration status as an incentive. The
proposed changes
would allow the FBI to use the S-6 visa as an incentive, while inhibiting its use of unnecessarily forceful
tactics that lead to faulty intelligence, entrapment, and religious and ethnic profiling.
Negotiated Agreements CP
1nc Negotiated Agreement CP (Long Version)
CP Text: Local Law Enforcement within the United States should engage in
informal negotiations with Muslim communities with regards to the use of
informants
The CP solves the case and avoids politics / courts disads
Harris, 10 --- Professor of Law, University of Pittsburgh School of Law (David, New York University
Review of Law & Social Change, “LAW ENFORCEMENT AND INTELLIGENCE GATHERING IN
MUSLIM AND IMMIGRANT COMMUNITIES AFTER 9/11,” 34 N.Y.U. Rev. L. & Soc. Change 123,
Lexis)//Jmoney
B. An Attainable Alternative: The Negotiated Approach
If change with respect to the use of informants seems unlikely to happen via either judicial or legislative
action, there is still another way in which change in how law enforcement uses informants in mosques might
yet occur. This solution depends not on raw political power or legal reasoning but on something else: the
recognition of how the interests of law enforcement and the community overlap. n234 Viewed correctly,
these [*176] mutual interests can serve as the springboard for the negotiation of a set of agreed-upon local
practices for using informants. Such negotiation could get law enforcement what it most needs: good (or at
least workable) relations with Muslim communities, a continued flow of information from these same
communities, and an ability to use informants when a real need exists for them. This process could also get
Muslim communities at least some of what they need: a formal recognition of their opposition to the use of
informants, as well as protection from some of the most egregious (as they may see it) uses of informants
against them. Law enforcement would give up the right to use informants with total freedom, and the
community would find itself protected, to a degree, from the possibility that police would place informants
into mosques or other religious settings without a solid, fact-based reason. n235 The path would be difficult,
fraught with obstacles, and, in certain respects, downright unsatisfactory. But it represents the most
promising - and perhaps the only - way forward for both law enforcement and Muslim communities.
1. What the Negotiated Approach Is and What It Might Strive to Attain
a) Description of the Process
What might such a negotiated approach look like? To start, such arrangements would be both local and
informal. Any given mosque or Muslim organization would work toward agreement on the use of
informants with its local FBI field office, local agents of the Department of Homeland Security, and the local
police department (if the local [*177] department involves itself in this type of informant-based
investigation). n236 A negotiation between locals on both sides of the issue stands the best chance of
succeeding, because those involved in the negotiations may know each other from efforts already made to
build bridges and connections. The negotiations themselves can serve as trust-building measures, enhancing
and strengthening relationships that already exist, or helping to create new relationships. These efforts would
be informal in the sense that they would strive not for the imposition of a strict set of legal standards - for
example, a free-standing system for procuring "informant warrants" - but rather for a set of agreed-upon
practices that the parties would then follow. If one of the parties came to feel that the agreed-upon
practices no longer work, the parties could, together, agree to adjust them. Best and most importantly,
these practices could be tailored to fit local facts and circumstances - the specific realities that both the
community and law enforcement agencies face daily.
Why would any law enforcement agency agree to negotiate away any of its power to use informants as part of
an arrangement with precisely the people whom it may want to spy on? The fact that some police agencies
already use internal guidelines to - or at least attempt to - limit some of the ways in which they use
informants, highlights the idea that limiting agency power to something less than what the Fourth
Amendment would allow can in fact represent the best available practice. n237 Given that the FBI, NYPD,
and other law enforcement groups want something from the Muslim communities - continued and increased
cooperation, especially intelligence on suspicious activities - and given that use of informants in an
unregulated fashion puts those very benefits in jeopardy by undermining connections with the
community, law enforcement may prove more willing than one might initially assume to engage in such a
negotiation.
b) What Might Negotiations Strive to Attain?
What exactly might the Muslim community and the police try to agree upon? Both the interests of the parties
and the contours of different types of anti-terror investigations suggest some initial goals.
[*178]
i) Passive Versus Active Informants and the Standards for Using Them
First, we must examine the methods by which, and the circumstances within which, law enforcement might
use informants. For the sake of simplicity, let us break the methods of using informants - that is, the types of
informants - into two categories: passive informants and active informants. In passive informant activity, the
informant attends or participates in any activity - goes to a political rally, takes part in a worship service,
listens to a speech or a sermon, or the like - to the same extent that any private citizen might. The passive
informant observes and reports to the police what she sees and hears. In other words, the passive informant
acts as a walking camera and audio recorder, n238 absorbing everything around her and reporting what she
sees. The passive informant cannot target any particular individual, and she cannot do anything more than
observe. She might interact with other individuals who are present at the scene of the observation, but only in
ways that prove necessary to deflect suspicion.
An active informant, on the other hand, would target a particular person or specific group for observation
and interaction. She would seek to actively connect with these individuals in an effort to gather evidence of
wrongdoing, plotting, or other behavior. An active informant might "work" a targeted individual closely,
perhaps befriending the target and her family, as long as the informant did not in any way press the target
toward illegal conduct. n239
[*179] The critical distinction between passive and active informants could serve as the basis for negotiating
the circumstances under which law enforcement could use informants. The parties could pledge to have
informants work only in a strictly passive way, unless and until some proof of activity indicating possible
terrorist or criminal behavior emerged during passive observation - exactly as the FBI's rules used to dictate
under the Levi Guidelines. n240 The idea would be an informant who would blend in completely and act no
differently from any other person present.
Given that we cannot exclude the possibility that religious groups might (knowingly or unknowingly) harbor
small groups or individuals bent on terrorism, law enforcement should retain the ability to use informants in
these settings, but only passively, as a way to check leads or find out if any activity exists which deserves some
greater degree of attention. A negotiated agreement would allow law enforcement to have the presence it
sometimes needs, and to have it without any proof of wrongdoing; in other words, they could use passive
informants at their discretion, as they may now under existing law. At the same time, law enforcement would
agree to exercise this power only passively, so as to minimize intrusion and interference. This arrangement
seems like a good idea from both the point of view of law enforcementsuccess, because it allows police and
security agencies to look and listen for any indicators of real trouble, and from the point of view of the
communities, because they would have assurance that the worship and fellowship that form the core of
activities at religious institutions would not encounter government interference or disruption, unless
absolutely necessary. n241
[*180] Something more would be required for law enforcement to make use of active informants under a
negotiated agreement. In particular, the use of active informants would require some evidence. Law
enforcement could use active informants only if some reasonable, fact-based suspicion existed to link a
particular suspect or suspects to engagement in terrorist activity or other criminal conduct. That is, the police
would agree not to use an active informant just to make sure nothing is happening. Rather, the use of active
informants would require some minimal evidence - something more than a hunch, feeling, or intuition indicating that illegal activity has been, is, or will be taking place. Police officers involved in any investigation
should have little difficulty understanding this reasonable, fact-based suspicion rule because it comes from
Terry v. Ohio, under which courts have used the same standard to test police officers' decisions to stop and
frisk suspects for almost forty years. n242 A system regulating informant use according to whether the facts
would support a passive or active informant operation would allow the government to use relatively
unintrusive passive informants without seeking permission; more intrusive (i.e., active) informant activity
would require fact-based suspicion that terrorist or other criminal activity might be afoot. This bifurcation
would give the government the flexibility it needs to gather information or investigate leads, but it would also
require some evidence to conduct active informant investigations and limit these investigations to situations
potentially posing danger.
[*181]
ii) The "Entrapment" Problem: No Encouragement
Second, communities and police departments could use negotiated agreements to address the issue of
entrapment. As earlier discussion makes clear, neither the entrapment defense nor its cousin, the claim of
outrageous government conduct, does much to safeguard targets of police informants against government or
informant overreaching. n243 At worst, entrapment actually permits the government to create crimes as long
as the defendant has the appropriate "predispostion." n244
The lack of protection these defenses provide targeted individuals in practice begins to rankle when viewed
with an eye more lay than legal. For example, in Hamid Hayat's case in Lodi, California, the jury convicted
Hayat of providing material support or resources to terrorists, even though an informant deliberately and
purposely pushed and goaded Hayat to attend a terrorist training camp. n245 Even the U.S. Attorney whose
office charged and convicted Hayat stated that he wished that "other things had occurred" during the course
of conversations between the informant and Hayat. n246
Cases like these may not constitute entrapment in the legal sense, but they leave the impression that law
enforcement may not play fair in pursuit of a conviction. Put another way, just because the police can use
informants in this aggressive way without running afoul of entrapment law, does not mean that law
enforcement should do just that. All Americans want law enforcement to apprehend dangerous terrorists and
halt their plans. However, the government's use of overly aggressive and possibly unfair tactics to pursue
individuals who seem to pose no real threat to our national security undermines the public's confidence in
anti-terror work. Whether right or wrong, these perceptions that the government has not played fair do
damage to law enforcement's ability to obtain cooperation from the public.
Thus, as an element of their negotiations, police and Muslim communities could agree that informants
would not act in any way to encourage or shape the behavior of those under surveillance, either
through incitement or agitation. In some instances, it might be difficult to [*182] tell the difference
between encouragement and providing an opportunity for criminal conduct, but an agreed-upon rule against
pushing or goading targets would, in most cases, not prove difficult to apply. For example, a rule of this
nature would not allow the type of behavior reflected in the testimony in the Hayat case, in which the
informant threatened the target and belittled him for failing to go to a terrorist camp. n247
iii) Use of Informants as a Last (or at Least Latter) Option
When it becomes known or suspected, the placement of informants in religious institutions like mosques
does considerable damage. The presence of informants, either real or imagined, can undermine religious
custom and practices, undercut the ability of believers to trust each other, and pull apart the social fabric that
binds co-religionists together. n248 Given the explicit First Amendment protections provided for the free
exercise of religion in the United States n249 and the chilling effect that even the possibility of informant use
may have, the use of informants in mosques and other religious settings ought not to occur regularly.
As part of an agreement, communities and local police or the FBI might agree that, because the insertion of
informants into religious institutions carries with it significant First Amendment implications and the
potential for damage both to individuals and to the whole religious community spied on, the use of
informants in religious settings will not be a routine practice. The agreements can establish that law
enforcement can use informants in these settings only when other, less intrusive methods either have not
worked or could not work, and where use of an informant will most likely produce evidence. Both law
enforcement and Muslim communities gain if the use of informants becomes a tactic of last resort (or nearly
so) and not a method employed regularly. For many Muslim communities, the use of informants only when
other methods will not work will reassure them that they need not fear the presence of informants at every
point and that the government will exercise some restraint in using this tactic. It should also maximize the
chances that informants will catch those who pose a real danger and minimize the chances that
informants [*183] will snare only those most susceptible to persuasion.
1nc Negotiated Agreement CP (Short Version)
CP Text: Local Law Enforcement within the United States should engage in
informal negotiations with Muslim communities with regards to the use of
informants
The CP solves the aff and avoids link to politics
Harris, 10 --- Professor of Law, University of Pittsburgh School of Law (David, New York University
Review of Law & Social Change, “LAW ENFORCEMENT AND INTELLIGENCE GATHERING IN
MUSLIM AND IMMIGRANT COMMUNITIES AFTER 9/11,” 34 N.Y.U. Rev. L. & Soc. Change 123,
Lexis)//Jmoney
The possibility of terrorists on American soil, particularly the prospect of homegrown terrorists, means that
we should expect law enforcement to use every legal tool at its disposal to gather intelligence necessary to
thwart attacks. Given the law as it now stands, these tools include the almost complete discretion for police to
plant and use informants. Thus, we [*190] should expect to see informants do almost anything to succeed in
producing cases against targets.
Every person living in this country, whether she is an American citizen or not, has a strong interest in
securing the nation against terrorist attacks. However, just because the law says that police can use
informants at almost any time, in any setting, does not mean that they should do so. And the
particular contours of the struggle in which we now find ourselves illuminates this can/should distinction as
few others have. As the law enforcement officials and intelligence officers in charge of our safety and security
know better than almost anyone, our ability to track potential terrorists and stop them before they act
depends wholly on the availability of intelligence. Because the best, if not the only, source of crucial
intelligence on potential extremists with Islamic backgrounds will continue to be American Muslim
communities, we must have solid, well-grounded relationships with these communities, both native
and foreign-born.
These relationships are not just a matter of public relations, political correctness, or appeasement. Rather,
these communities must feel that they can regard law enforcement as trusted partners, because such
relationships create the avenues and opportunities for the passing of critical information from the
communities on the ground to law enforcement. The widespread use of informants in Muslim institutions,
particularly mosques, will corrode these important relationships by sowing distrust. By causing Muslims to
think that the FBI or any other police agency regards them not as trusted partners but as potential suspects,
fear displaces trust. Moreover, fear will cause members of the Muslim community to become less likely to
come forward with information - just as the members of any community would, given this type of scrutiny.
On the one hand, we simply cannot afford for this to happen, but, on the other hand, we know that there will
be cases - indeed, from the government's point of view, there already have been cases - in which the use of
informants can play a crucial role.
Given these tensions, as well as the mutual interests of law enforcement and Muslim communities in the
United States, the situation presents an ideal context in which to try regulating the government's use of
informants through local, negotiated agreements on acceptable practices. In at least the four ways
identified here, law enforcement and Muslim communities could agree to limit the use of informants, without
either ruling out their use or allowing their unrestricted use. Both sides would benefit. While the approach
proposed here would certainly face substantial obstacles, it represents a chance to recalibrate an important
aspect of the government's power to investigate, while at the same time preserving the sanctity of the
community's institutions of worship to the greatest extent possible.
2nc Solvency
Mutual Education solves-Muslims can educate local police on culture while the
police can education Muslim communities about suspicious activities and how to
identify plots effectively
Harris, 10 --- Professor of Law, University of Pittsburgh School of Law (David, New York University
Review of Law & Social Change, “LAW ENFORCEMENT AND INTELLIGENCE GATHERING IN
MUSLIM AND IMMIGRANT COMMUNITIES AFTER 9/11,” 34 N.Y.U. Rev. L. & Soc. Change 123,
Lexis)
iv) Education Across the Divide
Fourth, the parties might agree on a process of mutual education. For its part, law enforcement might educate
Muslim groups and congregations so that they could recognize actual suspicious behavior, as opposed to
simply relying on hunches about people who have unusual opinions. It has become common for police
departments and the FBI to appeal to Muslim communities to report anything suspicious, much as FBI
Director Mueller did in the speech quoted at the beginning of this article. n250 While there is no reason to
doubt the sincerity of Mueller's exhortation, it was also quite general. It is all very well to ask community
members to report their suspicions, and even such a general request may produce leads for law enforcement.
It is true that not all leads may actually help law enforcement; this is true even when all the leads in an
investigation originate from law enforcement professionals. It seems likely that an untrained member of the
public, if asked to provide information to the police about something as unusual as possible terrorist activity,
would, in good faith, inevitably produce mostly (if not wholly) useless leads, which officers and agents must
then spend their valuable time pursuing. Without some concrete indication of what "suspicious action"
means, most lay people would stand little chance of spotting the real thing.
Training communities regarding the types of information that law enforcement agencies want is one way to
improve the amount of useful information law enforcement receives. Moreover, the FBI, the Department of
Homeland Security, and even local police are in a good position to provide such training. For their part,
Muslim communities could educate law enforcement about social and religious customs, particularly habits of
language. Considerable amounts of such cultural and religious training regarding the customs and mores of
Islam, by Muslims for police and FBI agents, already takes place. n251 Many police chiefs and law
enforcement administrators at all levels have expressed enthusiastic support for these efforts and stated that
this type of training has greatly enhanced their agencies' capabilities, as well as relationships with the Muslim
communities. n252
Language is a special area of concern that these trainings should [*184] specifically address. Arabic speakers
may sometimes express opinions in Arabic in stronger, more vehement ways than one might hear in English;
these kinds of comments can hit Western ears as angry, radical, or extremist - even when speakers intend
nothing of the sort. n253 While it is true that law enforcement must react vigorously to any words expressing
an intention to take some illegal or dangerous action, they must also exercise caution, because linguistic,
stylistic, and idiomatic differences can give a listener a misleading impression.
A couple of recent examples help illustrate just how important linguistic understanding - or misunderstanding
- can be. In Hamid Hayat's trial for, among other things, providing material support for a transnational
terrorist act, prosecutors needed to prove that Hayat intended to commit terrorism. n254 To do so, they
offered into evidence what became known as "the throat note," n255 a fragment of paper with Arabic writing
on it that police had found in Hayat's wallet when they arrested him. n256 The prosecution first translated the
words as "Lord, let us be at their throats, and we ask you to give us refuge from their evil." n257 After the
defense protested, the prosecution amended the translation to "Oh Allah, we place you at their throats, and
we seek refuge in you from their evil." n258 According to authoritative sources, the defense had been right to
object because the passage contained a traditional prayer "reported to have been said by the Prophet
[Mohammad] when he feared harm from a group of people." n259 Still, the prosecution told the jury that the
note proved that Hayat had the "requisite jihadist intent." n260 In the end, Hayat's intent became the central
question in jury deliberations, and the note played a crucial role in persuading the jury to convict him. n261
[*185] In the case of accused terrorist Jose Padilla, similar questions about language arose. The government's
case against Padilla and two co-defendants relied heavily on hours of wiretapped phone calls, and a
government witness testified that Padilla's co-defendants had used "code words" to speak about
jihad. n262 An expert witness, an Arabic translator, disagreed; he said that the men were simply speaking
indirectly - something common in the Arab world - and not in code. n263
Police need education so that they can tell the difference between an opinion - even a strongly expressed,
non-mainstream, anti-American one - and clues to acts of terrorism. Having such opinions does not
necessarily make people dangerous, and American citizens (if not all people living in America) have a right to
hold and express such views. A person who says she approves of the actions of Osama Bin Laden, or who
expresses her wish that the President of the United States were dead, or who says that America deserved what
it got on 9/11, may strike us as intemperate, wrongheaded, or repugnant. But those statements make the
person only a holder of repellent and terribly misinformed opinions, not a terrorist. Expressing opinions,
even objectionable ones, remains an American right; doing so in a fashion that seems harsh or even
aggressive has to do with style and custom of speech, and it does not necessarily make it likely that these
opinions will ripen into action.
The CP allows law enforcement and Muslim communities to tailor policies to the
local needs
Harris, 10 --- Professor of Law, University of Pittsburgh School of Law (David, New York University
Review of Law & Social Change, “LAW ENFORCEMENT AND INTELLIGENCE GATHERING IN
MUSLIM AND IMMIGRANT COMMUNITIES AFTER 9/11,” 34 N.Y.U. Rev. L. & Soc. Change 123,
Lexis)//Jmoney
These four suggestions - distinguishing between active and passive informant activity and regulating
accordingly, prohibiting encouragement, using informants only as a last resort, and instituting mutual
education - just scratch the surface of what police agencies and the members of American Muslim
communities could agree to. Given the local focus of the negotiations, many concerns particular to the
jurisdiction might also surface. These focused elements would constitute a major advantage for this process,
because the better tailored the process is to its own context, the better its chances for success. The
local negotiation of a set of practices acceptable to both sides in the debate presents a workable alternative,
and one that takes advantage of mutually reinforcing needs of law enforcement and the Muslim communities
in our country, as well as the common need to protect ourselves from terrorism.
The negotiation process works-empirics
Harris, 10 --- Professor of Law, University of Pittsburgh School of Law (David, New York University
Review of Law & Social Change, “LAW ENFORCEMENT AND INTELLIGENCE GATHERING IN
MUSLIM AND IMMIGRANT COMMUNITIES AFTER 9/11,” 34 N.Y.U. Rev. L. & Soc. Change 123,
Lexis)//Jmoney
Given these obstacles, the outlook for local control of policy on informant use is decidedly mixed, but it is
not hopeless. In the recent past, locally-generated ideas have proven very helpful to the FBI in some sensitive
anti-terrorism efforts. For example, after the Department of Justice ordered the FBI to conduct 5000
"voluntary" interviews with young Arab and Muslim men not suspected of terrorism in late 2001, n271 many
in law enforcement expressed doubts about this plan. n272 More important, many thought that the FBI
would endanger the budding relationships it had built with the Arab and Muslim communities after
9/11. n273 When FBI agents and others in Detroit came up with an alternative plan - sending letters
to potential interviewees - the Department of Justice showed flexibility and allowed them to try
this.n274 The alternative plan was unmistakably successful; the Detroit field office had the highest rate
of successfully completed interviews of any office in the nation. n275 Thus, it is certainly possible that the
FBI and its governmental parent could negotiate localized solutions to intelligence gathering.
International Language CP
1nc Reframe Terrorism Language CP
Text: the United States Federal Government should reframe terrorism as a violation
of international law.
The counterplan distances terrorism from religion and garners broader support for
counterterrorism efforts
Corman, Trethewey, and Goodall 08 – *Corman: Professor and director of the Consortium for Strategic
Communication in the Hugh Downs School of Human Communication at Arizona State University,
consultant to the Department of Defense and Department of State on issues of strategic communication;
*Trethewey: Associate Professor and Associate Director in the Hugh Downs School of Human
Communication at Arizona State University, co-author of Organizational Communication: Balancing Creativity and
Constraing, 5th ed.; *Goodall: Professor and Director of the Hugh Downs School of Communication at Arizona
State University, serves as a U.S. Department of State International Speaker on countering ideological support
for countering terrorism and improving public diplomacy (Steven R. Trethewey, Angela Trethewey, and H.L.
Goodall Jr., “Weapons of Mass Persuasion: Strategic Communication to Combat Violent Extremism”, Peter
Lang Publishers, Frontiers in Political Communication Vol. 15, p.135-138, //11)
Policy Recommendations We propose that the
United States Federal Government should adopt a new vocabulary in
reference to what is now called the Global War on Terrorism. In discussing the debate over the language of war, Walid Phares
calls for a clear alternative to present language, and alternative that presents the conflict as both ideological and global. We answer that call by
providing a
framework that confers international legitimacy to counterterrorism efforts as well as belittling
the motivations for violent acts by groups such as al-Qaeda. Phares warns that to re-label the war would to embolden terrorist
groups by not recognizing that they are “one ideology, a focused identity, [with] a global strategy,” but we do not agree that any re-labeling would have
this effect. On the contrary re-labeling
it as a different kind of threat – as an organized criminal enterprise rather than
a military struggle – can help resist terrorists’ religious legitimation efforts, better mobilize domestic
Muslim support, and could revitalize non-Muslim domestic attitudes at a time when support for the war frame is waning.
The focus on criminal activity is a natural one given the strong connection between criminal activity and terrorism. Focusing on terrorism as a violation
of international law accomplishes several purposes. Framing
Terrorism as a Violation of International Law Makes it
Possible to Communicate Success Americans understand that crime cannot be eliminated but that it can be
contained. This means that when the coalition undertakes a successful operation it will be judged as to whether or not it decreased criminal
activity, not whether or not it was a “total victory.” Having attainable goals means that Americans are more likely to sustain support for the effort.
Framing Terrorism as a Violation of International Law Increases Awareness of the Problem as a Global One This language reframes the discussion of
terrorism against the backdrop of international standards. Hence, when the United States takes action against terrorism, we take action on behalf of the
laws of the international community. This framing increases the opportunities for cooperation with other international actors who seek a more just
world based on rule of law. Framing
Terrorism as a Violation of International Means that Terrorists are Reduced to
the Level of Criminals Positioning the conflict as a “war” confers a certain amount of legitimacy on terrorists, as a force defending a large
collective interest. Reducing terrorists to criminals who seek money and power detracts from the allure of
terrorism to possible recruits. Framing Terrorism as a Violation of International Law Removes Any
Connection of the Language to Religion Referring to terrorists as criminals rather than “jihadis”
completely separates them from the Muslim faith. Distancing the conflicts from religion means that we are
more likely to win moderate Muslim cooperation because we will implicitly acknowledge the disconnection
between terrorist activity and Islam. Conversely, the current policy runs the constant risk of conflating “terrorist”
with “Muslim.” We cannot sustain this policy if we expect to win friends within the Muslim community. The new language of terrorism will
require development, refinement, and contributions from a variety of sources. However, within the same framework we utilized in the analysis of
presidential speeches, we have devised the basis for a vocabulary of terrorism that distinguishes the current situation from traditional warfare (Table 2).
From our newly established vocabulary, we have rewritten one of Bush’s speeches from his campaign during the anniversary of 9/11 (see appendix).
In our modification, we have left much of the President’s words intact, but have changed the instances where the traditional war frame appears. We are
confident that readers who give this a fair reading will find that the language equally as tough, determined, and unfavorable to the terrorists.
Conclusion With increasing doubts toward the Bush administration’s policies in the War on Terror, new frameworks and vocabularies are necessary to
revitalize public support. The War on Terror provides a new type of battle on an ambiguous front where victory will not be realized through peace
treaties and flags atop hills. We have offered a new vocabulary, that of international crime, to reframe the War on Terror. This
strategic new
vocabulary paints terrorism as a persistent international problem and undermines the religious justification
commonly asserted by Al Qaeda and other extremists. Removing the religious connotation of the War on
Terror will help mobilize moderate Muslims in support of efforts that reduce international crime.
Finally, reframing the War on Terror as an international crime problem allows international bodies to enforce existing law systems which already
govern criminal acts.
2nc Solvency
The CP’s change in language solves – helps build support domestically and globally
to solve terrorism
Corman, Trethewey, and Goodall 08 – *Corman: Professor and director of the Consortium for Strategic
Communication in the Hugh Downs School of Human Communication at Arizona State University,
consultant to the Department of Defense and Department of State on issues of strategic communication;
*Trethewey: Associate Professor and Associate Director in the Hugh Downs School of Human
Communication at Arizona State University, co-author of Organizational Communication: Balancing Creativity and
Constraing, 5th ed.; *Goodall: Professor and Director of the Hugh Downs School of Communication at Arizona
State University, serves as a U.S. Department of State International Speaker on countering ideological support
for countering terrorism and improving public diplomacy (Steven R. Trethewey, Angela Trethewey, and H.L.
Goodall Jr., “Weapons of Mass Persuasion: Strategic Communication to Combat Violent Extremism”, Peter
Lang Publishers, Frontiers in Political Communication Vol. 15, p.129-130, //11)
As the fight against terrorism continues, language plays a pivotal role. In current policies, the language of war
continues to dominate. Based on analysis of President Bush’s September 11th anniversary campaign speeches,
we propose that war metaphors and language, such as victory, enemies, and allies, occlude the reality of
counterterrorism efforts. It is difficult to pinpoint victory in this conflict, a requisite of the vocabulary of war
familiar to lay audiences.
We call for a new language to illustrate the nature of our present conflict, a new vocabulary of international
crime as an effective replacement for discussions of counterterrorism. There are four main benefits of this new language.
First, domestic audiences are accustomed to the persistence of crime; it is a manageable social ill. Second,
the labeling of terrorist organizations as “criminal” decreases the perceived legitimacy of their acts by
potential recruits. Third, international crime is a global problem, not a war perpetrated by the United States. Global
problems require global solutions, and such a language will help garner support from the global community. Finally,
crime language separates the religious connotation associated with labels of terrorism or “jihadism.” This
allows moderate Muslims to reframe their faith away from extremist and violent acts.
State Legislatures CP
1nc State Legislation CP
Text: The fifty states and all relevant United States’ territories should pass legislation
that requires law enforcement to:
-differentiate between observational comparison and indiscriminate data collection
-abide by data integrity, access, privacy restrictions, and establish and publicly announce a
formalized policy on data retention
-limit the retention, identification, access, and sharing of data
-have a legitimate law enforcement purpose in identifying the person associated with any data
retained by community surveillance technologies
-establish a formal internal policy documenting each time a police employee accesses community
surveillance databases, departments shall not allow anyone except authorized and trained police
employees to access and search these databases
-share information contained in community surveillance databases with other government agencies,
as long as all participating departments honor the minimum requirements established in this
statute.
-all evidence acquired by law enforcement in violation of this statute shall be inadmissible in state
criminal courts
-the Attorney General of this state shall have a civil right of action against any police department that
engages in a pattern or practice of violating this statute
-the Attorney General of this state shall have the authority to periodically audit departmental policies
to ensure compliance with this statute. The Attorney General will publicly post the results of this
audit to bring attention to noncompliant departments
Counterplan solves the case
Rushin, 13 --- Visiting Assistant Professor, University of Illinois College of Law (Fall 2013, Stephen,
Brooklyn Law Review, “The Legislative Response to Mass Police Surveillance,” 79 Brooklyn L. Rev. 1,
Lexis,)//Mnush
[*51] C. Model Statute to Regulate Police Surveillance The presently available statutes and model guidelines suggest a key set of
concerns that any future state legislative body must consider. They demonstrate five common regulatory needs: data
retention, identification, access, sharing, and training. The model statutory language I offer includes a possible solution for each of these areas. In doing so, I
also try to honor the foundational principles for the regulation of police surveillance identified above. The model statute provides a clear standard that law enforcement agencies can implement. It
attempts to give departments some latitude to alter their own policies to meet local needs. But the law also includes specific and detailed regulations in hopes of preventing organizational mediation. The
proposed statute also includes multiple enforcement mechanisms to ensure compliance. The model excludes from criminal court any evidence obtained in violation of this statute, thus removing the
incentive for police departments to violate the policy. Of course, evidentiary exclusion is "limited as a means for promoting institutional change" because it is filled with exceptions and is narrower than
the scope of police misconduct. n330 Thus, I propose two additional enforcement mechanisms. First, the model statute gives the state attorney general authority to initiate litigation against departments
that fail to comply with these mandates. Other statutes regulating police misconduct, like 42 U.S.C. § 14141, have used a similar mechanism. n331 Second, the model mandates periodic state audits of
departmental policies and data records to ensure compliance. Overall, the proposed law broadly addresses many of the problems implicit in the digitally efficient state and establishes a number of
enforcement mechanisms to ensure organizational compliance. 1. Applicability, Definitions, and Scope
The first part of the proposed statute defines the scope of the legislation, including the
technologies regulated by the statute. In this section of the statute, I tried to reflect the foundational principle of regulating police surveillance technologies by creating a tightly defined scope of
presently available technologies that fall under the statute's regulatory purview. This might make the statute under-inclusive at some point in [*52] the future, but works to the benefit of avoiding over-
inclusivity that can stifle the development of new technologies. n332 § 1 Applicability, Definitions, and Scope This statute applies to all community surveillance technologies used by law enforcement
that collect personally identifiable, locational data. "Community surveillance technology" means any device intended to observe, compare, record, or ascertain information about individuals in public
through the recording of personally identifiable information. This includes, but is not limited to, surveillance collected with automatic license plate readers, surveillance cameras, and surveillance cameras
with biometric recognition. This scope provision specifically addresses community surveillance devices, such as ALPR and surveillance cameras, as distinguished from traditional surveillance tools like
GPS devices and wiretaps. As I have previously argued, "networked community surveillance technologies like ALPR surveil an entire community as opposed to a specific individual." n333 While the use
of a GPS device to monitor the movements of one criminal suspect over a long period of time might be constitutionally problematic, such a practice raises an entirely different set of public policy
The digitally efficient investigative state uses
community surveillance technologies like ALPR and surveillance cameras that can potentially track the
movements of all individuals within an entire community regardless of whether there is any suspicion of
criminal wrongdoing. Hence, this statute is carefully limited to a small subset of technologies that pose similar
risks and thus require similar regulation. 2. Differential Treatment of Observational Comparison and Indiscriminate Data Collection Next, I propose that state
laws should differentiate between observational comparison and indiscriminate data collection. n334 The model
law permits the use of community [*53] surveillance technologies for observational comparison. When a
department uses these technologies for observational comparison, the device is "an incredibly efficient law
enforcement tool that is reasonably tailored to only flag the suspicious." n335 § 2 Observational Comparison and Indiscriminate Data
Collection Police departments may use community surveillance technologies as needed for observational
comparison. But police departments using community surveillance technologies for indiscriminate data
retention must abide by data integrity, access, and privacy restrictions outlined in § 3 through § 6. "Observational comparison" is defined as the
questions. At minimum, the kind of tracking at issue in Jones was narrowly tailored to only affect one criminal suspect.
retention of locational or identifying data after an instantaneous cross-reference with a law enforcement database reveals reasonable suspicion of criminal wrongdoing. "Indiscriminate data collection" is
This distinction strikes a reasonable balance by
facilitating law enforcement efficiency in identifying lawbreakers, but also avoiding the unlimited and
unregulated collection of data. When applied to ALPR, this statute would mean that police could use that technology to flag passing license plates that match lists of stolen cars
defined as the retention of locational or identifying data without any suspicion of criminal wrongdoing.
or active warrants. But they could not retain locational data on license plates that do not raise any concerns of criminal activity without abiding by the regulations that follow. 3. Data Integrity, Access,
the indiscriminate collection of data be subject to four separate requirements that limit the
retention, identification, access, and sharing of data. The statutory language below was designed to give law enforcement some leeway to create workable
and Privacy I recommend that
internal policies that meet organizational and community needs. As a result, the policy simply serves as a minimum floor of regulation, above which departments could adopt their own regulations. [*54]
Police departments using community surveillance technologies for indiscriminate data collection
must establish and publicly announce a formalized policy on data retention. Departments may not retain and
store data for more than one calendar year unless the data is connected to a specific and ongoing criminal
investigation. The one-year retention period is the most significant regulation this statute would place on
indiscriminate data collection. Even the IACP acknowledges that the "indefinite retention of law enforcement information makes a vast amount of data available for potential
misuse or accidental disclosure." n336 Without limits on retention, police surveillance can develop into "a form of undesirable
social control" that can actually "prevent people from engaging in activities that further their own selfdevelopment, and inhibit individuals from associating with others, which is sometimes critical for the
promotion of free expression." n337 At the same time, law enforcement often claim that information that seems irrelevant today may someday have significance to a future
§ 3 Data Retention
investigation. n338 Without regulation, there is a cogent argument to be made that police would have every incentive to keep as much data as possible. n339 Thus, I recommend that data retention be
This would prevent the potential harms of the digitally efficient investigative state that come from
long-term data aggregation. The one-year time window represents a reasonable compromise. The median law enforcement
capped at one year.
department today retains data for around six months or less. n340 But before accepting this retention limit, state legislatures should critically assess their own state needs to determine whether there is a
Police employees
must have a legitimate law enforcement purpose in identifying the person associated with any data retained by
community surveillance technologies. The limit on data identification is somewhat different than most current statutory arrangements. This measure
would, potentially, limit the ability of law enforcement to use the stored data for secondary uses. A secondary
use is the use of data collected for one purpose for an unrelated, additional purpose. n341 This kind of secondary use can
legitimate and verifiable need for retention beyond this point. The next section of the statute addresses identification of stored data. [*55] § 4 Data Identification
generate[] fear and uncertainty over how one's information will be used in the future." n342 By limiting the identification of the data, the statute attempts to prevent such secondary use. Another way to
Departments must
establish a formal internal policy documenting each time a police employee accesses community surveillance
databases. Departments shall not allow anyone except authorized and trained police employees to access and
search these databases. § 6 External Data Sharing Police departments may share information contained in community
surveillance databases with other government agencies, as long as all participating departments honor the
minimum requirements established in this statute. I propose that police limit access to data even among police employees. And each time a police employee
accesses data, I require that the department document this event. This achieves two results. First, it creates a record of previous access points that the
attorney general or state criminal courts can, theoretically, use to hold police accountable for improper data
access. Secondly, and relatedly, this formalized documentation process may prevent nefarious secondary uses of the
avoid secondary use is to limit access to data and external sharing, as I attempt to do in the next portions of the statute. § 5 Internal Access to Stored Data
information. Because some evidence suggests that police retain community surveillance data in databases accessible to [*56] private companies and civilians, n343 this would place the impetus
on police departments to take responsibility for internal data management. And while the model statute does not limit the sharing of digitally efficient data, it does require that all departments with
access to data abide by the statutory limits. This would promote the sharing of data across jurisdictional lines to facilitate efficient investigations, while providing a consistent level of minimum privacy
protection in the state. 4. Enforcement Mechanisms To ensure that departments abide by these minimal regulations, I propose a combination of enforcement mechanisms. The judicial and legislative
branches have previously used these three enforcement mechanisms in other contexts to regulate police misconduct. By permitting a wide range of enforcement mechanisms, the statute attempts to
All evidence
acquired by law enforcement in violation of this statute shall be inadmissible in state criminal courts. The judiciary
avoid the traditional problems associated with police and organizational regulation. The first enforcement mechanism involves evidentiary exclusion. § 7 Evidentiary Exclusion
generally excludes evidence obtained in violation of the constitution. This mechanism is "by far the most commonly used means of discouraging police misconduct and perhaps the most successful."
n344 Empirical evidence suggests that evidentiary exclusion can change law enforcement behavior and incentivize compliance with the law. n345 But the exclusionary rule suffers from several
limitations. As Rachel Harmon has explained, the exclusionary rule is "riddled with exceptions and limitations, many of which are inconsistent with using the exclusionary rule as an [*57] effective
deterrent of police misconduct." n346 Thus, if the misconduct happens to fall into one of these many exceptions, the exclusionary rule may not be an effective deterrent. But perhaps more importantly,
as Harmon explains, "the scope of the exclusionary rule is inevitably much narrower than the scope of illegal police misconduct." n347 After all, the exclusionary rule would only work as a mechanism
for preventing police misuse of digitally efficient databases if the police intended to use the resulting evidence in a criminal trial. But much of the misconduct I discuss in this article and previous work
involves police utilizing retained data for undetermined secondary purposes. The exclusionary rule may do little to prevent this type of misconduct. To remedy this problem, I propose two other
The Attorney General of this state shall have a civil right of action against
any police department that engages in a pattern or practice of violating this statute. § 9 State Audit of Departmental Policy The
Attorney General of this state shall have the authority to periodically audit departmental policies to ensure
compliance with this statute. The Attorney General will publicly post the results of this audit to bring
attention to noncompliant departments. Two of the statutes currently in operation only classify the violation of data retention and access policies as a minor criminal
enforcement mechanisms. § 8 Attorney General Right of Action
act. n348 In theory, these laws could result in the prosecution of a police officer who fails to abide by their parameters. But as Harmon concludes, "prosecutions against police officers are too rare to
deter misconduct." n349 This is because juries tend to sympathize with defendant police officers, and the criminal prosecution of minor misconduct is rarely among the top priorities for over-worked
I suggest that the state [*58] attorney general
office should take on a proactive role in ensuring compliance through suing noncompliant agencies and
occasionally auditing departmental policies. The first alternative enforcement mechanism gives the state attorney general statutory authority to bring suit against
prosecutors. n350 Consequently, I avoid establishing criminal liability for officers who violate this statute. Instead,
departments that engage in a pattern of practice of violating this statute. This is similar to the statutory mandate given to the Department of Justice (DOJ) by 42 U.S.C. § 14141. n351 Police scholar
Barbara Armacost has called § 14141 "perhaps the most promising mechanism" for addressing organizational misconduct. n352 The late Bill Stuntz even believed that § 14141 may be "more significant,
in the long run, than Mapp v. Ohio . . . which mandated the exclusion of evidence obtained in violation of the Fourth Amendment." n353 Pattern and practice litigation, as authorized in § 14141, is
unique because it permits the DOJ to bring federal suit against police departments that engage in systematic misconduct; in practice, the DOJ successfully ensured the appointment of judicial monitors
in targeted cities to oversee organizational and policy reform. n354 Although there is only a small amount of empirical research on the effectiveness of § 14141 in reducing police misconduct, the
available evidence suggests it is one of the most effective means of bringing about organizational change. n355 One of the only potential pitfalls of this form of regulation is that the state attorney
general may have limited resources. n356 If resource constraints make lawsuits unlikely for noncompliant departments, a police agency might rationally calculate that the benefits of noncompliance
To remedy the concern over resource limitations, I propose that the state attorney
general have statutory [*59] authority to audit police departments. This would expand the regulatory reach of the statute while also harnessing the
power of public opinion to force police compliance. This would also guarantee regular interaction between the attorney general and
local departments, allowing the attorney general to check up on data practices. Rather than facing only the remote possibility of a
outweigh the potential costs of litigation. n357
pattern or practice lawsuit, departments would be faced with regular, random audits of their data policies. Because the results of this regular audit system would be posted online, the departments would
This could incentivize administrators to follow state law for fear of public
embarrassment that could threaten their job security. Rachel Harmon has suggested the DOJ utilize a similar policy to overcome resource limits and expand
the potential impact of § 14141. n358 In sum, these regulations attempt to holistically regulate the digitally efficient investigative
state by limiting data retention and ensuring stored data are handled in a way that protects individual privacy,
while still leaving ample room for legitimate law enforcement purposes. The enforcement mechanisms are sufficiently varied to ensure
widespread compliance. And the statute as a whole follows the foundational principles of police surveillance regulations. The regulations are clear enough to avoid
organizational mediation. They allow for individual variation. And they define the scope narrowly to only
include a small subset of technologies like ALPR and surveillance cameras that pose a similar social risk.
also be publicly accountable if they fail to abide by the statute.
CONCLUSION The digitally efficient investigative state is here to stay. The empirical evidence clearly demonstrates that extremely efficient community surveillance technologies are an increasingly
important part of American law enforcement. The language in Jones suggests that the judiciary may somehow limit public surveillance technologies in the future. To do so, the Court will have to
confront the jurisprudential assumptions of police surveillance. That is no easy task. Much of the Court's previous treatment of police surveillance has rested on the belief that individuals have no
expectation of privacy in public places, and [*60] that surveillance technologies that merely improve the efficiency of police investigations comport with the Fourth Amendment. At present, it remains
even when the Court does eventually
broach this subject, the judiciary's institutional limitations will prevent it from crafting the type of expansive
solution necessary to protect against the harms of the digitally efficient investigative state. In the absence of
regulation, police departments across the country have developed dramatically different policies on the use of
public surveillance technologies. Legislative bodies must take the lead and proactively
unclear how and when the Court will begin to alter these important assumptions. The language in Jones offers little guidance. But
limit the retention, identification, access, and sharing of personal data
acquired by digitally efficient public surveillance technologies. The model state
statute proposed in this Article would be a substantial step in reigning in the "unregulated
efficiency of emerging investigative and surveillance technologies."
State Legislation Solvency
State legislation solves – they have the requisite mechanisms and oversight to end
digitally efficient investigation
Rushin, 13 --- Visiting Assistant Professor, University of Illinois College of Law (Fall 2013, Stephen,
Brooklyn Law Review, “The Legislative Response to Mass Police Surveillance,” 79 Brooklyn L. Rev. 1,
Lexis,)//Mnush
III. THE LEGISLATIVE RESPONSE Any future judicial response must be coupled with state legislation. Even
if the judiciary eventually
accepts some version of the mosaic theory in interpreting the Fourth Amendment, we should not expect the
Court to hand down detailed regulations for the use of these technologies. Justice Alito's concurrence in Jones is telling.
His proposal to regulate the efficiency of surveillance technologies would only control data retention. n261 And the amount of data that a police
department could reasonably retain without a warrant would vary from one situation to the next based upon the relative seriousness of the possible
crime at issue. n262 This barely scratches the surface of broader problems posed by the digitally efficient state. Under what conditions should we
permit extensive data retention? When should we limit this kind of retention? Is data aggregation more acceptable as long as the data is not crossreferenced with other databases, thereby personally identifying individuals? Should we regulate law enforcement's access to this personal data? And
where should this data be stored? Even my original proposal for judicial regulation of mass police surveillance only addressed a handful of these
questions. I recommended that courts require police to develop clear data retention policies that are tailored to only retain data as long as necessary to
serve a legitimate law enforcement [*42] purpose. n263 Like Alito's proposal, such a standard would vary according to the seriousness of the crime
under investigation and the individual circumstance. I also argued that in cases where police retain surveillance data without a warrant through
electronic means, they should have a legitimate law enforcement purpose before cross-referencing that data with other databases for the purposes of
identifying individuals. n264 Both the Jones concurrence and my previous proposal would establish a broad judicial principle mandating that police
regulate data retention according to the seriousness of the crime under investigation and the legitimate need for such retention. This type of judicial
response is limited in nature. Legislative bodies would likely need to step in to provide more detailed standards. The
legislative branch has
several advantages over the judiciary that make it appropriate for this type of detailed policy building. The
legislature has a wider range of enforcement mechanisms than the judiciary. The legislature can
mandate in-depth and regular oversight. And it has the resources and tools to develop extensive, complex
regulations. As a result, the legislature is the best-positioned branch to address some of
the critical issues raised by the digitally efficient investigative state, such as
data storage, access, and sharing policies. In this Part, I offer guidelines for a legislative response to mass police
surveillance. I first detail some of the foundational principles that legislative bodies ought to recognize in regulating police use of technology. Next, I
give a brief overview of how a handful of states have attempted to regulate these technologies. I conclude by offering and defending my statutory
recommendations. A. Foundational Principles for Regulating Police Surveillance Technology In making this legislative recommendation, I rely on three
foundational principles about legislative regulation of law enforcement technologies. First, any
regulation must provide clear and
articulable standards that law enforcement can and will easily enforce. n265 Courts and legislators have often
agreed [*43] that police regulations should be easy to apply across many different factual circumstances. n266 If a
regulation is unclear, there is a higher probability that law enforcement will, even in good faith,
misapply the standard. For example, in Atwater v. City of Lago Vista, Texas state law permitted officers to arrest offenders who violated
traffic laws for failure to wear a seatbelt, even though the final punishment for such a violation was a mere fine. n267 In upholding an officer's decision
to arrest a woman for failure to buckle her seatbelt, the Court stressed that police need rules that emphasize "clarity and simplicity." n268 Earlier
regulations have encountered resistance from law enforcement because they were not easily administrable standards. For example, in Arizona v. Gant,
the Court upended a longstanding doctrine that said police could search an automobile incident to an arrest of a person in that vehicle. n269 The new
standard said that police "may search a vehicle incident to a recent occupant's arrest only if the arrestee is within reaching distance of the passenger
compartment at the time of the search or it is reasonable to believe the vehicle contains evidence of the offense of arrest." n270 Justice Alito found
this new standard undesirable compared to the previous standard. In Alito's mind, the Court should strive for "a test that would be relatively easy for
police officers and judges to apply." n271 While some commentators disagree about the relative importance of clear and simple rules, n272 most
judges and policymakers agree that any policymaker should consider the administrability of a mandate. Clear and simple rules also have another
advantage over ambiguous mandates--these kinds of clear directives are less susceptible to organizational mediation. n273 If a state regulation of a
policing organization is "vague or ambiguous," the police organization may "mediate the implementation and impact the law." n274 Lauren Edelman
had demonstrated this [*44] type of mediation in the case of equal employment and affirmative action laws that are intended to change the behavior of
private organizations. n275 These initial laws only established broad regulatory goals without offering clear and explicit procedural limitations. n276
This type of ambiguous mandate gave private companies room to interpret the laws and construct the meaning of compliance, thereby mediating "the
impact of the law on society." n277 In
the past, the police have been guilty of organizational mediation of a variety of
legal mandates. The general police response to Miranda is particularly demonstrative of this phenomenon. Scholars like Richard Leo and Charles
Weisselberg have carefully shown how police have navigated around the limitations of the original Miranda decision to nonetheless engage in
seemingly coercive interrogation techniques aimed at acquiring information. n278 The original Miranda opinion provided some limitations on
interrogations, but the decision and subsequent holdings may have been ambiguous, thereby allowing for departments to navigate around them
without technically violating the law. Thus, in
crafting rules for police, both the Court and legislatures should aim to
create easily administrable law enforcement rules if at all possible, but also laws that are specific enough to
avoid organizational mediation. Second, communities differ in their need for public surveillance. For example,
New York City and Washington, D.C. have previously been targets for international terrorism. Given their plethora of high value targets and
landmarks, these two cities may have a legitimate need for more public surveillance than other communities. n279 In arguing for a malleable standard
for local departments, the IACP has suggested that some locations--namely bridges, critical infrastructure, and other high value targets--demand more
surveillance and data retention to ensure public safety. n280 As an example, the IACP cites the fact that locations targeted on September 11, 2001 were
part of a terrorist attack that took many years to plan and execute. n281 [*45] Thus, certain
communities may legitimately need and
prefer longer retention periods around certain important targets. Conversely, a medium-sized suburb with low
crime that places a higher value on privacy might prefer a bar on the retention of surveillance data all
together. While any state statute should establish minimally acceptable requirements on data retention, the law must be sufficiently broad to permit
necessary variation at the local level. A one-size-fits-all approach may not be workable, given the unique law enforcement needs of each city. Third,
any regulation must clearly articulate the narrow scope of technologies and devices that fall under its
regulatory purview. Because technology changes rapidly, this ensures that the law will not be misapplied to
future, emerging technologies. Kerr has previously argued that regulations of technology ought to proceed cautiously until the technology
has stabilized. n282 Technology may have unforeseen uses that will take time to develop and understand. For example, in 1988, Congress passed the
Video Privacy Protection Act. n283 This law protected the privacy of videotape rental information. n284 Congress passed the law after Judge Robert
Bork's video rental history became public during his Supreme Court nomination process. n285 But in crafting this limitation on video rentals,
Congress defined the term "video tape service provider" expansively as "any person, engaged in the business . . . of rental, sale, or delivery of
prerecorded video cassette tapes or similar audio visual material." n286 On one hand, this expansive definition of a videotape service provider is useful
because it is broad enough to avoid antiquation. As videotape technology waned in popularity and DVDs became the chosen medium for most movie
rental providers, the law maintained its statutory force. But the vague language used by the original drafters of the law left online streaming content
providers like Netflix wondering whether the law actually applied to their services. n287 It was also unclear what kind of approval Netflix and other
providers had [*46] to obtain to allow users to share their viewing history on social media platforms like Facebook. n288 After years of ambiguity,
Congress recently amended the law to permit users to share content watching habits on streaming sites like Netflix after they have given one-time
approval. n289 Before the law change, Netflix complained that the law's language was confusing, making them hesitant to adopt social media
integration. n290 Similarly, when
regulating police technology use, legislative bodies should adopt language that is
sufficiently broad to avoid immediate antiquation. They should also be careful not to select language that is so
overly broad as to limit the use of new, potentially important technological tools.
State regulations can be reformed to ensure less discriminatory surveillance
Rushin, 13 --- Visiting Assistant Professor, University of Illinois College of Law (Fall 2013, Stephen,
Brooklyn Law Review, “The Legislative Response to Mass Police Surveillance,” 79 Brooklyn L. Rev. 1,
Lexis,)//Mnush
The legislative recommendation I make in this Part attempts to follow these three guiding principles: it attempts to (1) clearly define the limited scope of the applicable
technologies, (2) be clear and simple for law enforcement to administer, and (3) permit some level of local variation to meet the needs of unique municipalities. My starting
point for crafting this model was to analyze the small number of statutes already passed by state legislators. The next section looks at these statutes to demonstrate common
trends B. Current State Regulations A handful of states have laid out regulations of the digitally efficient investigative state.
These state laws operate by either regulating ALPR and surveillance cameras specifically, or by establishing broad standards for data retention. For example, states like
Virginia have passed relatively broad laws that regulate the retention of data by the government in all forms. n291 In other states, like New Jersey, the state attorney general
has used state constitutional authority to hand down directives regulating the use of ALPR and establishing limitations on data collection. n292 States like Maine, Arkansas,
New Hampshire, Vermont, and Utah have regulated ALPR through legislative measures. n293 Some states, like New York, have also handed down suggested model
guidelines to inform [*47] internal policymakers. n294 In this section, I demonstrate that most of these early efforts to regulate the digitally efficient surveillance
technologies share a handful of common concerns. They limit the identification of personal data, the length of data retention, the sharing of information with other
departments, and law enforcement access to stored data. These early models also rely on a bevy of enforcement mechanisms. Thus, any model legislation aimed at
holistically managing the digitally efficient investigative state should consider the possible solutions offered by existing laws. First, the
laws generally limit the
length of data retention in some way. Maine's law on ALPR limits retention to 21 days. n295 New Hampshire also puts a strict limit on the collection of
law enforcement data, barring "retention of surveillance data except for a few, specific situations." n296 By stark contrast, the New Jersey Attorney General has ordered that
data be retained for no more than five years. n297 Model guidelines like those offered by the State of New York do not establish a maximum length of data retention, n298
but the New York recommendations do encourage departments to establish a clear policy on the length of data retention. n299 Arkansas limits retention to 150 days, n300
Utah allows retention by government agents for nine months, n301 and Vermont permits retention for up to 18 months. n302 Each of these statutes reaches a different
conclusion on the appropriate length of data retention. The disparity between the New Jersey data retention limit of five years and relatively strict retention limits in states
like Maine and New Hampshire is striking. But the Maine law might not be as restrictive as it initially appears. Although it does limit retention in most cases to 21 days, it
also makes an exception for cases where law enforcement is engaged in an ongoing investigation or intelligence operation. n303 Overall, state
legislatures have
reached dramatically different conclusions on the relative threat posed by long-term data retention. [*48] Second, a
few of the available laws demonstrate a concern for the identification of personal data collected by the state.
The New Jersey Attorney General Directive intends in part to limit the "disclos[ure] [of] personal identifying information about an individual unless there is a legitimate and
documented law enforcement reason for disclosing such personal information to a law enforcement officer or civilian crime analyst." n304 In New York, the model
guidelines would also require that officers attempting to query stored data for identifying matches have a legitimate law enforcement purpose for doing so, and that they
record their identification procedure. n305 Neither Maine nor New Hampshire has a substantial policy on the identification of data, likely due in large part to their strict
limitations on retention. n306 The
longer a state legislature permits data retention, the more legitimately concerned it
may be about the possibility of this data becoming personally identified. After all, the combination of long-scale
retention and data identification procedures may allow law enforcement to create "digital dossiers" on
innocent people that reveal private information about their habits, preferences, and daily movements. n307 Third,
the available laws and recommended models tend to put restrictions on the sharing of information with other
agencies. The New Jersey directive permits the sharing of ALPR data among police departments in the state, provided that the departments keep records of the data
being shared and all departments involved abide by the New Jersey rules. n308 Nonetheless, New Jersey uses regulations on sharing as a way to encourage the development
of a consistent and organized state database. n309 The Utah law permits sharing and disclosure only under narrow circumstances. n310 Arkansas, by contrast, strictly
prohibits sharing of collected data. n311 Other states, like New York, have been relatively hands-off when it comes to data sharing. They simply urge departments to build
procedures for sharing data that are consistent with their overall recommendations on data protection. n312 We may expect states [*49] to want to encourage departments
to share whatever data they can legally retain. By doing so, departments
can have access to significantly more information on the
potential whereabouts of criminal suspects who travel outside jurisdictional lines. n313 Fourth, available and model
rules document and limit access to stored data. New Jersey's regulation requires departments to record all user access to stored ALPR data,
including the name of the user accessing the data, the time and date of the access, whether the person used automated software to analyze the data, and the name of the
supervisor who authorized the access. n314 New York's model guidelines also suggest that departments document when officers search and analyze stored data. n315
Officers should also only analyze data if they have a legitimate law enforcement purpose for doing so. n316 Additionally, the Maine provision stresses the importance of
confidentiality in stored data. n317 That
law restricts access to law enforcement officers. n318 And in Vermont, the law explicitly states that
the current array of statutes acknowledges the
need for limited access to available data and confidentiality of stored information. Fifth, some of the model
regulations require departments to train employees in the proper procedures for handling data. They also
discipline employees who fail to follow policy parameters. The New York suggested guidelines recommend that departments establish a list
access to stored data should be limited to specified or previously designated personnel. n319 Thus,
of designated personnel who are authorized to access ALPR data, n320 and encourage departments to establish a training program to teach officers about the proper use of
ALPR technology. n321 The New Jersey directive also requires that departments "designate all authorized users, and that no officer or civilian employee will be authorized
to operate an ALPR, or to access or use ALPR stored data, unless the officer or civilian employee has received training by the department on the proper operation of these
devices." n322 Once more, the New Jersey directive mandates that "any sworn officer or civilian employee of the [*50] agency who knowingly violates the agency's policy,
or these Guidelines, shall be subject to discipline." n323 Conversely, neither the Maine nor New Hampshire laws touch on officers' training in data retention. n324 But this
is likely because they do not permit significant data accumulation, thereby making training in data management less imperative. On the whole,
those states and
entities that do permit large-scale data collection also encourage officer training as a safeguard against abuse.
Sixth, the current array of regulations uses a wide range of enforcement mechanisms. In New Jersey, as a penalty for noncompliance, the Attorney General maintains the authority to temporarily or permanently revoke a department's right to use ALPR devices. n325 Arkansas provides for civil
remedies for individuals when a violation of the law causes them actual harm. n326 Utah, by contrast, simply makes violation of the statute a criminal misdemeanor. n327
Both the New Hampshire and the Maine laws have made the violation of ALPR regulations a criminal act in the state. n328 Although New York's regulations are nonmandatory, they still recommend
that departments begin creating records in case the state someday begins to audit
data access and retention records. n329 In sum, current state statutes and recommended guidelines address a
number of concerns related to the digitally efficient state. It is worth noting again that these laws go far beyond anything
the judiciary would likely implement. The Supreme Court is institutionally limited in its capacity to develop a response to the digitally efficient
investigative state. The variation on the mosaic theory adopted by Alito in his Jones concurrence would only establish a broad principle that long-term data retention by
efficient public surveillance technologies may eventually violate a person's reasonable expectation of privacy. Such a rule is ambiguous and does not touch on data storage,
access, and identification. State
legislation offers the possibility of establishing detailed and definitive standards.
Legislation solves best
Rushin, 13 --- Visiting Assistant Professor, University of Illinois College of Law (Fall 2013, Stephen,
Brooklyn Law Review, “The Legislative Response to Mass Police Surveillance,” 79 Brooklyn L. Rev. 1,
Lexis,)//Mnush
In this article, I
present a model statute that a state could enact to regulate the digitally efficient investigative state.
This statute adheres to three major principles about the regulation of police surveillance. First, any regulation
must provide clear standards that law enforcement can easily understand and apply. n23 Second, as communities differ
substantially in their need for public surveillance, any legislation must provide local municipalities with some ability to vary
standards to meet their legitimate law enforcement needs. Third, any regulation must articulate the narrow scope
of technologies and devices that fall under its regulatory purview. Because technology changes rapidly, this
ensures that the law will not be misapplied to future, emerging technologies. The model statute I offer in this article honors
these three important principles. The statute regulates the indiscriminate collection and retention of data by law
enforcement surveillance technologies, while also permitting the use of technological surveillance for mere
observational comparison. The statute [*5] establishes a maximum length of time for data retention. It also limits
the sharing of personally identifiable information, and requires that law enforcement demonstrate a legitimate
investigative purpose for identifying and accessing data. To enforce these broad regulations, the statute gives the state
attorney general the authority to bring lawsuits against police departments that fail to abide by these
regulations and excludes from criminal court any locational evidence obtained in violation of the statute. This
statute would not address all of the concerns of the digitally efficient investigative state. After all, no statute can fully predict and control the development of new and
emerging technologies. Nevertheless, it would be a major step toward coherency. This
legislation would give a police department discretion
to craft unique data policies tailored to its community's specific needs, while also encouraging some level of
statewide consistency. To date, only a small handful of law review articles have addressed the unique issues raised by digitally efficient community surveillance
technology, such as automatic license plate readers (ALPR). n24 Furthermore, none of this work has offered a comprehensive legislative response that could guide future
regulation. Thus, this article fills a void in the available legal scholarship.
Police departments have expanded advanced surveillance technologies and the
Supreme Court can’t stop it without State legislatures
Rushin, 13 --- Visiting Assistant Professor, University of Illinois College of Law (Fall 2013, Stephen,
Brooklyn Law Review, “The Legislative Response to Mass Police Surveillance,” 79 Brooklyn L. Rev. 1,
Lexis,)//Mnush
Over the last two decades, police departments have dramatically expanded the use of advanced surveillance
technologies. In 1997, around 20% of American police departments reported using some type of technological surveillance. n1 By 2007, that number had risen to
over 70%. n2 And no longer do police rely exclusively on basic surveillance technologies. The increasingly efficient
and technologically advanced law enforcement of the twenty-first century utilizes a wide range of surveillance
devices including automatic license plate readers (ALPR), n3 surveillance cameras, n4 red light cameras, n5 speed
cameras, n6 and biometric technology like facial recognition. n7 [*2] I have previously called this radical shift in policing
the beginning of the digitally efficient investigative state. n8 By this, I mean that police today utilize technological
replacements for traditional investigations that dramatically improve the efficiency of surveillance. These digitally
efficient technologies do not give police any unique extrasensory ability. n9 They merely improve the efficiency of public surveillance. Furthermore, these technologies only
collect information on public movements and behaviors. They do not intrude on any constitutionally protected or private space. n10 However, these
tools have
developed into a form of widespread community surveillance, which presents privacy concerns for many
members of the community. In addressing public surveillance under the Fourth Amendment, the Supreme Court has previously operated under two
important presumptions. I call these two general rules the jurisprudential assumptions of police surveillance. First, individuals have no reasonable expectation of privacy in
any activities they make in public that may be visible to law enforcement. n11 So while officers need probable cause or a warrant to enter a home or automobile, they do not
need any [*3] authorization to investigate or record a person's activities in public. Second, while technologies that give the state an extrasensory ability may violate an
individual's reasonable expectation of privacy, technologies that merely improve the efficiency of otherwise permissible investigation techniques are presumptively
permissible. n12 Thus, while officers must obtain a warrant before using some extrasensory technologies, the
Court generally does not regulate
efficiency-enhancing technologies. These jurisprudential assumptions of police surveillance have been workable in the past because of the limited use and
capability of efficiency-enhancing technologies. I have previously argued, however, that in the age of the digitally efficient investigative state,
efficiency-enhancing technologies have become sufficiently intrusive as to demand a new doctrinal path. n13 In
United States v. Jones, the Supreme Court considered one such efficiency-enhancing surveillance technology-global positioning systems (GPS). n14 There, law enforcement officers installed a GPS device on a suspect's car without
a valid warrant. n15 The government argued that the police did not need a warrant to install the GPS device
because it was merely an efficient replacement for an otherwise legal police investigation tactic--public
surveillance. n16 But Antoine Jones claimed that he had a reasonable expectation that all of his movements
over the course of a month would not be recorded in great detail by the state, even if they were executed in
public. n17 The Jones case presented the perfect opportunity for the Court to amend one or both of the
jurisprudential assumptions of police surveillance, but the Court punted the issue. The majority merely found that the
installation of a GPS device violated the Fourth Amendment because of the device's physical installation on the automobile. n18 Post-Jones, many academics
criticized the Court for not addressing the privacy issues raised by police surveillance technologies. n19 I believe the
Court will eventually regulate the digitally efficient investigative state in some manner. Indeed, dicta in the concurrences by Justices Sotomayor and Alito [*4] suggest that
the Court will be receptive to broader regulation of efficiency-enhancing surveillance technology in the near future. n20 Nevertheless, history dictates that any judicial
regulation will be limited and likely rely on the often-ineffective exclusionary rule for enforcement. n21 As a result, Congress and state legislators must play a significant role
in any future regulation of police surveillance. Given
that law enforcement in the United States is highly decentralized, n22
much of this regulation will have to come from state legislatures.
Counterplans vs State Secrets Privilege / Judicial
Independence Advs
1nc CP Executive
CP Text: The executive branch should:
-conduct an across-the-board review of pending litigation where the state secrets privilege was
invoked
-issue an executive order that sets out substantive legal standards regarding use of the privilege
-create a durable and extensive review process within the executive branch for deciding when to
assert the privilege in future cases
-institute a formal process for invoking the privilege, by setting out a list of offices or officials who
must sign off on the decision
-institute a system to automatically refer evidence that it asserts is privileged to an Office of the
Inspector General
-encourage the Congress to enact the State Secrets Protection Act
CP solves
Frost ’09 --- American University Washington College of Law (Amanda, “Reforming the State Secrets
Privilege,” American University College of Law, 4/1/2009,
http://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1001&context=fac_works_pubs)//
Mnush
The next administration should consider implementing the following measures upon taking office. These
proposals could be adopted individually, or grouped together as a comprehensive package. The list below is not intended
to be exhaustive, but rather to suggest useful avenues for the new administration to pursue. First, the new administration should conduct an
across-the-board review of all pending litigation in which the government—either as a party or an
intervenor—has invoked the state secrets privilege. Just because the Bush Administration invoked the privilege in a particular case does not
mean the new administration should consider itself bound by its predecessor’s litigation approach. This across-the-board review should be carried out by a joint group of
career employees and political appointees of the new administration, and should include officials from both the Justice Department and the intelligence and national security
communities. It
should cover not only cases that are pending in district courts, but also those in which the state
secrets privilege is at issue on appeal. Second, the next president should issue an executive order, binding on all
federal agencies, that sets out substantive legal standards regarding use of the privilege. This order might
include a new definition of what constitutes a state secret and what evidence the government believes is
appropriately subject to the privilege, based either on the current classification system,80 or the definitions of
“state secrets” in proposed legislation that is currently pending before Congress. An important element of an executive order
on the privilege would be creating a standard for when the government may seek outright dismissal of a case, at the pleadings stage, on the basis of the privilege. For
example, an effective order could emphasize that this approach is supported by precedent only in cases involving secret espionage agreements, such as those at issue in
Totten v. United States and Tenet v. Doe, and may not be appropriate in cases relating to other subjects. The executive order should take into account the harm to litigants
The president’s constitutional
responsibilities include not only protecting the nation’s security, but also taking care that the laws
are properly enforced.81 If important evidence is kept out of court, or entire cases are dismissed on the pleadings, the law cannot be optimally followed and
and the public of invoking the privilege either to prevent introduction of evidence or seek dismissal of the case.
enforced. Accordingly, the executive branch should adopt a substantive standard that requires it to evaluate the harm that will result when invoking the state secrets
privilege. Third,
either as part of an executive order or through a formal memorandum issued by the new
attorney general, the administration should create a durable and extensive review process within the executive
branch for deciding when to assert the privilege in future cases. Internal procedural requirements within the
bureaucracy can create a strong layer of checks and balances, taking advantage of the benefits of multiple
viewpoints and the experience and judgment of career civil servants.82 When just a few executive branch officials make decisions
without broader consultation and input, the results can be severely flawed. This is especially the case with complex legal analysis, as demonstrated by the failures resulting
from the Bush Administration’s refusal to seek input from different officials within the administration.83 As Professor Goldsmith testified before the Senate Judiciary
Committee, “[c]lose-looped decisionmaking by like-minded lawyers resulted in legal and political errors that would be very costly to the administration down the road. Many
of these errors were unnecessary and would have been avoided with wider deliberation and consultation.” Judicial doctrine provides that the state secrets privilege may only
be “lodged by the head of the department which has control over the matter”—not a low-level official.85 That official must give “actual personal consideration” to the
issue, and attest to this in a formal declaration.86 Recent practice suggests, however, that these doctrinal procedural requirements are insufficient in light of the significant
impact of invocation of the privilege. And although officials from the Bush Justice Department have asserted that attorneys from the Department, in addition to counsel
from the relevant agency, are involved in determining when to invoke the privilege, they have not indicated the existence of any formal review process within the Justice
Department. The new administration or Justice Department should
institute a formal process for invoking the privilege, by setting
out a list of offices or officials who must sign off on the decision. To begin, a senior official within the Department, perhaps the
deputy attorney general, should be required to personally approve all invocations of the privilege. This will provide accountability for secrecy at the highest levels of the
administration. Moreover, a
new review process might include a referral to the Department’s Professional Responsibility Advisory Office
(PRAO) to ensure that the privilege is not being invoked out of a conflict of interest.88 Further, the Justice Department
should consider establishing a litigant’s ombudsman who could serve as an advocate for the members of the public who would be harmed by invocation of the privilege.89
By requiring that these offices approve the government’s exercise of the privilege, the new administration would bring more viewpoints into its deliberations and reduce the
likelihood of error or unnecessary harm to the interests of justice. Fourth, the
administration should institute a system to automatically
refer evidence that it asserts is privileged to an Office of the Inspector General (OIG). Even if the privilege is invoked appropriately and
narrowly by the administration, and subjected to careful review by the courts, the state secrets privilege will prevent the introduction of some important evidence in court.
This
is the very purpose of the privilege, and it may sometimes be necessary to prevent the disclosure of secret
information that would harm the nation’s security—even when that evidence demonstrates illegal activity.
Because even proper use of the privilege can disrupt the usual system of checks and balances and limit oversight of the executive branch, it is important that an independent
body within the executive branch review the evidence and take action to prevent or ameliorate violations of the law that cannot be disclosed in court. By mandating referral
of assertedly privileged evidence to an OIG, the new administration can ensure that any evidence of abuse or wrongdoing—even if properly covered by the privilege—will
be addressed and corrected. The Justice Department’s OIG has demonstrated extraordinary integrity and independence in recent years, and thus would be the appropriate
office to conduct the review. However, if the administration believes it appropriate, the privileged evidence could be referred to the relevant department or agency OIG, for
example that within the Department of Defense or the CIA. The
OIG could then serve as a partial substitute for the courts by
investigating and providing accountability for any wrongdoing revealed by the privileged evidence. Finally, the new
administration should encourage the next Congress to enact the State Secrets Protection Act, discussed below, or similar legislation.
Rather than work with Congress to craft state secrets legislation, the Bush Administration has attempted to undermine the proposed legislation by making specious attacks
on its constitutionality and vowing to veto any bill passed by Congress.90 The new administration should work with members of the House and Senate Judiciary
Committees to pass and sign into law the State Secrets Protection Act. At a minimum, it should cooperate with the Judiciary Committees to modify these bills to address its
Adopting these measures would enable the new
administration to restore a proper balance between the branches of government, fulfill its constitutional
responsibilities to enforce the rule of law, and protect both national security and the interests of justice.
concerns. The next section discusses the legislation and its benefits in more detail.
Congress Solvency
Congress can pass legislation changing how state secrets are evaluated --- boosts
judicial independence
Fisher 08’ --- specialist in Constitutional Law (Louis, “Reform of the State Secrets Privilege,” House
Committee on the Judiciary , 1/29/2008,
http://www.loc.gov/law/help/usconlaw/pdf/Fisher_statement_12508.pdf)//Mnush
There should be little doubt that Congress has constitutional authority to provide new guidelines for the
courts. It has full authority to adopt rules of evidence and assure private parties that they have a reasonable
opportunity to bring claims in court. What is at stake is more than the claim or assertion by the executive branch regarding state secrets. Congress
needs to protect the vitality of a political system that is based on separation of powers, checks and balances,
and safeguards to individual rights. In the past-half century, Congress has repeatedly passed legislation to fortify
judicial independence in cases involving national security and classified information. Federal judges now gain
access to and make judgments about highly sensitive documents. Congressional action with the FOIA amendments of 1974, the FISA
statute of 1978, and the CIPA statute of 1980 were conscious decisions by Congress to empower federal judges to review and
evaluate highly classified information. Congress now has an opportunity to pass effective state secrets
legislation.
Congress solves --- can regulate the process through which the privilege is asserted
Chesney ’08 --- Wake Forest Law School (Robert M, “Legislative Reform of the State Secrets Privilege,”
Roger Williams University Law Review, spring 2008,
http://docs.rwu.edu/cgi/viewcontent.cgi?article=1389&context=rwu_LR)//Mnush
In any event, let us assume for the sake of argument that the state secrets privilege serves constitutionally-protected values relating to the executive
branch's national security and diplomatic functions. Would it follow that Congress is disabled from regulating in this area? It is not obvious that it
would. Indeed, some
forms of regulation would seem clearly to remain within the control of Congress in the exercise
if other forms of legislation might prove more controversial. The key is to
distinguish between legislation regulating the process by which privilege assertions are to be adjudicated, and
legislation that functions to override or waive the privilege itself. At a minimum, Congress should have authority
to regulate the process through which assertions of the privilege are adjudicated. This would include, for example, the
power to codify prerequisites to the assertion of the privilege (such as the Reynolds requirement that the privilege be invoked by
the head of the relevant department based on personal consideration of the matter)34 or to require particular procedures to be
followed by the court in the course of resolving the government's invocation. Whether Congress should be able to
of the authorities mentioned above, even
override the privilege once it attaches-for example, by compelling the executive branch to choose between conceding liability in civil litigation and
disclosure of privileged information in a public setting-is far less clear. That question may be academic, however, at least so far as the SSPA is
concerned. A
close review of the bill suggests that most if not all of its provisions are best viewed as process
regulations. It does not follow, of course, that all the changes contemplated in the SSPA are wise. On the contrary, there are at least a few
elements in the bill that go too far in seeking to ameliorate the impact of the privilege. Congress may have the authority to adopt
these measures notwithstanding the competing constitutional values involved, but it is advisable to emphasize
less-intrusive reform options whenever possible.
Subjecting the states secrets privilege to a procedural framework solves
Chesney ’08 --- Wake Forest Law School (Robert M, “Legislative Reform of the State Secrets Privilege,”
Roger Williams University Law Review, spring 2008,
http://docs.rwu.edu/cgi/viewcontent.cgi?article=1389&context=rwu_LR)//Mnush
Note* SSPA = State Secret’s Privilege Act
By subjecting the privilege to a more
rigorous procedural framework, the SSPA may reduce the range of cases in which the privilege is found to
apply, and in some respects it may cause marginal increases in the risk that sensitive information will be
disclosed (though with the amendments proposed above such risks would be significantly diminished). On the other hand, even under the SSPA, the privilege
will continue to have a harsh impact on litigants who bring claims that implicate protected information: discovery will still be denied, complaints
will still be dismissed, and summary judgment will still be granted. Such tradeoffs are inevitable, however, in crafting legislation designed
to reconcile such important public values as national security, access to justice, and democratic
accountability. The SSPA has its flaws, to be sure, but subject to the caveats noted above it marks an
important step forward in the ongoing evolution of the state secrets privilege.
IV: Conclusion The SSPA will not entirely please either critics or supporters of the state secrets status quo.
CPs vs Religious Freedom Adv
1nc Religious Diplomacy CP
CP: The United States federal Government should mandate that all State Department
Diplomats receive courses in religious literacy
Allows the US to utilize effective religious diplomacy
Mandaville and Silvestri, 15 – *Peter, Professor in Government & International Affairs at George
Mason U and ** Sara, Senior Lecturer in Religion and International Politics at City University London and
Director of Research at U of Cambridge (“Integrating Religious Engagement into Diplomacy: Challenges &
Opportunities” 1/29/15, Brookings Institution,
http://www.brookings.edu/~/media/research/files/papers/2015/01/29-religious-engagement-diplomacymandaville-silvestri/issuesingovstudiesmandavillesilvestriefinal.pdf,//BR/)
<In recent years, diplomatic
training schools in the United States and some European countries have begun to offer courses and
religion
and foreign policy. This course, however, is offered on an ad hoc, elective (i.e. non-mandatory) basis and tends to be taken by Foreign
Service officers who are already comfortable with and committed to religious engagement. This means the
capacity of such courses to significantly widen the ranks of those equipped to do such work is limited.10 Similar
efforts run by the British government also operate on an exclusively voluntary basis. The topics covered in such classes also tend to
reinforce existing paradigms for religion in foreign policy—such as international religious freedom and
interfaith work—and as such do not serve to broaden the aperture or take in sectors and issue areas less
commonly associated with religion. The training on religion offered by EU member states and EU institutions for their respective
officials tends to be even more ad hoc than in the United States. For instance, training on Islamism—which generally takes the form of guest
lectures by outside speakers—has been regularly provided to EU officials since Islamic radicalization became a major
issue in the mid-2000s. Yet there is a risk that for lack of experience or bandwidth, European countries end up
uncritically adopting initiatives and approaches created in Washington D.C. or London, without re-adapting them to different
cultural and social system and, simultaneously, importing the many oversimplifications and blind spots that
characterize government approaches to the quite distinct issues of countering violent extremism (CVE) and
Islamist engagement. For training and professional development efforts around religion to truly make a lasting difference, they would
need to be baked into the mandatory preparation that all diplomats receive. The US State Department has
tentatively started a process to explore ways that this can be achieved via the A-100 Class, the basic training platform for all
Foreign Service officers regardless of eventual postings or career specializations. Providing “religious literacy” as a fundamental
diplomatic competency is a complex and fraught undertaking. What are the appropriate approaches and modalities for teaching
seminars on religious engagement. The State Department’s Foreign Service Institute (FSI) now regularly offers a week-long seminar on
these issues given the legal sensitivities and institutional culture concerns raised above? What, precisely, is to be taught? It is unrealistic and
inappropriate to think that purpose of such training would be to teach foreign services officers to think and talk like theologians, or to use religious
reasoning to justify foreign policy or national security interests. Rather, a
“religious literacy” paradigm for training diplomats
would have three core components: 1. World religions and global religious demography – A basic overview of
major world religions including history, core beliefs, and key contemporary institutions/leaders. Introduction to major
trends in religious demography 2. Religion and the advancement of foreign policy interests – A module to introduce diplomats to the
varying roles that religions play in different societies and to develop analytic capacity to better understand
where religion is (and, conversely, is not) relevant to various issues and topics in diplomatic practice. This should also
include coverage of policy areas not previously or conventionally associated with religion. 3. Religious engagement in diplomacy – An
introduction to the practical aspects of engaging with religious leaders, faith-based organizations, and other
religious actors. In addition to protocol issues and questions of cultural sensitivity to faith requirements for example, this module would also help
diplomats develop a capacity to engage the subject matter of their work in terms that relate to values, culture, and
philosophy. The pedagogy here would be informed more by the sorts of questions and debates typical of the humanities—meaning, morality, and
purpose—than by theology, per se. At a time when higher and professional education place an increasing premium on science, technology,
engineering, and math (STEM) subject areas, the clear centrality of religion to international affairs reminds us that the fields comprising the
humanities—philosophy, history, literature, the arts—continue to be of vital importance for the advancement of foreign policy and national security
interests. The introduction of such a curriculum as a core aspect of diplomatic training faces numerous challenges, not least of all the likelihood of
certain objections being raised on principle. Given time pressures and scarcity of resources, any new subject area competing to enter the fray of a
major governmental training system has to compete with other new priority areas as well as well-established topics that already feel they get short
shrift. Such training will also have maximum impact in the shortest amount of time if accompanied by aspects of mid-career training and professional
development tailored for middle managers and senior officials. The
more those in positions of authority are able to appreciate
the importance of religion and religious engagement to fulfilling the mission of the units they lead, the more
likely they are to help those who serve under them to feel incentivized and “safe” in taking some of the risks
associated with religious outreach and engagement. >
1nc Democracy Adv CP
Text: The United States Federal Government should integrate an agenda of
International Religious Freedom into its foreign democracy programs.
Secures the efficacy of democratization
Farr, 9 - Thomas F., Professor of Religion and International Affairs – Georgetown's Edmund A. Walsh
School of Foreign Service and Director – Berkley Center for Religion, Peace, and World Affairs (“The Future
of U.S. International Religious Freedom Policy”, Research Gate,//BR/)
Successfully integrating religious freedom promotion into U .S. policy on democratization and civil society
will require understanding the significant obstacles that exist, both abroad and at home, to doing so. Of all the tasks of
democratic consolidation, embracing religious liberty is, for many cultures, the most difficult. Many majority religious communities (e .g.,
Russian Orthodox, Afghan Sunnis, Indian Hindu nationalists) see religious freedom in general, and U .S . Religious freedom
policy in particular, as a threat to communal identity or an attack on religious tradition. These communities often
seek to maintain a national monopoly over belief and practice by reliance on civil law and policy as a means
of keeping competing religious groups at a disadvantage and retaining their own adherents. The result is public
policies that are incompatible with and destructive of stable democracy, such as anti-apostasy, blasphemy, conversion, and defamation laws.
Moreover, there is a widespread perception in Muslim-majority societies and elsewhere that America’s
democracy promotion policy is fundamentally anti-religious because it seeks a strict separation of religion
from public life and the marginalization of religious ideas and actors in matters of public policy. That
perception extends to U.S. IRF policy, which is often seen as designed to pave the way for American
missionary efforts. When it comes to encouraging religious communities to consider themselves as elements of a broader civil society, U .S.
democracy programs are key. It will be important for those programs not only to target religious communities
but also to fund civil society institutions, religious and secular, that advance religious freedom. Unfortunately,
the United States does not now do this in any systematic way. None of its direct or indirect grant making—e .g. the U .S.
Agency for International Development (USAID), the State Department, the National Endowment for Democracy, the National Democratic Institute,
the International Republican Institute—see religious freedom as critical to the rooting of democracy. While each pays rhetorical tribute to religious
freedom, and each has important individual programs that engage religious actors or communities, none has a comprehensive strategy that integrates
religious freedom into its operational planning or programs.
Download