Inherency/Status Quo The FBI is currently using guidelines for NSLs Bendix et al in 2013 (William Bendix, Assistant Professor of Political Science at Keene State College; Paul Quirk, a former research associate at Brookings Institution, is Phil Lind Chair in U.S. Politics and Representation at the University of British Columbia., “Institutional Failure in Surveillance Policymaking: Deliberating the Patriot Act” Brookings.edu, Number 60; 6/13, 15 pgs., Website, 6/28/15, http://www.brookings.edu/~/media/research/files/papers/2013/07/29%20surveillance%20policymaking%20patri ot%20act%20bendix%20quirk/bendix%20quirk_patriot%20act_v14.pdf) It is debatable whether the U.S. government, overall, has struck a defensible balance between enhancing security and protecting civil liberties. We have seen the implementation of expansive surveillance programs, and we have reason to believe that other important surveillance operations remain classified and undisclosed.39 It is even possible that the executive has withheld eavesdropping activities from Congress. But if recent accounts by Intelligence members are accurate, we have also seen that agents follow multiple court procedures— first by seeking judicial approval to seize records and then by obtaining separate, highly targeted approval to examine records. Most of the very few members of Congress who have closely monitored the FISA process believe that it includes reasonable safeguards. Still, the policymaking system has been overly secretive, dominated by the executive, and slow to identify gaps in privacy protections. We suggest both changes to the Patriot Act and, more important, changes to the institutional arrangements for making decisions on surveillance policy. The FBI is curtailing its use of NSL’s Nakashima in 2011 (Ellen. "FBI Heads to Court More Often to Obtain Data on Personal Internet Usage." The Washington Post. The Washington Post, 26 Oct. 2011. Web. 29 June 2015.) The FBI is increasingly going to court to get personal e-mail and Internet usage information as service providers balk at disclosing customer data without a judge's orders. Investigators once routinely used administrative subpoenas, called national security letters, seeking information about who sent and received email and what Web sites individuals visited. The letters can be issued by FBI field offices on their own authority, and they obligate the recipients to keep the requests secret. But more recently, many service providers receiving national security letters have limited the information they give to customers' names, addresses, length of service and phone billing records. "Beginning in late 2009, certain electronic communications service providers no longer honored" more expansive requests, FBI officials wrote in August, in response to questions from the Senate Judiciary Committee. This marked a shift from comments made last year by Obama administration officials, who asserted then that most service providers were disclosing sufficient information when presented with national security letters. Investigators seeking more expansive information over the past two years have turned to court orders called business record requests . In the first three months of this year, more than 80 percent of all business record requests were for Internet records that would previously have been obtained through national security letters, the FBI said. The FBI made more than four times as many business records requests in 2010 than in 2009: 96 compared with 21, according to Justice Department reports. In response to concerns expressed by administration officials, Judiciary Committee Chairman Patrick J. Leahy (D-Vt.) has introduced a measure that would establish that the FBI can use national security letters to obtain "dialing, routing, addressing and signaling information." It would not include the content of an e-mail or other communications, the administration has said. The administration, which last year contemplated legislation to expand the authority of national security letters, has not taken a formal position on the Leahy measure, officials said. But the FBI has told Congress that the number of business record orders will continue to grow unless a legal change gives the agency more routine access to customer data. Civil liberties groups said Leahy's measure, included in a bill to modernize the Electronic Communications Privacy Act, would expand the government's authority to obtain substantial data about the private communications of individuals without court oversight. "Our view is data like e-mail 'to-from' information is so sensitive that it ought to be available only with a court order," said Greg Nojeim, senior counsel at the Center for Democracy and Technology. Privacy advocates said they support requiring the FBI to use court orders to seek the data. "This is an example of how the system should work," said American Civil Liberties Union legislative counsel Michelle Richardson. Business record requests are also known as Section 215 orders, after a provision in the Patriot Act, the law passed after the Sept. 11, 2001, terrorist attacks. The provision allows the government to obtain "any tangible thing" if officials can show reasonable grounds that it would be relevant to an authorized terrorism or espionage investigation. The ACLU and the Electronic Frontier Foundation on Wednesday plan to separately sue the government to force disclosure of its interpretation of Section 215. The groups are following the lead of Sen. Ron Wyden (D-Ore.), who has accused the administration of inappropriately withholding information about the law's use. On Oct. 19, Assistant Attorney General Ronald Weich wrote to Wyden, saying the government has briefed Congress on the classified uses of Section 215. "We do not believe the Executive Branch is operating pursuant to 'secret law,' " Weich wrote. An NSL is very similar to a grand jury subpoenas and NSLs have to be disclosed to congress currently Hinnen 2011 (“Statement of Todd Hinnen, Acting Assistant Attorney General for National Security, Before the House Judiciary Subcommittee on Crime, Terrorism and Homeland Security” March 30, 2011 http://www.justice.gov/nsd/justice-news-1) A national security letter is effectively an administrative subpoena, issued by a federal agency, requiring the production of certain limited types of information held by third-party custodians. NSLs are used during national security investigations in much the same way as grand jury subpoenas are used during routine criminal investigations. NSLs and grand jury subpoenas allow investigators to acquire the sort of very basic information that can be used as building blocks of an investigation; documents like telephone toll records, and banking and credit records. Unlike grand jury subpoenas, however, NSL authorities are limited to only certain types of records and are found in several distinct statutes, each of which has specific rules governing its use, the types of records that can be obtained, and the nature of the certification that must be provided. And, unlike most grand jury subpoenas, the NSL statutes all contain nondisclosure provisions, which, upon certification from a specified government official, restrict the recipient’s right to disclose the NSL. Finally, also unlike grand jury subpoenas, the government must report to Congress specific information regarding its use of NSLs. Case Advantages Human Rights Not Modeled US has A Cruel Record of Human Rights Carter 2012 (Jimmy Carter, the 39th President of the United States, 6-24-2012, "America’s Shameful Human Rights Record," New York Times, http://www.nytimes.com/2012/06/25/opinion/americasshameful-human-rights-record.html?_r= 0/30/15)TA THE United States is abandoning its role as the global champion of human rights. Revelations that top officials are targeting people to be assassinated abroad, including American citizens, are only the most recent, disturbing proof of how far our nation’s violation of human rights has extended. This development began after the terrorist attacks of Sept. 11, 2001, and has been sanctioned and escalated by bipartisan executive and legislative actions, without dissent from the general public. As a result, our country can no longer speak with moral authority on these critical issues. While the country has made mistakes in the past, the widespread abuse of human rights over the last decade has been a dramatic change from the past. With leadership from the United States, the Universal Declaration of Human Rights was adopted in 1948 as “the foundation of freedom, justice and peace in the world.” This was a bold and clear commitment that power would no longer serve as a cover to oppress or injure people, and it established equal rights of all people to life, liberty, security of person, equal protection of the law and freedom from torture, arbitrary detention or forced exile. The declaration has been invoked by human rights activists and the international community to replace most of the world’s dictatorships with democracies and to promote the rule of law in domestic and global affairs. It is disturbing that, instead of strengthening these principles, our government’s counterterrorism policies are now clearly violating at least 10 of the declaration’s 30 articles, including the prohibition against “cruel, inhuman or degrading treatment or punishment.” Recent legislation has made legal the president’s right to detain a person indefinitely on suspicion of affiliation with terrorist organizations or “associated forces,” a broad, vague power that can be abused without meaningful oversight from the courts or Congress (the law is currently being blocked by a federal judge). This law violates the right to freedom of expression and to be presumed innocent until proved guilty, two other rights enshrined in the declaration. In addition to American citizens’ being targeted for assassination or indefinite detention, recent laws have canceled the restraints in the Foreign Intelligence Surveillance Act of 1978 to allow unprecedented violations of our rights to privacy through warrantless wiretapping and government mining of our electronic communications. Popular state laws permit detaining individuals because of their appearance, where they worship or with whom they associate. The American Constitution is losing its influence – it is outdated, difficult to amend, and guarantees few rights Liptak 2012, Adam Liptak (Supreme Court correspondant of the NY Times) Feb 6, 2012, “We the People loses Appeal with People Around the World”, NY Times, The Constitution has seen better days. Sure, it is the nation’s founding document and sacred text. And it is the oldest written national constitution still in force anywhere in the world. But its influence is waning. In 1987, on the Constitution’s bicentennial, Time magazine calculated that “of the 170 countries that exist today, more than 160 have written charters modeled directly or indirectly on the U.S. version.” A quarter-century later, the picture looks very different. “The U.S. Constitution appears to be losing its appeal as a model for constitutional drafters elsewhere,” according to a new study by David S. Law of Washington University in St. Louis and Mila Versteeg of the University of Virginia. The study, to be published in June in The New York University Law Review, bristles with data. Its authors coded and analyzed the provisions of 729 constitutions adopted by 188 countries from 1946 to 2006, and they considered 237 variables regarding various rights and ways to enforce them. Occupy activists tested a float made with a copy of the Constitution in California. Credit Jae C. Hong/Associated Press “Among the world’s democracies,” Professors Law and Versteeg concluded, “constitutional similarity to the United States has clearly gone into free fall. Over the 1960s and 1970s, democratic constitutions as a whole became more similar to the U.S. Constitution, only to reverse course in the 1980s and 1990s.” “The turn of the twenty-first century, however, saw the beginning of a steep plunge that continues through the most recent years for which we have data, to the point that the constitutions of the world’s democracies are, on average, less similar to the U.S. Constitution now than they were at the end of World War II.” There are lots of possible reasons. The United States Constitution is terse and old, and it guarantees relatively few rights. The commitment of some members of the Supreme Court to interpreting the Constitution according to its original meaning in the 18th century may send the signal that it is of little current use to, say, a new African nation. And the Constitution’s waning influence may be part of a general decline in American power and prestige. In an interview, Professor Law identified a central reason for the trend: the availability of newer, sexier and more powerful operating systems in the constitutional marketplace. “Nobody wants to copy Windows 3.1,” he said. In a television interview during a visit to Egypt last week, Justice Ruth Bader Ginsburg of the Supreme Court seemed to agree. “I would not look to the United States Constitution if I were drafting a constitution in the year 2012,” she said. She recommended, instead, the South African Constitution, the Canadian Charter of Rights and Freedoms or the European Convention on Human Rights. The rights guaranteed by the American Constitution are parsimonious by international standards, and they are frozen in amber. As Sanford Levinson wrote in 2006 in “Our Undemocratic Constitution,” “the U.S. Constitution is the most difficult to amend of any constitution currently existing in the world today.” (Yugoslavia used to hold that title, but Yugoslavia did not work out.) Other nations routinely trade in their constitutions wholesale, replacing them on average every 19 years. By odd coincidence, Thomas Jefferson, in a 1789 letter to James Madison, once said that every constitution “naturally expires at the end of 19 years” because “the earth belongs always to the living generation.” These days, the overlap between the rights guaranteed by the Constitution and those most popular around the world is spotty. Americans recognize rights not widely protected, including ones to a speedy and public trial, and are outliers in prohibiting government establishment of religion. But the Constitution is out of step with the rest of the world in failing to protect, at least in so many words, a right to travel, the presumption of innocence and entitlement to food, education and health care. It has its idiosyncrasies. Only 2 percent of the world’s constitutions protect, as the Second Amendment does, a right to bear arms. (Its brothers in arms are Guatemala and Mexico.) Many foreign judges say they have become less likely to cite decisions of the United States Supreme Court, in part because of what they consider its parochialism. “America is in danger, I think, of becoming something of a legal backwater,” Justice Michael Kirby of the High Court of Australia said in a 2001 interview. He said that he looked instead to India, South Africa and New Zealand. Mr. Barak, for his part, identified a new constitutional superpower: “Canadian law,” he wrote, “serves as a source of inspiration for many countries around the world.” The new study also suggests that the Canadian Charter of Rights and Freedoms, adopted in 1982, may now be more influential than its American counterpart. The Canadian Charter is both more expansive and less absolute. It guarantees equal rights for women and disabled people, allows affirmative action and requires that those arrested be informed of their rights. On the other hand, it balances those rights against “such reasonable limits” as “can be demonstrably justified in a free and democratic society.” There are, of course, limits to empirical research based on coding and counting, and there is more to a constitution than its words, as Justice Antonin Scalia told the Senate Judiciary Committee in October. “Every banana republic in the world has a bill of rights,” he said. “The bill of rights of the former evil empire, the Union of Soviet Socialist Republics, was much better than ours,” he said, adding: “We guarantee freedom of speech and of the press. Big deal. They guaranteed freedom of speech, of the press, of street demonstrations and protests, and anyone who is caught trying to suppress criticism of the government will be called to account. Whoa, that is wonderful stuff!” “Of course,” Justice Scalia continued, “it’s just words on paper, what our framers would have called a ‘parchment guarantee.’ ” US has bad human rights now – 348 abuses found by the UN Dakwar 05/15 (Jamil Dakwar, Director, ACLU Human Rights Program, MAY 15, 2015”UN Issues Scathing Assessment of US Human Rights Record”, https://www.aclu.org/blog/speak-freely/un-issuesscathing-assessment-us-human-rights-record) The U.N. Human Rights Council adopted a scathing report today, consisting of 348 recommendations that address myriad human rights violations in the United States. The report came out as a part of a mechanism called the Universal Periodic Review (UPR), which examines the human rights record of all U.N. member states. The council questioned the United States on its record earlier this week. Although many of these recommendations in the report are redundant or too general to offer tangible solutions to the human rights situation in the U.S., they echo many of the concerns raised by U.S. civil society groups like the ACLU, who attended the review and offered concrete recommendations to reverse policies that are inconsistent with international human rights principles. For example, the report adopted a recommendation made by Sweden to "halt the detention of immigrant families and children, seek alternatives to detention and end use of detention for reason of deterrence." The report also adopted several recommendations calling on the Obama administration to independently investigate allegations of torture documented in the recent Senate torture report and provide reparations to victims. Denmark, for instance, recommended that the United States "further ensure that all victims of torture and ill-treatment — whether still in US custody or not — obtain redress and have an enforceable right to fair and adequate compensation and as full rehabilitation as possible, including medical and psychological assistance." In addition, the report included many fitting recommendations to address police brutality and excessive use of force as well as ending racial profiling against minorities and immigrants. Mexico recommended that the U.S. "adopt measures at the federal level to prevent and punish excessive use of force by law enforcement officials against members of ethnic and racial minorities, including unarmed persons, which disproportionately affect Afro American and undocumented migrants." Ireland, for its part, directly touched on the broken trust between American law enforcement and communities of color and recommended that the U.S. "continue to vigorously investigate recent cases of alleged police-led human rights abuses against African-Americans and seek to build improved relations and trust between U.S. law enforcement and all communities around the U.S." While in some areas, like LGBT rights and freedom of speech, the United States' human rights record fares far better than other parts of the world, in many areas — including national security, criminal justice, social and economic rights, and immigration policy — the U.S. has an abysmal record compared to other liberal democracies. This report sends a strong message of no-confidence in the U.S. human rights record. It clearly demonstrates that the United States has a long way to go to live up to its human rights obligations and commitments. This will be the last major human rights review for the Obama administration, and it offers a critical opportunity to shape the president's human rights legacy, especially in the areas of racial justice, national security, and immigrants' rights. The Obama administration has until September to respond to the 348 recommendations. At that time, the administration will make a direct commitment to the world by deciding which of the 348 will be accepted and implemented over the next four years, and which will be rejected. While many of the recommendations fall outside the constitutional powers of the executive branch — such as treaty ratification and legislative actions on the national, state, and local levels — the Obama administration should use its executive powers to their fullest extent to effectuate U.S. human rights obligations. The U.S. record for implementing U.N. recommendations has thus far been very disappointing, but if President Obama really cares about his human rights legacy, he should direct his administration to adopt a plan of action with concrete benchmarks and effective implementation mechanisms that will ensure that the U.S. indeed learns from its shortcomings and genuinely seeks to create a more perfect union. The world will be watching. HRs Violated Frequently Human rights are violated all the time while governments stand by Gummow, 2013 Gummow, Jodie. "14 Shocking Global Human Rights Violations of 2013." AlterNet. Alternet, 26 Dec. 2013. Web. 30 June 2015. From rampant violence and sexual abuse against women, to the commission of crimes against humanity by dictators, 2013 was a year filled with pervasive human rights violations worldwide. Government response to the atrocities was disappointing, marked by lack of transparency and accountability, blatant malevolence and a disregard for human life. Yet, international human rights advocates remained tenacious, inciting massive protests and public condemnation in an effort to demand an end to the culture of impunity. Here are some of most outrageous travesties of justice that captured our attention and had us up in arms this year. 1. Unsafe labor conditions in Bangladesh led to world’s worst garment industry tragedy as thousands died in horrific building collapse. On April 24, the Rana Plaza factory in Dhaka, Bangladesh, which housed six factories that produce clothing for Western brands, collapsed, killing over 1000 factory workers and injuring over 2500 people. While the owners of the factory came under fire for ignoring previous warnings of cracks in the wall, many pointed the blame at global corporations like Walmart and the Gap for exploiting workers for cheap labor and failing to provide adequate fire and building safeguards in factories where their products are made. Worldwide protests ensued with a view to putting pressure on major retailers to sign a legally binding accord aimed at improving labor conditions in Bangladesh, which to date has 100 signatories. 2. Egypt’s epidemic of violence and sexual abuse resulted in more than 600 deaths and 91 women assaulted in four days of riots at Tahrir Square. On the first anniversary of the election of President Mohamed Morsi on June 30, thousands of Egyptians took to the streets in Tahrir Square in Cairo demanding the dictator’s resignation. During the four days of protests, at least 91 women were attacked and sexually assaulted by mobs, while government leaders and police stood by and failed to intervene. Some women required extensive medical surgery after being subjected to brutal gang rapes and sexual assault with sharp objects. After the protests, survivors came forward to tell their stories and demand better protections for women. While the protests led to the end of Morsi’s presidency, the government downplayed the violence, prompting international calls to improve law enforcement and bring perpetrators to justice. These actions proved fruitless, as security forces again came under fire in August for using live ammunition against citizens resulting in 638 deaths. 3. Burma committed ethnic cleansing against thousands of Rohingya Muslims; 28 children hacked to death and mass graves uncovered. Burma’s quasi-civilian government was accused of committing crimes against humanity in the Rakhine State for forcibly displacing more than 125,000 Rohingya Muslims, the religious minority. A Human Rights Watch report revealed that authorities denied tens of thousands of stateless Muslims access to humanitarian aid, destroyed mosques, conducted mass arrests and issued a public statement promoting ethnic cleansing. Security forces stood aside and directly assisted Arakanese mobs in attacking and killing Muslim communities. In October, at least 70 Rohingya were killed in a day-long massacre in which 28 children hacked to death. Four mass gravesites were uncovered. The persecution stems from a long internal conflict in Burma essentially emanating from an arbitrary citizenship law passed in 1982 which denies Burmese citizenship to Rohingya on discriminatory ethnic grounds. In recent times, lack of rule of law has led to thousands of Rohingya fleeing the country. 4.North Korea’s large-scale human rights abuses revealed: 120,000 prisoners held in gulags, citizens starved and publicly executed by firing squad. North Korea’s appalling human rights record is no secret. Following the death of Kim Jong-il in 2011, any hope of improvement in the country was short-lived with the appointment of successor, Kim Jong-un. The young dictator quickly became more ruthless than his father, inflicting mass atrocities against his population. In September, a UN investigation revealed shocking evidence from defectors who compared life in DPRK to that of the German-run concentration camps in WWII. Prisoners in the gulags lucky enough to escape described atrocities including witnessing a woman forced to drown her own baby in a bucket. 120,000 people are still thought to be held in gulags. Public executions by firing squad have also continued at unprecedented levels under Jong-un’s rule, including the execution of the dictator’s own uncle and former girlfriend. The Security Council has been criticized for failing to refer the matter to the International Criminal Court, a move that seems unlikely given North Korea’s long alliance with China. 5. A chemical weapons attack in Syria. Syria’s ongoing civil war, which in almost three years has claimed the lives of approximately 100,000 people, continued full, force and throttle. In August, Syrian government forces under ruthless leader Bashar al-Assad were suspected of launching chemical weapon attacks on two Damascus suburbs, killing hundreds of civilians including children. Following the attack, an influx of disturbing and emotionally wrenching video footage infiltrated social media. In September, Russia and the United States announced an agreement that would lead to the abolition of Syria’s chemical weapons. The Organization for the Prohibition of Chemical Weapons was subsequently tasked with ensuring all chemical weapons and equipment in Syria be destroyed by mid-2014, though many remain skeptical about Assad’s compliance with the order. 6. Uganda, India and Russia passed draconian laws against homosexuality. While there were increasing wins for gay rights around the globe this year, including a number of U.S. states, LGBT rights took a major step back in other parts of the world. Uganda abolished the death penalty as punishment for having gay sex, but it passed an anti-gay law punishing “aggravated homosexuality” with life imprisonment. The new provision drew international criticism by gay rights activists, particularly after Uganda’s parliament expressed that the anti-gay law was a “Christmas gift” to all Ugandans. Meanwhile, India’s Supreme Court reinstated a ban against homosexuality, making gay sex a criminal offense, prompting human rights groups to file a petition seeking a review of the decision on the grounds that the law is unconstitutional. Russia’s anti-gay laws also came under fire for a bill that banned propaganda of “nontraditional sexual relations." 7. Turkey's Islamic fundamentalist regime attacked secular groups for peacefully assembling. Once considered the most modernized and advanced Islamic nation after founding father President Ataturk created a secular state, a number of civil rights violations in 2013 have led to fears that Turkey’s conservative government is heading toward Islamic fundamentalism. This summer, Turkish authorities were accused of using excessive police violence to put down an environmental sit-in over government plans to build a barracks in Gezi Park. During the demonstration, police used live ammunition, tear gas, water cannons and plastic bullets to suppress the masses. Authorities were also accused of sexually abusing female demonstrators and severely beating protestors, leaving more than 8000 people injured. The actions have outraged Turkey’s secular population. Protestors viewed the move as another indicator of the authoritarian propensities of Turkish Prime Minister Recep Tayyip Erdogan and his Islamist party. 8. Qatar’s construction sector rife with migrant worker abuse leading up to World Cup preparation. This year, the International Trade Union Confederation found that as a result of the construction frenzy surrounding the 2022 World Cup, 12 laborers would die each week unless the Doha government made urgent labor reforms. Half a million extra workers from countries like Nepal, India and Sri Lanka are expected to arrive to work in an effort to complete infrastructure in time for the World Cup kickoff. However, the ITUC said the annual death toll could rise to 600 people a year as construction workers are subjected to harsh and dangerous work conditions daily. A comparable study revealed that 44 migrant construction workers from Nepal died in the summer working in exploitive conditions, with workers describing forced labor conditions where they work in 122 degree heat and live in squalor. 9. Forced sterilization for disabled underage girls in Australia sparked outrage as attempts to reform the laws failed. The involuntary sterilization of disabled people in Australia remains lawful after the Senate ruled that it would not ban the procedure in 2013. Disabled girls are sterilized to manage menstruation and the risks associated with sexual exploitation, which human rights groups argue is a form of violence against women. Australian families are able to apply for court orders to allow involuntary sterilization of their disabled children. A court previously ruled that it was in the best interests of an 11-year-old girl who suffered a neurological disorder to have a hysterectomy, which caused a media storm. Human rights groups argued that fertility is a basic human right and that sterilization is not a substitute for proper education about family planning and support during menstruation. The Human Rights Commission said “one sterilization, one forced or coerced is one too many.” 10. Afghanistan attempted to reintroduce public stoning for adulterers; women were forced to undergo vaginal examinations to prove virginity. Women’s rights suffered a massive blow in Afghanistan in 2013. Cases of violence against women grew by 28 percent and females continued to be treated as second-class citizens. President Hamid Karzai backed away from government plans to implement a controversial law reintroducing public stoning as punishment for adultery after the draft law was leaked causing international outrage. Women’s rights groups condemned invasive vaginal examinations women are forced to undergo to ascertain “virginity” every time a girl is arrested on a morality charge. As the 2014 deadline to withdraw combat action in Afghanistan approaches, activists fear that the removal of soldiers will trigger further deterioration of the chaotic human rights situation in the country, particularly for women. 11. Israel’s mistreatment of Palestinian children resulted in 700 child detentions. The precarious situation in the Middle East between Palestinians and Israelis led to a number of gross human rights violations committed by Israeli soldiers against Palestinian children. A UNICEF report revealed that in the second quarter of 2013, 700 Palestinian children aged 12-17 were arrested and subjected to solitary confinement, threats of death and sexual assault by Israeli military and police in the occupied West Bank. In November, an Israeli Defense Force soldier on a Ukraine game show nonchalantly discussed killing Palestinian toddlers as young as 3 years old. A 12-year-old Palestinian boy was paralyzed after he was shot and seriously injured by an Israeli solider as he attempted to retrieve his school bag, and a 14-year-old Palestinian girl died en route to hospital this month as a result of tightened Israeli security at Israeli-controlled checkpoints, prompting public outrage. 12. New wave of repression against civil society swept Saudi Arabia as women continued to protest against de facto ban on driving. With more than 40,000 political prisoners in detention and democracy silenced by threats of intimidation and arrests, 2013 was one of the worst years for human rights in Saudi Arabia, according to activists. In addition, women faced major oppression. While women will now be allowed to vote in 2015, Saudi females are still not allowed to drive, despite the fact there is no express law making it illegal. In protest this October, women in Saudi Arabia defied the de facto ban on driving by getting behind the wheel in a brave display of civil disobedience, as part of their Women2Drive campaign. The move prompted threats of punishment by the government and resulted in the detention of 14 women. 13. South Sudan declared a humanitarian crisis with bloody massacres, 100,000 refugees, discovery of mass graves and violent attacks on U.N peacekeepers. Post-independence, South Sudan was stricken with internal conflict in 2013 resulting in extrajudicial killings and numerous human rights atrocities. While Sudan’s north is home to mainly Arabic-speaking Muslims, South Sudan has no dominant culture. Instead, it is home to some 200 ethnic groups, each with its own beliefs and language. In a recent spate of ethnically motivated violence between the two largest ethnic groups, the Dinkas and Nuers, security forces shot and killed more than 200 people in the capital Juba. Almost 100,000 people have been displaced as a result of the violence. In reponse, the Security Council doubled UN peacekeeping troops to bolster its mission to protect civilians. The United Nations compound was raided earlier this year killing Indian peacekeepers. This week alone, the UN discovered 75 bodies in mass graves, evidence of ethnic killings taking place. 14. French military intervention in Mali led to catastrophic escalation of retaliatory ethnic violence fueled by poverty and famine. The security situation in Mali made headlines in 2013 following French intervention, which arguably exacerbated conditions in the wartorn country. The ongoing armed conflict led to appalling human rights violations fraught with a lack of government accountability. In June, UN investigation revealed countless cases of extrajudicial executions, torture and enforced disappearances of civilians carried out by both Tuareg rebels and the army. Soldiers were accused of torturing Tuaregs while French-led forces attempted to oust Islamist militants. The precarious situation was further aggravated by pervasive food insecurity and extreme poverty throughout Africa’s Sahel region, which stretches from the Atlantic Ocean to the Red Sea. According to the United Nations the United States is failing in 25 human rights issues Hudson 2014 Hudson, Adam. "UN Human Rights Committee Finds US in Violation on 25 Counts." Truthout. Truth Out, 4 Apr. 2014. Web. 30 June 2015. While President Obama told the country to "look forward, not backward" when it came to Bush's torture program, the United Nations has taken a different route. Recently, the UN Human Rights Committee issued a report excoriating the United States for its human rights violations. It focuses on violations of the International Covenant on Civil and Political Rights, to which the country is party. The report mentions 25 human rights issues where the United States is failing. This piece will focus on a few of those issues Guantanamo, NSA surveillance, accountability for Bush-era human rights violations, drone strikes, racism in the prison system, racial profiling, police violence, and criminalization of the homeless. Accountability for Bush-Era Crimes; Torture The UN committee expressed concerned with "the limited number of investigations, prosecutions and convictions of members of the Armed Forces and other agents of the US government, including private contractors" for "unlawful killingsin its international operations" and "torture" in CIA black sites during the Bush years. It welcomed the closing of the CIA black sites, but criticized the "meagre number of criminal charges brought against low-level operatives" for abuses carried out under the CIA's rendition, interrogation and detention program. The committee also found fault with the fact that many details of the CIA's torture program "remain secret, thereby creating barriers to accountability and redress for victims." In response to the 9/11 terrorist attacks, the Bush administration jettisoned the Constitution and international law and openly embraced the use of torture against suspected terrorists captured overseas. The CIA tortured people in secret prisons around the world known as "black sites." Torture was sanctioned from the top down. Then-President George W. Bush, Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, National Security Advisor Condoleezza Rice, lawyers and many others in the executive branch played roles in crafting nifty ways to justify, approve and implement the use of torture. Rather than be held accountable, the top-level government officials responsible for authorizing torture and other crimes have been given comfort in the public sphere. Condoleezza Rice returned to Stanford University as a political science professor. John Yoo, who authored the torture memos, is a law professor at UC Berkeley. Jose Rodriguez, a former CIA officer in the Bush administration, vigorously defends torture in his autobiography and interviews. George W. Bush, Dick Cheney and Donald Rumsfeld are able to rest comfortably in retirement and continue to defend their records. Of the report's 25 issues, four looked at racial disparities within the United States' criminal justice system and law enforcement practices. In the Guantanamo military commissions, evidence of torture is concealed. A "protective order" restricts what defense lawyers and the accused can say about how the defendants were treated in CIA black sites, including details of torture, because that information is classified. Defense lawyers have been fighting for declassification of those details, as they are mitigating evidence. The potential release of portions of the Senate Intelligence Committee's report on the CIA torture program could tip the scale the defense attorneys' favor. "There is every reason to believe the SSCI [Senate Select Committee on Intelligence] Report contains information about the CIA's torture of Mr. al Baluchi," said defense attorney James Connell, who represents Ammar al-Baluchi, one of the five 9/11 defendants, in a press statement. "The SSCI knows the truth of what happened, and the military commission considering whether to execute Mr. al Baluchi should know too." Racism in the Prison System; Racial Profiling; Police Brutality Of the report's 25 issues, four looked at racial disparities within the United States' criminal justice system and law enforcement practices. It denounced the "racial disparities at different stages in the criminal justice system, sentencing disparities and the overrepresentation of individuals belonging to racial and ethnic minorities in prisons and jails." The committee condemned racial profiling by police and FBI/NYPD surveillance of Muslims - but it did welcome plans to reform New York City's "stop and frisk" program. It also denounced the continuing use of the death penalty and "racial disparities in its imposition that affects disproportionately African Americans." Finally, it expressed concern at "the still high number of fatal shootings by certain police forces" and "reports of excessive use of force by certain law enforcement officers including the deadly use of tasers, which have a disparate impact on African Americans, and the use of lethal force by Customs and Border Protection (CBP) officers at the US-Mexico border." The United States contains the largest prison population in the world, holding over 2.4 million people in domestic jails and prisons, immigration detention centers, military prisons, civil commitment centers and juvenile correctional facilities. Its prison population is even larger than those of authoritarian governments like China and Russia, which, respectively, hold 1,640,000 and 681,600 prisoners, according to the International Centre for Prison Studies. More than 60 percent of the US prison population are people of color. African Americans, while 13 percent of the national population, constitute nearly 40 percent of the prison population. Moreover, one in every three black males can expect to go to prison in their lifetime, compared to one in every six Latino males, and one in every 17 white males. Thus, black men are six times more likely to be incarcerated than white men. Even though whites and blacks use drugs at roughly the same rates, African Americans are more likely to be imprisoned for drug-related offenses than whites. Every 28 hours, a black person is killed by a police officer, security guard, or self-appointed vigilante, according to a report by the Malcolm X Grassroots Movement. Recently in New York City, NYPD brutalized two teenage AfricanAmerican girls at a Chinese restaurant in Brooklyn. A 16-year-old girl's face was slammed against the floor, while police threw the 15-year-old through the restaurant's window, shattering it as a result. The incident started when police ordered everyone to leave the restaurant, but one of the girls refused. While police violence against people of color has long existed, the militarization of American police exacerbates this trend. This trend began when Richard Nixon inaugurated the War on Drugs in the 1970s. Then in 1981, President Ronald Reagan signed the Military Cooperation with Civilian Law Enforcement Agencies Act, which provided civilian police agencies with military equipment, training, advice and access to military research and facilities. When 9/11 hit, police militarization kicked into overdrive with the creation of the Department of Homeland Security, which has given police still greater access military equipment like armored personnel carriers and high-powered weapons for anti-terrorism purposes. Now police look, act and think like the military, with dangerous consequences for the communities they serve. Among the report's suggestions to curb excessive police violence were better reporting of incidents, accountability for perpetrators, and "ensuring compliance with the 1990 UN Basic Principles on the Use of Force and Firearms by Law Enforcement Officers". The Basic Principles include a number of provisions, including "Law enforcement officials, in carrying out their duty, shall, as far as possible, apply non-violent means before resorting to the use of force and firearms" and "Governments shall ensure that arbitrary or abusive use of force and firearms by law enforcement officials is punished as a criminal offence under their law." Drone Strikes, Assassination To execute its perpetual global war on terrorism, the Bush administration favored large-scale, conventional land invasions and occupations, as in Iraq and Afghanistan. Obama has moved away from such operations and embraced seemingly lighter tactics of irregular warfare to continue the perpetual war, while making it less visible to Americans. Extrajudicial killing and drone strikes are the most notable methods, but others include air strikes, cruise missile attacks, cyberwarfare, special operations, and proxy wars. These tactics have meant more use of the military's Joint Special Operations Command (JSOC) and the paramilitary branch of the CIA. Both the CIA and JSOC carry out drone strikes and sometimes collaborate in joint operations. The CIA, not the military, is legally mandated to launch covert operations, which are classified and unacknowledged by the US government. However, JSOC performs essentially the same operations, particularly extrajudicial killings. Thus, transferring control of the drone program from the CIA to the military would make little difference. The UN report criticized the United States' assassination program and drone strikes. It expressed concerned with the "lack of transparency regarding the criteria for drone strikes, including the legal justification for specific attacks, and the lack of accountability for the loss of life resulting from such attacks." The United States' position for justifying its extrajudicial killing operations is that it is engaged in an armed conflict with al-Qaeda, the Taliban and "associated forces" - a term the Obama administration created to refer to co-belligerents with al-Qaeda - and that the war is in accordance with the nation's inherent right to self-defense against a terrorist enemy. However, the committee took issue with the United States' position, particularly its "very broad approach to the definition and the geographical scope of an armed conflict, including the end of hostilities." A May 2010 report by Philip Alston, former UN special rapporteur on extrajudicial, summary or arbitrary executions, notes that, under international law, states cannot wage war against non-state actors, such as international terrorist groups like al-Qaeda, because of their nebulous character and loose affiliations. The committee's report also took issue with "the unclear interpretation of what constitutes an 'imminent threat' and who is a combatant or civilian taking a direct part in hostilities, the unclear position on the nexus that should exist between any particular use of lethal force and any specific theatre of hostilities, as well as the precautionary measures taken to avoid civilian casualties in practice." So far, US drone strikes and other covert operations have killed between 2,700 and nearly 5,000 people. Under international law, self-defense against an "imminent" threat is "necessity of that self-defense is instant, overwhelming, and leaving no choice of means, and no moment for deliberation." However, the Obama administrationcompletely obliterated this meaning. In a16-page white paper leaked to NBC News, the Obama administration believes that whether "an operational leader present an 'imminent' threat of violent attack against the United States does not require the United States to have clear evidence that a specific attack on U.S. persons and interest will take place in the immediate future." Thus, a "high-level official could conclude, for example, that an individual poses an 'imminent threat' of violent attack against the United States where he is an operational leader of al-Qa'ida or an associated force and is personally and continually involved in planning terrorist attacks against the United States" without any proof of an actual plot against the U.S. Thus, in Obama-lingo, the word "imminent" means the complete opposite of what it is in the English language. There is no due process in the assassination program, either. President Obama and his advisors decide who will be killed by a drone strike in a secret internal executive branch process that occurs every Tuesday. Even American citizens are fair game for the assassination program. In fact, four US citizens have been killed by drone strikes, including a 16-year-old boy. A database called the "disposition matrix" adds names to kill or capture lists, ensuring the assassination program will continue no matter who is in office. Targeting for drone strikes is not based on human intelligence but, rather, signals intelligence, particularly metadata analysis and cellphone tracking. According to a report by The Intercept, the NSA geolocates a SIM card or mobile phone of a suspected terrorist, which helps the CIA and JSOC to track an individual to kill or capture in a night raid or drone strike. However, it is very common for people in places like Yemen or Pakistan, to hold multiple SIM cards, give their phones, with the SIM cards in them, to children, friends, and family, and for groups like the Taliban to randomly distribute SIM cards among their units to confuse trackers. As a result, since this methodology targets SIM cards rather than real people, civilians are regularly killed by mistake. As with the word "imminent," the Obama administration utilizes its own warped definitions of "civilian" and "combatant." As The New York Times reported in May 2012, the Obama administration "counts all military-age males in a strike zone as combatants . . . unless there is explicit intelligence posthumously proving them innocent." Despite claims to the contrary, drone strikes kill a significant number of civilians and inflict serious human suffering. So far, US drone strikes and other covert operations have killed between 2,700 and nearly 5,000 people, including 500 to more than 1,100 civilians in Pakistan, Yemen and Somalia, according to the Bureau of Investigative Journalism's figures. Many of those deaths occurred under Obama's watch, with drone strikes killing at least 2,400 people during his five years in office. Only 2 percent of those killed by drone strikes in Pakistan are high-level militants, while most are low-level fighters and civilians. In addition to causing physical harm, drone strikes terrorize and traumatize communities that constantly live under them. Drone strikes have lulled in Pakistan due to peace talks between the Pakistani government and Pakistan Taliban, which collapsed on February 17. The last US drone strike in Pakistan happened on Christmas Day 2013. In Yemen, drone strikes have continued. Several US drone strikes in Yemen occurred during the first 12 days of March. Last November, six months after President Obama laid out new rules for US drone strikes, a TBIJ analysis showed that "covert drone strikes in Yemen and Pakistan have killed more people than in the six months before the speech." It also was recently reported that the Obama administration is debating whether to kill a US citizen in Pakistan who is suspected of "actively plotting terrorist attacks," according to The New York Times. It is very likely these operations will continue. The Pentagon's 2015 budget proposal, taking sequestration into account, spends $0.4 billion less than 2014 at $495.6 billion, shrinks the Army down to between 440,000 to 450,000 troops from the post-9/11 peak of 570,000, and protects money for cyberwarfare and special operations forces. Cyber operations are allocated $5.1 billion in the proposal, while US Special Operations Command gets $7.7 billion, which is 10 percent more than in 2014, and a force of 69,700 personnel. While President Obama promised to take the United States off a "permanent war footing," his administration's policies tell a different story. The Obama administration is reconfiguring, rather than halting, America's "permanent war footing." Guantanamo, Indefinite Detention President Obama recommitted himself to closing the prison in Guantanamo last year, but has made little progress, which the UN report noted. The committee said it "regrets that no timeline for closure of the facility has been provided." It also expressed concern that "detainees held in Guantanamo Bay and in military facilities in Afghanistan are not dealt with within the ordinary criminal justice system after a protracted period of over a decade in some cases." The report called on the United States to expedite the transfer of prisoners out of Guantanamo, close the prison, "end the system of administrative detention without charge or trial" and "ensure that any criminal cases against detainees held in Guantanamo and military facilities in Afghanistan are dealt with within the criminal justice system rather than military commissions and that those detainees are afforded fair trial guarantees." Indefinite detention violates international human rights law, but has been embraced by Obama ever since he stepped into the White House. Currently, 154 men remain held in the prison at Guantanamo Bay. Of those, 76 are cleared for release; around four dozen will remain in indefinite detention; 20 can be "realistically prosecuted," according to chief prosecutor Brig. Gen. Mark Martins' estimate; six are being tried in military commissions and two are serving sentences after being convicted in the commissions. President Obama promised to close Guantanamo right when he stepped into office. However, he has yet to fulfill that promise. Congressional obstructionism, especially from the Republican Party, has stalled his plans. For a long time, Congress blocked funding for transferring Guantanamo prisoners. Recently, though, Congress easedthose restrictions, making it easier to transfer prisoners to other countries, but not to the United States. While the Obama administration is working to close the prison at Guantanamo, it maintains the policy of indefinite detention without trial, designating nearly four dozen Guantanamo prisoners for forever imprisonment. Obama's original plan to close Guantanamo was to open a prison in Illinois to hold Guantanamo detainees, many indefinitely. While soon killed, this plan would have effectively moved the system of indefinite detention from Guantanamo to US soil. Now the Obama administration is considering opening a prison in Yemen to hold the remaining Guantanamo prisoners, many of whom are Yemeni. Indefinite detention violates international human rights law, but has been embraced by Obama ever since he stepped into the White House. The 2012 National Defense Authorization Act (NDAA) that Obama signed into law contains sections that allow for the indefinite detention of US citizens on American soil. NSA Surveillance Notably, the UN report denounced the NSA's mass surveillance "both within and outside the United States through the bulk phone metadata program (Section 215 of the PATRIOT Act) and, in particular, the surveillance under Section 702 of Amendments to the Foreign Intelligence Surveillance Act (FISA) conducted through PRISM (collection of the contents of communications from US-based companies) and UPSTREAM (tapping of fiber-optic cables in the country that carry internet traffic) programs and their adverse impact on the right to privacy. "The report also criticized the secrecy of "judicial interpretations of FISA and rulings of the Foreign Intelligence Surveillance Court (FISC)," which prevent the public from knowing the laws and legal interpretations that impact them. Promises of "oversight" obviously did not persuade the committee, either, as it said "the current system of oversight of the activities of the NSA fails to effectively protect the rights of those affected," and "those affected have no access to effective remedies in case of abuse." Continuing NSA leaks, provided by former intelligence contractor Edward Snowden last year, have revealed the depth of the United States' massive surveillance system. The bulk collection of phone metadata is probably the most well-known program. Recently, President Obama proposed ending the bulk phone metadata collection program. But the NSA's surveillance system extends far beyond phone metadata. In a program called PRISM, the NSA collects user data, such as search history and message content, sent through internet communication services like Google, Yahoo!, Facebook and Skype. Major tech companies have denied knowledge of the program, but the NSA claims those companies knew and provided full assistance. The NSA uses a back door in surveillance law to monitor the communications of American citizens without a warrant. As mentioned earlier, the NSA is also involved in the drone program through the collection of signals intelligence. Additionally, much of NSA surveillance is used for economic espionage. With the help of Australian intelligence, the NSA spied on communications between the Indonesian government and an American law firm representing it during trade talks. Indonesia and the United States have long been in trade disputes, such as over Indonesia's shrimp exports and a US ban on the sale of Indonesian clove cigarettes. It is highly unlikely Obama's reforms will curb these abuses. Criminalizing the Homeless The plight of homeless people is rarely held up as a pressing human rights issue. But, in the UN report, it is. The committee expressed concern "about reports of criminalization of people living on the street for everyday activities such as eating, sleeping, sitting in particular areas etc." It also "notes that such criminalization raises concerns of discrimination and cruel, inhuman, or degrading treatment." For evidence of such criminalization and of "cruel, inhuman, or degrading treatment," look no further than to the liberal, historically countercultural city of San Francisco. The city that smugly prides itself on progressivism has a sit-lie ordinance that forbids people from sitting or lying on public sidewalks between 7 AM and 11 PM. It particularly hurts and targets homeless people. In the same city, homeless people are washed away. Street cleaners from the San Francisco Department of Public Works regularly spray their high-powered hoses at homeless people sleeping on the streets. Recently, in Albuquerque, New Mexico, police shot and killed a homeless man. His crime? Illegal camping . . . in the Albuquerque foothills. Albuquerque police went to arrest 38-year-old James Boyd, who was sleeping in a campsite he set up. After arguing with police for three hours, Boyd was apparently about to leave and picked up his belongings. As he started walking down the hill, police shot a flash-bang device at Boyd. Disoriented, he dropped his bags, appeared to take out a knife, and then police fired multiple bean-bag rounds at Boyd. The man fell to the ground, hitting his head on a rock, his blood spattered on it. Officers yelled at him, telling Boyd to drop his knife. When Boyd didn't answer, police fired more bean-bag rounds and sicced their dog on him. Boyd was later taken to a hospital and pronounced dead a day later. In addition to stun guns and bean bags, officers shot six live rounds at Boyd. The shooting prompted an FBI investigation, which is ongoing, and a protest in Albuquerque that was met with intense police violence as officers fired tear gas into the crowd. Clean Your Own Backyard The UN report elevates the suffering inflicted by US domestic and foreign policies to the realm of international human rights. To be tortured, spied on, unjustly imprisoned, put in solitary confinement, indefinitely detained, extrajudicially killed by the state, racially profiled, deprived of a home and criminalized for being homeless is to have one's basic human rights violated and dignity as a human demolished. That's why there are international laws to protect those rights - laws with which the United States and every nation-state are bound to comply. Even as the United States commonly condemns other countries for their human rights abuses, it has yet to clean its own house. Human rights are continuing to be broken even now. United Nations Human Rights in 2015 (Office of the High Commissioner for Human Rights, “Human Rights Council opens twenty-eight session”, United Nations Human Rights, http://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=15630&LangID=E) BAN KI-MOON, United Nations Secretary-General, in a video message, said that the world faced serious human rights violations from discrimination, inequality and violent extremism and the challenge was to keep those from occurring. The United Nations had the mandate and tools in place to act preventively and the biggest challenge to using those tools was the lack of political consensus between Member States. The United Nations Secretary-General appealed to the Human Rights Council to support the work of local human rights actors who were the only guarantee of national sovereignty, and looked at Member States to generate that most needed shift in the ways of working. The United States has poor human rights standards – social and economic failures NESRI, no date (National Economic and Social Rights Initiative, “Human rights in the United States: Beginning at Home” http://www.nesri.org/human-rights/human-rights-in-the-united-states) Human Rights in the United States: Beginning at Home Introduction In recent history, the United States government and many organizations in the United States have often talked about human rights as if they were only relevant to abuses in other countries, and claims of human rights violations were leveled by, not at, the U.S. government. Although human rights documents and treaties claimed to discuss universal rights obligations that applied to all countries, the prevailing wisdom was that people in the United States did not need human rights standards or international scrutiny to protect their rights. Yet, many Americans have always believed that the struggle for human rights is profoundly relevant to the United States. One of the earliest uses of the term “human rights” is attributed to Frederick Douglas when he referred to the fundamental rights of enslaved African-Americans at the time when the United States did not recognize their humanity or their rights. Indeed, the idea that all individuals have fundamental rights rooted in the concept of human dignity and that the international arena might provide support in domestic rights struggles has often resonated with marginalized and disenfranchised people. So it was no surprise that U.S. rights organizations, including the NAACP and the American Jewish Congress, played a crucial role in the birth of the modern human rights movement. Both groups helped to ensure that human rights were included in the UN Charter which founded the United Nations. Despite fierce resistance from adversaries of human rights, such as avowed segregationists or more recently advocates of U.S. exceptionalism, who successfully delayed human rights advocacy within the United States for decades, there has been a growing domestic human rights movement that is committed to the long term vision of ensuring the full range of human rights for all within or at our borders. This movement - comprised of community organizers, academics and scholars, lawyers, artists, web activists, policy advocates, economists, educators and many others - is multi-issue covering the span of civil, political, economic, social and cultural rights. It is ambitious in its breadth and scope and audacious in its aspirations. There are many voices that still argue that rights such as health care or housing are only commodities that serve market interests. The human rights movement, however, is a platform for voices who argue, intensely and passionately, that this view cannot and must not prevail. Economic and Social Rights in the United States: Six Rights, One Promise The U.S. government has rarely recognized the relevance of human rights standards within the United States, or recognized that human rights obligations include obligations to protect basic economic and social rights. Few people would hesitate to condemn poor education systems, inadequate health care infrastructure, hunger, scores of families suffering from abject poverty and homelessness, wages that do not support a dignified life, and widespread economic insecurity. Nor would anyone plausibly deny that all of these are sharply evident in the United States. Yet, successive U.S. administrations have explicitly resisted the notion that every person has fundamental economic and social rights to be free from such conditions and failed to reform our legal, political, and economic system to meet people's needs and protect people from the structural inequalities that amount to a systemic assault on human dignity. Historically, the United States played an important role in the development of the Universal Declaration of Human Rights which embraced economic and social rights, including the right to housing, education, decent work, social security, food and health care (later expanded to the right to health more broadly within the UN system). In fact, the international economic and social rights framework was deeply influenced by President Franklin D. Roosevelt’s “Four Freedoms” agenda, which included freedom from want. But this visionary promise represented by these six rights is long overdue. While every U.S. state recognizes a basic right to education, there are still deep inequities in education and too many children face degraded school environments that push them out of schools. (see NESRI's work with the Dignity in Schools Campaign). Health care, food, housing and access to decent work (or in the event of unemployment or disability basic social security) are still not recognized as basic rights leading to irrational and damaging policy choices that leave scores of families unable to meet their fundamental needs. This landscape calls for revisiting why the United States has denied economic and social rights to its people, and for a change in our vision of basic rights, government responsibility and our collective commitment to meeting the fundamental needs of all. The Call for Economic and Social Rights: A Revolution of Values Economic and social rights are a natural, and in fact necessary, outgrowth of U.S. founding ideals of equality, freedom and human dignity. Social movement leaders have often recognized this relationship. Around the time of his launching the Poor People’s Campaign, Rev. Dr. Martin Luther King Jr. spoke to this stating: “We read one day. We hold these truths to be self-evident that all men are created equal.That they endowed by their Creator with certain inalienable rights. That among these, are life, liberty, and the pursuit of happiness. But if a man doesn’t have job or an income, he has neither life, nor liberty and the possibility for the pursuit of happiness. He merely exists.” —Martin Luther King, Jr. (March 1968) Issuing a dramatic challenge, Dr. King called for a Bill of Economic Rights and recognized that: “We have moved from the era of civil rights to the era of human rights, an era where we are called upon to raise certain basic questions about the whole society. We have been in a reform movement… But after Selma and the voting rights bill, we moved into a new era, which must be the era of revolution. We must recognize that we can’t solve our problem now until there is a radical redistribution of economic and political power… this means a revolution of values and other things. We must see now that the evils of racism, economic exploitation and militarism are all tied together…you can’t really get rid of one without getting rid of the others… the whole structure of American life must be changed. America is a hypocritical nation and [we] must put [our] own house in order.” —Martin Luther King, Jr. (May 1967) Bringing economic and social rights home is a central part of putting our house in order and living up to our ideals. Neither charity nor temporary policy shifts will protect the basic dignity and equality of the ever larger number of people within the United States who are being pushed out to the margins of our increasingly harsh economy. Moreover, lack of resources is not the cause of any of these harms imposed on individuals, families and communities. Even in this economic downturn, the United States has the capacity to meet the needs of all its people. We do not really face a housing crisis. Instead, we face a policy crisis evidenced by the fact that while we have so many people without homes, we continue to allow an ever increasing number of homes to go empty without people. Irrational and unjust policy choices impact almost every economic and social rights issue facing people in the United States today. Recognizing basic economic and social rights defends both the poor and middle class against the interests that threaten access to these fundamental needs and human dignity. Privacy Most Americans believe that NSA surveillance it warranted Cohen in 2013 (Jon Cohen; Cohen is polling director for Capital Insight, Washington Post Media’s independent polling group, “Most Americans back NSA tracking phone records, prioritize probes over privacy”, Washington Post 6/10/13, Website, 7/2/15, http://www.washingtonpost.com/politics/most-americans-support-nsatracking-phone-records-prioritize-investigations-over-privacy/2013/06/10/51e721d6-d204-11e2-9f1a1a7cdee20287_story.html A large majority of Americans say the federal government should focus on investigating possible terrorist threats even if personal privacy is compromised, and most support the blanket tracking of telephone records in an effort to uncover terrorist activity, according to a new Washington Post-Pew Research Center poll. Fully 45 percent of all Americans say the government should be able to go further than it is, saying that it should be able to monitor everyone’s online activity if doing so would prevent terrorist attacks. A slender majority, 52 percent, say no such broad-based monitoring should occur. The new survey comes amid recent revelations of the National Security Agency’s extensive collection of telecommunications data to facilitate terrorism investigations. Overall, 56 percent of Americans consider the NSA’s accessing of telephone call records of millions of Americans through secret court orders “acceptable,” while 41 percent call the practice “unacceptable.” In 2006, when news broke of the NSA’s monitoring of telephone and e-mail communications without court approval, there was a closer divide on the practice — 51 percent to 47 percent. General priorities also are similar to what they were in 2006: Sixty-two percent of Americans now say it’s more important for the government to investigate terrorist threats, even if those investigations intrude on personal privacy, while 34 percent say privacy should be the focus, regardless of the effect on such investigations. Constitutionality Third party information does not fall under the fourth amendment Moore in 2009 (Trevor, studying political science at Brigham Young University, “PRIVACY vs. THE PUBLIC Good: NATIONAL SECURITY LETTERS AND THE FOURTH AMENDMENT”, Vol. 23, https://ojs.lib.byu.edu/spc/index.php/PrelawReview/article/viewFile/13600/13478) In United States v. Miller, the government accused Mitch Miller of operating a distillery without the proper license and of engaging in tax fraud.9 the government's case was based in part on bank records obtained by a grand jury subpoena. An appellate court ruled that the records should have been suppressed.10 The Supreme Court reversed the decision, saying, The depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government. This Court has held repeatedly that the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.1 The collection of Meta data without a warrant is constitutional in the Smith vs Maryland decision Ombres in 2015 (Devon, J.D. 2006 from Stetson University College of Law; L.L.M. 2013 from American University Washington College of Law, NSA DOMESTIC SURVEILLANCE FROM THE PATRIOT ACT TO THE FREEDOM ACT: THE UNDERLYING HISTORY, CONSTITUTIONAL BASIS, AND THE EFFORTS AT REFORM, Seton Hall Legislative Journal, 2015,) There is little doubt that the collection of content data, absent probable cause, violates the Fourth Amendment as an unreasonable search. n28 However, whether the mass collection of domestic metadata violates the Fourth Amendment is a question that is still being wrestled with due to the historical approval of the Third Party Doctrine ("TPD") arising from the seminal opinion of Smith v. Maryland. n29 In Smith, a PR was used to assist in a conviction of a burglary. n30 The Supreme Court held that using a PR did not constitute an unreasonable search because individuals are aware that phone companies maintain permanent records of dialed phone numbers, thereby abrogating any expectation of privacy. n31 As Smith has not been overruled, it maintains its standing as a guiding principle under stare decisis and is being utilized, at least in part, as a basis for conducting domestic surveillance as discussed below. The FISC cites directly to the Smith reasoning, in a heavily redacted [*34] opinion/order, in noting that there is no reasonable expectation of privacy in the collection of metadata. n32 The FISC notes that Congress relaxed requirements to collect "non-content addressing information through [PR] and [TT] devices" through the PATRIOT Act and FISA Amendments and that "such information is not protected by the Fourth Amendment." n33 Like phone calls under Smith, the FISC held that email users, due to the same reasoning, also do not have an expectation of privacy. n34 The FISC recognized the need for only a relevance standard, rather than reasonable suspicion, in approving the government's requests for widespread surveillance. n35 The FISC analogizes the low hit rate in obtaining actionable information through dragnet metadata collection to DUI checkpoints and drug testing students in justifying suspicionless searches. n36 Further, great deference must be given to the government officials who have a unique understanding of these situations, and they do not need to act in the least intrusive means available. n37 In so approving of the bulk collection of metadata, the court provided: analogous to suspicionless searches and seizures that have upheld under the Fourth Amendment in that the Government's need is compelling and immediate, the intrusion on individual privacy interests is limited, and bulk collection appears to be a reasonably effective means of monitoring (redacted) related operatives ... . In these circumstances, the certification of relevance is consistent with the fact that only a very small proportion of the huge volume of information collected will be directly relevant to the FBI's (redacted) [*35] investigations. NSLs do not violate the 4th Amendment – third party information is not protected under administrative subpoenas Moore in 2009 (Trevor Moore, “Privacy vs. the Public Good: National Security Letters and the Fourth Amendment”, BYU PreLaw Review Vol. 23, 2009, https://ojs.lib.byu.edu/spc/index.php/PrelawReview/article/viewFile/13600/13478) Because NSLs deal exclusively with information which is kept in the hands of third parties, the question that must be answered is whether or not the Fourth Amendment protects information revealed to third parties. In general, access to information that is protected by statute but not by the Fourth Amendment is obtained through a subpoena. Many agencies have the power to issue administrative subpoenas. An administrative subpoena is an official order compelling an individual to provide a government administrative agency with information. In contrast, to obtain information or items protected by the Fourth Amendment, the government must have a warrant signed by a judge allowing them limited access to an individual's papers and belongings. Warrants and subpoenas are similar in the fact that they allow the government to gain access to private information. A major difference between the two is that a warrant is obtained through judicial authority and grants access to information protected by the Fourth Amendment, whereas subpoenas do not need judicial authority, and they request information not protected by the Fourth Amendment. For example, the FBI uses NSLs to request copies of transactional and personal records from communications providers, financial institutions, consumer credit agencies, and travel agencies. 8 These letters require businesses to supply the FBI with transaction information pertaining to persons involved in a current investigation. Showing that information held by third parties is not protected by the Fourth Amendment will logically show that NSLs do not violate Fourth Amendment protection, making NSLs comparable to administrative subpoenas in function. With present national security threats, the need for increased intelligence by law enforcement is greater than it has ever been. To prevent future attacks, government agencies must have quick access to information that so that criminals may be apprehended before they strike. NSLs aid law enforcement agencies by providing them with information that can lead to sufficient evidence for a search warrant. Legal precedent has shown that information held by third parties is not protected under the Fourth Amendment. Furthermore, subjecting NSLs to Justice Harlan's test shows again that the kind of information requested by NSLs is not included within the scope of the Fourth Amendment. Determining that NSLs do not violate Fourth Amendment rights leads us to treat NSLs no differently than other administrative subpoenas. Treating NSLs as administrative subpoenas demonstrates that there is adequate oversight involved for the type of information being requested. The use of NSLs by government agencies is in accordance with the laws of the United States. National Security Turn NSL Comparatively better NSL’s are better than alternatives OIG in 2014 (Office of the Inspector General. Oversight and Review Division “A Review of the Federal Bureau of Investigation’s Use of National Security Letters: Assessment of Progress in Implementing Recommendations and Examination of Use in 2007 through 2009” US Department of Justice. August 2014) FBI personnel told us that in cases that have a criminal nexus the FBI can use a grand jury subpoena to obtain information that is substantially similar to the information obtained through an NSL. [Omitted text]. Personnel identified other alternatives for text]. They told us that these alternatives were less effective than NSLs because the techniques require more resources and can produce information that is not as complete or reliable as NSL-derived information. They also stated that these techniques create a greater risk of premature exposure of the investigation. Two FBI employees also said that [Omitted text] may unnecessarily intrude on a potentially innocent person's privacy and can harm his or her reputation in the community. We interviewed two field supervisors on cyberterrorism squads who told us that in cyber intrusion investigations there is often no alternative to an NSL because the only lead in the case is [Omitted text] those instances, [Omitted text] can only be accomplished with [Omitted text]. determining [Omitted NSL key to National Security NSLs only affect a small amount of people but are integral to national security Hinnen in 2011 (Todd Hinnen “Statement of Todd Hinnen, Acting Assistant Attorney General for National Security, Before the House Judiciary Subcommittee on Crime, Terrorism and Homeland Security” March 30, 2011 http://www.justice.gov/nsd/justice-news-1) I would like to conclude my remarks by emphasizing how important NSLs are to our national security. NSLs are an indispensable investigative tool, and have often been described as the “building blocks” of national security investigations. NSLs contribute significantly to the FBI’s ability to carry out its national security responsibilities by directly supporting its counterterrorism, counterintelligence, and intelligence missions. As reported in the Department’s last annual report on NSL usage, excluding requests for subscriber information (i.e., an NSL issued to ascertain the subscriber associated with a particular telephone or email address), in 2009, the FBI made 14,788 NSL requests for information concerning 6,114 different United States persons. In 2008, the FBI made 24,744 NSL requests (excluding requests for subscriber information) pertaining to 7,225 United States persons. These numbers reflect the importance of these tools to the FBI, but also reflect the fact that the FBI uses NSLs to obtain information regarding a very small portion of the American population. NSLs are issued by the FBI in national security cases for a variety of investigative reasons. They are used in counterintelligence cases in which individuals are suspected of attempting to steal our nation’s secrets, including espionage cases. They are used extensively in terrorism cases to help correctly identify international terrorists and thwart future attacks in the United States. As an investigative tool, NSLs are integral to determining whether, how, and by whom our nation is being put at risk. So, while I cannot discuss specific investigative techniques that were used in specific investigations, NSLs were used in most cases, if not every major case, in which the FBI has disrupted terrorist plots against the homeland or identified spies working to obtain classified United States Government information. These tools have helped keep our nation safe, while safeguarding the civil liberties of all Americans. NSLs are key to safety and security – people falsely demonize domestic surveillance programs Carafono in 2007 (James Jay Carafono (PhD, Vice President for the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy), January 18, 2007, “Don’t demonize security”, http://www.heritage.org/research/commentary/2007/01/dont-demonize-security) First, find a legitimate domestic surveillance program. Make sure it's one most Americans ignore - the more obscure, the better. It doesn't matter if the courts have ruled it constitutional. It doesn't matter if it helps fight crime or protect national security. Next, find an "expert" to denounce the program as an unnecessary expansion of executive authority. Rail about the potential for abuse (even when there's no evidence of actual abuse). Argue that the program could be a threat, even if it hasn't, in fact, been misused. Finally, stimulate the "Luddite response" - a fear of technology. Rant about how the information age is destroying any hope of privacy. More information and technology equals power. And with more power comes more abuse. Combining these ingredients is guaranteed to shock sensibilities and spark congressional hearings. It's been done many times, starting with the tools authorized in the Patriot Act to fight terrorism, like delayed-notification warrants. U.S. military Here's the recipe for a scary, post-9/11 news story about liberties vs. security: domestic investigations are the latest intelligence and law enforcement tool to receive the treatment. A spate of recent news reports revealed that the armed forces use "national security" letters to request business records, such as phone and bank data. It sounds scary, but it shouldn't. The military has a legitimate, limited mission to conduct intelligence inside the United States. It is written into law and funded by Congress. National security letters are perfectly legal, and the Defense Department is authorized to issue them. Requesting business records is a common intelligence and law enforcement practice and does not in many cases require a warrant. Finally, there is a domestic security threat to worry about. On 9/11, there was an attack on American soil, and others have been plotted since then. Keeping America safe, free and prosperous requires both liberty and order. Protecting the safety and freedom of Americans is not served well by simply demonizing security NSL key to FISA NSLs are necessary to support FISA applications Wells in 2015 (Desirae L. Wells, “NATIONAL SECURITY LETTERS: WHY REFORM IS NECESSARY”, LexisNexis.com, Yeshiva University 2012, 18 pgs., Database, 6/28/15, http://www.lexisnexis.com.proxy.library.umkc.edu/hottopics/lnacademic/) The passage of the Patriot Act caused NSLs to be the subject of much debate and controversy. There are two main opposing viewpoints. The chief viewpoint of advocates of NSLs, mainly the FBI, is that NSLs are a necessary and highly effective counter terrorism and counterintelligence tool needed in this Post 9/11 era. As outlined in Part I, NSLs have a long history and in fact predate 9/11. Historically, the [*222] scope of NSLs was limited to mundane business records, n23 and the Supreme Court in Smith v. Maryland has already stated that federal authorities do not need a warrant for these records since because no reasonable expectation of privacy may exist in records that have been exposed to third parties. n24 They also contend that evidence is routinely obtained in police and grand jury investigations with no signoffs from high level officials who could be held accountable, whereas in NSLs you at least have an FBI official formally affirming the letter's necessity. NSLs, it is argued, are the necessary first step to support Foreign Intelligence Surveillance Act applications for electronic surveillance, physical searches or pen registers/trap and trace orders n25. Similarly, often the target of an NSL is not necessarily the main target of an investigation and an NSL thus serves as a key tool in allowing the FBI to follow leads. n26 In sum, supporters argue that NSLs are a vital tool in the ongoing effort to keep Americans safe. Democracy Alt cause to Demo Collapse Inequality makes democratic collapse inevitable Peebles ‘14. [Graham Peebles, 4/18/14, Counter Punch News, “Inequality and the Inevitable Collapse] http://www.counterpunch.org/2014/04/18/inequality-and-the-inevitable-collapse/ Inequality has far-reaching social effects and erodes democracy. Grossly unequal societies have greater levels of alcohol and drug addiction, more crime, lower mortality rates, higher child pregnancies and lower literacy levels than less unequal countries. Political influence/control is an added bonus for the rich; as for the rest, well they get to vote, but have little or no influence over government policy and overwhelmingly distrust politicians. With dire poverty, as experienced by the 3.5 billion living somehow, goes lack of education, vulnerability and exploitation, all of which discolours democracy. Inequality is the plague of our times, a divisive epidemic caused by the unjust economic system – ‘Neo-Liberalism’, or market fundamentalism – which saturates the world. A system which, Noam Chomsky says, is “so dysfunctional that it cannot put eager hands to needed work,” as would happen “if the economy were designed to serve human need rather than create wealth beyond avarice for the privileged few.” It’s hard, he says, “to think of a more serious indictment of a socio-economic system.” The ‘dysfunctional’ socially unjust system has facilitated “very high concentrations of wealth, and with it political power, which yields [favourably skewed] legislation, which drives the cycle forward.” Based as it is on competition, this ‘dysfunctional’ model breeds insecurity and stress, encourages separation and division leading to social tension and a lack of trust. A recent survey found that in America – where inequality is ‘off the scale’ – only 15% admitted trusting their neighbours, whereas in more equitable societies the number is closer to 60%. At: Exec Power u/mines Demo Executive overreach/power in the fight against terrorism is key/constitiutional- Article II does not clarify Edelson in 2013 (Chris, “Emergency Presidential Power: From The Drafting Of The Constitution To The War on Terror,” by Chris Edelson, University of Wisconsin Press) Americans understandably think of the U.S. Constitution as a document that defines (among other things) the scope of presidential power in war and peace, calm and crisis. If you follow political debate about constitutional interpretation, which focuses on distinctions between “activism” and “strict construction,” the process of defining presidential power would seem easy: just turn to Article II of the Constitution, which addresses executive power, and see what it has to say. Reality, it turns out, is more complicated. As one scholar notes, “the text and history of Article II fail to offer decisive guidance regarding presidential power.” When presidents want to take action, it is not always clear whether the Constitution provides the authority they desire. Some presidents are reluctant to act without clear constitutional or statutory authorization, but most presidents have not viewed their authority as restricted to the plain text of the Constitution or the explicit approval of Congress. When asked to review presidential actions, the Supreme Court has been unable to develop a “magical formula” to define the scope and limits of presidential authority. One area of special difficulty is the question of presidential authority to respond to national security threats: what powers do presidents have to respond to emergencies like war, rebellion, or the threat of terrorist attack? Article II makes no express provision for such emergency presidential power—in fact, what emergency power the Constitution does provide seems to be assigned to Congress by Article I. Presidents may and often do cite congressional authority as a basis for responding to threats to national security. When congressional authority is lacking, however, presidents often claim the right to take unilateral action. During crises, “presidents generally have not hesitated to do whatever, in their view, needed to be done.” Faced with a document that does not provide clear instructions and faced with crises that demand or seem to demand immediate action, presidents have found ways to justify actions not expressly authorized by the Constitution or statute. The central problem this book addresses is this: given that the Constitution does not expressly provide for emergency presidential power in the absence of congressional authorization but presidents, in practice, do independently exercise such power, how do we define its scope and limits? In answering this question, I consider actions taken by each branch of the federal government. Presidents often do whatever they believe is necessary, but Congress and the courts do not always agree with them. All three branches of the federal government can and do play a role in defining emergency power. I will frequently use excerpts from Supreme Court opinions as guideposts for assessing the nature of emergency power—not because the Supreme Court necessarily has the last word on the matter but because the court has, since Marbury v. Madison, identified its duty as “say[ing] what the law is.”6 Court opinions highlight some of the central issues involved in assessing emergency presidential power, and they tell us what the justices think about these issues—including when the court thinks presidents have acted appropriately and when presidents have exceeded their authority. That does not mean the court always provides the right answers or even asks the right questions, but these opinions offer a useful window into the ongoing debate and discussion. As noted and as is discussed in detail throughout this book, presidents have historically exercised power beyond what is expressly assigned to the executive branch by the text of the Constitution—often to the satisfaction of Congress, the courts, and the people. That does not mean, however, that all justifications for such actions are equally valid. For instance, presidents, members of Congress, judges, and scholars have recognized implied emergency presidential power that is linked to express powers and limited by contrary provisions of the Constitution. On the other hand, arguments for inherent executive power, unmoored from and unlimited by the Constitution, are far more controversial. This book aims to consider the strengths and weaknesses of different justifications offered for presidential power during war or other national security crises. I refer to this as emergency presidential power because presidents often assert authority to take unilateral action when necessary to protect national security, especially when there is no time for deliberation and/or, in their view, Congress is not equipped to respond. Most observers agree that the president has at least some unilateral ability to take action necessary to respond to crisis, even though the Constitution is silent on the matter. However, there is disagreement as to the scope of such power. Advocates for broad presidential power argue that the president has “plenary” or absolute power when it comes to defending the nation—that decisions in this context are for the president alone to make. Others conclude that presidents can initially act independently when they believe it is necessary to defend the nation; however, their actions must be retroactively approved by Congress and are subject to review by the courts. Some arguments, of course, are more persuasive than others, and one’s conclusion about which argument is best may depend on constitutional text, court precedent, congressional action, and past presidential practice, as well as context— the specific reason why presidential authority is claimed in different cases. This book presents and explains the various arguments offered for specific presidential actions while offering different ways to consider the questions at stake but ultimately leaves it to you to decide which arguments are best and how emergency presidential power should be defined. One may reasonably ask if, in the end, presidents do whatever they believe is necessary, why it matters how they justify their actions. First, presidents may act unilaterally, but, unless they achieve permanent dictatorial power, ultimately they must persuade others—Congress, the courts, the press, the people—that their actions are justified. As we will see, presidents have sometimes been able to do so, but not always. The justifications presidents offer for their actions are also important because they may be cited as precedent in the future. Lincoln’s decision to order a naval blockade of the Confederacy is cited as support for broad presidential authority with regard to deployment of the military in the context of the war on terror. Franklin D. Roosevelt’s decision to try captured Nazi saboteurs before a military tribunal is improperly cited as precedent for the decision to do the same with suspected terrorists. The challenge for the Framers of the Constitution and for Americans today is to balance competing considerations. After the failure of the Articles of Confederation, which did not provide for an executive, the Framers realized it was necessary to create the presidency. The new president would have to have enough power to carry out the responsibilities assigned to the office and to resist encroachment from the other branches of the federal government, but there would also have to be limits on presidential power. The president would not be a king, as Alexander Hamilton explained in the Federalist Papers.10 Unlike the eighteenth-century British monarch, the American president would share war power and power over foreign affairs with Congress, as part of the system of checks and balances the Framers developed. In the twenty-first century, this balancing continues. As Supreme Court Justice David Souter put it, “the Constitution embodies the desire of the American people, like most people, to have things both ways. We want order and security, and we want liberty.” Defining the scope and limits of emergency presidential power requires Americans to balance liberty and security, to make sure the president has enough authority to deal with threats to national security without taking on so much power that the system of checks and balances fails and liberty suffers. Some of the discussion so far may seem fairly abstract, but the reward of unraveling the mysteries of emergency presidential power is that we can begin to arrive at answers—or at least possible answers—to specific questions we face today. Can the president decide to hold suspected terrorists indefinitely without charges? If suspected terrorists are prosecuted, can presidents order their trial before military tribunals instead of civilian courts? Was the Bush administration justified in authorizing waterboarding? If the president decides that the best way to prevent future terrorist attacks is by secretly listening to millions of telephone conversations and reading millions of e-mails, can he (or, at some point, she) order these actions? Was President Obama justified in authorizing the killing, without trial or hearing, of a U.S. citizen who was a suspected terrorist? This book addresses each of these questions. Since the question of emergency presidential power begins with the Constitution itself, we start by considering how the Framers understood that power, to the extent that such inquiry produces useful guidance. We then examine how presidents have actually exercised and justified emergency power and what role Congress and the Supreme Court have played in defining such power. As we will see, emergency presidential power is not a new idea. However, the way in which it is used in the twenty-first century, especially in the context of the war on terror, presents new challenges. If, in the past, one way to limit presidential power was by publicly debating the justifications presidents gave for using emergency power, what happens when power is exercised in secret, with justifications initially provided only in classified memoranda? If one way to limit emergency power is to require that it be temporary, that it be used only for as long as a particular crisis demands, what happens when crisis is open ended, when Americans find themselves in a war against terrorism that has no clear end point? Defining the scope and limits of emergency presidential power becomes especially important, though also more difficult. Although we begin by considering how power has been defined and used historically, the ultimate goal is to develop a framework for emergency presidential power that meets the challenges of our time. The President has full power over National Security- Keeps checks and balances Meese III in 2011 (Edwin Meese III, ambassador for Heritage, “Who Is Responsible for America’s Security?”, 7/19/11, http://www.heritage.org/research/reports/2011/08/who-is-responsible-foramerica-s-security, 7/1/15) With the memory of the War for Independence still fresh and the fledging nation facing constant threat from foreign powers and Indian tribes, the Framers saw national security as the highest calling of the federal government that they would create.[1] The Articles of Confederation had proved inadequate as they created a weak and ineffectual government. The world’s naval powers were fearsome but despotic, unworthy examples for this great experiment in freedom and democratic self-rule. So the Framers turned to the lessons of history and reason. The balance they struck remains, like our Constitution, unique. The Constitution vests the President of the United States with the full “executive power” of the federal government. He is named the “commander in chief of the Army and Navy of the United States, and of the militia of the several states, when called into the actual service of the United States.” So does the Constitution place paramount authority for national security in a single executive. At: Democratic Peace Theory Democratic peace theory is a myth- it’s the spread of social capitalism that generates the conditions for stability Mousseau, Michael in 2012 The Democratic Peace Unraveled: It’ s the Economy, THE DEMOCRATIC PEACE UNRAVELED: IT’S THE ECONOMY, http://www.econstor.eu/bitstream/10419/108587/1/erf_wp_1207.pdf This article has sought to address the controversy of whether the capitalist peace can explain the democratic peace. Whether or not a capitalist peace can account for the democratic peace depends on whether capitalism can account for democracy as well as peace (Blalock 1979:468474; Ray 2003). There are two kinds of capitalist peace theories: free-market models link smaller government with peace (Weede 1996; Gartzke et al. 2001; McDonald 2009); the social-market model links impersonal economy with peace (Mousseau 2000). Among these, only the socialmarket model has been both theorized to account for both democracy and peace (ibid.) and shown to account for the democratic peace (Mousseau 2009; Choi 2011; Dafoe 2011). Some have pointed out several ways that the results of Mousseau (2009) may not pose a challenge to the democratic peace, and this article was aimed at examining these arguments. First, a new continuous measure of impersonal economy was introduced, solving the perfect prediction problem that results from the binary measure for social-market capitalism in analyses of fatal disputes. Second, all militarized conflicts, not just fatal ones, were examined in crucial tests, to see if the new binary maximum measure of democracy (Polity +10), put forward by Dafoe (2011), can save the democratic peace hypothesis. Third, tests included control for differences along the democracy-autocracy dimension. Finally, the robustness of the social-market economic peace was examined with consideration of measures of free-market capitalism. The results for democracy are clear and clean: once ―capitalist‖ impersonal economy is taken into account, there is no evidence of causation from democracy to peace; it is far more likely that impersonal economy accounts for both democracy and peace. The use of the highest +10 measure of democracy does not save the democratic peace hypothesis; and democracy remains insignificant with consideration of regime differences. All data and measures are conventional to studies of interstate conflict processes, and the most likely cause of democracy’s insignificance is consideration of impersonal economy, since key models are identical in every other way. Nor can the social-market peace be explained by trade or wealth; and the free-market theories of capitalist peace, size of public sector (McDonald 2009) and capital openness (Gartzke et al. 2001; Gartzke 2007), do not survive rigorous testing or the consideration of impersonal economy at standard levels of significance. The results of this study must be made clear: there is no scientific justification for inferring or this study any evidence, direct or indirect, of causation from democracy to peace. Furthermore, democracy is not merely insignificant: standard measures of democracy were shown to have positive impacts on the odds of militarized conflict in every model that controlled for contract flows, with the positive implying from impact of binary (Polity >+6) democracy even reaching significance when regime difference is considered. Deference/SOP Answers Judicial Deference Good The Judicial Branch agrees to the notion of executive overreach and its necessity in national security instances Luban in 2008 (David is a professor of Law and Philosophy at the University of Chicago; “On the Commander-In-Chief Power” Published: 2008 PG: 478-479; http://scholarship.law.georgetown.edu/facpub/598/) Perhaps the best-known example of the former argument appeared in the 2002 torture memo by the Justice Department’s Office of Legal Counsel (“OLC”), leaked in 2004 just weeks after Abu Ghraib. In OLC’s words: Any effort by Congress to regulate the interrogation of battlefield combatants would violate the Constitution’s sole vesting of the Commander-in-Chief authority in the President. . . . Congress can no more interfere with the President’s conduct of the interrogation of enemy combatants than it can dictate strategic or tactical decisions on the battlefield. Thus, federal statutes making torture a felony would be unconstitutional if applied to interrogations authorized by the commander in chief. Although the torture memo was withdrawn in the face of scandal, the opinion OLC substituted for it carefully refrained from commenting on its override argument, neither endorsing it nor repudiating it. But an earlier OLC opinion from September 25, 2001, which was never withdrawn, also asserts that the president has “plenary constitutional power to take such military actions as he deems necessary and appropriate . . . .” Commenting on the War Powers Resolution and Joint Resolution passed by Congress in the wake of 9/11, that OLC opinion added: “Neither statute, however, can place any limits on the President’s determinations as to any terrorist threat, the amount of military force to be used in response, or the method, timing, and nature of the response. These decisions, under our Constitution, are for the President alone to make.” Thus, the commander in chief override argument still appears to be the Justice Department’s official position even after withdrawing the torture memo. Its theory appears to underlie signing statements the president has attached to legislation, declaring that he will construe provisions consistent with his constitutional authority as commander in chief, by which he evidently means that he reserves the right to disregard restrictions that in his opinion impinge on his commander in chief authority. Justices must respect and give precedent to the executive branch during times of national security especially against terrorist groups Blomquist in 2010 (Robert F. is a professor of law; “The Jurisprudence of American National Security” Volume 44 Number 3, Published Spring 2010; http://scholar.valpo.edu/vulr/vol44/iss3/6/) Turning to how the Supreme Court should view and interpret American presidential measures to oversee national security law and policy, our Justices should consider a number of important points. First, given the robust text, tradition, intellectual history, and evolution of the institution of the POTUS as the American national security sentinel, and the unprecedented dangers to the United States national security after 9/11, national security presiprudence should be accorded wide latitude by the Court in the adjustment (and tradeoffs) of trading liberty and security. Second, Justices should be aware that different presidents institute changes in national security presiprudence given their unique perspective and knowledge of threats to the Nation. Third, Justices should be restrained in second-guessing the POTUS and his subordinate national security experts concerning both the existence and duration of national security emergencies and necessary measures to rectify them. “During emergencies, the institutional advantages of the executive are enhanced”; moreover, “[b]ecause of the importance of secrecy, speed, and flexibility, courts, which are slow, open, and rigid, have less to contribute to the formulation of national policy than they do during normal times.” Fourth, Supreme Court Justices, of course, should not give the POTUS a blank check—even during times of claimed national emergency; but, how much deference to be accorded by the Court is “always a hard question” and should be a function of “the scale and type of the emergency.” Fifth, the Court should be extraordinarily deferential to the POTUS and his executive subordinates regarding questions of executive determinations of the international laws of war and military tactics. As cogently explained by Professors Eric Posner and Adrian Vermeule, “the United States should comply with the laws of war in its battle against Al Qaeda”—and I would argue, other lawless terrorist groups like the Taliban—“only to the extent these laws are beneficial to the United States, taking into account the likely response of other states and of al Qaeda and other terrorist organizations,” as determined by the POTUS and his national security executive subordinates. Judicial overview of military operation in order to prevent military adventurism hurts the inherent checks on all branches and downplays the importance of the Executive Branch Sulmasy and Yoo in 2007 (John Yoo and Sulmasy are both professors of law; “Katz and the War on Terrorism”, 41 U.C. Davis L. Rev. 1219 2007, Page: 1252-1254 http://scholarship.law.berkeley.edu/facpubs/967/) Presidential leadership has always included control over the goals and means of military campaigns. As the Supreme Court has observed, the President has the authority "to employ [the armed forces] in the manner he may deem most effectual to harass and conquer and subdue the enemy. “Lincoln did not seek authorization from Congress over whether to defend Washington, D.C.; FDR did not ask Congress whether he should make the war in Europe a priority over the war in the Pacific; Truman did not seek legislative permission to drop nuclear bombs on Japan. Many of the wars fought since World War I, ranging from Korea to Panama to Kosovo, never received any congressional authorization. While Presidents should not ignore congressional leaders, a wise President, acting within his constitutional authority, will consult with them at the politically appropriate moment. The Constitution does not force the President to get a letter from Congress or seek permission from the judiciary every time he makes an important decision about wartime strategy or tactics. Nor is Congress defenseless. It has total control over funding and the size and equipment of the military. If it does not agree with a war or a strategy, it can cut off funds, reduce the size of units, or refuse to provide material for it.'89 War would be impossible without Congress's cooperation, or at least acquiescence.'9° This is even more true in the age of modern warfare, which requires material, high technology weapons systems, and massive armed forces dependent upon constant congressional budgetary support.'9 Some critics now assert the judiciary ought to review military operations in order to prevent military adventurism, to check the executive, and to foster political consensus. This neglects the need for executive action during time of imminent foreign threat, and downplays the checks inherent in the other branches' administrative impediments, such as delay, inflexibility, and lack of secrecy. World War II demonstrated that unfettered presidential initiative has been critical to the protection of American national security. When Europe plunged into war, Congress enacted a series of Neutrality Acts designed to keep the United States out of the conflict. In 1940 and 1941, FDR recognized that America's security would be threatened by German control of Europe, and he and his advisers gradually attempted to bring the United States to the assistance of Great Britain and the Soviet Union. He was not required, nor was it thought prudent, to seek judicial blessings or congressional authorization when acting to prevent "potential" attacks on the United States. In fact, FDR stretched his authority to cooperate closely with Great Britain in protecting convoys in the North Atlantic, and providing the British with fifty "obsolete" destroyers, among other things. American pressure on Japan to withdraw from China helped trigger the Pacific War, without which American entry into World War II might have been delayed by at least another year, if not longer. Legislative Deference Good Wars unpredictability requires the executive branch, the legislative branch is to slow to respond effectively Sulmasy and Yoo in 2007 (John Yoo and Sulmasy are both professors of law; “Katz and the War on Terrorism”, 41 U.C. Davis L. Rev. 1219 2007, Page: 1234 http://scholarship.law.berkeley.edu/facpubs/967/) War's unpredictability and unique nature demands decisive and often secret action. Philosopher John Locke first observed that a constitution ought to give the foreign affairs power to the executive because foreign threats "are much less capable to be directed by antecedent, standing, positive laws," and the executive can act to protect "security and interest of the public. Legislatures were too slow and their members too numerous to respond effectively to unforeseen situations. As Locke noted, "Many things there are, which the Law can by no means provide for, and those must necessarily be left to the discretion of him, that has the Executive Power in his hands, to be ordered by him, as the public good and advantage shall require...” Executive key- National Defense The Executive Branch is the best at national defense and Katz doesn’t apply nor should it to the Executive branch in times of National security Sulmasy and Yoo in 2007 (John Yoo and Sulmasy are both professors of law; “Katz and the War on Terrorism”, 41 U.C. Davis L. Rev. 1219 2007, Page: 1258 http://scholarship.law.berkeley.edu/facpubs/967/) Katz should remain a vital part of the law enforcement system as a provision of judicial oversight over surveillance activities to detect crime. However, such judicial involvement has not, nor should it, extend to the conduct of surveillance to combat national security threats. Forty years ago, the threats of al Qaeda and international terror were not part of the American consciousness. Unfortunately, since September 11, the United States is now painfully aware that the landscape of national security has changed. The Founders created a flexible executive, embodied in Article II of the Constitution, to respond to just such threats. As Justice White anticipated in Katz, the need for rapid decision-making and intelligence gathering are best employed by the Executive Branch. Applying Katz to anti-terrorism surveillance can do nothing more than hinder, rather than promote, measures necessary to protect the national security of the United States. The executive branch has undisputed say in times of war this includes matters of terrorism and surveillance Sulmasy and Yoo in 2007 (John Yoo and Sulmasy are both professors of law; “Katz and the War on Terrorism”, 41 U.C. Davis L. Rev. 1219 2007, Page: 1246 - 1247 http://scholarship.law.berkeley.edu/facpubs/967/) FISA and the criminal justice warrant system sacrifice speed and breadth of information in favor of individualized suspicion, while providing a path for using evidence in a civilian criminal prosecution. If the President chooses to rely on his constitutional authority alone to conduct warrantless searches, then he should generally only use the information for military purposes. As General Hayden stated in 2005, the primary objective of the NSA program is to "detect and prevent" possible al Qaeda attacks on the United States, whether another attack like September 11, or a bomb in apartment buildings, bridges, transportation hubs such as airports, or a nuclear, biological, or chemical attack. These are not hypotheticals; they are all al Qaeda plots, some of which intelligence and law enforcement agencies have already stopped. The President will want to use such information to deploy military, intelligence, and law enforcement personnel to stop the attack. Intercepting enemy communications has long been part of waging war; indeed, it is critical to victory. Gathering intelligence has long been understood as a legitimate aspect of conducting war. The military cannot successfully attack or defend unless it knows the location of the enemy. America has a long history of conducting intelligence operations to obtain information on the enemy. General George Washington used spies extensively during the Revolutionary War, and as President established a secret fund for spying that existed until the creation of the Central Intelligence Agency ("CIA")."' President Abraham Lincoln personally hired spies during the Civil War, a practice the Supreme Court upheld. In both World Wars I and II, Presidents ordered the interception of electronic communications leaving the United States. Some of America's greatest wartime intelligence successes have involved Signals Intelligence ("SIGINT"), most notably the breaking of Japanese diplomatic and naval codes during World War II, which allowed the U.S. Navy to anticipate the attack on Midway Island. SIGINT is even more important in this war than in wars of the last century. The primary way to stop al Qaeda attacks is to find and stop its operatives by intercepting their electronic communications, entering or leaving the country. As commander-in-chief, the President has the constitutional power and the responsibility to wage war in response to a direct attack against the United States. In the Civil War, President Lincoln undertook several actions: raised an army, withdrew money from the treasury, and launched a blockade on his own authority in response to the Confederate attack on Fort Sumter. Congress and the Supreme Court approved Lincoln's actions ex post. During World War II, the Supreme Court similarly recognized that once war began, the President's authority as commander-in-chief and chief executive gave him the tools necessary to effectively wage war. In the wake of the September 11 attacks, Congress agreed that "the President has authority under the Constitution to take action to deter and prevent acts of international terrorism against the United States," which recognizes the President's authority to use force to respond to al Qaeda, and any powers necessary and proper to that end. Even legal scholars who argue against this historical practice concede that once the United States has been attacked, the President can independently respond with force. The ability to collect intelligence is intrinsic to the use of military force. It is even more so now while fighting al Qaeda, a covert group that relies extensively on electronic communication in and outside of the United States to plan their attacks. It is inconceivable that the Constitution would vest in the President the power of commander-in-chief and chief executive, give him the responsibility to protect the nation from attack, but then disable him by preventing him from gathering intelligence crucial to defeating the enemy. Evidence of the Framers' original understanding of the Constitution is that the government would have complete ability to face a foreign danger. As James Madison wrote in The Federalist, "security against foreign danger is one of the primitive objects of civil society." Therefore, the "powers requisite for attaining it must be effectually confided to the federal councils. “As the Supreme Court declared after World War II, "this grant of war power includes all that is necessary and proper for carrying these powers into execution."' Courts have recognized the executive branches authority to conduct warrantless searches as well as the executive is better suited to protect the nation Sulmasy and Yoo in 2007 (John Yoo and Sulmasy are both professors of law; “Katz and the War on Terrorism”, 41 U.C. Davis L. Rev. 1219 2007, Page: 1239 http://scholarship.law.berkeley.edu/facpubs/967/) In light of FISA's statutory structure, it is clear that both FISA and the Act's amendments are a compromise. Under the current interpretation of the Fourth Amendment, the government can conduct surveillance without a warrant to identify foreign threats to national security. FISA is a compromise in that it requires the executive to go to a court to get a warrant; in the past, the Executive Branch could engage in a search for national security reasons without having to get a judge's permission. Courts have recognized that the Executive Branch has the authority to conduct warrantless searches for foreign intelligence purposes, so long as they are reasonable under the Fourth Amendment. This deferential approach recognizes that because the executive can more fully assess the requirements of national security than can the courts, and because the President has a constitutional duty to protect national security, courts should not attempt to constrain his authority to conduct warrantless intelligence searches. The FISA process is simply a process, agreed upon by the President and Congress, for national security searches, but it is not the constitutional baseline for such a process. Exec Good/Needed Executive power good – Contains many advantages over courts Ku et al in 2006 (Julian, Associate Professor of Law at Hofstra University School of Law, “Hamdan v. Rumsfeld: The Functional Case for Foreign Affairs Deference to the Executive Branch”, Berkeley Law Scholarship Repository, http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1508&context=facpubs) The doctrines requiring judicial deference to executive interpretations of laws affecting foreign affairs, especially during wartime, have a solid and undisputed formal pedigree. But these doctrines also have a strong functional basis. The executive branch has strong institutional advantages over courts in the interpretation of laws relating to the conduct of war. Courts are poorly positioned, from the standpoint of institutional competence, to resolve ambiguities in statutes, treaties, and customary international law that govern the conduct of national policy in times of war. Courts lack expertise and access to crucial information when acting in these areas. Perhaps most importantly, courts lack the flexibility to adjust or revise decisions when the factual context for its decision has changed. In all of these circumstances, the Executive has greater (although not infallible) abilities to resolve ambiguities in the interpretation of these laws. Deference !- Terror Enemies will exploit the legal system to undermine public support for US war efforts Smith in 2010 (Terence Terrorists employ "lawfare", Harrisburg Conservative Examiner, http://www.examiner.com/article/terrorists-employ-lawfare) In an essay entitled, “Law and Military Interventions: Preserving Humanitarian Values in 21st Century Conflicts," Col. Charles J. Dunlap, USAF has coined the term “lawfare” to describe terrorists’ efforts to use the U.S. legal system against us while waging acts of terror against our citizens. Dunlap wrote his essay in 2001, using examples from the then-ongoing nation-building efforts in the former Yugoslavia, but the intervening decade has, if anything, continued to validate those lessons.¶ Dunlap defines “lawfare” as “"a cynical manipulation of the rule of law and the humanitarian values it represents. Rather than seeking battlefield victories, per se, challengers try to destroy the will to fight by undermining the public support that is indispensable when democracies like the U.S. conduct military interventions." The term “will to fight” is borrowed from the writings of the great 19th century military theoretician Carl von Clausewitz, who identified “centers of gravity” as those elements in the enemy’s organizational structure that can be attacked and exploited to sap their desire to continue the battle and thus be used to defeat them. The American center of gravity, then, is its legal system, which terrorists hope to exploit by forcing the U.S. to conduct show trials that will make at least some segments of our society doubt we should even be fighting this battle.¶ Plan destroys deference in a crucial area – the war on terror demands a strong commander and chief (Luban 08) (DAVID LUBAN, University Professor and Professor of Law and Philosophy, Georgetown University, “ON THE COMMANDER IN CHIEF POWER” SOUTHERN CALIFORNIA LAW REVIEW [Vol. 81:477 2008] http://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=1597&context=facpub) These are arguments about the president and the Congress.11 What ¶ about the president and the judiciary? Here, claims about the commander in ¶ chief’s power characteristically assume a different form. They are claims ¶ that courts lack competence to secondguess military commanders, and ¶ therefore courts should defer to wartime decisions by the commander in chief. In this form, the argument played a role in several decisions early in ¶ the war on terror, in which U.S. citizens who had been captured, then ¶ classified by the executive branch as enemy combatants, sought to ¶ challenge their detention. The district court in Padilla v. Bush, like the ¶ circuit court and Supreme Court in Hamdi, deferred to the executive branch ¶ determination that Jose Padilla and Yaser Hamdi were unlawful enemy ¶ combatants, because (in the Supreme Court’s words), “our Constitution ¶ recognizes that core strategic matters of warmaking belong in the hands of ¶ those who are best positioned . . . for making them.”12 In the same way, the ¶ U.S. District Judge determining that John Walker Lindh (a U.S. national ¶ who belonged to the Taliban) was unprotected by the Geneva Conventions ¶ wrote: “It is important to recognize that the deference . . . is appropriately ¶ accorded . . . to the President’s application of the treaty to the facts in issue. ¶ Again, this is warranted given the President’s special competency in, and ¶ constitutional responsibility for . . . the conduct of overseas military ¶ operations.”13¶ And not just overseas military operations, because the Global War on ¶ Terror (“GWOT”) is unlike other wars. We fight it wherever the terrorists ¶ are, and the terrorists might be anywhere. They pick the battlefield, so the ¶ battlefield potentially encompasses the entire Earth. It follows that the ¶ commander in chief power, and the nearly unreviewable authority it ¶ encompasses, knows no geographical limits. For example, Padilla was ¶ arrested in a Chicago airport, yet the government subsequently asserted that ¶ this was not an ordinary criminal arrest of a U.S. citizen in the United ¶ States governed by constitutional criminal procedure.14 It was a wartime ¶ capture of an unlawful enemy combatant who could be held ¶ incommunicado for years in order to interrogate him and render him ¶ militarily harmless. What made it a battlefield capture was a determination ¶ by the commander in chief that Padilla, although a U.S. citizen, was also an ¶ enemy combatant on a military mission.15 Combining the authority of a ¶ battlefield commander with the expansive definition of the battlefield in the ¶ GWOT creates a vast scope of plenary power for the president. All of this ¶ purportedly follows from the constitutional designation of the president as commander in chief, combined with the bitter realities of the GWOT. ¶ Furthermore, the president’s decisions can fall under the commander ¶ in chief power even if they do not look like military decisions. Padilla, for ¶ example, was arrested by law enforcement officials, not captured by the ¶ military, and the conclusion about his enemy combatant status was drawn ¶ by civilian officials in the Pentagon.16 Determining what legal category ¶ applies to Padilla looks like a judicial job, not a military job. However, ¶ Judge Mukasey wrote in Padilla v. Bush that deference to the commander ¶ in chief¶ is due not because judges are not personally able to decide whether facts ¶ have been established by competent evidence, or whether those facts are ¶ sufficient to warrant a particular conclusion by a preponderance of ¶ evidence, or by clear and convincing evidence, or beyond a reasonable ¶ doubt. Indeed, if there is any task suited to what should be the job skills ¶ of judges, deciding such issues is it. Rather, deference is due because of ¶ a principle captured in another “statement of Justice Jackson—that we ¶ decide difficult cases presented to us by virtue of our commissions, not ¶ our competence.”17¶ Current executive power is insufficient in the war on terrorism-Obama should circumvent Congress Benen on 2/13/15 (Steve; in 2009, The Atlantic named Benen one of the top 50 most influential political commentators in the United States. His background includes writing for The American Prospect, the Huffington Post, and The New York Daily News.; “GOP flips the script, endorses executive overreach”; MSNBC; www.msnbc.com/rachel-maddow-show/gop-flips-the-script-endorses-executiveoverreach) The good news is, six months after President Obama launched a military offensive against ISIS targets in the Middle East, Congress is starting to debate the U.S. mission. The bad news is, the debate is off to a ridiculous start. President Barack Obama should be asking for more power to wage war against Islamic State extremists, some Republicans on the U.S. House Foreign Affairs committee said. […] While Republicans have repeatedly accused Obama of executive overreach in areas such as immigration, several lawmakers at the hearing questioned why he wasn’t seeking broader authority this time. You’ve probably heard that the GOP is outraged by the White House’s proposed Authorization for the Use of Military Force (AUMF), but it’s important to understand why. About a year ago, the Republican condemnation of President Obama shifted – “he doesn’t lead enough” was out, “he leads too much” was in. The more Obama’s policy agenda succeeded in practical terms, the more the GOP argued the president is a lawless, out-of-control tyrannical dictator, hell bent on limitless power without regard for the Constitution. This week, however, Republicans are disgusted by Obama’s lack of executive overreach. GOP lawmakers are suddenly convinced the tyrannical dictator needs even more sweeping powers to act unilaterally in matters of life and death. House Speaker John Boehner (R-Ohio), who occasionally pretends to believe his party’s talking points, expressed dismay yesterday that the president’s AUMF would “tie his hands even further.” Congress’ top lawmaker apparently hopes for a more diminished role for Congress. This isn’t so much an example of Republicans temporarily putting aside their principles for the sake of convenience. Rather, it’s fresh evidence that the principles themselves have always been a mirage. Republicans think Obama must stop acting like a dictator and start working with Congress as the Constitution intended – unless we’re talking about wars, in which case Obama should go ahead and circumvent Congress as much as possible. Republicans think higher deficits are an economic scourge – unless deficit financing advances conservative policy goals, in which case budget shortfalls are better left ignored. Republicans think government spending is inherently wasteful and counter-productive – unless the investments are directed at their state and/or their policy priorities, in which case government spending is great. Republicans think the big federal government shouldn’t interfere with local decision making – unless the residents of the District of Columbia make a decision the right disagrees with. Republicans think Congress should take a leading role in economic policy – unless we’re talking about trade authority, in which case it’s time to curtail Congress’ influence and empower the lawless White House to do as it pleases. We’re talking about leaders of principle – weak, malleable, and ultimately hollow principles. The point, of course, is that Republican principles aren’t to be taken seriously. Indeed, Republicans don’t take them seriously. When Obama takes executive action on immigration and the GOP goes berserk, it has nothing to do with “overreach” and everything to do with Republican opposition to immigration. The same can be said for executive actions on the minimum wage. And health care. And the environment. And on and on. Fealty to separation of powers and checks and balances is nice, but GOP lawmakers have made clear that when it comes to the issues they care about, sweeping, unilateral actions from the White House are just fine. And so, as the debate over authorizing the mission against ISIS continues, expect to see congressional Republicans stress one point above all others: extending as much unilateral power as possible to the executive, the usual anti-Obama talking points notwithstanding. Exec Good- War Executive branch key for action in international conflict Gonzales in 2015 (Alberto, Former Counsel to the President and the United States Attorney General under the George W. Bush Administration, “ADVISING THE PRESIDENT: THE GROWING SCOPE OF EXECUTIVE POWER TO PROTECT AMERICA”, Harvard Journal of Law and Public Policy, http://web.b.ebscohost.com.proxy.library.umkc.edu/ehost/pdfviewer/pdfviewer?sid=f2b846ca-ef7d4681-867e-4479b4210cf0%40sessionmgr112&vid=9&hid=128) When the Framers drafted the Constitution, the most dangerous threats were crude cannons and muskets. The initial balance between executive accountability and flexibility was created in this milieu.17 The world has changed since then, as has the magnitude of the threats to U.S. interests. Based upon my experiences and study, I believe the Framers intended for the executive branch to be able to act with speed and agility to respond to threats and crises.18 Today the ability to act rapidly is more necessary than ever. Article I of the Constitution grants Congress power to “provide for the common Defence and general Welfare of the United States;21 . . . declare War, grant Letters of Marque and Reprisal, and make Rules concerning Captures on Land and Water; 22 raise and support Armies;23 . . . provide and maintain a Navy”24 among other specific duties. Article II grants the President the power as the “Commander in Chief of the Army and Navy of the United States, and of the Militia of the several States, when called into the actual Service of the United States.”25 Cases within the highest power are usually decided in favor of the executive, as the President’s constitutional authority is supported statutorily.158 Some may question whether the courts even have the necessary expertise to judge the president’s national security actions. One scholar argues: Courts and commentators have emphasized the lack of judicial competence in evaluating questions about the conduct of war. As compared to courts, the executive branch has more experience and better access to information about war. It also needs to act at times with dispatch, secrecy, and “unity of plan,” all of which may counsel against interference by the courts.166 From this observation, it may be best for the courts to defer to the executive before action is taken. Exec Good- k 2 National Security Executive branch key to assessing national security Ku et al in 2006 (Julian, Associate Professor of Law at Hofstra University School of Law, “Hamdan v. Rumsfeld: The Functional Case for Foreign Affairs Deference to the Executive Branch”, Berkeley Law Scholarship Repository, http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1508&context=facpubs) By contrast, the executive branch itself collects a wide variety of information through its own institutional experts and a wide global network of contacts without the necessity of strict rules of evidentiary exclusion. While this information may be presented to the executive branch at any time, a court generally cannot account for new information except in the context of a new case." Courts also cannot update statutory mandates to reflect new information, but instead must continue to enforce policies even when they are no longer appropriate. For instance, once the political branches have enacted a statute or approved a treaty, the courts cannot alter or refuse to execute those laws, even if the original circumstances that gave rise to the statute or treaty have changed or even if the national interest would be harmed.72 Indeed, unlike courts, the executive branch is designed to develop specialized competence. In the area of foreign policy, the executive branch is composed of large bureaucracies solely focused on designing and implementing foreign policy. More broadly, the U.S. executive branch, which is largely responsible for directing U.S. state practice with respect to the law of war, is likely to have more expertise, information, and ability when assessing the effect of rejecting or accepting conspiracy as a war crime or the right to be privy to evidence on larger U.S. efforts to develop the law of war. The President is the one to respond to National Security Threats- National Security comes first in order to preserve Liberty Meese III in 2011 (Edwin Meese III, ambassador for Heritage, “Who Is Responsible for America’s Security?”, 7/19/11, http://www.heritage.org/research/reports/2011/08/who-is-responsible-foramerica-s-security, 7/1/15) Though the Framers could never have imagined the events of September 11, 2001, or the terrorist forces that have made America their enemy, they built a republic that could endure and defeat all external threats and prosper. The war on terrorism, being fought against an enemy with few assets and dead aim on soft targets, has only increased the importance of swiftness and secrecy. The President has the power, and bears the responsibility, to make tough decisions at a moment’s notice—whether to trust fresh but uncertain intelligence, bomb an al-Qaeda safe house, target a terrorist for drone attack, or arrest a terror suspect. These decisions are not subject to legislative check or veto. Nor, in an age where a rogue state or stateless terrorist group may threaten the lives of million of Americans, could they be, if the safety of the nation is to be maintained. National security comes first; without it, life and liberty are threatened and happiness is an impossibility. Therefore, as James Madison wrote: “Security against foreign danger is one of the primitive objects of civil society. It is an avowed and essential object of the American Union.” Protecting the nation requires a unity of purpose and faculty, and it cannot be devolved to a committee or Congress. The Framers recognized as much, and their wisdom is our strength. The President, first and foremost, is responsible for ensuring America’s national security. Solvency Rollback bad Reverting to Earlier versions of NSL’s would lead to previous laws that disallowed the recipient the ability to seek advice Doyle in 2011 (Charles Doyle Senior Specialist in American Public Law; National Security Letters: Proposals in the 112th Congress; Congressional Research Service, Published June 30, 2011; http://fas.org/sgp/crs/intel/R41619.pdf) In the USA PATRIOT Improvement and Reauthorization Act, Congress addressed the issue in three ways. First, it amended the federal obstruction of justice statute to outlaw unjustified disclosures. Second, it amended the NSL statutes to make it clear that a recipient remained free to seek the advice of counsel before complying. These amendments, unlike the obstruction of justice amendment, would disappear should the NSL statutes return to their earlier versions. Congress’s third response, however, would mitigate impact of the disappearance. Third, Congress created a nonexpiring statutory section for review of NSLs, 18 U.S.C. 3511. Congressional Oversight Fails Institutional barriers prevent effective congressional oversight- they will continue to defer Carpenter, 2014 Carpenter, Zoe. "Can Congress Oversee the NSA?" The Nation. The Nation, 30 Jan. 2014. Web. 1 July 2015. “The men and women of America’s intelligence agencies are overwhelmingly dedicated professionals,” Ron Wyden said on Wednesday, before proceeding to excoriate their bosses in front of the Senate Intelligence Committee. Addressing Director of Intelligence James Clapper, CIA Director John Brennan and FBI Director James Comey, Wyden continued, “They deserve to have leadership that is trusted by the American people. Unfortunately, that trust has been seriously undermined by senior officials’ reckless reliance on secret interpretations of the law and battered by years of misleading and deceptive statements that senior officials made to the American people. These statements did not protect sources and methods that were useful in fighting terror. Instead, they hid bad policy choices and violation of the liberties of the American people.’ With the future of the surveillance programs disclosed by Edward Snowden still uncertain, the ball is very much in Congress’s court. Specifically, in the Intelligence And Judiciary Committees, which have critical oversight roles over the National Security Agency and others. The stakes are higher than the individual programs revealed by Snowden, however. In question is Congress’s ability to act as an effective watchdog over an expanding national security state. Wednesday’s hearing nicely showcased the two major hurdles to congressional oversight. The first, as Wyden argued, is senior intelligence officials. The second is the congressional committees, which face an institutional mismatch with the intelligence community and whose members often seem more committed to protecting, rather than scrutinizing, the agencies they are tasked with overseeing. First, a brief history. After revelations about abuses by the CIA and other agencies in the 1970s, Congress struck what Stephen Vladeck, a professor of law at American University, calls a “grand bargain,” to accommodate the paradoxical need to submit secret programs to democratic oversight. New legal constraints on intelligence activities would be enforced not in public but instead behind the veil by the intelligence committees and the Foreign Intelligence Surveillance Court (also known as the FISA court). As Colorado Senator Mark Udall said at the Intelligence Committee hearing, “This committee was created to address a severe breach of trust that developed when it was revealed that the CIA was conducting unlawful domestic searches.” The Snowden leaks indicate the bargain has broken down. “In essence, the delicate balance Congress sought to strike thirty-five years ago now appears to be tipped, rather decisively, in favor of the intelligence community,” Vladeck explained in an e-mail. Intelligence officials have done some of that tipping themselves, by withholding information from the public and lawmakers. On Wednesday, Wyden said the committee had been “stonewalled” by intelligence officials; indeed, none of his questions received direct answers, although Wyden did receive promises from officials to get back to him by specific deadlines. Wyden also cited several incidents in which officials had given inaccurate testimony in public hearings. Last March, for example, James Clapper told Wyden that the NSA did “not wittingly” collect data on American citizens, a claim we now know from the Snowden leaks to be false. In some cases, officials may not be telling legislators anything at all. “There are certain things that the committees are simply not going to find out about unless they’re briefed,” said Representative Adam Schiff, a California Democrat on the House Intelligence Committee. According to law, the executive branch must keep the intelligence committees “fully and currently informed” of any intelligence activity, including significant anticipated activity. But recent history suggests that even committee chairs have not been kept abreast. Senator Dianne Feinstein, who chairs the Senate Intelligence Committee and has become one of the NSA’s closest congressional allies, has admitted that her committee “was not satisfactorily informed” about certain surveillance activities, in particular the tapping of German chancellor Angela Merkel’s cell phone. The reauthorization of Section 215 of the Patriot Act, which the NSA says provides legal grounds for collecting Americans’ phone records in bulk, presents another case in which Congress appears to have had insufficient information to determine whether intelligence activities were lawful. In a report released last Friday, the Privacy and Civil Liberties Oversight Board explained that the FISC did not articulate the legal basis for bulk collection until last August—years after Congress extended Section 215 in 2010 and 2011. This indicates that lawmakers may not have been properly informed of how the statute was being applied when they extended it. Ultimately, the board argued that Section 215 is not written in a way that justifies bulk data collection at all, but it said that even if the language were ambiguous, One explanation for is the institutional mismatch between the intelligence community and the congressional committees. “The intelligence committees are small, the staff is small, the agencies themselves are behemoth,” said Schiff. In the House, members are not permitted to have their own staff on the committee, and some have described feeling inadequately prepared to question intelligence officials. “You don’t have any idea what kind of some members of Congress “may have been prohibited from reading” critical documents before voting to maintain Section 215. these gaps things are going on. So you have to start just spitting off random questions: Does the government have a moon base? Does the government have a talking bear? Does the government have a cyborg army?” Representative Justin Amash said in October at a conference hosted by the Cato Institute. The administration says Congress is duly informed, while other lawmakers have suggested it’s their colleagues’ own fault if they aren’t up to speed. Clapper reaffirmed promises of greater transparency on Wednesday, but critics remain skeptical. “I don’t think this culture of misinformation is going to be easily fixed,” Wyden warned. Representative Schiff told me that he expects the mismatch in resources to continue to impact the committees’ oversight ability. “I’d like to see our capacities augmented in the intelligence committee, but at a time of dwindling legislative budgets, I’m not sure whether that will take place,” he said. Congress could reassert some of its own authority by including more members in the group briefed on significant intelligence activity, for example; by shortening the authorization period for laws like the Patriot Act to spur more frequent debate; by imposing a rule of lenity on the FISA court, so that the administration would have to receive congressional approval in ambiguous cases, thus preventing the FISA court from creating its own novel interpretations of law; and by making sure FISA judges hear adversarial opinions from civil liberties and technology experts. Whether Congress has the will to strengthen its own hand is the big question. The fact that the chairman of the House Intelligence Committee, Mike Rogers, believes that “you can’t have your privacy violated if you don’t know your privacy is violated” does not exactly inspire confidence. These questions about oversight can and should be separated from the debate about the legality and effectiveness of individual surveillance programs. “It may well be, at the end of the day, that the programs the committees are overseeing are legal, but meaningful oversight presupposes that the overseers will be the last, not the first, to reach that conclusion,” said Vladeck. The decision about whether the government or anyone else may continue to sweep up and search our phone records is important. Without addressing broader oversight issues, however, we may barely scratch the surface of a much-needed conversation about balance of power in the post-9/11 era Congressional oversight has been counterproductive. Van Wangenen, 2008 James S. "A Review of Congressional Oversight." Central Intelliegence Agency. The CIA, 27 June 2008. Web. 1 July 2015. *Updated in 2008. Originally published in 2007. Permanent, continuing, day-to-day Congressional oversight of the US Intelligence Community (IC) marked its 20th anniversary in May 1996. Two decades earlier, Senate Resolution 400 established the Senate Select Committee on Intelligence (SSCI) following revelations of "intelligence abuses." In July 1997, the SSCI's House counterpart, the House Permanent Select Committee on Intelligence (HPSCI), will celebrate its 20th birthday. During this time, the IC's missions, responsibilities, capabilities, size, and management have experienced dramatic changes. The Congressional oversight committees have played a significant role in shaping these changes and continue to do so. Some individuals within the Community have argued, with a certain amount of justification, that Congressional oversight has been intrusive, meddling, short-sighted, and counterproductive; has involved micromanagement on a grand scale; and has served to drag the IC into the political cockpit of partisan politics from which it had previously been immune. Others tend to view Congressional oversight as being, on balance and after a somewhat rocky start in the late 1970s, a decided plus for the Community by providing loci for Congressional advocacy and support for intelligence and by providing rigorous review and questioning of intelligence activities and budgets. Perhaps, in looking back at what Congressional oversight has and has not been, we will be better able to discern the future of oversight by the Congress. First, it is important to dispel the popular notion that Congressional oversight started with the establishment of the SSCI and the HPSCI. That notion is not accurate. Before their establishment, however, oversight was certainly not intense or much of an inconvenience to the agencies that carried out intelligence activities. The Revolutionary War Experience It is somewhat ironic that at the beginning of the republic, intelligence operations were conducted by the forebearer of today's Congress--the Continental Congress. During the Revolutionary War, the Second Continental Congress not only functioned as the government of the 13 rebellious colonies, but also planned, directed, and carried out intelligence activities in support of the war effort. Secret committees of the Congress were formed for this purpose, and covert actions, use of secret writing, codes and ciphers, protection of sources, compartmentation, propaganda, and deception all were in the "bag of tricks" used by these "legislative intelligence officers." (Thomas Paine, the author of Common Sense, was fired from the staff of a secret committee for leaking information on France's covert assistance to the colonies.) Agents employed by the Continental Congress succeeded in obtaining covert aid for the war effort from France and Spain and, following the Battle of Saratoga, the open entry of those countries into the war against the British. Other agents on the Congressional payroll scoured European capitals for intelligence as well as indications and warning of impending events such as the plan by King George III to send German troops (lumped together by the colonists as "Hessians") to America to put down the rebellion. The Continental Congress was alerted to this plan, and Thomas Jefferson alluded to the use of "Foreign Mercenaries" as part of his indictment of King George contained in the Declaration of Independence. [Top of page] Establishing a Secret Fund At the conclusion of the war, and following a turbulent decade under the weak and ineffective Articles of Confederation, the new United States adopted the Constitution and elected George Washington as its first President. One of the first things he did was to request the Congress to appropriate for his use a "secret fund," contained in the budget of the Department of State and innocuously called the "Contingency Fund for the Conduct of Foreign Intercourse." This fund was a pot of money available to the President for clandestine intelligence purposes. By the third year of Washington's presidency, the fund amounted to 12 percent of the national budget. Expenditure of money from the fund was done on the signature of the President, with no further accounting required. (This practice established the precedent for a similar provision contained in the CIA Act of 1949.) The secret fund was used for numerous intelligence operations by our early presidents, including: Funding negotiations (bribes) with Napoleon Bonaparte to try to get him to coerce Spain into ceding East and West Florida to the United States. Later, when these "negotiations" failed to bear fruit, the fund was used to promote revolution in the Floridas, and this prompted Spain to see the wisdom in such a territorial transaction. Funding the Lewis and Clark and the Zebulon Pike expeditions, which in part were intelligence missions with the goal of entering territories of foreign governments with which the United States was at peace, in order to locate and map their fortifications. President James Madison used the secret fund to enlist gangsters for intelligence purposes. The pirate Jean Laffite and his men were paid to scout, spy, and sometimes fight for Gen. Andrew Jackson during the War of 1812. [Top of page] Early Attempts at Oversight From time to time during the early years of the republic, members of Congress tried to obtain an accounting of expenditures made from the President's secret intelligence fund as well as to effect oversight of the activities it was used to finance. In one debate over this issue, Senator John Forsyth, later to become Secretary of State, declared: The experience of the Articles of Confederation having shown the necessity of secret confidential agencies in foreign countries, very early in the progress of the Federal Government, a fund was set apart, to be expended at the discretion of the President, on his responsibility only, for all purposes to which a secret service fund should or could be applied to the public benefit. For spies, if the gentleman pleases.... Later, some opposition members of Congress suspected President James Polk was using the secret fund for agents provocateurs in Mexico and California for the purpose of fomenting "incidents" designed to provoke a war with Mexico and thus ensure that Texas and California would become part of the United States. A Congressional demand was made that Polk surrender to the Congress all accounts of payments from the fund. Polk refused, stating: The experience of every nation on earth has demonstrated that emergencies may arise in which it becomes absolutely necessary for the public safety or the public good to make expenditures, the very subject of which would be defeated by publicity. In no nation is the application of such funds to be made public. In time of war or impending danger, the situation of the country will make it necessary to employ individuals for the purpose of obtaining information or rendering other important services who could never be prevailed upon to act if they entertained the least apprehension that their names or their agency would in any contingency be revealed. [Top of page] Period of Benign Neglect President Polk's defiant stance regarding Congressional oversight effectively staved off significant oversight by the legislative branch for more than a century. It was not until after World War II and enactment of the National Security Act of 1947 that the Congress again tried to oversee US intelligence activities. With the establishment of the CIA as the nation's first permanent, statutory, and national intelligence entity, each house of the Congress assigned oversight responsibility over this new executive branch capability to its respective Armed Services Committee and Appropriations Defense Subcommittee. In actual practice, awareness of CIA's and other intelligence agencies' activities was limited largely to the chairmen and ranking minority members of those committees/subcommittees. Staff cognizance was generally restricted to one or two senior staff members of each of the oversight bodies whose principal job was to make certain that the needs of the intelligence agencies were included in the annual Defense Department budget. Oversight, such as it was, was typically worked out by the Director of Central Intelligence and a few senior members of the Congress, with little involvement of the Congress as a whole. While occasional proposals were put forth during the 1950s and 1960s to conduct more robust oversight by establishing select intelligence committees, none of these pro posals was ever seriously considered. Most members of Congress tended to agree with the view expressed by Senator Leverett Saltonstall, who stated in 1956: It is not a question of reluctance on the part of CIA officials to speak to us. Instead, it is a question of our reluctance, if you will, to seek information and knowledge on subjects which I personally, as a member of Congress and as a citizen, would rather not have.... Another member commented several years later that: I have found little hesitation on the part of the Congress to support and to finance our intelligence work with all its secrecy. This hands-off view of oversight continued to be the accepted modus operandi of the Congressional oversight bodies for over a quarter of a century following the creation of the CIA in 1947. Congressional historians refer to it as an "era of trust" or as the "period of benign neglect." As the 1970s approached, however, ominous clouds started to appear. [Top of page] Getting Tough By the early years of the 1970s, the unpopular war in Southeast Asia and the unfolding Watergate scandal brought the era of minimal oversight to a screeching halt. The Congress was determined to rein in the Nixon administration and to ascertain the extent to which the nation's intelligence agencies had been involved in questionable, if not outright illegal, activities. A series of troubling revelations started to appear in the press concerning intelligence activities. The dam broke on 22 December 1974, when The New York Times published a lengthy article by Seymour Hersh detailing operations engaged in by the CIA over the years that had been dubbed the "family jewels." Covert action programs involving assassination attempts against foreign leaders and covert attempts to subvert foreign governments were reported for the first time. In addition, the article discussed efforts by intelligence agencies to collect information on the political activities of US citizens. These revelations convinced many Senators and Representatives that the Congress itself had been too lax, trusting, and naive in carrying out its oversight responsibilities. (Many of the so-called family jewels had been briefed to some members on the existing oversight panels, but in the highly charged atmosphere of the Watergate period they tended to opt for selective amnesia when asked if they had known about these activities.) The first legislative response was enactment in 1974 of the Hughes-Ryan Amendment to the Foreign Assistance Act of 1961. This amendment addressed the question of CIA covert actions and prohibited the use of appropriated funds for their conduct unless and until the President "finds" that each such operation is important to the national security and submits this Finding to the appropriate Congressional committees--a total of six committees. (This grew to eight committees after the House and Senate intelligence committees were established.) The following year, Congress actually terminated funding for a covert program--the secret military support of the UNITA faction in the Angolan civil war. In early 1975, additional disclosures surfaced regarding CIA domestic spying operations and the COINTEL program of the FBI to undermine the activities of the civil rights and anti-Vietnam war protest movements. These further revelations convinced the Congress that it could not rely solely on the presidentially chartered Rockefeller Commission to investigate illegal abuses, both foreign and domestic, committed by US intelligence agencies. Each house of the Congress proceeded to establish its own special investigating committee. In the Senate, this committee became known as the Church committee, named for its chairman, Senator Frank Church of Idaho. The House committee was the Pike committee, after its chairman, Representative Otis Pike of New York. During 1975 and the first half of 1976, the country was rocked by an almost daily stream of disclosures from these committees documenting a pattern of misconduct by the nation's intelligence agencies. These disclosures concerned fairly widespread abuse of the civil rights of American citizens; activities that violated applicable laws and executive branch policies; and clandestine operations overseas that seemed to conflict with US values. At the same time, however, these investigations served to educate committee members about the valuable contributions the intelligence agencies had made in protecting national security and about the significant capabilities they possessed. As shocked as these members were over the abuses, they were equally impressed by the abilities of the Intelligence Community (IC) and did not want to advocate any action that would remedy the former but destroy the latter. They did, however, want to establish a mechanism to ensure that henceforth the intelligence agencies would have effective Congressional supervision, accountability, and oversight. Consequently, both the Church and Pike committee final reports (1) recommended the establishment of new, follow-on, permanent committees in their respective houses of Congress to provide continuing oversight and to consider such additional legislation as might be deemed necessary. These recommendations led to the establishment of the SSCI on 19 May 1976 and the HPSCI on 14 July 1977. The HPSCI was established more than a year after the SSCI because the House of Representatives was so disgusted with the leaking of the Pike committee report that it was not certain it wanted a permanent intelligence committee. The first few years of the new oversight committees were somewhat rocky as they fought for turf with more established committees, principally the Armed Services and Appropriations Committees, which had previously been responsible for Congressional oversight of intelligence. They also battled the Carter administration over the issue of charter legislation for each of the intelligence agencies. Essentially, this proposed legislation would have defined in law precisely the mission of each intelligence agency and the activities each could and could not undertake. The executive branch opposed such definitive legislation, and it eventually succeeded in preventing its enactment. In 1978, however, the oversight committees did enact the first Intelligence Authorization Act, which gave them the ultimate oversight hammer--control of the IC's purse strings. [Top of page] Cooperation and Legislation In these early years, the committees slowly distanced themselves from the Church and Pike committees to become Congressional advocates for intelligence. The Soviet invasion of Afghanistan and the Iranian seizure of American hostages in Tehran helped persuade the public and the Congress that too tight a rein on the intelligence agencies could be disastrous. As a result of this changed outlook, the proposals for intelligence charters died. Congressional oversight, following the landslide victory of Ronald Reagan in the election of 1980, changed gears from trying to control the intelligence agencies to seeking to assist them in carrying out their responsibilities. Congressional oversight, which had gone from benign neglect in the 1950s, 1960s, and early 1970s to oversight based on suspicion, doubt, and micromanagement in the late 1970s, entered an era of cooperation in the 1980s. In fairly rapid succession, the oversight committees either drafted or assisted other Congressional committees with concurrent jurisdiction in drafting a series of legislative initiatives which, upon becoming law, proved to be of great assistance to the IC. First came the Foreign Intelligence Surveillance Act, which requires that a court order be obtained from a special court established by the Act for all electronic surveillance for intelligence purposes within the United States. (In 1994, this Act was expanded to impose the same court order procedure for physical surveillance for intelligence purposes.) Next came the Classified Information Procedure Act, which established statutory procedures for the handling of classified information in Federal criminal proceedings. The Intelligence Oversight Act of 1980 amended the Hughes-Ryan Amendment to require notice of covert actions only to the two intelligence committees; the requirement to notify six other committees was eliminated. In 1982, the Intelligence Identities Protection Act became law, making it a crime to reveal the identity of intelligence agents. This was followed by the enactment in 1984 of the CIA Information Act, which exempted certain CIA operational files from requirements of the Freedom of Information Act. [Top of page] Renewed Tension The spirit of cooperation between the Congressional oversight committees and the IC was sorely tested during the first administration of President Ronald Reagan. The oversight committees, particularly the HPSCI, became increasingly alarmed over the role US intelligence agencies were playing in the implementation of the administration's Central American policy. The issue of greatest concern was the CIA's support to the Contra rebels in Nicaragua. Ultimately, a series of funding restrictions were enacted (the Boland amendments) that put limits on aid to the Contras. The second Reagan administration produced the so-called Iran-Contra affair, which the oversight committees viewed as the most serious breakdown of the trust between the executive branch and the Congress since the oversight committees were established. In late 1986, the committees learned that a covert action Finding had been approved 10 months earlier authorizing arms sales to Iran in an effort to secure the release of Americans being held hostage in Lebanon. This Finding had specifically ordered that the oversight committees not be notified. It was then revealed that proceeds from the arms sales were used to provide assistance to the Contras that appeared to violate the Boland amendments. During the course of their investigations, the committees learned that some administration officials and IC personnel had considered the idea of using excess funds from the Iranian arms sales to fund covert action programs, thus completely avoiding the Congressional oversight process. A special prosecutor was appointed to investigate violations of applicable laws, and the oversight committees tried to enact legislation to force the President to notify the committees of all covert actions within 48 hours. Several legislative attempts were made to achieve this, and, in 1990, such a provision was included in the Intelligence Authorization Bill for fiscal year 1991. President Bush vetoed the bill, principally because it contained this provision. The committees were unable to secure a veto override, and they ended the dispute by agreeing to accept notification "in a timely fashion." But the issue remains far from resolved, and some future incident could easily revive it. [Top of page] Reorganization In January 1990, the chairmen of both intelligence oversight committees introduced far-reaching bills to reorganize the IC. During the first half of 1992, the two committees held extensive public hearings on these proposals. By fall, and after several months of negotiations with the Bush administration, the committees attached "The IntelligenceOrganization Act of 1992" to the fiscal year 1992 Intelligence Authorization Act. This new legislation did not represent a radical departure from the status quo. Essentially, it merely enshrined into law what Director of Central Intelligence (DCI) Robert Gates had already accomplished in restructuring the IC. It did, however, represent a significant change in the legal framework for US intelligence activities. In amending the National Security Act of 1947, this new statute: Recognized the DCI as the statutory adviser to the National Security Council. Established the National Intelligence Council as the highest authority for developing and publishing intelligence analysis. Gave the DCI responsibility for establishing priorities for US Government intelligence-gathering and for coordinating all HUMINT collection. Gave the DCI approval authority for the budgets of the intelligence agencies. Defined the composition of the IC for the first time. The Intelligence Organization Act of 1992 represented the first successful effort by the Congress since the National Security Act of 1947 to enact organizational legislation for the IC. In the Intelligence Authorization Act for fiscal year 1995, the oversight committees included a provision mandating a Presidential Commission to review the roles and missions of US intelligence agencies in the post-Cold War era. This commission, chaired by former Defense Sectretary Les Aspin and, after his death, by another former Defense Secretary, Harold Brown, met its charge of producing a report to the President and the Congress by 1 March 1996. The Congressional oversight committees will play a central role in transforming any of the Commission's recommendations into law in the event it is necessary to amend or replace existing statutes, such as the National Security Act of 1947 and the CIA Act of 1949. [Top of page] The Balance Sheet At this point, no other major legislative initiatives appear to be on the horizon. The two oversight committees continue to exercise oversight and to use their fiscal control to obtain the intelligence agencies' compliance when necessary. Year in and year out, however, the committees authorize and the appropriations committees appropriate the bulk of the budget requested by the DCI. Changes made by the committees really amount to nibbling at the margins. In addition, the oversight committees have not been at all reluctant to increase funding for programs and capabilities they perceive to be important. In several instances over the years, the committees have actually pushed the IC and the administrations into larger and more expensive programs involving technical collection systems, HUMINT, and certain covert action operations. Today, Congressional oversight is accepted and recognized as a fact of life. The top echelons of the IC are replete with former professional staffers of the intelligence committees, and the committees themselves continue to draw staff expertise from the Community. While the Congressional oversight committees are among the harshest critics of the intelligence agencies, they are also their strongest defenders. Congress has repeatedly failed at oversight of the executive branch Strand and Lang, 2011 Strand, Mark, and Tim Lang. "Executive Oversight: Congress’ Oft-Neglected Job." The Sausage Factory. The Congressional Institute, 28 Nov. 2011. Web. 1 July 2015. Congressional oversight is an effort of the legislative branch to examine the activities of the executive branch. This is perhaps the simplest definition of “Congressional oversight”. Walter Oleszek, writing for the Congressional Research Service in Congressional Oversight: An Overview, notes that political scientists have many definitions for the term; however, it’s probably not necessary to delve into the various nuances differentiating them. Whatever your definition, a key point to remember is that this process is one of the most important legislative checks on Presidential power. Members of Congress might investigate the administration for a number of reasons. First and foremost, legislators will exercise oversight to verify whether the President has “[taken] Care that the Laws be faithfully executed”, a task given to him in the Constitution (Article 2, Section 3). In other words, they do this so they can ensure that he is acting in a manner consistent with their commands as manifested in law. A similar reason for investigating the executive branch is to gauge how efficiently and effectively the administration is governing. A President and a department might be gung-ho about a program, but still not run it very well, so the oversight authority can serve as a corrective to poor governance. When the legislature engages in oversight, it says, “We, the Congress, want to know what you, the President, are doing with the money we appropriated to you.” But oversight uncovers more than simply administrative inefficiency. Congress can unearth corruption and criminality when it investigates the executive branch. Whatever the reason, Congressional oversight is a powerful mechanism for fostering good governance by the administration. In the first known example of Congressional oversight, President George Washington was rather indignant about Congress questioning him over his Administration’s treaty negotiations with the Creek Indians. Also, as we note in Surviving Inside Congress, the legislature decided “to flex its oversight muscle early, instructing the executive departments it had just created to report back to it on various matters under the Executive’s jurisdiction”. Since the first Congress, the legislature’s oversight activities have not slackened. Congress has even established two committees to spearhead oversight initiatives. The Committee on Government Oversight and Reform is primarily responsible for this task in the House. The Committee website notes that it does produce bills on certain matters, but that is of secondary importance: “Our primary responsibility…is oversight of virtually everything the government does”. Likewise, its Senate counterpart, the Committee on Homeland Security and Governmental Affairs, lists “studying the efficiency, economy, and effectiveness of all agencies and departments of the Government” as one of its functions. Although these two committees are specifically engaged in oversight activities, every committee in both Chambers may actively review executive activities on the subject matters falling under its jurisdiction. Most major committees even have oversight subcommittees and hire investigative specialists for the task. Government oversight, then, is a responsibility of every Member of Congress in every Congress. If all the Members of Congress did exercise all their oversight prerogatives, committees might be meeting 24 hours a day, seven days a week. That’s an exaggeration perhaps, but Congress has many tools at its disposal, including the power to subpoena witnesses. First and foremost, committees may conduct hearings and investigations, which are opportunities for lawmakers to invite (or compel, via subpoena) administration officials or other witnesses to testify about an issue. The terms hearing and investigation are very similar, but Oleszek notes they are often distinguished by using the former term to denote a meeting that is convened to gauge how well the administration is governing, but the latter has a negative connotation, used when the session is to see whether officials have engaged in illegal activities or whether they were grossly incompetent. In hearings and investigations, Members of Congress take initiative in overseeing the government, but they have also empowered others to take on this role too. For instance, the government has established offices of inspectors general (IGs) in almost 70 federal departments or other bureaus. These officers are charged with investigating their agencies to improve efficiency and uncover criminal activity. Twice a year, the IGs must submit reports, including recommendations, to the heads of their organizations, who must then send them to Congress within a month. If an IG unearths something urgent, he must immediately alert his superior, who must then inform Congress within a week. In addition to these offices’ individual bodies, Congress has also established the Government Accountability Office (GAO), a whole agency dedicated to oversight. Its purpose is to “advise Congress and the heads of executive agencies about ways to make government more efficient, effective, ethical, equitable and responsive”. Committees may request that the GAO undertake an investigation, or legislation may require it; the head of the GAO, the Comptroller General, may also commission such projects. Congress can even compel the executive branch to participate in oversight activities by including, in authorizing legislation, provisions requiring that administration officials report back on progress on implementing the law. Although Congress has established a number of ways to exercise its oversight authority, the legislature sometimes neglects to do so. When one party controls both the White House and one or both Chambers of Congress, legislators from the President’s party are generally less aggressive in fulfilling their supervisory duties – at least in public. Oversight concerns are more likely to be voiced in meetings or by private correspondence. As we note in Surviving Inside Congress, “family fights are not good politics ”. Like many instances of selfinterest, this happens under both parties. Before the 2010 election, the minority staff of the Oversight Committee issued a report, A Constitutional Obligation: Congressional Oversight of the Executive Branch, which extensively criticized Democrats for alleged inaction during the period of united government. “Congress’ chief watchdog committee has failed repeatedly to conduct meaningful and sustained investigations”, they write. On the flip side, the Democrats charged that the Republicans neglected oversight as well. “During the last five years [2001-2006], the Republican-controlled Congress has failed to meet this constitutional oversight responsibility. On issue after issue, the Congress has failed to conduct meaningful investigations of significant allegations of wrongdoing by the Bush Administration”, the Democratic minority staff wrote in a January 2006 report entitled Congressional Oversight of the Bush Administration. Now that we are in a period of divided government, you can bet there will be significant investigations for the remainder of the 112th Congress. Republican Representative Darrell Issa, Chairman of the House Committee on Government Reform, began this session with guns blazing. After the election, there was a flurry of news articles and commentaries on Chairman Issa’s choices of subjects of investigations, but you could argue that he was not being entirely partisan. During an interview on CNN’s State of the Union, Issa argued that providing the President billions of dollars for dispersal, through the Troubled Asset Relief Program (TARP) and the American Recovery and Reinvestment Act of 2009 (the “stimulus bill” passed at the beginning of Obama’s term), has a “corrupting effect” on an administration. In the interview, when challenged that TARP was signed by Republican President George Bush, he maintained that the money should not have been provided to him either. (Chairman Issa voted against the legislation that created TARP.) Further, he also emphasized the role of the Oversight Committee in promoting government efficiency. “But remember the focus of our committee…has been consistently about looking for waste, fraud and abuse. That’s the vast majority of what we do”, he said. Although Chairman Issa described the role of his Committee as ensuring government efficiency, one of his latest initiatives is not obviously related to maximizing the use of taxpayer dollars. Rather, he and his Senate counterparts have been examining the Department of Justice’s Operation Fast and Furious program – a foolhardy attempt on the part of the Obama Administration to discover the location of the leaders of Mexican drug cartels. In this program, government agents allowed firearms to “walk” to Mexico – to cross the southern border illegally – in the hope that they could trace them to drug lords. Not only was the government unable to keep tabs on at least 1,500 of these guns, but at least one was also linked to the death of American border patrol agent Brian Terry, whose murder prompted a public investigation of the program. Gaining intelligence that could lead to the capture and destruction of cartels that bring drugs into the United States and that have wreaked havoc in Mexico is, of course, a worthy goal and a legitimate government function – it’s just that those responsible did not consider the unintended consequences of this operation. At issue in the investigation is who is at fault for the repercussions associated with Operation Fast and Furious. Additionally, a Department of Justice official sent a letter to Senator Chuck Grassley (R-IA) that falsely claimed that the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) attempted to stop illegally purchased guns from being taken to Mexico. Chairman Issa recently sent a letter to the official requiring that he release documentation so Congress might know whether the falsehood was unintentional or not. It’s not clear how the Fast and Furious investigation will turn out. If it uncovers some gross flaw on the part of the administration, it’s a win for democracy. If not, the Obama Administration will accuse the investigators of partisanship – generally the last refuge of any administration being investigated and a common risk when different parties control Congress and the White House. Even if the Administration makes its case, most Americans really wouldn’t want to curtail Congress’ oversight powers, since we expect accountability from the Presidency. Congress, moreover, has been happy to foster executive transparency and efficiency by developing and deploying the various tools at its disposal. Without them, who knows what would happen? That’s the point: We’d have no idea, and that’s how cover-ups happen. Recent congressional oversight has been effective only 20% of the time – the other 80% is just political nonsense and bickering Bassetti, 2015 Bassettii, Victoria. "How to Fix Congressional Oversight." Brennan Center for Justice. The Brennan Center for Justice, 15 Jan. 2015. Web. 1 July 2015. It was an unseasonably warm, overcast March day in 2012, when Energy Secretary Steven Chu exited a House office building after his testimony before the House Oversight and Government Reform Committee. He was probably exhausted as he headed for his car. With three edgy hours of Q&A with Rep. Darrell Issa (R-Calif.) and others finally over, what the Nobel Prize winner did not suspect was that he was being followed stealthily by Republican staffers. They snapped a picture of him getting into an SUV. Then Issa blasted Chu: “#hypocrisy,” he tweeted. Chu, it seemed, was riding in a gas guzzler. Issa was being more than just rude. He was also wrong. Chu’s car was a flex vehicle that also ran on ethanol. And it was the car assigned to him for security reasons. Perhaps Chu should have expected the tail and the personal attack. Earlier that month, Issa had threatened unnecessarily to subpoena him to testify. Issa rarely pretended that his energy hearings were open inquiries to uncover the facts. His Committee, after all, regularly gave its hearings conclusory titles like “How Obama’s Green Energy Agenda is Killing Jobs.” Reserving judgment was not the Committee’s operating procedure. Welcome to 21st century congressional oversight, an unpredictable blend of partisan hackery, prosaic toil, and rare but extraordinary work (the Senate Intelligence Committee’s torture report). As a new Congress dawns, it’s time to gear up for two years of “investigatory-pallooza,” as one former agency head appointed by President Obama called it. It’s inevitable, as we near a presidential election with a partisan split between the legislative and executive branches. It’s also highly doubtful that much of this forthcoming congressional oversight will be productive. Congress far too often engages in oversight that is “lackadaisical” and caught up in the “gotcha cycle,” the former agency head added. "Some hearings are worthwhile and uncover useful information, but others amount to an all-day exercise in congressional preening," said Ron Weich, a former DOJ official and now dean of the University of Baltimore School of Law. Worse, a fair amount of it is "mere harassment," he noted. So much so that another agency chief once turned to one of his aides during an oversight hearing and asked, “Why would anyone take this job again?” One former high-ranking Department of Justice official said that during his time at the agency 20 percent of the oversight was effective; 40 percent was a wash; and 40 percent was political nonsense. The failure of Congress to conduct comprehensive and effective oversight is shameful. With federal government spending at more than 23 percent of the gross domestic product and employing more than 2.5 million people, who doesn’t think that someone needs to mind the store? “Independent review is always valuable,” said Weich, who guided DOJ through the Fast and Furious hearings. Worse, the type of oversight Congress conducts today is often counterproductive. It wastes valuable time, leads to minimal improvements, and inhibits good government. A former Department of Energy official told me that the agency’s staff was amazed at the “intensity of all the investigations” in the first four years of the Obama Administration. They felt beleaguered, even as they continued to do their jobs. But it hurt morale and made people excessively sensitive about internal communications. Congress could conduct oversight seriously if it wanted to. One important first step would be to institutionalize the responsibility and to incentivize a bipartisan approach. Last year, I proposed that each Senate Committee be required to appoint a non-partisan Oversight staff director (with dedicated resources) and that Committee funding be withheld until that appointment was certified by both the Republican and Democratic heads of the Committee. Why is this so important? It’s a corrective to two of the main barriers to good oversight: lack of knowledge and lack of reward. Most members of Congress “actually have no idea how the government functions,” a former high-ranking DOJ official from the Bush Administration said. Moreover, “political actors rarely get remembered for their oversight. They don’t get votes from conducting effective oversight,” he added. Put professional staff and funding in place to help do the job, and we might see a bit of a course correction. But there is more Congress could do. A lot of it involves exercising self-control. There are no rules to enforce good judgment but here’s a quick checklist: Remember the Goal: “The easiest but least useful form of oversight is Monday morning quarterbacking of an agency screw up. It’s hard to look at a tactical failure and decide it will inform substantive changes to the law,” said the former Bush Administration DOJ official. Take Your Time: “It’s never a quick hit. If all you’re doing is sending a letter to send a press release, that’s not good oversight,” Weich said. Instead, when a committee takes its time and really gathers the evidence, subsequent recommendations have legitimacy. Follow the Golden Rule: Do unto others as you would have them do unto you. Most members would “never tolerate routine communications between members and staff being subject to public exposure,” Weich said. When oversight is reduced to an effort to find an ill-considered phrase buried deep in piles of emails, you know effective oversight is not the goal. Avoid the Cliches: You know there’s bad oversight ahead when members and staff start appending “gate” or “scam” to every investigation. It’s even worse when they start asking questions like “What did he know and when did he know it?” Make it Bipartisan: When an inquiry was launched by both a Democrat and a Republican, we “took a good long look”, Weich, the former DOJ official, said. That doesn’t mean that investigations launched with the support of only one party inevitably are going to be partisan attacks. “Partisan things can have a good productive result,” the Republican DOJ source said. But when oversight starts off bi-partisan, the odds of productive hearings increase significantly. As with much in our dysfunctional Congress, most of these solutions can be found only in that ineffable territory we call good judgment. Today, many members of Congress seem afraid to enter that land. Too many partisan forces drive them off. We can only hope that a mild structural reform—the mandate that each committee hire unified, bi-partisan oversight staff—might help nurture a glimmer of wisdom. After all, from small acorns…. Congress is ineffective at oversight of the FBI and CIA- limited expertise and weak budgetary power Zegart, 2011 Amy B. "The Domestic Politics of Irrational Intelligence Oversight." Political Science Quarterly 126.1 (2011): 1-2. Serial Solutions. Web. 1 July 2015. Nine years after September 11, the least-reformed part of America’s intelligence system is not the Central Intelligence Agency (CIA) or the Federal Bureau of Investigation (FBI), but the U.S. Congress. Although the House and Senate enacted sweeping changes to the executive branch, including restructuring intelligence agencies under a new Director of National Intelligence and creating the Department of Homeland Security, Congress has been largely unable to reform itself. In 2004, the 9/11 Commission called congressional oversight “dysfunctional,” and warned that fixing oversight weaknesses would be both essential to American national security and exceedingly difficult to achieve.1One year later, the Commission’s report card gave efforts to improve intelligence oversight a “D.”2 By 2007, Lee Hamilton, who served as the Commission’s Vice Chairman and earlier as Chairman of the House Permanent Select Committee on Intelligence, was angry. Testifying before the Senate Select Committee on Intelligence, he delivered an ominous warning: To me, the strong point simply is that the Senate of the United States and the House of the United States is [sic] not doing its job. And because you’re not doing the job, the country is not as safe as it ought to be….Youʼre dealing here with the national security of the United States, and the Senate and the House ought to have the deep down feeling that weʼve got to get this thing right. Hamiltonʼs words prompted vigorous nods of agreement across the aisle, but never made headlines or produced major changes.4Instead, even the Committee’s own reform centerpiece—consolidating appropriations andauthorization powers—quickly and quietly died. In May 2009, House Speaker Nancy Pelosi declared that oversight had become so feckless, the only way tochange the intelligence policies of the George W. Bush administration was to oust Republicans at the polls .5In January 2010, the Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism con-cluded that congressional intelligence and homeland security reform efforts were still failing.6Although Congress later that year managed to pass anintelligence authorization bill for the first time since 2004, several key over-sight measures were stripped or watered down.This article examines the roots of weak intelligence o versight. SinceSeptember 11, most explanations have focused on the Bush administrationand the exte nt to which executive branch officials withheld information fromCongress about secret and controversial programs such as the National Secu-rity Agencyʼs warrantless wiretapping, the CIAʼs use of harsh interrogationmethods, and the establishment of CIA blac k sites to detain suspected ter-rorists abroad.7Executive branch secrecy, how ever, is not the entire s tory.Congress also has struggled for years to bolster its own intelligence oversightcapabilities, with limited success. What former Senate Intelligence Committee Chairman John D. Rockefeller, IV has called the “long and sordid his-tory” of congressional oversight weaknesses began before September 11 and continues today.8Below, I argue that Congress’s enduring oversight troubles stem largely from two institutional deficiencies: limited expertise and weak budgetary power over the intelligence community. This is no accident. In both areas, electoral incen-tives and internal congressional turf battles have led Congress to tie its ownhands. The result is an intelligence oversight system that is rationally designedto serve the reelection interests of individual legislators and protect congressio-nal committee prerogatives but poorly designed to serve the national interest.Part one discusses the importance of oversight, the elusiveness of a goodworking definition of it, and why faltering intelligence oversight is a reasonable Turn- Strengthens Surveillance No ‘reform’ will actually change anything about the US surveillance system. Actually strengthens surveillance and delays real solvency Greenwald 14 Glenn Greenwald is a journalist, constitutional lawyer, and author of four New York Times best-selling books on politics and law. “CONGRESS IS IRRELEVANT ON MASS SURVEILLANCE. HERE’S WHAT MATTERS INSTEAD.” At The Intercept on CONGRESS IS IRRELEVANT ON MASS SURVEILLANCE. HERE’S WHAT MATTERS INSTEAD. Accessed 6/29/15 at https://firstlook.org/theintercept/2014/11/19/irrelevance-u-s-congressstopping-nsas-mass-surveillance/ All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. government is . . . the U.S. government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires. The entire system in D.C. is designed at its core to prevent real reform. This Congress is not going to enact anything resembling fundamental limits on the NSA’s powers of mass surveillance. Even if it somehow did, this White House would never sign it. Even if all that miraculously happened, the fact that the U.S. intelligence community and National Security State operates with no limits and no oversight means they’d easily co-opt the entire reform process. That’s what happened after the eavesdropping scandals of the mid-1970s led to the establishment of congressional intelligence committees and a special FISA “oversight” court—the committees were instantly captured by putting in charge supreme servants of the intelligence community like Senators Dianne Feinstein and Chambliss, and Congressmen Mike Rogers and “Dutch” Ruppersberger, while the court quickly became a rubber stamp with subservient judges who operate in total secrecy. Ever since the Snowden reporting began and public opinion (in both the U.S. and globally) began radically changing, the White House’s strategy has been obvious. It’s vintage Obama: Enact something that is called “reform”—so that he can give a pretty speech telling the world that he heard and responded to their concerns—but that in actuality changes almost nothing, thus strengthening the very system he can pretend he “changed.” That’s the same tactic as Silicon Valley, which also supported this bill: Be able to point to something called “reform” so they can trick hundreds of millions of current and future users around the world into believing that their communications are now safe if they use Facebook, Google, Skype and the rest. Circumvention The Government will inevitably get information from Silicon Valley and congressional action is irrelevant Greenwald 14 Glenn Greenwald is a journalist, constitutional lawyer, and author of four New York Times best-selling books on politics and law. “CONGRESS IS IRRELEVANT ON MASS SURVEILLANCE. HERE’S WHAT MATTERS INSTEAD.” At The Intercept on CONGRESS IS IRRELEVANT ON MASS SURVEILLANCE. HERE’S WHAT MATTERS INSTEAD. Accessed 6/29/15 at https://firstlook.org/theintercept/2014/11/19/irrelevance-u-s-congressstopping-nsas-mass-surveillance/ So let Saxby Chambliss and Susan Collins and Marco Rubio scream into their insular void about ISIS and 9/11 and terrorism. Let Barack Obama, Dianne Feinstein and Nancy Pelosi deceitfully march under a “reform” banner as they do everything possible to protect the NSA from any real limits. Let the NSA and other national security officials sit smugly in the knowledge that none of the political branches in D.C. can meaningfully limit them even if they wanted to (which they don’t). The changes from the Snowden disclosures are found far from the Kabuki theater of the D.C. political class, and they are unquestionably significant. That does not mean the battle is inevitably won: The U.S. remains the most powerful government on earth, has all sorts of ways to continue to induce the complicity of big Silicon Valley firms, and is not going to cede dominion over the internet easily. But the battle is underway and the forces of reform are formidable— not because of anything the U.S. congress is doing, but despite it. Links to Neg Args Terrorism DA Links NSLs are needed to prevent terror attacks Stimson and Grossman in 2008 (Charles D. Stimson is Senior Legal Fellow, and Andrew M. Grossman is Senior Legal Policy Analyst, in the Center for Legal and Judicial Studies at The Heritage Foundation “National Security Letters: Three Important Facts” The Heritage Foundation, March 14, 2008 http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) Congress authorized the FBI to use NSLs in counterterrorism and counterintelligence investigations. Both OIG reports related to the FBI's use of NSLs unequivocally state that NSLs are an indispensable tool in national security investigations. Law enforcement officials, working closely with the intelligence community, need the tools contained within those authorized NSLs to keep Americans safe and to prevent future terrorist attacks. As the latest OIG report highlights, FBI Director Robert Mueller has made it a top priority to reduce the accidental misuse of NSLs, and the Department of Justice has made significant progress in doing so since the issuance of the 2007 OIG report. Although the report notes the significant progress the Department has made in the past 12 months, it is too early to tell how effective the new systems and controls will be in achieving the ultimate goal of eliminating all inadvertent misuses of NSLs. Every aspect of NSL’s help in counterterror and counterintelligence operations Stimson and Grossman in 2008 (Charles D. Stimson is Senior Legal Fellow, and Andrew M. Grossman is Senior Legal Policy Analyst, in the Center for Legal and Judicial Studies at The Heritage Foundation “National Security Letters: Three Important Facts” The Heritage Foundation, March 14, 2008 http://www.heritage.org/research/reports/2008/03/national-security-letters-three-important-facts) As noted in each of the two OIG reports, NSLs have proven to be invaluable tools in counterterrorism and counterintelligence investigations. According to the FBI, the principal uses of NSLs are to: Establish evidence to support FISA applications for electronic surveillance, physical searches, or pen register/trap and trace orders; Assess communication or financial links between investigative subjects or others; Collect information sufficient to fully develop national security investigations; Generate leads for other field divisions, Joint Terrorism Task Forces, and other federal agencies or to pass to foreign governments; Develop analytical products for distribution within the FBI; Develop information that is provided to law enforcement authorities for use in criminal proceedings; Collect information sufficient to eliminate concerns about investigative subjects and thereby close national security investigations; and Corroborate information derived from other investigative techniques. [12] Information obtained from each type of NSL has allowed investigators to crack cases, especially in the realms of counterterrorism and counterintelligence. A brief examination of the success stories outlined in the OIG reports under each type of NSL proves the point. The following examples, excerpted from the OIG report, show how counterterrorism and counterintelligence investigations are supported through the lawful use of NSLs: The NSLs have helped the FBI combat terrorism Sinnar in 2013 (Shirin Sinnar; Assistant Professor of Law at Stanford Law School, “Protecting Rights from Within? Inspectors General and National Security Oversight”, LexisNexis.com, 65 Stan. L. Rev. 1027, 2013; The Board of Trustees of Leland Stanford Junior University, 49 pgs., Database, 6/28/15, http://www.lexisnexis.com.proxy.library.umkc.edu/hottopics/lnacademic/) Despite these trenchant critiques, the IG investigations supported the FBI's position in several respects. Most importantly, the IG concluded that the information obtained from NSLs had "contributed significantly" to terrorism investigations n108 and that the Patriot Act's changes to the law, according to agency [*1046] officials, made NSLs more useful. n109 The IG also concluded that in most cases where the FBI had violated the law, it could have legally obtained the same information. n110 Secrecy is necessary to fight the war on terror Marsden ‘15(Rachel Marsden, Rachel Marsden is a columnist, political strategist and former Fox News host, February 2, 2015 “Rachel Marsden: Intelligence Agencies must be able to fight terrorism in secret” http://www.chicagotribune.com/news/columnists/sns-201502031330--tms--amvoicesctnavb20150203-20150203-column.html) PARIS -- Does anyone else miss the days when intelligence agencies were permitted to operate covertly and it was considered totally acceptable that they do so? It seems to be increasingly the case that Western countries are perceived as less than democratic if their traditionally covert operations aren't fully transparent to the public. It's one thing for wrongdoing to be exposed and debated, but the bar for what constitutes "wrongdoing" by intelligence agencies has been lowered so drastically that it has become prohibitive. It's being publicly defined by the loudest whiners who believe in transparency at all costs. Whether or not critics realize it, transparency makes intelligence work ineffective. They're called "secret services" for a reason. Yet anyone who argues in favor of keeping them "secret" these days is considered a statist or an enemy of freedom instead of someone who realizes their inherent value in a democracy. Pursuant to last October's terrorist attack on Canadian Parliament, Prime Minister Stephen Harper has introduced new legislation that would, among other things, authorize the Canadian Security Intelligence Service to remove suspected terrorists from flights or interfere with their banking transactions. The new legislation would also increase the sharing of national security information across federal agencies. In response, top-secret-intelligence leaker turned Russian resident Edward Snowden told Toronto students via video this week that Canada is setting up a "new secret police." Snowden could stand to learn a thing or two from his Russian hosts and their world-class counterterrorism operatives, who managed to quietly kill Islamic terrorist leader Doku Umarov of the North Caucasus after he took credit for orchestrating pre-Olympic civilian bombings. Snowden was joined by journalist Glenn Greenwald, who pointed out how rare terrorist attacks are in Canada. And why might that be? Perhaps it's because of the good work of the intelligence services. How is the lack of terrorism in Canada a valid argument against the secret services being dedicated to stopping it? Would critics prefer that the intelligence services stand down in the face of "new secret police" labeling? Would citizens prefer to find out just how effective intelligence agencies have been by seeing whether there's an increase in terrorism after the agencies have been handcuffed? If there are any cases of "secret police" action, no doubt the Snowdens and Greenwalds will be there to tell us about it. But why preemptively predict malfeasance or attribute malice? Transparency is the nemesis of operational security -- even for the enemy. Perhaps the only good thing about Islamic State terrorists trying to set up a caliphate is that it moves what has largely been an ideological ghost-war against terrorism without geographic boundaries back into the realm of a definable battlefield. Likewise, the Islamic State propaganda and recruitment machine that operates over social media allows for the group's methods and tactics to be readily viewed, researched and assessed so that their vulnerabilities can be exploited. There are two fronts on which terrorism has to be defeated: Enemy combatants must be stopped on foreign soil, and domestic sleeper cells must be wiped out. In both cases, operational secrecy is the key to eradication. The Washington Post recently ran a story detailing a successful secret counterterrorism operation in which the CIA and Israel's Mossad cooperated in the assassination of Hezbollah commander Imad Mughniyah with a car bomb in Damascus, Syria, in 2008. Mughniyah was believed to have helped plot terrorist operations against the U.S. and Israel dating back to the 1980s, including the bombings of the U.S. Marines barracks and the U.S. Embassy in Beirut, Lebanon, in 1983, and the hijacking of TWA Flight 847 in 1985. More recently, Mughniyah had been deemed a threat to U.S. troops operating in Iraq. So Mughniyah was quietly snuffed out. The operation was a total success -- right up until it was splayed out in the Washington Post because someone apparently couldn't keep the details a secret. The only difference between that operation and targeted drone strikes is that drones carry out the same sort of assassinations even more publicly -- and we're worse off as a result. A lack of discretion in counterterrorism matters, whether it's highly visible drone kills or the ridiculous idea of trying enemy combatants captured on a foreign battlefield in Western courts of law, means that you're soliciting a counterproductive reaction and attention to your modus operandi. So let the secret services do their job -- in secret. The opportunity to point fingers at a legitimate screw-up will always exist. Circumvention Links Exigent Letters The FBI was found during a Report to be circumventing requirements and in some instances issuing searches without first issuing NSLs Doyle in 2015 (Charles Doyle, Senior Specialist in American Public Law, Published January 22, 2015; National Security Letters proposals in the 113th congress Page: 6; http://www.fas.org/sgp/crs/intel/R43322.pdf) The Fair Credit Reporting Act NSL statutes, 15 U.S.C. 1681u (FCRAu) and 1681v (FCRAv) can be even more illuminating: “The supervisor of a counterterrorism squad told us that the FCRA NSLs enable the FBI to see ‘how their investigative subjects conduct their day-to-day activities, how they get their money, and whether they are engaged in white collar crime that could be relevant to their investigations.’” Overall, the report notes that the FBI used the information gleaned from NSLs for a variety of purposes, “to determine if further investigation is warranted; to generate leads for other field offices, Joint Terrorism Task Forces, or other federal agencies; and to corroborate information developed from other investigative techniques.” Moreover, information supplied in response to NSLs provides the grist of FBI analytical intelligence reports and various FBI databases. The report was somewhat critical, however, of the FBI’s initial performance: [W]e found that the FBI used NSLs in violation of applicable NSL statutes, Attorney General Guidelines, and internal FBI policies. In addition, we found that the FBI circumvented the requirements of the ECPA NSL statute when it issued at least 739 “exigent letters” to obtain telephone toll billing records and subscriber information from three telephone companies without first issuing NSLs. Moreover, in a few other instances, the FBI sought or obtained telephone toll billing records in the absence of a national security investigation, when it sought and obtained consumer full credit reports in a counterintelligence investigation, and when it sought and obtained financial records and telephone toll billing records without first issuing NSLs. The FBI Circumvents NSL’s by using exigent letters guts solvency Doyle in 2015 (Charles Doyle, Senior Specialist in American Public Law, Published January 22, 2015; National Security Letters proposals in the 113th congress Page: 8-9; http://www.fas.org/sgp/crs/intel/R43322.pdf) The third IG Report examined the FBI’s use of exigent letters and other informal means of acquiring communication service providers’ customer records rather than relying on NSL authority during the period from 2003 to 2007. The IG’s Office discovered that “the FBI’s use of exigent letters became so casual, routine, and unsupervised that employees of all three communications service providers sometimes generated exigent letters for FBI personnel to sign and return to them.” Some of the informality was apparently the product of proximity. In order to facilitate cooperation, communications providers had assigned employees to FBI offices. In addition to a relaxed exigent letter process, the on-site feature gave rise to a practice of sneak peeks, that is, of providing the FBI with “a preview of the available information for a targeted phone number, without documentation of any justification for the request.” “In fact, at times the service providers’ employees simply invited FBI personnel to view the telephone records on their computer screens. One senior FBI counterterrorism official described the culture of casual requests for telephone records by observing, ‘It [was] like having the ATM in your living room.’” Not surprisingly, the IG’s review found widespread use by the FBI of exigent letters and other informal requests for telephone records. These other requests were made ... without first providing legal process or even exigent letters. The FBI also obtained telephone records through improper ‘sneak peeks,’ community of interest █████, and hot-number ████ Many of these practices violated FBI guidelines, Department policy, and the ECPA statute. In addition, we found that t he FBI also made inaccurate statements to the FISA Court related to its use of exigent letters. Although critical of the FBI’s initial response and recommending further steps to prevent reoccurrence, the IG’s Report concluded that “the FBI took appropriate action to stop the use of exigent letters and to address the problems created by their use.” The FBI uses exigent letters in replacement of NSL’s and they also circumvent ECPA IG in 2010 (U.S Department of Justice, Office of the Inspector General; A Review of the Federal Bureau of Investigations Use of Exigent Letters and Other Informal Requests for Telephone Records, Page 2; Published January 2010; https://oig.justice.gov/special/s1001r.pdf) In our first NSL report, we described how the FBI issued at least 739 so--called "exigent letters" between March 11, 2003, and December 16, 2005. These letters were signed by personnel in the FBI Counterterrorism Division's (CTD) Communications Exploitation Section (CXS) who were not authorized to sign NSLs, including two Assistant Section Chiefs, Unit Chiefs assigned to the CXS's Communications Analysis Unit (CAU), Supervisory Special Agents (SSA), Intelligence and an Intelligence Operations Specialist. We determined that the 739 exigent letters requested information relating to approximately 3,000 telephone numbers. The overwhelming majority of the letters requested production of telephone records, allegedly "due to exigent circumstances," and also stated that subpoenas requesting the information had been submitted to a U.S. Attorney's Office for processing and would be served formally as expeditiously as possible. We concluded that by using exigent letters to acquire information from three communications service providers prior to serving NSLs or other legal process, the FBI circumvented the requirements of the Electronic Communications Privacy Act (ECPA) NSL statute and violated the Attorney General's Guidelines for FBI National Security Investigations and Foreign Intelligence Collection (NSI Guidelines), and internal FBI policy. We also found that there were factual misstatements in the letters. While almost all exigent letters stated that subpoenas requesting the information had been submitted to a U.S. Attorney's Office and would be served on the providers, in fact subpoenas were not issued in many instances and in other instances had not been requested. Moreover, we developed information that exigent letters sometimes were used in non-exigent circumstances. We also found that the FBI was unable to later establish that some of the exigent letter requests were made in connection with the required open preliminary or full investigations conducted pursuant to the Attorney General's NSI Guidelines or that the records requested were relevant to those investigations. 215 Orders/Subpoena Subjecting NSLs to judicial approval would lead to abandonment in favor of 215 orders and subpoenas Sanchez in 2014 (Julian a senior fellow at Cato; “Can We Do without National Security Letters?”, published Thursday, January 9, 2014 at 8:15 AM Date Accessed 6/29/15; http://justsecurity.org/5351/national-security-letters/) One of the more radical recommendations included in the report from President Obama’s Surveillance Review Group is the proposal to require judicial approval for National Security Letters, which can be used to compel the production (under gag) of an array of financial and communications records, and at present can be issued on the say-so of the Special Agent in Charge of any of the FBI’s 56 field offices. Though this recommendation has attracted relatively little public comment, it is unsurprising to read in a recent article in the Los Angeles Times that it “has sparked the most push-back from national security officials.” Though the review group does proposal amounts to the de facto elimination of NSLs, whose distinctive feature is precisely the absence of any advance judicial approval. Without that feature—especially following a 2008 OLC memo limiting their applicability to electronic communications transactional records—they would be a conspicuously inferior form of 215 order, requiring the same process, but applicable only to a more limited domain of records. Deprived of that key selling point, agents would almost certainly abandon NSLs in favor of 215 orders and conventional grand jury subpoenas. not frame it in these terms, their Congress will continuously find ways to get around the law – Section 215 proves Vladeck June ’15 (Stephen Vladeck june, June 1, 2015. Foreign Policy, “Forget the Patriot Act – Here Are the Privacy Violations You Should Be Worried About” http://foreignpolicy.com/2015/06/01/section215-patriot-act-expires-surveillance-continues-fisa-court-metadata/) Forget the Patriot Act – Here Are the Privacy Violations You Should Be Worried About The ongoing debate over U.S. surveillance programs seemingly came to a head last night, when the Senate failed to extend controversial Section 215 of the USA Patriot Act, which expired at midnight. As we learned from Edward Snowden two years ago, Section 215 was the provision that the government secretly claimed provided authority for the bulk collection of Americans’ phone records — their telephone “metadata.” And although the government’s less-than-obvious interpretation of that statute was accepted by judges sitting on the largely secret Foreign Intelligence Surveillance Act (FISA) Court, it has since been repudiated by two different federal courts, one on the grounds that Congress had not in fact approved such a program and one on the grounds that, even if it had, such warrantless, suspicionless surveillance violates the Fourth Amendment to the U.S. Constitution. For those reasons, and a host of others, the debate over what Congress should do with Section 215 as its sunset approached grew only more heated ahead of the deadline, provoking bitter disputes over the legal wisdom and practical necessity of the phone records program. Some privacy and civil liberties groups, joined by libertarian politicians such as Sen. Rand Paul (R-Ky.), supported outright expiration of the provision, arguing that the phone records program was both unnecessary and unconstitutional. At the other end of the spectrum, hardline conservatives, led by Senate Majority Leader Mitch McConnell (R-Ky.), backed a straight “reauthorization,” which would allow the program to continue for as much as two additional years before further reconsideration. The Obama administration, along with a number of more moderate members of Congress, took more of a middle road, calling for the fairly modest reforms provided by the USA Freedom Act, which would replace the phone records program with a somewhat less open-ended (and somewhat better regulated) series of authorities for the government to obtain and review similar data — and which the House of Representatives overwhelmingly passed on May 13. But whatever the merits of the competing sides in this debate, the larger problem is that this conversation has missed the forest for a very small — and largely irrelevant — tree. In fact, from the perspective of individual privacy rights, the phone records program is much less problematic than the government’s other authorities to conduct mass surveillance under Executive Order 12333 and the 2008 FISA Amendments Act. And so, in focusing on how to “fix” Section 215, we’ve given short shrift to the far more significant problems raised by these other authorities — and, just as importantly, the broader lessons we should be taking away from the surveillance reform conversation that Snowden started. To understand the significance of these other authorities, it’ll help to describe their aims: Executive Order 12333, issued in 1981, is directed at the overseas interception of communications — both metadata and content — of non-citizens outside the United States, who, under a 1990 Supreme Court decision, categorically lack Fourth Amendment rights. The 2008 FISA Amendments Act was enacted to close a loophole that new technology had helped to create, where non-citizens outside the United States were nevertheless communicating through servers or other telecommunications infrastructure located stateside, which the government could not surveil under the executive order. Ordinarily, the government needs a warrant before collecting the content of domestic communications, one based upon a judge’s determination that there’s good reason to believe a particular individual either is engaged in the commission of a crime or is an agent of a foreign power. But Executive Order 12333 and the 2008 FISA statute, by focusing on individuals who fall outside the Fourth Amendment, capitalize on the lack of constitutionally required individualized assessments and instead allow the government to engage in bulk collection of such information — as if it were using an industrial vacuum cleaner to pick up individual particles of dirt. It’s easy to see how these authorities could cause diplomatic headaches (as, for example, with the contretemps surrounding U.S. surveillance of German Chancellor Angela Merkel’s cell phone). But most commentators have assumed that, at least legally, the validity of these programs turns on their overseas focus. After all, if the government is only targeting the communications of non-citizens outside the United States, what could possibly be the constitutional objection? The answer, we now know, has everything to do with technology. Although the government is only allowed to “target” non-citizens outside the United States, it is inevitable, given how it collects information under both of these regimes, that the communications of U.S. citizens and non-citizens lawfully present in the United States will also be collected, albeit “incidentally,” as the government puts it. After all, when thousands of unrelated emails and other electronic communications are bundled together in a packet that travels through an Internet switch that’s physically located in the United States (for the 2008 statute) or overseas (for Executive Order 12333), it’s simply not possible for the government to only collect the communications between non-U.S. citizens and leave the others untouched, any more so than it’s possible for a vacuum to segregate particles of dirt. To be sure, the U.S. government doesn’t dispute that it routinely collects the communications of U.S. citizens. Instead, it has argued that any potential for abuse is mitigated by so-called “minimization requirements” — procedural rules that require the relevant intelligence agency to take steps to avoid the improper retention and use of communications collected under these authorities. The government’s defense, as we’ve come to learn, is flawed in two vital respects: First, as several since-disclosed opinions from the FISA Court have made clear, the government’s minimization requirements under the 2008 statute were often too skimpy, allowing the retention and use of information that both the statute and the Fourth Amendment prohibit. Second — and perhaps more importantly — even where the minimization rules were legally sufficient, there have been numerous instances in which government officials violated them, with the FISA Court only discovering the abuses after they were voluntarily reported by Justice Department lawyers. As a result, the government collected and retained a large volume of communications by U.S. citizens that neither Congress nor the Constitution allowed it to acquire. More alarmingly, with regard to collection under Executive Order 12333, there isn’t any similar judicial review (or meaningful congressional oversight), which means that it has entirely been up to the government to police itself. As State Department whistleblower John Napier Tye explained last summer, there is every reason to doubt that such internal accountability has provided a sufficient check. In his words, “Executive Order 12333 contains nothing to prevent the NSA from collecting and storing all … communications … provided that such collection occurs outside the United States in the course of a lawful foreign intelligence investigation.” To put the matter bluntly, whereas the Section 215 debate has addressed whether the government can collect our phone records, Executive Order 12333 and the 2008 FISA Amendments Act allow the government to collect a lot of what we’re actually saying, whether on the phone, in our emails, or even to our search engines. There is no question that, from a privacy perspective, these programs are far more pernicious than what’s been pegged to Section 215.There is no question that, from a privacy perspective, these programs are far more pernicious than what’s been pegged to Section 215. There is also no question that such collection raises even graver constitutional questions than the phone records program. Whereas there is an open debate over our expectation of privacy in the metadata we voluntarily provide to our phone companies, there’s no doubt that we have an expectation of privacy in the content of our private communications. Why, then, has all the fuss been around Section 215 and the phone records program, while the far more troubling surveillance authorities provided by Executive Order 12333 and the 2008 FISA Amendments Act have flown under the radar? Part of it may be because of the complexities described above. After all, it’s easy for people on the street to understand what it means when the government is collecting our phone records; it’s not nearly as obvious why we should be bothered by violations of minimization requirements. Part of it may also have to do with the government’s perceived intent. Maybe it seems more troubling when the government is intentionally collecting our phone records, as opposed to “incidentally” (albeit knowingly) collecting the contents of our communications. And technology may play a role, too; how many senders of emails know where the server is located on which the message is ultimately stored? If we don’t realize how easily our communications might get bundled with those of non-citizens outside the United States, we might not be worried about surveillance targeted at them. But whatever the reason for our myopic focus on Section 215, it has not only obscured the larger privacy concerns raised by these other authorities, but also the deeper lessons we should have taken away from Snowden’s revelations. However much we might tolerate, or even embrace, the need for secret government surveillance programs, it is all-but-inevitable that those programs will be stretched to — and beyond — their legal limits. That’s why it’s important not only to place substantive limits upon the government’s surveillance authorities, but also to ensure that they are subject to meaningful external oversight and accountability as well. And that’s why the denouement of Section 215 debate has been so disappointing. This should have been a conversation not just about the full range of government surveillance powers, including Executive Order 12333 and the 2008 FISA Amendments Act, but also about the role of the FISA Court and of congressional oversight in supervising those authorities. Instead, it devolved into an over-heated debate over an over-emphasized program. Congress has tended to a paper cut, while it ignored the internal bleeding. Not only does the expiration of Section 215 have no effect on the substance of other surveillance authorities, it also has no effect on their oversight and accountability. Reaching some degree of closure with regard to the phone records program may leave many with the impression that America has concluded a meaningful and productive national debate over surveillance reform. We haven’t. And although the 2008 FISA Amendments Act is also set to expire — on December 31, 2017 — the debate over Section 215 leaves little reason to believe that we’ll have it then, either. The FBI will circumvent policies and has many methods of domestic surveillance Lendman in 2015 (Stephen, a writer for sleuth journal Published June 10 2015 Accessed 6/29/15; “Unconstitutional Mass FBI Aerial Surveillance”; http://www.thesleuthjournal.com/unconstitutional-mass-fbiaerial-surveillance/) Free and open societies don’t spy on their citizens. They don’t invent phony threats as justification. America is a belligerent nation waging endless wars of aggression against invented enemies. Fear-mongering is rife. It’s done to rape, ravage and destroy one country after another. It’s a tactic used to scare people to believe they’re safer by sacrificing fundamental freedoms. Mass surveillance is a defining rogue state characteristic. Post-9/11, government-usurped authority turned America into a police state. Big Brother watches everyone. Tuesday Senate passage of the USA Freedom Act (the renamed Patriot Act) changed little. Government intrusion into the private lives of its citizens remains largely unchanged. The only good news is that USAF slightly rolled back its intrusiveness instead of giving spy agencies more powers. History shows restrictions imposed are easily circumvented or ignored. A separate article discusses systematic FBI misuse of Patriot Act authority. Bureau secrecy and cover-up make it impossible to know the full extent of its lawlessness. It operates ad libitum with minimum oversight and accountability. One On June 2, AP reported “(s)cores of low-flying planes circling American cities…” “They’re “part of a civilian air force operated by the FBI and obscured behind fictitious companies…” It’s not secret. It’s been reported before. In July 2013, the agency admitted using drones for domestic surveillance numerous times without court authorized warrants or other forms of oversight. At the time, deputy director Stephen D. Kelly said “(t)he FBI uses UAVs in very limited circumstances to conduct surveillance when there is a specific operational need.” “Since late 2006, the FBI has conducted surveillance using UAVs in eight criminal cases and two national security cases.” Former FBI director Robert Meuller admitted spying on US citizens with no “operational guidelines.” Warrantless spying by any example is its mass surveillance of US citizens by drones and other aircraft. means threatens everyone. No probable cause is needed. No restraints are imposed. Constitutional protections are circumvented. Once a program is established, it takes on a life of its own. In AP identified at least 50 FBI aircraft conducting more than 100 flights over urban and rural areas in 11 states. It cited a 2009 budget document indicating 115 planes, including 90 Cessna aircraft. FBI aerial spying is longstanding. Today, drones and other aircraft are equipped with high-tech cameras for close-up visual surveillance as well as technology able to monitor thousands of cell phones – a blatant breach of privacy. According to Senate the last decade, FBI aerial spying expanded to “civilian air force” level. In April alone, Judiciary Committee chairman Charles Grassley (R. IA): “It’s important that federal law enforcement personnel have the tools they need to find and catch criminals.” “But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.” No safeguards whatever exist – nor does Congress back up high-minded rhetoric with effective policies protecting the public from abusive government practices. Rogue agencies like the FBI, NSA, CIA, DEA and Homeland Security operate by their own rules – easily circumventing weak and ineffective restraints on their authority. Congressional inaction effectively rubber-stamps them. It permits unaccountable police state practices no free society would tolerate. AP learned the FBI uses at least 13 fake companies to conceal its activities – including FVX Research, KQM Aviation, NBR Aviation and PXW Services. ACLU policy analyst Jay Stanley called its flights significant if they’re “maintaining a fleet of aircraft whose purpose is to circle over American cities, especially with” today’s sophisticated surveillance technology. Details the FBI confirmed concur with published reports since at least 2003 about suspicious-looking planes overflying US cities being government ones. The Drug Enforcement Agency (DEA) and US Marshals Service have their own aerial surveillance programs using sophisticated technology, much like the FBI’s. Basic information about these programs are secret. Heavily redacted Justice Department Inspector General documents alone inadequately explain what the public has a right to know. They’re spied on – by the FBI, NSA, CIA, DEA, Homeland Security and other rogue government agencies, especially post-9/11. Spies “R” us defines US policy. America is a total surveillance society unfit to live in. Big Brother watches everyone intrusively – in blatant breach of fundamental constitutional protections. Fabricated national security threats justify the unjustifiable. The so-called “war on terror” is phony. The war OF terror by Washington on its citizens is real. Unconstitutional spying today in America is pervasive. It’s institutionalized. Privacy rights no longer matter. Fundamental freedoms are being trampled. They’re disappearing in plain sight.