Terrorism Disadvantage Negative 1NC Shell Uniqueness: Expiration of NSA authority is a massive signal of weakness --- terrorist groups are looking to exploit any vulnerability Daily Mail 15, 5/31/2015. “Head of CIA warns that US is at risk of lone wolf terror attack after NSA powers to monitor all phone calls expired – as Isis ‘watch carefully’ for security gaps,” http://www.dailymail.co.uk/news/article-3105089/Senate-makes-ditch-bid-extend-NSA-sbulk-collection-phone-records-Rand-Paul-swears-block-legislation-let-Patriot-Act-expire.html. the CIA has warned that Americans are now at risk after the Senate was unable to extend laws giving authorities special powers to fight terrorists. Politicians in the upper house were unable to come to an agreement to extend key The head of parts of the Patriot Act - that legalize controversial methods of surveillance by the National Security Agency (NSA) - which expired on Sunday. Attempts were frustrated by Presidential candidate Rand Paul, who has taken a firm stance against the extension of powers allowing the mass collection of phone records, wire taps and warrants without evidence. But the Head of the CIA John Brennan claims ordinary Americans, who expect the NSA to do their jobs, have been put at risk by 'political grandstanding and crusading for ideological causes' that fueled the debate. Speaking on CBS show Face The Nation, he warned that the US is now in danger from technologically 'sophisticated' terrorists who are watching developments carefully and 'looking for the seams to operate' within. He claimed that the authorities do not abuse the powers, extended in 2011 to help fight lone wolf terror suspects not connected to a specific group, and that without them, it's difficult for the NSA to protect America. Mr Brennan said: 'I think terrorist elements have watched very carefully what has happened here in the United States, whether or not it's disclosures of classified information or whether it's changes in the law and policies. They are looking for the seams to operate within. 'And this is something that we can't afford to do right now, because if you look at the horrific terrorist attacks and violence that is being perpetrated around the globe, we need to keep our country safe. And our oceans are not keeping us safe the way they did a century ago.' The and Europe - Patriot Act was passed in 2001 in the wake of the 9/11 terror attacks. Now that the provisions have expired, government agents will need to subpoena phone companies for the records. The White House previously justified collecting the records because of the Patriot Act's Section 215, which expired on Sunday. Two other provisions, added in 2011, also expired with it. The first is a 'roving wiretap' provision which allows government agencies to keep tracking suspects as they switch devices. The second is a 'lone wolf' clause which allows warrants to be granted without any evidence linking a suspect to a foreign power or terrorist group. Political struggles over the NSA and its data collection have become a national issue since whistleblower Edward Snowden revealed the extent of government programs in 2013. The senate's efforts to pass a replacement bill were frustrated by Kentucky's junior senator Rand Paul, who has spoken at length against the NSA's activities, which he has excoriated as illegal and unconstitutional. Paul, a Republican who is running for president, came up against members of his own party, as well as the Obama administration. With his presidential campaign waning, he has been accused of irresponsible political opportunism by opponents, by fighting a bill on ideological grounds that may put ordinary people at risk. He was criticized by the White House Sunday night, which called the Patriot Act expiration an 'irresponsible lapse'. While Brennan didn't mention Paul by name, he said on Face The Nation: 'Unfortunately I think there is a little too much political grandstanding and crusading for ideological causes that have really fuelled the debate on this issue. He added: 'These are authorities that have been used by the government to make sure that we're able to safeguard Americans. And the sad irony is that most Americans expect the government to protect them. And so although there's a lot of debate that goes on, on the Congress and the Hill on this issue, I think, when you go out to Boise or Tampa or Louisville, Americans are expecting their law enforcement and homeland security and intelligence professionals to do their work. And these authorities are important.' Paul argued 'there must be another way' but even he agrees that the lapse in these powers are likely to be temporary as politicians work on the USA Freedom Act, which is expected to pass within the next week. Republican Senate Majority Leader Mitch McConnell called a rare Sunday session to try to pass the replacement law, but was unable to push it through in time. And although the replacement is set to pass this week, Paul said the expiration was 'a victory no matter how you look at it'. In a statement, he said: 'It might be short lived, but I hope that it provides a road for a robust debate, which will strengthen our intelligence community, while also respecting our Constitution. He added: 'The expiration of the NSA's sweeping, all-encompassing and ineffectual powers will not relinquish functions necessary for protecting national security. The expiration will instead do what we should have done all along - rely on the Constitution for these powers.' According to a top lawmaker, as of 8pm Sunday no NSA employee could access their enormous phone records database, which holds metadata on millions of phone conversations handed over by telecoms companies like Verizon and AT&T. Senate Intelligence Committee chairman Richard Burr said on Sunday: 'There is no way to get any type of agreement tonight -- either an extension or passage of a bill. So at 8pm tonight, NSA employees can not query the database'. In a statement issued Sunday night, Obama's press secretary Josh Earnest, urged action to pass the USA Freedom Act as quickly as possible. He said: 'The Senate took an important - if late - step forward tonight. We call on the Senate to ensure this irresponsible lapse in authorities is as short-lived as possible. 'On a matter as critical as our national security, individual Senators must put aside their partisan motivations and act swiftly. The American people deserve nothing less.' Some lawmakers have said the lapse raises alarming questions about how US authorities can keep the homeland safe with a diminished security toolbox. 'I think it's very very unfortunate that we're in this position,' said Senator Mike Lee, a conservative Republican who supports the reform bill. 'We've known this date was coming for four years. Four years. And I think it's inexcusable that we With the clock ticking, CIA chief John Brennan warned Sunday that allowing vital surveillance programs to lapse could increase terror threats, and argued that the phone metadata dragnet has not abused civil liberties and only serves to safeguard citizens. 'This is adjourned' for a weeklong break last week without resolving the issue. Lee, too, conceded that the reform bill would most likely pass in the coming week. something that we can't afford to do right now,' Brennan said of allowing the counterterrorism provisions to expire. 'Because if you look at the horrific terrorist attacks and violence being perpetrated around the globe, we need to keep our country safe, and our oceans are not keeping us safe the way they did century ago,' he said on CBS talk show Face the Nation. Brennan added that online threats from groups like Isis would continue to grow over the next five to ten years. He said: 'Isis has been very sophisticated and adept at using the Internet to propagate its message and reach out to individuals. We see what is happening as far as thousands upon thousands of individuals, including many thousands from the West, that have traveled into Syria and Iraq. And a number of these individuals are traveling back. 'And what we see, they're also using the Internet as a way to incite and encourage individuals to carry out acts of violence.'So as the director of FBI says, you know, this use of these websites and their Internet capabilities is something of great concern. So yes, I think ISIS is a threat not just in the Middle East and South Asia and African regions but also to Europe as well as to the United States.' Link: Warrantless mass surveillance is critical to prevent terrorism --- casting a wide net and being able to act quickly is critical to identify networks Yoo 15 John Yoo, 5/8/2015. Emanuel Heller professor of law at the University of California at Berkeley and a Visiting Scholar at the American Enterprise Institute, former official in the Office of Legal Counsel in the U.S. Department of Justice. “Will Congress reject the dangerous NSA ruling by reauthorizing the Patriot Act?” American Enterprise Institute, https://www.aei.org/publication/will-congress-rejecttodays-dangerous-nsa-ruling-by-reauthorizing-the-patriot-act/. Finally, the Court displays a deep misunderstanding of the challenges of counterterrorism policy, which Congress understands far better. As Judge Richard Posner has recognized, an intelligence search “is a search for the needle in a haystack. ” Rather than pursue suspects who have already committed a crime and whose identity is already known, intelligence agencies must search for clues among millions of potentially innocent connections, communications, and links. “The intelligence services,” Posner writes, “must cast a wide net with a fine mesh to catch the clues that may enable the next attack to be prevented.” Our government can detect terrorists by examining phone and e-mail communications, as well as evidence of joint travel, shared assets, common histories or families, meetings, and so on. If our intelligence agents locate a lead, they must quickly follow its many possible links to identify cells and the broader network of terrorists. A database of call data would allow a fast search for possible links in the most important place — the United States, where terrorists can inflict the most damage. Most of the calling records may well be innocent (just as most of the financial records of a suspected white-collar criminal may also be innocent), but the more complete the database, the better our intelligence agencies can pursue a lead into the U.S. And, more transparency causes an increased risk in terror. Grassley 13 (SENATOR CHARLES GRASSLEY (R-IA), July 31, 2013, Hearing of the Senate Judiciary Committee Subject: "Strengthening Privacy Rights and National Security: Oversight of FISA (Foreign Intelligence Surveillance Act) Surveillance Programs" https://www.hsdl.org/?view&did=741931) Finally, increased transparency is a worthy goal in general. And as I suggested before, whenever we can talk about these programs, I think there's less questions out there in the minds of people, and we probably created some public relations problems for us and for this program and for our national security community because maybe we I say that understanding that we can't tell our enemies what we -- what tools we use. But if we consider any reform that may bring more transparency to the FISA process, we should keep in mind, then, that every piece of information we make available to the public will be read by a determined adversary, and that adversary has already demonstrated the capacity to kill thousands of Americans, even on our own soil. haven't made enough information available. Impact: A terrorist attack escalates to a global nuclear exchange Speice 06 – 06 JD Candidate @ College of William and Mary [Patrick F. Speice, Jr., “NEGLIGENCE AND NUCLEAR NONPROLIFERATION: ELIMINATING THE CURRENT LIABILITY BARRIER TO BILATERAL U.S.-RUSSIAN NONPROLIFERATION ASSISTANCE PROGRAMS,” William & Mary Law Review, February 2006, 47 Wm and Mary L. Rev. 1427 Accordingly, there is a significant and ever-present risk that terrorists could acquire a nuclear device or fissile material from Russia as a result of the confluence of Russian economic decline and the end of stringent Soviet-era nuclear security measures. 39 Terrorist groups could acquire a nuclear weapon by a number of methods, including "steal[ing] one intact from the stockpile of a country possessing such weapons, or ... [being] sold or given one by [1438] such a country, or [buying or stealing] one from another subnational group that had obtained it in one of these ways." 40 Equally threatening, however, is the risk that terrorists will steal or purchase fissile material and construct a nuclear device on their own. Very little material is necessary to construct a highly destructive nuclear weapon. 41 Although nuclear devices are extraordinarily complex, the technical barriers to constructing a workable weapon are not significant. 42 Moreover, the sheer number of methods that could be used to deliver a nuclear device into the United States makes it incredibly likely that terrorists could successfully employ a nuclear weapon once it was built. 43 Accordingly, supply-side controls that are aimed at preventing terrorists from acquiring nuclear material in the first place are the most effective means of countering the risk of nuclear terrorism. 44 Moreover, the end of the Cold War eliminated the rationale for maintaining a large military-industrial complex in Russia, and the nuclear cities were closed. 45 This resulted in at least 35,000 nuclear scientists becoming unemployed in an economy that was collapsing. 46 Although the economy has stabilized somewhat, there [1439] are still at least 20,000 former scientists who are unemployed or underpaid and who are too young to retire, 47 raising the chilling prospect that these scientists will be tempted to sell their nuclear knowledge, or steal nuclear material to sell, to states or terrorist organizations with nuclear ambitions. 48 The potential consequences of the unchecked spread of nuclear knowledge and material to terrorist groups that seek to cause mass destruction in the United States are truly horrifying. A terrorist attack with a nuclear weapon would be devastating in terms of immediate human and economic losses. 49 Moreover, there would be immense political pressure in the United States to discover the perpetrators and retaliate with nuclear weapons, massively increasing the number of casualties and potentially triggering a full-scale nuclear conflict. 50 In addition to the threat posed by terrorists, leakage of nuclear knowledge and material from Russia will reduce the barriers that states with nuclear ambitions face and may trigger widespread proliferation of nuclear weapons. 51 This proliferation will increase the risk of nuclear attacks against the United States [1440] or its allies by hostile states, 52 as well as increase the likelihood that regional conflicts will draw in the United States and escalate to the use of nuclear weapons. And, The 2010 Nuclear Posture Review gives the U.S. the right to retaliate with nuclear weapons. There would be extreme pressure to do so in the wake of a terrorist attack. ISIS 10 (Institute for Science and International Security, “What the Nuclear Posture Review means for proliferation and nuclear ‘outliers,’” http://isis-online.org/isis-reports/detail/what-the-nuclear-posture-review-means-for-proliferation-and-nuclear-outlier, *bolded text preserved from article) the NPR makes clear that the United States reserves the right to “hold fully accountable” any state or group “that supports or enables terrorist efforts to obtain or use weapons of mass destruction, whether by facilitating, financing, or providing expertise or safe haven for such efforts.” (p. 12) The implication is that the United States reserves the right to retaliate with nuclear weapons against a state whose nuclear explosive material is used in an attack, whether by a state or terrorist group. While the NPR makes clear that the At the same time, United States would only consider the use of such weapons under “extreme” circumstances, it is important to be aware that in the event of a terror attack, the use of nuclear weapons is not explicitly proscribed. This leaves a potentially dangerous opening for the use of a nuclear weapon when demands for retaliation will be especially acute and intelligence and forensic information vulnerable to misinterpretation. Uniqueness Extensions Offensive cyber operations are limited now, but mobility is key to prevent national security threats Fisher 2013 (Max, Washington Post Staff, 2013, "Leaked documents hint at Obama’s emerging cyberwar doctrine", http://www.washingtonpost.com/blogs/worldviews/wp/2013/06/07/leakeddocuments-hint-at-obamas-emerging-cyberwar-doctrine/) President Obama has tasked senior national security and intelligence officials with preparing a list of potential overseas targets for U.S. cyber attacks, the Guardian reports, the latest in a series of stories sourced to leaked documents. The story offers a rare glimpse into the Obama administration’s cyber offensive planning and the contours of when it is and isn’t willing to use those capabilities. The leaked government documents portray the Obama administration as willing to hack foreign targets to preempt perceived threats against U.S. interests. Attacks in foreign countries without that country’s consent are permissible, they say, when “U.S. national interests and equities” are at stake or as “anticipatory action taken against imminent threats.” According to the Guardian, the documents reference offensive cyber capabilities by the U.S. military and state “several times that cyber operations are to be used only in conjunction with other national tools and within the confines of law.” And it’s worth noting that preparing a potential target list is not the same thing as planning to strike those targets; for many years, the Pentagon maintained worst-case-scenario plans for invading Canada. The Obama administration, based on these documents, seems to see offensive cyber attacks as most appropriate when used to preempt a possible incoming attack. In this sense, their cyber doctrine bears a striking resemblance to Obama’s case for the use of drone strikes, which he articulated in a recent speech. Drones, he argues, are justified on the one hand by the need to remove impending national security threats and, on the other, by the fact that all other options would be much costlier. Of course, as with drone strikes, preemptive cyber attacks risk collateral damage and mistakenly targeting someone who was not actually a threat. The document does not appear to reference any planned or recent attacks. But the most famous U.S. cyber attack is of course Stuxnet, the virus developed and deployed in conjunction with Israel to set back Iran’s nuclear program. The virus was a remarkable success, sending Iranian centrifuges spinning out of control, before it began spreading across the Internet by mistake, ultimately outing the program. Stuxnet appears consistent with the contours of a cyber doctrine hinted at in these documents. It was meant to preempt an impending national security threat – Iran’s nuclear program – worked in secret and was certainly offensive. It was part of a larger effort that included diplomacy, sanctions and the threat of physical strikes. It’s also worth noting what Stuxnet was not: a revenge attack meant to punish Iran. The virus was meant to work in secret; ideally, the Iranians were not even to know it had been deployed. Similarly, the Obama administration has insisted that it deploys drone strikes only against people who pose an ongoing threat to the U.S. rather than as “revenge” strikes. (Many critics of the drone program doubt this.) This apparent cyber doctrine of quiet, drone-like preemption differs widely from another cyber strategy that many observers have believed the U.S. would or should take: deterrence. In this thinking, the U.S. would counter the growing threat of foreign hackers by, essentially, scaring them away from even trying. This would mean developing offensive cyber capabilities that could be used to hit back at hackers who attempt to breach U.S. systems and then making sure that foreign hackers understand they’re putting themselves at risk by even trying. In this way, offensive cyber capabilities would be kind of like nuclear weapons, which exist primarily to deter adversaries from using their weapons first. After all, preemptive cyber attacks might be able to slow Iranian centrifuges but they’re much less suited to, say, shutting down Chinese military hackers. Nor are simple cyber defenses up to that task; because foreign hackers risk little in trying to tap into sensitive U.S. servers; merely building more protections is only going to extend the time it takes them to finally succeed. This is why many U.S. companies already want to develop “hacking back” capabilities, something that is forbidden under U.S. law. Surveillance is necessary to prevent a terror attack. Yoo 14 John Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, p. 929-30 The real problem with FISA, and even the Patriot Act, as they existed before the 2008 Amendments, is that they remained rooted in a law enforcement approach to electronic surveillance. They tied the government's counterterrorism efforts to individualized suspicion. Searches and wiretaps had to target a specific individual already believed to be involved in harmful activity. But detecting al Qaeda members who have no previous criminal record in the United States, and who are undeterred by the possibility of criminal sanctions, requires To prevent attacks successfully, the government has to devote surveillance resources where there is a reasonable chance that terrorists will appear or communicate, even if their specific identities remain unknown. What if the government knew that there was a fifty percent chance that terrorists would use a certain the use of more sweeping methods. communications pipeline, such as e-mail provided by a popular Pakistani ISP, but that most of the communications on that channel would not be linked to terrorism? An approach based on individualized suspicion would prevent computers from searching through that channel for the keywords or names that might suggest terrorist communications because there are no specific al Qaeda suspects and thus no probable cause . Searching for terrorists depends on playing the probabilities rather than individualized suspicion, just as roadblocks or airport screenings do. The private owner of any website has detailed access to information about the individuals who visit the site that he can exploit for his own commercial purposes, such as selling lists of names to spammers or gathering market data on individuals or groups. Is the government's effort to find violent terrorists a less legitimate use of such data? Individualized suspicion dictates the focus of law enforcement, but war demands that our armed forces defend the country with a broader perspective. Armies do not meet a "probable cause" requirement when they attack a position, fire on enemy troops, or intercept enemy communications. The purpose of the criminal justice system is to hold a specific person responsible for a discrete crime that has already happened. But focusing on individualized suspicion does not make sense when the purpose of intelligence is to take action, such as killing or capturing members of an enemy group, to prevent future harm to the nation from a foreign threat. FISA should be regarded as a safe harbor that allows the fruits of an authorized search to be used for prosecution. Using FISA sacrifices speed and breadth of information in favor of individualized suspicion, but it provides a path for using evidence in a civilian criminal prosecution. If the President chooses to rely on his constitutional authority alone to conduct warrantless searches, then he should generally use the information only for military purposes. The primary objective of the NSA program is to "detect and prevent" possible al Qaeda attacks on the United States, whether another attack like September 11; a bomb in apartment buildings, bridges, or transportation hubs such as airports; or a nuclear, biological, or chemical attack. These are not hypotheticals; they are all al Qaeda plots, some of which U.S. intelligence and law enforcement agencies have already stopped. A President will want to use information gathered by the NSA to deploy military, intelligence, and law enforcement personnel to stop the next attack. The price to pay for speed, however, is foregoing any future criminal prosecution. If the President wants to use the NSA to engage in warrantless searches, he cannot use its fruits in an ordinary criminal prosecution. Al Qaeda has launched a variety of efforts to attack the United States, and it intends to continue them. The primary way to stop those attacks is to find and stop al Qaeda operatives, and the best way to find them is to intercept their electronic communications. Properly understood, the Constitution does not subject the government to unreasonable burdens in carrying out its highest duty of protecting the nation from attack. NSA still has sufficient surveillance authority after the PATRIOT Act expiration. Salon 15, 6/1/2015. Marcy Wheeler. “Reports of the Patriot Act’s death are greatly exaggerated,” http://www.salon.com/2015/06/01/reports_of_the_patriot_acts_death_are_greatly_exaggerated/. The PATRIOT Act-authorized phone dragnet expired last night. For the first time since 2006, the NSA won’t receive records of the phone calls you make within the United States. But that doesn’t mean spying on Americans has stopped. The NSA still obtains records of calls — potentially all calls — you make with people overseas. It still tracks Americans’ Internet communications using metadata obtained overseas. The FBI can still access the content of any communications Americans have with foreigners targeted under PRISM without a warrant or even any evidence of wrong doing. FBI can still, and indeed does, obtain phone records of individuals in conjunction with national security investigations without any court review. Not even the spying conducted under Section 215 — the authority that had been used to collect all of Americans’ phone records, but which is also used to collect certain kinds of Internet data — or the two other expiring provisions will stop. Because they’re tied to more focused investigations (though the Internet collection is probably not targeted at one individual), they will probably continue under a grandfather clause allowing ongoing investigations using those authorities to continue. 'Terror threats are growing --- NSA surveillance is vital. Bolton 15 John R. Bolton, 4/28/2015. Formerly served as the U.S. permanent representative to the United Nations, and under secretary of state for arms control and international security. At AEI, Ambassador Bolton’s area of research is U.S. foreign and national security policy. “NSA activities key to terrorism fight,” American Enterprise Institute, https://www.aei.org/publication/nsa-activities-key-to-terrorism-fight/. Congress is poised to decide whether to re-authorize programs run by the National Security Agency that assess patterns of domestic and international telephone calls and emails to uncover linkages with known terrorists. These NSA activities, initiated after al-Qaeda’s deadly 9/11 attacks, have played a vital role in protecting America and our citizens around the world from the still-metastasizing terrorist threat. The NSA programs do not involve listening to or reading conversations, but rather seek to detect communications networks. If patterns are found, and more detailed investigation seems warranted, then NSA or other federal authorities, consistent with the Fourth Amendment’s prohibition against unreasonable searches and seizures, must obtain judicial approval for more specific investigations. Indeed, even the collection of the so-called metadata is surrounded by procedural protections to prevent spying on U.S. citizens. Nonetheless, critics from the right and left have attacked the NSA for infringing on the legitimate expectations of privacy Americans enjoy under our Constitution. Unfortunately, many of these critics have absolutely no idea what they are talking about; they are engaging in classic McCarthyite tactics, hoping to score political points with a public justifiably worried about the abuses of power characteristic of the Obama administration. Other critics, following Vietnam-era antipathies to America’s intelligence community, have never reconciled themselves to the need for robust clandestine capabilities. Still others yearn for simpler times, embodying Secretary of State Henry Stimson’s famous comment that “gentlemen don’t read each others’ mail.” The ill-informed nature of the debate has facilitated scare-mongering, with one wild accusation about NSA’s activities after another being launched before the mundane reality catches up. And there is an important asymmetry at work here as well. The critics can say whatever their imaginations conjure up, but NSA and its defenders are significantly limited in how they can respond. By definition, the programs’ success rests on the secrecy fundamental to all intelligence activities. Frequently, therefore, explaining what is not happening could well reveal information about NSA’s methods and capabilities that terrorists and others, in turn, could use to stymie future detection efforts. After six years of President Obama, however, trust in government is in short supply. It is more than a little ironic that Obama finds himself defending the NSA (albeit with obvious hesitancy and discomfort), since his approach to foreign and defense issues has consistently reflected near-total indifference, except when he has no alternative to confronting challenges to our security. Yet if harsh international realities can penetrate even Obama’s White House, that alone is evidence of the seriousness of the threats America faces. In fact, just in the year since Congress last considered the NSA programs, the global terrorist threat has dramatically increased. ISIS is carving out an entirely new state from what used to be Syria and Iraq, which no longer exist within the borders created from the former Ottoman Empire after World War I. In already-chaotic Libya, ISIS has grown rapidly, eclipsing al-Qaeda there and across the region as the largest terrorist threat. Boko Haram is expanding beyond Nigeria, declaring its own caliphate, even while pledging allegiance to ISIS. Yemen has descended into chaos, following Libya’s pattern, and Iran has expanded support for the terrorist Houthi coalition. Afghanistan is likely to fall back under Taliban control if, as Obama continually reaffirms, he withdraws all American troops before the end of 2016. This is not the time to cripple our intelligence-gathering capabilities against the rising terrorist threat. Congress should unquestionably reauthorize the NSA programs, but only for three years. That would take us into a new presidency, hopefully one that inspires more confidence, where a calmer, more sensible debate can take place. US surveillance is increasing to deal with new terrorist threats Bennett 15 (Brian Bennett, washington based reporter for the LA Times, "White House Steps Up Warning About Terrorism on US Soil" May 18th, 2015 http://www.latimes.com/nation/la-na-terror-threat-20150518-story.html#page=1) Alarmed about the growing threat from Islamic State, the Obama administration has dramatically stepped up warnings of potential terrorist attacks on American soil after several years of relative calm.¶ Behind the scenes, U.S. authorities have raised defenses at U.S. military bases, put local police forces on alert and increased surveillance at the nation's airports, railroads, shopping malls, energy plants and other potential targets.¶ Driving the unease are FBI arrests of at least 30 Americans on terrorism-related charges this year in an array of "lone wolf" plots, none successful, but nearly all purportedly inspired by Islamic State propaganda or appeals.¶ The group's leader, Abu Bakr Baghdadi, drove home the danger in a 34-minute audio recording released online Thursday. He urged Muslims everywhere to "migrate to the Islamic State or fight in his land, wherever that may be."¶ It is pretty easy for [Islamic State] to reach out to a very large number of people using a very robust social media presence. I suspect we should see more plots going forward.¶ - J.M. Berger, a nonresident fellow at the Brookings Institution¶ The audio was released with translations in English, French, German, Russian and Turkish, signaling the militants' increasingly ambitious attempts to draw new recruits — and to spark violence — around the world.¶ U.S. officials estimate the Sunni Muslim group has drawn 22,000 foreign fighters to Syria and Iraq, including about 3,700 from Western nations. About 180 Americans have gone, or tried to go.¶ U.S. counter-terrorism officials initially viewed Islamic State as primarily a regional security threat, focused on expanding and protecting its self-proclaimed Islamist caliphate in Syria and Iraq, rather than launching attacks abroad.¶ But the analysis has shifted sharply as gunmen inspired by the group, but not controlled or assisted by them, opened fire at the Parliament in Ottawa; at a cafe in Sydney, Australia; at a kosher grocery in Paris; and, on May 3, in Garland, Texas.¶ In the Texas case, two would-be terrorists apparently prompted by Islamic State social media messages tried to shoot their way into a provocative contest for caricatures of the prophet Muhammad. Both gunmen were shot to death, and no one else was killed. Islamic State later claimed responsibility for the assault, the first time it has done so for an attack on U.S. soil. ¶ James B. Comey, the FBI director, warned this month that "hundreds, maybe thousands" of Americans are seeing recruitment pitches from Islamic State on Facebook, Twitter and other social media, as well as messages sent to smartphones of "disturbed people" who could be pushed to attack U.S. targets.¶ "It's like the devil sitting on their shoulders saying, 'Kill, kill, kill,'" Comey told reporters.¶ The United States has entered a "new phase, in my view, in the global terrorist threat," Jeh Johnson, director of Homeland Security, said Friday on MSNBC.¶ "We have to be concerned about the independent actor, and the independent actor who is here in the homeland who may strike with little or no warning," he said. "The nature of the global terrorist threat has evolved."¶ That poses a special challenge for U.S. intelligence and law enforcement agencies, which spent years desperately trying to penetrate and understand Al Qaeda's rigid hierarchy and top-down approach to terrorism.¶ Now they are struggling to detect and prevent lethal attacks by individuals — such as the April 2013 bombing of the Boston Marathon by two Russian-born brothers — with little or no outside communication or support.¶ The administration has sought to stiffen homeland defenses, and intelligence gathering, in response An attack on the US is likely, surveillance intelligence key. Collins 15 (Eliza Collins, wirter for Politico, "Mike McCaul Warns of Growing Us Terrorist Threat" May 10 th, 2015 http://www.politico.com/story/2015/05/mike-mccaul-warns-of-growing-us-terrorist-threat-117787.html) More people are being recruited by terrorist groups than the FBI estimates, the chairman of the House Homeland Security Committee said on Sunday.¶ FBI Director James Comey said last week that hundreds, maybe thousands of people, are being recruited on encrypted websites that the FBI can’t penetrate to carry out attacks in the U.S.¶ “We have this phenomenon in the United States where they can be activated by the Internet. Really, terrorism has gone viral,” Rep. Mike McCaul (R-Texas) said on “Fox News Sunday.”¶ The Texas shooting was a textbook case of law enforcement intercepting a threat, McCaul said, but homegrown terrorism is nonetheless difficult to stop.¶ Late last week, the U.S. raised the threat level at all U.S. military bases.¶ “This threat is like finding a needle in the haystack sometimes - and it’s going to get worse, not better,” McCaul warned. Recruiting levels are high and the likelihood of a homegrown attack is huge VOA New 15 (Homeland Security Chief: Global Terror Threat Has Entered 'New Phase'" May 11 2015 th http://www.voanews.com/content/us-security-chief-warns-of-new-phase-in-terrorist-threat/2762237.html) Appearing on the Fox News Sunday broadcast from Paris, Congressman Michael McCaul, chairman of the House Homeland Security Committee, said there has been an uptick in threat streams against local police and military bases.¶ "We're seeing these on an almost daily basis. It's very concerning. I'm over here with the French counter-terrorism experts on the Charlie Hebdo case, how we can stop foreign fighters coming out of Iraq and Syria to Europe. But then, we have this phenomenon in the United States where they (terrorists) can be activated by the Internet. And, really, terrorism has gone viral," said McCaul.¶ McCaul said the potential terror threat may even be greater than the FBI has outlined. He said the United States faces two threats: one from fighters coming out of the Middle East and the other from thousands at home who will take up the call to arms when the IS group sends out an Internet message. He warned the threat will only get worse, largely because of the existence of so many failed states in the Middle East and North Africa. The probability of a lone wolf attack is increasing. Zenko 15 (Micah Zenko, Council on Foreign Relations, "Is US Foreign Policy Ignorning Homegrown Terrorists?" May 19 th , 2015 http://www.defenseone.com/threats/2015/05/us-foreign-policy-ignoring-homegrown-terrorists/113197/) On February 12, National Counterterrorism Center Director Nicholas Rasmussen told the Senate Select Committee on Intelligence:¶ “We face a much greater, more frequent, recurring threat from lone offenders and probably loose networks of individuals. Measured in terms of frequency and numbers, it is attacks from those sources that are increasingly the most noteworthy…”¶ On February 26, during the annual worldwide threats hearing, Director of National Intelligence James Clapper warned:¶ “Home-grown violent extremists continue to pose the most likely threat to the homeland.”¶ Last Friday, Secretary of Homeland Security Jeh Johnson stated on MSNBC:¶ “We’re in a new phase…in the global terrorist threat where, because of effective use of social media, the Internet, by ISIL, al-Qaeda, we have to be concerned about the independent actor who is here in the homeland who may strike with little or no warning…”¶ Finally, yesterday, former CIA deputy director Michael Morell described the messaging efforts of jihadist groups generally and the self-declared Islamic State (IS) more specifically:¶ “Their narrative is pretty powerful: The West, the United States, the modern world, is a significant threat to their religion. Their answer to that is to establish a caliphate. And they are being attacked by the U.S. and other Western nations, and by these apostate regimes in the region. Because they are being attacked they need support in two ways; people coming to fight for them, and people coming to stand up and attack coalition nations in their home.”¶ In summary, the most likely— though not most lethal—terror threats to Americans come from individuals living within the United States who are partially motivated to undertake self-directed attacks based upon their perception that the United States and the West are at war with the Muslim world. Terror threats increasing Cordesman 15 Anthony H. Cordesman, 5-22-15, The Defeat in Ramadi: A Time for Transparency, Integrity, and Change, Burke holds the Arleigh A. Burke Chair in Strategy at the Center for Strategic and International Studies (CSIS) in Washington, D.C. http://csis.org/publication/defeat-ramadi-time-transparency-integrity-and-change The State Department background briefing is well worth reading in full, along with the other reports listed above that simply dodge and spin. It makes a sharp and welcome contrast at a time virtually every indicator shows that the number of terrorist movements and attacks is rising on a global basis; and that we are involved in “failed state wars” in Afghanistan, Iraq, Syria, and Yemen that we are not winning and where our current efforts seem too weak, and uncoordinated with our allies and partners to be effective. Surveillance key to check the increasing terror threat. Carafano 15 James Carafano, May 21, 2015, Section 215 of the PATRIOT Act and Metadata Collection: Responsible Options for the Way Forward, Dr. Carafono is Vice President for the Kathryn and Shelby Cullom Davis Institute for National Security and Foreign Policy, and the E. W. Richardson Fellow, Charles Stimson is Manager, National Security Law Program and Senior Legal Fellow, Dr. Steven Bucci is Director, Douglas and Sarah Allison Center for Foreign and National Security Policy, John Malcolm is Director, Edwin Meese III Center for Legal and Judicial Studies, and the Ed Gilbertson and Sherry Lindberg Gilbertson Senior Legal Fellow, http://www.heritage.org/research/reports/2015/05/section215-of-the-patriot-act-and-metadata-collection-responsible-options-for-the-way-forward Any debate about America’s counterterrorism capabilities must be conducted in the context of the actual terrorist threat the U.S. faces. Since 9/11, The Heritage Foundation has tracked Islamist terrorist plots and attacks, which now, after the recent shooting in Garland, Texas, total 68.[1] This figure, however, does not consider foiled plots of which the public is unaware.Recently, there has been a dramatic uptick in terrorism: The shooting in Garland is the sixth Islamist terrorist plot or attack in the past five months. Add to that number the surge of Americans seeking to support or join ISIS and al-Qaeda affiliates, and one fact becomes clear: The U.S. is facing the most concentrated period of terrorist activity in the homeland since 9/11. Of course, it is no coincidence that this spike in terrorism parallels the spread of the Islamic State and other radical groups across Syria, Iraq, and other parts of the Middle East. More than 150 American passport holders have traveled to Syria, or attempted to travel there, to join the fighting, along with more than 20,000 fighters from more than 90 countries.[2] Many of these individuals with American passports are believed to have joined ISIS or the Nusra Front, an affiliate of al-Qaeda in Syria. Both the Nusra Front and ISIS espouse an anti-Western Islamist ideology that calls for terrorist attacks against the United States. For example, in July 2012, the leader of ISIS, self-proclaimed caliph Abu Bakr Baghdadi, threatened to launch attacks against the U.S. homeland. Baghdadi warned Americans, “You will soon witness how attacks will resound in the heart of your land, because our war with you has now started.”[3] Toward this end, al-Qaeda formed a unit of veteran terrorists to recruit some of the Western foreign fighters in Syria and train them to conduct terrorist attacks in their home countries. This unit, dubbed the Khorasan group by U.S. officials, is embedded in the Nusra Front and is particularly interested in recruiting fighters who hold American passports. These terrorist organizations have undertaken a significant effort to reach out to individuals across the world in order to radicalize and recruit them. In recent testimony before the Senate Appropriations Committee, FBI Director James Comey stated that: The threats posed by foreign fighters, including those recruited from the U.S., traveling to join the Islamic State of Iraq and the Levant (ISIL) and from homegrown violent extremists are extremely dynamic. These threats remain the biggest priorities and challenges for the FBI, the U.S. Intelligence Community, and our foreign, state, and local partners. ISIL is relentless and ruthless in its pursuits to terrorize individuals in Syria and Iraq, including Westerners. We are concerned about the possibility of individuals in the U.S. being radicalized and recruited via the Internet and social media to join ISIL in Syria and Iraq and then return to the U.S. to commit terrorist acts. ISIL’s widespread reach through the Internet and social media is most concerning as the group has proven dangerously competent at employing such tools for its nefarious strategy.[5] In the past several weeks, FBI Director Comey has increased the intensity of his warnings, stating that “hundreds, maybe thousands” of individuals across the U.S. are being contacted by ISIS to attack the U.S. homeland.[6] Secretary of Homeland Security Jeh Johnson has echoed these warnings, saying that lone-wolf terrorists inspired by ISIS could strike at any moment.”[7] The 2015 Worldwide Threat Assessment of the U.S. Intelligence Community states that: Attacks by lone actors are among the most difficult to warn about because they offer few or no signatures. If ISIL were to substantially increase the priority it places on attacking the West rather than fighting to maintain and expand territorial control, then the group’s access to radicalized Westerners who have fought in Syria and Iraq would provide a pool of operatives who potentially have access to the United States and other Western countries. On the same note, the Director of the National Counterterrorism Center also stated in his testimony to the Senate Select Committee on Intelligence this February that there has been a recent “uptick in terror attacks in the West.” This increase in attacks “underscores the threat of emboldened Homegrown Violent Extremists and, how the rapid succession of these attacks may motivate some to attempt to replicate these tactics with little-to-no warning.” These statements and assessments, together with the explicit and public statements of intent by multiple terrorist groups and the recent surge in terrorist plots and attacks against the U.S. homeland, demonstrate that the threat of terrorism is on the rise. Fortunately, the U.S. has improved its ability to foil these attacks, largely due to intelligence capabilities that include but are not limited to the bulk telephone metadata program under Section 215 of the PATRIOT Act. Threat of terror attacks increasing McCain 15 Senator Mccain, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armedservices.senate.gov/hearings/15-02-26-worldwide-threats On the terrorism front, ISIL continues to dominate much of Syria and Iraq while spreading its dark and vicious ideology in its effort to become the dominant Islamic extremist group in the world. At the same time, the risk of attacks by foreign fighters returning from the battlefield or loan-wolf threats inspired by ISIL's successes only increases the danger to the West, in Yemen, Afghanistan, Pakistan and Africa. Al Qaeda and its affiliated groups continue to take advantage of ungoverned spaces to plan attacks against the United States and Western interests. Number of terror attacks increasing Clapper 15 General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats Moving onto terrorism, in 2013, just over 11,500 terrorist attacks worldwide killed approximately 22,000 people. Preliminary data for the first nine months of 2014 reflects nearly 13,000 attacks, which killed 31,000 people. When the final counting is done, 2014 will have been the most lethal year for global terrorism in the 45 years such data has been compiled. Terror threat increasing Clapper 15 General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats I'm drawing this data -- ISIL conducting more attacks than any other terrorist group in the first nine months of 2014. And credit where credit's due, I'm drawing this data from the National Consortium of the Study of Terrorism and Responses to Terrorism, or START, at the University of Maryland. The recent terrorist attacks in Europe emphasized the threat posed by small numbers of extremists radicalized by the conflicts in Syria and Iraq. The global media attention and widespread support in extremist circles for these attacks probably will inspire additional extremists to conduct similar attacks. In ISIL, Al Qaida and Al Qaida in the Arabian Peninsula and most recently, Al Shabaab are calling on their supporters to conduct loan- wolf attacks against the United States and other Western countries. Of the 13 attacks in the West since last May, 12 were conducted by individual extremists. Since the conflict began, more than 20,000 Sunni foreign fighters have travelled to Syria from more than 90 countries to fight the Assad regime. Of that number, at least 13,600 have extremist ties. More than 3,400 Western fighters have go to Syria and Iraq. Hundreds have returned home to Europe. About 180 Americans or so have been involved in various stages of travel to Syria. I should point out, this is those who've attempted to go, didn't get there, those who got there and were killed, those who got there who fought and went to another country and -- and some number have come back. A relatively small number have returned, and we've not identified any of them engaged in attack plotting Nevertheless, the home-grown violent extremists continue to pose the most likely threat to the homeland. Loan actors or (inaudible) groups who act autonomously will -- will likely gravitate to simpler plots that don't require advanced skills, outside training or communication with others. A small but persistent number of Sunni terrorist remain intent on striking the U.S. and the West, some of whom still see commercial aviation as -- as an appealing target. Cyber attacks increasing Clapper 15 General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats Again this year, I'll start with some cyber threats. Attacks against us are increasing in frequency, scale, sophistication, and severity of impact. Although we must be prepared for a catastrophic large scale strike, a so called -- cyber Armageddon, the reality is that we've been living with a constant and expanding barrage of cyber attacks for some time. This insidious trends, I believe, will continue. Cyber poses a very complex set of threats, because profitmotivated criminals, ideologically-motivated hackers or extremists, and variously capable nation states like Russia, China, North Korea, and Iran are all potential adversaries who, if they choose, can do great harm.CLAPPER: Additionally, the methods of attacks, the systems targeted and the victims are also expanding in diversity and intensity on a daily basis. 2014 saw, for the first time, destructive cyber attacks carried out on U.S. soil by nation-state entities, marked first by the Iranian attack against the Las Vegas Sands Casino Corporation a year ago this month and the North Korean attack against Sony in November. While both of these nations have lesser technical capabilities in comparison to Russia and China, these destructive attacks demonstrate that Iran and North Korea are motivated and unpredictable cyber actors. Russia and China continue to develop very sophisticated cyber programs. While I can't go into detail, the Russian cyber threat is more severe than we have previously assessed, and Chinese economic espionage against U.S. companies remains a major threat, despite detailed private-sector reports, scathing public indictments and stern U.S. (inaudible). With respect to non-nationstate entities, some ideologically motivated cyber actors expressing support for ISIL have demonstrated their capabilities by hacking several social-media accounts. The so- called cyber caliphate successfully hacked CENTCOM's Twitter account and YouTube page in January and two weeks ago hacked Newsweek Magazine's Twitter handle. The most pervasive cyber threat to the U.S. financial sector is from cyber criminals. Criminals were responsible for cyber intrusions in 2014 in the JPMorgan, Home Depot, Target, Neiman Marcus, Anthem and other U.S. companies. And in the future, we'll probably see cyber operations that change or manipulate electronic information to compromise its integrity instead of simply deleting or disrupting access to it ISIL’s influence is increasing in the Middle East. Clapper 15 General Clapper, Director of National Intelligence, February 26, 2015, Full Committee Hearing on “Worldwide Threats”, http://www.armed-services.senate.gov/hearings/15-02-26-worldwide-threats Moving into the Mid East, ISIL is increasing its influence outside of Iraq and Syria, seeking to expand its selfdeclared caliphate into the Arabian Peninsula, North Africa and South Asia and planning terrorist attacks against Western and Shia interests. ISIL's rise represents the greatest shift in the Sunni violent extremist landscape since Al Qaida affiliates first began forming, and it is the first to assume at least some characteristics of a nation state. Spillover from the Syrian conflict is raising the prospect of instability in Lebanon, Jordan and Saudi Arabia. In Iraq, sectarian conflict in mixed Shia-Sunni areas is growing and if not blunted, will undermine progress against ISIL. Although Prime Abadi has begun to alter the etho-sectarian tone in Iraq, resistance from his Shia political allies and persistent distrust among Iraqi leaders will limit progress toward a stable, inclusive political environment. ISIL's ability to conduct large-scale offensive operations in Iraq has been degraded by coalition airstrikes, the provision of weapons and munitions by the U.S. and other allies, and stiffened defenses by the Iraqi security forces, Kurdish Peshmerga, Shia militants and tribal allies, not to mention the Iranians. However, ISIL remains, as we've seen, a formidable and brutal threat. Risk of major terror attack high now Budowsky 2014 (Brent Budowsky 8/22/14, LL.M. degree in international financial law from the London School of Economics, former aide to former Sen. Lloyd Bentsen and Bill Alexander, then chief deputy majority whip of the House, “ISIS poses nuclear 9/11 threat”, 2014, http://www.opednews.com/articles/ISIS-poses-nuclear-9-11-th-by-Brent-Budowsky-ISI_Military_Nuclear_insanity_Threat-To-World-Peace140822-911.html) After the latest grotesque atrocity by the Islamic State in Iraq and Syria (ISIS), the beheading of an American journalist, American and European policymakers must clearly understand the near certainty that unless it is defeated and destroyed, ISIS will launch a major terror attack on American or European soil. Analysts estimate that ISIS has amassed a cash hoard of between $400 million and $2 billion. It is highly probable that ISIS will attempt to use some of this money to obtain nuclear, chemical, biological or other weapons of mass death on the international black market or from corrupt officials in nations such as Russia, China, Pakistan or North Korea to use in attacks against New York, Washington, London, Paris, Berlin, Rome, Brussels or other nations it considers infidel enemies. This danger is magnified by the fact that ISIS has recruited nationals of the United States and Europe, who possess American and European passports and are physically indistinguishable from local populations in America and Europe. It is extraordinary that the mass murdering butchery of ISIS is so demented than even al Qaeda is offended. It is alarming that the CIA, which launched intelligence operations even against the United States Senate, and the NSA, which launched massive and unprecedented eavesdropping operations, and intelligence services of leading European nations were blind to the magnitude of the ISIS threat until the most barbaric terrorists in modern history had taken over almost a third of Iraq and are on the brink of creating a terrorist super-state that dwarfs al Qaeda's efforts prior to 9/11. I vehemently opposed the misguided Iraq War from the moment it was proposed by former President George W. Bush and have never been a neoconservative, warmonger or super-hawk. But aggressive action against ISIS is urgently needed. ISIS has stated its intention to attack the United States and Europe to advance its evil, messianic and genocidal ideology and ambitions. ISIS has the money to purchase the most deadly weapons in the world, and has recruited American and European traitors with above-average capability to execute an attack. The odds that ISIS can obtain nuclear, chemical, biological or other forms of mass destruction weapons are impossible to ascertain but in a world of vast illegal arms trafficking, with so many corrupt officials in nations possessing arsenals of destruction, the danger is real. The fact that WMD scares prior to the Iraq War ranged from mistaken to deceitful does not mean that the WMD danger does not exist today. It does. I applaud the recent actions taken by President Obama. Obama's airstrikes saved tens of thousands of Yazidis from genocide, took back the Mosul Dam from ISIS and saved countless Iraqis, Kurds and Syrians from slaughter. The airstrikes inflicted material damage to ISIS. The diplomacy of Obama and Secretary of State John Kerry contributed mightily to the replacement of a disastrous Iraqi government by a government can unite Iraqi Sunnis, Shiites and Kurds. The Obama-Kerry initiatives will lead to the creation of a stable Afghan government and avoid the collapse that was possible after the recent controversial Afghan elections. These are real successes. In the current political climate, Obama seems to get credit for nothing, but he deserves great credit for some important successes in recent weeks. And yet the danger of ISIS pulling off a nuclear, chemical, biological or other mass death 9/11style attack in a major American or European city is real. Even with dirty or primitive WMD weapons, the casualty totals could be catastrophic. ISIS must be defeated and destroyed. This will not be achieved with "boots on the ground" proxies from Iraqi or Kurd forces alone, though Kurdish forces should immediately receive strong military assistance. America should not initiate another massive Iraq ground war. What is needed is a multinational special ops strike force made up of 10,000 troops from NATO nations and possibly Arab League nations. Link Extensions Empirics prove limitless offensive cyber operations key to deter threats – the plan destroys this necessity by placing limits on crucial deterrence capabilities. Baker 2012(Stewart, first Assistant Secretary for Policy at the United States Department of Homeland Security under the Presidency of George W. Bush, October 19, "Law and Cyberwar-The Lessons of History", http://www.americanbar.org/groups/public_services/law_national_security/patriot_debates2/the_book_online/ch9/ch9_ess1.html) So, why do today’s lawyers think that their limits on cyberwar will fare better than FDR’s limits on air war? It beats me. If anything, they have a much harder task. Roosevelt could count on a shared European horror at the aerial destruction of cities. He used that to extract an explicit and reciprocal understanding from both sides as the war was beginning. We have no such understanding, indeed no such shared horror. Quite the contrary, for some of our potential adversaries, cyber weapons are uniquely asymmetric—a horror for us, another doesn’t take a high-tech infrastructure to maintain an army that is ready in a pinch to live on grass. What’s more, cheating is easy and strategically profitable. American compliance will be enforced by all those lawyers. Our adversaries can ignore the rules and say—hell, they are saying—”We’re not carrying out cyber attacks. We’re victims, too. Maybe you’re the attacker. Or maybe it’s Anonymous. Where’s your proof?” Even if all sides were genuinely committed to limiting cyberwar, as all sides were in 1939, we’ve seen that the logic of airpower eventually drove all sides to the horror they had originally recoiled from. Each side felt that it had observed the limits longer than the other. Each had lawyerly justifications for what it did, and neither understood or gave credence to the other’s justifications. In that climate, all it took was a single error to break the legal limits irreparably. And error was inevitable. Bombs dropped by desperate pilots under fire go astray. But so do cyber weapons. Stuxnet infected thousands of networks as it searched blindly for Natanz. The infections lasted far longer than intended. Should we expect fewer errors from code drafted in the heat of battle and flung at hazard toward the enemy? Of course not. But the lesson for the lawyers and the diplomats is stark: Their effort to impose limits on cyberwar is almost certainly doomed. No one can welcome this conclusion, at least not in the United States. We have advantages in traditional war that we lack in day in the field for them. It cyberwar. We are not used to the idea that launching even small wars on distant continents may cause death and suffering here at home. That is what drives the lawyers. They hope to maintain the old world. But they’re driving down a dead end. If we want to defend against the horrors of cyberwar, we need first to face them, with the candor of a Stanley Baldwin. Then we need to charge our military strategists, not our lawyers, with constructing a cyberwar strategy for the world we live in, not the world we’d like to live in. That strategy needs both an offense and a defense. The offense must be powerful enough to deter every adversary with something to lose in cyberspace, and so it must include a way to identify our attacker with certainty. The defense, too, must be realistic, making successful cyber attacks more difficult and less effective because we have built resilience and redundancy into our infrastructure. Once we have a strategy for winning a cyberwar, we can ask the lawyers for their thoughts. We can’t do it the other way around. Warrantless surveillance necessary to stop Al Qaeda Yoo 14,John Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, p. 903-4 It is al Qaeda's nature as a decentralized network that stresses the normal division between military and intelligence surveillance and the warrant-based approach of the criminal justice system. The Constitution vests the President with the executive power and designates him Commander-in-Chief. The Framers understood these powers to invest the executive with the duty to protect the nation from foreign attack and the right to control the conduct of military hostilities. To exercise those powers the President must have the ability to engage in electronic surveillance that gathers intelligence on the enemy. Regular military intelligence need not follow standards of probable cause for a warrant or reasonableness for a search, just as the use of force against the enemy does not have to comply with the Fourth Amendment. During war, military signals intelligence might throw out a broad net to capture all communications within a certain area or by an enemy nation. effectively, Unlike the criminal justice system, which seeks to detain criminals, protection of national security need not rest on particularized suspicion of a specific individual. Metadata collection needed to be effective Yoo 14 ,John Yoo Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATASURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, p. 907-8 Like business records, phone call metadata falls within Section 215's definition of tangible items. Collection of such metadata relates to an authorized investigation to protect against international terrorism. Several investigations into al Qaeda plots remain open, as shown by the repeated indictments against bomb plotters in the last five years. The examination of records also helps protect the nation against terrorist attacks. According to the NSA, only the information contained in the billing records is collected; the content of calls is not. There can be no First Amendment violation if the content of the calls remains untouched. A critic might argue that the terms of the search are too broad because ninety-nine percent of the calls are unconnected to terrorism. But an intelligence search, as Judge Richard Posner has described it, "is a search for the needle in a haystack." Rather than focus on foreign agents who are already known, counterterrorism agencies must search for clues among millions of potentially innocent connections, communications, and links. "The intelligence services," Posner writes, "must cast a wide net with a fine mesh to catch the clues that may enable the next attack to be prevented." For this reason, the FISC approved the NSA program in 2006 and has continued to renew it since. Surveillance allows the detection of Al Qaeda. Yoo 14, John Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLNCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, p. 908-9 Members of the al Qaeda network can be detected, with good intelligence work or luck, by examining phone and e-mail communications, as well as evidence of joint travel, shared assets, common histories or families, meetings, and so on. As the time for an attack nears, "chatter" on this network will increase as operatives communicate to coordinate plans, move and position assets, and conduct reconnaissance of targets. When our intelligence agents successfully locate or capture an al Qaeda member, they must be able to move quickly to follow new information to other operatives before news of the capture causes them to disappear. The NSA database is particularly important because it will point the way to al Qaeda agents within the United States, where they are closest to their targets and able to inflict the most harm on civilians. The September 11 hijackers themselves provide an example of the way that the NSA could use business record information to locate an al Qaeda cell. Links suggested by commercially available data might have turned up ties between every single one of the al Qaeda plotters and Khalid al Mihdhar and Nawar al Hazmi, the two hijackers known to the CIA to have been in the country in the summer of 2001. Mihdhar and Hazmi had rented apartments in their own names and were listed in the San Diego phone book. Both Mohammad Atta, the leader of the September 11 al Qaeda cell, and Marwan al-Shehi, who piloted one of the planes into the World Trade Center, had lived there with them. Hijacker Majed Moqed used the same frequent flier number as Mihdhar; five hijackers used the same phone number as Atta when booking their flights; the remaining hijackers shared addresses or phone numbers with one of those hijackers, Ahmed Alghamdi, who was in the United States in violation of his visa at the time. Our intelligence agents, in fact, had strong leads that could conceivably have led them to all of the hijackers before 9/11 . CIA agents had identified Mihdhar as a likely al Qaeda operative because he was spotted at a meeting in Kuala Lumpur and mentioned in Middle East intercepts as part of an al Qaeda "cadre." Hazmi too was known as likely to be al Qaeda. But in neither case was there enough evidence for a criminal arrest because they had not violated any American laws. If our intelligence services had been able to track immediately their cell phone calls and e-mail, it is possible that enough of the hijacking team could have been rounded up to avert 9/11. Our task is much more difficult today, because we might not have even this slender information in hand when the next al Qaeda plot moves toward execution. Database needs to be wide to locate terrorist cells Yoo 14, John Yoo, Summer 2014, Emanuel S. Heller Professor of Law, University of California, Berkeley Law School; Visiting Scholar, American Enterprise Institute, Harvard Journal of Law & Public Policy, THE LEGALITY OF THE NATIONAL SECURITY AGENCY'S BULK DATA SURVEILLANCE PROGRAMS, http://moritzlaw.osu.edu/students/groups/is/files/2013/11/Yoo1.pdf, p. 911-12 A critic, however, might argue that billions of innocent calling records are not "relevant" to a terrorism investigation. Even if terrorist communications take place over the phone, that cannot justify the collection of all phone call records in the United States, the vast majority of which have nothing to do with the grounds for the search. The FISC rejected this argument because, to be useful, a database has to be broad enough to find terrorist calls. "Because known and unknown international terrorist operatives are using telephone communications, and because it is necessary to obtain the bulk collection of a telephone company's metadata to determine those connections between known and unknown international terrorist operatives as part of authorized investigations," the Court observed, "the production of the information sought meets the standard for relevance under Section 215." Aggregating calling records into a database, the court found, was necessary to find the terrorist communications and the links between terrorists. It may not even be possible to detect the links unless such a database is created. If a database is not comprehensive, in other words, then the government will only be able to glimpse incomplete patterns of terrorist activity, if it can glimpse any at all. Mass surveillance is critical to find actionable intelligence. Yoo 13 John Yoo, 6/12/2013. Emanuel Heller professor of law at the University of California at Berkeley and a Visiting Scholar at the American Enterprise Institute, former official in the Office of Legal Counsel in the U.S. Department of Justice. “John Yoo: NSA activities shouldn't be aired in public,” http://www.usatoday.com/story/opinion/2013/06/12/nsa-surveillance-john-yoo-editorials-debates/2417377/. But fear should not provoke a rush to harm our war against al-Qaeda. Surveillance of enemy communications not only has a long history in the annals of American arms, but it is also the most effective means for gaining actionable intelligence on terrorists. President Obama has discarded superior tools: He has stopped the interrogation of al-Qaeda leaders, and his leak-loving staff has blown the penetrations of al-Qaeda cells by intelligence agencies. By combining telephone call records (but not the content of calls) and foreigners' e-mails abroad — neither of which is protected by the Fourth Amendment — the NSA can at least create the data necessary to quickly identify and frustrate terrorist plans. Of course, the NSA should not receive a blank check. But it is unnecessary, and even harmful, to air its activities in public. Al-Qaeda closely monitors our government affairs and reacts quickly. In the 1990s, for example, Osama bin Laden stopped using his personal cellphone only 48 hours after the White House leaked that it was tapped. Instead of risking the we should continue to follow the constitutional design. A time-tested system has promoted legislative oversight of classified activities without losing the virtues of speed and secrecy abroad. American intelligence agencies regularly disclose their most sensitive covert operations to congressional leaders, who can exercise their power of the purse to stop bad ideas. The Framers recognized that our elected representatives would need such secrecy to protect the national security, which is why the Constitution allows for closed congressional proceedings. We should allow the system of representative loss of intelligence sources and methods, democracy to decide intelligence policy, rather than sacrifice a critical advantage to satisfy the whims of those who do not understand that we are still a nation at war. NSA surveillance of meta-data is critical --- PATRIOT Act authorities are key. Yoo 2015 John Yoo, 5/15/2015. Emanuel Heller professor of law at the University of California at Berkeley and a Visiting Scholar at the American Enterprise Institute, former official in the Office of Legal Counsel in the U.S. Department of Justice. “The USA Freedom Act Would Take Us Back to the Pre-9/11 Security Status Quo,” National Review, http://www.nationalreview.com/corner/418462/usa-freedom-act-would-take-us-back-pre-911-security-status-quo-john-yoo. I worry that the representatives who voted to pass the USA Freedom Act in the House do not understand its full import in terms of our national security. The bill practically repeals Section 215 of the Patriot Act, but makes it appear as if those who voted for the bill advanced security in some way. The result of the legislation’s enactment, however, would not be significantly different than if Section 215 were simply allowed to expire. Even before the Patriot Act, the government could get a warrant from a judge to get call metadata from a phone company. The Freedom Act requires phone companies to keep the calling records, but of course they do that already in order to bill customers. So the Freedom Act eliminates the advantages of Section 215 and practically restores the system that existed before. It is politically superficial but also substantively destructive. As we saw on 9/11, that previous system failed. The reason why is that it slowed everything down (as would the Freedom Act). If our intelligence agencies have a lead — say they capture a terrorist leader or intercept his calls — they will have to act quickly to see what other phone numbers and e-mail addresses that the leader contacted to discover the broader network. The other terrorists, of course, will be switching to other numbers and addresses as soon as they suspect that one of their number has been compromised. Taking the time to (a) prepare a request for a warrant; (b) get it approved by a judge; and then (c) search through multiple phone company databases, will give the terrorists time to hide and cover their tracks. Speed is of the greatest essence exactly when we are trying to find the links in the U.S., where the terrorists will be closest to their targets and our defenses at their weakest. If this program had been in effect before 9/11, the government could have quickly searched the databases to discover the links between the two hijackers known to the CIA to have entered the U.S. That could have quickly led the government to the rest of the hijackers (just as those calling, e-mail, and financial records allowed the FBI to reconstruct the 9/11 terror cells within a day or so after the attacks). Another problem is that having the database dispersed among the different phone companies means our government cannot be sure that it has searched thoroughly for all of the possible links. The value of these metadata searches is reduced if the database is not as complete as possible. The databases will also be in private hands, where they might easily be open to invasions of privacy and penetration by foreign intelligence services. Intel is key to preventing WMD terrorism --- compromising secrecy risks attacks. Yoo 04 John Yoo, 2004. Professor of Law @ UC-Berkeley, visiting scholar @ the American Enterprise Institute, served as a deputy assistant attorney general in the Office of Legal Council at the U.S. Department of Justice between 2001 and 2003. “War, Responsibility, and the Age of Terrorism,” UC-Berkeley Public Law and Legal Theory Research Paper Series, http://works.bepress.com/cgi/viewcontent.cgi?article=1015&context=johnyoo. the nature of warfare against such unconventional enemies may well be different from the set-piece battlefield matches between nation-states. Gathering intelligence, from both electronic and human sources, about the future plans of terrorist groups may be the only way to prevent September 11-style attacks from occurring again. Covert action by the Central Intelligence Agency or unconventional measures by special forces may prove to be the most effective tool for acting on that intelligence. Similarly, the least dangerous means for preventing rogue nations from acquiring WMD may depend on secret intelligence gathering and covert action, rather than open military intervention. A public revelation of the means of gathering intelligence, or the discussion of the nature of covert actions taken to forestall the threat by terrorist organizations or rogue nations, could render the use of force ineffectual or sources of information useless. Suppose, for example, that American intelligence agencies detected through intercepted phone calls that a terrorist group had built headquarters and training facilities in Yemen. A public discussion in Congress about a resolution to use force against Yemeni territory and how Yemen was identified could tip-off the group, allowing terrorists to disperse and to prevent further interception of their communications Third, Complete elimination of terrorism impossible --- intel key to prevent attacks. Yoo 05 John Yoo, 2005. Professor of Law @ UC-Berkeley, visiting scholar @ the American Enterprise Institute, served as a deputy assistant attorney general in the Office of Legal Council at the U.S. Department of Justice between 2001 and 2003. “Enemy Combatants and Judicial Competence,” in Terrorism, the Laws of War, and the Constitution, ed. Peter Berkowitz, 83-84, http://media.hoover.org/sites/default/files/documents/0817946225_69.pdf. Add to these concerns the important military interest, only made more acute by the unconventional nature of the war with al Qaeda, of interrogating enemy combatants for information about coming attacks. Unlike previous wars, the current enemy is a stateless network of religious extremists who do not obey the laws of war, who hide among peaceful populations, and who seek to launch surprise attacks on civilian targets with the aim of causing massive casualties. They have no armed forces to target, no territory to defend, no people to protect, and no fear of killing themselves in their attacks. The front line is not solely a traditional battlefield, and the primary means of conducting the war includes the efforts of military, law enforcement, and intelligence officers to stop attacks before they occur. Information is the primary weapon in the conflict against this new kind of enemy, and intelligence gathered from captured operatives is perhaps the most effective means of preventing future terrorist attacks upon U.S. territory. Section 702 Links National Intelligence Director James Clapper verifies Section 702 is key to cyber surveillance efforts while under scrutiny. The plan not only wrecks cyber security but also leaves the US terribly vulnerable to threats. AFPS 13 (Department of Defense News: American Forces Press Service. “Clapper: U.S. Surveillance Activities Are Lawful” http://www.defense.gov/news/newsarticle.aspx?id=120244) surveillance activities carried out by the U.S. government under the Foreign Intelligence Surveillance Act are lawful, James R. Clapper, the director of national intelligence, said in a statement issued today.¶ Clapper’s statement reads as follows:¶ Over the last week we have seen reckless disclosures of intelligence community measures used to keep Americans safe. In a rush to publish, media outlets have not given the full context -- including the extent to which these programs are overseen by all three branches of government -- to these effective tools.¶ In particular, the surveillance activities published in The Guardian and The Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress. Their purpose is to obtain foreign intelligence information, including information necessary to thwart terrorist and cyber attacks against the United States and its allies.¶ Our ability to discuss these activities is limited by our need to protect intelligence sources and methods. Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a “playbook” of how to avoid detection. Nonetheless, Section 702 has proven vital to keeping the nation and our allies safe. It continues to be one of our most important tools for the protection of the nation’s security.¶ However, there are significant WASHINGTON, June 8, 2013 – Despite what some media outlets are reporting, misimpressions that have resulted from the recent articles. Not all the inaccuracies can be corrected without further revealing classified information. I have, however, declassified for release the attached details about the recent unauthorized disclosures in the hope that it will help dispel some of the myths and add necessary context to what has been published.¶ James R. Clapper, Director of National Intelligence Section 702 needed to fight terrorism. Washington Post, June 20, 2013, Reprinted in South China Morning Post, US Defends Surveillance Tactics in War on Terrorism, http://www.scmp.com/news/world/article/1264602/us-defends-surveillance-tactics-war-terrorism In November 2008, Abid Naseer, a Pakistani student living in Manchester, England, began to e-mail a Yahoo account ultimately traced to his home country. The young man's e-mails appeared to be about four women - Nadia, Huma, Gulnaz and Fozia - and which one would make a "faithful and loving wife". British investigators later determined that the four names were code for types of explosives. And they ascertained that a final April 2009 e-mail announcing a "marriage to Nadia" between the 15th and the 20th was a signal that a terrorist attack was imminent, according to British court documents. It is unclear exactly how British intelligence linked the Pakistani e-mail address to a senior al-Qaeda operative who communicated in a kind of code to his distant allies. But the intelligence helped stop the plot in England, and the address made its way to the US National Security Agency (NSA). A few months later, the NSA was monitoring the Yahoo user in Pakistan when a peculiar message arrived from a man named Najibullah Zazi, an Afghan American living in Colorado. He asked about "mixing of [flavour and ghee oil] and I do not know the amount, plz right away." Soon after, on September 9, 2009, a second message arrived that echoed the code used in the British plot: "The marriage is ready," Zazi wrote. The e-mails led the NSA to alert the FBI, which obtained a court order to place Zazi under more extensive surveillance. Officials learned that he had visited Pakistan in 2008, the same time as one of the British plotters. In the end, the e-mails and additional surveillance foiled a plot by Zazi and two others to conduct suicide bombings in the New York subway system just days after he sent the "marriage is ready" e-mail. In recent days, US intelligence and law enforcement officials, as well as congressional officials, have pointed to the authority that allowed them to target the Yahoo account Section 702 of the Foreign Intelligence Surveillance Act (FISA) - as a critical tool in identifying and disrupting terrorist plots in the US and abroad. But some critics of NSA surveillance suggested that the collection of data under a programme called Prism was not essential to Zazi's capture because the British first obtained the critical e-mail address. Still, the case study provides a rare glimpse of how the broad surveillance practices of the United States, often in concert with allies, are deployed. " The 702 programme has been enormously useful in a large number of terrorist cases," said a US official who has access to classified records on NSA programmes. "It's beyond dispute that it is highly effective. It operates exactly as anyone paying attention would have expected it to operate based on floor debate and plain reading of law." Passage of Section 702 as an amendment to FISA in 2008 gave the government the authority to request information from US telecommunications companies on foreign targets located overseas without a court order for each individual case. The broad authority is reviewed and renewed annually by the FISA court, although the law does not preclude making a specific request for surveillance. "It appears the NSA did not need any of the expanded authorities conferred by Section 702 to monitor the communications at issue," said Elizabeth Goitein, co-director of the Brennan Centre for Justice's Liberty and National Security Programme. "The government easily could have met this standard if it certified that the targets were al-Qaeda terrorists in Pakistan." But US officials argue that, given the flood of leads in today's interconnected world, the system would get bogged down and they could miss plots if they had to go before the court every time they got information about potential foreign suspects. The officials said they used material from multiple sources - allies, agents, informants and other investigations - to provide rolling targeting information for the Prism program. They also said if the Yahoo address had not been included, Zazi might not have been identified just days before the attacks were set to occur. In testimony before Congress on Tuesday, senior intelligence and law enforcement officials said that recently revealed surveillance programmes have disrupted more than 50 "potential terrorist events", including at least 10 plots with a connection in the US. The Zazi case was one of four that officials used in recent days to defend the effectiveness of the surveillance programmes. One of the others was a planned attack on a Danish newspaper that involved a Pakistani American, David Headley. Section 702 is critical it’s essential to preventing terrorism Wittes 14 Benjamin Wittes, Brookings, 2014, Senior Fellow in Governance Studies at the Brookings Institution. I co-founded and am Editor in Chief of Lawfare, a website devoted to sober and serious discussion of “Hard National Security Choices.” I am the author or editor of several books on subjects related to law and national security: Detention and Denial: The Case for Candor After Guantánamo (2011), Law and the Long War: The Future of Justice in the Age of Terror (2008), and Legislating the War on Terror: An Agenda for Reform (2009). I have written extensively both on the AUMF and on NSA collection under various provisions of the Foreign Intelligence Surveillance Act (FISA).3 The views I am expressing here are my own, April 8, Prepared Statement, Is Al Qaeda Winning the Administration’s Counterterrorism Policy,” http://docs.house.gov/meetings/FA/FA18/20140408/102109/HHRG-113-FA18-Wstate-WittesB-20140408.pdf President Obama has announced that he wants to end the AUMF conflict, raising profound questions both about the plausibility and timeframe of that objective and about what legal instrument—if any—will replace the AUMF. Meanwhile, serial leaks have generated enormous political anxiety about NSA programs and persistent calls for reform in the press, in the general public, among allies, and in this body. Section 702 will sunset in 2017 absent action by Congress to renew this important collection authority.4 So major pillars of the legal architecture of America’s conflict with Al Qaeda have been placed—in different ways and for very different reasons—on the table. This body thus cannot avoid the question of how much, if at all, it wants to alter the most fundamental architecture of the conflict. In my view, as I will lay out, the critical task facing the Congress is different with respect to these two laws. With respect to the AUMF, the Congress should legislate to clearly authorize, and establish proper oversight of, the conflict the United States is likely to continue fighting after its withdrawal from Afghanistan. With respect to Section 702, the task is simpler: to maintain the intelligence community’s capacity to support both the broad national security objectives of the United States and the conflict’s prosecution under whatever legal authorities may succeed the AUMF. As I said at the outset of this statement, the question of intelligence collection under Section 702 of the FAA may seem connected to the AUMF’s future in only the most distant fashion. In fact, the connection between intelligence collection authorities and the underlying regime authorizing the conflict itself is a critical one. Good intelligence is key to any armed conflict and good technical intelligence is a huge U.S. strength in the fight against Al Qaeda. Yet ironically, the more one attempts to narrow the conflict, the more important technical intelligence becomes. The fewer boots on the ground we have in Afghanistan, for example, the greater our reliance will become on technical collection. The more we rely on drone strikes, rather than large troop movements, in areas where we lack large human networks, the more we rely on technical intelligence. Particularly if one imagines staying on offense against a metastasizing Al Qaeda in the context of a withdrawal from Afghanistan and a narrowing—or a formal end—of the AUMF conflict, the burden on technical intelligence collection to keep us in the game will be huge even ignoring the many other foreign intelligence and national security interests Section 702 surveillance supports. Section 702 is a complicated statute, and it is only one part of a far more complicated, larger statutory arrangement. But broadly speaking, it permits the NSA to acquire without an individualized warrant the communications of non-US persons reasonably believed to be overseas when those communications are transiting the United States or stored in the United States. Under these circumstances, the NSA can order production of such communications from telecommunications carriers and internet companies under broad programmatic orders issued by the Foreign Intelligence Surveillance Court (FISC), which reviews both targeting and minimization procedures under which the collection then takes place. Oversight is thick, both within the executive branch, and in reporting requirements to the congressional intelligence committees. Make no mistake: Section 702 is a very big deal in America’s counterterrorism arsenal. It is far more important than the much debated bulk metadata program, which involves a few hundred queries a year. Section 702 collection, by contrast, is vast, a hugely significant component not only of contemporary counterterrorism but of foreign intelligence collection more generally. In 2012, the Senate Select Committee on Intelligence wrote that “[T]he authorities provided [under section 702] have greatly increased the government’s ability to collect information and act quickly against important foreign intelligence targets. . . . [The] failure to reauthorize [section 702] would ‘result in a loss of significant intelligence and impede the ability of the Intelligence Community to respond quickly to new threats and intelligence opportunities.’”8 The President’s Review Group on Intelligence and Communications Technologies, after quoting this language, wrote that “Our own review is not inconsistent with this assessment. . . . [W]e are persuaded that section 702 does in fact play an important role in the nation’s effort to prevent terrorist attacks across the globe.”9 The Washington Post has reported that 702 was in 2012 the single most prolific contributor to the President’s Daily Brief.10 Yet we have seen enormous anxiety about Section 702 collection, along with its close cousin, collection overseas against non-US person targets under Executive Order 12333. Sometimes, these anxieties have been rooted in the supposed effects of this collection on U.S. persons.11 Sometimes, however, the complaints have stemmed from broader concerns about infringement of privacy worldwide. Europeans have expressed shock, for example, that a U.S. spy agency would presume to collect against an allied foreign leader like German Chancellor Angela Merkel12—surveillance that now seems forward-thinking and reasonable given later reports that Merkel has been on the phone frequently during the Crimea crisis with Vladimir Putin.13 Major news organizations have considered it front-page news that NSA has pursued intelligence targets on online gaming platforms and smartphone apps,14 that NSA has collected contact lists in large numbers around the world,15 even that foreign countries spy on one another, collect attorney-client communications involving U.S. lawyers along the way, and may share that material with NSA subject to U.S. law and minimization requirements.16 Whether one considers these stories important journalism or reckless blowing of valuable surveillance activities, they both reflect and further stoke a deep concern about the scope of U.S. surveillance practices. And that concern is creating inexorable pressures for reforms we may regret in the counterterrorism space. The legal regime here is one that this body knowingly and deliberatively created in an iterative set of interactions with the intelligence community and the courts. It requires no apology. Rather, it requires an active defense. And while there are certainly areas in which the regime could benefit from reform, the big risk here is that overreaction and panic in the face of exposure will lead to a burdening of the core signals intelligence capacity of the United States with legal processes designed to protect civil liberties domestically. This could happen either because reform efforts go too far or because Congress fails to reauthorize 702 and thus applies the terms of core FISA—which require an individualized warrant based on probable cause— to a wide swath of overseas collection. Broadly then, the legislative task with respect to Section 702 is something of the opposite of the task with respect to the AUMF. To the extent that members of this committee continue to believe, as I do, in the essential integrity and value of the existing legal authorities for intelligence collection and oversight, the task in the current political environment is to defend that architecture—publicly and energetically—rather than to race to correct imagined deficiencies, or even real structural deficiencies that, however real they may be, bear little relation to the outcomes that disquiet us. Section 702 was successful in stopping Jamshid Muhtorov and Bakhtiyor Jumaev Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) Jamshid Muhtorov and Bakhtiyor Jumaev, two Uzbek men living in Denver and Philadelphia, respectively, allegedly provided $300 and other support to the Islamic Jihad Union, an Uzbek terrorist group, in 2011 and 2012.71 The U.S. government acknowledged its use of evidence derived from warrantless surveillance under Section 702 in a court filing in October 2013.72,73 This case did not involve any plot to conduct an attack inside the United States. Further, the amount of money the two men allegedly provided to the Islamic Jihad Union was minimal. In addition to the cases the government has declassified, we have identified three more cases in which a review of court documents and news reports suggests NSA surveillance of some kind may have been used. However, it is not clear whether any of these three cases involved the NSA’s bulk surveillance programs. Section 702 was successful in Najibullah Zazi’s terrorist plot. Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) The plot by Najibullah Zazi, Zarein Ahmedzay, and Adis Medunjanin to bomb the New York City subway system in 2009 was prevented by a Section 702 NSA intercept. The bulk collection of telephone metadata did not play an appreciable role in the prevention of the attack. There is no evidence that the NSA program used to help investigate the plot was critical for counterterrorism efforts, as the plot could have been prevented through the use of traditional, targeted criminal or FISA warrants. XO 12333 Links Executive Order 12333 is the basis for the NSA intelligence gathering. Farivar 2014 (Cyrus Farivar / Cyrus is the Senior Business Editor at Ars Technica, and is also a radio producer and author. His first book, The Internet of Elsewhere, was published in April 2011..New docs show how Reagan-era executive order unbounded NSA http://arstechnica.com/tech-policy/2014/09/new-docs-show-how-reagan-era-executive-order-unbounded-nsa/) As Ars reported previously, "twelve triple three" is a presidential order that spells out the National Security Agency’s authority to conduct signals intelligence, among other things. EO 12333 was amended three times under President George W. Bush. Famously, the NSA expanded its domestic surveillance operation after the September 11 attacks without a direct order from the president, who later provided cover under EO 12333. "These documents are a good first step to understanding how EO 12333 is being used," Mark Jaycox, a legislative analyst at the Electronic Frontier Foundation, told Ars. "We already know that it's used in a very similar manner to Section 702 of the Foreign Intelligence Surveillance Act, which is being used as part of collection techniques that collect wholly domestic (American) e-mail. We also know [EO 12333 is] used for the NSA’s interception of Internet traffic between Google's and Yahoo!'s data centers abroad, the collection of millions of e-mail and instant message address books, the recording of the contents of every phone call made in at least two countries, and the mass cell phone location-tracking program. The NSA—and the White House—must release more material on EO 12333. The President has encouraged a public discussion on the NSA's signals intelligence activities. He must follow through with ensuring an open, and honest, debate on EO 12333 activities." FISA only regulates a subset of NSA's signals intelligence activities. NSA conducts the majority of its SIGINT activities solely pursuant to the authority provided by Executive Order (EO) 12333. Since 1981, EO 12333 has provided the President's authoritative written instruction for the organization and operation of the United States Intelligence Community (IC). An internal training document for a course taught with the NSA entitled "Overview of Signals Intelligence (SIGINT) Authorities" notes that: Executive Order 12333 was issued by the President of the United States to provide for the effective conduct of US intelligence activities and the protection of the rights of US persons. It is the primary source of NSA's foreign intelligence-gathering authority. Executive Order 12333 governs foreign intelligence activities across the Intelligence Community. Derivative documents such as DoD Regulation 5240.1-R, NSA/CSS Policy 123, and USSID SP0018 establish policies and procedures consistent with Executive Order 12333. Under Executive Order 12333, NSA collects, processes, analyzes, produces, and disseminates signals intelligence information and data. These activities are approved for foreign intelligence purposes, counterintelligence purposes, and for the conduct of military operations. NSA surveillance dependent upon Executive Order 12333. Abdo 14 ( Alex Abdo, Staff Attorney, ACLU Speech, Privacy, and Technology Project SEPTEMBER 29, 2014 New Documents Shed Light on One of the NSA's Most Powerful Tools https://www.aclu.org/blog/new-documents-shed-light-one-nsas-most-powerfultools?redirect=blog/national-security/new-documents-shed-light-one-nsas-most-powerful-tools) In some ways, this is not surprising. After all, it has been reported that some of the NSA's biggest spying programs rely on the executive order, such as the NSA's interception of internet traffic between Google's and Yahoo!'s data centers abroad, the collection of millions of email and instant-message address books, the recording of the contents of every phone call made in at least two countries, and the mass cellphone location-tracking program. In other ways, however, it is surprising. Congress's reform efforts have not addressed the executive order, and the bulk of the government's disclosures in response to the Snowden revelations have conspicuously ignored the NSA's extensive mandate under EO 12333. Executive Order 12333 grants the most power to surveillance. Tye 2014 (John Napier Tye served as section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor from January 2011 to April 2014. He is now a legal director of Avaaz, a global advocacy organization. Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans, The Washington Post, July 18, 2014 http://www.washingtonpost.com/opinions/meetexecutive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans/2014/07/18/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html) Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act, through which the government obtains court orders to compel American telecommunications companies to turn over phone data. But Section 215 is a small part of the picture and does not include the universe of collection and storage of communications by U.S. persons authorized under Executive Order 12333. From 2011 until April of this year, I worked on global Internet freedom policy as a civil servant at the State Department. In that capacity, I was cleared to receive top-secret and “sensitive compartmented” information. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Bulk data collection that occurs inside the United States contains built-in protections for U.S. persons, defined as U.S. citizens, permanent residents and companies. Such collection must be authorized by statute and is subject to oversight from Congress and the Foreign Intelligence Surveillance Court. The statutes set a high bar for collecting the content of communications by U.S. persons. For example, Section 215 permits the bulk collection only of U.S. telephone metadata — lists of incoming and outgoing phone numbers — but not audio of the calls. Executive Order 12333 contains no such protections for U.S. persons if the collection occurs outside U.S. borders. Issued by President Ronald Reagan in 1981 to authorize foreign intelligence investigations, 12333 is not a statute and has never been subject to meaningful oversight from Congress or any court. Sen. Dianne Feinstein (D-Calif.), chairman of the Senate Select Committee on Intelligence, has said that the committee has not been able to “sufficiently” oversee activities conducted under 12333. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. Such persons cannot be individually targeted under 12333 without a court order. However, if the contents of a U.S. person’s communications are “incidentally” collected (an NSA term of art) in the course of a lawful overseas foreign intelligence investigation, then Section 2.3(c) of the executive order explicitly authorizes their retention. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. Executive Order 12333 contains nothing to prevent the NSA from collecting and storing all such communications — content as well as metadata — provided that such collection occurs outside the United States in the course of a lawful foreign intelligence investigation. No warrant or court approval is required, and such collection never need be reported to Congress. None of the reforms that Obama announced earlier this year will affect such collection. Without any legal barriers to such collection, U.S. persons must increasingly rely on the affected companies to implement security measures to keep their communications private. The executive order does not require the NSA to notify or obtain consent of a company before collecting its users’ data. The attorney general, rather than a court, must approve “minimization procedures” for handling the data of U.S. persons that is collected under 12333, to protect their rights. I do not know the details of those procedures. But the director of national intelligence recently declassified a document(United States Signals Intelligence Directive 18) showing that U.S. agencies may retain such data for five years. Executive Order 12333 is the primary authority for surveillance. Watkins 2013 (Ali Watkins covers intelligence and national security for the Huffington Post, based in Washington, D.C. Previously, she covered national security and regional politics for McClatchy Newspapers' D.C. bureau. She has a journalism degree from Philadelphia's Temple University Most of NSA’s data collection authorized by order Ronald Reagan issued November 21 2013 http://www.mcclatchydc.com/news/nation-world/national/national-security/article24759289.html) The National Security Agency’s collection of information on Americans’ cellphone and Internet usage reaches far beyond the two programs that have received public attention in recent months , to a presidential order that is older than the Internet itself. Approved by President Ronald Reagan in 1981, Executive Order 12333 (referred to as “twelve-triple-three”) still governs most of what the NSA does. It is a sweeping mandate that outlines the duties and foreign intelligence collection for the nation’s 17 intelligence agencies. It is not governed by Congress, and critics say it has little privacy protection and many loopholes. What changes have been made to it have come through guidelines set by the attorney general or other documents. Under its provisions, agencies have the ability to function outside the confines of a warrant or court order, if approved by the attorney general. Its Section 2.5 effectively gives the attorney general the right to authorize intelligence agencies to operate outside the confines of judicial or congressional oversight, so long as it’s in pursuit of foreign intelligence – including collecting information of Americans. “The Attorney General hereby is delegated the power to approve the use for intelligence purposes, within the United States or against a United States person abroad, of any technique for which a warrant would be required,” 12333 reads. Monitoring the actual content of Americans’ communications still requires a warrant under 12333, but metadata – the hidden information about a communication that tells where a person is, who he’s communicating with, even the number of credit cards used in a transaction – can be swept up without congressional or court approval. The impact of 12333 is enormous – and largely unknown. Documents leaked by former NSA contractor Edward Snowden suggest that less than half of the metadata the NSA has collected has been acquired under provisions of the USA Patriot Act and the Foreign Intelligence Surveillance Act, the two laws that have received the most attention for permitting NSA programs . Gen. Keith Alexander, the NSA director, has ratified that impression, saying that the majority of NSA data is collected “solely pursuant to the authorities provided by Executive Order 12333.” Impact Extensions A strategic nuclear terrorist attack could lead to an internal US collapse. Michael 12 – (2012, George, PhD, Associate Professor of Counterproliferation and Deterrence Theory, USAF Counterproliferation Center, Maxwell AFB, “Strategic Nuclear Terrorism and the Risk of State Decapitation,” Defence Studies Volume 12, Issue 1, 2012, taylor and francis) In his book Atomic Obsession: Nuclear Alarmism from Hiroshima to Al-Qaeda, John Mueller argues that even if a single nuclear device were detonated, though catastrophic, it would not portend the demise of an entire city, much less the economy of a country, a government, or a civilization. Rather, Mueller believes that America would be resilient, citing the example of Japan during World War II, which sustained an intense nationwide conventional bombing campaign along with two nuclear attacks, yet whose civil society and government survived. Conceding that a nuclear attack could devastate a locale, Mueller still dismisses the notion that it would extinguish the rest of the country –as he puts it –’Do farmers in Iowa cease plowing because an atomic bomb went off in an Eastern city? Do manufacturers close down their assembly lines? Do all churches, businesses, governmental structures, community groups simply evaporate?’ 105 Arguably, though, Mueller’s analysis is somewhat facile and gives short shrift to the possibility of strategic nuclear terrorism. For instance, a nuclear device planted in a certain place (near the Capitol Building in Washington DC) at a certain time (the President’s State of the Union Address) could decapitate the US government. Although there is a plan of presidential succession, it might not be carried out smoothly. Moreover, in this scenario if power were contested by different officials, would the rest of the country recognize their authority? And without a functioning government, would the state governments, which depend so much on the federal government, really be viable for very long? In time of crisis, Americans have come to assume that the federal government will take the lead. If the federal leadership were decapitated, it might not be that easy to put Humpty Dumpty together again. Former Defense Secretary William Perry once speculated that it was more likely that a nuclear device would arrive in Washington DC or New York City by way of a truck or freighter than a missile. 106 The federal government’s planning scenario envisages a ten-kiloton nuclear device detonated in an urban area. 107 In a case study developed by the Homeland Security Council, a ten-kiloton nuclear device was detonated near the White House. The study estimated that over 150,000 injuries would be incurred with a possible 70 percent mortality rate. Furthermore, over 100,000 persons would require decontamination, which would overwhelm regional capabilities. In the aftermath, the study predicted that over 500,000 persons would attempt to evacuate the city, effectively closing both egress and ingress routes. 108 In a typical nuclear-fission weapon explosion, about half of the energy goes into the blast. About a third of the energy goes into thermal effects. The remaining energy goes into prompt and residual radiation. Much of the radiation lies in the mushroom cloud produced by the explosion. 109 In addition to the direct effects of the detonation, people would also be killed from indirect blast effects, such as the collapse of buildings and fires caused from broken gas pipes, gasoline in cars, and so on. 110 Inasmuch as terrorists would not have the capability to deliver a nuclear bomb by air, the detonation would almost certainly be at ground level thus limiting the blast radius and the resulting firestorm. 111 Nevertheless, a ground burst weapon would loft far more radioactive debris into the atmosphere resulting in greater contamination. At ground zero, that is, the point on the earth at which the detonation occurs, a ten-kiloton blast would produce a fireball about 72 meters (236 feet) in diameter. 112 Prompt radiation would kill approximately 95 percent of the people within a diameter of 2.4 kilometers (roughly one and a half miles) within weeks. 113 A detonation of a ten-kiloton nuclear device on Pennsylvania Avenue in the area where the Robert F. Kennedy Department of Justice Building is located would largely destroy a circle area about two miles (3.2 kilometers) in diameter which would encompass the White House, the Capitol Building, and the Supreme Court Building. 114 Many of the people unfortunate to be in the area would be killed.During the Cold War, the US government faced the prospect of a decapitating strike. Soviet ‘Yankee’-class submarines, which regularly operated 600 nautical miles from the East Coast of the United States, had the capability of destroying Washington DC, within eight to ten minutes of launching their nuclear missiles. 115 However, an attempted decapitation strike by the Soviet Union would have been an act of irrational desperation insofar as an attack on Washington would not have prevented a devastating series of retaliatory strikes from the US military. 116 To ensure second strike capability, both the United States and the Soviet Union developed plans for the continuity of command and control of nuclear weapons in the event of a decapitation strike. 117 The Continuity of Government (COG) refers to a system of procedures that would allow the government to continue operations in the event some catastrophic event. Although protocols of succession and the replacement of elected and appointed officials were included by the framers in the Constitution, the need for COG plans took on a new sense of urgency in the nuclear era. A series of national security directives dictate procedures for government agencies in the event of a crisis. In 1998, President Bill Clinton signed Presidential Directive 67, which requires federal agencies to develop plans to ensure the continuance of operations, a chain of command, and delegation of authority. The full text of the directive remains classified. 118 The 25th amendment clarifies the procedures for the transfer of power relating to the incapacitation of the president. However, under the conditions of a nuclear attack and the ensuing societal disruption, a smooth transition may not be possible. If the sitting elected president survives, then everyone should agree that he legitimately holds the reins of power. If, however, the president is dead or missing, the lines of authority are less clear as evidenced on 30 March 1981, when John F. Hinckley Jr attempted to assassinate President Ronald Reagan. Soon thereafter, Secretary of State Alexander Haig announced that he was in charge of the executive branch because Vice President George H.W. Bush was out of town and President Reagan was incapacitated while undergoing surgery for his wound. In doing so, Haig overlooked that the Speaker of the House Tip O’Neill and the President pro tempore of the Senate Strom Thurmond preceded him in the line of succession respectively. Ensuring the continuity of the command, control, and communications of the military is vital as well. Christened as the National Command Authority (NCA), 119 the political and military leaders who are designated as members of the chain of command for US forces must be able to survive a surprise attack in order to carry out retaliatory attacks. 120 According to the Department of Defense Directive 5100.30 issued on 2 December 1971, the NCA consists only of the president and the secretary of defense or their deputized alternatives or successors. This could lead to confusion insofar as there are twin lines of succession, one for the presidency and one for the command of US military forces. 121 In order to avoid the prospect of decapitation, the US government has established plans to evacuate the NCA authorities from Washington DC to a National Airborne Operations Center aircraft and to 96 hardened command bunkers in the Federal Relocation Arc, located about 50 miles or more from the city. 122 The ‘underground White House’ located inside Raven Rock Mountain in Pennsylvania is the home of the Alternative National Military Command Center and is equipped to house the president and other members of the NCA. Another important relocation center –the Western Virginia Office of Controlled Conflict Operations –was established in a man-made cavern within Mount Weather located about 50 miles northwest of Washington DC, just outside Bluemont, Virginia. 123 Though commendable, these plans might not be adequate to ensure a continuity of government in the event of a surprise decapitating strike by a terrorist group. Certain trends in contemporary America could make the issue of transition particularly contentious. One worrisome development is a seeming polarization in the United States over matters such as political partisanship, national identity, and cultural issues. Since the 1990s, the American party system has been increasingly characterized by an ideological divide. This was reflected in the rift in the electoral map of the country after the 2000 and 2004 presidential elections. Generally speaking, ‘red’ states favor a more conservative course for the nation, while ‘blue’ states prefer a more liberal orientation. The political center appears to be attenuating. As the political scientist Alan Abramovitz found in his research, in 1984, 41 percent of the voters surveyed identified themselves at the midpoint of an ideological scale. By 2005, though, the number that identified themselves at the center had dropped to 28 percent. 124 Historically, American political culture has favored centrism and pragmatism over ideology. And though the distribution of wealth in the country is quite uneven compared to other Western democracies as measured by the Gini Index, the middle class is still the class with which most Americans overwhelmingly identify. 125 The festering economic crisis, though, could create a greater pool of the discontented, as evidenced by the Occupy Wall Street protests in the fall of 2011. In a highly-polarized America, establishing a consensus could be challenging in the aftermath of a severe crisis. The impact is a global nuclear exchange Ayson 10 (Robert, Professor of Strategic Studies and Director of the Centre for Strategic Studies: New Zealand @ The Victoria University of Wellington, July 2010, “After a Terrorist Nuclear Attack: Envisaging Catalytic Effects,” Studies in Conflict and Terrorism, Vol. 33 Issue 7) But these two nuclear worlds—a non-state actor nuclear attack and a catastrophic interstate nuclear exchange—are not necessarily separable. It is just possible that some sort of terrorist attack, and especially an act of nuclear terrorism, could precipitate a chain of events leading to a massive exchange of nuclear weapons between two or more of the states that possess them. In this context, today’s and tomorrow’s terrorist groups might assume the place allotted during the early Cold War years to new state possessors of small nuclear arsenals who were seen as raising the risks of a catalytic nuclear war between the superpowers started by third parties. These risks were considered in the late 1950s and early 1960s as concerns grew about nuclear proliferation, the so-called n+1 problem. It may require a considerable amount of imagination to depict an especially plausible situation where an act of nuclear terrorism could lead to such a massive inter-state nuclear war. For example, in the event of a terrorist nuclear attack on the United States, it might well be wondered just how Russia and/or China could plausibly be brought into the picture, not least because they seem unlikely to be fingered as the most obvious state sponsors or encouragers of terrorist groups. They would seem far too responsible to be involved in supporting that sort of terrorist behavior that could just as easily threaten them as well. Some possibilities, however remote, do suggest themselves. For example, how might the United States react if it was thought or discovered that the fissile material used in the act of nuclear terrorism had come from Russian stocks,40 and if for some reason Moscow denied any responsibility for nuclear laxity? The correct attribution of that nuclear material to a particular country might not be a case of science fiction given the observation by Michael May et al. that while the debris resulting from a nuclear explosion would be “spread over a wide area in tiny fragments, its radioactivity makes it detectable, identifiable and collectable, and a wealth of information can be obtained from its analysis: the efficiency of the explosion, the materials used Alternatively, if the act of nuclear terrorism came as a complete surprise, and American officials refused to believe that a terrorist group was fully responsible (or responsible at all) suspicion would shift immediately to state possessors. Ruling out Western ally countries like the United Kingdom and France, and probably Israel and India as well, authorities in Washington would be left with a very short list consisting of North Korea, perhaps Iran if its program continues, and possibly Pakistan. But at what stage would Russia and China be definitely ruled out in this high stakes game of nuclear Cluedo? In particular, if the act of nuclear terrorism occurred against a backdrop of existing tension in Washington’s relations with Russia and/or China, and at a time when threats had already been traded between these major powers, would officials and political leaders not be tempted to assume the worst? Of course, the chances of this occurring would only seem to increase if the United States was already involved in some sort of limited armed conflict with and, most important . . . some indication of where the nuclear material came from.”41 Russia and/or China, or if they were confronting each other from a distance in a proxy war, as unlikely as these developments may seem at the present time. The reverse might well apply too: should a nuclear terrorist attack occur in Russia or China during a period of heightened tension or even limited conflict with the United States, could Moscow and Beijing resist the pressures that might rise domestically to consider the United States as a possible perpetrator or encourager of the attack? Washington’s early response to a terrorist nuclear attack on its own soil might also raise the possibility of an unwanted (and nuclear aided) confrontation with Russia and/or China. For example, in the noise and confusion during the immediate aftermath of the terrorist nuclear attack, the U.S. president might be expected to place the country’s armed forces, including its nuclear arsenal, on a higher stage of alert. In such a tense environment, when careful planning runs up against the friction of reality, it is just possible that Moscow and/or China might mistakenly read this as a sign of U.S. intentions to use force (and possibly nuclear force) against them. In that situation, the temptations to preempt such actions might grow, although it must be admitted that any preemption would probably still meet with a devastating response. As part of its initial response to the act of nuclear terrorism (as discussed earlier) Washington might decide to order a significant conventional (or nuclear) retaliatory or disarming attack against the leadership of the terrorist group and/or states seen to support that group. Depending on the identity and especially the location of these targets, Russia and/or China might interpret such action as being far too close for their comfort, and potentially as an infringement on their spheres of influence and even on their sovereignty. One far-fetched but perhaps not impossible scenario might stem from a judgment in Washington that some of the main aiders and abetters of the terrorist action resided somewhere such as Chechnya, perhaps in connection with what Allison claims is the “Chechen insurgents’ . . . long-standing interest in all things nuclear.”42 American pressure on that part of the world would almost certainly raise alarms in Moscow that might require a degree of advanced consultation from Washington that the latter found itself unable or unwilling to provide. A terrorist attack goes nuclear Hellman 08 (Martin E. Hellman, emeritus prof of engineering @ Stanford, “Risk Analysis of Nuclear Deterrence” SPRING 2008 THE BENT OF TAU BETA PI, http://www.nuclearrisk.org/paper.pdf) The threat of nuclear terrorism looms much larger in the public’s mind than the threat of a full-scale nuclear war, yet this article focuses primarily on the latter. An explanation is therefore in order before proceeding . A terrorist attack involving a nuclear weapon would be a catastrophe of immense proportions: “A 10-kiloton bomb detonated at Grand Central Station on a typical work day would likely kill some half a million people, and inflict over a trillion dollars in direct economic damage. America and its way of life would be changed forever.” [Bunn 2003, pages viii-ix]. The likelihood of such an attack is also significant. Former Secretary of Defense William Perry has estimated the chance of a nuclear terrorist incident within the next decade to be roughly 50 percent [Bunn 2007, page 15]. David Albright, a former weapons inspector in Iraq, estimates those odds at less than one percent, but notes, “We would never accept a situation where the chance of a major nuclear accident like Chernobyl would be anywhere near 1% .... A nuclear terrorism attack is a low-probability event, but we can’t live in a world where it’s anything but extremely low-probability.” [Hegland 2005]. In a survey of 85 national security experts, Senator Richard Lugar found a median estimate of 20 percent for the “probability of an attack involving a nuclear explosion occurring somewhere in the world in the next 10 years,” with 79 percent of the respondents believing “it more likely to be carried out by terrorists” than by a government [Lugar 2005, pp. 14-15]. I support increased efforts to reduce the threat of nuclear terrorism, but that is not inconsistent with the approach of this article. Because terrorism is one of the potential trigger mechanisms for a full-scale nuclear war, the risk analyses proposed herein will include estimating the risk of nuclear terrorism as one component of the overall risk. If that risk, the overall risk, or both are found to be unacceptable, then the proposed remedies would be directed to reduce which- ever risk(s) warrant attention. Similar remarks apply to a number of other threats (e.g., nuclear war between the U.S. and China over Taiwan). his article would be incomplete if it only dealt with the threat of nuclear terrorism and neglected the threat of full- scale nuclear war. If both risks are unacceptable, an effort to reduce only the terrorist component would leave humanity in great peril. In fact, society’s almost total neglect of the threat of full-scale nuclear war makes studying that risk all the more important. The cosT of World War iii The danger associated with nuclear deterrence depends on both the cost of a failure and the failure rate.3 This section explores the cost of a failure of nuclear deterrence, and the next section is concerned with the failure rate. While other definitions are possible, this article defines a failure of deterrence to mean a full-scale exchange of all nuclear weapons available to the U.S. and Russia, an event that will be termed World War III. Approximately 20 million people died as a result of the first World War. World War II’s fatalities were double or triple that number—chaos prevented a more precise deter- mination. In both cases humanity recovered, and the world today bears few scars that attest to the horror of those two wars. Many people therefore implicitly believe that a third World War would be horrible but survivable, an extrapola- tion of the effects of the first two global wars. In that view, World War III, while horrible, is something that humanity may just have to face and from which it will then have to recover. In contrast, some of those most qualified to assess the situation hold a very different view. In a 1961 speech to a joint session of the Philippine Con- gress, General Douglas MacArthur, stated, “Global war has become a Frankenstein to destroy both sides. … If you lose, you are annihilated. If you win, you stand only to lose. No longer does it possess even the chance of the winner of a duel. It contains now only the germs of double suicide.” Former Secretary of Defense Robert McNamara ex- pressed a similar view: “If deterrence fails and conflict develops, the present U.S. and NATO strategy carries with it a high risk that Western civilization will be destroyed” [McNamara 1986, page 6]. More recently, George Shultz, William Perry, Henry Kissinger, and Sam Nunn4 echoed those concerns when they quoted President Reagan’s belief that nuclear weapons were “totally irrational, totally inhu- mane, good for nothing but killing, possibly destructive of life on earth and civilization.” [Shultz 2007] Official studies, while couched in less emotional terms, still convey the horrendous toll that World War III would exact: “The resulting deaths would be far beyond any precedent. Executive branch calculations show a range of U.S. deaths from 35 to 77 percent (i.e., 79-160 million dead) … a change in targeting could kill somewhere between 20 million and 30 million additional people on each side .... These calculations reflect only deaths during the first 30 days. Additional millions would be injured, and many would eventually die from lack of adequate medical care … millions of people might starve or freeze during the follow- ing winter, but it is not possible to estimate how many. … further millions … might eventually die of latent radiation effects.” [OTA 1979, page 8] This OTA report also noted the possibility of serious ecological damage [OTA 1979, page 9], a concern that as- sumed a new potentiality when the TTAPS report [TTAPS 1983] proposed that the ash and dust from so many nearly simultaneous nuclear explosions and their resultant fire- storms could usher in a nuclear winter that might erase homo sapiens from the face of the earth, much as many scientists now believe the K-T Extinction that wiped out the dinosaurs resulted from an impact winter caused by ash and dust from a large asteroid or comet striking Earth. The TTAPS report produced a heated debate, and there is still no scientific consensus on whether a nuclear winter would follow a full-scale nuclear war. Recent work [Robock 2007, Toon 2007] suggests that even a limited nuclear exchange or one between newer nuclear-weapon states, such as India and Pakistan, could have devastating long-lasting climatic consequences due to the large volumes of smoke that would be generated by fires in modern megacities. While it is uncertain how destructive World War III would be, prudence dictates that we apply the same engi- neering conservatism that saved the Golden Gate Bridge from collapsing on its 50th anniversary and assume that preventing World War III is a necessity—not an option. ISIS will shut down the U.S. national grid – it’ll independently kill 9 out of 10 Americans Bedard 14 Bedard 9/3/14 – Paul, columnist at the Washington Examiner, “New ISIS threat: America's electric grid; blackout could kill 9 of 10” http://washingtonexaminer.com/new-isis-threat-americas-electric-grid-blackout-could-kill-9-of-10/article/2552766 Former top government officials who have been warning Washington about the vulnerability of the nation’s largely unprotected electric grid are raising new fears that troops from the jihadist Islamic State are poised to attack the system, leading to a power crisis that could kill millions. “Inadequate grid security, a porous U.S.-Mexico border, and fragile transmission systems make the electric grid a target for ISIS,” said Peter Pry, one of the nation’s leading experts on the grid. Others joining Pry at a press conference later Wednesday to draw attention to the potential threat said that if just a handful of the nation’s high voltage transformers were knocked out, blackouts would occur across the country. “By one estimate, should the power go out and stay out for over a year, nine out of 10 Americans would likely perish,” said Frank Gaffney, founder and president of the Center for Security Policy in Washington. At the afternoon press conference, Gaffney dubbed the potential crisis the "grid jihad." A lack of electricity would shut off water systems, impact city transportation services and shutdown hospitals and other big facilities. Fresh and frozen foods also would be impacted as would banks, financial institutions and utilities. Pry provided details of recent attacks on electricity systems and said that ISIS could easily team with Mexican drug cartels to ravage America. He told Secrets, for example, that the Knights Templar drug gang blacked out the electric grid of the Mexican state of Michoacan in 2013 to provide cover for killing those fighting the drug trade. “The Knights Templars and other criminal gangs in Mexico will do anything for money, and ISIS, the richest terrorist organization in history, has hundreds of millions of dollars at its disposal,” said Pry. “ISIS could hire one of the Mexican cartels, or one of their criminal gangs already in the U.S., or activate jihadist terror cells already in the U.S., and inflict a multi-state blackout immediately, within days or weeks. Perhaps even a nationwide blackout,” Pry explained to Secrets. “I am not saying it is likely they will do so. But given the capabilities and objectives of ISIS and our obvious vulnerabilities, it would be foolish to ignore the threat to the grid, to regard the threat as unlikely. Our planning should be based on imminent asymmetrical threats, and not assume that another 9/11 large-scale attack is years away,” he added. They want it – will choose a time and location where retaliation is most likely to escalate Ayson 10 (Robert, Professor of Strategic Studies and Director of the Centre for Strategic Studies: New Zealand @ The Victoria University of Wellington, July 2010, “After a Terrorist Nuclear Attack: Envisaging Catalytic Effects,” Studies in Conflict and Terrorism, Vol. 33 Issue 7) But what if these considerations of cost and benefit mattered less to a terrorist group in possession of a nuclear weapon? As Quester writes: “Governments would, under many circumstances, have a strong incentive to preserve their adversary’s ability to negotiate and surrender; terrorists, by contrast, might have a much stronger incentive to create general chaos, to disrupt and destroy all of their target’s ability to control and moderate its responses.”50 What if a terrorist group realized that it might just be able to spark a catalytic nuclear war? Might that group then work to increase the likelihood of such a war, or to threaten to do so, as a way of either increasing its bargaining power, prestige, or security or to bring about the apocalypse that some observers believe they really desire? Ferguson and Potter argue that “apocalyptic groups . . . may believe that detonating a nuclear warhead would spark a broader nuclear conflict, enabling them to hasten the end of the world.”51 To the extent that any terrorist group has already recognized that this potential for inspiring catalysis may exist, could this also prove a major incentive for it to seek nuclear weapons in the first place? What then might be the situations where a terrorist group could maximize the admittedly slim chances of setting off such a massive nuclear exchange? Once in possession of a useable nuclear weapon, such a group might be inclined to look for a time and place where relations between two or more major nuclear powers were already tense. The catalytic potential could be amplified if the two nuclear-armed countries (the original target of the terrorist detonation and the country with whom a wider nuclear exchange could then begin) were involved in a serious crisis in which case there was a heightened state of alert and even an expectation that some sort of attack by one on the other was likely or even imminent. In such a hot-headed environment, a terrorist nuclear detonation might be even more easily misunderstood and misinterpreted, thus combining the Cold War fears of both catalytic and accidental nuclear war. A terrorist group might exploit the situation further with a false but enormously provocative claim that its nuclear attack had been supported by the state with which the victim of the attack was already in a crisis situation. The loudest of denials by the state so identified might fall on deaf ears in a period when fear and paranoia reigned52 : in fact, the victimized state again might simply refuse to believe that the attack could have come from a non-state actor and would be busy looking for the “real” source of the attack. Extinction---equivalent to full-scale nuclear war Toon 07 Owen B. Toon 7, chair of the Department of Atmospheric and Oceanic Sciences at CU-Boulder, et al., April 19, 2007, “Atmospheric effects and societal consequences of regional scale nuclear conflicts and acts of individual nuclear terrorism,” online: http://climate.envsci.rutgers.edu/pdf/acp-7-1973-2007.pdf To an increasing extent, people are congregating in the world’s great urban centers, creating megacities with populations exceeding 10 million individuals. At the same time, advanced technology has designed nuclear explosives of such small size they can be easily transported in a car, small plane or boat to the heart of a city. We demonstrate here that a single detonation in the 15 kiloton range can produce urban fatalities approaching one million in some cases, and casualties exceeding one million. Thousands of small weapons still exist in the arsenals of the U.S. and Russia, and there are at least six other countries with substantial nuclear weapons inventories. In all, thirty-three countries control sufficient amounts of highly enriched uranium or plutonium to assemble nuclear explosives. A conflict between any of these countries involving 50-100 weapons with yields of 15 kt has the potential to create fatalities rivaling those of the Second World War. Moreover, even a single surface nuclear explosion, or an air burst in rainy conditions, in a city center is likely to cause the entire metropolitan area to be abandoned at least for decades owing to infrastructure damage and radioactive contamination. As the aftermath of hurricane Katrina in Louisiana suggests, the economic consequences of even a localized nuclear catastrophe would most likely have severe national and international economic consequences. Striking effects result even from relatively small nuclear attacks because low yield detonations are most effective against city centers where business and social activity as well as population are concentrated. Rogue nations and terrorists would be most likely to strike there. Accordingly, an organized attack on the U.S. by a small nuclear state, or terrorists supported by such a state, could generate casualties comparable to those once predicted for a full-scale nuclear “counterforce” exchange in a superpower conflict. Remarkably, the estimated quantities of smoke generated by attacks totaling about one megaton of nuclear explosives could lead to significant global climate perturbations (Robock et al., 2007). While we did not extend our casualty and damage predictions to include potential medical, social or economic impacts following the initial explosions, such analyses have been performed in the past for large-scale nuclear war scenarios (Harwell and Hutchinson, 1985). Such a study should be carried out as well for the present scenarios and physical outcomes. Causes global economic collapse. Cirincione 07 – (2007, Joseph, President of the Ploughshares Fund, former vice president for national security and international policy at the Center for American Progress in Washington, DC, former director for non-proliferation at the Carnegie Endowment for International Peace, “Bomb Scare: The History and Future of Nuclear Weapons,” p. xi) Profound societal damage would also occur. Physicist Charles Ferguson and scholar William Potter explain in a 1004 study: Consequences stemming from a terrorist-detonated nuclear weapon in an America city would emanate beyond the immediate tens or hundreds of thousands of fatalities and the massive property and financial damage. Americans who were not killed or injured by the explosion would live in fear that they could die from future nuclear terrorist attacks. Such fear would erode public confidence in the government and could spark the downfall of the administration in power. The tightly interconnected economies of the United States and the rest of the world could sink into a depression as a result of a crude nuclear weapon destroying the heart of a city. This threat stems not only from the 27,000 nuclear weap• ons held by eight or nine nations today but also from the possibility that new nations or even terrorist groups will join this deadly club. Many therefore conclude that we must find a non-nuclear alternative to global security. Upon receiving the 2005 Nobel Peace, Prize Mohamed EIBaradei, the dircc• tor general of the International Atomic Energy Agency, said, "I have no doubt that. if we hope to escape self-destruction, then nuclear weapons should have no place in our collective conscience. and no role in our security.”7 Terrorists will strategically attack, forcing a nuclear exchange and escalation. Morgan 09 (Dennis, full professor at the Hankuk University of Foreign Studies, “World on fire: two scenarios of the destruction of human civilization and possible extinction of the human race,” Futures, November, Science Direct) In a remarkable website on nuclear war, Carol Moore asks the question ‘‘Is Nuclear War Inevitable??’’ [10].4 In Section 1, Moore points out what most terrorists obviously already know about the nuclear tensions between powerful countries. No doubt, they’ve figured out that the best way to escalate these tensions into nuclear war is to set off a nuclear exchange. As Moore points out, all that militant terrorists would have to do is get their hands on one small nuclear bomb and explode it on either Moscow or Israel. Because of the Russian ‘‘dead hand’’ system, ‘‘where regional nuclear commanders would be given full powers should Moscow be destroyed,’’ it is likely that any attack would be blamed on the United States’’ [10]. Israeli leaders and Zionist supporters have, likewise, stated for years that if Israel were to suffer a nuclear attack, whether from terrorists or a nation state, it would retaliate with the suicidal ‘‘Samson option’’ against all major Muslim cities in the Middle East. Furthermore, the Israeli Samson option would also include attacks on Russia and even ‘‘anti-Semitic’’ European cities [10]. In that case, of course, Russia would retaliate, and the U.S. would then retaliate against Russia. China would probably be involved as well, as thousands, if not tens of thousands, of nuclear warheads, many of them much more powerful than those used at Hiroshima and Nagasaki, would rain upon most of the major cities in the Northern Hemisphere. Afterwards, for years to come, massive radioactive clouds would drift throughout the Earth in the nuclear fallout, bringing death or else radiation disease that would be genetically transmitted to future generations in a nuclear winter that could last as long as a 100 years, taking a savage toll upon the environment and fragile ecosphere as well. And what many people fail to realize is what a precarious, hair-trigger basis the nuclear web rests on. Any accident, mistaken communication, false signal or ‘‘lone wolf’ act of sabotage or treason could, in a matter of a few minutes, unleash the use of nuclear weapons, and once a weapon is used, then the likelihood of a rapid escalation of nuclear attacks is quite high while the likelihood of a limited nuclear war is actually less probable since each country would act under the ‘‘use them or lose them’’ strategy and psychology; restraint by one power would be interpreted as a weakness by the other, which could be exploited as a window of opportunity to ‘‘win’’ the war. In other words, once Pandora’s Box is opened, it will spread quickly, as it will be the signal for permission for anyone to use them. Moore compares swift nuclear escalation to a room full of people embarrassed to cough. Once one does, however, ‘‘everyone else feels free to do so. The bottom line is that as long as large nation states use internal and external war to keep their disparate factions glued together and to satisfy elites’ needs for power and plunder, these nations will attempt to obtain, keep, and inevitably use nuclear weapons. And as long as large nations oppress groups who seek self determination, some of those groups will look for any means to fight their oppressors’’ [10]. In other words, as long as war and aggression are backed up by the implicit threat of nuclear arms, it is only a matter of time before the escalation of violent conflict leads to the actual use of nuclear weapons, and once even just one is used, it is very likely that many, if not all, will be used, leading to horrific scenarios of global death and the destruction of much of human civilization while condemning a mutant human remnant, if there is such a remnant, to a life of unimaginable misery and suffering in a nuclear winter. In “Scenarios,” Moore summarizes the various ways a nuclear war could begin: Such a war could start through a reaction to terrorist attacks, or through the need to protect against overwhelming military opposition, or through the use of small battle field tactical nuclear weapons meant to destroy hardened targets. It might quickly move on to the use of strategic nuclear weapons delivered by short-range or inter-continental missiles or long-range bombers. These could deliver high altitude bursts whose electromagnetic pulse knocks out electrical circuits for hundreds of square miles. Or they could deliver nuclear bombs to destroy nuclear and/or non-nuclear military facilities, nuclear power plants, important industrial sites and cities. Or it could skip all those steps and start through the accidental or reckless use of strategic weapons. [10] She then goes on to describe six scenarios for catastrophic nuclear exchanges between various nations. Each scenario incorporates color-coded sections that illustrate four interrelated factors that will determine how a nuclear war will begin, proceed and escalate. These factors are labeled as accidental, aggressive, pre-emptive, and retaliatory. As for the accidental factor of nuclear war, both the U.S. and Russia have “launch on warning” systems that send off rockets before confirmation that a nuclear attack is underway; thus, especially during a time of tensions, a massive nuclear war could take place within only 30 min after a warning—even if the warning is false. This scenario has almost happened on several occasions in the past. It was only because of individual human judgments, which disbelieved the false warnings, that nuclear war did not happen, but if the human judgment had indeed interpreted the warnings according to protocol, an all-out nuclear war would surely have taken place. Turns the case- terrorism crushes civil liberties Eland 03 Ivan Eland, Independent Institute Senior Fellow, 2003 [Mediterranean Quarterly, "Bush's Wars and the State of Civil Liberties," 14.4, pg. 158-175] Unfortunately, counterproductive U.S. government action in response to terrorism is not confined to aggressive behavior overseas. In fact, the most pernicious effects of the escalating cycle of violence between the terrorists and the U.S. government are not found overseas, although those are bad enough, but at home. With each new round of terrorist attacks, the government takes away more of the civil liberties enshrined in the U.S. Constitution by the nation's founders. When this occurs, the terrorists have won—even if we capture or kill them all. Affirmative Uniqueness Answers Al Qaeda will not attack the US Bergen 13 September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Bergen Peter Bergen is the director of the National Security Program at the New America Foundation.) between August 1998 and September 2001, al-Qaeda launched a significant attack on the United States three times: first simultaneously bombing U.S. embassies in Kenya and Tanzania in August 1998, then bombing the USS Cole in October 2000 while it was anchored off the coast of Yemen, and finally attacking the World Trade Center and the Pentagon on September 11, 2001.¶ Since then, alQaeda is zero for 12 in the United States. It has been 12 years since 9/11 and there have been no major attacks on American targets. To be sure, the United States has suffered some tragic terrorist attacks—including the shootings by Major Nidal Malik In the 37 months Hasan at Fort Hood, Texas, in 2009; the attack on U.S. government facilities in Benghazi, Libya, in 2012; and the Boston Marathon bombings in 2013—but these do not represent a strategic attack by al-Qaeda or an affiliated group. They are tragedies but not catastrophes. Domestic threat decreasing, the decrease in arrests prove. Bergen 13 September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Bergen Peter Bergen is the director of the National Security Program at the New America Foundation.) The number of jihadist extremists indicted in the United States has declined over the past few years, according to New America Foundation data. As of July 2013, 44 people were indicted between 2011 and 2013 for connections to jihadist terrorism.¶ In addition to those indicted, several extremists were killed before an indictment could be handed down. These include four men— Mohamoud Hassan, Jamal Sheikh Bana, Burhan Hassan, and Troy Matthew Kastigar—who traveled to fight in Somalia and died there prior to 2011; Anwar al-Awlaki, who was killed in a U.S. drone strike in Yemen¶ in 2011; and Tamerlan Tsarnaev, who was killed in April 2013 during a police chase following the Boston Marathon bombings.¶ According to the New America Foundation data, the number of individuals indicted for plotting attacks within the United States—as opposed to being indicted for traveling to join a terrorist group or sending money abroad to a terrorist group—also declined from 12 in 2011 to only three in 2013.¶ Indictments per year, however, are not a perfect measure of the threat. Charges can vary from state to state, depending on decisions regarding about what and who to prosecute. Additionally, the year in which an indictment is handed down is not necessarily the most relevant year in an extremist’s activity. Despite these flaws, the declining numbers of indictments provide reason to believe the overall threat from domestic jihadist extremists may be decreasing. International Support for domestic terrorism is low Bergen 13 September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Bergen Peter Bergen is the director of the National Security Program at the New America Foundation.) Since 2010, the threat from homegrown extremists has trended away from association with any kind of organized group. Recent attack plots do not show signs of direction from foreign terrorist organizations, but instead are conducted by persons influenced by the ideology of violent jihad. None of the 21 homegrown extremists known to have been involved in plots against the United States between 2011 and 2013 received training abroad. Of these extremists, only Tamerlan Tsarnaev is known to have had contact with foreign militant operatives, but it remains is unclear to what extent this contact the ability of terrorist organizations to coordinate with extremists in the United States has been reduced by policing efforts inside the country and counterterrorism operations abroad. Second, Internet use among jihadist extremists enables them to come into contact with played a role in his attack.¶ This lack of coordination between domestic extremists and overseas groups is likely the result of two factors. First, extremist communities abroad and be radicalized without face-to-face meetings. Of the 45 homegrown extremists who were indicted, convicted ¶ or killed between 2011 and 2013, 18 are known to have communicated with other extremists over the Internet or posted materials related to their radicalization online. ¶ One factor in the radicalization of homegrown extremists in the United States is Anwar al-Awlaki’s propaganda. Because of Awlaki’s fluency in English and his talent for mixing religious theory with contemporary issues, he produced propaganda that has resonated powerfully for some. At least 31 homegrown extremists have cited or possessed Awlaki’s teachings and propaganda, according to a count by the New America Foundation. Awlaki is known to have directly communicated with four U.S.- based militants including Major Hasan. Even after Awlaki’s death in a 2011 U.S. drone strike in Yemen, his influence lives on. Alleged Boston bomber Dzhokhar Tsarnaev was in possession of some of his writings.¶ In addition to lacking direction from abroad, the 2011 to 2013 attack plots were carried out by individuals and pairs, rather than by groups of militants. Thirteen of the 21 extremists involved in U.S. attack plots acted individually. And only four pairs of plotters were involved in domestic plots: Ahmed Ferhane and Mohamed Mamdouh, who plotted to bomb a Manhattan synagogue in May 2011; Khalid Abdul-Latif and Walli Mujahidh, who planned to attack a Military Entrance Processing Center in Seattle in June 2011; Raeez and Shehreyar Qazi, who were arrested in 2012 for a plot to conduct an attack in New York City; and Tamerlan and Dzhokhar Tsarnaev, the perpetrators of the April 2013 Boston Marathon bombing. ¶ Community policying solves¶ The threat from homegrown extremists to the U.S. homeland has been constrained in recent years by a variety of security measures. According to data collected by the¶ New America Foundation, family members of extremists and members of the wider Muslim American community provided useful information in the investigations of about a third of the homegrown jihadist extremists indicted or killed since 9/11.11 Non-community members provided useful reports of suspicious activity in another 9 percent of homegrown extremist cases, while almost half of all homegrown extremists were monitored by an informant or undercover agent. Only two plots in the past three years escaped all the systemic checks that are now in place: Yonathan Melaku’s non-lethal drive-by shooting of military facilities in Northern Virginia in 2011 and the 2013 Boston Marathon bombings. Al Qaeda not focused on attacking the US Bergen 13 September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Bergen Peter Bergen is the director of the National Security Program at the New America Foundation. These letters show that al-Qaeda’s operational control over its affiliated organizations is limited. The Pakistani Taliban continues to kill large numbers of Pakistani civilians and al- Shabaab formally announced its merger with al-Qaeda after bin Laden had died.55 Further, while some affiliates still look to al-Qaeda for notional leadership and guidance, most of them do not appear to have embraced al-Qaeda’s traditional focus on attacking the “far enemy,” the United States, choosing instead to wage local power struggles.¶ The government has only released 17 of the thousands of documents that were found at bin Laden’s compound, and any conclusions drawn from them at present are, at best, an incomplete picture of al-Qaeda’s intentions and capabilities, as well as bin Laden’s role in them. AQIM doesn’t threaten the West. Bergen 13 (Peter, CNN national security analyst, “Should We Still Fear Al Qaeda,” http://newamerica.net/node/78699) Bergen Peter Bergen is the director of the National Security Program at the New America Foundation North African group hasn't attacked in the West Much has been written, for instance, in recent weeks about al Qaeda in the Islamic Maghreb (AQIM), al Qaeda's North African affiliate, a splinter group of which carried out the attack on the Algerian gas facility. But according to Camille Tawil, who has authoritatively covered Islamist militant groups over the past two decades for the leading Arabic daily Al-Hayat and has written three books about al Qaeda, AQIM doesn't threaten the West: "To my knowledge no known attacks or aborted attacks in the West have been linked directly to AQIM." AQIM was formed seven years ago so the group has had more than enough time to plot and carry out an attack in the West. By way of comparison, it took two years of serious plotting for al Qaeda to plan the 9/11 attacks. Boko Haram does not have the capability to attack the U.S. Bergen 13 (Peter, CNN national security analyst, “Should We Still Fear Al Qaeda,” http://newamerica.net/node/78699) Bergen Peter Bergen is the director of the National Security Program at the New America Foundation.) One such militant group is the Nigerian Boko Haram, which bombed the United Nations headquarters in Nigeria in 2011 and has also attacked a wide no known members outside of West Africa," according to Virginia Comolli of the London-based International Institute for Strategic Studies who tracks the group range of Christian targets in the country. However, the group has shown "no capability to attack the West and also has Arab Spring militant groups are not a threat. Bergen 13 (Peter, CNN national security analyst, “Should We Still Fear Al Qaeda,” http://newamerica.net/node/78699) Bergen Peter Bergen is the director of the National Security Program at the New America Foundation The chaotic conditions of several of the countries of the "Arab Spring" are certainly something al Qaeda views as an opportunity. Ayman al-Zawahiri the leader of the group, has issued 27 audio and video statements since the death of bin Laden, 10 of which have focused on the Arab countries that have experienced the revolutions of the past two years. But if history is a guide, the jihadist militants, whether in Syria or elsewhere, are likely to repeat the mistakes and failures that their fellow militants have experienced during the past decade in countries as disparate as Somalia, the Philippines, Yemen, Iraq, Indonesia, Saudi Arabia and now, Mali. That's because encoded in the DNA of al Qaeda and like-minded groups are the seeds of their own destruction because in power they rule like the Taliban, and they also attack fellow Muslims who don't follow their dictates to the letter. This doesn't mesh very well with these organizations' claims that they are the defenders of Muslims. These groups also have no real plans for the multiple political and economic problems that beset much of the Islamic world. And they won't engage in normal politics such as elections believing them to be "un-Islamic." This is invariably a recipe for irrelevance or defeat. In not one nation in the Muslim world since 9/11 has a jihadist militant group seized control of a country. And al Qaeda and its allies' record of effective attacks in the West has been non-existent since 2005. With threats like these we can all sleep soundly at night. Threats are all hype Stewart 15, (Scott Stewart writer for the STRATFOR 5/14/2015. “Don't Take Terrorism Threats at Face Value,” Security Weekly, https://www.stratfor.com/weekly/dont-take-terrorism-threats-face-value.) The Islamic State has demonstrated in the past year that it is quite adept in its use of social media as a tool to raise money, recruit fighters and inspire grassroots jihadists to conduct attacks. This week, however, its social media network was heavily focused on making threats. On May 11, Twitter users associated with the Islamic State unleashed two seemingly unrelated ¶ threat campaigns. One using the hashtag #LondonAttack, displayed photos of London and weapons (including AK-47 rifles and what appeared to be suicide bombs) and urged Muslims in the United Kingdom not to visit shopping The Islamic State took credit for the botched May 3 attack in Garland, Texas, saying it would carry out harder and "more bitter" attacks inside the United States. Coinciding with the Islamic State's threats, FBI Director James Comey warned that his agency does not have a handle on the grassroots terrorism problem in the United States. Department of Homeland Security Secretary Jeh Johnson noted that the United States has entered "a new phase in the global terrorist threat, where the so-called lone wolf could strike at any moment." Michael Morell, the former Deputy Director of the CIA, added his voice by claiming that the Islamic State has the ability to conduct a 9/11-style attack today.¶ While these statements and warnings paint a bleak picture, a threat should never be taken at face value — when placed into context, these claims aren't as dire as they seem.¶ Analyzing Threats¶ When analyzing a direct threat from a person or organization it is important to understand that in most cases they come from a position of weakness rather than power. The old saying "all bark and no bite" is based on this reality. This applies to personal threats as well as terrorrelated threats. Terrorism is frequently used by weak actors as a way of taking asymmetrical military action against a superior opponent. Despite its battlefield successes against the Iraqi and Syrian governments and militant groups, the Islamic State is certainly far weaker militarily than the United States and Europe.¶ An important part of threat evaluation is assessing if the party making the threat possesses both the intention to conduct such an action and the capability to carry out that intent. Indeed, many threats are made by groups or individuals who have neither intent nor capability. They are made simply to create fear and panic or to influence the conduct or behavior of the target, as in the cases of a person who sends a "white powder" letter to a government office or a student who phones in a bomb threat to his school to get out of taking a test.¶ Generally, if a person or group possesses both the intent and capability to conduct an act of violence, they just do it. There is little need to waste the time and effort to threaten what they are about to do. In fact, by telegraphing their intent they might provide their target with the opportunity to avoid the attack. Professional terrorists often invest a lot of time and resources in a plot, especially a spectacular transnational attack. Because of this, they take great pains to hide their operational activity so that the target or authorities do not catch wind of it and employ countermeasures that would prevent the successful execution of the scheme. Instead of telegraphing their attack, terrorist groups prefer to conduct the attack and exploit it after the fact, something malls. The second campaign threatened to launch a cyber war against the United States and Europe. ¶ sometimes called the propaganda of the deed.¶ Certainly, people who possess the capability to fulfill the threat sometimes make threats. But normally in such cases the threat is made in a conditional manner. For example, the United States threatened to invade Afghanistan unless the Taliban government handed over Osama bin Laden. The Islamic State, however, is not in that type of dominating position. If it dispatched a team or teams of professional terrorist operatives to the United States and Europe to conduct terrorist attacks, the very last thing it would want to do is alert said countries to the presence of those teams and have them get rolled up. Trained terrorist operatives Rather than reveal a network of sophisticated Islamic State operatives poised to conduct devastating attacks on the United States and Europe, these who have the ability to travel in the United States or Europe are far too valuable to jeopardize with a Twitter threat.¶ threats are meant to instill fear and strike terror into the hearts of one of their intended audiences: the public at large. I say one of their audiences because these threats are not only aimed at the American and European public. They are also meant to send a message to radicalize and energize grassroots jihadists like those who have conducted Islamic State-related attacks in the West.¶ Examining the Statements¶ First, it is important to understand the context of the statements made by FBI Director Comey, Department of Homeland Security Secretary Johnson and former CIA Deputy Director Morell. ¶ Comey's statement about not having a complete handle on the grassroots terrorist threat is true. The very nature of such operatives makes them difficult for . governments to combat. However, the FBI has been very successful in interdicting grassroots plots in recent months In fact, I cannot recall so many grassroots operatives being arrested so closely together. However, one of the factors driving Comey's recent remarks is his steadfast belief that technological developments, such as encryption, are creating "dark spaces" that the FBI does not have the ability to investigate. Comey contends that there is no place in the physical world that the FBI cannot get a warrant to search, but technology has permitted criminals and terrorists to create virtual places where the FBI simply cannot penetrate even if they procure the proper search warrants. Comey's recent statement is part of his campaign to convince the public and congress that the FBI needs the ability to investigate those places.¶ Secretary Johnson's statement about the new jihadist threat is also nothing new. Indeed, I heard him make the same statement last November and took issue with it then. Leaderless resistance, the terrorist operational model that stresses the importance of lone wolf operatives, is simply not a new problem in the United States. It has existed for decades and been actively promoted in the jihadist world since at least 2004. ¶ Michael Morell is on a book tour and attempting to sell as many books as possible. One way to . If the Islamic State had the capability to launch a 9/11-style attack inside the United States, or a similar spectacular terrorist attack, it would have already done so. Instead, the Islamic State has been forced to rely on grassroots operatives to conduct less than spectacular attacks on its behalf. Furthermore, the pre-9/11 paradigm has changed and there is simply no way an airline captain is going to relinquish control of his aircraft to be used as a guided cruise missile — nor would the passengers permit it. Because of this, it is very hard to imagine the Islamic State conducting a 9/11-style attack. accomplish that is to make eye-popping claims Zero risk of nuclear terrorism – they are wrong about everything Mueller 10 (John Mueller, professor of political science at Ohio State University and author of Atomic Obsession: Nuclear Alarmism from Hiroshima to Al-Qaeda, more qualed than your tool-authors, “Calming Our Nuclear Jitters”, Winter, http://www.issues.org/26.2/mueller.html) A daunting task Politicians of all stripes preach to an anxious, appreciative, and very numerous choir when they, like President Obama, proclaim atomic terrorism to be “the most immediate and extreme threat to global security.” It is the problem that, according to Defense Secretary Robert Gates, currently keeps every senior leader awake at night. This is hardly a new anxiety. In 1946, atomic bomb maker J. Robert Oppenheimer ominously warned that if three or four men could smuggle in units for an atomic bomb, they could blow up New York. This was an early expression of a pattern of dramatic risk inflation that has persisted throughout the nuclear age. In fact, although expanding fires and fallout might increase the effective destructive radius, the blast of a Hiroshima-size device would “blow up” about 1% of the city’s area—a tragedy, of course, but not the same as one 100 times greater. In the early 1970s, nuclear physicist Theodore Taylor proclaimed the atomic terrorist problem to be “immediate,” explaining at length “how comparatively easy it would be to steal nuclear material and step by step make it into a bomb.” At the time he thought it was already too late to “prevent the making of a few bombs, here and there, now and then,” or “in another ten or fifteen years, it will be too late.” Three decades after Taylor, we continue to wait for terrorists to carry out their “easy” task. In contrast to these predictions, terrorist groups seem to have exhibited only limited desire and even less progress in going atomic. This may be because, after brief exploration of the possible routes, they, unlike generations of alarmists, have discovered that the tremendous effort required is scarcely likely to be successful. The most plausible route for terrorists, according to most experts, would be to manufacture an atomic device themselves from purloined fissile material (plutonium or, more likely, highly enriched uranium). This task, however, remains a daunting one, requiring that a considerable series of difficult hurdles be conquered and in sequence. Outright armed theft of fissile material is exceedingly unlikely not only because of the resistance of guards, but because chase would be immediate. A more promising approach would be to corrupt insiders to smuggle out the required substances. However, this requires the terrorists to pay off a host of greedy confederates, including brokers and money-transmitters, any one of whom could turn on them or, either out of guile or incompetence, furnish them with stuff that is useless. Insiders might also consider the possibility that once the heist was accomplished, the terrorists would, as analyst Brian Jenkins none too delicately puts it, “have every incentive to cover their trail, beginning with eliminating their confederates .” If terrorists were somehow successful at obtaining a sufficient mass of relevant material, they would then probably have to transport it a long distance over unfamiliar terrain and probably while being pursued by security forces. Crossing international borders would be facilitated by following established smuggling routes, but these are not as chaotic as they appear and are often under the watch of suspicious and careful criminal regulators . If border personnel became suspicious of the commodity being smuggled, some of them might find it in their interest to disrupt passage, perhaps to collect the bounteous reward money that would probably be offered by alarmed governments once the uranium theft had been discovered. Once outside the country with their precious booty, terrorists would need to set up a large and well-equipped machine shop to manufacture a bomb and then to populate it with a very select team of highly skilled scientists, technicians, machinists, and administrators. The group would have to be assembled and retained for the monumental task while no consequential suspicions were generated among friends, family, and police about their curious and sudden absence from normal pursuits back home. Members of the bomb-building team would also have to be utterly devoted to the cause, of course, and they would have to be willing to put their lives and certainly their careers at high risk, because after their bomb was discovered or exploded they would probably become the targets of an intense worldwide dragnet operation. Some observers have insisted that it would be easy for terrorists to assemble a crude bomb if they could get enough fissile material. But Christoph Wirz and Emmanuel Egger, two senior physicists in charge of nuclear issues at Switzerland‘s Spiez Laboratory, bluntly conclude that the task “could hardly be accomplished by a subnational group.” They point out that precise blueprints are required, not just sketches and general ideas, and that even with a good blueprint the terrorist group would most certainly be forced to redesign. They also stress that the work is difficult, dangerous, and extremely exacting, and that the technical requirements in several fields verge on the unfeasible. Stephen Younger, former director of nuclear weapons research at Los Alamos Laboratories, has made a similar argument, pointing out that uranium is “exceptionally difficult to machine” whereas “plutonium is one of the most complex metals ever discovered, a material whose basic properties are sensitive to exactly how it is processed.“ Stressing the “daunting problems associated with material purity, machining, and a host of other issues,” Younger concludes, “to think that a terrorist group, working in isolation with an unreliable supply of electricity and little access to tools and supplies” could fabricate a bomb “is farfetched at best.” Under the best circumstances, the process of making a bomb could take months or even a year or more, which would, of course, have to be carried out in utter secrecy. In addition, people in the area, including criminals, may observe with increasing curiosity and puzzlement the constant coming and going of technicians unlikely to be If the effort to build a bomb was successful, the finished product, weighing a ton or more, would then have to be transported to and smuggled into the relevant target country where it would have to be received by collaborators who are at once totally dedicated and technically proficient at handling, maintaining, detonating, and perhaps assembling the weapon after it arrives. The financial costs of this extensive and extended operation could easily become monumental. There would be expensive equipment to buy, smuggle, and set up and people to pay or pay off. Some operatives might work for free out of utter dedication to the cause, but the vast conspiracy also requires the locals. subversion of a considerable array of criminals and opportunists, each of whom has every incentive to push the price for cooperation as high as possible. Any criminals competent and capable enough to be effective allies are also likely to be both smart enough to see boundless opportunities for extortion and psychologically equipped by their profession to be willing to exploit them. Those who warn about the likelihood of a terrorist bomb contend that a terrorist group could, if with great difficulty, overcome each obstacle and that doing so in each case is “not impossible.” But although it may not be impossible to surmount each individual step, the likelihood that a group could surmount a series of them quickly becomes vanishingly small. Table 1 attempts to catalogue the barriers that must be overcome under the scenario considered most likely to be successful. In contemplating the task before them, would-be atomic terrorists would effectively be required to go though an exercise that looks much like this. If and when they do, they will undoubtedly conclude that their prospects are daunting and accordingly uninspiring or even terminally dispiriting. It is possible to calculate the chances for success. Adopting probability estimates that purposely and heavily bias the case in the terrorists’ favor—for example, assuming the terrorists have a 50% chance of overcoming each of the 20 obstacles—the chances that a concerted effort would be successful comes out to be less than one in a million. If one assumes, somewhat more realistically, that their chances at each barrier are one in three, the cumulative odds that they will be able to pull off the deed drop to one in well over three billion. Other routes would-be terrorists might take to acquire a bomb are even more problematic. They are unlikely to be given or sold a bomb by a generous like-minded nuclear state for delivery abroad because the risk would be high, even for a country led by extremists, that the bomb (and its source) would be discovered even before delivery or that it would be exploded in a manner and on a target the donor would not approve, including on the donor itself. Another concern would be that the terrorist group might be infiltrated by foreign intelligence. The terrorist group might also seek to steal or illicitly purchase a “loose nuke“ somewhere. However, it seems probable that none exist. All governments have an intense interest in controlling any weapons on their territory because of fears that they might become the primary target. Moreover, as technology has developed, finished bombs have been out-fitted with devices that trigger a non-nuclear explosion that destroys the bomb if it is tampered with. And there are other security techniques: Bombs can be kept disassembled with the component parts stored in separate highsecurity vaults, and a process can be set up in which two people and multiple codes are required not only to use the bomb but to store, maintain, and deploy it. As Younger points out, “only a few people in the world have the knowledge to cause an unauthorized detonation of a nuclear weapon.” There could be dangers in the chaos that would emerge if a nuclear state were to utterly collapse; Pakistan is frequently cited in this context and sometimes North Korea as well. However, even under such conditions, nuclear weapons would probably remain under heavy guard by people who know that a purloined bomb might be used in their own territory. They would still have locks and, in the case of Pakistan, the weapons would be disassembled. Terror threat assessments are biased Zenko 14 (Michael Zenko, Douglas Dillon Fellow, Conflict prevention; U.S. national security policy; military planning and operations; nuclear weapons policy “When Terrorism (That Never Happened) Made Headlines in Sochi,” Foreign Policy http://www.cfr.org/russianfederation/terrorism-never-happened-made-headlines-sochi/p32478) In the lead-up to the Winter Olympics, a fear-mongering media merely listened to alarmist policymakers and privileged the aspirational statements of marginalized terrorist groups. By irresponsibly providing little context for such threatening language, the media conditioned citizens to assume that violent attacks against innocent people were a near certainty. It all started on Jan. 19, when Vilayat Dagestan, an affiliate of insurgent group Ansar alSunna, released a video statement in which two Islamist militants announced an intention to carry out jihadi attacks throughout Russia and promised a "present" for Russian President Vladimir Putin at the Olympics. This video came three weeks after two suicide attacks at a train station and on a trolley bus -- 400 miles from the Olympic Village in Volgograd -- that collectively killed 34 and injured up to 104. Congressional members, purportedly relying on classified briefings, subsequently made the case that Sochi was not at all secure. Rep. Mike Rogers, chair of the House Permanent Select Committee on Intelligence, said "We can only hope that they'll find those individuals before they're able to penetrate any of the rings. And I don't believe that the terrorists think they have … to have a terrorist attack on a particular venue. They just have to have some disruptive event somewhere." Rep. Peter King warned: "I cannot give [U.S. athletes] 100 percent guarantee. The fact is that these are going to be very much threatened Olympics." Rep. Michael McCaul, chair of the House Homeland Security Committee, even went so far as to say that canceling the games should have been considered, saying, "I think there's a high degree of probability that something will detonate, something will go off." The list of policymakers goes on. In short, they chose sound bites over a balanced communication of the risks posed to Americans traveling to Sochi. News reports repeated and amplified this narrative by warning about the proliferation of "black widows," women seeking revenge for husbands or family members killed by security forces: "Urgent Search for 'Black Widow' Suicide Bomber, May Be Already in Sochi" was one headline. During the six months leading up to the opening ceremony, the New York Times ran 72 articles about the Olympics that mentioned the threat of terrorism. USA Today reported that most of the major sponsors of the Winter Games had prepared "ads of compassion and support that could air following any incidents of terrorism." Unsurprisingly, in a CNN/ORC poll conducted during the week prior to the opening ceremony, 57 percent of Americans surveyed believed that a terrorist attack of some sort was likely at the Olympics. Politicians and the media could have handled this more responsibly by communicating not only the probability of a terrorist attack at Sochi, but by reporting the true extent of terrorism throughout Russia. Historically, Russia has suffered greatly from terrorism. In the 20-year period between 1992 and 2012, the country ranked seventh in the world for total terrorist attacks and related deaths, according to the National Consortium for the Study of Terrorism and Responses to Terrorism. However, this statistic does not reveal the whole story of terrorism in Russia or the threat posed in Sochi specifically. The group also reports that Russia was not among the top 10 countries for total attacks in 2012. Moreover, the frequency of attacks decreased during the first half of 2013, and fewer than 50 percent of these resulted in one or more fatalities. (Data is not yet available for all of 2013.) Since 1992, more than 70 percent of attacks have occurred in Chechnya, Dagestan, and Ingushetia, and only eight attacks -- fewer than 0.5 percent -- have taken place in Krasnodar Krai, where Sochi is located. Moreover, while it is estimated that Chechen groups carried out 17 percent of the attacks between 1992 and 2012, the remaining attacks were carried out by other active groups in Russia. According to the Russian government, half of terrorist incidents in 2012 targeted local law enforcement and security forces, not civilians. Thus, while a terrorist attack is always a possibility in Russia -- as well as in the 80 other countries where terrorism is present -- an attack against civilians in Sochi was always highly unlikely. Moreover, congressional leaders could have pointed out that Chechen militant groups are losers. All three respected data sets that evaluate the successes of terrorist organizations found that Chechen groups largely failed to achieve their political or territorial objectives. What Vilayat Dagestan achieved by releasing a video was instant credibility, and the sort of free promotional airtime that is invaluable. In 1975, terrorism scholar Brian Jenkins observed, "Terrorists want a lot of people watching, not a lot of people dead." The media obviously needs people watching or reading, no matter what the issue. Inflating the probability and severity of terrorism is unfortunately a reliable way to achieve this. Thankfully, there were no terrorism incidents during the Winter Olympics. But with the World Cup kicking off in 107 days in Brazil, the media has plenty of time to yet again worry about the worst outcomes and emphasize the (implausible) potential threats to increase viewership. Statistically impossible Mueller 09 ( John Mueller, Woody Hayes Chair of National Security Studies, Mershon Center Professor of Political Science 30 April 2009 “THE ATOMIC TERRORIST?” http://www.icnnd.org/research/Mueller_Terrorism.pdf) In an article on the prospects for atomic terrorism, Bill Keller of The New York Times suggests that “the best reason for thinking it won’t happen is that it hasn’t happened yet,” and that, he worries, “is terrible logic.”33 However, “logic” aside, there is another quite good reason for thinking it won’t happen: the task is incredibly difficult. I have arrayed a lengthy set of obstacles confronting the would-be atomic terrorist. Those who warn about the likelihood of a terrorist bomb contend that a terrorist group could, if often with great difficulty, surmount each obstacle—that doing so in each case is “not impossible.”34 But it is vital to point out that, while it may be “not impossible” to surmount each individual step, the likelihood that a group could surmount a series of them quickly becomes vanishingly small. Even the very alarmed Matthew Bunn and Anthony Wier contend that the atomic terrorists’ task “would clearly be among the most difficult types of attack to carry out” or “one of the most difficult missions a terrorist group could hope to try.” But, stresses the CIA’s George Tenet, a terrorist atomic bomb is “possible” or “not beyond the realm of possibility.”35 Accordingly, it might be useful to take a stab at estimating just how “difficult” the atomic terrorists’ task, in aggregate, is—that is, how far from the fringe of the “realm of possibility” it might be. Most discussions of atomic terrorism deal in a rather piecemeal fashion with the subject--focusing separately on individual tasks such as procuring HEU or assembling a device or transporting it. However, as the Gilmore Commission, a special advisory panel to the President and Congress, stresses, setting off a nuclear device capable of producing mass destruction presents not only “Herculean challenges,” but it requires that a whole series of steps be accomplished: obtaining enough fissile material, designing a weapon “that will bring that mass together in a tiny fraction of a second,” and figuring out some way to deliver the thing. And it emphasizes that these merely constitute “the minimum requirements.” If each is not fully met, the result is not simply a less powerful weapon, but one that can’t produce any significant nuclear yield at all or can’t be delivered.36 Following this perspective, an approach that seems appropriate is to catalogue the barriers that must be overcome by a terrorist group in order to carry out the task of producing, transporting, and then successfully detonating an improvised nuclear device. Table 1 attempts to do this, and it arrays some 20 of these—all of which must be surmounted by the atomic aspirant. Actually, it would be quite possible to come up with a longer list: in the interests of keeping the catalogue of hurdles down to a reasonable number, some of the entries are actually collections of tasks and could be divided into two or three or more. For example, number 5 on the list requires that heisted highly-enriched uranium be neither a scam nor part of a sting nor of inadequate quality due to insider incompetence; but this hurdle could as readily be rendered as three separate ones. In contemplating the task before them, would-be atomic terrorists effectively must go though a exercise that looks much like this. If and when they do so, they are likely to find their prospects daunting and accordingly uninspiring or even terminally dispiriting. Assigning and calculating probabilities The discussion thus far has followed a qualitative approach: synthesizing a considerable amount of material to lay out the route a terrorist group must take to acquire and detonate an atomic bomb in the most likely scenario . It seems to me that this exercise by itself suggests the almost breathtaking enormity of the difficulties facing the would-be atomic terrorist. This conclusion can be reinforced by a quantitative assessment. Assigning a probability that terrorists will be able to overcome each barrier is, of course, a tricky business, and any such exercise should be regarded as rather tentative and exploratory, or perhaps simply as illustrative—though it is done all the time in cost/benefit analysis. One might begin a quantitative approach by adopting probability estimates that purposely, and heavily, bias the case in the terrorists’ favor. In my view, this would take place if it is assumed that the terrorists have a fighting chance of 50 percent of overcoming each of the 20 obstacles displayed in Table 1, though for many barriers, probably almost all, the odds against them are surely much worse than that. Even with that generous bias, the chances that a concerted effort would be successful comes out to be less than one in a million, specifically 1,048,576. If one assumes, somewhat more realistically, that their chances at each barrier are one in three, the cumulative odds they will be able to pull off the deed drop to one in well over three billion—specifically 3,486,784,401. What they would be at the (still entirely realistic) level of one in ten boggles the mind. Moreover, all this focuses on the effort to deliver a single bomb. If the requirement were to deliver several, the odds become, of course, even more prohibitive. Link Answers Data hasn’t revealed any information on new terrorists Schwartz 15 Matthatias Schwartz, January 26, 2015, The New Yorker, “The Whole Haystack,” http://www.newyorker.com/magazine/2015/01/26/whole-haystack, Almost every major terrorist attack on Western soil in the past fifteen years has been committed by people who were already known to law enforcement. One of the gunmen in the attack on Charlie Hebdo, in Paris, had been sent to prison for recruiting jihadist fighters. The other had reportedly studied in Yemen with Umar Farouk Abdulmutallab, the underwear bomber, who was arrested and interrogated by the F.B.I. in 2009. The leader of the 7/7 London suicide bombings, in 2005, had been observed by British intelligence meeting with a suspected terrorist, though MI5 later said that the bombers were “not on our radar.” The men who planned the Mumbai attacks, in 2008, were under electronic surveillance by the United States, the United Kingdom, and India, and one had been an informant for the Drug Enforcement Administration. One of the brothers accused of bombing the Boston Marathon was the subject of an F.B.I. threat assessment and a warning from Russian intelligence In each of these cases, the authorities were not wanting for data. What they failed to do was appreciate the significance of the data they already had. Nevertheless, since 9/11, the National Security Agency has sought to acquire every possible scrap of digital information—what General Keith Alexander, the agency’s former head, has called “the whole haystack.” The size of the haystack was revealed in June, 2013, by Edward Snowden. The N.S.A. vacuums up Internet searches, social-media content, and, most controversially, the records (known as metadata) of United States phone calls—who called whom, for how long, and from where. The agency stores the metadata for five years, possibly longer. Having data doesn’t necessarily mean action, 9/11 proves Schwartz 15 Matthatias Schwartz, January 26, 2015, The New Yorker, “The Whole Haystack,” http://www.newyorker.com/magazine/2015/01/26/wholehaystack, In retrospect, every terrorist attack leaves a data trail that appears to be dotted with missed opportunities. In the case of 9/11, there was Mihdhar’s landlord, the airport clerk who sold Mihdhar his one-way ticket for cash, and the state trooper who pulled over another hijacker on September 9th. In August, 2001, F.B.I. headquarters failed to issue a search warrant for one of the conspirators’ laptops, despite a warning from the Minneapolis field office that he was “engaged in preparing to seize a Boeing 747-400 in commission of a terrorist act.” There was plenty of material in the haystack. The government had adequate tools to collect even more. The problem was the tendency of intelligence agencies to hoard information, as well as the cognitive difficulty of anticipating a spectacular and unprecedented attack. The 9/11 Commission called this a “failure of the imagination.” Finding needles, the commission wrote in its report, is easy when you’re looking backward, deceptively so. They quoted the historian Roberta Wohlstetter writing about Pearl Harbor: It is much easier after the event to sort the relevant from the irrelevant signals. After the event, of course, a signal is always crystal clear; we can now see what disaster it was signaling since the disaster has occurred. But before the event it is obscure and pregnant with conflicting meanings. Surveillance doesn’t increase security Schwartz 15 Matthatias Schwartz, January 26, 2015, The New Yorker, “The Whole Haystack,” http://www.newyorker.com/magazine/2015/01/26/whole-haystack, Before the event, every bit of hay is potentially relevant. “The most dangerous adversaries will be the ones who most successfully disguise their individual transactions to appear normal, reasonable, and legitimate,” Ted Senator, a data scientist who worked on an early post-9/11 program called Total Information Awareness, said, in 2002. Since then, intelligence officials have often referred to “lone-wolf terrorists,” “cells,” and, as Alexander has put it, the “terrorist who walks among us,” as though Al Qaeda were a fifth column, capable of camouflaging itself within civil society . Patrick Skinner, a former C.I.A. case officer who works with the Soufan Group, a security company, told me that this image is wrong. “We knew about these networks,” he said, speaking of the Charlie Hebdo attacks. Mass surveillance, he continued, “gives a false sense of security. It sounds great when you say you’re monitoring every phone call in the United States. You can put that in a PowerPoint. But, actually, you have no idea what’s going on.” Less data leads to effective data, the aff is key to solve terrorism Schwartz 2015 (Mattathias Schwartz is a staff writer for The New Yorker The Whole Haystack Jan 26 www.newyorker.com/magazine/2015/01/26/whole-haystack) Before the event, every bit of hay is potentially relevant. “The most dangerous adversaries will be the ones who most successfully disguise their individual transactions to appear normal, reasonable, and legitimate,” Ted Senator, a data scientist who worked on an early post-9/11 program called Total Information Awareness, said, in 2002. Since then, intelligence officials have often referred to “lone-wolf terrorists,” “cells,” and, as Alexander has put it, the “terrorist who walks among us,” as though Al Qaeda were a fifth column, capable of camouflaging itself within civil society. Patrick Skinner, a former C.I.A. case officer who works with the Soufan Group, a security company, told me that this image is wrong. “ We knew about these networks,” he said, speaking of the Charlie Hebdo attacks. Mass surveillance, he continued, “gives a false sense of security. It sounds great when you say you’re monitoring every phone call in the United States. You can put that in a PowerPoint. But, actually, you have no idea what’s going on.” By flooding the system with false positives, big-data approaches to counterterrorism might actually make it harder to identify real terrorists before they act. Two years before the Boston Marathon bombing, Tamerlan Tsarnaev, the older of the two brothers alleged to have committed the attack, was assessed by the city’s Joint Terrorism Task Force. They determined that he was not a threat. This was one of about a thousand assessments that the Boston J.T.T.F. conducted that year, a number that had nearly doubled in the previous two years, according to the Boston F.B.I. As of 2013, the Justice Department has trained nearly three hundred thousand law-enforcement officers in how to file “suspicious-activity reports.” In 2010, a central database held about three thousand of these reports; by 2012 it had grown to almost twenty-eight thousand. “The bigger haystack makes it harder to find the needle,” Sensenbrenner told me. Thomas Drake, a former N.S.A. executive and whistle-blower who has become one of the agency’s most vocal critics, told me, “If you target everything, there’s no target.” Drake favors what he calls “a traditional law-enforcement” approach to terrorism, gathering more intelligence on a smaller set of targets. Decisions about which targets matter, he said, should be driven by human expertise, not by a database. Paris proves, too much information is a bad thing. Volz 15 Dustin Volz, January 21, 2015, National Journal, “Snowden: France’s ‘Intrusive’ Surveillance Failed to Stop Paris Attacks,” http://www.nationaljournal.com/tech/snowden-france-s-intrusive-surveillance-laws-failed-to-stop-paris-attacks-20150121 Edward Snowden is pointing to the recent terrorist attacks in France as evidence that government masssurveillance programs don't work because they are "burying people under too much data." "When we look at the Paris attacks specifically, we see that France passed one of the most intrusive, expansive surveillance laws in all of Europe last year, and it didn't stop the attack," the fugitive leaker said in an interview with NOS, a Dutch news organization, released Wednesday. "And this is consistent with what we've seen in every country." NSA programs don’t stop terrorism, no proof of it working. Bergen 13 Bergen, et al, September 2013, Jihadist Terrorism: A Threat Assessment, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Bergen Peter Bergen is the director of the National Security Program at the New America Foundation Earlier this year, it was revealed that the National Security Agency (NSA) has been collecting phone-records metadata from Americans for many years and that it had secured the right to access overseas Internet traffic and content from every U.S. Internet service.317 This sparked a debate between those who saw an overly expansive government fishing expedition that infringed Americans’ privacy and those who pointed out that the NSA programs were carefully managed to protect the rights of American citizens. Beyond the privacy issues that the NSA programs raise: How successful have these programs been in interrupting terrorist plots? So far the evidence on the public record suggests that the programs have been of far less utility than recent U.S. government claims about their ability to disrupt terrorist plots.¶ Sometime in late 2007, Basaaly Saeed Moalin, a cabdriver living in San Diego, began a series of phone conversations with Aden Hashi Ayrow, one of the leaders of al-Shabaab.He had no idea the NSA was listening in. In one of those 3 phone calls, Ayrow urged Moalin to send money to al-Shabaab, telling him that he urgently needed several thousand dollars. At one point, Ayrow told Moalin that it was “time to finance the jihad” and at another: “You are running late with the stuff. Send some and something will happen.” Over several months in 2008, Moalin transferred thousands of dollars to al-Shabaab. He even told Ayrow that he could use his house in Mogadishu, and “after you bury your stuff deep in the ground, you would, then, plant the trees on top.”320 U.S. prosecutors later asserted that Moalin was offering his house to al-Shabaab as a place to hide weapons, and earlier this year, he was convicted of conspiracy to provide material support to al-Shabaab and of money laundering for the terrorist organization.321 However , there is nothing on the public record to suggest he was planning an attack in the United States. Another terrorist financier detected by NSA surveillance was Khalid Ouazzani, a Moroccan native and naturalized American living in Kansas City, Missouri. Sometime in 2008, Ouazzani swore an oath of allegiance to al-Qaeda and sent around $23,000 to the group before he was arrested two years later.322 In June 2013, at a hearing for the House Select Committee on Intelligence on the NSA surveillance programs, FBI Deputy Director Sean Joyce testified that Ouazzani also had some kind of a “nascent” plan to attack the New York Stock Exchange. Ouazzani’s attorney denied that claim and court documents in his case do not mention any such plan. At the same hearing, Joyce and other top government officials pointed to these two cases as examples of the kinds of terrorist conspiracies NSA surveillance has disrupted in recent years, but they gave no new public information to substantiate a claim made by General Keith Alexander, NSA’s director, a week earlier that “dozens of terrorist events” had been averted both in the United States and abroad.324 Alexander said he would provide members of the House Intelligence Committee with additional information about the some 50 other terrorist plots that had been averted as a result of NSA surveillance, but this would be behind closed doors as the details of these plots remain classified. Speaking at Black Hat, an information-security conference, a month later, General Alexander provided more specific numbers, saying that NSA surveillance had prevented 54 terrorist-related activities worldwide, including 13 terrorist activities within the United States. The public record suggests that few of these plots involved attacks within the United States, because traditional law enforcement methods have overwhelmingly played the most significant role in foiling terrorist attacks. According to a survey by the New America Foundation, jihadist extremists based in the United States have mounted 47 plots to conduct attacks within the United States since 2001.326 Of those plots, nine involved an actual terrorist act that was not prevented by any type of government action, such as the 2009 shooting spree at Fort Hood, Texas. Of the remaining 38 plots, the public record shows that at least 33 were uncovered by using standard policing practices such as informants, undercover officers, and tips to law enforcement. At the House Intelligence Committee hearing, the FBI’s Sean Joyce also pointed to the 2009 plots by Najibullah Zazi as well as David Coleman Headley’s plan to attack a Danish newspaper as attacks that were also disrupted by NSA monitoring. As Joyce explained, the plot by Zazi to attack the New York subway system around the eighth anniversary of the 9/11 attacks was “the first core al-Qaeda plot since 9/11” that was directed from Pakistan inside the United States.327 There is no doubt that it was a serious plot, but if it was the only such plot on U.S. soil that the government averted as a result of the NSA’s surveillance monitoring, the public will have to decide whether it justifies the large-scale government surveillance programs—no matter how carefully they are run. NSA Telephone tracking has the potential for abuse, and there is no record it has been effective against terrorism. Bergen 13 Peter Bergen, 9-10, 13, http://bipartisanpolicy.org/sites/default/files/Jihadist%20Terrorism-A%20Threat%20Assesment_0.pdf Bergen Peter Bergen is the director of the National Security Program at the New America Foundation BERGEN: Well, one way of answering that is -- I've -- talking about the NSA, obviously there's a debate, I mean, the vote was very close in House -- in -- in Congress, on this issue. And one of the -- one of the points we make in the report is, as far as we can tell from the public record, only one case -- what is controversial in the United States is, the telephone metadata; Americans care less about overseas e-mail traffic. As far as we can tell, only one case of the 212 cases since 9/11 came out of the telephone program, and it's a rather trivial case. It was a guy in San Diego who was sending money to Al-Shabaab, a few thousand dollars -- the Somalia al-Qaeda affiliate. Now, you know, sending money to Al-Shabaab is not something one -- one would want to encourage, but if the price of finding this one case is the government having access to all your phone records for the past five years, no matter how carefully they manage that program, who's to say that some future administration, five years down the road, doesn't have quite the same view of the way the -- the data should be handled. So, I mean, that -- that would be question one, is are we in a situation -- I mean, I was astonished by this New York Times story where, you know, essentially every -- any program you use in the United States on a computer has a mandated back door into it that the NSA can basically can get into. Is not -- it seems a sort of fundamentally kind of un-American concept, that basically everything that you -- and obviously, the people involved in this are well- intentioned. So I think we're doing a lot of the right things. We've had a long time over the last 12 years to get our counterterrorism policy right. We make some recommendations in the report, but I don't think there's some huge sort of magic wand that needs to be waved over the situation, but personally, and like a lot of other Americans, I am concerned about what seems to be this huge kind of grab of executive power on the issue of our private communications. Which, by the way, it would be one thing if you could say, "Hey, all these NSA -- every terrorism case that we've found in this country was because of NSA surveillance." As we say in the report, in fact, almost every case that is made is based on the typical things that make any criminal case: a suspicious activity report in 9 percent of these cases, a tip from a family or community member in 33 percent of these cases, an undercover cop or -- or an informer in about half of these cases. That's how these cases are made. Capitol attacks were prevented by preexisting measures, not surveillance. Hattem 15 Julian Hattem, January 20, 2015, The Hill, “GOP Faces PATRIOT Act Choice,” http://thehill.com/policy/defense/229990-gopheaded-for-battle-over-the-patriot-act “I’m going to say this one more time because you’re going to hear about it for months and months to come as we attempt to reauthorize the FISA program,” he added. “Our government does not spy on Americans, unless they are Americans who are doing things that frankly tip off our law enforcement officials to an imminent threat.” Critics of the spy agency were quick to question Boehner’s take on the Capitol plot. The FBI said it relied on Twitter messages and an undercover source to gather information about the suspect, Christopher Cornell — not wiretaps or call records. “[T]here is every reason to be extremely skeptical of the implication that the [Section] 215 database, or indeed, any novel FISA authorities, played an essential role in the investigation of Cornell,” Julian Sanchez, a senior research fellow at the libertarian Cato Institute, wrote in a blog post on Friday. Section 215 has played a minimal role in stopping terrorist plots. Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading.* An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined. NSA Surveillance played a minor role in terror plots Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading.* An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined. Mass surveillance kills law enforcement coop with US-Arab Americans – that’s key to check terror. Risen 14 (Internally quoting Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Tom Risen is a reporter for U.S. News & World Report. “Racial Profiling Reported in NSA, FBI Surveillance” - U.S. News & World Report - July 9, 2014 http://www.usnews.com/news/articles/2014/07/09/racial-profiling-reported-in-nsa-fbi-surveillance) The National Security Agency and the FBI have reportedly been overzealous trying to prevent terrorist attacks to the point that anti-Islamic racism in those agencies led to the surveillance of prominent MuslimAmericans, revealing a culture of racial profiling and broad latitude for spying on U.S. citizens. An NSA document leaked by former agency contractor Edward Snowden to reporter Glenn Greenwald shows 202 Americans targeted among the approximately 7,485 email addresses monitored between 2002 and 2008, Greenwald’s news service The Intercept reports . To monitor Americans, government agencies must first make the case to the Foreign Intelligence Surveillance Court that there is probable cause that the targets are terrorist agents, foreign spies or “are or may be” abetting sabotage, espionage or terrorism. Despite this filter The Intercept identified five MuslimAmericans with high public profile including civil rights leaders, academics, lawyers and a political candidate. Racial profiling of Muslims by security officers has been a controversy since the terrorist attacks of 2001 spiked fears about al-Qaida trainees preparing more attacks. The New York Police Department has disbanded its unit that mapped New York’s Muslim communities that designated surveillance of mosques as “terrorism enterprise investigations” after pressure from the Justice Department about aggressive monitoring by police. A 2005 FBI memo about surveillance procedures featured in The Intercept story uses a fake name “Mohammed Raghead” for the agency staff exercise. This latest report about email surveillance of successful Muslim-Americans is akin to “McCarthyism” that fed paranoia about communist spies during the Cold War, says Reza Aslan, a professor at the University of California, Riverside. “The notion that these five upstanding American citizens, all of them prominent public individuals, represent a threat to the U.S. for no other reason than their religion is an embarrassment to the FBI and an affront to the constitution,” Aslan says. There is a risk of radicalization among citizens Americans, evidenced by some who have gone to fight jihads in Syria and Somalia, but mass shootings carried out by U.S. citizens of various racial backgrounds occurs much more often, says Vanda Felbab-Brown, a senior fellow on foreign policy at the Brookings Institution. Since 1982, there have been at least 70 mass shootings across the U.S. “We have seen very little domestic terrorism in the U.S.,” Felbab-Brown says. This lack of terrorism is due in part to the willingness of the Islamic community to cooperate with law enforcement to identify possible radical threats, out of gratitude that the U.S. is a stable, secure country compared with the Middle East, she says. “That could go sour if law enforcement becomes too aggressive, too extreme,” she says. Empirically false – 215 program once temporarily ENDED. That didn’t cause the disad – neither will the Aff. Globe and Mail 15 (Globe editorial – “The end of US ‘bulk telephony collection,’ and the lessons for Canada” - The Globe and Mail Jun. 14, 2015 - http://www.theglobeandmail.com/globe-debate/editorials/the-end-of-us-bulk-telephony-collection-and-the-lessons-forcanada/article24948261/) For a few days, there was a happily yawning gap in the U.S. National Security Agency’s ability to surveil American citizens. Congress could not agree on how – or whether – to renew the section of the foolishly named Patriot Act that had allowed the government to scoop up and hold all the metadata (identifying both callers and addressees) of all cellphone calls in the U.S. The Foreign Intelligence Surveillance Court would then grant or, at least sometimes, not grant, access to the actual contents of the conversations – in other words, a search warrant. The upshot – under the new U.S.A. Freedom Act (officially, the “Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015”) – is that phone companies, not the NSA and the FBI, will record and store all the metadata for all phone calls. Those agencies will no longer be able to get at that kind of data at will, indiscriminately. The security agencies will have to apply to the FISC court for metadata, too. That’s progress, though FISC may be a bit of a rubber stamp. There is, by the way, no sign that terrorists attacked the United States in the unsurveilled interval between the Patriot Act section and the Freedom Act. Surveillance makes counter-terror tools ineffective Corrigan 2015 (Ray Corrigan is a senior lecturer in mathematics, computing, and technology at the Open University, U.K. Mass Surveillance Will Not Stop Terrorism Jan 25 www.slate.com/articles/health_and_science/new_scientist/2015/01/mass_surveillance_against_terrorism_gathering_intelligence_on_all_is_st atisically.html) Police, intelligence, and security systems are imperfect. They process vast amounts of imperfect intelligence data and do not have the resources to monitor all known suspects 24/7. The French authorities lost track of these extremists long enough for them to carry out their murderous acts. You cannot fix any of this by treating the entire population as suspects and then engaging in suspicionless, blanket collection and processing of personal data. Mass data collectors can dig deeply into anyone’s digital persona but don’t have the resources to do so with everyone. Surveillance of the entire population, the vast majority of whom are innocent, leads to the diversion of limited intelligence resources in pursuit of huge numbers of false leads. Terrorists are comparatively rare, so finding one is a needle-in-a-haystack problem. You don’t make it easier by throwing more needleless hay on the stack. It is statistically impossible for total population surveillance to be an effective tool for catching terrorists. Even if your magic terrorist-catching machine has a false positive rate of 1 in 1,000—and no security technology comes anywhere near this—every time you asked it for suspects in the U.K. it would flag 60,000 innocent people. Law enforcement and security services need to be able to move with the times, using modern digital technologies intelligently and through targeted data preservation—not a mass surveillance regime—to engage in court-supervised technological surveillance of individuals whom they have reasonable cause to suspect. That is not, however, the same as building an infrastructure of mass surveillance. Mass security services more difficult and the rest of us less secure. surveillance makes the job of the Section 702 Answers Section 702 hardly played a role in stopping terrorist plots Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading.* An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined. Section 702 played a minimal role in stopping David Coleman Headley. Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) David Coleman Headley plotted to attack the Danish newspaper Jyllands-Posten in Copenhagen in 2009. The newspaper had become the focus of controversy after publishing cartoons depicting the Prophet Mohammed . The U.S. government has claimed that it used NSA surveillance under Section 702 to identify Headley as a threat and prevent the attack.26,27 Tahawwur Rana, a Chicago businessman who allowed Headley to use his travel agency as a front, was found guilty of providing support to Headley’s activities after Headley gave extensive testimony against him at trial. However, the NSA’s bulk surveillance programs likely played only a secondary role, if any, to British intelligence in discovering Headley’s plotting. In June 2009, Headley was planning to meet with two British extremists who were already under surveillance in the United Kingdom. Headley, who played a key role in planning the 2008 terrorist attacks in Mumbai, confirmed that he had met these two extremists in Britain when he was later interrogated by Indian authorities following his arrest in October 2009.28 According to reports by ProPublica, this meeting between Headley and the British extremists sparked the investigation into Headley, and the NSA’s role was merely following up and identifying the individual in question as Headley.29 Moreover, the government had received multiple tips over the years from individuals who knew Headley, including two of his wives, that he was likely a terrorist. So, even if the NSA played some kind of role in building the case against Headley, his case represents a colossal failure of the counterterrorism apparatus, which despite receiving multiple tips, failed to catch Headley, even after he assisted with the 2008 Mumbai attacks.30 The main lesson from the Headley case should be the need for better information-sharing between law enforcement and intelligence agencies – not the development of a sprawling collection system. Section 702 played little to no role in stopping Najibullah Zazi. Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) This case involved a foiled plot by Colorado resident Najibullah Zazi and two co-conspirators in New York, Zarein Ahmedzay and Adis Medunjanin, to bomb the New York City subway system in 2009 . The government has claimed the case as an NSA success.31 Yet, the Zazi case was initiated not by the NSA but by British intelligence, according to a senior U.S. counterterrorism official with direct knowledge of the case whom we consulted. Also, although the NSA was involved in intercepting Zazi’s email to an al-Qaeda operative in Pakistan, this was an instance where the same result could have been obtained through traditional targeted investigative methods. The email address Zazi communicated with was known to belong to an al-Qaeda figure for at least five months prior to the NSA’s interception of Zazi’s email, due to a British intelligence operation in April 2009.32 The British shared their findings with U.S. intelligence, which then chose to use the NSA surveillance program to monitor the email address. The knowledge that the email address was that of an alQaeda associate would have been The NSA may have opted to use the Section 702 authority, but the case, as currently explained in the public record, does not provide evidence for the need for bulk surveillance authorities. It is also worth noting that the contribution from the bulk collection of Americans’ telephone metadata under Section 215 sufficient to obtain a traditional, targeted criminal or FISA warrant for the email’s contents.33 was minimal, at best, in this case. The FBI identified a phone number included in Zazi’s email and ran it against the NSA’s phone metadata collected under Section 215 authority.34 The query This brings into question how the government measures the “contribution” of the NSA to terrorism cases and whether the “contributions” cited by officials reflect important and unique contributions to those cases by the NSA provided a previously unknown second phone number belonging to Adis Medunjanin, one of Zazi’s co-conspirators, who was already a suspect in the plot. Section 702 didn’t play much of a role in Khalid Quazzani Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) Khalid Ouazzani, a Kansas City small business owner, and his two co-conspirators, Sabirhan Hasanoff, a New York accountant, and Wesam ElHanafi, a New York computer engineer, provided tens of thousands of dollars to al-Qaeda figures over a number of years. One of Ouazzani’s co-conspirators also cased the New York Stock Exchange for a potential attack and produced a report for their handlers, though the plot was more notional than operational. The U.S. government has cited surveillance conducted under Section 702 as the cause of its investigation.35 While little evidence is available to contest the government’s assertion that the NSA under Section 702 played a role in this investigation, the seriousness of the threat is debatable. Even the government noted in a sentencing memorandum that the casing of the New York Stock Exchange by one of the defendants resulted in only a one-page report that was “rudimentary and of limited use.”36 During an interrogation, one of their contacts overseas (whose name was redacted in court documents) denied that there was “any real intention to plan or coordinate such an operation.”37 The plot was not a serious threat, though the contact these defendants had with foreign terrorists, which led them to provide a total of about $67,000 and supplies to their contacts abroad, was certainly worrisome The role Section 702 played in thwarting terrorist plots has been exaggerated by the government. Bergen 14 (Peter Bergen Peter Bergen is the director of the National Security Program at the New America Foundation, where David Sterman and Emily Schneider are research assistants and Bailey Cahall is a research associate, New America Foundation, January 2014, Do NSA’s Bulk Surveillance Programs Stop Terrorists? http://pierreghz.legtux.org/streisand/autoblogs/frglobalvoicesonlineorg_0e319138ab63237c2d2aeff84b4cb506d936eab8/media/e1982452.Be rgen_NAF_NSA20Surveillance_1_0.pdf) When the Snowden leaks first broke, the government declassified some of the details of four terrorism cases to make its defense of the NSA bulk surveillance programs. One was the Moalin case discussed in the previous section. The three others, involving surveillance under Section 702, are discussed below. (More detail about all of these cases can be found in the Appendix.) An examination of the terrorism cases that the government has cited to defend the NSA programs suggests that bulk surveillance’s importance to those cases has been exaggerated. Impact Answers There is zero risk of catastrophe, future attacks will only be small scale. Bergen, 08—Peter, Bergen Peter Bergen is the director of the National Security Program at the New America Foundation; “WMD Terrorist Fears Are Overblown” http://www.cnn.com/2008/POLITICS/12/05/bergen.wmd/ Not really. Terrorists have already used weapons of mass destruction in the past decade in attacks around the world, and they have proven to be something of a dud. In the fall of 2001, the anthrax attacks in the United States that targeted politicians and journalists caused considerable panic but did not lead to many deaths. Five people were killed. The alleged author of that attack, Bruce E. Ivins, was one of the leading biological weapons researchers in the United States. Even this brilliant scientist could only "weaponize" anthrax to the point that it killed a handful of people. Imagine then how difficult it would be for the average terrorist, or even the aboveaverage terrorist, to replicate such efforts. Similarly, the bizarre Japanese cult Aum Shinrikyo, which recruited leading scientists and had hundreds of millions of dollars in the bank, embarked on a largescale WMD program in the early 1990s in which cult members experimented with anthrax and invested in land in Australia to mine uranium. In the end, Aum found biological and nuclear attacks too complex to organize and settled instead on a chemical weapons operation, setting off sarin gas in the Tokyo subway in 1995 that killed 12 commuters. It is hard to imagine a place better suited to killing a lot of people than the jam-packed Tokyo subway, yet the death toll turned out to be small in Aum's chemical weapons assault. More recently, in 2006 and 2007 al Qaeda's Iraqi affiliate laced several of its bombs with chlorine. Those attacks sickened hundreds of Iraqis, but victims who died in the assaults did so more from the blast of the bombs than because of inhaling chlorine. Al Qaeda stopped using chlorine in its bombs in Iraq more than a year ago. There is a semantic problem in any discussion of WMDs because the ominous term ''Weapons of Mass Destruction'' is something of a misnomer. In the popular imagination, chemical, biological and nuclear devices are all weapons of mass destruction. In fact, there is only one weapon of mass destruction that can kill tens or hundreds of thousands and that is a nuclear device. So the real question is: Can terrorists deploy nuclear weapons any time in the next five years or even further in the future? To do so, terrorists would have one of four options: to buy, steal, develop or be given a nuclear weapon. But none of those scenarios are remotely realistic outside the world of Hollywood. To understand how complex it is to develop a nuclear weapon, it is worth recalling that Saddam Hussein put tens of millions of dollars into his nuclear program with no success. Iran, which has had a nuclear program for almost two decades, is still years away from developing a nuclear bomb. Terrorist groups simply don't have the massive resources of states, and so the notion that they could develop their own, even crude, nuclear weapons is fanciful. Well, what about terrorists being given nukes? Preventing this was one of the underlying rationales of the push to topple Hussein in 2003. This does not pass the laugh test. Brian Michael Jenkins, one of the leading U.S. terrorism experts in a book published this year, "Will Terrorists Go Nuclear?," points out that there are two reasons this is quite unlikely. First, governments are not about to hand over their crown jewels to organizations that are "not entirely under state control and whose reliability is not certain." Second, "giving them a nuclear weapon almost certainly exposes the state sponsor to retaliation." For the same reason that states won't give nukes to terrorists, they also won't sell them either, which leaves the option of stealing a nuclear weapon. But that is similarly unlikely because nucleararmed governments, including Pakistan, are pretty careful about the security measures they place around their most valued weapons. None of this of course is to suggest that al Qaeda is not interested in deploying nuclear devices. Osama bin Laden and other al Qaeda leaders have repeatedly bloviated about the necessity of nuking the West and have even implied that they have the capability to do so. This is nonsense. Yes, in the mid1990s when Al Qaeda was based in Sudan, members of the group tried to buy highly enriched uranium suitable for a nuke, but the deal did not go through. And it is certainly the case that a year or so before 9/11, bin Laden was meeting with veterans of Pakistan's nuclear program to discuss how al Qaeda might get into the nuclear weapons business. But all of this was aspirational, not operational. There is not a shred of evidence that any of this got beyond the talking stage. In 2002, former U.N. weapons inspector David Albright undertook a careful study of al Qaeda's nuclear research program and concluded it was virtually impossible for al Qaeda to have acquired any type of nuclear weapon. However, there is plenty of evidence that the group has experimented with crude chemical and biological weapons, and also attempted to acquire radioactive materials suitable for a "dirty" bomb, a device that marries conventional explosives to radioactive materials. But even if al Qaeda successfully deployed a crude chemical, biological or radiological weapon these would not be weapons of mass destruction that killed thousands. Instead, these would be weapons of mass disruption, whose principal effect would be panic -- not mass casualties. So if not WMDs, what will terrorists use in their attacks over the next five years? Small-bore chemical, biological and radiological attacks are all quite probable, but those attacks would kill scores, not thousands. What we are likely to see again and again are the tried and tested tactics that terrorists have used for decades: # The first vehicle bomb blew up on Wall Street in 1920 detonated by an Italian-American anarchist. Since then, the car/truck bomb has been reliably deployed by terrorists thousands of times. # Assassinations, such as the one that killed Archduke Ferdinand in Sarajevo in 1914, sparking one of the bloodiest wars in history. # Hijackings, such as those that inaugurated the worst terrorist attack in history on 9/11. No WMD terrorism empirically the threat is overblown Mueller 11. (John Mueller, Professor and Woody Hayes Chair of National Security Studies, Mershon Center for International Security Studies and Department of Political Science, “The Truth About al Qaeda”, 8/2/2011, http://www.foreignaffairs.com/articles/68012/johnmueller/the-truth-about-al-qaeda?page=show) The chief lesson of 9/11 should have been that small bands of terrorists, using simple methods, can exploit loopholes in existing security systems. But instead, many preferred to engage in massive extrapolation: If 19 men could hijack four airplanes simultaneously, the thinking went, then surely al Qaeda would soon make an atomic bomb. As a misguided Turkish proverb holds, "If your enemy be an ant, imagine him to be an elephant." The new information unearthed in Osama bin Laden's hideout in Abbottabad, Pakistan, suggests that the United States has been doing so for a full decade. Whatever al Qaeda's threatening rhetoric and occasional nuclear fantasies, its potential as a menace, particularly as an atomic one, has been much inflated. The public has now endured a decade of dire warnings about the imminence of a terrorist atomic attack. In 2004, the former CIA spook Michael Scheuer proclaimed on television's 60 Minutes that it was "probably a near thing," and in 2007, the physicist Richard Garwin assessed the likelihood of a nuclear explosion in an American or a European city by terrorism or other means in the next ten years to be 87 percent. By 2008, Defense Secretary Robert Gates mused that what keeps every senior government leader awake at night is "the thought of a terrorist ending up with a weapon of mass destruction, especially nuclear." Few, it seems, found much solace in the fact that an al Qaeda computer seized in Afghanistan in 2001 indicated that the group's budget for research on weapons of mass destruction (almost all of it focused on primitive chemical weapons work) was some $2,000 to $4,000. In the wake of the killing of Osama bin Laden, officials now have more al Qaeda computers, which reportedly contain a wealth of information about the workings of the organization in the intervening decade. A multiagency task force has completed its assessment, and according to first reports, it has found that al Qaeda members have primarily been engaged in dodging drone strikes and complaining about how cash-strapped they are. Some reports suggest they've also been looking at quite a bit of pornography. The full story is not out yet, but it seems breathtakingly unlikely that the miserable little group has had the time or inclination, let alone the money, to set up and staff a uranium-seizing operation, as well as a fancy, super-high-tech facility to fabricate a bomb. It is a process that requires trusting corrupted foreign collaborators and other criminals, obtaining and transporting highly guarded material, setting up a machine shop staffed with top scientists and technicians, and rolling the heavy, cumbersome, and untested finished product into position to be detonated by a skilled crew, all the while attracting no attention from outsiders. The documents also reveal that after fleeing Afghanistan, bin Laden maintained what one member of the task force calls an "obsession" with attacking the United States again, even though 9/11 was in many ways a disaster for the group. It led to a worldwide loss of support, a major attack on it and on its Taliban hosts, and a decade of furious and dedicated harassment. And indeed, bin Laden did repeatedly and publicly threaten an attack on the United States. He assured Americans in 2002 that "the youth of Islam are preparing things that will fill your hearts with fear"; and in 2006, he declared that his group had been able "to breach your security measures" and that "operations are under preparation, and you will see them on your own ground once they are finished." Al Qaeda's animated spokesman, Adam Gadahn, proclaimed in 2004 that "the streets of America shall run red with blood" and that "the next wave of attacks may come at any moment." The obsessive desire notwithstanding, such fulminations have clearly lacked substance. Although hundreds of millions of people enter the United States legally every year, and countless others illegally, no true al Qaeda cell has been found in the country since 9/11 and exceedingly few people have been uncovered who even have any sort of "link" to the organization. The closest effort at an al Qaeda operation within the country was a decidedly nonnuclear one by an Afghan-American, Najibullah Zazi, in 2009. Outraged at the U.S.-led war on his home country, Zazi attempted to join the Taliban but was persuaded by al Qaeda operatives in Pakistan to set off some bombs in the United States instead. Under surveillance from the start, he was soon arrested, and, however "radicalized," he has been talking to investigators ever since, turning traitor to his former colleagues. Whatever training Zazi received was inadequate; he repeatedly and desperately sought further instruction from his overseas instructors by phone. At one point, he purchased bomb material with a stolen credit card, guaranteeing that the purchase would attract attention and that security video recordings would be scrutinized. Apparently, his handlers were so strapped that they could not even advance him a bit of cash to purchase some hydrogen peroxide for making a bomb. For al Qaeda, then, the operation was a failure in every way -- except for the ego boost it got by inspiring the usual dire litany about the group's supposedly existential challenge to the United States, to the civilized world, to the modern state system. Indeed, no Muslim extremist has succeeded in detonating even a simple bomb in the United States in the last ten years, and except for the attacks on the London Underground in 2005, neither has any in the United Kingdom. It seems wildly unlikely that al Qaeda is remotely ready to go nuclear. Outside of war zones, the amount of killing carried out by al Qaeda and al Qaeda linkees, maybes, and wannabes throughout the entire world since 9/11 stands at perhaps a few hundred per year. That's a few hundred too many, of course, but it scarcely presents an existential, or elephantine, threat. And the likelihood that an American will be killed by a terrorist of any ilk stands at one in 3.5 million per year, even with 9/11 included. That probability will remain unchanged unless terrorists are able to increase their capabilities massively -and obtaining nuclear weapons would allow them to do so. Although al Qaeda may have dreamed from time to time about getting such weapons, no other terrorist group has even gone so far as to indulge in such dreams, with the exception of the Japanese cult Aum Shinrikyo, which leased the mineral rights to an Australian sheep ranch that sat on uranium deposits, purchased some semi-relevant equipment, and tried to buy a finished bomb from the Russians. That experience, however, cannot be very encouraging to the would-be atomic terrorist. Even though it was flush with funds and undistracted by drone attacks (or even by much surveillance), Aum Shinrikyo abandoned its atomic efforts in frustration very early on. It then moved to biological weapons, another complete failure that inspired its leader to suggest that fears expressed in the United States of a biological attack were actually a ruse to tempt terrorist groups to pursue the weapons. The group did finally manage to release some sarin gas in a Tokyo subway that killed 13 and led to the group's terminal shutdown, as well as to 16 years (and counting) of pronouncements that WMD terrorism is the wave of the future. No elephants there, either. No terror impact Mueller and Stewart 12 (John Mueller and Mark G. Stewart 12, Senior Research Scientist at the Mershon Center for International Security Studies and Adjunct Professor in the Department of Political Science, both at Ohio State University, and Senior Fellow at the Cato Institute AND Australian Research Council Professorial Fellow and Professor and Director at the Centre for Infrastructure Performance and Reliability at the University of Newcastle, "The Terrorism Delusion," Summer, International Security, Vol. 37, No. 1, politicalscience.osu.edu/faculty/jmueller//absisfin.pdf) In 2009, the U.S. Department of Homeland Security (DHS) issued a lengthy report on protecting the homeland. Key to achieving such an objective should be a careful assessment of the character, capacities, and desires of potential terrorists targeting that homeland. Although the report contains a section dealing with what its authors call “the nature of the terrorist adversary,” the section devotes only two sentences to assessing that nature: “The number and high profile of international and domestic terrorist attacks and disrupted plots during the last two decades underscore the determination and persistence of terrorist organizations. Terrorists have proven to be relentless, patient, opportunistic, and flexible, learning from experience and modifying tactics and targets to exploit perceived vulnerabilities and avoid observed strengths.”8¶ This description may apply to some terrorists somewhere, including at least a few of those involved in the September 11 attacks. Yet, it scarcely describes the vast majority of those individuals picked up on terrorism charges in the United States since those attacks. The inability of the DHS to consider this fact even parenthetically in its fleeting discussion is not only amazing but perhaps delusional in its single-minded preoccupation with the extreme.¶ In sharp contrast, the authors of the case studies, with remarkably few exceptions, describe their subjects with such words as incompetent, ineffective, unintelligent, idiotic, ignorant, inadequate, unorganized, misguided, muddled, amateurish, dopey, unrealistic, moronic, irrational, and foolish.9 And in nearly all of the cases where an operative from the police or from the Federal Bureau of Investigation was at work (almost half of the total), the most appropriate descriptor would be “gullible.”¶ In all, as Shikha Dalmia has put it, would-be terrorists need to be “radicalized enough to die for their cause; Westernized enough to move around without raising red flags; ingenious enough to exploit loopholes in the security apparatus; meticulous enough to attend to the myriad logistical details that could torpedo the operation; self-sufficient enough to make all the preparations without enlisting outsiders who might give them away; disciplined enough to maintain complete secrecy; and—above all—psychologically tough enough to keep functioning at a high level without cracking in the face of their own impending death.”10 The case studies examined in this article certainly do not abound with people with such characteristics. ¶ In the eleven years since the September 11 attacks, no terrorist has been able to detonate even a primitive bomb in the United States, and except for the four explosions in the London transportation system in 2005, neither has any in the United Kingdom. Indeed, the only method by which Islamist terrorists have managed to kill anyone in the United States since September 11 has been with gunfire—inflicting a total of perhaps sixteen deaths over the period (cases 4, 26, 32).11 This limited capacity is impressive because, at one time, smallscale terrorists in the United States were quite successful in setting off bombs. Noting that the scale of the September 11 attacks has “tended to obliterate America’s memory of pre-9/11 terrorism,” Brian Jenkins reminds us (and we clearly do need reminding) that the 1970s witnessed sixty to seventy terrorist incidents, mostly bombings, on U.S. soil every year.12 ¶ The situation seems scarcely different in Europe and other Western locales. Michael Kenney, who has interviewed dozens of government officials and intelligence agents and analyzed court documents, has found that, in sharp contrast with the boilerplate characterizations favored by the DHS and with the imperatives listed by Dalmia , Islamist militants in those locations are operationally unsophisticated, short on know-how, prone to making mistakes, poor at planning, and limited in their capacity to learn.13 Another study documents the difficulties of network coordination that continually threaten the terrorists’ operational unity, trust, cohesion, and ability to act collectively.14¶ In addition, although some of the plotters in the cases targeting the United States harbored visions of toppling large buildings, destroying airports, setting off dirty bombs, or bringing down the Brooklyn Bridge (cases 2, 8, 12, 19, 23, 30, 42), all were nothing more than wild fantasies, far beyond the plotters’ capacities however much they may have been encouraged in some instances by FBI operatives. Indeed, in many of the cases, target selection is effectively a random process, lacking guile and careful planning. Often, it seems, targets have been chosen almost capriciously and simply for their convenience. For example, a would-be bomber targeted a mall in Rockford, Illinois, because it was nearby (case 21). Terrorist plotters in Los Angeles in 2005 drew up a list of targets that were all within a 20-mile radius of their shared apartment, some of which did not even exist (case 15). In Norway, a neo-Nazi terrorist on his way to bomb a synagogue took a tram going the wrong way and dynamited a mosque instead.15 No lone wolf terror attacks Harwood 15 (Matthew, Senior Writer and Editor for the ACLU and Holds an M.Litt in International Security Studies from U of St. Andrews in Scotland, 2/6, Foreign Policy in Focus, "Crying Lone Wolf") You could multiply such statements many times over. There’s only one problem with the rising crescendo of alarm about lone wolves: most of it simply isn’t true.¶ There’s nothing new about the “threat” and the concept is notoriously unreliable, as well as selectively used. (These days, “lone wolf” has largely become a stand-in for “Islamic terrorist,” though the category itself is not bound to any specific ideological type .) Worst of all, its recent highlighting paves the way for the heightening of abusive and counterproductive police and national security practices, including the infiltration of minority and activist communities and elaborate sting operations that ensnare the vulnerable. In addition, the categorization of such solitary individuals as terrorists supposedly driven by ideology — left or right, secular or religious — often obscures multiple other factors that may actually cause them to engage in violence.¶ Like all violent crime, individual terrorism represents a genuine risk, just an exceedingly rare and minimal one. It’s not the sort of thing that the government should be able to build whole new, intrusive surveillance programs on or use as an excuse for sending in agents to infiltrate communities.¶ National programs now being set up to combat lone-wolf terrorism have a way of wildly exaggerating its prevalence and dangers — and in the end are only likely to exacerbate the problem. For Americans to concede more of their civil liberties in return for “security” against lone wolves wouldn’t be a trade; it would be fraud.¶ Anatomy of the Wolf¶ The “literature” on both terrorism and the lone wolf should be approached with a healthy degree of skepticism. To this day, there is little consensus on what exactly terrorism is; the same is true of the lone-wolf variety. Many barriers to WMD terrorism Hoffman 14 (Bruce Hoffman is a contributing editor to The National Interest, a senior fellow at the U.S. Military Academy’s Combating Terrorism Center, and a professor and director of the Center for Security Studies at Georgetown University., March-April, 2014, Low-Tech Terrorism, National Interest, http://nationalinterest.org/article/low-tech-terrorism-9935) Fortunately, the report’s most breathless prediction concerning the likelihood of terrorist use of weapons of mass destruction (WMD) has not come to pass. But this is not for want of terrorists trying to obtain such capabilities. Indeed, prior to the October 2001 U.S.-led invasion of Afghanistan, Al Qaeda had embarked upon an ambitious quest to acquire and develop an array of such weapons that, had it been successful, would have altered to an unimaginable extent our most basic conceptions about national security and rendered moot debates over whether terrorism posed a potentially existential threat. But just how effective have terrorist efforts to acquire and use weapons of mass destruction actually been? The September 11, 2001, attacks were widely noted for their reliance on relatively low-tech weaponry—the conversion, in effect, of airplanes into missiles by using raw physical muscle and box cutters to hijack them. Since then, efforts to gain access to WMD have been unceasing. But examining those efforts results in some surprising conclusions. While there is no cause for complacency, they do suggest that terrorists face some inherent constraints that will be difficult for them to overcome. It is easier to proclaim the threat of mass terror than to perpetrate it. No risk of nuclear terrorism Mearsheimer 14 (John Mearsheimer, IR Prof at UChicago, National Interest, January 2, 2014, "America Unhinged", http://nationalinterest.org/article/america-unhinged-9639?page=show) Am I overlooking the obvious threat that strikes fear into the hearts of so many Americans, which is terrorism? Not at all. Sure, the United States has a terrorism problem. But it is a minor threat. There is no question we fell victim to a spectacular attack on September 11, but it did not cripple the United States in any meaningful way and another attack of that magnitude is highly unlikely in the foreseeable future. Indeed, there has not been a single instance over the past twelve years of a terrorist organization exploding a primitive bomb on American soil, much less striking a major blow. Terrorism—most of it arising from domestic groups—was a much bigger problem in the United States during the 1970s than it has been since the Twin Towers were toppled. What about the possibility that a terrorist group might obtain a nuclear weapon? Such an occurrence would be a game changer, but the chances of that happening are virtually nil. No nuclear-armed state is going to supply terrorists with a nuclear weapon because it would have no control over how the recipients might use that weapon. Political turmoil in a nuclear-armed state could in theory allow terrorists to grab a loose nuclear weapon, but the United States already has detailed plans to deal with that highly unlikely contingency. Terrorists might also try to acquire fissile material and build their own bomb. But that scenario is extremely unlikely as well: there are significant obstacles to getting enough material and even bigger obstacles to building a bomb and then delivering it. More generally, virtually every country has a profound interest in making sure no terrorist group acquires a nuclear weapon, because they cannot be sure they will not be the target of a nuclear attack, either by the terrorists or another country the terrorists strike. Nuclear terrorism, in short, is not a serious threat. And to the extent that we should worry about it, the main remedy is to encourage and help other states to place nuclear materials in highly secure custody.